nilsteampassnet /
TeamPass
This project does not seem to handle request data directly as such no vulnerable execution paths were found.
include, or for example
via PHP's auto-loading mechanism.
| 1 | <?php |
||
| 2 | |||
| 3 | declare(strict_types=1); |
||
| 4 | |||
| 5 | /** |
||
| 6 | * Teampass - a collaborative passwords manager. |
||
| 7 | * --- |
||
| 8 | * This file is part of the TeamPass project. |
||
| 9 | * |
||
| 10 | * TeamPass is free software: you can redistribute it and/or modify it |
||
| 11 | * under the terms of the GNU General Public License as published by |
||
| 12 | * the Free Software Foundation, version 3 of the License. |
||
| 13 | * |
||
| 14 | * TeamPass is distributed in the hope that it will be useful, |
||
| 15 | * but WITHOUT ANY WARRANTY; without even the implied warranty of |
||
| 16 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
||
| 17 | * GNU General Public License for more details. |
||
| 18 | * |
||
| 19 | * You should have received a copy of the GNU General Public License |
||
| 20 | * along with this program. If not, see <https://www.gnu.org/licenses/>. |
||
| 21 | * |
||
| 22 | * Certain components of this file may be under different licenses. For |
||
| 23 | * details, see the `licenses` directory or individual file headers. |
||
| 24 | * --- |
||
| 25 | * @file upload.attachments.php |
||
| 26 | * @author Nils Laumaillé ([email protected]) |
||
| 27 | * @copyright 2009-2025 Teampass.net |
||
| 28 | * @license GPL-3.0 |
||
| 29 | * @see https://www.teampass.net |
||
| 30 | */ |
||
| 31 | |||
| 32 | use Symfony\Component\HttpFoundation\Request as RequestLocal; |
||
| 33 | use TeampassClasses\SessionManager\SessionManager; |
||
| 34 | use TeampassClasses\Language\Language; |
||
| 35 | use TeampassClasses\PerformChecks\PerformChecks; |
||
| 36 | use TeampassClasses\ConfigManager\ConfigManager; |
||
| 37 | |||
| 38 | |||
| 39 | // Load functions |
||
| 40 | require_once 'main.functions.php'; |
||
| 41 | $session = SessionManager::getSession(); |
||
| 42 | $request = RequestLocal::createFromGlobals(); |
||
| 43 | // init |
||
| 44 | loadClasses('DB'); |
||
| 45 | $lang = new Language(); |
||
| 46 | |||
| 47 | // Load config if $SETTINGS not defined |
||
| 48 | if (empty($SETTINGS)) { |
||
| 49 | $configManager = new ConfigManager(); |
||
| 50 | $SETTINGS = $configManager->getAllSettings(); |
||
| 51 | } |
||
| 52 | |||
| 53 | // Do checks |
||
| 54 | // Instantiate the class with posted data |
||
| 55 | $checkUserAccess = new PerformChecks( |
||
| 56 | dataSanitizer( |
||
| 57 | [ |
||
| 58 | 'type' => htmlspecialchars($request->request->get('type', ''), ENT_QUOTES, 'UTF-8'), |
||
| 59 | ], |
||
| 60 | [ |
||
| 61 | 'type' => 'trim|escape', |
||
| 62 | ], |
||
| 63 | ), |
||
| 64 | [ |
||
| 65 | 'user_id' => returnIfSet($session->get('user-id'), null), |
||
| 66 | 'user_key' => returnIfSet($session->get('key'), null), |
||
| 67 | ] |
||
| 68 | ); |
||
| 69 | // Handle the case |
||
| 70 | echo $checkUserAccess->caseHandler(); |
||
| 71 | if ( |
||
| 72 | $checkUserAccess->userAccessPage('items') === false || |
||
| 73 | $checkUserAccess->checkSession() === false |
||
| 74 | ) { |
||
| 75 | // Not allowed page |
||
| 76 | $session->set('system-error_code', ERR_NOT_ALLOWED); |
||
| 77 | include $SETTINGS['cpassman_dir'] . '/error.php'; |
||
| 78 | exit; |
||
| 79 | } |
||
| 80 | |||
| 81 | // Define Timezone |
||
| 82 | date_default_timezone_set($SETTINGS['timezone'] ?? 'UTC'); |
||
| 83 | |||
| 84 | // Set header properties |
||
| 85 | header('Content-type: text/html; charset=utf-8'); |
||
| 86 | header('Cache-Control: no-cache, no-store, must-revalidate'); |
||
| 87 | error_reporting(E_ERROR); |
||
| 88 | set_time_limit(0); |
||
| 89 | |||
| 90 | // --------------------------------- // |
||
| 91 | |||
| 92 | //check for session |
||
| 93 | if (null !== $request->request->filter('PHPSESSID', null, FILTER_SANITIZE_FULL_SPECIAL_CHARS)) { |
||
| 94 | session_id($request->request->filter('PHPSESSID', null, FILTER_SANITIZE_FULL_SPECIAL_CHARS)); |
||
| 95 | } elseif (null !== $request->query->get('PHPSESSID')) { |
||
| 96 | session_id(filter_var($request->query->get('PHPSESSID'), FILTER_SANITIZE_FULL_SPECIAL_CHARS)); |
||
| 97 | } else { |
||
| 98 | handleAttachmentError('No Session was found.', 100); |
||
| 99 | } |
||
| 100 | |||
| 101 | // Prepare POST variables |
||
| 102 | $post_user_token = $request->request->filter('user_upload_token', null, FILTER_SANITIZE_FULL_SPECIAL_CHARS); |
||
| 103 | $post_type_upload = $request->request->filter('type_upload', null, FILTER_SANITIZE_FULL_SPECIAL_CHARS); |
||
| 104 | $post_itemId = $request->request->filter('itemId', null, FILTER_SANITIZE_NUMBER_INT); |
||
| 105 | $post_files_number = $request->request->filter('files_number', null, FILTER_SANITIZE_NUMBER_INT); |
||
| 106 | $post_timezone = $request->request->filter('timezone', null, FILTER_SANITIZE_FULL_SPECIAL_CHARS); |
||
| 107 | $post_isNewItem = $request->request->filter('isNewItem', null, FILTER_SANITIZE_NUMBER_INT); |
||
| 108 | $post_randomId = $request->request->filter('randomId', null, FILTER_SANITIZE_NUMBER_INT); |
||
| 109 | $post_isPersonal = $request->request->filter('isPersonal', null, FILTER_SANITIZE_NUMBER_INT); |
||
| 110 | $post_fileSize= $request->request->filter('file_size', null, FILTER_SANITIZE_NUMBER_INT); |
||
| 111 | $chunk = $request->request->filter('chunk', 0, FILTER_SANITIZE_NUMBER_INT); |
||
| 112 | $chunks = $request->request->filter('chunks', 0, FILTER_SANITIZE_NUMBER_INT); |
||
| 113 | $fileName = $request->request->filter('name', '', FILTER_SANITIZE_FULL_SPECIAL_CHARS); |
||
| 114 | |||
| 115 | // token check |
||
| 116 | if (null === $post_user_token) { |
||
| 117 | handleAttachmentError('No user token found.', 110); |
||
| 118 | exit(); |
||
| 119 | } else { |
||
| 120 | // Check post_max_size |
||
| 121 | $POST_MAX_SIZE = ini_get('post_max_size'); |
||
| 122 | $unit = strtoupper(substr(trim($POST_MAX_SIZE), -1)); // Assurez-vous de bien gérer les espaces éventuels |
||
| 123 | $units = ['G' => 1073741824, 'M' => 1048576, 'K' => 1024]; |
||
| 124 | $multiplier = $units[$unit] ?? 1; // Vérifie si l'unité est dans le tableau, sinon 1 |
||
| 125 | $maxSize = (int)$POST_MAX_SIZE * $multiplier; |
||
| 126 | |||
| 127 | // CHeck if the POST is too big |
||
| 128 | if (!empty($_SERVER['CONTENT_LENGTH']) && (int)$_SERVER['CONTENT_LENGTH'] > $maxSize && $maxSize > 0) { |
||
| 129 | handleAttachmentError('POST exceeded maximum allowed size.', 111, 413); |
||
| 130 | } |
||
| 131 | |||
| 132 | // CHeck if file size is too big |
||
| 133 | if ($post_fileSize > $maxSize && $maxSize > 0) { |
||
| 134 | handleAttachmentError('File exceeds the maximum allowed size', 120, 413); |
||
| 135 | die(); |
||
| 136 | } |
||
| 137 | if (WIP === true) error_log('POST_MAX_SIZE: ' . $POST_MAX_SIZE." - CONTENT_LENGTH: ".$_SERVER['CONTENT_LENGTH']." - UNIT: ".$unit." - MAX: ".$maxSize." - MULTIPLIER: ".$multiplier." - FILE_SIZE: ".$post_fileSize); |
||
| 138 | |||
| 139 | // delete expired tokens |
||
| 140 | DB::delete(prefixTable('tokens'), 'end_timestamp < %i', time()); |
||
| 141 | |||
| 142 | if ( |
||
| 143 | null !== $session->get($post_user_token) |
||
| 144 | && ($chunk < $chunks - 1) |
||
| 145 | && $session->get($post_user_token) >= 0 |
||
| 146 | ) { |
||
| 147 | // increase end_timestamp for token |
||
| 148 | DB::update( |
||
| 149 | prefixTable('tokens'), |
||
| 150 | array( |
||
| 151 | 'end_timestamp' => time() + 10, |
||
| 152 | ), |
||
| 153 | 'user_id = %i AND token = %s', |
||
| 154 | $session->get('user-id'), |
||
| 155 | $post_user_token |
||
| 156 | ); |
||
| 157 | } else { |
||
| 158 | // create a session if several files to upload |
||
| 159 | if ( |
||
| 160 | null === $session->get($post_user_token) |
||
| 161 | || empty($session->get($post_user_token)) === true |
||
| 162 | || (int) $session->get($post_user_token) === 0 |
||
| 163 | ) { |
||
| 164 | $session->set($post_user_token, $post_files_number); |
||
| 165 | } elseif ((int) $session->get($post_user_token) > 0) { |
||
| 166 | // increase end_timestamp for token |
||
| 167 | DB::update( |
||
| 168 | prefixTable('tokens'), |
||
| 169 | array( |
||
| 170 | 'end_timestamp' => time() + 30, |
||
| 171 | ), |
||
| 172 | 'user_id = %i AND token = %s', |
||
| 173 | $session->get('user-id'), |
||
| 174 | $post_user_token |
||
| 175 | ); |
||
| 176 | // decrease counter of files to upload |
||
| 177 | $session->set($post_user_token, $session->get($post_user_token) - 1); |
||
| 178 | } else { |
||
| 179 | // no more files to upload, kill session |
||
| 180 | $session->remove($post_user_token); |
||
| 181 | handleAttachmentError('No user token found.', 110); |
||
| 182 | die(); |
||
| 183 | } |
||
| 184 | |||
| 185 | // check if token is expired |
||
| 186 | $data = DB::queryFirstRow( |
||
| 187 | 'SELECT end_timestamp |
||
| 188 | FROM ' . prefixTable('tokens') . ' |
||
| 189 | WHERE user_id = %i AND token = %s', |
||
| 190 | $session->get('user-id'), |
||
| 191 | $post_user_token |
||
| 192 | ); |
||
| 193 | // clear user token |
||
| 194 | if ((int) $session->get($post_user_token) === 0) { |
||
| 195 | DB::delete( |
||
| 196 | prefixTable('tokens'), |
||
| 197 | 'user_id = %i AND token = %s', |
||
| 198 | $session->get('user-id'), |
||
| 199 | $post_user_token |
||
| 200 | ); |
||
| 201 | $session->remove($post_user_token); |
||
| 202 | } |
||
| 203 | |||
| 204 | if (time() > $data['end_timestamp']) { |
||
| 205 | // too old |
||
| 206 | $session->remove($post_user_token); |
||
| 207 | handleAttachmentError('User token expired.', 110); |
||
| 208 | die(); |
||
| 209 | } |
||
| 210 | } |
||
| 211 | |||
| 212 | // Load Settings |
||
| 213 | if (empty($SETTINGS)) { |
||
| 214 | $configManager = new ConfigManager(); |
||
| 215 | $SETTINGS = $configManager->getAllSettings(); |
||
| 216 | } |
||
| 217 | } |
||
| 218 | |||
| 219 | // HTTP headers for no cache etc |
||
| 220 | header('Expires: Mon, 26 Jul 1997 05:00:00 GMT'); |
||
| 221 | header('Last-Modified: ' . gmdate('D, d M Y H:i:s') . ' GMT'); |
||
| 222 | header('Cache-Control: no-store, no-cache, must-revalidate'); |
||
| 223 | header('Cache-Control: post-check=0, pre-check=0', false); |
||
| 224 | |||
| 225 | $targetDir = $SETTINGS['path_to_upload_folder']; |
||
| 226 | |||
| 227 | $cleanupTargetDir = true; // Remove old files |
||
| 228 | $maxFileAge = 5 * 3600; // Temp file age in seconds |
||
| 229 | $MAX_FILENAME_LENGTH = 260; |
||
| 230 | $max_file_size_in_bytes = 2147483647; //2Go |
||
| 231 | |||
| 232 | if (null !== $post_timezone) { |
||
| 233 | date_default_timezone_set($post_timezone); |
||
| 234 | } |
||
| 235 | |||
| 236 | // Validate the file size (Warning: the largest files supported by this code is 2GB) |
||
| 237 | $file_size = @filesize($_FILES['file']['tmp_name']); |
||
| 238 | if ($file_size === false || (int) $file_size > (int) $max_file_size_in_bytes) { |
||
| 239 | handleAttachmentError('File exceeds the maximum allowed size', 120, 413); |
||
| 240 | } |
||
| 241 | if ($file_size <= 0) { |
||
| 242 | handleAttachmentError('File size outside allowed lower bound', 112); |
||
| 243 | } |
||
| 244 | |||
| 245 | // Validate the upload |
||
| 246 | if (!isset($_FILES['file'])) { |
||
| 247 | handleAttachmentError('No upload found in $_FILES for Filedata', 121); |
||
| 248 | } elseif (isset($_FILES['file']['error']) && $_FILES['file']['error'] != 0) { |
||
| 249 | handleAttachmentError($_FILES['Filedata']['error'], 122); |
||
| 250 | } elseif (!isset($_FILES['file']['tmp_name']) || !@is_uploaded_file($_FILES['file']['tmp_name'])) { |
||
| 251 | handleAttachmentError('Upload failed is_uploaded_file test.', 123); |
||
| 252 | } elseif (!isset($_FILES['file']['name'])) { |
||
| 253 | handleAttachmentError('File has no name.', 113); |
||
| 254 | } |
||
| 255 | |||
| 256 | // Validate file name (for our purposes we'll just remove invalid characters) |
||
| 257 | $file_name = preg_replace('[^A-Za-z0-9]', '', strtolower(basename($_FILES['file']['name']))); |
||
| 258 | if (strlen($file_name) == 0 || strlen($file_name) > $MAX_FILENAME_LENGTH) { |
||
| 259 | handleAttachmentError('Invalid file name: ' . $file_name . '.', 114); |
||
| 260 | } |
||
| 261 | |||
| 262 | // Validate file extension |
||
| 263 | $ext = strtolower(getFileExtension($_REQUEST['name'])); |
||
| 264 | |||
| 265 | // Check if we should enforce extensions |
||
| 266 | if (($SETTINGS['upload_all_extensions_file'] ?? '0') !== '1') { |
||
| 267 | if ( |
||
| 268 | in_array( |
||
| 269 | $ext, |
||
| 270 | explode( |
||
| 271 | ',', |
||
| 272 | $SETTINGS['upload_docext'] . ',' . $SETTINGS['upload_imagesext'] . |
||
| 273 | ',' . $SETTINGS['upload_pkgext'] . ',' . $SETTINGS['upload_otherext'] |
||
| 274 | ) |
||
| 275 | ) === false |
||
| 276 | ) { |
||
| 277 | handleAttachmentError('Invalid file extension.', 115, 415); |
||
| 278 | } |
||
| 279 | } |
||
| 280 | |||
| 281 | // 5 minutes execution time |
||
| 282 | set_time_limit(5 * 60); |
||
| 283 | |||
| 284 | // Clean the fileName for security reasons |
||
| 285 | $fileInfo = pathinfo($fileName); |
||
| 286 | $fileName = base64_encode($fileInfo['filename']) . '.' . $fileInfo['extension']; |
||
| 287 | $fileFullSize = 0; |
||
| 288 | |||
| 289 | // Make sure the fileName is unique but only if chunking is disabled |
||
| 290 | if ($chunks < 2 && file_exists($targetDir . DIRECTORY_SEPARATOR . $fileName)) { |
||
| 291 | $ext = strrpos($fileName, '.'); |
||
| 292 | $fileNameA = substr($fileName, 0, $ext); |
||
| 293 | $fileNameB = substr($fileName, $ext); |
||
| 294 | |||
| 295 | $count = 1; |
||
| 296 | while (file_exists($targetDir . DIRECTORY_SEPARATOR . $fileNameA . '_' . $count . $fileNameB)) { |
||
| 297 | ++$count; |
||
| 298 | } |
||
| 299 | |||
| 300 | $fileName = $fileNameA . '_' . $count . $fileNameB; |
||
| 301 | } |
||
| 302 | |||
| 303 | $filePath = $targetDir . DIRECTORY_SEPARATOR . $fileName; |
||
| 304 | |||
| 305 | // Create target dir |
||
| 306 | if (file_exists($targetDir) === false) { |
||
| 307 | try { |
||
| 308 | mkdir($targetDir, 0777, true); |
||
| 309 | } catch (Exception $e) { |
||
| 310 | print_r($e); |
||
| 311 | } |
||
| 312 | } |
||
| 313 | |||
| 314 | // Remove old temp files |
||
| 315 | if ($cleanupTargetDir && is_dir($targetDir) && ($dir = opendir($targetDir))) { |
||
| 316 | while (($file = readdir($dir)) !== false) { |
||
| 317 | $tmpfilePath = $targetDir . DIRECTORY_SEPARATOR . $file; |
||
| 318 | |||
| 319 | // Remove temp file if it is older than the max age and is not the current file |
||
| 320 | if ( |
||
| 321 | preg_match('/\.part$/', $file) |
||
| 322 | && (filemtime($tmpfilePath) < time() - $maxFileAge) |
||
| 323 | && ($tmpfilePath != "{$filePath}.part") |
||
| 324 | ) { |
||
| 325 | fileDelete($tmpfilePath, $SETTINGS); |
||
| 326 | } |
||
| 327 | } |
||
| 328 | |||
| 329 | closedir($dir); |
||
| 330 | } else { |
||
| 331 | die('{"jsonrpc" : "2.0", "error" : {"code": 100, "message": "Failed to open temp directory."}, "id" : "id"}'); |
||
| 332 | } |
||
| 333 | |||
| 334 | // Look for the content type header |
||
| 335 | $contentType = $_SERVER['CONTENT_TYPE'] |
||
| 336 | ?? $_SERVER['HTTP_CONTENT_TYPE'] |
||
| 337 | ?? ''; |
||
| 338 | |||
| 339 | // Handle non multipart uploads older WebKit versions didn't support multipart in HTML5 |
||
| 340 | if (strpos($contentType, 'multipart') !== false) { |
||
| 341 | if (isset($_FILES['file']['tmp_name']) === true && is_uploaded_file($_FILES['file']['tmp_name']) === true) { |
||
| 342 | // Open temp file |
||
| 343 | $out = fopen("{$filePath}.part", $chunk == 0 ? 'wb' : 'ab'); |
||
| 344 | |||
| 345 | if ($out !== false) { |
||
| 346 | // Read binary input stream and append it to temp file |
||
| 347 | $in = fopen($_FILES['file']['tmp_name'], 'rb'); |
||
| 348 | $fileFullSize += (int) $_FILES['file']['size']; |
||
| 349 | |||
| 350 | if ($in !== false) { |
||
| 351 | while ($buff = fread($in, 4096)) { |
||
| 352 | fwrite($out, $buff); |
||
| 353 | } |
||
| 354 | } else { |
||
| 355 | die('{"jsonrpc" : "2.0", |
||
| 356 | "error" : {"code": 101, "message": "Failed to open input stream."}, |
||
| 357 | "id" : "id"}'); |
||
| 358 | } |
||
| 359 | fclose($in); |
||
| 360 | fclose($out); |
||
| 361 | |||
| 362 | fileDelete($_FILES['file']['tmp_name'], $SETTINGS); |
||
| 363 | } else { |
||
| 364 | die('{"jsonrpc" : "2.0", "error" : {"code": 102, "message": "Failed to open output stream."}, "id" : "id"}'); |
||
| 365 | } |
||
| 366 | } else { |
||
| 367 | die('{"jsonrpc" : "2.0", "error" : {"code": 103, "message": "Failed to move uploaded file."}, "id" : "id"}'); |
||
| 368 | } |
||
| 369 | } else { |
||
| 370 | // Open temp file |
||
| 371 | $out = fopen("{$filePath}.part", $chunk == 0 ? 'wb' : 'ab'); |
||
| 372 | |||
| 373 | if ($out !== false) { |
||
| 374 | // Read binary input stream and append it to temp file |
||
| 375 | $in = fopen('php://input', 'rb'); |
||
| 376 | |||
| 377 | if ($in !== false) { |
||
| 378 | while ($buff = fread($in, 4096)) { |
||
| 379 | fwrite($out, $buff); |
||
| 380 | } |
||
| 381 | } else { |
||
| 382 | die('{"jsonrpc" : "2.0", "error" : {"code": 101, "message": "Failed to open input stream."}, "id" : "id"}'); |
||
| 383 | } |
||
| 384 | fclose($in); |
||
| 385 | fclose($out); |
||
| 386 | } else { |
||
| 387 | die('{"jsonrpc" : "2.0", "error" : {"code": 102, "message": "Failed to open output stream."}, "id" : "id"}'); |
||
| 388 | } |
||
| 389 | } |
||
| 390 | |||
| 391 | // Check if file has been uploaded |
||
| 392 | if (!$chunks || $chunk == $chunks - 1) { |
||
| 393 | // Strip the temp .part suffix off |
||
| 394 | rename("{$filePath}.part", $filePath); |
||
| 395 | } else { |
||
| 396 | // continue uploading other chunks |
||
| 397 | die(); |
||
| 398 | } |
||
| 399 | |||
| 400 | // Encrypt the file if requested |
||
| 401 | $newFile = encryptFile($fileName, $targetDir); |
||
| 402 | $newID = 0; |
||
| 403 | |||
| 404 | // Case ITEM ATTACHMENTS - Store to database |
||
| 405 | if (null !== $post_type_upload && $post_type_upload === 'item_attachments') { |
||
| 406 | // Check case of new item |
||
| 407 | if ( |
||
| 408 | isset($post_isNewItem) === true |
||
| 409 | && (int) $post_isNewItem === 1 |
||
| 410 | && empty($post_randomId) === false |
||
| 411 | ) { |
||
| 412 | $post_itemId = $post_randomId; |
||
| 413 | } |
||
| 414 | |||
| 415 | DB::insert( |
||
| 416 | prefixTable('files'), |
||
| 417 | array( |
||
| 418 | 'id_item' => $post_itemId, |
||
| 419 | 'name' => 'b64:' . $fileName, // add "b64:" prefix to indicate that the file name is base64 encoded |
||
| 420 | 'size' => $post_fileSize, |
||
| 421 | 'extension' => $fileInfo['extension'], |
||
| 422 | 'type' => $_FILES['file']['type'], |
||
| 423 | 'file' => $newFile['fileHash'], |
||
| 424 | 'status' => TP_ENCRYPTION_NAME, |
||
| 425 | ) |
||
| 426 | ); |
||
| 427 | $newID = DB::insertId(); |
||
| 428 | |||
| 429 | // Store the key for users |
||
| 430 | // Is this item a personal one? |
||
| 431 | if ((int) $post_isPersonal === 0) { |
||
| 432 | // It is not a personal item objectKey |
||
| 433 | // This is a public object |
||
| 434 | $users = DB::query( |
||
| 435 | 'SELECT id, public_key |
||
| 436 | FROM ' . prefixTable('users') . ' |
||
| 437 | WHERE id NOT IN ("' . OTV_USER_ID . '","' . SSH_USER_ID . '","' . API_USER_ID . '") |
||
| 438 | AND public_key != ""' |
||
| 439 | ); |
||
| 440 | foreach ($users as $user) { |
||
| 441 | // Insert in DB the new object key for this item by user |
||
| 442 | DB::insert( |
||
| 443 | prefixTable('sharekeys_files'), |
||
| 444 | array( |
||
| 445 | 'object_id' => $newID, |
||
| 446 | 'user_id' => (int) $user['id'], |
||
| 447 | 'share_key' => encryptUserObjectKey($newFile['objectKey'], $user['public_key']), |
||
| 448 | ) |
||
| 449 | ); |
||
| 450 | } |
||
| 451 | } else { |
||
| 452 | DB::insert( |
||
| 453 | prefixTable('sharekeys_files'), |
||
| 454 | array( |
||
| 455 | 'object_id' => (int) $newID, |
||
| 456 | 'user_id' => (int) $session->get('user-id'), |
||
| 457 | 'share_key' => encryptUserObjectKey($newFile['objectKey'], $session->get('user-public_key')), |
||
| 458 | ) |
||
| 459 | ); |
||
| 460 | } |
||
| 461 | |||
| 462 | // Log upload into databse |
||
| 463 | if ($post_isNewItem === false || (int) $post_isNewItem !== 1) { |
||
| 464 | DB::insert( |
||
| 465 | prefixTable('log_items'), |
||
| 466 | array( |
||
| 467 | 'id_item' => $post_itemId, |
||
| 468 | 'date' => time(), |
||
| 469 | 'id_user' => $session->get('user-id'), |
||
| 470 | 'action' => 'at_modification', |
||
| 471 | 'raison' => 'at_add_file : ' . $fileName . ':' . $newID, |
||
| 472 | ) |
||
| 473 | ); |
||
| 474 | } |
||
| 475 | } |
||
| 476 | |||
| 477 | // Return JSON-RPC response |
||
| 478 | die('{"jsonrpc" : "2.0", "result" : null, "id" : "' . $newID . '"}'); |
||
| 479 | |||
| 480 | /** |
||
| 481 | * Handle errors and kill script. |
||
| 482 | * |
||
| 483 | * @param string $message Message |
||
| 484 | * |
||
| 485 | * @param integer $code Code |
||
| 486 | * |
||
| 487 | */ |
||
| 488 | function handleAttachmentError($message, $code, $http_code = 400) |
||
| 489 | { |
||
| 490 | // HTTP 40x code to avoid "success" in UI. |
||
| 491 | http_response_code($http_code); |
||
| 492 | |||
| 493 | // json error message |
||
| 494 | echo json_encode([ |
||
| 495 | 'jsonrpc' => '2.0', |
||
| 496 | 'error' => [ |
||
| 497 | 'code' => $code, |
||
| 498 | 'message' => $message |
||
| 499 | ], |
||
| 500 | 'id' => 'id' |
||
| 501 | ]); |
||
| 502 | |||
| 503 | // Force exit to avoid bypass filters. |
||
| 504 | exit; |
||
|
0 ignored issues
–
show
|
|||
| 505 | } |
||
| 506 |
In general, usage of exit should be done with care and only when running in a scripting context like a CLI script.