sessions.inc.php 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144
  1. <?php
  2. // Start session
  3. if (session_status() !== PHP_SESSION_ACTIVE) {
  4. ini_set("session.cookie_httponly", 1);
  5. ini_set('session.gc_maxlifetime', $SESSION_LIFETIME);
  6. }
  7. $_SESSION['access_all_exception'] = '0';
  8. if (isset($_SERVER['HTTP_X_FORWARDED_PROTO']) &&
  9. strtolower($_SERVER['HTTP_X_FORWARDED_PROTO']) == "https") {
  10. if (session_status() !== PHP_SESSION_ACTIVE) {
  11. ini_set("session.cookie_secure", 1);
  12. }
  13. $IS_HTTPS = true;
  14. }
  15. elseif (isset($_SERVER['HTTPS'])) {
  16. if (session_status() !== PHP_SESSION_ACTIVE) {
  17. ini_set("session.cookie_secure", 1);
  18. }
  19. $IS_HTTPS = true;
  20. }
  21. else {
  22. $IS_HTTPS = false;
  23. }
  24. if (session_status() !== PHP_SESSION_ACTIVE) {
  25. session_start();
  26. }
  27. if (!isset($_SESSION['CSRF']['TOKEN'])) {
  28. $_SESSION['CSRF']['TOKEN'] = bin2hex(random_bytes(32));
  29. }
  30. // Set session UA
  31. if (!isset($_SESSION['SESS_REMOTE_UA'])) {
  32. $_SESSION['SESS_REMOTE_UA'] = $_SERVER['HTTP_USER_AGENT'];
  33. }
  34. // Keep session active
  35. if (isset($_SESSION['LAST_ACTIVITY']) && (time() - $_SESSION['LAST_ACTIVITY'] > $SESSION_LIFETIME)) {
  36. session_unset();
  37. session_destroy();
  38. }
  39. $_SESSION['LAST_ACTIVITY'] = time();
  40. // API
  41. if (!empty($_SERVER['HTTP_X_API_KEY'])) {
  42. $stmt = $pdo->prepare("SELECT * FROM `api` WHERE `api_key` = :api_key AND `active` = '1';");
  43. $stmt->execute(array(
  44. ':api_key' => preg_replace('/[^a-zA-Z0-9-]/', '', $_SERVER['HTTP_X_API_KEY'])
  45. ));
  46. $api_return = $stmt->fetch(PDO::FETCH_ASSOC);
  47. if (!empty($api_return['api_key'])) {
  48. $skip_ip_check = ($api_return['skip_ip_check'] == 1);
  49. $remote = get_remote_ip(false);
  50. $allow_from = array_map('trim', preg_split( "/( |,|;|\n)/", $api_return['allow_from']));
  51. if ($skip_ip_check === true || ip_acl($remote, $allow_from)) {
  52. $_SESSION['mailcow_cc_username'] = 'API';
  53. $_SESSION['mailcow_cc_role'] = 'admin';
  54. $_SESSION['mailcow_cc_api'] = true;
  55. if ($api_return['access'] == 'rw') {
  56. $_SESSION['mailcow_cc_api_access'] = 'rw';
  57. }
  58. else {
  59. $_SESSION['mailcow_cc_api_access'] = 'ro';
  60. }
  61. }
  62. else {
  63. $redis->publish("F2B_CHANNEL", "mailcow UI: Invalid password for API_USER by " . $_SERVER['REMOTE_ADDR']);
  64. error_log("mailcow UI: Invalid password for " . $user . " by " . $_SERVER['REMOTE_ADDR']);
  65. http_response_code(401);
  66. echo json_encode(array(
  67. 'type' => 'error',
  68. 'msg' => 'api access denied for ip ' . $_SERVER['REMOTE_ADDR']
  69. ));
  70. unset($_POST);
  71. exit();
  72. }
  73. }
  74. else {
  75. $redis->publish("F2B_CHANNEL", "mailcow UI: Invalid password for API_USER by " . $_SERVER['REMOTE_ADDR']);
  76. error_log("mailcow UI: Invalid password for " . $user . " by " . $_SERVER['REMOTE_ADDR']);
  77. http_response_code(401);
  78. echo json_encode(array(
  79. 'type' => 'error',
  80. 'msg' => 'authentication failed'
  81. ));
  82. unset($_POST);
  83. exit();
  84. }
  85. }
  86. // Handle logouts
  87. if (isset($_POST["logout"])) {
  88. if (isset($_SESSION["dual-login"])) {
  89. $_SESSION["mailcow_cc_username"] = $_SESSION["dual-login"]["username"];
  90. $_SESSION["mailcow_cc_role"] = $_SESSION["dual-login"]["role"];
  91. unset($_SESSION['sogo-sso-user-allowed']);
  92. unset($_SESSION['sogo-sso-pass']);
  93. unset($_SESSION["dual-login"]);
  94. header("Location: /mailbox");
  95. exit();
  96. }
  97. else {
  98. session_regenerate_id(true);
  99. session_unset();
  100. session_destroy();
  101. session_write_close();
  102. header("Location: /");
  103. }
  104. }
  105. // Check session
  106. function session_check() {
  107. if (isset($_SESSION['mailcow_cc_api']) && $_SESSION['mailcow_cc_api'] === true) {
  108. return true;
  109. }
  110. if (!isset($_SESSION['SESS_REMOTE_UA']) || ($_SESSION['SESS_REMOTE_UA'] != $_SERVER['HTTP_USER_AGENT'])) {
  111. $_SESSION['return'][] = array(
  112. 'type' => 'warning',
  113. 'msg' => 'session_ua'
  114. );
  115. return false;
  116. }
  117. if (!empty($_POST)) {
  118. if ($_SESSION['CSRF']['TOKEN'] != $_POST['csrf_token']) {
  119. $_SESSION['return'][] = array(
  120. 'type' => 'warning',
  121. 'msg' => 'session_token'
  122. );
  123. return false;
  124. }
  125. unset($_POST['csrf_token']);
  126. $_SESSION['CSRF']['TOKEN'] = bin2hex(random_bytes(32));
  127. $_SESSION['CSRF']['TIME'] = time();
  128. }
  129. return true;
  130. }
  131. if (isset($_SESSION['mailcow_cc_role']) && session_check() === false) {
  132. $_POST = array();
  133. $_FILES = array();
  134. }