adamjakab /
SuiteCRM
This project does not seem to handle request data directly as such no vulnerable execution paths were found.
include, or for example
via PHP's auto-loading mechanism.
These results are based on our legacy PHP analysis, consider migrating to our new PHP analysis engine instead. Learn more
| 1 | <?php |
||
| 2 | /********************************************************************************* |
||
| 3 | * SugarCRM Community Edition is a customer relationship management program developed by |
||
| 4 | * SugarCRM, Inc. Copyright (C) 2004-2013 SugarCRM Inc. |
||
| 5 | |||
| 6 | * SuiteCRM is an extension to SugarCRM Community Edition developed by Salesagility Ltd. |
||
| 7 | * Copyright (C) 2011 - 2014 Salesagility Ltd. |
||
| 8 | * |
||
| 9 | * This program is free software; you can redistribute it and/or modify it under |
||
| 10 | * the terms of the GNU Affero General Public License version 3 as published by the |
||
| 11 | * Free Software Foundation with the addition of the following permission added |
||
| 12 | * to Section 15 as permitted in Section 7(a): FOR ANY PART OF THE COVERED WORK |
||
| 13 | * IN WHICH THE COPYRIGHT IS OWNED BY SUGARCRM, SUGARCRM DISCLAIMS THE WARRANTY |
||
| 14 | * OF NON INFRINGEMENT OF THIRD PARTY RIGHTS. |
||
| 15 | * |
||
| 16 | * This program is distributed in the hope that it will be useful, but WITHOUT |
||
| 17 | * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS |
||
| 18 | * FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more |
||
| 19 | * details. |
||
| 20 | * |
||
| 21 | * You should have received a copy of the GNU Affero General Public License along with |
||
| 22 | * this program; if not, see http://www.gnu.org/licenses or write to the Free |
||
| 23 | * Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA |
||
| 24 | * 02110-1301 USA. |
||
| 25 | * |
||
| 26 | * You can contact SugarCRM, Inc. headquarters at 10050 North Wolfe Road, |
||
| 27 | * SW2-130, Cupertino, CA 95014, USA. or at email address [email protected]. |
||
| 28 | * |
||
| 29 | * The interactive user interfaces in modified source and object code versions |
||
| 30 | * of this program must display Appropriate Legal Notices, as required under |
||
| 31 | * Section 5 of the GNU Affero General Public License version 3. |
||
| 32 | * |
||
| 33 | * In accordance with Section 7(b) of the GNU Affero General Public License version 3, |
||
| 34 | * these Appropriate Legal Notices must retain the display of the "Powered by |
||
| 35 | * SugarCRM" logo and "Supercharged by SuiteCRM" logo. If the display of the logos is not |
||
| 36 | * reasonably feasible for technical reasons, the Appropriate Legal Notices must |
||
| 37 | * display the words "Powered by SugarCRM" and "Supercharged by SuiteCRM". |
||
| 38 | ********************************************************************************/ |
||
| 39 | |||
| 40 | |||
| 41 | require_once 'modules/OAuthTokens/OAuthToken.php'; |
||
| 42 | require_once 'modules/OAuthKeys/OAuthKey.php'; |
||
| 43 | /** |
||
| 44 | * Sugar OAuth provider implementation |
||
| 45 | * @api |
||
| 46 | */ |
||
| 47 | class SugarOAuthServer |
||
| 48 | { |
||
| 49 | /** |
||
| 50 | * OAuth token |
||
| 51 | * @var OAuthToken |
||
| 52 | */ |
||
| 53 | protected $token; |
||
| 54 | |||
| 55 | /** |
||
| 56 | * Check if everything is OK |
||
| 57 | * @throws OAuthException |
||
| 58 | */ |
||
| 59 | protected function check() |
||
| 60 | { |
||
| 61 | if(!function_exists('mhash') && !function_exists('hash_hmac')) { |
||
| 62 | // define exception class |
||
| 63 | throw new OAuthException("MHash extension required for OAuth support"); |
||
| 64 | } |
||
| 65 | } |
||
| 66 | |||
| 67 | /** |
||
| 68 | * Is this functionality enabled? |
||
| 69 | */ |
||
| 70 | public static function enabled() |
||
| 71 | { |
||
| 72 | return function_exists('mhash') || function_exists('hash_hmac'); |
||
| 73 | } |
||
| 74 | |||
