X-Git-Url: https://delta.frontaccounting.com/gitweb/?a=blobdiff_plain;f=includes%2Fsession.inc;h=85ea33ede9322f455b6b2c29f61020609475c8a1;hb=575fa4304beb3cd570a0352d52ee6c6aeb3864f7;hp=daec5deace336b602bb95abc0daf562b0714aa9d;hpb=7668c6e2035c3317399437e3ed762778b63d3faa;p=fa-stable.git diff --git a/includes/session.inc b/includes/session.inc index daec5dea..85ea33ed 100644 --- a/includes/session.inc +++ b/includes/session.inc @@ -9,6 +9,100 @@ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the License here . ***********************************************************************/ + +class SessionManager +{ + function sessionStart($name, $limit = 0, $path = '/', $domain = null, $secure = null) + { + // Set the cookie name + session_name($name); + + // Set SSL level + $https = isset($secure) ? $secure : isset($_SERVER['HTTPS']); + + // Set session cookie options + session_set_cookie_params($limit, $path, $domain, $https, true); + session_start(); + + // Make sure the session hasn't expired, and destroy it if it has + if (self::validateSession()) + { + // Check to see if the session is new or a hijacking attempt + if(!self::preventHijacking()) + { + // Reset session data and regenerate id + $_SESSION = array(); + $_SESSION['IPaddress'] = $_SERVER['REMOTE_ADDR']; + $_SESSION['userAgent'] = $_SERVER['HTTP_USER_AGENT']; + self::regenerateSession(); + + // Give a 5% chance of the session id changing on any request + } + elseif (rand(1, 100) <= 5) + { + self::regenerateSession(); + } + } + else + { + $_SESSION = array(); + session_destroy(); + session_start(); + } + } + + function preventHijacking() + { + if (!isset($_SESSION['IPaddress']) || !isset($_SESSION['userAgent'])) + return false; + + if ($_SESSION['IPaddress'] != $_SERVER['REMOTE_ADDR']) + return false; + + if ( $_SESSION['userAgent'] != $_SERVER['HTTP_USER_AGENT']) + return false; + + return true; + } + + function regenerateSession() + { + // If this session is obsolete it means there already is a new id + if (isset($_SESSION['OBSOLETE']) && ($_SESSION['OBSOLETE'] == true)) + return; + + // Set current session to expire in 10 seconds + $_SESSION['OBSOLETE'] = true; + $_SESSION['EXPIRES'] = time() + 10; + + // Create new session without destroying the old one + session_regenerate_id(false); + + // Grab current session ID and close both sessions to allow other scripts to use them + $newSession = session_id(); + session_write_close(); + + // Set session ID to the new one, and start it back up again + session_id($newSession); + session_start(); + + // Now we unset the obsolete and expiration values for the session we want to keep + unset($_SESSION['OBSOLETE']); + unset($_SESSION['EXPIRES']); + } + + function validateSession() + { + if (isset($_SESSION['OBSOLETE']) && !isset($_SESSION['EXPIRES']) ) + return false; + + if (isset($_SESSION['EXPIRES']) && $_SESSION['EXPIRES'] < time()) + return false; + + return true; + } +} + function output_html($text) { global $before_box, $Ajax, $messages; @@ -51,6 +145,10 @@ function login_fail() function check_page_security($page_security) { + global $SysPrefs; + + $msg = ''; + if (!$_SESSION["wa_current_user"]->check_user_access()) { // notification after upgrade from pre-2.2 version @@ -58,7 +156,11 @@ function check_page_security($page_security) _("Security settings have not been defined for your user account.") . "
" . _("Please contact your system administrator.") : _("Please remove \$security_groups and \$security_headings arrays from config.php file!"); - + } elseif (!$_SESSION['SysPrefs']->db_ok && !$_SESSION["wa_current_user"]->can_access('SA_SOFTWAREUPGRADE')) { + $msg = _('Access to application has been blocked until database upgrade is completed by system administrator.'); + } + + if ($msg){ display_error($msg); end_page(); kill_login(); @@ -75,6 +177,14 @@ function check_page_security($page_security) end_page(); exit; } + if (!$_SESSION['SysPrefs']->db_ok + && !in_array($page_security, array('SA_SOFTWAREUPGRADE', 'SA_OPEN', 'SA_BACKUP'))) + { + display_error(_('System is blocked after source upgrade until database is updated on System/Software Upgrade page')); + end_page(); + exit; + } + } /* Helper function for setting page security level depeding on @@ -115,6 +225,18 @@ function strip_quotes($data) return $data; } +function html_cleanup(&$parms) +{ + foreach($parms as $name => $value) { +// $value = @html_entity_decode($value, ENT_QUOTES, $_SESSION['language']->encoding); + if (is_array($value)) + html_cleanup($parms[$name]); + else + $parms[$name] = @htmlspecialchars($value, ENT_QUOTES, $_SESSION['language']->encoding); + } + reset($parms); // needed for direct key() usage later throughout the sources +} + //============================================================================ // // @@ -140,6 +262,10 @@ if (!isset($path_to_root)) if (isset($_GET['path_to_root']) || isset($_POST['path_to_root'])) die("Restricted access"); +include_once($path_to_root . "/includes/errors.inc"); +// colect all error msgs +set_error_handler('error_handler' /*, errtypes */); + include_once($path_to_root . "/includes/current_user.inc"); include_once($path_to_root . "/frontaccounting.php"); include_once($path_to_root . "/admin/db/security_db.inc"); @@ -147,22 +273,43 @@ include_once($path_to_root . "/includes/lang/language.php"); include_once($path_to_root . "/config_db.php"); include_once($path_to_root . "/includes/ajax.inc"); include_once($path_to_root . "/includes/ui/ui_msgs.inc"); +include_once($path_to_root . "/includes/prefs/sysprefs.inc"); + +include_once($path_to_root . "/includes/hooks.inc"); +// +// include all extensions hook files. +// +foreach ($installed_extensions as $ext) +{ + if (file_exists($path_to_root.'