GRAYBYTE WORDPRESS FILE MANAGER3252

Server IP : 68.65.123.43 / Your IP : 216.73.216.160
System : Linux server266.web-hosting.com 4.18.0-513.18.1.lve.el8.x86_64 #1 SMP Thu Feb 22 12:55:50 UTC 2024 x86_64
PHP Version : 8.0.30
Disable Function : NONE
cURL : ON | WGET : ON | Sudo : OFF | Pkexec : OFF
Directory : /var/lib/spamassassin/3.004006/updates_spamassassin_org/
Upload Files :
Current_dir [ Not Writeable ] Document_root [ Writeable ]

Command :


Current File : /var/lib/spamassassin/3.004006/updates_spamassassin_org//20_uri_tests.cf
# SpamAssassin rules file: URI tests
#
# Please don't modify this file as your changes will be overwritten with
# the next update. Use /etc/mail/spamassassin/local.cf instead.
# See 'perldoc Mail::SpamAssassin::Conf' for details.
#
# <@LICENSE>
# Licensed to the Apache Software Foundation (ASF) under one or more
# contributor license agreements.  See the NOTICE file distributed with
# this work for additional information regarding copyright ownership.
# The ASF licenses this file to you under the Apache License, Version 2.0
# (the "License"); you may not use this file except in compliance with
# the License.  You may obtain a copy of the License at:
# 
#     http://www.apache.org/licenses/LICENSE-2.0
# 
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# </@LICENSE>
#
###########################################################################

require_version 3.004006

# possible IDN spoofing attack: https://web.archive.org/web/20141006091906/https://www.shmoo.com/idn/homograph.txt
# not expecting any hits on this (yet)
uri HIGH_CODEPAGE_URI	       /^https?:\/\/[^\/]*\&\#(?:\d{4,}|[3456789]\d\d);/i
tflags HIGH_CODEPAGE_URI       userconf

###########################################################################

# Redirector URI patterns
redirector_pattern	/^http:\/\/chkpt\.zdnet\.com\/chkpt\/\w+\/(.*)$/i
redirector_pattern	/^http:\/\/www(?:\d+)?\.nate\.com\/r\/\w+\/(.*)$/i
redirector_pattern	/^http:\/\/.+\.gov\/(?:.*\/)?externalLink\.jhtml\?.*url=(.*?)(?:&.*)?$/i
redirector_pattern	/^http:\/\/redir\.internet\.com\/.+?\/.+?\/(.*)$/i
redirector_pattern	/^http:\/\/(?:.*?\.)?adtech\.de\/.*(?:;|\|)link=(.*?)(?:;|$)/i
redirector_pattern	m'^http.*?/redirect\.php\?.*(?<=[?&])goto=(.*?)(?:$|[&\#])'i
redirector_pattern      m'^https?:/*(?:[^/]+\.)?emf\d\.com/r\.cfm.*?&r=(.*)'i

uri NUMERIC_HTTP_ADDR		m{^https?://[\d.]+(?:[:/?\#]|$)}i
describe NUMERIC_HTTP_ADDR	Uses a numeric IP address in URL

# Theo sez:
# Have gotten FPs off this, and whitespace can't be in the host, so...
# %    Visit my homepage: http://i.like.foo.com %
# Also ignore some bad parses like http://foo.bar%20http://foo.bar
uri HTTP_ESCAPED_HOST           /^https?\:\/\/[^\/\s\?\&\#\']*(?!%(?:20|3[cCeE])(?:https?:|mailto:))%[0-9a-fA-F][0-9a-fA-F]/
describe HTTP_ESCAPED_HOST	Uses %-escapes inside a URL's hostname

# look for URI with escaped 0-9, A-Z, or a-z characters (all other safe
# characters have been well-tested, but are sometimes unnecessarily escaped
# in nonspam; requiring "http" or "https" also reduces false positives).
uri HTTP_EXCESSIVE_ESCAPES	/^https?:\/\/\S*%(?:3\d|[46][1-9a-f]|[57][\da])/i
describe HTTP_EXCESSIVE_ESCAPES	Completely unnecessary %-escapes inside a URL

