0
|
1 <?php
|
|
2 /*
|
|
3 +-------------------------------------------------------------------------+
|
|
4 | Roundcube Webmail IMAP Client |
|
|
5 | Version 1.1.5 |
|
|
6 | |
|
|
7 | Copyright (C) 2005-2015, The Roundcube Dev Team |
|
|
8 | |
|
|
9 | This program is free software: you can redistribute it and/or modify |
|
|
10 | it under the terms of the GNU General Public License (with exceptions |
|
|
11 | for skins & plugins) as published by the Free Software Foundation, |
|
|
12 | either version 3 of the License, or (at your option) any later version. |
|
|
13 | |
|
|
14 | This file forms part of the Roundcube Webmail Software for which the |
|
|
15 | following exception is added: Plugins and Skins which merely make |
|
|
16 | function calls to the Roundcube Webmail Software, and for that purpose |
|
|
17 | include it by reference shall not be considered modifications of |
|
|
18 | the software. |
|
|
19 | |
|
|
20 | If you wish to use this file in another project or create a modified |
|
|
21 | version that will not be part of the Roundcube Webmail Software, you |
|
|
22 | may remove the exception above and use this source code under the |
|
|
23 | original version of the license. |
|
|
24 | |
|
|
25 | This program is distributed in the hope that it will be useful, |
|
|
26 | but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
|
27 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
|
28 | GNU General Public License for more details. |
|
|
29 | |
|
|
30 | You should have received a copy of the GNU General Public License |
|
|
31 | along with this program. If not, see http://www.gnu.org/licenses/. |
|
|
32 | |
|
|
33 +-------------------------------------------------------------------------+
|
|
34 | Author: Thomas Bruederli <roundcube@gmail.com> |
|
|
35 | Author: Aleksander Machniak <alec@alec.pl> |
|
|
36 +-------------------------------------------------------------------------+
|
|
37 */
|
|
38
|
|
39 // include environment
|
|
40 require_once 'program/include/iniset.php';
|
|
41
|
|
42 // init application, start session, init output class, etc.
|
|
43 $RCMAIL = rcmail::get_instance($GLOBALS['env']);
|
|
44
|
|
45 // Make the whole PHP output non-cacheable (#1487797)
|
|
46 $RCMAIL->output->nocacheing_headers();
|
|
47 $RCMAIL->output->common_headers();
|
|
48
|
|
49 // turn on output buffering
|
|
50 ob_start();
|
|
51
|
|
52 // check if config files had errors
|
|
53 if ($err_str = $RCMAIL->config->get_error()) {
|
|
54 rcmail::raise_error(array(
|
|
55 'code' => 601,
|
|
56 'type' => 'php',
|
|
57 'message' => $err_str), false, true);
|
|
58 }
|
|
59
|
|
60 // check DB connections and exit on failure
|
|
61 if ($err_str = $RCMAIL->db->is_error()) {
|
|
62 rcmail::raise_error(array(
|
|
63 'code' => 603,
|
|
64 'type' => 'db',
|
|
65 'message' => $err_str), FALSE, TRUE);
|
|
66 }
|
|
67
|
|
68 // error steps
|
|
69 if ($RCMAIL->action == 'error' && !empty($_GET['_code'])) {
|
|
70 rcmail::raise_error(array('code' => hexdec($_GET['_code'])), FALSE, TRUE);
|
|
71 }
|
|
72
|
|
73 // check if https is required (for login) and redirect if necessary
|
|
74 if (empty($_SESSION['user_id']) && ($force_https = $RCMAIL->config->get('force_https', false))) {
