/* Copyright (c) 2013, 2014 Montel Laurent This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License, version 2, as published by the Free Software Foundation. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA */ #include "scamdetection.h" #include "scamdetectiondetailsdialog.h" #include "scamcheckshorturl.h" #include "settings/globalsettings.h" #include #include #include using namespace MessageViewer; static QString IPv4_PATTERN = QLatin1String("\\b[0-9]{1,3}\\.[0-9]{1,3}(?:\\.[0-9]{0,3})?(?:\\.[0-9]{0,3})?"); static QString addWarningColor(const QString &url) { const QString error = QString::fromLatin1("%1").arg(url); return error; } ScamDetection::ScamDetection(QObject *parent) : QObject(parent), mCheckShortUrl(new ScamCheckShortUrl(this)) { } ScamDetection::~ScamDetection() { } ScamCheckShortUrl *ScamDetection::scamCheckShortUrl() const { return mCheckShortUrl; } void ScamDetection::scanPage(QWebFrame *frame) { #ifndef KDEPIM_NO_WEBKIT if (GlobalSettings::self()->scamDetectionEnabled()) { mDetails.clear(); mDetails = QLatin1String("") + i18n("Details:") + QLatin1String("
    "); bool foundScam = false; const QWebElement rootElement = frame->documentElement(); bool result = scanFrame(rootElement, mDetails); if (result) { foundScam = true; } foreach(QWebFrame *childFrame, frame->childFrames()) { result = scanFrame(childFrame->documentElement(), mDetails); if (result) { foundScam = true; } } if (foundScam) Q_EMIT messageMayBeAScam(); } #endif } bool ScamDetection::scanFrame(const QWebElement &rootElement, QString &details) { #ifndef KDEPIM_NO_WEBKIT bool foundScam = false; QRegExp ip4regExp; ip4regExp.setPattern(IPv4_PATTERN); const QWebElementCollection allAnchor = rootElement.findAll(QLatin1String("a")); Q_FOREACH (const QWebElement &anchorElement, allAnchor) { //1) detect if title has a url and title != href const QString href = anchorElement.attribute(QLatin1String("href")); const QString title = anchorElement.attribute(QLatin1String("title")); const QUrl url(href); if (!title.isEmpty()) { if (title.startsWith(QLatin1String("http:")) || title.startsWith(QLatin1String("https:")) || title.startsWith(QLatin1String("www."))) { if (title.startsWith(QLatin1String("www."))) { const QString completUrl = url.scheme() + QLatin1String("://") + title; if ( completUrl != href && href != (completUrl + QLatin1Char('/'))) { foundScam = true; } } else { if (href != title) { // http://www.kde.org == http://www.kde.org/ if (href != (title + QLatin1Char('/'))) { foundScam = true; } } } if (foundScam) { details += QLatin1String("
  • ") + i18n("This email contains a link which reads as '%1' in the text, but actually points to '%2'. This is often the case in scam emails to mislead the recipient", addWarningColor(title), addWarningColor(href)) + QLatin1String("
  • "); } } } if (!foundScam) { //2) detect if url href has ip and not server name. const QString hostname = url.host(); if (hostname.contains(ip4regExp) && !hostname.contains(QLatin1String("127.0.0.1"))) { //hostname details += QLatin1String("
  • ") + i18n("This email contains a link which points to a numerical IP address (%1) instead of a typical textual website address. This is often the case in scam emails.", addWarningColor(hostname))+QLatin1String("
  • "); foundScam = true; } else if (hostname.contains(QLatin1Char('%'))) { //Hexa value for ip details += QLatin1String("
  • ") + i18n("This email contains a link which points to a hexadecimal IP address (%1) instead of a typical textual website address. This is often the case in scam emails.", addWarningColor(hostname))+QLatin1String("
  • "); foundScam = true; } else if (url.toString().contains(QLatin1String("url?q="))) { //4) redirect url. details += QLatin1String("
  • ") + i18n("This email contains a link (%1) which has a redirection", addWarningColor(url.toString())) +QLatin1String("
  • "); foundScam = true; } else if ((url.toString().count(QLatin1String("http://")) > 1) || (url.toString().count(QLatin1String("https://")) > 1)) { //5) more that 1 http in url. details += QLatin1String("
  • ") + i18n("This email contains a link (%1) which contains multiple http://. This is often the case in scam emails.", addWarningColor(url.toString())) + QLatin1String("
  • "); foundScam = true; } } //Check shortUrl if (!foundScam) { if (ScamCheckShortUrl::isShortUrl(url)) { details += QLatin1String("
  • ") + i18n("This email contains a shorturl (%1). It can redirect to another server.", addWarningColor(url.toString())) + QLatin1String("
  • "); foundScam = true; } } } //3) has form if (rootElement.findAll(QLatin1String("form")).count() > 0) { details += QLatin1String("
  • ") + i18n("Message contains form element. This is often the case in scam emails.") + QLatin1String("
  • "); foundScam = true; } details += QLatin1String("
"); return foundScam; #else return false; #endif } void ScamDetection::showDetails() { if (!mDetailsDialog) { mDetailsDialog = new MessageViewer::ScamDetectionDetailsDialog; } mDetailsDialog->setDetails(mDetails); mDetailsDialog->show(); }