X-Git-Url: https://delta.frontaccounting.com/gitweb/?a=blobdiff_plain;ds=sidebyside;f=includes%2Fsession.inc;h=85ea33ede9322f455b6b2c29f61020609475c8a1;hb=575fa4304beb3cd570a0352d52ee6c6aeb3864f7;hp=0e7d31138d0d35d32eb9e774fad08fcddc5584fe;hpb=6655bf87cc98c079480039192c1a7091ccdb7ae0;p=fa-stable.git diff --git a/includes/session.inc b/includes/session.inc index 0e7d3113..85ea33ed 100644 --- a/includes/session.inc +++ b/includes/session.inc @@ -1,178 +1,409 @@ . +***********************************************************************/ + +class SessionManager +{ + function sessionStart($name, $limit = 0, $path = '/', $domain = null, $secure = null) { - global $before_box, $Ajax, $messages; - // Fatal errors are not send to error_handler, - // so we must check the output - if ($text && preg_match('/\bFatal error(<.*?>)?:(.*)/i', $text, $m)) { - $Ajax->aCommands = array(); // Don't update page via ajax on errors - $text = preg_replace('/\bFatal error(<.*?>)?:(.*)/i','', $text); - $messages[] = array(E_ERROR, $m[2], null, null); - } - $Ajax->run(); - return in_ajax() ? fmt_errors() : ($before_box.fmt_errors().$text); + // Set the cookie name + session_name($name); + + // Set SSL level + $https = isset($secure) ? $secure : isset($_SERVER['HTTPS']); + + // Set session cookie options + session_set_cookie_params($limit, $path, $domain, $https, true); + session_start(); + + // Make sure the session hasn't expired, and destroy it if it has + if (self::validateSession()) + { + // Check to see if the session is new or a hijacking attempt + if(!self::preventHijacking()) + { + // Reset session data and regenerate id + $_SESSION = array(); + $_SESSION['IPaddress'] = $_SERVER['REMOTE_ADDR']; + $_SESSION['userAgent'] = $_SERVER['HTTP_USER_AGENT']; + self::regenerateSession(); + + // Give a 5% chance of the session id changing on any request + } + elseif (rand(1, 100) <= 5) + { + self::regenerateSession(); + } + } + else + { + $_SESSION = array(); + session_destroy(); + session_start(); + } } - if (!isset($path_to_root)) + function preventHijacking() { - $path_to_root = "."; - } + if (!isset($_SESSION['IPaddress']) || !isset($_SESSION['userAgent'])) + return false; - include_once($path_to_root . "/includes/current_user.inc"); + if ($_SESSION['IPaddress'] != $_SERVER['REMOTE_ADDR']) + return false; -/* - // Make sure this directory exists and is writable! - $session_save_path = dirname(__FILE__).'/tmp/'; -*/ + if ( $_SESSION['userAgent'] != $_SERVER['HTTP_USER_AGENT']) + return false; - $session_save_path = session_save_path(); - if (strpos($session_save_path, ";") !== false) - $session_save_path = substr($session_save_path, strpos($session_save_path, ";") + 1); + return true; + } - if (isset($session_save_path)) + function regenerateSession() { - session_save_path($session_save_path); - unset($session_save_path); - } - if (!isset($path_to_root) || isset($_GET['path_to_root']) || isset($_POST['path_to_root'])) - die("Restricted access"); - include_once($path_to_root . "/includes/lang/language.php"); - include_once($path_to_root . "/config_db.php"); - include_once($path_to_root . "/config.php"); - include_once($path_to_root . "/includes/ajax.inc"); - $Ajax =& new Ajax(); + // If this session is obsolete it means there already is a new id + if (isset($_SESSION['OBSOLETE']) && ($_SESSION['OBSOLETE'] == true)) + return; - include_once($path_to_root . "/includes/main.inc"); + // Set current session to expire in 10 seconds + $_SESSION['OBSOLETE'] = true; + $_SESSION['EXPIRES'] = time() + 10; - //---------------------------------------------------------------------------------------- + // Create new session without destroying the old one + session_regenerate_id(false); - function kill_login() + // Grab current session ID and close both sessions to allow other scripts to use them + $newSession = session_id(); + session_write_close(); + + // Set session ID to the new one, and start it back up again + session_id($newSession); + session_start(); + + // Now we unset the obsolete and expiration values for the session we want to keep + unset($_SESSION['OBSOLETE']); + unset($_SESSION['EXPIRES']); + } + + function validateSession() { - session_unset(); - session_destroy(); + if (isset($_SESSION['OBSOLETE']) && !isset($_SESSION['EXPIRES']) ) + return false; + + if (isset($_SESSION['EXPIRES']) && $_SESSION['EXPIRES'] < time()) + return false; + + return true; } +} - //---------------------------------------------------------------------------------------- +function output_html($text) +{ + global $before_box, $Ajax, $messages; + // Fatal errors are not send to error_handler, + // so we must check the output + if ($text && preg_match('/\bFatal error(<.*?>)?:(.*)/i', $text, $m)) { + $Ajax->aCommands = array(); // Don't update page via ajax on errors + $text = preg_replace('/\bFatal error(<.*?>)?:(.*)/i','', $text); + $messages[] = array(E_ERROR, $m[2], null, null); + } + $Ajax->run(); + return in_ajax() ? fmt_errors() : ($before_box.fmt_errors().$text); +} +//---------------------------------------------------------------------------------------- - function login_fail() - { - echo "


