Merge BusinessAppTemplate
# Conflicts: # .gitignore # README.md # action.php # api.php # app.php # composer.json # composer.lock # index.php # langs/en/core.json # langs/en/titles.json # langs/messages.php # lib/Exceptions.lib.php # lib/Login.lib.php # lib/Notifications.lib.php # lib/Strings.lib.php # lib/User.lib.php # mobile/index.php # nbproject/project.properties # nbproject/project.xml # pages.php # pages/home.php # required.php # settings.template.php # static/css/bootstrap.min.css # static/img/logo.svg # static/js/app.js
This commit is contained in:
commit
f1f682780c
BIN
database.mwb
BIN
database.mwb
Binary file not shown.
135
lib/IPUtils.lib.php
Normal file
135
lib/IPUtils.lib.php
Normal file
@ -0,0 +1,135 @@
|
|||||||
|
<?php
|
||||||
|
|
||||||
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
||||||
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||||
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
||||||
|
|
||||||
|
class IPUtils {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Check if a given ipv4 address is in a given cidr
|
||||||
|
* @param string $ip IP to check in IPV4 format eg. 127.0.0.1
|
||||||
|
* @param string $range IP/CIDR netmask eg. 127.0.0.0/24, also 127.0.0.1 is accepted and /32 assumed
|
||||||
|
* @return boolean true if the ip is in this range / false if not.
|
||||||
|
* @author Thorsten Ott <https://gist.github.com/tott/7684443>
|
||||||
|
*/
|
||||||
|
public static function ip4_in_cidr($ip, $cidr) {
|
||||||
|
if (strpos($cidr, '/') == false) {
|
||||||
|
$cidr .= '/32';
|
||||||
|
}
|
||||||
|
// $range is in IP/CIDR format eg 127.0.0.1/24
|
||||||
|
list( $cidr, $netmask ) = explode('/', $cidr, 2);
|
||||||
|
$range_decimal = ip2long($cidr);
|
||||||
|
$ip_decimal = ip2long($ip);
|
||||||
|
$wildcard_decimal = pow(2, ( 32 - $netmask)) - 1;
|
||||||
|
$netmask_decimal = ~ $wildcard_decimal;
|
||||||
|
return ( ( $ip_decimal & $netmask_decimal ) == ( $range_decimal & $netmask_decimal ) );
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Check if a given ipv6 address is in a given cidr
|
||||||
|
* @param string $ip IP to check in IPV6 format
|
||||||
|
* @param string $cidr CIDR netmask
|
||||||
|
* @return boolean true if the IP is in this range, false otherwise.
|
||||||
|
* @author MW. <https://stackoverflow.com/a/7952169>
|
||||||
|
*/
|
||||||
|
public static function ip6_in_cidr($ip, $cidr) {
|
||||||
|
$address = inet_pton($ip);
|
||||||
|
$subnetAddress = inet_pton(explode("/", $cidr)[0]);
|
||||||
|
$subnetMask = explode("/", $cidr)[1];
|
||||||
|
|
||||||
|
$addr = str_repeat("f", $subnetMask / 4);
|
||||||
|
switch ($subnetMask % 4) {
|
||||||
|
case 0:
|
||||||
|
break;
|
||||||
|
case 1:
|
||||||
|
$addr .= "8";
|
||||||
|
break;
|
||||||
|
case 2:
|
||||||
|
$addr .= "c";
|
||||||
|
break;
|
||||||
|
case 3:
|
||||||
|
$addr .= "e";
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
$addr = str_pad($addr, 32, '0');
|
||||||
|
$addr = pack("H*", $addr);
|
||||||
|
|
||||||
|
$binMask = $addr;
|
||||||
|
return ($address & $binMask) == $subnetAddress;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Check if the REMOTE_ADDR is on Cloudflare's network.
