sessions.inc.php 5.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171
  1. <?php
  2. // Start session
  3. if (session_status() !== PHP_SESSION_ACTIVE) {
  4. session_name($SESSION_NAME);
  5. ini_set("session.cookie_httponly", 1);
  6. ini_set("session.cookie_samesite", $SESSION_SAMESITE_POLICY);
  7. ini_set('session.gc_maxlifetime', $SESSION_LIFETIME);
  8. }
  9. $_SESSION['access_all_exception'] = '0';
  10. if (isset($_SERVER['HTTP_X_FORWARDED_PROTO']) &&
  11. strtolower($_SERVER['HTTP_X_FORWARDED_PROTO']) == "https") {
  12. if (session_status() !== PHP_SESSION_ACTIVE) {
  13. ini_set("session.cookie_secure", 1);
  14. }
  15. $IS_HTTPS = true;
  16. }
  17. elseif (isset($_SERVER['HTTPS'])) {
  18. if (session_status() !== PHP_SESSION_ACTIVE) {
  19. ini_set("session.cookie_secure", 1);
  20. }
  21. $IS_HTTPS = true;
  22. }
  23. else {
  24. $IS_HTTPS = false;
  25. }
  26. if (session_status() !== PHP_SESSION_ACTIVE) {
  27. session_start();
  28. }
  29. if (!isset($_SESSION['CSRF']['TOKEN'])) {
  30. $_SESSION['CSRF']['TOKEN'] = bin2hex(random_bytes(32));
  31. }
  32. // Set session UA
  33. if (!isset($_SESSION['SESS_REMOTE_UA'])) {
  34. $_SESSION['SESS_REMOTE_UA'] = $_SERVER['HTTP_USER_AGENT'];
  35. }
  36. // Keep session active
  37. if (isset($_SESSION['LAST_ACTIVITY']) && (time() - $_SESSION['LAST_ACTIVITY'] > $SESSION_LIFETIME)) {
  38. session_unset();
  39. session_destroy();
  40. }
  41. $_SESSION['LAST_ACTIVITY'] = time();
  42. // API
  43. if (!empty($_SERVER['HTTP_X_API_KEY'])) {
  44. $stmt = $pdo->prepare("SELECT * FROM `api` WHERE `api_key` = :api_key AND `active` = '1';");
  45. $stmt->execute(array(
  46. ':api_key' => preg_replace('/[^a-zA-Z0-9-]/', '', $_SERVER['HTTP_X_API_KEY'])
  47. ));
  48. $api_return = $stmt->fetch(PDO::FETCH_ASSOC);
  49. if (!empty($api_return['api_key'])) {
  50. $skip_ip_check = ($api_return['skip_ip_check'] == 1);
  51. $remote = get_remote_ip(false);
  52. $allow_from = array_map('trim', preg_split( "/( |,|;|\n)/", $api_return['allow_from']));
  53. if ($skip_ip_check === true || ip_acl($remote, $allow_from)) {
  54. $_SESSION['mailcow_cc_username'] = 'API';
  55. $_SESSION['mailcow_cc_role'] = 'admin';
  56. $_SESSION['mailcow_cc_api'] = true;
  57. if ($api_return['access'] == 'rw') {
  58. $_SESSION['mailcow_cc_api_access'] = 'rw';
  59. }
  60. else {
  61. $_SESSION['mailcow_cc_api_access'] = 'ro';
  62. }
  63. }
  64. else {
  65. $redis->publish("F2B_CHANNEL", "mailcow UI: Invalid password for API_USER by " . $_SERVER['REMOTE_ADDR']);
  66. error_log("mailcow UI: Invalid password for API_USER by " . $_SERVER['REMOTE_ADDR']);
  67. http_response_code(401);
  68. echo json_encode(array(
  69. 'type' => 'error',
  70. 'msg' => 'api access denied for ip ' . $_SERVER['REMOTE_ADDR']
  71. ));
  72. unset($_POST);
  73. exit();
  74. }
  75. }
  76. else {
  77. $redis->publish("F2B_CHANNEL", "mailcow UI: Invalid password for API_USER by " . $_SERVER['REMOTE_ADDR']);
  78. error_log("mailcow UI: Invalid password for API_USER by " . $_SERVER['REMOTE_ADDR']);
  79. http_response_code(401);
  80. echo json_encode(array(
  81. 'type' => 'error',
  82. 'msg' => 'authentication failed'
  83. ));
  84. unset($_POST);
  85. exit();
  86. }
  87. }
  88. else {
  89. $remote = get_remote_ip(false);
  90. $docker_ipv4_network = getenv('IPV4_NETWORK');
  91. if ($remote == "{$docker_ipv4_network}.246") {
  92. $_SESSION['mailcow_cc_username'] = 'Controller';
  93. $_SESSION['mailcow_cc_role'] = 'admin';
  94. $_SESSION['mailcow_cc_api'] = true;
  95. $_SESSION['mailcow_cc_api_access'] = 'rw';
  96. }
  97. }
  98. // Handle logouts
  99. if (isset($_POST["logout"])) {
  100. if (isset($_SESSION["dual-login"])) {
  101. $_SESSION["mailcow_cc_username"] = $_SESSION["dual-login"]["username"];
  102. $_SESSION["mailcow_cc_role"] = $_SESSION["dual-login"]["role"];
  103. unset($_SESSION['sogo-sso-user-allowed']);
  104. unset($_SESSION['sogo-sso-pass']);
  105. unset($_SESSION["dual-login"]);
  106. if ($_SESSION["mailcow_cc_role"] == "admin"){
  107. header("Location: /admin/mailbox");
  108. } elseif ($_SESSION["mailcow_cc_role"] == "domainadmin") {
  109. header("Location: /domainadmin/mailbox");
  110. } else {
  111. header("Location: /");
  112. }
  113. exit();
  114. }
  115. else {
  116. $role = $_SESSION["mailcow_cc_role"];
  117. session_regenerate_id(true);
  118. session_unset();
  119. session_destroy();
  120. session_write_close();
  121. if ($role == "admin") {
  122. header("Location: /admin");
  123. }
  124. elseif ($role == "domainadmin") {
  125. header("Location: /domainadmin");
  126. }
  127. else {
  128. header("Location: /");
  129. }
  130. }
  131. }
  132. // Check session
  133. function session_check() {
  134. if (isset($_SESSION['mailcow_cc_api']) && $_SESSION['mailcow_cc_api'] === true) {
  135. return true;
  136. }
  137. if (!isset($_SESSION['SESS_REMOTE_UA']) || ($_SESSION['SESS_REMOTE_UA'] != $_SERVER['HTTP_USER_AGENT'])) {
  138. $_SESSION['return'][] = array(
  139. 'type' => 'warning',
  140. 'msg' => 'session_ua'
  141. );
  142. return false;
  143. }
  144. if (!empty($_POST)) {
  145. if ($_SESSION['CSRF']['TOKEN'] != $_POST['csrf_token']) {
  146. $_SESSION['return'][] = array(
  147. 'type' => 'warning',
  148. 'msg' => 'session_token'
  149. );
  150. return false;
  151. }
  152. unset($_POST['csrf_token']);
  153. $_SESSION['CSRF']['TOKEN'] = bin2hex(random_bytes(32));
  154. $_SESSION['CSRF']['TIME'] = time();
  155. }
  156. return true;
  157. }
  158. if (isset($_SESSION['mailcow_cc_role']) && session_check() === false) {
  159. $_POST = array();
  160. $_FILES = array();
  161. }