# bug 1801
uri IP_LINK_PLUS	m{^https?://\d+\.\d+\.\d+\.\d+.{0,20}(?:cgi|click|ads|id=)}i
describe IP_LINK_PLUS	Dotted-decimal IP address followed by CGI

# allow ports 80 and 443 which are http and https, respectively
# we don't want to hit http://www.cnn.com:USArticle1840@www.liquidshirts.com/
# though, which actually doesn't have a weird port in it.
uri WEIRD_PORT			m{https?://[^/?\s]+?:\d+(?<!:80)(?<!:443)(?<!:8080)(?:/|\s|$)}
describe WEIRD_PORT		Uses non-standard port number for HTTP

# Matt Cline
# Pretty good for most folks, except for jm: I have a really stupid
# e-commerce bunch obfuscating their URLs with this for some reason. screw 'em
# jm: hesitant to remove this outright; it should be good against phishers
#uri      HTTP_ENTITIES_HOST	m{https?://[^\s\">/]*\&\#[\da-f]+}i
#describe HTTP_ENTITIES_HOST	URI obscured with character entities

uri YAHOO_RD_REDIR		m{^https?\://rd\.yahoo\.com/(?:[0-9]{4}|partner\b|dir\b)}i
describe YAHOO_RD_REDIR		Has Yahoo Redirect URI

uri YAHOO_DRS_REDIR		m{^https?://drs\.yahoo\.com/}i
describe YAHOO_DRS_REDIR	Has Yahoo Redirect URI

# "www" hidden as "%77%77%77", "ww%77", etc.
# note: *not* anchored to start of string, to catch use of redirectors
uri HTTP_77			/http:\/\/.{0,2}\%77/
describe HTTP_77		Contains an URL-encoded hostname (HTTP77)

# a.com.b.c
uri SPOOF_COM2OTH	m{^https?://(?:\w+\.)+?com\.(?!(?:[a-z]{2}\.)?s3\.amazonaws\.com|\w+\.psmtp\.com)(?:\w+\.){2}}i
describe SPOOF_COM2OTH	URI contains ".com" in middle

# a.com.b.com
uri __SPOOF_COM2COM	m{^https?://(?:\w+\.)+?com\.(?!(?:[a-z]{2}\.)?s3\.amazonaws\.com|\w+\.psmtp\.com)(?:\w+\.)+?com\b}i
meta SPOOF_COM2COM	__SPOOF_COM2COM && !SPOOF_COM2OTH
describe SPOOF_COM2COM 	URI contains ".com" in middle and end

# a.net.b.com
uri SPOOF_NET2COM	m{^https?://(?:\w+\.)+?(?:net|org)\.(?!(?:[a-z]{2}\.)?s3\.amazonaws\.com)(?:\w+\.)+?com\b}i
describe SPOOF_NET2COM 	URI contains ".net" or ".org", then ".com"

uri URI_HEX		m%^https?://[^/?&\#]*\b(?![0-9a-f]{0,12}[a-f]{3})[0-9a-f]{6,}\b%i
describe URI_HEX	URI hostname has long hexadecimal sequence

uri URI_NOVOWEL		m%^https?://[^/?&\#]*[bcdfgjklmnpqrstvwxz]{7}%i
describe URI_NOVOWEL	URI hostname has long non-vowel sequence
tflags URI_NOVOWEL      userconf     # lock scores low

uri URI_UNSUBSCRIBE		/\b(?:gone|opened|out)\.php/i
describe URI_UNSUBSCRIBE	URI contains suspicious unsubscribe link


