Просмотр исходного кода

CSRF check was to strict and didn't bypass the check...

Jaap Marcus 4 лет назад
Родитель
Сommit
8d44965d82
1 измененных файлов с 4 добавлено и 3 удалено
  1. 4 3
      web/inc/prevent_csrf.php

+ 4 - 3
web/inc/prevent_csrf.php

@@ -2,13 +2,13 @@
 
 
     $check_csrf = true;
     $check_csrf = true;
 
 
-    if ($_SERVER['SCRIPT_FILENAME'] == '/usr/local/hestia/web/inc/mail-wrapper.php ') {
+    if ($_SERVER['SCRIPT_FILENAME'] == '/usr/local/hestia/web/inc/mail-wrapper.php' || $_SERVER['SCRIPT_FILENAME'] == '/usr/local/hestia//web/inc/mail-wrapper.php') {
         $check_csrf=false;
         $check_csrf=false;
     } // execute only from CLI
     } // execute only from CLI
-    if ($_SERVER['SCRIPT_FILENAME'] == '/usr/local/hestia/web/reset/mail/index.php ') {
+    if ($_SERVER['SCRIPT_FILENAME'] == '/usr/local/hestia/web/reset/mail/index.php' || $_SERVER['SCRIPT_FILENAME'] == '/usr/local/hestia/web//reset/mail/index.php') {
         $check_csrf=false;
         $check_csrf=false;
     } // Localhost only
     } // Localhost only
-    if ($_SERVER['SCRIPT_FILENAME'] == '/usr/local/hestia/web/api/index.php') {
+    if ($_SERVER['SCRIPT_FILENAME'] == '/usr/local/hestia/web/api/index.php' || $_SERVER['SCRIPT_FILENAME'] == '/usr/local/hestia/web//api/index.php') {
         $check_csrf=false;
         $check_csrf=false;
     } // Own check
     } // Own check
     if (substr($_SERVER['SCRIPT_FILENAME'], 0, 22)=='/usr/local/hestia/bin/') {
     if (substr($_SERVER['SCRIPT_FILENAME'], 0, 22)=='/usr/local/hestia/bin/') {
@@ -20,6 +20,7 @@
         if ($level >= $_SESSION['POLICY_CSRF_STRICTNESS']) {
         if ($level >= $_SESSION['POLICY_CSRF_STRICTNESS']) {
             return true;
             return true;
         } else {
         } else {
+            http_response_code(400);
             echo "<h1>Potential use CSRF detected</h1>\n".
             echo "<h1>Potential use CSRF detected</h1>\n".
             "<p>Please disable any plugins/add-ons inside your browser or contact your system administrator. If you are the system administrator you can run v-change-sys-config-value 'POLICY_CSRF_STRICTNESS' '0' as root to disable this check.<p>".
             "<p>Please disable any plugins/add-ons inside your browser or contact your system administrator. If you are the system administrator you can run v-change-sys-config-value 'POLICY_CSRF_STRICTNESS' '0' as root to disable this check.<p>".
             "<p>If you folowed a bookmark or an static link <a href='/'>please click here</a>";
             "<p>If you folowed a bookmark or an static link <a href='/'>please click here</a>";