sessions.inc.php 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160
  1. <?php
  2. // Start session
  3. if (session_status() !== PHP_SESSION_ACTIVE) {
  4. ini_set("session.cookie_httponly", 1);
  5. ini_set("session.cookie_samesite", "Lax");
  6. ini_set('session.gc_maxlifetime', $SESSION_LIFETIME);
  7. }
  8. $_SESSION['access_all_exception'] = '0';
  9. if (isset($_SERVER['HTTP_X_FORWARDED_PROTO']) &&
  10. strtolower($_SERVER['HTTP_X_FORWARDED_PROTO']) == "https") {
  11. if (session_status() !== PHP_SESSION_ACTIVE) {
  12. ini_set("session.cookie_secure", 1);
  13. }
  14. $IS_HTTPS = true;
  15. }
  16. elseif (isset($_SERVER['HTTPS'])) {
  17. if (session_status() !== PHP_SESSION_ACTIVE) {
  18. ini_set("session.cookie_secure", 1);
  19. }
  20. $IS_HTTPS = true;
  21. }
  22. else {
  23. $IS_HTTPS = false;
  24. }
  25. if (session_status() !== PHP_SESSION_ACTIVE) {
  26. session_start();
  27. }
  28. if (!isset($_SESSION['CSRF']['TOKEN'])) {
  29. $_SESSION['CSRF']['TOKEN'] = bin2hex(random_bytes(32));
  30. }
  31. // Set session UA
  32. if (!isset($_SESSION['SESS_REMOTE_UA'])) {
  33. $_SESSION['SESS_REMOTE_UA'] = $_SERVER['HTTP_USER_AGENT'];
  34. }
  35. // Keep session active
  36. if (isset($_SESSION['LAST_ACTIVITY']) && (time() - $_SESSION['LAST_ACTIVITY'] > $SESSION_LIFETIME)) {
  37. session_unset();
  38. session_destroy();
  39. }
  40. $_SESSION['LAST_ACTIVITY'] = time();
  41. // API
  42. if (!empty($_SERVER['HTTP_X_API_KEY'])) {
  43. $stmt = $pdo->prepare("SELECT * FROM `api` WHERE `api_key` = :api_key AND `active` = '1';");
  44. $stmt->execute(array(
  45. ':api_key' => preg_replace('/[^a-zA-Z0-9-]/', '', $_SERVER['HTTP_X_API_KEY'])
  46. ));
  47. $api_return = $stmt->fetch(PDO::FETCH_ASSOC);
  48. if (!empty($api_return['api_key'])) {
  49. $skip_ip_check = ($api_return['skip_ip_check'] == 1);
  50. $remote = get_remote_ip(false);
  51. $allow_from = array_map('trim', preg_split( "/( |,|;|\n)/", $api_return['allow_from']));
  52. if ($skip_ip_check === true || ip_acl($remote, $allow_from)) {
  53. $_SESSION['mailcow_cc_username'] = 'API';
  54. $_SESSION['mailcow_cc_role'] = 'admin';
  55. $_SESSION['mailcow_cc_api'] = true;
  56. if ($api_return['access'] == 'rw') {
  57. $_SESSION['mailcow_cc_api_access'] = 'rw';
  58. }
  59. else {
  60. $_SESSION['mailcow_cc_api_access'] = 'ro';
  61. }
  62. }
  63. else {
  64. $redis->publish("F2B_CHANNEL", "mailcow UI: Invalid password for API_USER by " . $_SERVER['REMOTE_ADDR']);
  65. error_log("mailcow UI: Invalid password for " . $user . " by " . $_SERVER['REMOTE_ADDR']);
  66. http_response_code(401);
  67. echo json_encode(array(
  68. 'type' => 'error',
  69. 'msg' => 'api access denied for ip ' . $_SERVER['REMOTE_ADDR']
  70. ));
  71. unset($_POST);
  72. exit();
  73. }
  74. }
  75. else {
  76. $redis->publish("F2B_CHANNEL", "mailcow UI: Invalid password for API_USER by " . $_SERVER['REMOTE_ADDR']);
  77. error_log("mailcow UI: Invalid password for " . $user . " by " . $_SERVER['REMOTE_ADDR']);
  78. http_response_code(401);
  79. echo json_encode(array(
  80. 'type' => 'error',
  81. 'msg' => 'authentication failed'
  82. ));
  83. unset($_POST);
  84. exit();
  85. }
  86. }
  87. // Handle logouts
  88. if (isset($_POST["logout"])) {
  89. if (isset($_SESSION["dual-login"])) {
  90. $_SESSION["mailcow_cc_username"] = $_SESSION["dual-login"]["username"];
  91. $_SESSION["mailcow_cc_role"] = $_SESSION["dual-login"]["role"];
  92. unset($_SESSION['sogo-sso-user-allowed']);
  93. unset($_SESSION['sogo-sso-pass']);
  94. unset($_SESSION["dual-login"]);
  95. if ($_SESSION["mailcow_cc_role"] == "admin"){
  96. header("Location: /admin/mailbox");
  97. } elseif ($_SESSION["mailcow_cc_role"] == "domainadmin") {
  98. header("Location: /domainadmin/mailbox");
  99. } else {
  100. header("Location: /");
  101. }
  102. exit();
  103. }
  104. else {
  105. $role = $_SESSION["mailcow_cc_role"];
  106. session_regenerate_id(true);
  107. session_unset();
  108. session_destroy();
  109. session_write_close();
  110. if ($role == "admin") {
  111. header("Location: /admin");
  112. }
  113. elseif ($role == "domainadmin") {
  114. header("Location: /domainadmin");
  115. }
  116. else {
  117. header("Location: /");
  118. }
  119. }
  120. }
  121. // Check session
  122. function session_check() {
  123. if (isset($_SESSION['mailcow_cc_api']) && $_SESSION['mailcow_cc_api'] === true) {
  124. return true;
  125. }
  126. if (!isset($_SESSION['SESS_REMOTE_UA']) || ($_SESSION['SESS_REMOTE_UA'] != $_SERVER['HTTP_USER_AGENT'])) {
  127. $_SESSION['return'][] = array(
  128. 'type' => 'warning',
  129. 'msg' => 'session_ua'
  130. );
  131. return false;
  132. }
  133. if (!empty($_POST)) {
  134. if ($_SESSION['CSRF']['TOKEN'] != $_POST['csrf_token']) {
  135. $_SESSION['return'][] = array(
  136. 'type' => 'warning',
  137. 'msg' => 'session_token'
  138. );
  139. return false;
  140. }
  141. unset($_POST['csrf_token']);
  142. $_SESSION['CSRF']['TOKEN'] = bin2hex(random_bytes(32));
  143. $_SESSION['CSRF']['TIME'] = time();
  144. }
  145. return true;
  146. }
  147. if (isset($_SESSION['mailcow_cc_role']) && session_check() === false) {
  148. $_POST = array();
  149. $_FILES = array();
  150. }