| Conditions | 151 |
| Paths | 211 |
| Total Lines | 1184 |
| Code Lines | 722 |
| Lines | 49 |
| Ratio | 4.14 % |
| Changes | 0 | ||
Small methods make your code easier to understand, in particular if combined with a good name. Besides, if your method is small, finding a good name is usually much easier.
For example, if you find yourself adding comments to a method's body, this is usually a good sign to extract the commented part to a new method, and use the comment as a starting point when coming up with a good name for this new method.
Commonly applied refactorings include:
If many parameters/temporary variables are present:
| 1 | <?php |
||
| 63 | function mainQuery() |
||
| 64 | { |
||
| 65 | global $server, $user, $pass, $database, $port, $encoding, $pre, $LANG; |
||
| 66 | global $SETTINGS; |
||
| 67 | |||
| 68 | include $SETTINGS['cpassman_dir'].'/includes/config/settings.php'; |
||
| 69 | header("Content-type: text/html; charset=utf-8"); |
||
| 70 | header("Cache-Control: no-cache, must-revalidate"); |
||
| 71 | header("Pragma: no-cache"); |
||
| 72 | error_reporting(E_ERROR); |
||
| 73 | require_once $SETTINGS['cpassman_dir'].'/sources/main.functions.php'; |
||
| 74 | require_once $SETTINGS['cpassman_dir'].'/sources/SplClassLoader.php'; |
||
| 75 | |||
| 76 | // connect to the server |
||
| 77 | require_once $SETTINGS['cpassman_dir'].'/includes/libraries/Database/Meekrodb/db.class.php'; |
||
| 78 | $pass = defuse_return_decrypted($pass); |
||
| 79 | DB::$host = $server; |
||
| 80 | DB::$user = $user; |
||
| 81 | DB::$password = $pass; |
||
| 82 | DB::$dbName = $database; |
||
| 83 | DB::$port = $port; |
||
| 84 | DB::$encoding = $encoding; |
||
| 85 | DB::$error_handler = true; |
||
| 86 | $link = mysqli_connect($server, $user, $pass, $database, $port); |
||
| 87 | $link->set_charset($encoding); |
||
| 88 | |||
| 89 | // User's language loading |
||
| 90 | require_once $SETTINGS['cpassman_dir'].'/includes/language/'.$_SESSION['user_language'].'.php'; |
||
| 91 | // Manage type of action asked |
||
| 92 | switch (filter_input(INPUT_POST, 'type', FILTER_SANITIZE_STRING)) { |
||
| 93 | case "change_pw": |
||
| 94 | // decrypt and retreive data in JSON format |
||
| 95 | $dataReceived = prepareExchangedData( |
||
| 96 | filter_input(INPUT_POST, 'data', FILTER_SANITIZE_STRING, FILTER_FLAG_NO_ENCODE_QUOTES), |
||
| 97 | "decode" |
||
| 98 | ); |
||
| 99 | |||
| 100 | // load passwordLib library |
||
| 101 | $pwdlib = new SplClassLoader('PasswordLib', '../includes/libraries'); |
||
| 102 | $pwdlib->register(); |
||
| 103 | $pwdlib = new PasswordLib\PasswordLib(); |
||
| 104 | |||
| 105 | // Prepare variables |
||
| 106 | $newPw = $pwdlib->createPasswordHash(htmlspecialchars_decode($dataReceived['new_pw'])); |
||
| 107 | |||
| 108 | // User has decided to change is PW |
||
| 109 | if (null !== filter_input(INPUT_POST, 'change_pw_origine', FILTER_SANITIZE_STRING) |
||
| 110 | && filter_input(INPUT_POST, 'change_pw_origine', FILTER_SANITIZE_STRING) === "user_change" |
||
| 111 | && $_SESSION['user_admin'] !== "1" |
||
| 112 | ) { |
||
| 113 | // check if expected security level is reached |
||
| 114 | $data_roles = DB::queryfirstrow("SELECT fonction_id FROM ".prefix_table("users")." WHERE id = %i", $_SESSION['user_id']); |
||
| 115 | |||
| 116 | // check if badly written |
||
| 117 | $data_roles['fonction_id'] = array_filter(explode(',', str_replace(';', ',', $data_roles['fonction_id']))); |
||
| 118 | if ($data_roles['fonction_id'][0] === "") { |
||
| 119 | $data_roles['fonction_id'] = implode(';', $data_roles['fonction_id']); |
||
| 120 | DB::update( |
||
| 121 | prefix_table("users"), |
||
| 122 | array( |
||
| 123 | 'fonction_id' => $data_roles['fonction_id'] |
||
| 124 | ), |
||
| 125 | "id = %i", |
||
| 126 | $_SESSION['user_id'] |
||
| 127 | ); |
||
| 128 | } |
||
| 129 | |||
| 130 | $data = DB::query( |
||
| 131 | "SELECT complexity |
||
| 132 | FROM ".prefix_table("roles_title")." |
||
| 133 | WHERE id IN (".implode(',', $data_roles['fonction_id']).") |
||
| 134 | ORDER BY complexity DESC" |
||
| 135 | ); |
||
| 136 | if (intval(filter_input(INPUT_POST, 'complexity', FILTER_SANITIZE_NUMBER_INT)) < intval($data[0]['complexity'])) { |
||
| 137 | echo '[ { "error" : "complexity_level_not_reached" } ]'; |
||
| 138 | break; |
||
| 139 | } |
||
| 140 | |||
| 141 | // Get a string with the old pw array |
||
| 142 | $lastPw = explode(';', $_SESSION['last_pw']); |
||
| 143 | // if size is bigger then clean the array |
||
| 144 | if (sizeof($lastPw) > $SETTINGS['number_of_used_pw'] |
||
| 145 | && $SETTINGS['number_of_used_pw'] > 0 |
||
| 146 | ) { |
||
| 147 | for ($x_counter = 0; $x_counter < $SETTINGS['number_of_used_pw']; $x_counter++) { |
||
| 148 | unset($lastPw[$x_counter]); |
||
| 149 | } |
||
| 150 | // reinit SESSION |
||
| 151 | $_SESSION['last_pw'] = implode(';', $lastPw); |
||
| 152 | // specific case where admin setting "number_of_used_pw" |
||
| 153 | } elseif ($SETTINGS['number_of_used_pw'] == 0) { |
||
| 154 | $_SESSION['last_pw'] = ""; |
||
| 155 | $lastPw = array(); |
||
| 156 | } |
||
| 157 | |||
| 158 | // check if new pw is different that old ones |
||
| 159 | if (in_array($newPw, $lastPw)) { |
||
| 160 | echo '[ { "error" : "already_used" } ]'; |
||
| 161 | break; |
||
| 162 | } |
||
| 163 | |||
| 164 | // update old pw with new pw |
||
| 165 | if (sizeof($lastPw) == ($SETTINGS['number_of_used_pw'] + 1)) { |
||
| 166 | unset($lastPw[0]); |
||
| 167 | } else { |
||
| 168 | array_push($lastPw, $newPw); |
||
| 169 | } |
||
| 170 | // create a list of last pw based on the table |
||
| 171 | $oldPw = ""; |
||
| 172 | foreach ($lastPw as $elem) { |
||
| 173 | if (!empty($elem)) { |
||
| 174 | if (empty($oldPw)) { |
||
| 175 | $oldPw = $elem; |
||
| 176 | } else { |
||
| 177 | $oldPw .= ";".$elem; |
||
| 178 | } |
||
| 179 | } |
||
| 180 | } |
||
| 181 | |||
| 182 | // update sessions |
||
| 183 | $_SESSION['last_pw'] = $oldPw; |
||
| 184 | $_SESSION['last_pw_change'] = mktime(0, 0, 0, date('m'), date('d'), date('y')); |
