From: Fabian Keil <fk@fabiankeil.de>
Date: Thu, 6 Feb 2025 13:56:56 +0000 (+0100)
Subject: Really remove the obsolete ie-exploits filter
X-Git-Url: http://www.privoxy.org/gitweb/@default-cgi@/static/developer-manual/faq/coding.html?a=commitdiff_plain;h=0c0353853a8ddaf273b3f559b6bc51faa7e144cf;p=privoxy.git

Really remove the obsolete ie-exploits filter

It doesn't actually reliably protect against Nimda, there never
were active maintainers and IE is obsolete anyway.

Also some virus scanners seem to be offended by the test case
for the filter in the source tarball.

This should have been committed with 62b68d363a7e71b.
---

diff --git a/default.action.master b/default.action.master
index fd5559b2..ebf953a0 100644
--- a/default.action.master
+++ b/default.action.master
@@ -283,7 +283,6 @@
 #     quicktime-kioskmode: Make Quicktime movies saveable.
 #     fun:                 Text replacements for subversive browsing fun!
 #     crude-parental:      Crude parental filtering. Note that this filter doesn't work reliably.
-#     ie-exploits:         Disable some known Internet Explorer bug exploits.
 #     site-specifics:      Cure for site-specific problems. Don't apply generally!
 #     no-ping:             Removes non-standard ping attributes in <a> and <area> tags.
 #     google:              CSS-based block for Google text ads. Also removes a width limitation and the toolbar advertisement.
@@ -566,7 +565,6 @@ standard.Cautious
 +filter{banners-by-size} \
 +filter{webbugs} \
 +filter{jumping-windows} \
-+filter{ie-exploits} \
 +hide-from-header{block} \
 +hide-referrer{conditional-block} \
 +session-cookies-only \
diff --git a/default.filter b/default.filter
index e1f7a6ea..c36783a3 100644
--- a/default.filter
+++ b/default.filter
@@ -493,29 +493,6 @@ content filter because of an regulations text.\n\
 @is
 
 
-#################################################################################
-#
-# IE-Exploits: Disable some known Internet Explorer bug exploits.
-#
-#################################################################################
-FILTER: ie-exploits Disable some known Internet Explorer bug exploits.
-
-# Note: This is basically a demo and waits for someone more interested in IE
-# security (sic!) to take over.
-
-# Cross-site-scripting:
-#
-s%f\("javascript:location.replace\('mk:@MSITStore:C:'\)"\);%alert\("This page looks like it tries to use a vulnerability described here:\n http://online.securityfocus.com/archive/1/298748/2002-11-02/2002-11-08/2"\);%siU
-
-# Address bar spoofing (http://www.secunia.com/advisories/10395/):
-#
-s/(<a[^>]*href[^>]*)(?:\x01|\x02|\x03|%0[012])@/$1MALICIOUS-LINK@/ig
-
-# Nimda:
-#
-s%<script language="JavaScript">(window\.open|1;''\.concat)\("readme\.eml", null, "resizable=no,top=6000,left=6000"\)</script>%<br><font size="7"> WARNING: This Server is infected with <a href="http://www.cert.org/advisories/CA-2001-26.html">Nimda</a>!</font>%g
-
-
 #################################################################################
 #
 #
diff --git a/tests/cts/content-filters/content-filters.action b/tests/cts/content-filters/content-filters.action
index 546e0917..7ebc7f67 100644
--- a/tests/cts/content-filters/content-filters.action
+++ b/tests/cts/content-filters/content-filters.action
@@ -58,9 +58,6 @@
 {+filter{crude-parental}}
 /crude-parental/
 
-{+filter{ie-exploits}}
-/ie-exploits/
-
 {+filter{site-specifics}}
 /site-specifics/