" . _("Incorrect Password") . "

"; - echo "" . _("The user and password combination is not valid for the system.") . "

"; +function kill_login() +{ + session_unset(); + session_destroy(); +} +//---------------------------------------------------------------------------------------- - echo _("If you are not an authorized user, please contact your system administrator to obtain an account to enable you to use the system."); - echo "
" . _("Back") . ""; - echo "
"; +function login_fail() +{ + global $path_to_root; + + header("HTTP/1.1 401 Authorization Required"); + echo "


" . _("Incorrect Password") . "

"; + echo "" . _("The user and password combination is not valid for the system.") . "

"; - kill_login(); - die(); + echo _("If you are not an authorized user, please contact your system administrator to obtain an account to enable you to use the system."); + echo "
" . _("Try again") . ""; + echo "
"; + + kill_login(); + die(); +} + +//---------------------------------------------------------------------------------------- + +function check_page_security($page_security) +{ + global $SysPrefs; + + $msg = ''; + + if (!$_SESSION["wa_current_user"]->check_user_access()) + { + // notification after upgrade from pre-2.2 version + $msg = $_SESSION["wa_current_user"]->old_db ? + _("Security settings have not been defined for your user account.") + . "
" . _("Please contact your system administrator.") + : _("Please remove \$security_groups and \$security_headings arrays from config.php file!"); + } elseif (!$_SESSION['SysPrefs']->db_ok && !$_SESSION["wa_current_user"]->can_access('SA_SOFTWAREUPGRADE')) { + $msg = _('Access to application has been blocked until database upgrade is completed by system administrator.'); + } + + if ($msg){ + display_error($msg); + end_page(); + kill_login(); + exit; } - //---------------------------------------------------------------------------------------- + if (!$_SESSION["wa_current_user"]->can_access_page($page_security)) + { - function check_page_security($page_security) + echo "



"; + echo _("The security settings on your account do not permit you to access this function"); + echo ""; + echo "



"; + end_page(); + exit; + } + if (!$_SESSION['SysPrefs']->db_ok + && !in_array($page_security, array('SA_SOFTWAREUPGRADE', 'SA_OPEN', 'SA_BACKUP'))) { - if (!$_SESSION["wa_current_user"]->check_user_access()) - { - echo "


"; - echo "" . _("Security settings have not been defined for your user account."); - echo "
" . _("Please contact your system administrator.") . "
"; + display_error(_('System is blocked after source upgrade until database is updated on System/Software Upgrade page')); + end_page(); + exit; + } - kill_login(); - exit; - } +} +/* + Helper function for setting page security level depeding on + GET start variable and/or some value stored in session variable. + Before the call $page_security should be set to default page_security value. +*/ +function set_page_security($value=null, $trans = array(), $gtrans = array()) +{ + global $page_security; - if (!$_SESSION["wa_current_user"]->can_access_page($page_security)) - { - page(_("Access denied")); - echo "



"; - echo _("The security settings on your account do not permit you to access this function"); - echo ""; - echo "