||
| 185 | $_SESSION['validite_pw'] = true; |
||
| 186 | |||
| 187 | // BEfore updating, check that the pwd is correct |
||
| 188 | if ($pwdlib->verifyPasswordHash(htmlspecialchars_decode($dataReceived['new_pw']), $newPw) === true) { |
||
| 189 | // update DB |
||
| 190 | DB::update( |
||
| 191 | prefix_table("users"), |
||
| 192 | array( |
||
| 193 | 'pw' => $newPw, |
||
| 194 | 'last_pw_change' => mktime(0, 0, 0, date('m'), date('d'), date('y')), |
||
| 195 | 'last_pw' => $oldPw |
||
| 196 | ), |
||
| 197 | "id = %i", |
||
| 198 | $_SESSION['user_id'] |
||
| 199 | ); |
||
| 200 | // update LOG |
||
| 201 | logEvents('user_mngt', 'at_user_pwd_changed', $_SESSION['user_id'], $_SESSION['login'], $_SESSION['user_id']); |
||
| 202 | echo '[ { "error" : "none" } ]'; |
||
| 203 | } else { |
||
| 204 | echo '[ { "error" : "pwd_hash_not_correct" } ]'; |
||
| 205 | } |
||
| 206 | break; |
||
| 207 | |||
| 208 | // ADMIN has decided to change the USER's PW |
||
| 209 | } elseif (null !== filter_input(INPUT_POST, 'change_pw_origine', FILTER_SANITIZE_STRING) |
||
| 210 | && ((filter_input(INPUT_POST, 'change_pw_origine', FILTER_SANITIZE_STRING) === "admin_change" |
||
| 211 | || filter_input(INPUT_POST, 'change_pw_origine', FILTER_SANITIZE_STRING) === "user_change" |
||
| 212 | ) && ($_SESSION['user_admin'] === "1"|| $_SESSION['user_manager'] === "1" |
||
| 213 | || $_SESSION['user_can_manage_all_users'] === "1") |
||
| 214 | ) |
||
| 215 | ) { |
||
| 216 | // check if user is admin / Manager |
||
| 217 | $userInfo = DB::queryFirstRow( |
||
| 218 | "SELECT admin, gestionnaire |
||
| 219 | FROM ".prefix_table("users")." |
||
| 220 | WHERE id = %i", |
||
| 221 | $_SESSION['user_id'] |
||
| 222 | ); |
||
| 223 | if ($userInfo['admin'] != 1 && $userInfo['gestionnaire'] != 1) { |
||
| 224 | echo '[ { "error" : "not_admin_or_manager" } ]'; |
||
| 225 | break; |
||
| 226 | } |
||
| 227 | |||
| 228 | // BEfore updating, check that the pwd is correct |
||
| 229 | if ($pwdlib->verifyPasswordHash(htmlspecialchars_decode($dataReceived['new_pw']), $newPw) === true) { |
||
| 230 | // adapt |
||
| 231 | if (filter_input(INPUT_POST, 'change_pw_origine', FILTER_SANITIZE_STRING) === "user_change") { |
||
| 232 | $dataReceived['user_id'] = $_SESSION['user_id']; |
||
| 233 | } |
||
| 234 | |||
| 235 | // update DB |
||
| 236 | DB::update( |
||
| 237 | prefix_table("users"), |
||
| 238 | array( |
||
| 239 | 'pw' => $newPw, |
||
| 240 | 'last_pw_change' => mktime(0, 0, 0, date('m'), date('d'), date('y')) |
||
| 241 | ), |
||
| 242 | "id = %i", |
||
| 243 | $dataReceived['user_id'] |
||
| 244 | ); |
||
| 245 | |||
| 246 | // update LOG |
||
| 247 | logEvents('user_mngt', 'at_user_pwd_changed', $_SESSION['user_id'], $_SESSION['login'], $dataReceived['user_id']); |
||
| 248 | |||
| 249 | //Send email to user |
||
| 250 | if (filter_input(INPUT_POST, 'change_pw_origine', FILTER_SANITIZE_STRING) !== "admin_change") { |
||
| 251 | $row = DB::queryFirstRow( |
||
| 252 | "SELECT email FROM ".prefix_table("users")." |
||
| 253 | WHERE id = %i", |
||
| 254 | $dataReceived['user_id'] |
||
| 255 | ); |
||
| 256 | if (!empty($row['email']) && isset($SETTINGS['enable_email_notification_on_user_pw_change']) && $SETTINGS['enable_email_notification_on_user_pw_change'] == 1) { |
||
| 257 | sendEmail( |
||
| 258 | $LANG['forgot_pw_email_subject'], |
||
| 259 | $LANG['forgot_pw_email_body']." ".htmlspecialchars_decode($dataReceived['new_pw']), |
||
| 260 | $row[0], |
||
| 261 | $LANG['forgot_pw_email_altbody_1']." ".htmlspecialchars_decode($dataReceived['new_pw']) |
||
| 262 | ); |
||
| 263 | } |
||
| 264 | } |
||
| 265 | |||
| 266 | echo '[ { "error" : "none" } ]'; |
||
| 267 | } else { |
||
| 268 | echo '[ { "error" : "pwd_hash_not_correct" } ]'; |
||
| 269 | } |
||
| 270 | break; |
||
| 271 | |||
| 272 | // ADMIN first login |
||
| 273 | } elseif (null !== filter_input(INPUT_POST, 'change_pw_origine', FILTER_SANITIZE_STRING) |
||
| 274 | && filter_input(INPUT_POST, 'change_pw_origine', FILTER_SANITIZE_STRING) == "first_change" |
||
| 275 | ) { |
||
| 276 | // update DB |
||
| 277 | DB::update( |
||
| 278 | prefix_table("users"), |
||
| 279 | array( |
||
| 280 | 'pw' => $newPw, |
||
| 281 | 'last_pw_change' => mktime(0, 0, 0, date('m'), date('d'), date('y')) |
||
| 282 | ), |
||
| 283 | "id = %i", |
||
| 284 | $_SESSION['user_id'] |
||
| 285 | ); |
||
| 286 | |||
| 287 | // update sessions |
||
| 288 | $_SESSION['last_pw'] = ""; |
||
| 289 | $_SESSION['last_pw_change'] = mktime(0, 0, 0, date('m'), date('d'), date('y')); |
||
| 290 | $_SESSION['validite_pw'] = true; |
||
| 291 | |||
| 292 | // update LOG |
||
| 293 | logEvents('user_mngt', 'at_user_initial_pwd_changed', $_SESSION['user_id'], $_SESSION['login'], $_SESSION['user_id']); |
||
| 294 | |||
| 295 | echo '[ { "error" : "none" } ]'; |
||
| 296 | break; |
||
| 297 | } else { |
||
| 298 | // DEFAULT case |
||
| 299 | echo '[ { "error" : "nothing_to_do" } ]'; |
||
| 300 | } |
||
| 301 | break; |
||
| 302 | /** |
||
| 303 | * This will generate the QR Google Authenticator |
||
| 304 | */ |
||
| 305 | case "ga_generate_qr": |
||
| 306 | // is this allowed by setting |
||
| 307 | if ((isset($SETTINGS['ga_reset_by_user']) === false || $SETTINGS['ga_reset_by_user'] !== "1") |
||
| 308 | && (null === filter_input(INPUT_POST, 'demand_origin', FILTER_SANITIZE_STRING) |
||
| 309 | || filter_input(INPUT_POST, 'demand_origin', FILTER_SANITIZE_STRING) !== "users_management_list") |
||
| 310 | ) { |
||
| 311 | // User cannot ask for a new code |
||
| 312 | echo '[{"error" : "not_allowed"}]'; |
||
| 313 | break; |
||
| 314 | } |
||
| 315 | |||
| 316 | // Check if user exists |
||
| 317 | if (null === filter_input(INPUT_POST, 'id', FILTER_SANITIZE_NUMBER_INT) |
||
| 318 | || empty(filter_input(INPUT_POST, 'id', FILTER_SANITIZE_NUMBER_INT)) === true |
||
| 319 | ) { |
||
| 320 | // decrypt and retreive data in JSON format |
||
| 321 | $dataReceived = prepareExchangedData( |
||
