EGroupware /
egroupware
| 1 | <?php |
||
| 2 | /** |
||
| 3 | * EGroupware API: CSRF (Cross Site Request Forgery) protection |
||
| 4 | * |
||
| 5 | * @link http://www.egroupware.org |
||
| 6 | * @license http://opensource.org/licenses/gpl-license.php GPL - GNU General Public License |
||
| 7 | * @package api |
||
| 8 | * @author Ralf Becker <[email protected]> |
||
| 9 | * @copyright (c) 2014-16 by Ralf Becker <[email protected]> |
||
| 10 | * @version $Id$ |
||
| 11 | */ |
||
| 12 | |||
| 13 | namespace EGroupware\Api; |
||
| 14 | |||
| 15 | /** |
||
| 16 | * Class supplying methods to prevent successful CSRF by requesting a random token, |
||
| 17 | * stored on server and validated when request get posted. |
||
| 18 | * |
||
| 19 | * CSRF token generation used openssl_random_pseudo_bytes, if available, otherwise |
||
| 20 | * mt_rand based Auth::randomstring is used. |
||
| 21 | * |
||
| 22 | * CSRF tokens are stored (incl. optional purpose) in user session. |
||
| 23 | * |
||
| 24 | * If a token does not validate (incl. purpose, if specified in generation) |
||
| 25 | * the request will be imediatly terminated. |
||
| 26 | */ |
||
| 27 | class Csrf |
||
| 28 | { |
||
| 29 | /** |
||
| 30 | * Get a CSRF token for an optional $purpose, which can be validated |
||
| 31 | * |
||
| 32 | * @param mixed $_purpose =true if given it need to be used in validate too! (It must NOT be NULL) |
||
| 33 | * @return string CSRF token |
||
| 34 | * @throws Exception\WrongParameter |
||
| 35 | * @throws \Exception if it was not possible to gather sufficient entropy. |
||
| 36 | */ |
||
| 37 | public static function token($_purpose=true) |
||
| 38 | { |
||
| 39 | if (is_null($_purpose)) |
||
| 40 | { |
||
| 41 | throw new Exception\WrongParameter(__METHOD__.'(NULL) $_purspose must NOT be NULL!'); |
||
| 42 | } |
||
| 43 | // generate random token (using oppenssl if available otherwise mt_rand based Auth::randomstring) |
||
| 44 | $token = base64_encode(random_bytes(32)); |
||
| 45 | |||
| 46 | // store it in session for later validation |
||
| 47 | Cache::setSession(__CLASS__, $token, $_purpose); |
||
| 48 | |||
| 49 | return $token; |
||
| 50 | } |
||
| 51 | |||
| 52 | /** |
||
| 53 | * Validate a CSRF token or teminate the request |
||
| 54 | * |
||
| 55 | * @param string $_token CSRF token generated with egw_csrf::token() |
||
| 56 | * @param string $_purpose =true optional purpose string passed to token method |
||
| 57 | * @param boolean $_delete_token =true true if token should be deleted after validation, it will validate no second time |
||
| 58 | */ |
||
| 59 | public static function validate($_token, $_purpose=true, $_delete_token=true) |
||
| 60 | { |
||
| 61 | $stored_purpose = Cache::getSession(__CLASS__, $_token); |
||
| 62 | |||
| 63 | // if token and purpose dont validate, log and terminate request |
||
| 64 | if (!isset($stored_purpose) || $stored_purpose !== $_purpose) |
||
| 65 | { |
||
| 66 | error_log('CSRF detected from IP '.$_SERVER['REMOTE_ADDR'].' to '.$_SERVER['REQUEST_METHOD'].' '.$_SERVER['REQUEST_URI']); |
||
| 67 | if ($_POST) error_log(array2string($_POST)); |
||
| 68 | // we are not throwing an exception here, but die, to not allow catching it! |
||
| 69 | die("CSRF detected, request terminated!"); |
||
|
0 ignored issues
–
show
|
|||
| 70 | } |
||
| 71 | if ($_delete_token) Cache::unsetSession(__CLASS__, $_token); |
||
| 72 | } |
||
| 73 | } |
In general, usage of exit should be done with care and only when running in a scripting context like a CLI script.