Re: file upload name filtering

2025-02-12 Thread Burton Rhodes
If that’s the case, do you think a sanitize method is more appropriate for this situation? Perhaps one that could live inside an interceptor and possibly even be overridden by those who think they know what they’re doing? This way you wouldn’t have to reject the upload which in my opinion is no

Re: file upload name filtering

2025-02-12 Thread Brian Andle
Unless I'm mistaken this is to prevent issues when a developer uses the file name, unsanitized, and potentially other malicious type injection via specially crafted file names. On Wed, Feb 12, 2025, 10:05 AM Burton Rhodes wrote: > I agree with Greg. > > IMHO, character validation should be left

Re: file upload name filtering

2025-02-12 Thread Burton Rhodes
I agree with Greg. IMHO, character validation should be left to the developer which depends on their OS and file names supported therein. But if there needs to be protection against a buffer overflow attack (I assume that is the problem you are trying to solve?), then the length restriction sh