-
-
Notifications
You must be signed in to change notification settings - Fork 4.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Add new Parse Server option fileUpload.fileExtensions
to restrict file upload by file extension
#8537
Conversation
Thanks for opening this pull request!
|
I will reformat the title to use the proper commit message syntax. |
Codecov ReportPatch coverage:
Additional details and impacted files@@ Coverage Diff @@
## release-5.x.x #8537 +/- ##
=================================================
+ Coverage 94.09% 94.12% +0.03%
=================================================
Files 183 183
Lines 13776 13798 +22
=================================================
+ Hits 12963 12988 +25
+ Misses 813 810 -3
☔ View full report in Codecov by Sentry. |
fileUpload.fileExtensions
to restrict file upload by file extension
# [5.5.0](5.4.3...5.5.0) (2023-05-20) ### Features * Add new Parse Server option `fileUpload.fileExtensions` to restrict file upload by file extension; this fixes a security vulnerability in which a phishing attack could be performed using an uploaded HTML file; by default the new option only allows file extensions matching the regex pattern `^[^hH][^tT][^mM][^lL]?$`, which excludes HTML files; this fix is released as a patch version given the severity of this vulnerability, however, if your app currently depends on uploading files with HTML file extensions then this may be a breaking change and you could allow HTML file upload by setting the option to `['.*']` ([#8537](#8537)) ([196e05f](196e05f))
🎉 This change has been released in version 5.5.0 |
Fixes security vulnerability GHSA-9prm-jqwx-45x9.