|
|
75 $https_port = is_bool($force_https) ? 443 : $force_https;
|
|
76
|
|
77 if (!rcube_utils::https_check($https_port)) {
|
|
78 $host = preg_replace('/:[0-9]+$/', '', $_SERVER['HTTP_HOST']);
|
|
79 $host .= ($https_port != 443 ? ':' . $https_port : '');
|
|
80
|
|
81 header('Location: https://' . $host . $_SERVER['REQUEST_URI']);
|
|
82 exit;
|
|
83 }
|
|
84 }
|
|
85
|
|
86 // trigger startup plugin hook
|
|
87 $startup = $RCMAIL->plugins->exec_hook('startup', array('task' => $RCMAIL->task, 'action' => $RCMAIL->action));
|
|
88 $RCMAIL->set_task($startup['task']);
|
|
89 $RCMAIL->action = $startup['action'];
|
|
90
|
|
91 // try to log in
|
|
92 if ($RCMAIL->task == 'login' && $RCMAIL->action == 'login') {
|
|
93 $request_valid = $_SESSION['temp'] && $RCMAIL->check_request();
|
|
94
|
|
95 // purge the session in case of new login when a session already exists
|
|
96 $RCMAIL->kill_session();
|
|
97
|
|
98 $auth = $RCMAIL->plugins->exec_hook('authenticate', array(
|
|
99 'host' => $RCMAIL->autoselect_host(),
|
|
100 'user' => trim(rcube_utils::get_input_value('_user', rcube_utils::INPUT_POST)),
|
|
101 'pass' => rcube_utils::get_input_value('_pass', rcube_utils::INPUT_POST, true,
|
|
102 $RCMAIL->config->get('password_charset', 'ISO-8859-1')),
|
|
103 'cookiecheck' => true,
|
|
104 'valid' => $request_valid,
|
|
105 ));
|
|
106
|
|
107 // Login
|
|
108 if ($auth['valid'] && !$auth['abort']
|
|
109 && $RCMAIL->login($auth['user'], $auth['pass'], $auth['host'], $auth['cookiecheck'])
|
|
110 ) {
|
|
111 // create new session ID, don't destroy the current session
|
|
112 // it was destroyed already by $RCMAIL->kill_session() above
|
|
113 $RCMAIL->session->remove('temp');
|
|
114 $RCMAIL->session->regenerate_id(false);
|
|
115
|
|
116 // send auth cookie if necessary
|
|
117 $RCMAIL->session->set_auth_cookie();
|
|
118
|
|
119 // log successful login
|
|
120 $RCMAIL->log_login();
|
|
121
|
|
122 // restore original request parameters
|
|
123 $query = array();
|
|
124 if ($url = rcube_utils::get_input_value('_url', rcube_utils::INPUT_POST)) {
|
|
125 parse_str($url, $query);
|
|
126
|
|
127 // prevent endless looping on login page
|
|
128 if ($query['_task'] == 'login') {
|
|
129 unset($query['_task']);
|
|
130 }
|
|
131
|
|
132 // prevent redirect to compose with specified ID (#1488226)
|
|
133 if ($query['_action'] == 'compose' && !empty($query['_id'])) {
|
|
134 $query = array('_action' => 'compose');
|
|
135 }
|
|
136 }
|
|
137
|
|
138 // allow plugins to control the redirect url after login success
|
|
139 $redir = $RCMAIL->plugins->exec_hook('login_after', $query + array('_task' => 'mail'));
|
|
140 unset($redir['abort'], $redir['_err']);
|
|
141
|
|
142 // send redirect
|
|
143 $OUTPUT->redirect($redir, 0, true);
|
|
144 }
|
|
145 else {
|
|
146 if (!$auth['valid']) {
|
|
147 $error_code = RCMAIL::ERROR_INVALID_REQUEST;
|
|
148 }
|
|
149 else {
|
|
150 $error_code = is_numeric($auth['error']) ? $auth['error'] : $RCMAIL->login_error();
|
|
151 }
|
|
152
|
|
153 $error_labels = array(
|
|
154 RCMAIL::ERROR_STORAGE => 'storageerror',
|
|
155 RCMAIL::ERROR_COOKIES_DISABLED => 'cookiesdisabled',
