sessions.inc.php 3.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133
  1. <?php
  2. // Start session
  3. if (session_status() !== PHP_SESSION_ACTIVE) {
  4. ini_set("session.cookie_httponly", 1);
  5. ini_set('session.gc_maxlifetime', $SESSION_LIFETIME);
  6. }
  7. if (isset($_SERVER['HTTP_X_FORWARDED_PROTO']) &&
  8. strtolower($_SERVER['HTTP_X_FORWARDED_PROTO']) == "https") {
  9. if (session_status() !== PHP_SESSION_ACTIVE) {
  10. ini_set("session.cookie_secure", 1);
  11. }
  12. $IS_HTTPS = true;
  13. }
  14. elseif (isset($_SERVER['HTTPS'])) {
  15. if (session_status() !== PHP_SESSION_ACTIVE) {
  16. ini_set("session.cookie_secure", 1);
  17. }
  18. $IS_HTTPS = true;
  19. }
  20. else {
  21. $IS_HTTPS = false;
  22. }
  23. if (session_status() !== PHP_SESSION_ACTIVE) {
  24. session_start();
  25. }
  26. if (!isset($_SESSION['CSRF']['TOKEN'])) {
  27. $_SESSION['CSRF']['TOKEN'] = bin2hex(random_bytes(32));
  28. }
  29. // Set session UA
  30. if (!isset($_SESSION['SESS_REMOTE_UA'])) {
  31. $_SESSION['SESS_REMOTE_UA'] = $_SERVER['HTTP_USER_AGENT'];
  32. }
  33. // Keep session active
  34. if (isset($_SESSION['LAST_ACTIVITY']) && (time() - $_SESSION['LAST_ACTIVITY'] > $SESSION_LIFETIME)) {
  35. session_unset();
  36. session_destroy();
  37. }
  38. $_SESSION['LAST_ACTIVITY'] = time();
  39. // API
  40. if (!empty($_SERVER['HTTP_X_API_KEY'])) {
  41. $stmt = $pdo->prepare("SELECT `allow_from` FROM `api` WHERE `api_key` = :api_key AND `active` = '1';");
  42. $stmt->execute(array(
  43. ':api_key' => preg_replace('/[^a-zA-Z0-9-]/', '', $_SERVER['HTTP_X_API_KEY'])
  44. ));
  45. $api_return = $stmt->fetch(PDO::FETCH_ASSOC);
  46. if (!empty($api_return['allow_from'])) {
  47. $remote = get_remote_ip(false);
  48. $allow_from = array_map('trim', preg_split( "/( |,|;|\n)/", $api_return['allow_from']));
  49. if (in_array($remote, $allow_from)) {
  50. $_SESSION['mailcow_cc_username'] = 'API';
  51. $_SESSION['mailcow_cc_role'] = 'admin';
  52. $_SESSION['mailcow_cc_api'] = true;
  53. }
  54. else {
  55. $redis->publish("F2B_CHANNEL", "mailcow UI: Invalid password for API_USER by " . $_SERVER['REMOTE_ADDR']);
  56. error_log("mailcow UI: Invalid password for " . $user . " by " . $_SERVER['REMOTE_ADDR']);
  57. http_response_code(401);
  58. echo json_encode(array(
  59. 'type' => 'error',
  60. 'msg' => 'api access denied for ip ' . $_SERVER['REMOTE_ADDR']
  61. ));
  62. unset($_POST);
  63. exit();
  64. }
  65. }
  66. else {
  67. $redis->publish("F2B_CHANNEL", "mailcow UI: Invalid password for API_USER by " . $_SERVER['REMOTE_ADDR']);
  68. error_log("mailcow UI: Invalid password for " . $user . " by " . $_SERVER['REMOTE_ADDR']);
  69. http_response_code(401);
  70. echo json_encode(array(
  71. 'type' => 'error',
  72. 'msg' => 'authentication failed'
  73. ));
  74. unset($_POST);
  75. exit();
  76. }
  77. }
  78. // Handle logouts
  79. if (isset($_POST["logout"])) {
  80. if (isset($_SESSION["dual-login"])) {
  81. $_SESSION["mailcow_cc_username"] = $_SESSION["dual-login"]["username"];
  82. $_SESSION["mailcow_cc_role"] = $_SESSION["dual-login"]["role"];
  83. unset($_SESSION["dual-login"]);
  84. header("Location: /mailbox");
  85. exit();
  86. }
  87. else {
  88. session_regenerate_id(true);
  89. session_unset();
  90. session_destroy();
  91. session_write_close();
  92. header("Location: /");
  93. }
  94. }
  95. // Check session
  96. function session_check() {
  97. if (isset($_SESSION['mailcow_cc_api']) && $_SESSION['mailcow_cc_api'] === true) {
  98. return true;
  99. }
  100. if (!isset($_SESSION['SESS_REMOTE_UA']) || ($_SESSION['SESS_REMOTE_UA'] != $_SERVER['HTTP_USER_AGENT'])) {
  101. $_SESSION['return'][] = array(
  102. 'type' => 'warning',
  103. 'msg' => 'session_ua'
  104. );
  105. return false;
  106. }
  107. if (!empty($_POST)) {
  108. if ($_SESSION['CSRF']['TOKEN'] != $_POST['csrf_token']) {
  109. $_SESSION['return'][] = array(
  110. 'type' => 'warning',
  111. 'msg' => 'session_token'
  112. );
  113. return false;
  114. }
  115. unset($_POST['csrf_token']);
  116. $_SESSION['CSRF']['TOKEN'] = bin2hex(random_bytes(32));
  117. $_SESSION['CSRF']['TIME'] = time();
  118. }
  119. return true;
  120. }
  121. if (isset($_SESSION['mailcow_cc_role']) && session_check() === false) {
  122. $_POST = array();
  123. $_FILES = array();
  124. }