/'.$ext['path'].'/hooks.php')) + include_once($path_to_root.'/'.$ext['path'].'/hooks.php'); +} /* Uncomment the setting below when using FA on shared hosting to avoid unexpeced session timeouts. Make sure this directory exists and is writable! */ -//ini_set('session.save_path', dirname(__FILE__).'/../tmp/'); +// ini_set('session.save_path', dirname(__FILE__).'/../tmp/'); ini_set('session.gc_maxlifetime', 36000); // 10hrs +SessionManager::sessionStart('FA'.md5(dirname(__FILE__))); + +//SessionManager::sessionStart('Blog_myBlog', 0, '/myBlog/', 'www.site.com'); +//SessionManager::sessionStart('Accounts_Bank', 0, '/', 'accounts.bank.com', true); +/* +hook_session_start(@$_POST["company_login_name"]); + session_name('FA'.md5(dirname(__FILE__))); -session_start(); +session_start(); +session_regenerate_id(true); +*/ // this is to fix the "back-do-you-want-to-refresh" issue - thanx PHPFreaks header("Cache-control: private"); +include_once($path_to_root . "/config.php"); get_text_init(); // Page Initialisation @@ -170,20 +317,14 @@ if (!isset($_SESSION['language']) || !method_exists($_SESSION['language'], 'set_ { $l = array_search_value($dflt_lang, $installed_languages, 'code'); $_SESSION['language'] = new language($l['name'], $l['code'], $l['encoding'], - isset($l['rtl']) ? 'rtl' : 'ltr'); + (isset($l['rtl']) && $l['rtl'] === true) ? 'rtl' : 'ltr'); } $_SESSION['language']->set_language($_SESSION['language']->code); -// include $Hooks object if locale file exists -if (file_exists($path_to_root . "/lang/".$_SESSION['language']->code."/locale.inc")) -{ - include_once($path_to_root . "/lang/".$_SESSION['language']->code."/locale.inc"); - $Hooks = new Hooks(); -} include_once($path_to_root . "/includes/access_levels.inc"); -include_once($path_to_root . "/config.php"); +include_once($path_to_root . "/version.php"); include_once($path_to_root . "/includes/main.inc"); // Ajax communication object @@ -196,26 +337,31 @@ $Editors = array(); // page help. Currently help for function keys. $Pagehelp = array(); -$SysPrefs = new sys_prefs(); - $Refs = new references(); // intercept all output to destroy it in case of ajax call register_shutdown_function('end_flush'); ob_start('output_html',0); -// colect all error msgs -set_error_handler('error_handler' /*, errtypes */); - if (!isset($_SESSION["wa_current_user"])) $_SESSION["wa_current_user"] = new current_user(); +html_cleanup($_GET); +html_cleanup($_POST); +html_cleanup($_REQUEST); +html_cleanup($_SERVER); + // logout.php is the only page we should have always // accessable regardless of access level and current login status. if (strstr($_SERVER['PHP_SELF'], 'logout.php') == false){ login_timeout(); + if (!$_SESSION["wa_current_user"]->old_db) + include_once($path_to_root . '/company/'.user_company().'/installed_extensions.php'); + + install_hooks(); + if (!$_SESSION["wa_current_user"]->logged_in()) { // Show login screen @@ -223,7 +369,7 @@ if (strstr($_SERVER['PHP_SELF'], 'logout.php') == false){ { // strip ajax marker from uri, to force synchronous page reload $_SESSION['timeout'] = array( 'uri'=>preg_replace('/JsHttpRequest=(?:(\d+)-)?([^&]+)/s', - '', @$_SERVER['REQUEST_URI']), + '', @htmlspecialchars($_SERVER['REQUEST_URI'], ENT_QUOTES, $_SESSION['language']->encoding)), 'post' => $_POST); include($path_to_root . "/access/login.php"); @@ -234,7 +380,7 @@ if (strstr($_SERVER['PHP_SELF'], 'logout.php') == false){ $succeed = isset($db_connections[$_POST["company_login_name"]]) && $_SESSION["wa_current_user"]->login($_POST["company_login_name"], - $_POST["user_name_entry_field"], md5($_POST["password"])); + $_POST["user_name_entry_field"], $_POST["password"]); // select full vs fallback ui mode on login $_SESSION["wa_current_user"]->ui_mode = $_POST['ui_mode']; if (!$succeed) @@ -248,17 +394,16 @@ if (strstr($_SERVER['PHP_SELF'], 'logout.php') == false){ } else set_global_connection(); - if (!$_SESSION["wa_current_user"]->old_db) - include_once($path_to_root . '/company/'.user_company().'/installed_extensions.php'); - if (!isset($_SESSION["App"])) { $_SESSION["App"] = new front_accounting(); $_SESSION["App"]->init(); } } +$SysPrefs = &$_SESSION['SysPrefs']; + // POST vars cleanup needed for direct reuse. // We quote all values later with db_escape() before db update. - $_POST = strip_quotes($_POST); +$_POST = strip_quotes($_POST); ?> \ No newline at end of file