|
|
156 RCMAIL::ERROR_INVALID_REQUEST => 'invalidrequest',
|
|
157 RCMAIL::ERROR_INVALID_HOST => 'invalidhost',
|
|
158 );
|
|
159
|
|
160 $error_message = !empty($auth['error']) && !is_numeric($auth['error']) ? $auth['error'] : ($error_labels[$error_code] ?: 'loginfailed');
|
|
161
|
|
162 $OUTPUT->show_message($error_message, 'warning');
|
|
163
|
|
164 // log failed login
|
|
165 $RCMAIL->log_login($auth['user'], true, $error_code);
|
|
166
|
|
167 $RCMAIL->plugins->exec_hook('login_failed', array(
|
|
168 'code' => $error_code, 'host' => $auth['host'], 'user' => $auth['user']));
|
|
169
|
|
170 $RCMAIL->kill_session();
|
|
171 }
|
|
172 }
|
|
173
|
|
174 // end session
|
|
175 else if ($RCMAIL->task == 'logout' && isset($_SESSION['user_id'])) {
|
|
176 $RCMAIL->request_security_check($mode = rcube_utils::INPUT_GET);
|
|
177
|
|
178 $userdata = array(
|
|
179 'user' => $_SESSION['username'],
|
|
180 'host' => $_SESSION['storage_host'],
|
|
181 'lang' => $RCMAIL->user->language,
|
|
182 );
|
|
183
|
|
184 $OUTPUT->show_message('loggedout');
|
|
185
|
|
186 $RCMAIL->logout_actions();
|
|
187 $RCMAIL->kill_session();
|
|
188 $RCMAIL->plugins->exec_hook('logout_after', $userdata);
|
|
189 }
|
|
190
|
|
191 // check session and auth cookie
|
|
192 else if ($RCMAIL->task != 'login' && $_SESSION['user_id']) {
|
|
193 if (!$RCMAIL->session->check_auth()) {
|
|
194 $RCMAIL->kill_session();
|
|
195 $session_error = true;
|
|
196 }
|
|
197 }
|
|
198
|
|
199 // not logged in -> show login page
|
|
200 if (empty($RCMAIL->user->ID)) {
|
|
201 // log session failures
|
|
202 $task = rcube_utils::get_input_value('_task', rcube_utils::INPUT_GPC);
|
|
203
|
|
204 if ($task && !in_array($task, array('login','logout'))
|
|
205 && !$session_error && ($sess_id = $_COOKIE[ini_get('session.name')])
|
|
206 ) {
|
|
207 $RCMAIL->session->log("Aborted session $sess_id; no valid session data found");
|
|
208 $session_error = true;
|
|
209 }
|
|
210
|
|
211 if ($session_error || $_REQUEST['_err'] == 'session') {
|
|
212 $OUTPUT->show_message('sessionerror', 'error', null, true, -1);
|
|
213 }
|
|
214
|
|
215 if ($OUTPUT->ajax_call || $OUTPUT->get_env('framed')) {
|
|
216 $OUTPUT->command('session_error', $RCMAIL->url(array('_err' => 'session')));
|
|
217 $OUTPUT->send('iframe');
|
|
218 }
|
|
219
|
|
220 // check if installer is still active
|
|
221 if ($RCMAIL->config->get('enable_installer') && is_readable('./installer/index.php')) {
|
|
222 $OUTPUT->add_footer(html::div(array('style' => "background:#ef9398; border:2px solid #dc5757; padding:0.5em; margin:2em auto; width:50em"),
|
|
223 html::tag('h2', array('style' => "margin-top:0.2em"), "Installer script is still accessible") .
|
|
224 html::p(null, "The install script of your Roundcube installation is still stored in its default location!") .
|
|
225 html::p(null, "Please <b>remove</b> the whole <tt>installer</tt> folder from the Roundcube directory because .
|
|
226 these files may expose sensitive configuration data like server passwords and encryption keys
|
|
227 to the public. Make sure you cannot access the <a href=\"./installer/\">installer script</a> from your browser.")
