[7610] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Eudora executes (Java) URL

daemon@ATHENA.MIT.EDU (Dominique Unruh)
Tue Aug 11 17:07:29 1998

Date: 	Tue, 11 Aug 1998 21:09:00 +0200
Reply-To: Dominique Unruh <dominique@UNRUH.DE>
From: Dominique Unruh <dominique@UNRUH.DE>
X-To:         "John D. Hardin" <jhardin@wolfenet.com>
To: BUGTRAQ@NETSPACE.ORG

[From an anti-mail-exploit-procmail-filter-perl-script (see
http://www.wolfenet.com/~jhardin/procmail-security.html):]
>  s/<BODY\s+(([^">]+("(\\.|[^"])*")?)*)ONLOAD/<BODY $1 DEFANGED-ONLOAD/gi;

This Pattern will catch lines like
        <body onload="badthings()">
converted to
        <BODY DEFANGED-ONLOAD="badthings()">
but not
        <body onload="badthings()" onload="badthings()">
converted to
        <BODY onload="badthings()"  DEFANGED-ONLOAD="badthings()">]
So one onload=... will stay and act.

Also things like < body ... > wont be catched. I dont know if those are
leading spaces are proper HTML, but even if not, one should not suppose
every bad HTML to be rejected.

DniQ.

home help back first fref pref prev next nref lref last post