"; - //echo '' - end_page(); - //kill_login(); - exit; + // first check is this is not start page call + foreach($gtrans as $key => $area) + if (isset($_GET[$key])) { + $page_security = $area; + return; } + + // then check session value + if (isset($trans[$value])) { + $page_security = $trans[$value]; + return; } +} - //----------------------------------------------------------------------------- - // Removing magic quotes from nested arrays/variables - // - function strip_quotes($data) - { - if(get_magic_quotes_gpc()) { - if(is_array($data)) { - foreach($data as $k => $v) { - $data[$k] = strip_quotes($data[$k]); - } - } else - return stripslashes($data); +//----------------------------------------------------------------------------- +// Removing magic quotes from nested arrays/variables +// +function strip_quotes($data) +{ + if(get_magic_quotes_gpc()) { + if(is_array($data)) { + foreach($data as $k => $v) { + $data[$k] = strip_quotes($data[$k]); + } + } else + return stripslashes($data); + } + return $data; +} + +function html_cleanup(&$parms) +{ + foreach($parms as $name => $value) { +// $value = @html_entity_decode($value, ENT_QUOTES, $_SESSION['language']->encoding); + if (is_array($value)) + html_cleanup($parms[$name]); + else + $parms[$name] = @htmlspecialchars($value, ENT_QUOTES, $_SESSION['language']->encoding); + } + reset($parms); // needed for direct key() usage later throughout the sources +} + +//============================================================================ +// +// +function login_timeout() +{ + // skip timeout on logout page + if ($_SESSION["wa_current_user"]->logged) { + $tout = $_SESSION["wa_current_user"]->timeout; + if ($tout && (time() > $_SESSION["wa_current_user"]->last_act + $tout)) + { + $_SESSION["wa_current_user"]->logged = false; } - return $data; + $_SESSION["wa_current_user"]->last_act = time(); } +} +//============================================================================ +if (!isset($path_to_root)) +{ + $path_to_root = "."; +} +// Prevent register_globals vulnerability +if (isset($_GET['path_to_root']) || isset($_POST['path_to_root'])) + die("Restricted access"); - //---------------------------------------------------------------------------------------- - if (!isset($_SESSION["wa_current_user"]) || - (isset($_SESSION["wa_current_user"]) && !$_SESSION["wa_current_user"]->logged_in())) - { +include_once($path_to_root . "/includes/errors.inc"); +// colect all error msgs +set_error_handler('error_handler' /*, errtypes */); + +include_once($path_to_root . "/includes/current_user.inc"); +include_once($path_to_root . "/frontaccounting.php"); +include_once($path_to_root . "/admin/db/security_db.inc"); +include_once($path_to_root . "/includes/lang/language.php"); +include_once($path_to_root . "/config_db.php"); +include_once($path_to_root . "/includes/ajax.inc"); +include_once($path_to_root . "/includes/ui/ui_msgs.inc"); +include_once($path_to_root . "/includes/prefs/sysprefs.inc"); + +include_once($path_to_root . "/includes/hooks.inc"); +// +// include all extensions hook files. +// +foreach ($installed_extensions as $ext) +{ + if (file_exists($path_to_root.'/'.$ext['path'].'/hooks.php')) + include_once($path_to_root.'/'.$ext['path'].'/hooks.php'); +} + +/* + Uncomment the setting below when using FA on shared hosting + to avoid unexpeced session timeouts. + Make sure this directory exists and is writable! +*/ +// ini_set('session.save_path', dirname(__FILE__).'