|
|
228 ));
|
|
229 }
|
|
230
|
|
231 $plugin = $RCMAIL->plugins->exec_hook('unauthenticated', array('task' => 'login', 'error' => $session_error));
|
|
232
|
|
233 $RCMAIL->set_task($plugin['task']);
|
|
234
|
|
235 $OUTPUT->send($plugin['task']);
|
|
236 }
|
|
237 else {
|
|
238 // CSRF prevention
|
|
239 $RCMAIL->request_security_check();
|
|
240
|
|
241 // check access to disabled actions
|
|
242 $disabled_actions = (array) $RCMAIL->config->get('disabled_actions');
|
|
243 if (in_array($RCMAIL->task . '.' . ($RCMAIL->action ?: 'index'), $disabled_actions)) {
|
|
244 rcube::raise_error(array(
|
|
245 'code' => 403, 'type' => 'php',
|
|
246 'message' => "Action disabled"), true, true);
|
|
247 }
|
|
248 }
|
|
249
|
|
250 // we're ready, user is authenticated and the request is safe
|
|
251 $plugin = $RCMAIL->plugins->exec_hook('ready', array('task' => $RCMAIL->task, 'action' => $RCMAIL->action));
|
|
252 $RCMAIL->set_task($plugin['task']);
|
|
253 $RCMAIL->action = $plugin['action'];
|
|
254
|
|
255 // handle special actions
|
|
256 if ($RCMAIL->action == 'keep-alive') {
|
|
257 $OUTPUT->reset();
|
|
258 $RCMAIL->plugins->exec_hook('keep_alive', array());
|
|
259 $OUTPUT->send();
|
|
260 }
|
|
261 else if ($RCMAIL->action == 'save-pref') {
|
|
262 include INSTALL_PATH . 'program/steps/utils/save_pref.inc';
|
|
263 }
|
|
264
|
|
265
|
|
266 // include task specific functions
|
|
267 if (is_file($incfile = INSTALL_PATH . 'program/steps/'.$RCMAIL->task.'/func.inc')) {
|
|
268 include_once $incfile;
|
|
269 }
|
|
270
|
|
271 // allow 5 "redirects" to another action
|
|
272 $redirects = 0; $incstep = null;
|
|
273 while ($redirects < 5) {
|
|
274 // execute a plugin action
|
|
275 if (preg_match('/^plugin\./', $RCMAIL->action)) {
|
|
276 $RCMAIL->plugins->exec_action($RCMAIL->action);
|
|
277 break;
|
|
278 }
|
|
279 // execute action registered to a plugin task
|
|
280 else if ($RCMAIL->plugins->is_plugin_task($RCMAIL->task)) {
|
|
281 if (!$RCMAIL->action) $RCMAIL->action = 'index';
|
|
282 $RCMAIL->plugins->exec_action($RCMAIL->task.'.'.$RCMAIL->action);
|
|
283 break;
|
|
284 }
|
|
285 // try to include the step file
|
|
286 else if (($stepfile = $RCMAIL->get_action_file())
|
|
287 && is_file($incfile = INSTALL_PATH . 'program/steps/'.$RCMAIL->task.'/'.$stepfile)
|
|
288 ) {
|
|
289 // include action file only once (in case it don't exit)
|
|
290 include_once $incfile;
|
|
291 $redirects++;
|
|
292 }
|
|
293 else {
|
|
294 break;
|
|
295 }
|
|
296 }
|
|
297
|
|
298 if ($RCMAIL->action == 'refresh') {
|
|
299 $RCMAIL->plugins->exec_hook('refresh', array('last' => intval(rcube_utils::get_input_value('_last', rcube_utils::INPUT_GPC))));
|
|
300 }
|
|
301
|
|
302 // parse main template (default)
|
|
303 $OUTPUT->send($RCMAIL->task);
|
|
304
|
|
305 // if we arrive here, something went wrong
|
|
306 rcmail::raise_error(array(
|
|
307 'code' => 404,
|
|
308 'type' => 'php',
|
|
309 'line' => __LINE__,
|
|
310 'file' => __FILE__,
|
|
311 'message' => "Invalid request"), true, true);
|