| 75 | /** |
||
| 76 | * Find consumer by key |
||
| 77 | * @param $provider |
||
| 78 | */ |
||
| 79 | public function lookupConsumer($provider) |
||
| 80 | { |
||
| 81 | // check $provider->consumer_key |
||
| 82 | // on unknown: Zend_Oauth_Provider::CONSUMER_KEY_UNKNOWN |
||
| 83 | // on bad key: Zend_Oauth_Provider::CONSUMER_KEY_REFUSED |
||
| 84 | $GLOBALS['log']->debug("OAUTH: lookupConsumer, key={$provider->consumer_key}"); |
||
| 85 | $consumer = OAuthKey::fetchKey($provider->consumer_key); |
||
| 86 | if(!$consumer) { |
||
| 87 | return Zend_Oauth_Provider::CONSUMER_KEY_UNKNOWN; |
||
| 88 | } |
||
| 89 | $provider->consumer_secret = $consumer->c_secret; |
||
| 90 | $this->consumer = $consumer; |
||
| 91 | return Zend_Oauth_Provider::OK; |
||
| 92 | } |
||
| 93 | |||
| 94 | /** |
||
| 95 | * Check timestamps & nonces |
||
| 96 | * @param OAuthProvider $provider |
||
| 97 | */ |
||
| 98 | public function timestampNonceChecker($provider) |
||
| 99 | { |
||
| 100 | // FIXME: add ts/nonce verification |
||
| 101 | if(empty($provider->nonce)) { |
||
| 102 | return Zend_Oauth_Provider::BAD_NONCE; |
||
| 103 | } |
||
| 104 | if(empty($provider->timestamp)) { |
||
| 105 | return Zend_Oauth_Provider::BAD_TIMESTAMP; |
||
| 106 | } |
||
| 107 | return OAuthToken::checkNonce($provider->consumer_key, $provider->nonce, $provider->timestamp); |
||
| 108 | } |
||
| 109 | |||
| 110 | /** |
||
| 111 | * Vefiry incoming token |
||
| 112 | * @param OAuthProvider $provider |
||
| 113 | */ |
||
| 114 | public function tokenHandler($provider) |
||
| 115 | { |
||
| 116 | $GLOBALS['log']->debug("OAUTH: tokenHandler, token={$provider->token}, verify={$provider->verifier}"); |
||
| 117 | |||
| 118 | $token = OAuthToken::load($provider->token); |
||
| 119 | if(empty($token)) { |
||
| 120 | return Zend_Oauth_Provider::TOKEN_REJECTED; |
||
| 121 | } |
||
| 122 | if($token->consumer != $this->consumer->id) { |
||
| 123 | return Zend_Oauth_Provider::TOKEN_REJECTED; |
||
| 124 | } |
||
| 125 | $GLOBALS['log']->debug("OAUTH: tokenHandler, found token=".var_export($token->id, true)); |
||
| 126 | if($token->tstate == OAuthToken::REQUEST) { |
||
| 127 | if(!empty($token->verify) && $provider->verifier == $token->verify) { |
||
| 128 | $provider->token_secret = $token->secret; |
||
| 129 | $this->token = $token; |
||
| 130 | return Zend_Oauth_Provider::OK; |
||
| 131 | } else { |
||
| 132 | return Zend_Oauth_Provider::TOKEN_USED; |
||
| 133 | } |
||
| 134 | } |
||
| 135 | if($token->tstate == OAuthToken::ACCESS) { |
||
| 136 | $provider->token_secret = $token->secret; |
||
| 137 | $this->token = $token; |
||
| 138 | return Zend_Oauth_Provider::OK; |
||
| 139 | } |
||
| 140 | return Zend_Oauth_Provider::TOKEN_REJECTED; |
||
| 141 | } |
||
| 142 | |||
| 143 | /** |
||
| 144 | * Decode POST/GET via from_html() |
||
| 145 | * @return array decoded data |
||
| 146 | */ |
||
| 147 | protected function decodePostGet() |
||
| 148 | { |
||
| 149 | $data = $_GET; |
||
| 150 | $data = array_merge($data, $_POST); |
||
| 151 | foreach($data as $k => $v) { |
||
| 152 | $data[$k] = from_html($v); |
||
| 153 | } |
||
| 154 | return $data; |
||
| 155 | } |
||
| 156 | |||
| 157 | /** |
||
| 158 | * Create OAuth provider |
||
| 159 | * |
||
| 160 | * Checks current request for OAuth valitidy |
||
| 161 | * @param bool $add_rest add REST endpoint as request path |
||
| 162 | */ |
||
| 163 | public function __construct($req_path = '') |
||
| 164 | { |
||
| 165 | $GLOBALS['log']->debug("OAUTH: __construct($req_path): ".var_export($_REQUEST, true)); |
||
| 166 | $this->check(); |
||
| 167 | $this->provider = new Zend_Oauth_Provider(); |
||
| 168 | try { |
||
| 169 | $this->provider->setConsumerHandler(array($this,'lookupConsumer')); |
||
| 170 | $this->provider->setTimestampNonceHandler(array($this,'timestampNonceChecker')); |
||
| 171 | $this->provider->setTokenHandler(array($this,'tokenHandler')); |