/../tmp/'); + +ini_set('session.gc_maxlifetime', 36000); // 10hrs + +SessionManager::sessionStart('FA'.md5(dirname(__FILE__))); + +//SessionManager::sessionStart('Blog_myBlog', 0, '/myBlog/', 'www.site.com'); +//SessionManager::sessionStart('Accounts_Bank', 0, '/', 'accounts.bank.com', true); +/* +hook_session_start(@$_POST["company_login_name"]); + +session_name('FA'.md5(dirname(__FILE__))); + +session_start(); +session_regenerate_id(true); +*/ +// this is to fix the "back-do-you-want-to-refresh" issue - thanx PHPFreaks +header("Cache-control: private"); + +include_once($path_to_root . "/config.php"); +get_text_init(); - $_SESSION["wa_current_user"] = new current_user(); - - // Show login screen - if (!isset($_POST["user_name_entry_field"]) or $_POST["user_name_entry_field"] == "") - { - include($path_to_root . "/access/login.php"); - $Ajax->redirect($path_to_root . "/access/login.php"); - exit; - } - } - include_once($path_to_root . "/includes/ui/ui_msgs.inc"); - // intercept all output to destroy it in case of ajax call - register_shutdown_function('ob_end_flush'); - ob_start('output_html',0); - // colect all error msgs - set_error_handler('error_handler' /*, errtypes */); - - if (isset($_POST["user_name_entry_field"])) - { - $succeed = $_SESSION["wa_current_user"]->login($_POST["company_login_name"], - $_POST["user_name_entry_field"], - md5($_POST["password"])); - - if (!$succeed) +// Page Initialisation +if (!isset($_SESSION['language']) || !method_exists($_SESSION['language'], 'set_language')) +{ + $l = array_search_value($dflt_lang, $installed_languages, 'code'); + $_SESSION['language'] = new language($l['name'], $l['code'], $l['encoding'], + (isset($l['rtl']) && $l['rtl'] === true) ? 'rtl' : 'ltr'); +} + +$_SESSION['language']->set_language($_SESSION['language']->code); + + +include_once($path_to_root . "/includes/access_levels.inc"); +include_once($path_to_root . "/version.php"); +include_once($path_to_root . "/includes/main.inc"); + +// Ajax communication object +$Ajax = new Ajax(); + +// js/php validation rules container +$Validate = array(); +// bindings for editors +$Editors = array(); +// page help. Currently help for function keys. +$Pagehelp = array(); + +$Refs = new references(); + +// intercept all output to destroy it in case of ajax call +register_shutdown_function('end_flush'); +ob_start('output_html',0); + +if (!isset($_SESSION["wa_current_user"])) + $_SESSION["wa_current_user"] = new current_user(); + +html_cleanup($_GET); +html_cleanup($_POST); +html_cleanup($_REQUEST); +html_cleanup($_SERVER); + +// logout.php is the only page we should have always +// accessable regardless of access level and current login status. +if (strstr($_SERVER['PHP_SELF'], 'logout.php') == false){ + + login_timeout(); + + if (!$_SESSION["wa_current_user"]->old_db) + include_once($path_to_root . '/company/'.user_company().'/installed_extensions.php'); + + install_hooks(); + + if (!$_SESSION["wa_current_user"]->logged_in()) + { + // Show login screen + if (!isset($_POST["user_name_entry_field"]) or $_POST["user_name_entry_field"] == "") { + // strip ajax marker from uri, to force synchronous page reload + $_SESSION['timeout'] = array( 'uri'=>preg_replace('/JsHttpRequest=(?:(\d+)-)?([^&]+)/s', + '', @htmlspecialchars($_SERVER['REQUEST_URI'], ENT_QUOTES, $_SESSION['language']->encoding)), + 'post' => $_POST); + + include($path_to_root . "/access/login.php"); + if (in_ajax()) + $Ajax->activate('_page_body'); + exit; + } else { + + $succeed = isset($db_connections[$_POST["company_login_name"]]) && + $_SESSION["wa_current_user"]->login($_POST["company_login_name"], + $_POST["user_name_entry_field"], $_POST["password"]); + // select full vs fallback ui mode on login + $_SESSION["wa_current_user"]->ui_mode = $_POST['ui_mode']; + if (!$succeed) + { // Incorrect password - login_fail(); + login_fail(); + } + $lang = &$_SESSION['language']; + $lang->set_language($_SESSION['language']->code); } - } + } else + set_global_connection(); - // Run with debugging messages for the system administrator(s) but not anyone else - /*if (in_array(15, $security_groups[$_SESSION["AccessLevel"]])) { - $debug = 1; - } else { - $debug = 0; - }*/ - - //---------------------------------------------------------------------------------------- + if (!isset($_SESSION["App"])) { + $_SESSION["App"] = new front_accounting(); + $_SESSION["App"]->init(); + } +} - check_page_security($page_security); +$SysPrefs = &$_SESSION['SysPrefs']; // POST vars cleanup needed for direct reuse. // We quote all values later with db_escape() before db update. - $_POST = strip_quotes($_POST); +$_POST = strip_quotes($_POST); ?> \ No newline at end of file