|
||||||
|
* @return boolean true if it is, otherwise false
|
||||||
|
*/
|
||||||
|
public static function validateCloudflare() {
|
||||||
|
if (filter_var($_SERVER["REMOTE_ADDR"], FILTER_VALIDATE_IP, FILTER_FLAG_IPV6)) {
|
||||||
|
// Using IPv6
|
||||||
|
$cloudflare_ips_v6 = [
|
||||||
|
"2400:cb00::/32",
|
||||||
|
"2405:8100::/32",
|
||||||
|
"2405:b500::/32",
|
||||||
|
"2606:4700::/32",
|
||||||
|
"2803:f800::/32",
|
||||||
|
"2c0f:f248::/32",
|
||||||
|
"2a06:98c0::/29"
|
||||||
|
];
|
||||||
|
$valid = false;
|
||||||
|
foreach ($cloudflare_ips_v6 as $cidr) {
|
||||||
|
if (ip6_in_cidr($_SERVER["REMOTE_ADDR"], $cidr)) {
|
||||||
|
$valid = true;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
// Using IPv4
|
||||||
|
$cloudflare_ips_v4 = [
|
||||||
|
"103.21.244.0/22",
|
||||||
|
"103.22.200.0/22",
|
||||||
|
"103.31.4.0/22",
|
||||||
|
"104.16.0.0/12",
|
||||||
|
"108.162.192.0/18",
|
||||||
|
"131.0.72.0/22",
|
||||||
|
"141.101.64.0/18",
|
||||||
|
"162.158.0.0/15",
|
||||||
|
"172.64.0.0/13",
|
||||||
|
"173.245.48.0/20",
|
||||||
|
"188.114.96.0/20",
|
||||||
|
"190.93.240.0/20",
|
||||||
|
"197.234.240.0/22",
|
||||||
|
"198.41.128.0/17"
|
||||||
|
];
|
||||||
|
$valid = false;
|
||||||
|
foreach ($cloudflare_ips_v4 as $cidr) {
|
||||||
|
if (ip4_in_cidr($_SERVER["REMOTE_ADDR"], $cidr)) {
|
||||||
|
$valid = true;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return $valid;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Makes a good guess at the client's real IP address.
|
||||||
|
*
|
||||||
|
* @return string Client IP or `0.0.0.0` if we can't find anything
|
||||||
|
*/
|
||||||
|
public static function getClientIP() {
|
||||||
|
// If CloudFlare is in the mix, we should use it.
|
||||||
|
// Check if the request is actually from CloudFlare before trusting it.
|
||||||
|
if (isset($_SERVER["HTTP_CF_CONNECTING_IP"])) {
|
||||||
|
if (validateCloudflare()) {
|
||||||
|
return $_SERVER["HTTP_CF_CONNECTING_IP"];
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (isset($_SERVER["REMOTE_ADDR"])) {
|
||||||
|
return $_SERVER["REMOTE_ADDR"];
|
||||||
|
}
|
||||||
|
|
||||||
|
return "0.0.0.0"; // This will not happen unless we aren't a web server
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@ -21,6 +21,10 @@ class Strings {
|
|||||||
|
|
||||||
$this->load("en");
|
$this->load("en");
|
||||||
|
|
||||||
|
if ($language == "en") {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
if (file_exists(__DIR__ . "/../langs/$language/")) {
|
if (file_exists(__DIR__ . "/../langs/$language/")) {
|
||||||
$this->language = $language;
|
$this->language = $language;
|
||||||
$this->load($language);
|
$this->load($language);
|
||||||
|
29
required.php
29
required.php
@ -8,31 +8,30 @@
|
|||||||
* This file contains global settings and utility functions.
|
* This file contains global settings and utility functions.
