sessions.inc.php 3.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131
  1. <?php
  2. // Start session
  3. if (session_status() !== PHP_SESSION_ACTIVE) {
  4. ini_set("session.cookie_httponly", 1);
  5. ini_set('session.gc_maxlifetime', $SESSION_LIFETIME);
  6. }
  7. if (isset($_SERVER['HTTP_X_FORWARDED_PROTO']) &&
  8. strtolower($_SERVER['HTTP_X_FORWARDED_PROTO']) == "https") {
  9. if (session_status() !== PHP_SESSION_ACTIVE) {
  10. ini_set("session.cookie_secure", 1);
  11. }
  12. $IS_HTTPS = true;
  13. }
  14. elseif (isset($_SERVER['HTTPS'])) {
  15. if (session_status() !== PHP_SESSION_ACTIVE) {
  16. ini_set("session.cookie_secure", 1);
  17. }
  18. $IS_HTTPS = true;
  19. }
  20. else {
  21. $IS_HTTPS = false;
  22. }
  23. if (session_status() !== PHP_SESSION_ACTIVE) {
  24. session_start();
  25. }
  26. if (!isset($_SESSION['CSRF']['TOKEN'])) {
  27. $_SESSION['CSRF']['TOKEN'] = bin2hex(random_bytes(32));
  28. }
  29. // Set session UA
  30. if (!isset($_SESSION['SESS_REMOTE_UA'])) {
  31. $_SESSION['SESS_REMOTE_UA'] = $_SERVER['HTTP_USER_AGENT'];
  32. }
  33. // Keep session active
  34. if (isset($_SESSION['LAST_ACTIVITY']) && (time() - $_SESSION['LAST_ACTIVITY'] > $SESSION_LIFETIME)) {
  35. session_unset();
  36. session_destroy();
  37. }
  38. $_SESSION['LAST_ACTIVITY'] = time();
  39. // API
  40. if (!empty($_SERVER['HTTP_X_API_KEY'])) {
  41. $stmt = $pdo->prepare("SELECT `allow_from` FROM `api` WHERE `api_key` = :api_key AND `active` = '1';");
  42. $stmt->execute(array(
  43. ':api_key' => preg_replace('/[^a-zA-Z0-9-]/', '', $_SERVER['HTTP_X_API_KEY'])
  44. ));
  45. $api_return = $stmt->fetch(PDO::FETCH_ASSOC);
  46. if (!empty($api_return['allow_from'])) {
  47. $remote = get_remote_ip(false);
  48. $allow_from = array_map('trim', preg_split( "/( |,|;|\n)/", $api_return['allow_from']));
  49. if (in_array($remote, $allow_from)) {
  50. $_SESSION['mailcow_cc_username'] = 'API';
  51. $_SESSION['mailcow_cc_role'] = 'admin';
  52. $_SESSION['mailcow_cc_api'] = true;
  53. }
  54. else {
  55. $redis->publish("F2B_CHANNEL", "mailcow UI: Invalid password for API_USER by " . $_SERVER['REMOTE_ADDR']);
  56. error_log("mailcow UI: Invalid password for " . $user . " by " . $_SERVER['REMOTE_ADDR']);
  57. echo json_encode(array(
  58. 'type' => 'error',
  59. 'msg' => 'api access denied for ip ' . $_SERVER['REMOTE_ADDR']
  60. ));
  61. unset($_POST);
  62. die();
  63. }
  64. }
  65. else {
  66. $redis->publish("F2B_CHANNEL", "mailcow UI: Invalid password for API_USER by " . $_SERVER['REMOTE_ADDR']);
  67. error_log("mailcow UI: Invalid password for " . $user . " by " . $_SERVER['REMOTE_ADDR']);
  68. echo json_encode(array(
  69. 'type' => 'error',
  70. 'msg' => 'authentication failed'
  71. ));
  72. unset($_POST);
  73. die();
  74. }
  75. }
  76. // Handle logouts
  77. if (isset($_POST["logout"])) {
  78. if (isset($_SESSION["dual-login"])) {
  79. $_SESSION["mailcow_cc_username"] = $_SESSION["dual-login"]["username"];
  80. $_SESSION["mailcow_cc_role"] = $_SESSION["dual-login"]["role"];
  81. unset($_SESSION["dual-login"]);
  82. header("Location: /mailbox");
  83. exit();
  84. }
  85. else {
  86. session_regenerate_id(true);
  87. session_unset();
  88. session_destroy();
  89. session_write_close();
  90. header("Location: /");
  91. }
  92. }
  93. // Check session
  94. function session_check() {
  95. if (isset($_SESSION['mailcow_cc_api']) && $_SESSION['mailcow_cc_api'] === true) {
  96. return true;
  97. }
  98. if (!isset($_SESSION['SESS_REMOTE_UA']) || ($_SESSION['SESS_REMOTE_UA'] != $_SERVER['HTTP_USER_AGENT'])) {
  99. $_SESSION['return'][] = array(
  100. 'type' => 'warning',
  101. 'msg' => 'session_ua'
  102. );
  103. return false;
  104. }
  105. if (!empty($_POST)) {
  106. if ($_SESSION['CSRF']['TOKEN'] != $_POST['csrf_token']) {
  107. $_SESSION['return'][] = array(
  108. 'type' => 'warning',
  109. 'msg' => 'session_token'
  110. );
  111. return false;
  112. }
  113. unset($_POST['csrf_token']);
  114. $_SESSION['CSRF']['TOKEN'] = bin2hex(random_bytes(32));
  115. $_SESSION['CSRF']['TIME'] = time();
  116. }
  117. return true;
  118. }
  119. if (isset($_SESSION['mailcow_cc_role']) && session_check() === false) {
  120. $_POST = array();
  121. $_FILES = array();
  122. }