Unless I'm mistaken this is to prevent issues when a developer uses the
file name, unsanitized, and potentially other malicious type injection via
specially crafted file names.

On Wed, Feb 12, 2025, 10:05 AM Burton Rhodes <burtonrho...@gmail.com> wrote:

> I agree with Greg.
>
> IMHO, character validation should be left to the developer which depends
> on their OS and file names supported therein. But if there needs to be
> protection against a buffer overflow attack (I assume that is the
> problem you are trying to solve?), then the length restriction should
> suffice.  Or is there another risk I'm not aware of that could threaten
> a system by just having a few malicious characters in a file name?
>
>
> Thanks,
> Burton
>
>
> ------ Original Message ------
> From "Greg Huber" <gregh3...@gmail.com>
> To dev@struts.apache.org
> Date 2/11/2025 2:51:36 AM
> Subject Re: file upload name filtering
>
> >Filename length is a possible good way to go, with an override of the
> length and then truncate or block option.
> >
> >On 11/02/2025 06:21, Lukasz Lenart wrote:
> >>Hm... looks like I must re-think this approach, thanks all for
> >>reporting this issue!
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: dev-unsubscr...@struts.apache.org
> For additional commands, e-mail: dev-h...@struts.apache.org
>
>

Reply via email to