| 322 | filter_input(INPUT_POST, 'data', FILTER_SANITIZE_STRING, FILTER_FLAG_NO_ENCODE_QUOTES), |
||
| 323 | "decode" |
||
| 324 | ); |
||
| 325 | // Prepare variables |
||
| 326 | $login = htmlspecialchars_decode($dataReceived['login']); |
||
| 327 | |||
| 328 | $data = DB::queryfirstrow( |
||
| 329 | "SELECT id, email |
||
| 330 | FROM ".prefix_table("users")." |
||
| 331 | WHERE login = %s", |
||
| 332 | $login |
||
| 333 | ); |
||
| 334 | } else { |
||
| 335 | $data = DB::queryfirstrow( |
||
| 336 | "SELECT id, login, email |
||
| 337 | FROM ".prefix_table("users")." |
||
| 338 | WHERE id = %i", |
||
| 339 | filter_input(INPUT_POST, 'id', FILTER_SANITIZE_NUMBER_INT) |
||
| 340 | ); |
||
| 341 | } |
||
| 342 | $counter = DB::count(); |
||
| 343 | if ($counter == 0) { |
||
| 344 | // not a registered user ! |
||
| 345 | echo '[{"error" : "no_user"}]'; |
||
| 346 | } else { |
||
| 347 | if (empty($data['email'])) { |
||
| 348 | echo '[{"error" : "no_email"}]'; |
||
| 349 | } else { |
||
| 350 | // generate new GA user code |
||
| 351 | include_once($SETTINGS['cpassman_dir']."/includes/libraries/Authentication/TwoFactorAuth/TwoFactorAuth.php"); |
||
| 352 | $tfa = new Authentication\TwoFactorAuth\TwoFactorAuth($SETTINGS['ga_website_name']); |
||
| 353 | $gaSecretKey = $tfa->createSecret(); |
||
| 354 | $gaTemporaryCode = GenerateCryptKey(12); |
||
| 355 | |||
| 356 | // save the code |
||
| 357 | DB::update( |
||
| 358 | prefix_table("users"), |
||
| 359 | array( |
||
| 360 | 'ga' => $gaSecretKey, |
||
| 361 | 'ga_temporary_code' => $gaTemporaryCode |
||
| 362 | ), |
||
| 363 | "id = %i", |
||
| 364 | $data['id'] |
||
| 365 | ); |
||
| 366 | |||
| 367 | // send mail? |
||
| 368 | if (null !== filter_input(INPUT_POST, 'send_email', FILTER_SANITIZE_STRING) |
||
| 369 | && filter_input(INPUT_POST, 'send_email', FILTER_SANITIZE_STRING) === "1" |
||
| 370 | ) { |
||
| 371 | sendEmail( |
||
| 372 | $LANG['email_ga_subject'], |
||
| 373 | str_replace( |
||
| 374 | "#2FACode#", |
||
| 375 | $gaTemporaryCode, |
||
| 376 | $LANG['email_ga_text'] |
||
| 377 | ), |
||
| 378 | $data['email'] |
||
| 379 | ); |
||
| 380 | } |
||
| 381 | |||
| 382 | // send back |
||
| 383 | echo '[{ "error" : "0" , "email" : "'.$data['email'].'" , "msg" : "'.str_replace("#email#", "<b>".$data['email']."</b>", addslashes($LANG['admin_email_result_ok'])).'"}]'; |
||
| 384 | } |
||
| 385 | } |
||
| 386 | break; |
||
| 387 | /** |
||
| 388 | * Increase the session time of User |
||
| 389 | */ |
||
| 390 | case "increase_session_time": |
||
| 391 | // check if session is not already expired. |
||
| 392 | if ($_SESSION['fin_session'] > time()) { |
||
| 393 | // Calculate end of session |
||
| 394 | $_SESSION['fin_session'] = (integer) ($_SESSION['fin_session'] + filter_input(INPUT_POST, 'duration', FILTER_SANITIZE_NUMBER_INT)); |
||
| 395 | // Update table |
||
| 396 | DB::update( |
||
| 397 | prefix_table("users"), |
||
| 398 | array( |
||
| 399 | 'session_end' => $_SESSION['fin_session'] |
||
| 400 | ), |
||
| 401 | "id = %i", |
||
| 402 | $_SESSION['user_id'] |
||
| 403 | ); |
||
| 404 | // Return data |
||
| 405 | echo '[{"new_value":"'.$_SESSION['fin_session'].'"}]'; |
||
| 406 | } else { |
||
| 407 | echo '[{"new_value":"expired"}]'; |
||
| 408 | } |
||
| 409 | break; |
||
| 410 | /** |
||
| 411 | * Hide maintenance message |
||
| 412 | */ |
||
| 413 | case "hide_maintenance": |
||
| 414 | $_SESSION['hide_maintenance'] = 1; |
||
| 415 | break; |
||
| 416 | /** |
||
| 417 | * Used in order to send the password to the user by email |
||
| 418 | */ |
||
| 419 | case "send_pw_by_email": |
||
| 420 | // generate key |
||
| 421 | $key = GenerateCryptKey(50); |
||
| 422 | |||
| 423 | // Prepare post variables |
||
| 424 | $post_email = mysqli_escape_string($link, stripslashes(filter_input(INPUT_POST, 'email', FILTER_SANITIZE_STRING))); |
||
| 425 | $post_login = mysqli_escape_string($link, filter_input(INPUT_POST, 'login', FILTER_SANITIZE_STRING)); |
||
| 426 | |||
| 427 | // Get account and pw associated to email |
||
| 428 | DB::query( |
||
| 429 | "SELECT * FROM ".prefix_table("users")." WHERE email = %s", |
||
| 430 | $post_email |
||
| 431 | ); |
||
| 432 | $counter = DB::count(); |
||
| 433 | if ($counter != 0) { |
||
| 434 | $data = DB::query( |
||
| 435 | "SELECT login,pw FROM ".prefix_table("users")." WHERE email = %s", |
||
| 436 | $post_email |
||
| 437 | ); |
||
| 438 | $textMail = $LANG['forgot_pw_email_body_1']." <a href=\"". |
||
| 439 | $SETTINGS['cpassman_url']."/index.php?action=password_recovery&key=".$key. |
||
| 440 | "&login=".$post_login."\">".$SETTINGS['cpassman_url']. |
||
| 441 | "/index.php?action=password_recovery&key=".$key."&login=".$post_login."</a>.<br><br>".$LANG['thku']; |
||
| 442 | $textMailAlt = $LANG['forgot_pw_email_altbody_1']." ".$LANG['at_login']." : ".$post_login." - ". |
||
| 443 | $LANG['index_password']." : ".md5($data['pw']); |
||
| 444 | |||
| 445 | // Check if email has already a key in DB |
||
| 446 | DB::query( |
||
| 447 | "SELECT * FROM ".prefix_table("misc")." WHERE intitule = %s AND type = %s", |
||
| 448 | $post_login, |
||
| 449 | "password_recovery" |
||
| 450 | ); |
||
| 451 | $counter = DB::count(); |
||
| 452 | if ($counter != 0) { |
||
| 453 | DB::update( |
||
| 454 | prefix_table("misc"), |
||
| 455 | array( |
||
| 456 | 'valeur' => $key |
||
| 457 | ), |
||
| 458 | "type = %s and intitule = %s", |
||
| 459 | "password_recovery", |
||
| 460 | $post_login |
||
| 461 | ); |
||
| 462 | } else { |
||
| 463 | // store in DB the password recovery informations |
||
| 464 | DB::insert( |
||
| 465 | prefix_table("misc"), |
||
| 466 | array( |
||
| 467 | 'type' => 'password_recovery', |
||
| 468 | 'intitule' => $post_login, |
||
| 469 | 'valeur' => $key |
||
| 470 | ) |
||
| 471 | ); |
||
| 472 | } |
||
| 473 | |||
| 474 | echo '[{'.sendEmail($LANG['forgot_pw_email_subject'], $textMail, $post_email, $textMailAlt).'}]'; |
||
| 475 | } else { |
||
| 476 | // no one has this email ... alert |
||
