Skip to content

Commit dcf6d36

Browse files
Flip default for allowed file types (#3593)
1 parent ca25102 commit dcf6d36

File tree

1 file changed

+6
-4
lines changed

1 file changed

+6
-4
lines changed

config/bolt/config.yaml

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -205,11 +205,13 @@ htmlcleaner:
205205

206206
# Define the file types (extensions to be exact) that are acceptable for upload
207207
# in either file fields or through the files screen.
208-
accept_file_types: [ yaml, twig, html, js, css, scss, gif, jpg, jpeg, png, ico, zip, tgz, txt, md, doc, docx, pdf, epub, xls, xlsx, ppt, pptx, mp3, ogg, wav, m4a, mp4, m4v, ogv, wmv, avi, webm, svg, webp, avif]
208+
# It only includes file types / extensions that are harder to exploit.
209+
accept_file_types: [ gif, jpg, jpeg, png, txt, md, pdf, epub, mp3 ]
209210

210-
# Alternatively, if you wish to limit these, uncomment the following list
211-
# instead. It just includes file types / extensions that are harder to exploit.
212-
# accept_file_types: [ gif, jpg, jpeg, png, txt, md, pdf, epub, mp3 ]
211+
# Alternatively, if you wish to not limit these, uncomment the following list
212+
# instead. Note that this can open your installation to XSS or other vulnerabilities as files
213+
# are uploaded as is to a by default publicly accessible folder on the webserver.
214+
#accept_file_types: [ yaml, twig, html, js, css, scss, gif, jpg, jpeg, png, ico, zip, tgz, txt, md, doc, docx, pdf, epub, xls, xlsx, ppt, pptx, mp3, ogg, wav, m4a, mp4, m4v, ogv, wmv, avi, webm, svg, webp, avif]
213215

214216
accept_media_types: [ gif, jpg, jpeg, png, svg, pdf, mp3, tiff, avif, webp ]
215217

0 commit comments

Comments
 (0)