# bug 3896: URIs in various TLDs, other than 3rd level www
uri URI_NO_WWW_INFO_CGI	/^(?:https?:\/\/)?[^\/]+(?<!\/www)\.[^.]{7,}\.info\/(?=\S{15,})\S*\?/i
describe URI_NO_WWW_INFO_CGI	CGI in .info TLD other than third-level "www"

uri URI_NO_WWW_BIZ_CGI	/^(?:https?:\/\/)?[^\/]+(?<!\/www)\.[^.]{7,}\.biz\/(?=\S{15,})\S*\?/i
describe URI_NO_WWW_BIZ_CGI	CGI in .biz TLD other than third-level "www"

###########################################################################

uri NORMAL_HTTP_TO_IP          m{^https?://(?!1(?:0|27|69\.254|72\.(?:1[6-9]|2\d|3[01])|92\.168)\.)\d+\.\d+\.\d+\.\d+\b(?![.-])}i
describe NORMAL_HTTP_TO_IP     URI host has a public dotted-decimal IPv4 address


[ Back ]
Name
Size
Last Modified
Owner / Group
Permissions
Options
..
--
April 22 2025 07:03:57
root / root
0755
10_default_prefs.cf
8.563 KB
April 22 2025 07:03:57
root / root
0644
10_hasbase.cf
2.395 KB
April 22 2025 07:03:57
root / root
0644
20_advance_fee.cf
7.434 KB
April 22 2025 07:03:57
root / root
0644
20_aux_tlds.cf
39.325 KB
April 22 2025 07:03:57
root / root
0644
20_body_tests.cf
7.012 KB
April 22 2025 07:03:57
root / root
0644
20_compensate.cf
1.89 KB
April 22 2025 07:03:57
root / root
0644
20_dnsbl_tests.cf
10.297 KB
April 22 2025 07:03:57
root / root
0644
20_drugs.cf
15.161 KB
April 22 2025 07:03:57
root / root
0644
20_dynrdns.cf
11.119 KB
April 22 2025 07:03:57
root / root
0644
20_fake_helo_tests.cf
9.068 KB
April 22 2025 07:03:57
root / root
0644
20_freemail.cf
2.988 KB
April 22 2025 07:03:57
root / root
0644
20_freemail_domains.cf
40.364 KB
April 22 2025 07:03:57
root / root
0644
20_freemail_mailcom_domains.cf
4.316 KB
April 22 2025 07:03:57
root / root
0644
20_head_tests.cf
26.833 KB
April 22 2025 07:03:57
root / root
0644
20_html_tests.cf
10.486 KB
April 22 2025 07:03:57
root / root
0644
20_imageinfo.cf
5.178 KB
April 22 2025 07:03:57
root / root
0644
20_mailspike.cf
2.862 KB
April 22 2025 07:03:57
root / root
0644
20_meta_tests.cf
3.422 KB
April 22 2025 07:03:57
root / root
0644
20_net_tests.cf
1.836 KB
April 22 2025 07:03:57
root / root
0644
20_pdfinfo.cf
15.526 KB
April 22 2025 07:03:57
root / root
0644
20_phrases.cf
7.964 KB
April 22 2025 07:03:57
root / root
0644
20_porn.cf
2.014 KB
April 22 2025 07:03:57
root / root
0644
20_ratware.cf
16.476 KB
April 22 2025 07:03:57
root / root
0644
20_uri_tests.cf
5.868 KB
April 22 2025 07:03:57
root / root
0644
20_vbounce.cf
20.279 KB
April 22 2025 07:03:57
root / root
0644
23_bayes.cf
2.938 KB
April 22 2025 07:03:57
root / root
0644
25_accessdb.cf
1.511 KB
April 22 2025 07:03:57
root / root
0644
25_antivirus.cf
1.503 KB
April 22 2025 07:03:57
root / root
0644
25_asn.cf
1.929 KB
April 22 2025 07:03:57
root / root
0644
25_dcc.cf
2.888 KB
April 22 2025 07:03:57