| 477 | echo '[{"error":"error_email" , "message":"'.$LANG['forgot_my_pw_error_email_not_exist'].'"}]'; |
||
| 478 | } |
||
| 479 | break; |
||
| 480 | |||
| 481 | // Send to user his new pw if key is conform |
||
| 482 | case "generate_new_password": |
||
| 483 | // decrypt and retreive data in JSON format |
||
| 484 | $dataReceived = prepareExchangedData( |
||
| 485 | filter_input(INPUT_POST, 'data', FILTER_SANITIZE_STRING, FILTER_FLAG_NO_ENCODE_QUOTES), |
||
| 486 | "decode" |
||
| 487 | ); |
||
| 488 | |||
| 489 | // Prepare variables |
||
| 490 | $login = htmlspecialchars_decode($dataReceived['login']); |
||
| 491 | $key = htmlspecialchars_decode($dataReceived['key']); |
||
| 492 | |||
| 493 | // check if key is okay |
||
| 494 | $data = DB::queryFirstRow( |
||
| 495 | "SELECT valeur FROM ".prefix_table("misc")." WHERE intitule = %s AND type = %s", |
||
| 496 | mysqli_escape_string($link, $login), |
||
| 497 | "password_recovery" |
||
| 498 | ); |
||
| 499 | if ($key == $data['valeur']) { |
||
| 500 | // load passwordLib library |
||
| 501 | $pwdlib = new SplClassLoader('PasswordLib', '../includes/libraries'); |
||
| 502 | $pwdlib->register(); |
||
| 503 | $pwdlib = new PasswordLib\PasswordLib(); |
||
| 504 | |||
| 505 | // generate key |
||
| 506 | $newPwNotCrypted = $pwdlib->getRandomToken(10); |
||
| 507 | |||
| 508 | // Prepare variables |
||
| 509 | $newPw = $pwdlib->createPasswordHash(($newPwNotCrypted)); |
||
| 510 | |||
| 511 | // update DB |
||
| 512 | DB::update( |
||
| 513 | prefix_table("users"), |
||
| 514 | array( |
||
| 515 | 'pw' => $newPw |
||
| 516 | ), |
||
| 517 | "login = %s", |
||
| 518 | mysqli_escape_string($link, $login) |
||
| 519 | ); |
||
| 520 | // Delete recovery in DB |
||
| 521 | DB::delete( |
||
| 522 | prefix_table("misc"), |
||
| 523 | "type = %s AND intitule = %s AND valeur = %s", |
||
| 524 | "password_recovery", |
||
| 525 | mysqli_escape_string($link, $login), |
||
| 526 | $key |
||
| 527 | ); |
||
| 528 | // Get email |
||
| 529 | $dataUser = DB::queryFirstRow( |
||
| 530 | "SELECT email FROM ".prefix_table("users")." WHERE login = %s", |
||
| 531 | mysqli_escape_string($link, $login) |
||
| 532 | ); |
||
| 533 | |||
| 534 | $_SESSION['validite_pw'] = false; |
||
| 535 | // send to user |
||
| 536 | $ret = json_decode( |
||
| 537 | sendEmail( |
||
| 538 | $LANG['forgot_pw_email_subject_confirm'], |
||
| 539 | $LANG['forgot_pw_email_body']." ".$newPwNotCrypted, |
||
| 540 | $dataUser['email'], |
||
| 541 | strip_tags($LANG['forgot_pw_email_body'])." ".$newPwNotCrypted |
||
| 542 | ) |
||
| 543 | ); |
||
| 544 | // send email |
||
| 545 | if (empty($ret['error'])) { |
||
| 546 | echo 'done'; |
||
| 547 | } else { |
||
| 548 | echo $ret['message']; |
||
| 549 | } |
||
| 550 | } |
||
| 551 | break; |
||
| 552 | /** |
||
| 553 | * Store the personal saltkey |
||
| 554 | */ |
||
| 555 | case "store_personal_saltkey": |
||
| 556 | if (filter_input(INPUT_POST, 'key', FILTER_SANITIZE_STRING) !== $_SESSION['key']) { |
||
| 557 | echo '[ { "error" : "key_not_conform" , "status" : "nok" } ]'; |
||
| 558 | break; |
||
| 559 | } |
||
| 560 | |||
| 561 | $err = ""; |
||
|
|
|||
| 562 | $dataReceived = prepareExchangedData( |
||
| 563 | filter_input(INPUT_POST, 'data', FILTER_SANITIZE_STRING, FILTER_FLAG_NO_ENCODE_QUOTES), |
||
| 564 | "decode" |
||
| 565 | ); |
||
| 566 | $filter_score = filter_var($dataReceived['score'], FILTER_SANITIZE_NUMBER_INT); |
||
| 567 | $filter_psk = filter_var($dataReceived['psk'], FILTER_SANITIZE_STRING); |
||
| 568 | |||
| 569 | // manage store |
||
| 570 | if ($filter_psk !== "") { |
||
| 571 | // store in session the cleartext for psk |
||
| 572 | $_SESSION['user_settings']['clear_psk'] = $filter_psk; |
||
| 573 | |||
| 574 | // check if encrypted_psk is in database. If not, add it |
||
| 575 | if (!isset($_SESSION['user_settings']['encrypted_psk']) || (isset($_SESSION['user_settings']['encrypted_psk']) && empty($_SESSION['user_settings']['encrypted_psk']))) { |
||
| 576 | // Check if security level is reach (if enabled) |
||
| 577 | View Code Duplication | if (isset($SETTINGS['personal_saltkey_security_level']) === true) { |
|
| 578 | // Did we received the pass score |
||
| 579 | if (empty($filter_score) === false) { |
||
| 580 | if (intval($SETTINGS['personal_saltkey_security_level']) > $filter_score) { |
||
| 581 | echo '[ { "error" : "security_level_not_reached" , "status" : "" } ]'; |
||
| 582 | break; |
||
| 583 | } |
||
| 584 | } |
||
| 585 | } |
||
| 586 | // generate it based upon clear psk |
||
| 587 | $_SESSION['user_settings']['encrypted_psk'] = defuse_generate_personal_key($filter_psk); |
||
| 588 | |||
| 589 | // store it in DB |
||
| 590 | DB::update( |
||
| 591 | prefix_table("users"), |
||
| 592 | array( |
||
| 593 | 'encrypted_psk' => $_SESSION['user_settings']['encrypted_psk'] |
||
| 594 | ), |
||
| 595 | "id = %i", |
||
| 596 | $_SESSION['user_id'] |
||
| 597 | ); |
||
| 598 | } |
||
| 599 | |||
| 600 | // check if psk is correct. |
||
| 601 | $user_key_encoded = defuse_validate_personal_key( |
||
| 602 | $filter_psk, |
||
| 603 | $_SESSION['user_settings']['encrypted_psk'] |
||
| 604 | ); |
||
| 605 | |||
| 606 | if (strpos($user_key_encoded, "Error ") !== false) { |
||
| 607 | echo '[ { "error" : "psk_not_correct" , "status" : "" } ]'; |
||
| 608 | break; |
||
| 609 | } else { |
||
| 610 | // Check if security level is reach (if enabled) |
||
| 611 | View Code Duplication | if (isset($SETTINGS['personal_saltkey_security_level']) === true) { |
|
| 612 | // Did we received the pass score |
||
| 613 | if (empty($filter_score) === false) { |
||
| 614 | if (intval($SETTINGS['personal_saltkey_security_level']) > $filter_score) { |
||
| 615 | echo '[ { "error" : "" , "status" : "security_level_not_reached_but_psk_correct" } ]'; |
||
| 616 | break; |
||
| 617 | } |
||
| 618 | } |
||
| 619 | } |
||
| 620 | // Store PSK |
||
| 621 | $_SESSION['user_settings']['session_psk'] = $user_key_encoded; |
||
| 622 | setcookie( |
||
| 623 | "TeamPass_PFSK_".md5($_SESSION['user_id']), |