|
||||||
*/
|
*/
|
||||||
ob_start(); // allow sending headers after content
|
ob_start(); // allow sending headers after content
|
||||||
//
|
|
||||||
// Composer
|
|
||||||
require __DIR__ . '/vendor/autoload.php';
|
|
||||||
|
|
||||||
// Settings file
|
// Settings file
|
||||||
require __DIR__ . '/settings.php';
|
require __DIR__ . '/settings.php';
|
||||||
|
|
||||||
// Unicode, solves almost all stupid encoding problems
|
// Unicode, solves almost all stupid encoding problems
|
||||||
header('Content-Type: text/html; charset=utf-8');
|
header('Content-Type: text/html; charset=utf-8');
|
||||||
|
|
||||||
// l33t $ecurity h4x
|
// Strip PHP version
|
||||||
|
header('X-Powered-By: PHP');
|
||||||
|
|
||||||
|
// Security
|
||||||
header('X-Content-Type-Options: nosniff');
|
header('X-Content-Type-Options: nosniff');
|
||||||
header('X-XSS-Protection: 1; mode=block');
|
header('X-XSS-Protection: 1; mode=block');
|
||||||
header('X-Powered-By: PHP'); // no versions makes it harder to find vulns
|
|
||||||
header('X-Frame-Options: "DENY"');
|
header('X-Frame-Options: "DENY"');
|
||||||
header('Referrer-Policy: "no-referrer, strict-origin-when-cross-origin"');
|
header('Referrer-Policy: "no-referrer, strict-origin-when-cross-origin"');
|
||||||
$SECURE_NONCE = base64_encode(random_bytes(8));
|
$SECURE_NONCE = base64_encode(random_bytes(8));
|
||||||
|
|
||||||
|
|
||||||
$session_length = 60 * 60; // 1 hour
|
$session_length = 60 * 60 * 1; // 1 hour
|
||||||
|
ini_set('session.gc_maxlifetime', $session_length);
|
||||||
session_set_cookie_params($session_length, "/", null, false, false);
|
session_set_cookie_params($session_length, "/", null, false, false);
|
||||||
|
|
||||||
session_start(); // stick some cookies in it
|
session_start(); // stick some cookies in it
|
||||||
//// renew session cookie
|
// renew session cookie
|
||||||
setcookie(session_name(), session_id(), time() + $session_length);
|
setcookie(session_name(), session_id(), time() + $session_length, "/", false, false);
|
||||||
|
|
||||||
$captcha_server = (CAPTCHA_ENABLED === true ? preg_replace("/http(s)?:\/\//", "", CAPTCHA_SERVER) : "");
|
$captcha_server = (CAPTCHA_ENABLED === true ? preg_replace("/http(s)?:\/\//", "", CAPTCHA_SERVER) : "");
|
||||||
if ($_SESSION['mobile'] === TRUE) {
|
if ($_SESSION['mobile'] === TRUE) {
|
||||||
@ -44,7 +43,7 @@ if ($_SESSION['mobile'] === TRUE) {
|
|||||||
. "frame-src 'none'; "
|
. "frame-src 'none'; "
|
||||||
. "font-src 'self'; "
|
. "font-src 'self'; "
|
||||||
. "connect-src *; "
|
. "connect-src *; "
|
||||||
. "style-src 'self' 'unsafe-inline'; "
|
. "style-src 'self' 'unsafe-inline' $captcha_server; "
|
||||||
. "script-src 'self' 'unsafe-inline' $captcha_server");
|
. "script-src 'self' 'unsafe-inline' $captcha_server");
|
||||||
} else {
|
} else {
|
||||||
header("Content-Security-Policy: "
|
header("Content-Security-Policy: "
|
||||||
@ -55,10 +54,14 @@ if ($_SESSION['mobile'] === TRUE) {
|
|||||||
. "frame-src 'none'; "
|
. "frame-src 'none'; "
|
||||||
. "font-src 'self'; "
|
. "font-src 'self'; "
|
||||||
. "connect-src *; "
|
. "connect-src *; "
|
||||||
. "style-src 'self' 'nonce-$SECURE_NONCE'; "
|
. "style-src 'self' 'nonce-$SECURE_NONCE' $captcha_server; "
|
||||||
. "script-src 'self' 'nonce-$SECURE_NONCE' $captcha_server");
|
. "script-src 'self' 'nonce-$SECURE_NONCE' $captcha_server");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Composer
|
||||||
|
require __DIR__ . '/vendor/autoload.php';
|
||||||
|
|
||||||
// List of alert messages
|
// List of alert messages
|
||||||
require __DIR__ . '/langs/messages.php';
|
require __DIR__ . '/langs/messages.php';
|
||||||
|
|
||||||
@ -69,6 +72,10 @@ foreach ($libs as $lib) {
|
|||||||
|
|
||||||
$Strings = new Strings(LANGUAGE);
|