root / root
0644
25_dkim.cf
5.577 KB
April 22 2025 07:03:57
root / root
0644
25_dmarc.cf
2.029 KB
April 22 2025 07:03:57
root / root
0644
25_dnswl.cf
2.991 KB
April 22 2025 07:03:57
root / root
0644
25_pyzor.cf
1.486 KB
April 22 2025 07:03:57
root / root
0644
25_razor2.cf
3.09 KB
April 22 2025 07:03:57
root / root
0644
25_replace.cf
20.981 KB
April 22 2025 07:03:57
root / root
0644
25_spf.cf
4.297 KB
April 22 2025 07:03:57
root / root
0644
25_textcat.cf
1.729 KB
April 22 2025 07:03:57
root / root
0644
25_uribl.cf
19.534 KB
April 22 2025 07:03:57
root / root
0644
25_url_shortener.cf
10.662 KB
April 22 2025 07:03:57
root / root
0644
30_text_de.cf
25.688 KB
April 22 2025 07:03:57
root / root
0644
30_text_fr.cf
19.339 KB
April 22 2025 07:03:57
root / root
0644
30_text_it.cf
1.817 KB
April 22 2025 07:03:57
root / root
0644
30_text_nl.cf
20.147 KB
April 22 2025 07:03:57
root / root
0644
30_text_pl.cf
16.851 KB
April 22 2025 07:03:57
root / root
0644
30_text_pt_br.cf
41.928 KB
April 22 2025 07:03:57
root / root
0644
50_scores.cf
37.14 KB
April 22 2025 07:03:57
root / root
0644
60_adsp_override_dkim.cf
9.121 KB
April 22 2025 07:03:57
root / root
0644
60_awl.cf
1.479 KB
April 22 2025 07:03:57
root / root
0644
60_bayes_stopwords.cf
14.731 KB
April 22 2025 07:03:57
root / root
0644
60_shortcircuit.cf
2.36 KB
April 22 2025 07:03:57
root / root
0644
60_txrep.cf
1.311 KB
April 22 2025 07:03:57
root / root
0644
60_welcomelist.cf
11.342 KB
April 22 2025 07:03:57
root / root
0644
60_welcomelist_auth.cf
74.763 KB
April 22 2025 07:03:57
root / root
0644
60_welcomelist_dkim.cf
10.835 KB
April 22 2025 07:03:57
root / root
0644
60_welcomelist_spf.cf
6.104 KB
April 22 2025 07:03:57
root / root
0644
60_welcomelist_subject.cf
3.821 KB
April 22 2025 07:03:57
root / root
0644
72_active.cf
522.844 KB
April 22 2025 07:03:57
root / root
0644
72_scores.cf
29.705 KB
April 22 2025 07:03:57
root / root
0644
73_sandbox_manual_scores.cf
4.118 KB
April 22 2025 07:03:57
root / root
0644
MIRRORED.BY
1.055 KB
April 22 2025 07:03:53
root / root
0644
STATISTICS-set0-72_scores.cf.txt
1.462 KB
April 22 2025 07:03:57
root / root
0644
STATISTICS-set1-72_scores.cf.txt
1.463 KB
April 22 2025 07:03:57
root / root
0644
STATISTICS-set2-72_scores.cf.txt
0 KB
April 22 2025 07:03:57
root / root
0644
STATISTICS-set3-72_scores.cf.txt
0 KB
April 22 2025 07:03:57
root / root
0644
languages
130.469 KB
April 22 2025 07:03:57
root / root
0644
local.cf
3.143 KB
April 22 2025 07:03:57
root / root
0644
regression_tests.cf
2.706 KB
April 22 2025 07:03:57
root / root
0644
sa-update-pubkey.txt
4.665 KB
April 22 2025 07:03:57
root / root
0644
user_prefs.template
1.867 KB
April 22 2025 07:03:57
root / root
0644

GRAYBYTE WORDPRESS FILE MANAGER @ 2025
CONTACT ME
Static GIF