||
| 172 | if(!empty($req_path)) { |
||
| 173 | $this->provider->isRequestTokenEndpoint($req_path); // No token needed for this end point |
||
| 174 | } |
||
| 175 | $this->provider->checkOAuthRequest(null, $this->decodePostGet()); |
||
| 176 | if(mt_rand() % 10 == 0) { |
||
| 177 | // cleanup 1 in 10 times |
||
| 178 | OAuthToken::cleanup(); |
||
| 179 | } |
||
| 180 | } catch(Exception $e) { |
||
| 181 | $GLOBALS['log']->debug($this->reportProblem($e)); |
||
| 182 | throw $e; |
||
| 183 | } |
||
| 184 | } |
||
| 185 | |||
| 186 | /** |
||
| 187 | * Generate request token string |
||
| 188 | * @return string |
||
| 189 | */ |
||
| 190 | public function requestToken() |
||
| 191 | { |
||
| 192 | $GLOBALS['log']->debug("OAUTH: requestToken"); |
||
| 193 | $token = OAuthToken::generate(); |
||
| 194 | $token->setConsumer($this->consumer); |
||
| 195 | $params = $this->provider->getOAuthParams(); |
||
| 196 | if(!empty($params['oauth_callback']) && $params['oauth_callback'] != 'oob') { |
||
| 197 | $token->setCallbackURL($params['oauth_callback']); |
||
| 198 | } |
||
| 199 | $token->save(); |
||
| 200 | return $token->queryString(); |
||
| 201 | } |
||
| 202 | |||
| 203 | /** |
||
| 204 | * Generate access token string - must have validated request token |
||
| 205 | * @return string |
||
| 206 | */ |
||
| 207 | public function accessToken() |
||
| 208 | { |
||
| 209 | $GLOBALS['log']->debug("OAUTH: accessToken"); |
||
| 210 | if(empty($this->token) || $this->token->tstate != OAuthToken::REQUEST) { |
||
| 211 | return null; |
||
| 212 | } |
||
| 213 | $this->token->invalidate(); |
||
| 214 | $token = OAuthToken::generate(); |
||
| 215 | $token->setState(OAuthToken::ACCESS); |
||
| 216 | $token->setConsumer($this->consumer); |
||
| 217 | // transfer user data from request token |
||
| 218 | $token->copyAuthData($this->token); |
||
| 219 | $token->save(); |
||
| 220 | return $token->queryString(); |
||
| 221 | } |
||
| 222 | |||
| 223 | /** |
||
| 224 | * Return authorization URL |
||
| 225 | * @return string |
||
| 226 | */ |
||
| 227 | public function authUrl() |
||
| 228 | { |
||
| 229 | return urlencode(rtrim($GLOBALS['sugar_config']['site_url'],'/')."/index.php?module=OAuthTokens&action=authorize"); |
||
| 230 | } |
||
| 231 | |||
| 232 | /** |
||
| 233 | * Fetch current token if it is authorized |
||
| 234 | * @return OAuthToken|null |
||
| 235 | */ |
||
| 236 | public function authorizedToken() |
||
| 237 | { |
||
| 238 | if($this->token->tstate == OAuthToken::ACCESS) { |
||
| 239 | return $this->token; |
||
| 240 | } |
||
| 241 | return null; |
||
| 242 | } |
||
| 243 | |||
| 244 | /** |
||
| 245 | * Fetch authorization data from current token |
||
| 246 | * @return mixed Authorization data or null if none |
||
| 247 | */ |
||
| 248 | public function authorization() |
||
| 249 | { |
||
| 250 | if($this->token->tstate == OAuthToken::ACCESS) { |
||
| 251 | return $this->token->authdata; |
||
| 252 | } |
||
| 253 | return null; |
||
| 254 | } |
||
| 255 | |||
| 256 | /** |
||
| 257 | * Report OAuth problem as string |
||
| 258 | */ |
||
| 259 | public function reportProblem(Exception $e) |
||
| 260 | { |
||
| 261 | return $this->provider->reportProblem($e); |
||
| 262 | } |
||
| 263 | } |
||
| 264 | |||
| 265 | if(!class_exists('OAuthException')) { |
||
| 266 | // we will use this in case oauth extension is not loaded |
||
| 267 | class OAuthException extends Exception {} |
||
|
0 ignored issues
–
show
|
|||
| 268 | } |
This check looks for classes that have been defined more than once.
If you can, we would recommend to use standard object-oriented programming techniques. For example, to avoid multiple types, it might make sense to create a common interface, and then multiple, different implementations for that interface.
This also has the side-effect of providing you with better IDE auto-completion, static analysis and also better OPCode caching from PHP.