tunning pixlr security

skala
Juan Carlos Raña 13 years ago
parent 8db180bd53
commit cd0623c678
  1. 72
      main/document/save_pixlr.php

@ -15,9 +15,15 @@ require_once '../inc/global.inc.php';
require_once api_get_path(LIBRARY_PATH).'fileUpload.lib.php';
require_once api_get_path(LIBRARY_PATH).'document.lib.php';
api_protect_course_script();
api_block_anonymous_users();
var_dump($_GET);
if ($_user['user_id']!= api_get_user_id() || api_get_user_id()==0 || $_user['user_id']==0) {
api_not_allowed();
die();
}
if(!isset($_GET['title']) || !isset($_GET['type']) || !isset($_GET['image'])) {
api_not_allowed();
@ -25,11 +31,12 @@ if(!isset($_GET['title']) || !isset($_GET['type']) || !isset($_GET['image'])) {
}
if(!isset($_SESSION['paint_dir']) || !isset($_SESSION['whereami']) ){
api_not_allowed();//
api_not_allowed();
die();
}
//pixlr return
$filename=Security::remove_XSS($_GET['title']);//The user preferred file name of the image.
$extension=Security::remove_XSS($_GET['type']);//The image type, "pdx", "jpg", "bmp" or "png".
$urlcontents=Security::remove_XSS($_GET['image']);//A URL to the image on Pixlr.com server or the raw file post of the saved image.
@ -46,8 +53,15 @@ $saveDir=$dirBaseDocuments.$_SESSION['paint_dir'];
$contents = file_get_contents($urlcontents);
//Security. Verify that the URL is pointing to a file @ pixlr.com domain or an ip @ pixlr.com. Comment because sometimes return a ip number
/*
if (strpos($urlcontents, "pixlr.com") === 0){
echo "Invalid referrer";
exit;
}
*/
//Verify that the URL is pointing to a file @ pixlr.com domain or an ip @ pixlr.com
//Security. Allway get from pixlr.com. Comment because for now this does not run
/*
$urlcontents1='http://pixlr.com/';
$urlcontents2 = strstr($urlcontents, '_temp');
@ -55,34 +69,51 @@ $urlcontents_to_save=$urlcontents1.$urlcontents2;
$contents = file_get_contents($urlcontents_to_save);//replace line 45.
*/
//a bit title security
$filename = addslashes(trim($filename));
$filename = Security::remove_XSS($filename);
$filename = replace_dangerous_char($filename, 'strict');
$filename = disable_dangerous_file($filename);
if (strlen(trim($filename))==0) {
echo "The title is empty";//if title is empty, headers Content-Type = application/octet-stream, then not create a new title here please
exit;
}
//check file_get_contents
if ($contents === false) {
echo "I cannot read: ".$urlcontents;
exit;
}
}
//Verify that the file is an image
// Extension security
if($extension!= 'jpg' && $extension!= 'png' && $extension!= 'pxd'){
die();
}
if($extension=='pxd') {
echo "pxd file type does not supported";// not secure because check security headers and finfo() return Content-Type = application/octet-stream
exit;
}
//Verify that the file is an image. Headers method
$headers = get_headers($urlcontents, 1);
$content_type = explode("/", $headers['Content-Type']);
if ($content_type[0] != "image"){
if ($content_type[0] != "image") {
echo "Invalid file type";
exit;
}
//a bit title security
$filename = addslashes(trim($filename));
$filename = Security::remove_XSS($filename);
$filename = replace_dangerous_char($filename, 'strict');
$filename = disable_dangerous_file($filename);
// a bit extension security
if($extension!= 'jpg' && $extension!= 'png' && $extension!= 'bmp' && $extension!= 'pxd'){
die();
//Verify that the file is an image. Fileinfo method
if (phpversion() >= '5.3' && extension_loaded('fileinfo')) {
$finfo = new finfo(FILEINFO_MIME);
$current_mime=$finfo->buffer($contents);
finfo_close($finfo);
if(strpos($current_mime, 'image')===false) {
echo "Invalid mime type file";
exit;
}
}
//TODO: a bit mime security
//path, file and title
$paintFileName = $filename.'.'.$extension;
$title = $title.'.'.$extension;
@ -137,7 +168,8 @@ if($currentTool=='document/createpaint'){
//delete temporal file
unlink($_SESSION['temp_realpath_image']);
$temp_file_2delete=$_SESSION['temp_realpath_image'];
unlink($temp_file_2delete);
//Clean sessions and return to Chamilo file list
unset($_SESSION['paint_dir']);

Loading…
Cancel
Save