Index: chrome/browser/download/download_extensions.cc |
diff --git a/chrome/browser/download/download_extensions.cc b/chrome/browser/download/download_extensions.cc |
index 22fcff0de6cb45921c5c0214d053c6fb8cfecc06..67cf83733f7907bab8b8c59414f862a29a6022e3 100644 |
--- a/chrome/browser/download/download_extensions.cc |
+++ b/chrome/browser/download/download_extensions.cc |
@@ -67,6 +67,9 @@ const struct FileType { |
// installation. |
{"crx", ALLOW_ON_USER_GESTURE, ALLOW_AUTO_OPEN}, |
+ // Included for parity with kSafeBrowsingFileTypes. |
+ {"bin", NOT_DANGEROUS, ALLOW_AUTO_OPEN}, |
+ |
// Windows, all file categories. The list is in alphabetical order of |
// extensions. Exceptions are made for logical groupings of file types. |
// |
@@ -172,9 +175,20 @@ const struct FileType { |
// Microsoft IIS Internet Communication Settings. |
{"ins", ALLOW_ON_USER_GESTURE, ALLOW_AUTO_OPEN}, |
+ // InstallShield Compiled Script. |
+ {"inx", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
+ |
+ // InstallShield Uninstaller Script. |
+ {"isu", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
+ |
// Microsoft IIS Internet Service Provider Settings. |
{"isp", ALLOW_ON_USER_GESTURE, ALLOW_AUTO_OPEN}, |
+ // Windows Task Scheduler Job file. No handler is registered by default, so |
+ // this is probably normally not dangerous unless saved into the task |
+ // scheduler directory. |
+ {"job", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
+ |
// JavaScript file. May open using Windows Script Host with user level |
// privileges. |
{"js", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
@@ -228,6 +242,17 @@ const struct FileType { |
// Microsoft Office Profile Settings File. |
{"ops", ALLOW_ON_USER_GESTURE, ALLOW_AUTO_OPEN}, |
+ // Portable Application Installer File. |
+ {"paf", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
+ |
+ // Extensions that will open in IE even when chrome is set as default |
+ // browser. |
+ {"partial", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
+ {"xrm-ms", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
+ {"svg", NOT_DANGEROUS, ALLOW_AUTO_OPEN}, |
+ {"xml", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
+ {"xsl", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
+ |
// Microsoft Visual Test. |
{"pcd", ALLOW_ON_USER_GESTURE, ALLOW_AUTO_OPEN}, |
@@ -262,6 +287,9 @@ const struct FileType { |
// DISALLOW_AUTO_OPEN restriction. |
{"reg", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
+ // Registry Script Windows. |
+ {"rgs", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
+ |
// Microsoft Windows Explorer Command. |
// See https://support.microsoft.com/kb/190355 for an example. |
{"scf", ALLOW_ON_USER_GESTURE, ALLOW_AUTO_OPEN}, |
@@ -285,6 +313,9 @@ const struct FileType { |
// types of files. |
{"sys", DANGEROUS, DISALLOW_AUTO_OPEN}, |
+ // U3 Smart Application. |
+ {"u3p", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
+ |
// Internet Shortcut (new since IE9). Both .url and .website are .ini files |
// that describe a shortcut that points to a URL. They can point at |
// anything. Dropping a download of this type and opening it automatically |
@@ -297,6 +328,8 @@ const struct FileType { |
{"vb", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
{"vbe", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
{"vbs", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
+ // Some sites claim .vbscript is a valid extension for vbs files. |
+ {"vbscript", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
{"vsd", ALLOW_ON_USER_GESTURE, ALLOW_AUTO_OPEN}, |
@@ -351,7 +384,13 @@ const struct FileType { |
{"tcsh", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
#endif |
#if defined(OS_MACOSX) |
+ // Automator Action. |
+ {"action", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
+ |
{"command", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
+ |
+ // Automator Workflow. |
+ {"workflow", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
#endif |
// Package management formats. OS_WIN package formats are handled above. |
@@ -361,6 +400,12 @@ const struct FileType { |
#if defined(OS_LINUX) |
{"deb", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
{"rpm", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
+ |
+ // "common" executable file extensions for linux. There's not really much |
+ // reason to block since they require execute bit to actually run. Included |
+ // for histograms and to match kSafeBrowsingFileTypes. |
+ {"out", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
+ {"run", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |
#endif |
#if defined(OS_ANDROID) |
{"dex", ALLOW_ON_USER_GESTURE, DISALLOW_AUTO_OPEN}, |