[prev in list] [next in list] [prev in thread] [next in thread] 

List:       spamassassin-devel
Subject:    [Bug 8138] New: URIDetail ends spamassassin run on specific anchor text
From:       bugzilla-daemon () spamassassin ! apache ! org
Date:       2023-06-07 16:36:37
Message-ID: bug-8138-26 () https ! bz ! apache ! org/SpamAssassin/
[Download RAW message or body]

https://bz.apache.org/SpamAssassin/show_bug.cgi?id=8138

            Bug ID: 8138
           Summary: URIDetail ends spamassassin run on specific anchor
                    text
           Product: Spamassassin
           Version: 4.0.0
          Hardware: PC
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Plugins
          Assignee: dev@spamassassin.apache.org
          Reporter: wbreyha@gmx.net
  Target Milestone: Undefined

Created attachment 5890
  --> https://bz.apache.org/SpamAssassin/attachment.cgi?id=5890&action=edit
SPAM EML causing the bug

I tried to catch some SPAM using uridetail with a rule like
uri_detail  __ZID_DHL_FAKELAUF  text =~ /confirm/ domain !~ /dhl/

This is already a simplified version.

If I run 
spamassassin -D < <attached.eml> 2>&1
I see that the debug output ends exactly with
... dbg: uri: running __ZID_DHL_FAKELAUF
followed by the mail and no result at all.

The URI in question contains:
<a href="httxx://bad.tld/co">&bull; Click here to confirm sending the
shipment</a>

And if I remove the "&bull;" from the anchor text the rule works as expected
and spamassassin is able to finish the run.

I tried to add some debug output, but it seems the pure access of the variable
$text in the for() loop at URIDetail.pm:206 ends everything.

-- 
You are receiving this mail because:
You are the assignee for the bug.=
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic