Pterodactyl /
Panel
This project does not seem to handle request data directly as such no vulnerable execution paths were found.
include, or for example
via PHP's auto-loading mechanism.
These results are based on our legacy PHP analysis, consider migrating to our new PHP analysis engine instead. Learn more
| 1 | <?php |
||
| 2 | /** |
||
| 3 | * Pterodactyl - Panel |
||
| 4 | * Copyright (c) 2015 - 2017 Dane Everitt <[email protected]>. |
||
| 5 | * |
||
| 6 | * Permission is hereby granted, free of charge, to any person obtaining a copy |
||
| 7 | * of this software and associated documentation files (the "Software"), to deal |
||
| 8 | * in the Software without restriction, including without limitation the rights |
||
| 9 | * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell |
||
| 10 | * copies of the Software, and to permit persons to whom the Software is |
||
| 11 | * furnished to do so, subject to the following conditions: |
||
| 12 | * |
||
| 13 | * The above copyright notice and this permission notice shall be included in all |
||
| 14 | * copies or substantial portions of the Software. |
||
| 15 | * |
||
| 16 | * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR |
||
| 17 | * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, |
||
| 18 | * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE |
||
| 19 | * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER |
||
| 20 | * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, |
||
| 21 | * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE |
||
| 22 | * SOFTWARE. |
||
| 23 | */ |
||
| 24 | |||
| 25 | namespace Pterodactyl\Models; |
||
| 26 | |||
| 27 | use Hash; |
||
| 28 | use Google2FA; |
||
| 29 | use Illuminate\Auth\Authenticatable; |
||
| 30 | use Illuminate\Database\Eloquent\Model; |
||
| 31 | use Illuminate\Notifications\Notifiable; |
||
| 32 | use Pterodactyl\Exceptions\DisplayException; |
||
| 33 | use Nicolaslopezj\Searchable\SearchableTrait; |
||
| 34 | use Illuminate\Auth\Passwords\CanResetPassword; |
||
| 35 | use Illuminate\Foundation\Auth\Access\Authorizable; |
||
| 36 | use Illuminate\Contracts\Auth\Authenticatable as AuthenticatableContract; |
||
| 37 | use Illuminate\Contracts\Auth\Access\Authorizable as AuthorizableContract; |
||
| 38 | use Illuminate\Contracts\Auth\CanResetPassword as CanResetPasswordContract; |
||
| 39 | use Pterodactyl\Notifications\SendPasswordReset as ResetPasswordNotification; |
||
| 40 | |||
| 41 | class User extends Model implements AuthenticatableContract, AuthorizableContract, CanResetPasswordContract |
||
| 42 | { |
||
| 43 | use Authenticatable, Authorizable, CanResetPassword, Notifiable, SearchableTrait; |
||
| 44 | |||
| 45 | /** |
||
| 46 | * The rules for user passwords. |
||
| 47 | * |
||
| 48 | * @var string |
||
| 49 | */ |
||
| 50 | const PASSWORD_RULES = 'regex:((?=.*\d)(?=.*[a-z])(?=.*[A-Z]).{8,})'; |
||
| 51 | |||
| 52 | /** |
||
| 53 | * The regex rules for usernames. |
||
| 54 | * |
||
| 55 | * @var string |
||
| 56 | */ |
||
| 57 | const USERNAME_RULES = 'regex:/^([\w\d\.\-]{1,255})$/'; |
||
| 58 | |||
| 59 | /** |
||
| 60 | * Level of servers to display when using access() on a user. |
||
| 61 | * |
||
| 62 | * @var string |
||
| 63 | */ |
||
| 64 | protected $accessLevel = 'all'; |
||
| 65 | |||
| 66 | /** |
||
| 67 | * The table associated with the model. |
||
| 68 | * |
||
| 69 | * @var string |
||
| 70 | */ |
||
| 71 | protected $table = 'users'; |
||
| 72 | |||
| 73 | /** |
||
| 74 | * A list of mass-assignable variables. |
||
| 75 | * |
||
| 76 | * @var array |
||
| 77 | */ |
||
| 78 | protected $fillable = ['username', 'email', 'name_first', 'name_last', 'password', 'language', 'use_totp', 'totp_secret', 'gravatar', 'root_admin']; |
||
| 79 | |||
| 80 | /** |
||
| 81 | * Cast values to correct type. |
||
| 82 | * |
||
| 83 | * @var array |
||
| 84 | */ |
||
| 85 | protected $casts = [ |
||
| 86 | 'root_admin' => 'integer', |
||
| 87 | 'use_totp' => 'integer', |
||
| 88 | 'gravatar' => 'integer', |
||
| 89 | ]; |
||
| 90 | |||
| 91 | /** |
||
| 92 | * The attributes excluded from the model's JSON form. |
||
| 93 | * |
||
| 94 | * @var array |
||
| 95 | */ |
||
| 96 | protected $hidden = ['password', 'remember_token', 'totp_secret']; |
||
| 97 | |||
| 98 | /** |
||
| 99 | * Parameters for search querying. |
||
| 100 | * |
||
| 101 | * @var array |
||
| 102 | */ |
||
| 103 | protected $searchable = [ |
||
| 104 | 'columns' => [ |
||
| 105 | 'email' => 10, |
||
| 106 | 'username' => 9, |
||
| 107 | 'name_first' => 6, |
||
| 108 | 'name_last' => 6, |
||
| 109 | 'uuid' => 1, |
||
| 110 | ], |
||
| 111 | ]; |
||
| 112 | |||
| 113 | protected $query; |
||
| 114 | |||
| 115 | /** |
||
| 116 | * Enables or disables TOTP on an account if the token is valid. |
||
| 117 | * |
||
| 118 | * @param int $token |
||
| 119 | * @return bool |
||
| 120 | */ |
||
| 121 | public function toggleTotp($token) |
||
| 122 | { |
||
| 123 | if (! Google2FA::verifyKey($this->totp_secret, $token, 1)) { |
||
| 124 | return false; |
||
| 125 | } |
||
| 126 | |||
| 127 | $this->use_totp = ! $this->use_totp; |
||
| 128 | |||
| 129 | return $this->save(); |
||
| 130 | } |
||
| 131 | |||
| 132 | /** |
||
| 133 | * Set a user password to a new value assuming it meets the following requirements: |
||
| 134 | * - 8 or more characters in length |
||
| 135 | * - at least one uppercase character |
||
| 136 | * - at least one lowercase character |
||
| 137 | * - at least one number. |
||
| 138 | * |
||
| 139 | * @param string $password |
||
| 140 | * @param string $regex |
||
| 141 | * @return void |
||
| 142 | */ |
||
| 143 | public function setPassword($password, $regex = '((?=.*\d)(?=.*[a-z])(?=.*[A-Z]).{8,})') |
||
| 144 | { |
||
| 145 | if (! preg_match($regex, $password)) { |
||
| 146 | throw new DisplayException('The password passed did not meet the minimum password requirements.'); |
||
| 147 | } |
||
| 148 | |||
| 149 | $this->password = Hash::make($password); |
||
| 150 | $this->save(); |
||
| 151 | } |
||
| 152 | |||
| 153 | /** |
||
| 154 | * Send the password reset notification. |
||
| 155 | * |
||
| 156 | * @param string $token |
||
| 157 | * @return void |
||
| 158 | */ |
||
| 159 | public function sendPasswordResetNotification($token) |
||
| 160 | { |
||
| 161 | $this->notify(new ResetPasswordNotification($token)); |
||
| 162 | } |
||
| 163 | |||
| 164 | /** |
||
| 165 | * Return true or false depending on wether the user is root admin or not. |
||
| 166 | * |
||
| 167 | * @return bool |
||
| 168 | */ |
||
| 169 | public function isRootAdmin() |
||
| 170 | { |
||
| 171 | return $this->root_admin === 1; |
||
| 172 | } |
||
| 173 | |||
| 174 | /** |
||
| 175 | * Returns the user's daemon secret for a given server. |
||
| 176 | * |
||
| 177 | * @param \Pterodactyl\Models\Server $server |
||
| 178 | * @return null|string |
||
| 179 | */ |
||
| 180 | public function daemonToken(Server $server) |
||
| 181 | { |
||
| 182 | if ($this->id === $server->owner_id || $this->isRootAdmin()) { |
||
| 183 | return $server->daemonSecret; |
||
| 184 | } |
||
| 185 | |||
| 186 | $subuser = $this->subuserOf->where('server_id', $server->id)->first(); |
||
| 187 | |||
| 188 | return ($subuser) ? $subuser->daemonSecret : null; |
||
| 189 | } |
||
| 190 | |||
| 191 | /** |
||
| 192 | * Returns an array of all servers a user is able to access. |
||
| 193 | * Note: does not account for user admin status. |
||
| 194 | * |
||
| 195 | * @return array |
||
| 196 | */ |
||