||
| 624 | encrypt($filter_psk, ""), |
||
| 625 | (!isset($SETTINGS['personal_saltkey_cookie_duration']) || $SETTINGS['personal_saltkey_cookie_duration'] == 0) ? time() + 60 * 60 * 24 : time() + 60 * 60 * 24 * $SETTINGS['personal_saltkey_cookie_duration'], |
||
| 626 | '/' |
||
| 627 | ); |
||
| 628 | } |
||
| 629 | } else { |
||
| 630 | echo '[ { "error" : "psk_is_empty" , "status" : "" } ]'; |
||
| 631 | break; |
||
| 632 | } |
||
| 633 | |||
| 634 | echo '[ { "error" : "" , "status" : "ok" } ]'; |
||
| 635 | |||
| 636 | break; |
||
| 637 | /** |
||
| 638 | * Change the personal saltkey |
||
| 639 | */ |
||
| 640 | case "change_personal_saltkey": |
||
| 641 | if (filter_input(INPUT_POST, 'key', FILTER_SANITIZE_STRING) !== $_SESSION['key']) { |
||
| 642 | echo '[{"error" : "something_wrong"}]'; |
||
| 643 | break; |
||
| 644 | } |
||
| 645 | |||
| 646 | //init |
||
| 647 | $list = ""; |
||
| 648 | $number = 0; |
||
| 649 | |||
| 650 | //decrypt and retreive data in JSON format |
||
| 651 | $dataReceived = prepareExchangedData( |
||
| 652 | filter_input(INPUT_POST, 'data_to_share', FILTER_SANITIZE_STRING), |
||
| 653 | "decode" |
||
| 654 | ); |
||
| 655 | |||
| 656 | //Prepare variables |
||
| 657 | $newPersonalSaltkey = htmlspecialchars_decode($dataReceived['sk']); |
||
| 658 | $oldPersonalSaltkey = htmlspecialchars_decode($dataReceived['old_sk']); |
||
| 659 | |||
| 660 | // check old psk |
||
| 661 | $user_key_encoded = defuse_validate_personal_key( |
||
| 662 | $oldPersonalSaltkey, |
||
| 663 | $_SESSION['user_settings']['encrypted_psk'] |
||
| 664 | ); |
||
| 665 | if (strpos($user_key_encoded, "Error ") !== false) { |
||
| 666 | echo prepareExchangedData( |
||
| 667 | array( |
||
| 668 | "list" => $list, |
||
| 669 | "error" => $user_key_encoded, |
||
| 670 | "nb_total" => $number |
||
| 671 | ), |
||
| 672 | "encode" |
||
| 673 | ); |
||
| 674 | break; |
||
| 675 | } else { |
||
| 676 | // Store PSK |
||
| 677 | $_SESSION['user_settings']['encrypted_oldpsk'] = $user_key_encoded; |
||
| 678 | } |
||
| 679 | |||
| 680 | // generate the new encrypted psk based upon clear psk |
||
| 681 | $_SESSION['user_settings']['encrypted_psk'] = defuse_generate_personal_key($newPersonalSaltkey); |
||
| 682 | |||
| 683 | // store it in DB |
||
| 684 | DB::update( |
||
| 685 | prefix_table("users"), |
||
| 686 | array( |
||
| 687 | 'encrypted_psk' => $_SESSION['user_settings']['encrypted_psk'] |
||
| 688 | ), |
||
| 689 | "id = %i", |
||
| 690 | $_SESSION['user_id'] |
||
| 691 | ); |
||
| 692 | |||
| 693 | $user_key_encoded = defuse_validate_personal_key( |
||
| 694 | $newPersonalSaltkey, |
||
| 695 | $_SESSION['user_settings']['encrypted_psk'] |
||
| 696 | ); |
||
| 697 | $_SESSION['user_settings']['session_psk'] = $user_key_encoded; |
||
| 698 | |||
| 699 | // Change encryption |
||
| 700 | // Build list of items to be re-encrypted |
||
| 701 | $rows = DB::query( |
||
| 702 | "SELECT i.id as id, i.pw as pw |
||
| 703 | FROM ".prefix_table("items")." as i |
||
| 704 | INNER JOIN ".prefix_table("log_items")." as l ON (i.id=l.id_item) |
||
| 705 | WHERE i.perso = %i AND l.id_user= %i AND l.action = %s", |
||
| 706 | "1", |
||
| 707 | $_SESSION['user_id'], |
||
| 708 | "at_creation" |
||
| 709 | ); |
||
| 710 | $number = DB::count(); |
||
| 711 | foreach ($rows as $record) { |
||
| 712 | View Code Duplication | if (!empty($record['pw'])) { |
|
| 713 | if (empty($list)) { |
||
| 714 | $list = $record['id']; |
||
| 715 | } else { |
||
| 716 | $list .= ",".$record['id']; |
||
| 717 | } |
||
| 718 | } |
||
| 719 | } |
||
| 720 | |||
| 721 | // change salt |
||
| 722 | setcookie( |
||
| 723 | "TeamPass_PFSK_".md5($_SESSION['user_id']), |
||
| 724 | encrypt($newPersonalSaltkey, ""), |
||
| 725 | time() + 60 * 60 * 24 * $SETTINGS['personal_saltkey_cookie_duration'], |
||
| 726 | '/' |
||
| 727 | ); |
||
| 728 | |||
| 729 | echo prepareExchangedData( |
||
| 730 | array( |
||
| 731 | "list" => $list, |
||
| 732 | "error" => "no", |
||
| 733 | "nb_total" => $number |
||
| 734 | ), |
||
| 735 | "encode" |
||
| 736 | ); |
||
| 737 | break; |
||
| 738 | /** |
||
| 739 | * Reset the personal saltkey |
||
| 740 | */ |
||
| 741 | case "reset_personal_saltkey": |
||
| 742 | if (filter_input(INPUT_POST, 'key', FILTER_SANITIZE_STRING) !== $_SESSION['key']) { |
||
| 743 | echo '[{"error" : "something_wrong"}]'; |
||
| 744 | break; |
||
| 745 | } |
||
| 746 | |||
| 747 | if (!empty($_SESSION['user_id'])) { |
||
| 748 | // delete all previous items of this user |
||
| 749 | $rows = DB::query( |
||
| 750 | "SELECT i.id as id |
||
| 751 | FROM ".prefix_table("items")." as i |
||
| 752 | INNER JOIN ".prefix_table("log_items")." as l ON (i.id=l.id_item) |
||
| 753 | WHERE i.perso = %i AND l.id_user= %i AND l.action = %s", |
||
| 754 | "1", |
||
| 755 | $_SESSION['user_id'], |
||
| 756 | "at_creation" |
||
| 757 | ); |
||
| 758 | foreach ($rows as $record) { |
||
| 759 | // delete in ITEMS table |
||
| 760 | DB::delete(prefix_table("items"), "id = %i", $record['id']); |
||
| 761 | // delete in LOGS table |
||
| 762 | DB::delete(prefix_table("log_items"), "id_item = %i", $record['id']); |
||
| 763 | // delete from CACHE table |
||
| 764 | updateCacheTable("delete_value", $record['id']); |
||
| 765 | } |
||
| 766 | |||
| 767 | // remove from DB |
||
| 768 | DB::update( |
||
| 769 | prefix_table("users"), |
||
| 770 | array( |
||
| 771 | 'encrypted_psk' => "" |
||
| 772 | ), |
||
| 773 | "id = %i", |
||
| 774 | $_SESSION['user_id'] |
||
| 775 | ); |
||
| 776 | |||
| 777 | $_SESSION['user_settings']['session_psk'] = ""; |
||
| 778 | } |
||
| 779 | break; |
||
| 780 | /** |
||
| 781 | * Change the user's language |
||
| 782 | */ |
||
| 783 | case "change_user_language": |
||
| 784 | if (!empty($_SESSION['user_id'])) { |
||
| 785 | // decrypt and retreive data in JSON format |
||
| 786 | $dataReceived = prepareExchangedData( |
||
| 787 | filter_input(INPUT_POST, 'data', FILTER_SANITIZE_STRING, FILTER_FLAG_NO_ENCODE_QUOTES), |
||
| 788 | "decode" |
||
| 789 | ); |
||
| 790 | // Prepare variables |
||
| 791 | $language = $dataReceived['lang']; |
||
| 792 | // update DB |
||
| 793 | DB::update( |
||
| 794 | prefix_table("users"), |
||
| 795 | array( |
||
| 796 | 'user_language' => $language |
||
| 797 | ), |
||
| 798 | "id = %i", |
||
| 799 | $_SESSION['user_id'] |
||
| 800 | ); |
||
| 801 | $_SESSION['user_language'] = $language; |
||
| 802 | echo "done"; |
||
| 803 | } else { |
||
| 804 | $_SESSION['user_language'] = ""; |
||
| 805 | echo "done"; |
||
| 806 | } |
||
| 807 | break; |
||
| 808 | /** |
||
| 809 | * Send emails not sent |
||
| 810 | */ |
||
| 811 | case "send_waiting_emails": |
||
| 812 | if (filter_input(INPUT_POST, 'key', FILTER_SANITIZE_STRING) !== $_SESSION['key']) { |
||
| 813 | echo '[ { "error" : "key_not_conform" } ]'; |
||
| 814 | break; |
||
| 815 | } |
||
| 816 | |||
| 817 | if (isset($SETTINGS['enable_send_email_on_user_login']) |
||
| 818 | && $SETTINGS['enable_send_email_on_user_login'] == 1 |
||
| 819 | && isset($_SESSION['key']) |
||
| 820 | ) { |
||
| 821 | $row = DB::queryFirstRow( |
||
| 822 | "SELECT valeur FROM ".prefix_table("misc")." WHERE type = %s AND intitule = %s", |
||
| 823 | "cron", |
||
| 824 | "sending_emails" |
||
| 825 | ); |
||
| 826 | if ((time() - $row['valeur']) >= 300 || $row['valeur'] == 0) { |
||
| 827 | //load library |
||
| 828 | require $SETTINGS['cpassman_dir'].'/includes/libraries/Email/Phpmailer/PHPMailerAutoload.php'; |
||
| 829 | // load PHPMailer |
||
| 830 | $mail = new PHPMailer(); |
||
| 831 | |||
| 832 | $mail->setLanguage("en", "../includes/libraries/Email/Phpmailer/language"); |
||
| 833 | $mail->isSmtp(); // send via SMTP |
||
| 834 | $mail->Host = $SETTINGS['email_smtp_server']; // SMTP servers |
||
| 835 | $mail->SMTPAuth = $SETTINGS['email_smtp_auth']; // turn on SMTP authentication |
||
| 836 | $mail->Username = $SETTINGS['email_auth_username']; // SMTP username |
||
| 837 | $mail->Password = $SETTINGS['email_auth_pwd']; // SMTP password |
||
| 838 | $mail->From = $SETTINGS['email_from']; |
||
| 839 | $mail->FromName = $SETTINGS['email_from_name']; |
||
| 840 | $mail->WordWrap = 80; // set word wrap |
||
| 841 | $mail->isHtml(true); // send as HTML |
||
| 842 | $rows = DB::query("SELECT * FROM ".prefix_table("emails")." WHERE status != %s", "sent"); |
||
| 843 | foreach ($rows as $record) { |
||
| 844 | // send email |
||
| 845 | $ret = json_decode( |
||
| 846 | @sendEmail( |
||
| 847 | $record['subject'], |
||
| 848 | $record['body'], |
||
| 849 | $record['receivers'] |
||
| 850 | ) |
||
| 851 | ); |
||
| 852 | |||
| 853 | if (!empty($ret['error'])) { |
||
| 854 | $status = "not_sent"; |
||
| 855 | } else { |
||
| 856 | $status = "sent"; |
||
| 857 | } |
||
| 858 | // update item_id in files table |
||
| 859 | DB::update( |
||
| 860 | prefix_table("emails"), |
||
| 861 | array( |
||
| 862 | 'status' => $status |
||
| 863 | ), |
||
| 864 | "timestamp = %s", |
||
| 865 | $record['timestamp'] |
||
| 866 | ); |
||
| 867 | if ($status == "not_sent") { |
||
| 868 | break; |
||
| 869 | } |
||
| 870 | } |
||
| 871 | } |
||
| 872 | // update cron time |
||
| 873 | DB::update( |
||
| 874 | prefix_table("misc"), |
||
| 875 | array( |
||
| 876 | 'valeur' => time() |
||
| 877 | ), |
||
| 878 | "intitule = %s AND type = %s", |
||
| 879 | "sending_emails", |
||
| 880 | "cron" |
||
| 881 | ); |
||
| 882 | } |
||
| 883 | break; |
||
| 884 | |||
| 885 | /** |
||
| 886 | * Store error |
||
| 887 | */ |
||
| 888 | case "store_error": |
||
| 889 | if (!empty($_SESSION['user_id'])) { |
||
| 890 | // update DB |
||
| 891 | logEvents( |
||
| 892 | 'error', |
||
| 893 | urldecode(filter_input(INPUT_POST, 'error', FILTER_SANITIZE_STRING)), |
||
| 894 | $_SESSION['user_id'], |
||
| 895 | $_SESSION['login'] |
||
| 896 | ); |
||
| 897 | } |
||
| 898 | break; |
||
| 899 | |||
| 900 | /** |
||
| 901 | * Generate a password generic |
||
| 902 | */ |
||
| 903 | case "generate_a_password": |
||
| 904 | View Code Duplication | if (filter_input(INPUT_POST, 'size', FILTER_SANITIZE_NUMBER_INT) > $SETTINGS['pwd_maximum_length']) { |
|
| 905 | echo prepareExchangedData( |
||
| 906 | array( |
||
| 907 | "error_msg" => "Password length is too long!", |
||
| 908 | "error" => "true" |
||
| 909 | ), |
||
| 910 | "encode" |
||
| 911 | ); |
||
| 912 | break; |
||
| 913 | } |
||
| 914 | |||
| 915 | //Load PWGEN |
||
| 916 | $pwgen = new SplClassLoader('Encryption\PwGen', '../includes/libraries'); |
||
| 917 | $pwgen->register(); |
||
| 918 | $pwgen = new Encryption\PwGen\pwgen(); |
||
| 919 | |||
| 920 | $pwgen->setLength(filter_input(INPUT_POST, 'size', FILTER_SANITIZE_NUMBER_INT)); |
||
| 921 | if (null !== filter_input(INPUT_POST, 'secure', FILTER_SANITIZE_STRING) |
||
| 922 | && filter_input(INPUT_POST, 'secure', FILTER_SANITIZE_STRING) === "true" |
||
| 923 | ) { |
||
| 924 | $pwgen->setSecure(true); |
||
| 925 | $pwgen->setSymbols(true); |
||
| 926 | $pwgen->setCapitalize(true); |
||
| 927 | $pwgen->setNumerals(true); |
||
| 928 | } else { |
||
| 929 | $pwgen->setSecure((filter_input(INPUT_POST, 'secure', FILTER_SANITIZE_STRING) === "true") ? true : false); |
||
| 930 | $pwgen->setNumerals((filter_input(INPUT_POST, 'numerals', FILTER_SANITIZE_STRING) === "true") ? true : false); |
||
| 931 | $pwgen->setCapitalize((filter_input(INPUT_POST, 'capitalize', FILTER_SANITIZE_STRING) === "true") ? true : false); |
||
| 932 | $pwgen->setSymbols((filter_input(INPUT_POST, 'symbols', FILTER_SANITIZE_STRING) === "true") ? true : false); |
||
| 933 | } |
||
| 934 | |||
| 935 | echo prepareExchangedData( |
||
| 936 | array( |
||
| 937 | "key" => $pwgen->generate(), |
||
| 938 | "error" => "" |
||
| 939 | ), |
||
| 940 | "encode" |
||
| 941 | ); |
||
| 942 | break; |
||
| 943 | /** |
||
| 944 | * Check if user exists and send back if psk is set |
||
| 945 | */ |
||
| 946 | case "check_login_exists": |
||
| 947 | $data = DB::query( |
||
| 948 | "SELECT login, psk FROM ".prefix_table("users")." |
||
| 949 | WHERE login = %i", |
||
| 950 | mysqli_escape_string($link, stripslashes(filter_input(INPUT_POST, 'userId', FILTER_SANITIZE_NUMBER_INT))) |
||
| 951 | ); |
||
| 952 | if (empty($data['login'])) { |
||
| 953 | $userOk = false; |
||
| 954 | } else { |
||
| 955 | $userOk = true; |
||
| 956 | } |
||
| 957 | if (isset($SETTINGS['psk_authentication']) && $SETTINGS['psk_authentication'] == 1 |
||
| 958 | && !empty($data['psk']) |
||
| 959 | ) { |
||
| 960 | $pskSet = true; |
||
| 961 | } else { |
||
| 962 | $pskSet = false; |
||
| 963 | } |
||
| 964 | |||
| 965 | echo '[{"login" : "'.$userOk.'", "psk":"'.$pskSet.'"}]'; |
||
| 966 | break; |
||
| 967 | /** |
||
| 968 | * Make statistics on item |
||
| 969 | */ |
||
| 970 | case "item_stat": |
||
| 971 | if (null !== filter_input(INPUT_POST, 'scope', FILTER_SANITIZE_STRING) |
||
| 972 | && filter_input(INPUT_POST, 'scope', FILTER_SANITIZE_STRING) === "item" |
||
| 973 | ) { |
||
| 974 | $data = DB::queryfirstrow( |
||
| 975 | "SELECT view FROM ".prefix_table("statistics")." WHERE scope = %s AND item_id = %i", |
||
| 976 | 'item', |
||
| 977 | filter_input(INPUT_POST, 'id', FILTER_SANITIZE_NUMBER_INT) |
||
| 978 | ); |
||
| 979 | $counter = DB::count(); |
||
| 980 | if ($counter == 0) { |
||
| 981 | DB::insert( |
||
| 982 | prefix_table("statistics"), |
||
| 983 | array( |
||
| 984 | 'scope' => 'item', |
||
| 985 | 'view' => '1', |
||
| 986 | 'item_id' => filter_input(INPUT_POST, 'id', FILTER_SANITIZE_NUMBER_INT) |
||
| 987 | ) |
||
| 988 | ); |
||
| 989 | } else { |
||
| 990 | DB::update( |
||
| 991 | prefix_table("statistics"), |
||
| 992 | array( |
||
| 993 | 'scope' => 'item', |
||
| 994 | 'view' => $data['view'] + 1 |
||
| 995 | ), |
||
| 996 | "item_id = %i", |
||
| 997 | filter_input(INPUT_POST, 'id', FILTER_SANITIZE_NUMBER_INT) |
||
| 998 | ); |
||
| 999 | } |
||
| 1000 | } |
||
| 1001 | |||
| 1002 | break; |
||
| 1003 | /** |
||
| 1004 | * Refresh list of last items seen |
||
| 1005 | */ |
||
| 1006 | case "refresh_list_items_seen": |
||
| 1007 | if (filter_input(INPUT_POST, 'key', FILTER_SANITIZE_STRING) !== $_SESSION['key']) { |
||
| 1008 | echo '[ { "error" : "key_not_conform" } ]'; |
||
| 1009 | break; |
||
| 1010 | } |
||
| 1011 | |||
| 1012 | // get list of last items seen |
||
| 1013 | $x_counter = 1; |
||
| 1014 | $return = ""; |
||
| 1015 | $arrTmp = array(); |
||
| 1016 | $arr_html = array(); |
||
| 1017 | $rows = DB::query( |
||
| 1018 | "SELECT i.id AS id, i.label AS label, i.id_tree AS id_tree, l.date |
||
| 1019 | FROM ".prefix_table("log_items")." AS l |
||
| 1020 | RIGHT JOIN ".prefix_table("items")." AS i ON (l.id_item = i.id) |
||
| 1021 | WHERE l.action = %s AND l.id_user = %i |
||
| 1022 | ORDER BY l.date DESC |
||
| 1023 | LIMIT 0, 100", |
||
| 1024 | "at_shown", |
||
| 1025 | $_SESSION['user_id'] |
||
| 1026 | ); |
||
| 1027 | if (DB::count() > 0) { |
||
| 1028 | foreach ($rows as $record) { |
||
| 1029 | if (!in_array($record['id'], $arrTmp)) { |
||
| 1030 | array_push( |
||
| 1031 | $arr_html, |
||
| 1032 | array( |
||
| 1033 | "id" => $record['id'], |
||
| 1034 | "label" => htmlspecialchars(stripslashes(htmlspecialchars_decode($record['label'], ENT_QUOTES)), ENT_QUOTES), |
||
| 1035 | "tree_id" => $record['id_tree'] |
||
| 1036 | ) |
||
| 1037 | ); |
||
| 1038 | $x_counter++; |
||
| 1039 | array_push($arrTmp, $record['id']); |
||
| 1040 | if ($x_counter >= 10) { |
||
| 1041 | break; |
||
| 1042 | } |
||
| 1043 | } |
||
| 1044 | } |
||
| 1045 | } |
||
| 1046 | |||
| 1047 | // get wainting suggestions |
||
| 1048 | $nb_suggestions_waiting = 0; |
||
| 1049 | if (isset($SETTINGS['enable_suggestion']) && $SETTINGS['enable_suggestion'] == 1 |
||
| 1050 | && ($_SESSION['user_admin'] == 1 || $_SESSION['user_manager'] == 1) |
||
| 1051 | ) { |
||
| 1052 | DB::query("SELECT * FROM ".prefix_table("suggestion")); |
||
| 1053 | $nb_suggestions_waiting = DB::count(); |
||
| 1054 | } |
||
| 1055 | |||
| 1056 | echo json_encode( |
||
| 1057 | array( |
||
| 1058 | "error" => "", |
||
| 1059 | "existing_suggestions" => $nb_suggestions_waiting, |
||
| 1060 | "html_json" => $arr_html |
||
| 1061 | ), |
||
| 1062 | JSON_HEX_TAG | JSON_HEX_APOS | JSON_HEX_QUOT | JSON_HEX_AMP |
||
| 1063 | ); |
||
| 1064 | break; |
||
| 1065 | |||
| 1066 | /** |
||
| 1067 | * Generates a KEY with CRYPT |
||
| 1068 | */ |
||
| 1069 | case "generate_new_key": |
||
| 1070 | // load passwordLib library |
||
| 1071 | $pwdlib = new SplClassLoader('PasswordLib', '../includes/libraries'); |
||
| 1072 | $pwdlib->register(); |
||
| 1073 | $pwdlib = new PasswordLib\PasswordLib(); |
||
| 1074 | // generate key |
||
| 1075 | $key = $pwdlib->getRandomToken(filter_input(INPUT_POST, 'size', FILTER_SANITIZE_NUMBER_INT)); |
||
| 1076 | echo '[{"key" : "'.htmlentities($key, ENT_QUOTES).'"}]'; |
||
| 1077 | break; |
||
| 1078 | |||
| 1079 | /** |
||
| 1080 | * Generates a TOKEN with CRYPT |
||
| 1081 | */ |
||
| 1082 | case "save_token": |
||
| 1083 | $token = GenerateCryptKey( |
||
| 1084 | null !== filter_input(INPUT_POST, 'size', FILTER_SANITIZE_NUMBER_INT) ? filter_input(INPUT_POST, 'size', FILTER_SANITIZE_NUMBER_INT) : 20, |
||
| 1085 | null !== filter_input(INPUT_POST, 'secure', FILTER_SANITIZE_STRING) ? filter_input(INPUT_POST, 'secure', FILTER_SANITIZE_STRING) : false, |
||
| 1086 | null !== filter_input(INPUT_POST, 'capital', FILTER_SANITIZE_STRING) ? filter_input(INPUT_POST, 'capital', FILTER_SANITIZE_STRING) : false, |
||
| 1087 | null !== filter_input(INPUT_POST, 'numeric', FILTER_SANITIZE_STRING) ? filter_input(INPUT_POST, 'numeric', FILTER_SANITIZE_STRING) : false, |
||
| 1088 | null !== filter_input(INPUT_POST, 'ambiguous', FILTER_SANITIZE_STRING) ? filter_input(INPUT_POST, 'ambiguous', FILTER_SANITIZE_STRING) : false, |
||
| 1089 | null !== filter_input(INPUT_POST, 'symbols', FILTER_SANITIZE_STRING) ? filter_input(INPUT_POST, 'symbols', FILTER_SANITIZE_STRING) : false |
||
| 1090 | ); |
||
| 1091 | |||
| 1092 | // store in DB |
||
| 1093 | DB::insert( |
||
| 1094 | prefix_table("tokens"), |
||
| 1095 | array( |
||
| 1096 | 'user_id' => $_SESSION['user_id'], |
||
| 1097 | 'token' => $token, |
||
| 1098 | 'reason' => filter_input(INPUT_POST, 'reason', FILTER_SANITIZE_STRING), |
||
| 1099 | 'creation_timestamp' => time(), |
||
| 1100 | 'end_timestamp' => time() + filter_input(INPUT_POST, 'duration', FILTER_SANITIZE_NUMBER_INT) // in secs |
||
| 1101 | ) |
||
| 1102 | ); |
||
| 1103 | |||
| 1104 | echo '[{"token" : "'.$token.'"}]'; |
||
| 1105 | break; |
||
| 1106 | |||
| 1107 | /** |
||
| 1108 | * Create list of timezones |
||
| 1109 | */ |
||
| 1110 | case "generate_timezones_list": |
||
| 1111 | $array = array(); |
||
| 1112 | foreach (timezone_identifiers_list() as $zone) { |
||
| 1113 | $array[$zone] = $zone; |
||
| 1114 | } |
||
| 1115 | |||
| 1116 | echo json_encode($array); |
||
| 1117 | break; |
||
| 1118 | |||
| 1119 | /** |
||
| 1120 | * Check if suggestions are existing |
||
| 1121 | */ |
||
| 1122 | case "is_existings_suggestions": |
||
| 1123 | if (filter_input(INPUT_POST, 'key', FILTER_SANITIZE_STRING) !== $_SESSION['key']) { |
||
| 1124 | echo '[ { "error" : "key_not_conform" } ]'; |
||
| 1125 | break; |
||
| 1126 | } |
||
| 1127 | |||
| 1128 | if ($_SESSION['user_manager'] === "1" || $_SESSION['is_admin'] === "1") { |
||
| 1129 | $count = 0; |
||
| 1130 | DB::query("SELECT * FROM ".$pre."items_change"); |
||
| 1131 | $count += DB::count(); |
||
| 1132 | DB::query("SELECT * FROM ".$pre."suggestion"); |
||
| 1133 | $count += DB::count(); |
||
| 1134 | |||
| 1135 | echo '[ { "error" : "" , "count" : "'.$count.'" , "show_sug_in_menu" : "0"} ]'; |
||
| 1136 | } elseif (isset($_SESSION['nb_item_change_proposals']) && $_SESSION['nb_item_change_proposals'] > 0) { |
||
| 1137 | echo '[ { "error" : "" , "count" : "'.$_SESSION['nb_item_change_proposals'].'" , "show_sug_in_menu" : "1"} ]'; |
||
| 1138 | } else { |
||
| 1139 | echo '[ { "error" : "" , "count" : "" , "show_sug_in_menu" : "0"} ]'; |
||
| 1140 | } |
||
| 1141 | |||
| 1142 | break; |
||
| 1143 | |||
| 1144 | /** |
||
| 1145 | * Check if suggestions are existing |
||
| 1146 | */ |
||
| 1147 | case "sending_statistics": |
||
| 1148 | if (filter_input(INPUT_POST, 'key', FILTER_SANITIZE_STRING) !== $_SESSION['key']) { |
||
| 1149 | echo '[ { "error" : "key_not_conform" } ]'; |
||
| 1150 | break; |
||
| 1151 | } |
||
| 1152 | |||
| 1153 | if (isset($SETTINGS['send_statistics_items']) && isset($SETTINGS['send_stats']) && isset($SETTINGS['send_stats_time']) |
||
| 1154 | && $SETTINGS['send_stats'] === "1" |
||
| 1155 | && ($SETTINGS['send_stats_time'] + $SETTINGS_EXT['one_day_seconds']) > time() |
||
| 1156 | ) { |
||
| 1157 | // get statistics data |
||
| 1158 | $stats_data = getStatisticsData(); |
||
| 1159 | |||
| 1160 | |||
| 1161 | // get statistics items to share |
||
| 1162 | $statsToSend = []; |
||
| 1163 | $statsToSend['ip'] = $_SERVER['SERVER_ADDR']; |
||
| 1164 | $statsToSend['timestamp'] = time(); |
||
| 1165 | foreach (array_filter(explode(";", $SETTINGS['send_statistics_items'])) as $data) { |
||
| 1166 | if ($data === "stat_languages") { |
||
| 1167 | $tmp = ""; |
||
| 1168 | View Code Duplication | foreach ($stats_data[$data] as $key => $value) { |
|
| 1169 | if (empty($tmp)) { |
||
| 1170 | $tmp = $key."-".$value; |
||
| 1171 | } else { |
||
| 1172 | $tmp .= ",".$key."-".$value; |
||
| 1173 | } |
||
| 1174 | } |
||
| 1175 | $statsToSend[$data] = $tmp; |
||
| 1176 | } elseif ($data === "stat_country") { |
||
| 1177 | $tmp = ""; |
||
| 1178 | View Code Duplication | foreach ($stats_data[$data] as $key => $value) { |
|
| 1179 | if (empty($tmp)) { |
||
| 1180 | $tmp = $key."-".$value; |
||
| 1181 | } else { |
||
| 1182 | $tmp .= ",".$key."-".$value; |
||
| 1183 | } |
||
| 1184 | } |
||
| 1185 | $statsToSend[$data] = $tmp; |
||
| 1186 | } else { |
||
| 1187 | $statsToSend[$data] = $stats_data[$data]; |
||
| 1188 | } |
||
| 1189 | } |
||
| 1190 | |||
| 1191 | // connect to Teampass Statistics database |
||
| 1192 | db::debugmode(true); |
||
| 1193 | $link2 = new MeekroDB( |
||
| 1194 | "sql11.freemysqlhosting.net", |
||
| 1195 | "sql11197223", |
||
| 1196 | "3QzpXYQ9dZ", |
||
| 1197 | "sql11197223", |
||
| 1198 | "3306", |
||
| 1199 | "utf8" |
||
| 1200 | ); |
||
| 1201 | |||
| 1202 | $link2->insert( |
||
| 1203 | "statistics", |
||
| 1204 | $statsToSend |
||
| 1205 | ); |
||
| 1206 | |||
| 1207 | // update table misc with current timestamp |
||
| 1208 | DB::update( |
||
| 1209 | prefix_table("misc"), |
||
| 1210 | array( |
||
| 1211 | 'valeur' => time() |
||
| 1212 | ), |
||
| 1213 | "type = %s AND intitule = %s", |
||
| 1214 | 'admin', |
||
| 1215 | 'send_stats_time' |
||
| 1216 | ); |
||
| 1217 | |||
| 1218 | |||
| 1219 | //permits to test only once by session |
||
| 1220 | $_SESSION['temporary']['send_stats_done'] = true; |
||
| 1221 | $SETTINGS['send_stats_time'] = time(); |
||
| 1222 | |||
| 1223 | // save change in config file |
||
| 1224 | handleConfigFile("update", 'send_stats_time', $SETTINGS['send_stats_time']); |
||
| 1225 | |||
| 1226 | echo '[ { "error" : "" , "done" : "1"} ]'; |
||
| 1227 | } else { |
||
| 1228 | echo '[ { "error" : "" , "done" : "0"} ]'; |
||
| 1229 | } |
||
| 1230 | |||
| 1231 | break; |
||
| 1232 | |||
| 1233 | /** |
||
| 1234 | * delete a file |
||
| 1235 | */ |
||
| 1236 | case "file_deletion": |
||
| 1237 | if (filter_input(INPUT_POST, 'key', FILTER_SANITIZE_STRING) !== $_SESSION['key']) { |
||
| 1238 | echo '[ { "error" : "key_not_conform" } ]'; |
||
| 1239 | break; |
||
| 1240 | } |
||
| 1241 | |||
| 1242 | fileDelete(filter_input(INPUT_POST, 'filename', FILTER_SANITIZE_STRING)); |
||
| 1243 | |||
| 1244 | break; |
||
| 1245 | } |
||
| 1246 | } |
||
| 1247 |
This check looks for variable assignements that are either overwritten by other assignments or where the variable is not used subsequently.
Both the
$myVarassignment in line 1 and the$higherassignment in line 2 are dead. The first because$myVaris never used and the second because$higheris always overwritten for every possible time line.