sessions.inc.php 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140
  1. <?php
  2. // Start session
  3. if (session_status() !== PHP_SESSION_ACTIVE) {
  4. ini_set("session.cookie_httponly", 1);
  5. ini_set('session.gc_maxlifetime', $SESSION_LIFETIME);
  6. }
  7. if (isset($_SERVER['HTTP_X_FORWARDED_PROTO']) &&
  8. strtolower($_SERVER['HTTP_X_FORWARDED_PROTO']) == "https") {
  9. if (session_status() !== PHP_SESSION_ACTIVE) {
  10. ini_set("session.cookie_secure", 1);
  11. }
  12. $IS_HTTPS = true;
  13. }
  14. elseif (isset($_SERVER['HTTPS'])) {
  15. if (session_status() !== PHP_SESSION_ACTIVE) {
  16. ini_set("session.cookie_secure", 1);
  17. }
  18. $IS_HTTPS = true;
  19. }
  20. else {
  21. $IS_HTTPS = false;
  22. }
  23. if (session_status() !== PHP_SESSION_ACTIVE) {
  24. session_start();
  25. }
  26. if (!isset($_SESSION['CSRF']['TOKEN'])) {
  27. $_SESSION['CSRF']['TOKEN'] = bin2hex(random_bytes(32));
  28. }
  29. // Set session UA
  30. if (!isset($_SESSION['SESS_REMOTE_UA'])) {
  31. $_SESSION['SESS_REMOTE_UA'] = $_SERVER['HTTP_USER_AGENT'];
  32. }
  33. // Keep session active
  34. if (isset($_SESSION['LAST_ACTIVITY']) && (time() - $_SESSION['LAST_ACTIVITY'] > $SESSION_LIFETIME)) {
  35. session_unset();
  36. session_destroy();
  37. }
  38. $_SESSION['LAST_ACTIVITY'] = time();
  39. // API
  40. if (!empty($_SERVER['HTTP_X_API_KEY'])) {
  41. $stmt = $pdo->prepare("SELECT * FROM `api` WHERE `api_key` = :api_key AND `active` = '1';");
  42. $stmt->execute(array(
  43. ':api_key' => preg_replace('/[^a-zA-Z0-9-]/', '', $_SERVER['HTTP_X_API_KEY'])
  44. ));
  45. $api_return = $stmt->fetch(PDO::FETCH_ASSOC);
  46. if (!empty($api_return['api_key'])) {
  47. $skip_ip_check = ($api_return['skip_ip_check'] == 1);
  48. $remote = get_remote_ip(false);
  49. $allow_from = array_map('trim', preg_split( "/( |,|;|\n)/", $api_return['allow_from']));
  50. if (in_array($remote, $allow_from) || $skip_ip_check === true) {
  51. $_SESSION['mailcow_cc_username'] = 'API';
  52. $_SESSION['mailcow_cc_role'] = 'admin';
  53. $_SESSION['mailcow_cc_api'] = true;
  54. if ($api_return['api_key'] == 'rw') {
  55. $_SESSION['mailcow_cc_api_access'] = 'rw';
  56. }
  57. else {
  58. $_SESSION['mailcow_cc_api_access'] = 'ro';
  59. }
  60. }
  61. else {
  62. $redis->publish("F2B_CHANNEL", "mailcow UI: Invalid password for API_USER by " . $_SERVER['REMOTE_ADDR']);
  63. error_log("mailcow UI: Invalid password for " . $user . " by " . $_SERVER['REMOTE_ADDR']);
  64. http_response_code(401);
  65. echo json_encode(array(
  66. 'type' => 'error',
  67. 'msg' => 'api access denied for ip ' . $_SERVER['REMOTE_ADDR']
  68. ));
  69. unset($_POST);
  70. exit();
  71. }
  72. }
  73. else {
  74. $redis->publish("F2B_CHANNEL", "mailcow UI: Invalid password for API_USER by " . $_SERVER['REMOTE_ADDR']);
  75. error_log("mailcow UI: Invalid password for " . $user . " by " . $_SERVER['REMOTE_ADDR']);
  76. http_response_code(401);
  77. echo json_encode(array(
  78. 'type' => 'error',
  79. 'msg' => 'authentication failed'
  80. ));
  81. unset($_POST);
  82. exit();
  83. }
  84. }
  85. // Handle logouts
  86. if (isset($_POST["logout"])) {
  87. if (isset($_SESSION["dual-login"])) {
  88. $_SESSION["mailcow_cc_username"] = $_SESSION["dual-login"]["username"];
  89. $_SESSION["mailcow_cc_role"] = $_SESSION["dual-login"]["role"];
  90. unset($_SESSION["dual-login"]);
  91. header("Location: /mailbox");
  92. exit();
  93. }
  94. else {
  95. session_regenerate_id(true);
  96. session_unset();
  97. session_destroy();
  98. session_write_close();
  99. header("Location: /");
  100. }
  101. }
  102. // Check session
  103. function session_check() {
  104. if (isset($_SESSION['mailcow_cc_api']) && $_SESSION['mailcow_cc_api'] === true) {
  105. return true;
  106. }
  107. if (!isset($_SESSION['SESS_REMOTE_UA']) || ($_SESSION['SESS_REMOTE_UA'] != $_SERVER['HTTP_USER_AGENT'])) {
  108. $_SESSION['return'][] = array(
  109. 'type' => 'warning',
  110. 'msg' => 'session_ua'
  111. );
  112. return false;
  113. }
  114. if (!empty($_POST)) {
  115. if ($_SESSION['CSRF']['TOKEN'] != $_POST['csrf_token']) {
  116. $_SESSION['return'][] = array(
  117. 'type' => 'warning',
  118. 'msg' => 'session_token'
  119. );
  120. return false;
  121. }
  122. unset($_POST['csrf_token']);
  123. $_SESSION['CSRF']['TOKEN'] = bin2hex(random_bytes(32));
  124. $_SESSION['CSRF']['TIME'] = time();
  125. }
  126. return true;
  127. }
  128. if (isset($_SESSION['mailcow_cc_role']) && session_check() === false) {
  129. $_POST = array();
  130. $_FILES = array();
  131. }