| 197 | public function serverAccessArray() |
||
| 198 | { |
||
| 199 | return Server::select('id')->where('owner_id', $this->id)->union( |
||
| 200 | Subuser::select('server_id')->where('user_id', $this->id) |
||
| 201 | )->pluck('id')->all(); |
||
| 202 | } |
||
| 203 | |||
| 204 | /** |
||
| 205 | * Change the access level for a given call to `access()` on the user. |
||
| 206 | * |
||
| 207 | * @param string $level can be all, admin, subuser, owner |
||
| 208 | * @return void |
||
| 209 | */ |
||
| 210 | public function setAccessLevel($level = 'all') |
||
| 211 | { |
||
| 212 | if (! in_array($level, ['all', 'admin', 'subuser', 'owner'])) { |
||
| 213 | $level = 'all'; |
||
| 214 | } |
||
| 215 | $this->accessLevel = $level; |
||
| 216 | |||
| 217 | return $this; |
||
| 218 | } |
||
| 219 | |||
| 220 | /** |
||
| 221 | * Returns an array of all servers a user is able to access. |
||
| 222 | * Note: does not account for user admin status. |
||
| 223 | * |
||
| 224 | * @param array $load |
||
| 225 | * @return \Illuiminate\Database\Eloquent\Builder |
||
| 226 | */ |
||
| 227 | public function access(...$load) |
||
| 228 | { |
||
| 229 | if (count($load) > 0 && is_null($load[0])) { |
||
| 230 | $query = Server::query(); |
||
| 231 | } else { |
||
| 232 | $query = Server::with(! empty($load) ? $load : ['service', 'node', 'allocation']); |
||
| 233 | } |
||
| 234 | |||
| 235 | // If access level is set to owner, only display servers |
||
| 236 | // that the user owns. |
||
| 237 | if ($this->accessLevel === 'owner') { |
||
| 238 | $query->where('owner_id', $this->id); |
||
|
0 ignored issues
–
show
|
|||
| 239 | } |
||
| 240 | |||
| 241 | // If set to all, display all servers they can access, including |
||
| 242 | // those they access as an admin. |
||
| 243 | // |
||
| 244 | // If set to subuser, only return the servers they can access because |
||
| 245 | // they are owner, or marked as a subuser of the server. |
||
| 246 | if (($this->accessLevel === 'all' && ! $this->isRootAdmin()) || $this->accessLevel === 'subuser') { |
||
| 247 | $query->whereIn('id', $this->serverAccessArray()); |
||
| 248 | } |
||
| 249 | |||
| 250 | // If set to admin, only display the servers a user can access |
||
| 251 | // as an administrator (leaves out owned and subuser of). |
||
| 252 | if ($this->accessLevel === 'admin' && $this->isRootAdmin()) { |
||
| 253 | $query->whereNotIn('id', $this->serverAccessArray()); |
||
| 254 | } |
||
| 255 | |||
| 256 | return $query; |
||
| 257 | } |
||
| 258 | |||
| 259 | /** |
||
| 260 | * Returns all permissions that a user has. |
||
| 261 | * |
||
| 262 | * @return \Illuminate\Database\Eloquent\Relations\HasManyThrough |
||
| 263 | */ |
||
| 264 | public function permissions() |
||
| 265 | { |
||
| 266 | return $this->hasManyThrough(Permission::class, Subuser::class); |
||
| 267 | } |
||
| 268 | |||
| 269 | /** |
||
| 270 | * Returns all servers that a user owns. |
||
| 271 | * |
||
| 272 | * @return \Illuminate\Database\Eloquent\Relations\HasMany |
||
| 273 | */ |
||
| 274 | public function servers() |
||
| 275 | { |
||
| 276 | return $this->hasMany(Server::class, 'owner_id'); |
||
| 277 | } |
||
| 278 | |||
| 279 | /** |
||
| 280 | * Return all servers that user is listed as a subuser of directly. |
||
| 281 | * |
||
| 282 | * @return \Illuminate\Database\Eloquent\Relations\HasMany |
||
| 283 | */ |
||
| 284 | public function subuserOf() |
||
| 285 | { |
||
| 286 | return $this->hasMany(Subuser::class); |
||
| 287 | } |
||
| 288 | } |
||
| 289 |
It seems like the method you are trying to call exists only in some of the possible types.
Let’s take a look at an example:
Available Fixes
Add an additional type-check:
Only allow a single type to be passed if the variable comes from a parameter: