Issues (21)

Security Analysis    no request data  

This project does not seem to handle request data directly as such no vulnerable execution paths were found.

  Cross-Site Scripting
Cross-Site Scripting enables an attacker to inject code into the response of a web-request that is viewed by other users. It can for example be used to bypass access controls, or even to take over other users' accounts.
  File Exposure
File Exposure allows an attacker to gain access to local files that he should not be able to access. These files can for example include database credentials, or other configuration files.
  File Manipulation
File Manipulation enables an attacker to write custom data to files. This potentially leads to injection of arbitrary code on the server.
  Object Injection
Object Injection enables an attacker to inject an object into PHP code, and can lead to arbitrary code execution, file exposure, or file manipulation attacks.
  Code Injection
Code Injection enables an attacker to execute arbitrary code on the server.
  Response Splitting
Response Splitting can be used to send arbitrary responses.
  File Inclusion
File Inclusion enables an attacker to inject custom files into PHP's file loading mechanism, either explicitly passed to include, or for example via PHP's auto-loading mechanism.
  Command Injection
Command Injection enables an attacker to inject a shell command that is execute with the privileges of the web-server. This can be used to expose sensitive data, or gain access of your server.
  SQL Injection
SQL Injection enables an attacker to execute arbitrary SQL code on your database server gaining access to user data, or manipulating user data.
  XPath Injection
XPath Injection enables an attacker to modify the parts of XML document that are read. If that XML document is for example used for authentication, this can lead to further vulnerabilities similar to SQL Injection.
  LDAP Injection
LDAP Injection enables an attacker to inject LDAP statements potentially granting permission to run unauthorized queries, or modify content inside the LDAP tree.
  Header Injection
  Other Vulnerability
This category comprises other attack vectors such as manipulating the PHP runtime, loading custom extensions, freezing the runtime, or similar.
  Regex Injection
Regex Injection enables an attacker to execute arbitrary code in your PHP process.
  XML Injection
XML Injection enables an attacker to read files on your local filesystem including configuration files, or can be abused to freeze your web-server process.
  Variable Injection
Variable Injection enables an attacker to overwrite program variables with custom data, and can lead to further vulnerabilities.
Unfortunately, the security analysis is currently not available for your project. If you are a non-commercial open-source project, please contact support to gain access.

modules/backup_key.php (4 issues)

Upgrade to new PHP Analysis Engine

These results are based on our legacy PHP analysis, consider migrating to our new PHP analysis engine instead. Learn more

1
<?php
2
/**
3
 *
4
 * 2FA extension for the phpBB Forum Software package.
5
 *
6
 * @copyright (c) 2015 Paul Sohier
7
 * @license GNU General Public License, version 2 (GPL-2.0)
8
 *
9
 */
10
11
namespace paul999\tfa\modules;
12
13
use phpbb\db\driver\driver_interface;
14
use phpbb\exception\http_exception;
15
use phpbb\passwords\manager;
16
use phpbb\request\request_interface;
17
use phpbb\template\template;
18
use phpbb\user;
19
20
class backup_key extends abstract_module
21
{
22
	/**
23
	 * @var request_interface
24
	 */
25
	private $request;
26
27
	/**
28
	 * @var string
29
	 */
30
	private $backup_registration_table;
31
32
	/**
33
	 * Number of keys that is generated
34
	 */
35
	const NUMBER_OF_KEYS = 6;
36
37
	/**
38
	 * @var manager
39
	 */
40
	private $password_manager;
41
42
	/**
43
	 * backup_key constructor.
44
	 *
45
	 * @param driver_interface $db
46
	 * @param user $user
47
	 * @param request_interface $request
48
	 * @param template $template
49
	 * @param manager $password_manager
50
	 * @param string $backup_registration_table
51
	 */
52 View Code Duplication
	public function __construct(driver_interface $db, user $user, request_interface $request, template $template, manager $password_manager, $backup_registration_table)
0 ignored issues
show
This method seems to be duplicated in your project.

Duplicated code is one of the most pungent code smells. If you need to duplicate the same code in three or more different places, we strongly encourage you to look into extracting the code into a single class or operation.

You can also find more detailed suggestions in the “Code” section of your repository.

Loading history...
53
	{
54
		$this->db = $db;
55
		$this->user = $user;
56
		$this->request = $request;
57
		$this->template = $template;
58
		$this->backup_registration_table = $backup_registration_table;
59
		$this->password_manager = $password_manager;
60
	}
61
62
	/**
63
	 * Get a language key for this specific module.
64
	 * @return string
65
	 */
66
	public function get_translatable_name()
67
	{
68
		return 'TFA_BACKUP_KEY';
69
	}
70
71
	/**
72
	 * Return the name of the current module
73
	 * This is for internal use only
74
	 * @return string
75
	 */
76
	public function get_name()
77
	{
78
		return 'backup_key';
79
	}
80
81
	/**
82
	 * Return if this module is enabled by the admin
83
	 * (And all server requirements are met).
84
	 *
85
	 * Do not return false in case a specific user disabled this module,
86
	 * OR if the user is unable to use this specific module,
87
	 * OR if a browser specific item is missing/incorrect.
88
	 * @return boolean
89
	 */
90
	public function is_enabled()
91
	{
92
		return true;
93
	}
94
95
	/**
96
	 * Check if the current user is able to use this module.
97
	 *
98
	 * This means that the user enabled it in the UCP,
99
	 * And has it setup up correctly.
100
	 * This method will be called during login, not during registration/
101
	 *
102
	 * @param int $user_id
103
	 *
104
	 * @return bool
105
	 */
106
	public function is_usable($user_id)
107
	{
108
		return $this->check_table_for_user($this->backup_registration_table, $user_id, ' AND valid = 1');
109
	}
110
111
	/**
112
	 * Check if the user can potentially use this.
113
	 * This method is called at registration page.
114
	 *
115
	 * You can, for example, check if the current browser is suitable.
116
	 *
117
	 * @param int|boolean $user_id Use false to ignore user
118
	 *
119
	 * @return bool
120
	 */
121
	public function is_potentially_usable($user_id = false)
122
	{
123
		return true;
124
	}
125
126
127
	/**
128
	 * Check if the user has any key registered with this module.
129
	 * There should be no check done if the key is usable, it should
130
	 * only return if a key is registered.
131
	 *
132
	 * @param $user_id
133
	 * @return bool
134
	 */
135
	public function key_registered($user_id)
136
	{
137
		return $this->check_table_for_user($this->backup_registration_table, $user_id);
138
	}
139
140
	/**
141
	 * Get the priority for this module.
142
	 * A lower priority means more chance it gets selected as default option
143
	 *
144
	 * There can be only one module with a specific priority!
145
	 * If there is already a module registered with this priority,
146
	 * a Exception might be thrown
147
	 *
148
	 * @return int
149
	 */
150
	public function get_priority()
151
	{
152
		return 1337; // We want the backup keys as priority as low as possible, because they are a backup.
153
	}
154
155
	/**
156
	 * Start of the login procedure.
157
	 *
158
	 * @param int $user_id
159
	 *
160
	 * @return array with data to be assign to the template.
161
	 */
162
	public function login_start($user_id)
163
	{
164
		return array(
165
			'S_TFA_INCLUDE_HTML'	=> '@paul999_tfa/tfa_backup_authenticate.html',
166
		);
167
	}
168
169
	/**
170
	 * Actual login procedure
171
	 *
172
	 * @param int $user_id
173
	 *
174
	 * @return boolean
175
	 */
176
	public function login($user_id)
177
	{
178
		$key = $this->request->variable('authenticate', '');
179
180
		if (empty($key))
181
		{
182
			throw new http_exception(400, 'TFA_NO_KEY_PROVIDED');
183
		}
184
185
		foreach ($this->getRegistrations($user_id) as $registration)
186
		{
187
			if (!$registration['valid'] || $registration['last_used'])
188
			{
189
				continue;
190
			}
191 View Code Duplication
			if ($this->password_manager->check($key, $registration['secret']))
0 ignored issues
show
This code seems to be duplicated across your project.

Duplicated code is one of the most pungent code smells. If you need to duplicate the same code in three or more different places, we strongly encourage you to look into extracting the code into a single class or operation.

You can also find more detailed suggestions in the “Code” section of your repository.

Loading history...
192
			{
193
				// We found a valid key.
194
				$sql_ary = array(
195
					'last_used' => time(),
196
					'valid'		=> false,
197
				);
198
				$sql = 'UPDATE ' . $this->backup_registration_table . ' 
199
					SET ' . $this->db->sql_build_array('UPDATE', $sql_ary) . ' 
200
					WHERE 
201
						registration_id = ' . (int) $registration['registration_id'];
202
				$this->db->sql_query($sql);
203
				return true;
204
			}
205
		}
206
		return false;
207
	}
208
209
	/**
210
	 * If this module can add new keys (Or other things)
211
	 *
212
	 * @return boolean
213
	 */
214
	public function can_register()
215
	{
216
		return !$this->check_table_for_user($this->backup_registration_table, $this->user->data['user_id'], ' AND valid = 1');
217
	}
218
219
	/**
220
	 * Start with the registration of a new security key.
221
	 * This page should return a name of a template, and
222
	 * it should assign the required variables for this template.
223
	 *
224
	 * @return string
225
	 * @throws \Exception
226
	 */
227
	public function register_start()
228
	{
229
		$sql = array();
230
231
		for ($i = 0; $i < self::NUMBER_OF_KEYS; $i++)
232
		{
233
			$time = time();
234
			$key = bin2hex(random_bytes(16));
235
			$sql[] = array(
236
				'user_id' 		=> $this->user->data['user_id'],
237
				'valid'			=> true,
238
				'secret'		=> $this->password_manager->hash($key),
239
				'registered' 	=> $time,
240
			);
241
			$this->template->assign_block_vars('backup', [
242
				'KEY'	=> $key,
243
				'DATE'	=> $this->user->format_date($time),
244
			]);
245
		}
246
		$this->db->sql_multi_insert($this->backup_registration_table, $sql);
247
248
		return 'tfa_backup_ucp_new';
249
	}
250
251
	/**
252
	 * Do the actual registration of a new security key.
253
	 *
254
	 * @return boolean Result of the registration.
255
	 */
256
	public function register()
257
	{
258
		// We don't need to do anything here.
259
		return true;
260
	}
261
262
	/**
263
	 * This method is called to show the UCP page.
264
	 * You can assign template variables to the template, or do anything else here.
265
	 */
266
	public function show_ucp()
267
	{
268
		$this->show_ucp_complete($this->backup_registration_table);
269
	}
270
271
	/**
272
	 * Delete a specific row from the UCP.
273
	 * The data is based on the data provided in show_ucp.
274
	 *
275
	 * @param int $key
276
	 *
277
	 * @return void
278
	 */
279 View Code Duplication
	public function delete($key)
0 ignored issues
show
This method seems to be duplicated in your project.

Duplicated code is one of the most pungent code smells. If you need to duplicate the same code in three or more different places, we strongly encourage you to look into extracting the code into a single class or operation.

You can also find more detailed suggestions in the “Code” section of your repository.

Loading history...
280
	{
281
		$sql = 'DELETE FROM ' . $this->backup_registration_table . '
282
			WHERE user_id = ' . (int) $this->user->data['user_id'] . '
283
			AND registration_id =' . (int) $key;
284
285
		$this->db->sql_query($sql);
286
	}
287
288
	/**
289
	 * Select all registration objects from the database
290
	 * @param integer $user_id
291
	 * @return array
292
	 */
293 View Code Duplication
	private function getRegistrations($user_id)
0 ignored issues
show
This method seems to be duplicated in your project.

Duplicated code is one of the most pungent code smells. If you need to duplicate the same code in three or more different places, we strongly encourage you to look into extracting the code into a single class or operation.

You can also find more detailed suggestions in the “Code” section of your repository.

Loading history...
294
	{
295
		$sql = 'SELECT * FROM ' . $this->backup_registration_table . ' WHERE user_id = ' . (int) $user_id;
296
		$result = $this->db->sql_query($sql);
297
		$rows = $this->db->sql_fetchrowset($result);
298
299
		$this->db->sql_freeresult($result);
300
		return $rows;
301
	}
302
}
303