![]() "messageTemplate" : "Notification message", "type" : "hostname|basedomain|referrerhostname|referrerbasedomain|fileextensions", Fixed a bug which meant that the calculated SHA256 for base64-encoded data URIs could be incorrect.fileInspectionData now contains a new key, 'zipFileNames', which contains an array of all of the filenames contained within a.Metadata support added for downloads initiated from inside an iFrame.Fixed an issue with the injected content-script which could result in the webpage behaving unexpectedly in a specific situation.Changes to how the referrer URL is inferred which will hopefully be more accurate.Implemented cleanup of session storage when it is no longer needed.Downloads smuggled via a document with a file:// origin, files downloaded from a web-server.) This allows metadata to be calculated in some situations which may otherwise not be possible. The extension can now retrieve file metadata using a native messaging host.Rules now support hostname, basedomain, referrerhostname and referrerbasedomain filters.Rules now support the 'responsePriority' property which allows this behavior to be configured on a per-rule basis. This meant that the extension might not cancel and remove the download quickly enough to prevent it being opened. This change has been made because a user might have the chance to click a long-running download, meaning the item would automatically open when complete. This means that downloads are, by default, now blocked as early as possible instead of waiting for the download to complete in order to give the Native Messaging Host change to obtain the file metadata. Reverted blocking behavior to be consistent with versions 0.2.0 and prior.In this case the extension now takes the finalUrl value from the DownloadItem. ![]() The urlScheme filter would always look at the referring page, which makes sense for HTML Smuggled downloads but not for downloads from a web server.Make sure that non-smuggled downloads get an early cancellation opportunity as per 1.0.5.Better error handling when a download's referrer is unavailable.Thanks to a fix in Chromium, HTML Smuggled downloads via a data: URI can now be inspected by the content script.Fixed an oversight which meant that HTML Smuggled downloads from a HTTP origin were not inspected by the content script.For an in-depth description of HTML smuggling, please see the references below. It does this by using HTML5 APIs to provide a client-side download using javascript, without making a request to a webserver. HTML smuggling is essentially a technique for bypassing web-proxies / firewalls that perform content inspection on files downloaded from a server. It was created as a way to prevent HTML smuggling attacks, but it can also block downloads from webservers too. Download Blocker is a Google Chrome extension which blocks certain files from being downloaded, based on a number of different data / metadata properties.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |