6.7.3 & 7.0.3 test builds are ready, enjoy! niedz., 16 lut 2025 o 08:21 Lukasz Lenart <lukaszlen...@apache.org> napisał(a): > > And the same for 7.x > https://github.com/apache/struts/pull/1219 > > niedz., 16 lut 2025 o 08:07 Lukasz Lenart <lukaszlen...@apache.org> > napisał(a): > > > > PR reverts changes in 6.7.x > > https://github.com/apache/struts/pull/1218 > > > > sob., 15 lut 2025 o 08:10 Kusal Kithul-Godage > > <kusal.kithulgod...@gmail.com> napisał(a): > > > > > > Ah that's right - the MultiPartRequestWrapper augments the regular > > > request parameters with multipart form fields. > > > > > > Yes I think in that case it's sensible to revert the new validation > > > changes in AbstractMultiPartRequest (and subclasses) and get the other > > > patches released first. > > > > > > And then we can devise a new solution that only targets filenames. A > > > sanitizing solution sounds like a good idea. If implemented as a > > > protected method on AbstractMultiPartRequest, applications can easily > > > disable or customise the behaviour using the existing > > > 'struts.multipart.parser' extension point. > > > > > > On Fri, Feb 14, 2025 at 5:16 AM Lukasz Lenart <lukaszlen...@apache.org> > > > wrote: > > > > > > > > Right now I'm looking at the "defaultStack": > > > > > > > > .... > > > > <interceptor-ref name="actionFileUpload"/> > > > > ... > > > > <interceptor-ref name="params"/> > > > > ... > > > > > > > > and escaping/normalising normal form fields doesn't make sense as this > > > > will happen in "params" interceptor. What should happen is a better > > > > control over file names. > > > > > > > > czw., 13 lut 2025 o 19:00 Lukasz Lenart <lukaszlen...@apache.org> > > > > napisał(a): > > > > > > > > > > My idea for that was related to what we are doing in > > > > > ParametersInterceptor, but looks like this requires a step back and > > > > > rethink. I would revert these changes for now if there are no > > > > > objections. > > > > > > > > > > czw., 13 lut 2025 o 09:27 Greg Huber <gregh3...@gmail.com> napisał(a): > > > > > > > > > > > > Unlikely a sanitizing method might not work for everybody. I have > > > > > > had > > > > > > quite a few attempts to sanitize the way I want (first I run the > > > > > > Normalizer which removes all sorts of unwanted characters, then I > > > > > > only > > > > > > allow alphanumeric and then truncate the length) so to make one that > > > > > > fits all will not be easy. > > > > > > > > > > > > We do not want to be rejecting file uploads with no way of > > > > > > overriding it. > > > > > > > > > > > > The longer the file name the higher the risk? > > > > > > > > > > > > On 12/02/2025 20:04, Burton Rhodes wrote: > > > > > > > If that’s the case, do you think a sanitize method is more > > > > > > > appropriate for this situation? Perhaps one that could live > > > > > > > inside an interceptor and possibly even be overridden by those > > > > > > > who think they know what they’re doing? This way you wouldn’t > > > > > > > have to reject the upload which in my opinion is not a preferred > > > > > > > user experience. > > > > > > > > > > > > > > > > > > > > >> On Feb 12, 2025, at 12:56 PM, Brian > > > > > > >> Andle<brianandle...@gmail.com> wrote: > > > > > > >> > > > > > > >> Unless I'm mistaken this is to prevent issues when a developer > > > > > > >> uses the > > > > > > >> file name, unsanitized, and potentially other malicious type > > > > > > >> injection via > > > > > > >> specially crafted file names. > > > > > > >> > > > > > > >>> On Wed, Feb 12, 2025, 10:05 AM Burton > > > > > > >>> Rhodes<burtonrho...@gmail.com> wrote: > > > > > > >>> > > > > > > >>> I agree with Greg. > > > > > > >>> > > > > > > >>> IMHO, character validation should be left to the developer > > > > > > >>> which depends > > > > > > >>> on their OS and file names supported therein. But if there > > > > > > >>> needs to be > > > > > > >>> protection against a buffer overflow attack (I assume that is > > > > > > >>> the > > > > > > >>> problem you are trying to solve?), then the length restriction > > > > > > >>> should > > > > > > >>> suffice. Or is there another risk I'm not aware of that could > > > > > > >>> threaten > > > > > > >>> a system by just having a few malicious characters in a file > > > > > > >>> name? > > > > > > >>> > > > > > > >>> > > > > > > >>> Thanks, > > > > > > >>> Burton > > > > > > >>> > > > > > > >>> > > > > > > >>> ------ Original Message ------ > > > > > > >>> From "Greg Huber"<gregh3...@gmail.com> > > > > > > >>> to...@struts.apache.org > > > > > > >>> Date 2/11/2025 2:51:36 AM > > > > > > >>> Subject Re: file upload name filtering > > > > > > >>> > > > > > > >>>> Filename length is a possible good way to go, with an override > > > > > > >>>> of the > > > > > > >>> length and then truncate or block option. > > > > > > >>>> On 11/02/2025 06:21, Lukasz Lenart wrote: > > > > > > >>>>> Hm... looks like I must re-think this approach, thanks all for > > > > > > >>>>> reporting this issue! > > > > > > >>> --------------------------------------------------------------------- > > > > > > >>> To unsubscribe, e-mail:dev-unsubscr...@struts.apache.org > > > > > > >>> For additional commands, e-mail:dev-h...@struts.apache.org > > > > > > >>> > > > > > > >>> > > > > > > > > --------------------------------------------------------------------- > > > > To unsubscribe, e-mail: dev-unsubscr...@struts.apache.org > > > > For additional commands, e-mail: dev-h...@struts.apache.org > > > > > > > > > > --------------------------------------------------------------------- > > > To unsubscribe, e-mail: dev-unsubscr...@struts.apache.org > > > For additional commands, e-mail: dev-h...@struts.apache.org > > >
--------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@struts.apache.org For additional commands, e-mail: dev-h...@struts.apache.org