comparison plugins/password/drivers/sql.php @ 0:1e000243b222

vanilla 1.3.3 distro, I hope
author Charlie Root
date Thu, 04 Jan 2018 15:50:29 -0500
parents
children
comparison
equal deleted inserted replaced
-1:000000000000 0:1e000243b222
1 <?php
2
3 /**
4 * SQL Password Driver
5 *
6 * Driver for passwords stored in SQL database
7 *
8 * @version 2.0
9 * @author Aleksander 'A.L.E.C' Machniak <alec@alec.pl>
10 *
11 * Copyright (C) 2005-2013, The Roundcube Dev Team
12 *
13 * This program is free software: you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License as published by
15 * the Free Software Foundation, either version 3 of the License, or
16 * (at your option) any later version.
17 *
18 * This program is distributed in the hope that it will be useful,
19 * but WITHOUT ANY WARRANTY; without even the implied warranty of
20 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 * GNU General Public License for more details.
22 *
23 * You should have received a copy of the GNU General Public License
24 * along with this program. If not, see http://www.gnu.org/licenses/.
25 */
26
27 class rcube_sql_password
28 {
29 function save($curpass, $passwd)
30 {
31 $rcmail = rcmail::get_instance();
32
33 if (!($sql = $rcmail->config->get('password_query'))) {
34 $sql = 'SELECT update_passwd(%c, %u)';
35 }
36
37 if ($dsn = $rcmail->config->get('password_db_dsn')) {
38 $db = rcube_db::factory($dsn, '', false);
39 $db->set_debug((bool)$rcmail->config->get('sql_debug'));
40 }
41 else {
42 $db = $rcmail->get_dbh();
43 }
44
45 if ($db->is_error()) {
46 return PASSWORD_ERROR;
47 }
48
49 // new password - default hash method
50 if (strpos($sql, '%P') !== false) {
51 $password = password::hash_password($passwd);
52
53 if ($password === false) {
54 return PASSWORD_CRYPT_ERROR;
55 }
56
57 $sql = str_replace('%P', $db->quote($password), $sql);
58 }
59
60 // old password - default hash method
61 if (strpos($sql, '%O') !== false) {
62 $password = password::hash_password($curpass);
63
64 if ($password === false) {
65 return PASSWORD_CRYPT_ERROR;
66 }
67
68 $sql = str_replace('%O', $db->quote($password), $sql);
69 }
70
71 // crypted password (deprecated, use %P)
72 if (strpos($sql, '%c') !== false) {
73 $password = password::hash_password($passwd, 'crypt', false);
74
75 if ($password === false) {
76 return PASSWORD_CRYPT_ERROR;
77 }
78
79 $sql = str_replace('%c', $db->quote($password), $sql);
80 }
81
82 // dovecotpw (deprecated, use %P)
83 if (strpos($sql, '%D') !== false) {
84 $password = password::hash_password($passwd, 'dovecot', false);
85
86 if ($password === false) {
87 return PASSWORD_CRYPT_ERROR;
88 }
89
90 $sql = str_replace('%D', $db->quote($password), $sql);
91 }
92
93 // hashed passwords (deprecated, use %P)
94 if (strpos($sql, '%n') !== false) {
95 $password = password::hash_password($passwd, 'hash', false);
96
97 if ($password === false) {
98 return PASSWORD_CRYPT_ERROR;
99 }
100
101 $sql = str_replace('%n', $db->quote($password, 'text'), $sql);
102 }
103
104 // hashed passwords (deprecated, use %P)
105 if (strpos($sql, '%q') !== false) {
106 $password = password::hash_password($curpass, 'hash', false);
107
108 if ($password === false) {
109 return PASSWORD_CRYPT_ERROR;
110 }
111
112 $sql = str_replace('%q', $db->quote($password, 'text'), $sql);
113 }
114
115 // Handle clear text passwords securely (#1487034)
116 $sql_vars = array();
117 if (preg_match_all('/%[p|o]/', $sql, $m)) {
118 foreach ($m[0] as $var) {
119 if ($var == '%p') {
120 $sql = preg_replace('/%p/', '?', $sql, 1);
121 $sql_vars[] = (string) $passwd;
122 }
123 else { // %o
124 $sql = preg_replace('/%o/', '?', $sql, 1);
125 $sql_vars[] = (string) $curpass;
126 }
127 }
128 }
129
130 $local_part = $rcmail->user->get_username('local');
131 $domain_part = $rcmail->user->get_username('domain');
132 $username = $_SESSION['username'];
133 $host = $_SESSION['imap_host'];
134
135 // convert domains to/from punnycode
136 if ($rcmail->config->get('password_idn_ascii')) {
137 $domain_part = rcube_utils::idn_to_ascii($domain_part);
138 $username = rcube_utils::idn_to_ascii($username);
139 $host = rcube_utils::idn_to_ascii($host);
140 }
141 else {
142 $domain_part = rcube_utils::idn_to_utf8($domain_part);
143 $username = rcube_utils::idn_to_utf8($username);
144 $host = rcube_utils::idn_to_utf8($host);
145 }
146
147 // at least we should always have the local part
148 $sql = str_replace('%l', $db->quote($local_part, 'text'), $sql);
149 $sql = str_replace('%d', $db->quote($domain_part, 'text'), $sql);
150 $sql = str_replace('%u', $db->quote($username, 'text'), $sql);
151 $sql = str_replace('%h', $db->quote($host, 'text'), $sql);
152
153 $res = $db->query($sql, $sql_vars);
154
155 if (!$db->is_error()) {
156 if (strtolower(substr(trim($sql),0,6)) == 'select') {
157 if ($db->fetch_array($res)) {
158 return PASSWORD_SUCCESS;
159 }
160 }
161 else {
162 // This is the good case: 1 row updated
163 if ($db->affected_rows($res) == 1)
164 return PASSWORD_SUCCESS;
165 // @TODO: Some queries don't affect any rows
166 // Should we assume a success if there was no error?
167 }
168 }
169
170 return PASSWORD_ERROR;
171 }
172 }