Manual:$wgMimeTypeExclusions/pl
Appearance
MIME types: $wgMimeTypeExclusions | |
---|---|
MIME types to disallow if $wgVerifyMimeType is enabled. |
|
Wprowadzono w wersji: | 1.37.0 (Gerrit change 680806; git #4dae3b1a) |
Usunięto w wersji: | nadal w użyciu |
Dozwolone wartości: | (array of MIME types (strings)) |
Domyślna wartość: | (patrz poniżej) |
Inne ustawienia: Alfabetycznie | Według funkcji |
Szczegóły
Files with these MIME types will never be allowed as uploads if $wgVerifyMimeType is enabled.
This configuration parameter was previously called $wgMimeTypeBlacklist .
Default values
Wersja MediaWiki: | ≥ 1.41 |
- 1.39.5 (gerrit:961942, phab:T341565)
- 1.40.1 (gerrit:961949, phab:T341565)
$wgMimeTypeExclusions = [
# HTML may contain cookie-stealing JavaScript and web bugs
'text/html',
# Similarly with JavaScript itself
'application/javascript', 'text/javascript', 'text/x-javascript', 'application/x-shellscript',
# PHP scripts may execute arbitrary code on the server
'application/x-php', 'text/x-php',
# Other types that may be interpreted by some servers
'text/x-python', 'text/x-perl', 'text/x-bash', 'text/x-sh', 'text/x-csh',
# Client-side hazards on Internet Explorer
'text/scriptlet', 'application/x-msdownload',
# Windows metafile, client-side vulnerability on some systems
'application/x-msmetafile',
# Files that look like java files
'application/java',
# XML files generally - T341565
'application/xml', 'text/xml',
];
Wersje MediaWiki: | 1.39 – 1.40 |
$wgMimeTypeExclusions = [
# HTML may contain cookie-stealing JavaScript and web bugs
'text/html',
# Similarly with JavaScript itself
'application/javascript', 'text/javascript', 'text/x-javascript', 'application/x-shellscript',
# PHP scripts may execute arbitrary code on the server
'application/x-php', 'text/x-php',
# Other types that may be interpreted by some servers
'text/x-python', 'text/x-perl', 'text/x-bash', 'text/x-sh', 'text/x-csh',
# Client-side hazards on Internet Explorer
'text/scriptlet', 'application/x-msdownload',
# Windows metafile, client-side vulnerability on some systems
'application/x-msmetafile',
# Java applets are no longer supported by browsers and may contain cookie-stealing code, similarly to JavaScript
'application/java'
];
Wersje MediaWiki: | 1.37 – 1.38 |
$wgMimeTypeExclusions = [
# HTML may contain cookie-stealing JavaScript and web bugs
'text/html',
# Similarly with JavaScript itself
'application/javascript', 'text/javascript', 'text/x-javascript', 'application/x-shellscript',
# PHP scripts may execute arbitrary code on the server
'application/x-php', 'text/x-php',
# Other types that may be interpreted by some servers
'text/x-python', 'text/x-perl', 'text/x-bash', 'text/x-sh', 'text/x-csh',
# Client-side hazards on Internet Explorer
'text/scriptlet', 'application/x-msdownload',
# Windows metafile, client-side vulnerability on some systems
'application/x-msmetafile',
];
Przykład
If you wanted to allow HTML files to be uploaded:
$wgFileExtensions[] = 'html';
$wgProhibitedFileExtensions = array_diff( $wgProhibitedFileExtensions, [ 'html' ] );
$wgMimeTypeExclusions = array_diff( $wgMimeTypeExclusions, [ 'text/html' ] ) );