http://bugzilla.spamassassin.org/show_bug.cgi?id=3195
Summary: HTML_BADTAG FP due to xml prefixed elements.
Product: Spamassassin
Version: SVN Trunk (Latest Devel Version)
Platform: Other
OS/Version: other
Status: NEW
Severity: normal
Priority: P5
Component: Rules (Eval Tests)
AssignedTo: spamassassin-dev@incubator.apache.org
ReportedBy: koppel@ece.lsu.edu
Some HTML email uses xml prefixed elements, such as <st1:City>. These
aren't recognized as valid and result in HTML_BADTAG false positives.
With the attached patch, any tag containing a ":" will be considered
valid (not bad). This will eliminate the false positives but will not
catch any truly bad tag containing a ":". I don't see that as much of
a problem since any spammer that would put a ":" in a tag to evade the
BADTAG rules with the proposed patch could just as easily obfuscate
with valid tags.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
Summary: HTML_BADTAG FP due to xml prefixed elements.
Product: Spamassassin
Version: SVN Trunk (Latest Devel Version)
Platform: Other
OS/Version: other
Status: NEW
Severity: normal
Priority: P5
Component: Rules (Eval Tests)
AssignedTo: spamassassin-dev@incubator.apache.org
ReportedBy: koppel@ece.lsu.edu
Some HTML email uses xml prefixed elements, such as <st1:City>. These
aren't recognized as valid and result in HTML_BADTAG false positives.
With the attached patch, any tag containing a ":" will be considered
valid (not bad). This will eliminate the false positives but will not
catch any truly bad tag containing a ":". I don't see that as much of
a problem since any spammer that would put a ":" in a tag to evade the
BADTAG rules with the proposed patch could just as easily obfuscate
with valid tags.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.