sessions.inc.php 3.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126
  1. <?php
  2. // Start session
  3. if (session_status() !== PHP_SESSION_ACTIVE) {
  4. ini_set("session.cookie_httponly", 1);
  5. ini_set('session.gc_maxlifetime', $SESSION_LIFETIME);
  6. }
  7. if (isset($_SERVER['HTTP_X_FORWARDED_PROTO']) &&
  8. strtolower($_SERVER['HTTP_X_FORWARDED_PROTO']) == "https") {
  9. if (session_status() !== PHP_SESSION_ACTIVE) {
  10. ini_set("session.cookie_secure", 1);
  11. }
  12. $IS_HTTPS = true;
  13. }
  14. elseif (isset($_SERVER['HTTPS'])) {
  15. if (session_status() !== PHP_SESSION_ACTIVE) {
  16. ini_set("session.cookie_secure", 1);
  17. }
  18. $IS_HTTPS = true;
  19. }
  20. else {
  21. $IS_HTTPS = false;
  22. }
  23. // session_set_cookie_params($SESSION_LIFETIME, '/', '', $IS_HTTPS, true);
  24. if (session_status() !== PHP_SESSION_ACTIVE) {
  25. session_start();
  26. }
  27. if (!isset($_SESSION['CSRF']['TOKEN'])) {
  28. $_SESSION['CSRF']['TOKEN'] = bin2hex(random_bytes(32));
  29. }
  30. // Set session UA
  31. if (!isset($_SESSION['SESS_REMOTE_UA'])) {
  32. $_SESSION['SESS_REMOTE_UA'] = $_SERVER['HTTP_USER_AGENT'];
  33. }
  34. // API
  35. if (!empty($_SERVER['HTTP_X_API_KEY'])) {
  36. $stmt = $pdo->prepare("SELECT `allow_from` FROM `api` WHERE `api_key` = :api_key AND `active` = '1';");
  37. $stmt->execute(array(
  38. ':api_key' => preg_replace('/[^a-zA-Z0-9-]/', '', $_SERVER['HTTP_X_API_KEY'])
  39. ));
  40. $api_return = $stmt->fetch(PDO::FETCH_ASSOC);
  41. if (!empty($api_return['allow_from'])) {
  42. $remote = get_remote_ip(false);
  43. $allow_from = array_map('trim', preg_split( "/( |,|;|\n)/", $api_return['allow_from']));
  44. if (in_array($remote, $allow_from)) {
  45. $_SESSION['mailcow_cc_username'] = 'API';
  46. $_SESSION['mailcow_cc_role'] = 'admin';
  47. $_SESSION['mailcow_cc_api'] = true;
  48. }
  49. else {
  50. $redis->publish("F2B_CHANNEL", "mailcow UI: Invalid password for API_USER by " . $_SERVER['REMOTE_ADDR']);
  51. error_log("mailcow UI: Invalid password for " . $user . " by " . $_SERVER['REMOTE_ADDR']);
  52. echo json_encode(array(
  53. 'type' => 'error',
  54. 'msg' => 'api access denied for ip ' . $_SERVER['REMOTE_ADDR']
  55. ));
  56. unset($_POST);
  57. die();
  58. }
  59. }
  60. else {
  61. $redis->publish("F2B_CHANNEL", "mailcow UI: Invalid password for API_USER by " . $_SERVER['REMOTE_ADDR']);
  62. error_log("mailcow UI: Invalid password for " . $user . " by " . $_SERVER['REMOTE_ADDR']);
  63. echo json_encode(array(
  64. 'type' => 'error',
  65. 'msg' => 'authentication failed'
  66. ));
  67. unset($_POST);
  68. die();
  69. }
  70. }
  71. // Update session cookie
  72. // setcookie(session_name() ,session_id(), time() + $SESSION_LIFETIME);
  73. // Check session
  74. function session_check() {
  75. if (isset($_SESSION['mailcow_cc_api']) && $_SESSION['mailcow_cc_api'] === true) {
  76. return true;
  77. }
  78. if (!isset($_SESSION['SESS_REMOTE_UA']) || ($_SESSION['SESS_REMOTE_UA'] != $_SERVER['HTTP_USER_AGENT'])) {
  79. $_SESSION['return'][] = array(
  80. 'type' => 'warning',
  81. 'msg' => 'session_ua'
  82. );
  83. return false;
  84. }
  85. if (!empty($_POST)) {
  86. if ($_SESSION['CSRF']['TOKEN'] != $_POST['csrf_token']) {
  87. $_SESSION['return'][] = array(
  88. 'type' => 'warning',
  89. 'msg' => 'session_token'
  90. );
  91. return false;
  92. }
  93. unset($_POST['csrf_token']);
  94. $_SESSION['CSRF']['TOKEN'] = bin2hex(random_bytes(32));
  95. $_SESSION['CSRF']['TIME'] = time();
  96. }
  97. return true;
  98. }
  99. if (isset($_SESSION['mailcow_cc_role']) && session_check() === false) {
  100. $_POST = array();
  101. $_FILES = array();
  102. }
  103. // Handle logouts
  104. if (isset($_POST["logout"])) {
  105. if (isset($_SESSION["dual-login"])) {
  106. $_SESSION["mailcow_cc_username"] = $_SESSION["dual-login"]["username"];
  107. $_SESSION["mailcow_cc_role"] = $_SESSION["dual-login"]["role"];
  108. unset($_SESSION["dual-login"]);
  109. header("Location: /mailbox");
  110. exit();
  111. }
  112. else {
  113. session_regenerate_id(true);
  114. session_unset();
  115. session_destroy();
  116. session_write_close();
  117. header("Location: /");
  118. }
  119. }