$Strings = new Strings(LANGUAGE);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Kill off the running process and spit out an error message
|
||||||
|
* @param string $error error message
|
||||||
|
*/
|
||||||
function sendError($error) {
|
function sendError($error) {
|
||||||
global $SECURE_NONCE;
|
global $SECURE_NONCE;
|
||||||
die("<!DOCTYPE html>"
|
die("<!DOCTYPE html>"
|
||||||
|
2
static/css/bootstrap.min.css
vendored
2
static/css/bootstrap.min.css
vendored
File diff suppressed because one or more lines are too long
BIN
static/img/logo.png
Normal file
BIN
static/img/logo.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 10 KiB |
96
tests/User.test.php
Normal file
96
tests/User.test.php
Normal file
@ -0,0 +1,96 @@
|
|||||||
|
<?php
|
||||||
|
|
||||||
|
/*
|
||||||
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
||||||
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||||
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Fill these in with valid credentials for an account with NORMAL status
|
||||||
|
$valid_user = "";
|
||||||
|
$valid_pass = "";
|
||||||
|
|
||||||
|
require __DIR__ . "/../required.php";
|
||||||
|
error_reporting(E_ALL);
|
||||||
|
ini_set('display_errors', 'On');
|
||||||
|
header("Content-Type: text/plain");
|
||||||
|
|
||||||
|
// Test invalid user responses
|
||||||
|
|
||||||
|
$user = new User(784587254);
|
||||||
|
if ($user->exists()) {
|
||||||
|
echo "FAIL: Invalid user ID marked as existing\n";
|
||||||
|
} else {
|
||||||
|
echo "OK\n";
|
||||||
|
}
|
||||||
|
if ($user->getUID() != 784587254) {
|
||||||
|
echo "FAIL: Invalid user has mismatched UID\n";
|
||||||
|
} else {
|
||||||
|
echo "OK\n";
|
||||||
|
}
|
||||||
|
|
||||||
|
$user = User::byUsername("r9483yt8934t");
|
||||||
|
if ($user->exists()) {
|
||||||
|
echo "FAIL: Invalid username marked as existing\n";
|
||||||
|
} else {
|
||||||
|
echo "OK\n";
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($user->checkPassword("gbirg4wre") != false) {
|
||||||
|
echo "FAIL: Invalid user and invalid password allowed\n";
|
||||||
|
} else {
|
||||||
|
echo "OK\n";
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($user->has2fa() != false) {
|
||||||
|
echo "FAIL: Invalid user has 2fa\n";
|
||||||
|
} else {
|
||||||
|
echo "OK\n";
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($user->getUsername() != "r9483yt8934t") {
|
||||||
|
echo "FAIL: Invalid user has mismatched username\n";
|
||||||
|
} else {
|
||||||
|
echo "OK\n";
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($user->getStatus()->get() != 0) {
|
||||||
|
echo "FAIL: Invalid user has real account status\n";
|
||||||
|
} else {
|
||||||
|
echo "OK\n";
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($user->getStatus()->getString() != "OTHER_0") {
|
||||||
|
echo "FAIL: Invalid user has wrong account status string\n";
|
||||||
|
} else {
|
||||||
|
echo "OK\n";
|
||||||
|
}
|
||||||
|
|
||||||
|
// Test valid user responses
|
||||||
|
|
||||||
|
$user = User::byUsername($valid_user);
|
||||||
|
if (!$user->exists()) {
|
||||||
|
echo "FAIL: Valid user does not exist\n";
|
||||||
|
} else {
|
||||||
|
echo "OK\n";
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($user->checkPassword($valid_pass) !== true) {
|
||||||
|
echo "FAIL: Valid user and password not allowed\n";
|
||||||
|
} else {
|
||||||
|
echo "OK\n";
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($user->getUsername() != $valid_user) {
|
||||||
|
echo "FAIL: Valid user has mismatched username\n";
|
||||||
|
} else {
|
||||||
|
echo "OK\n";
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($user->getStatus()->getString() != "NORMAL") {
|
||||||
|
echo "FAIL: Valid user has wrong account status string\n";
|
||||||
|
} else {
|
||||||
|
echo "OK\n";
|
||||||
|
}
|
||||||
|
|
||||||
|
exit("ALL OK");
|
Loading…
x
Reference in New Issue
Block a user