diff --git a/core/modules/image/src/Controller/ImageStyleDownloadController.php b/core/modules/image/src/Controller/ImageStyleDownloadController.php index bfd3f34..ade7602 100644 --- a/core/modules/image/src/Controller/ImageStyleDownloadController.php +++ b/core/modules/image/src/Controller/ImageStyleDownloadController.php @@ -102,9 +102,9 @@ public function deliver(Request $request, $scheme, ImageStyleInterface $image_st // generated without a token can set the // 'image.settings:allow_insecure_derivatives' configuration to TRUE to // bypass the latter check, but this will increase the site's vulnerability - // site's vulnerability to denial-of-service attacks. To prevent this - // variable from leaving the site vulnerable to the most serious attacks, a - // token is always required when a derivative of a derivative is requested. + // to denial-of-service attacks. To prevent this variable from leaving the + // site vulnerable to the most serious attacks, a token is always required + // when a derivative of a derivative is requested. $valid = !empty($image_style) && file_stream_wrapper_valid_scheme($scheme); if (!$this->config('image.settings')->get('allow_insecure_derivatives') || strpos(ltrim($target, '\/'), 'styles/') === 0) { $valid &= $request->query->get(IMAGE_DERIVATIVE_TOKEN) === $image_style->getPathToken($image_uri);