File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change @@ -46,8 +46,8 @@ type. An attacker can name a file ``safe.png`` while its content is TIFF, JPEG
46462000, or EPS, causing a different — potentially more dangerous — parser to run.
4747
4848*Mitigations: * validate MIME type and magic bytes independently before calling
49- ``Image.open() ``; pass the ``format `` parameter explicitly; maintain an
50- allowlist of accepted formats.
49+ ``Image.open() ``; pass the ``formats `` argument with an allowlist of accepted
50+ formats.
5151
5252**S-2 — Plugin registry spoofing **
5353
@@ -226,8 +226,9 @@ The following mitigations are listed in priority order.
226226 advisories <https://github.com/python-pillow/Pillow/security/advisories> `_.
2272275. **Enforce ** ``MAX_IMAGE_PIXELS `` — never set it to ``None ``; treat
228228 ``Image.DecompressionBombWarning `` as an error.
229- 6. **Allowlist image formats ** — unregister plugins your application does not
230- need.
229+ 6. **Allowlist image formats ** — restrict accepted formats when opening
230+ images, for example with ``Image.open(..., formats=...) ``, and isolate
231+ installs/environments if you need to minimise supported formats.
2312327. **Strip metadata on output ** — never pass through EXIF/XMP/ICC from user
232233 uploads to publicly served images.
2332348. **Sanitise all metadata ** returned by Pillow before using it downstream.
You can’t perform that action at this time.
0 commit comments