specialupload.php
来自「php 开发的内容管理系统」· PHP 代码 · 共 1,110 行 · 第 1/3 页
PHP
1,110 行
return in_array( strtolower( $ext ), $list ); } /** * Perform case-insensitive match against a list of file extensions. * Returns true if any of the extensions are in the list. * * @param array $ext * @param array $list * @return bool */ function checkFileExtensionList( $ext, $list ) { foreach( $ext as $e ) { if( in_array( strtolower( $e ), $list ) ) { return true; } } return false; } /** * Verifies that it's ok to include the uploaded file * * @param string $tmpfile the full path of the temporary file to verify * @param string $extension The filename extension that the file is to be served with * @return mixed true of the file is verified, a WikiError object otherwise. */ function verify( $tmpfile, $extension ) { #magically determine mime type $magic=& wfGetMimeMagic(); $mime= $magic->guessMimeType($tmpfile,false); $fname= "SpecialUpload::verify"; #check mime type, if desired global $wgVerifyMimeType; if ($wgVerifyMimeType) { #check mime type against file extension if( !$this->verifyExtension( $mime, $extension ) ) { return new WikiErrorMsg( 'uploadcorrupt' ); } #check mime type blacklist global $wgMimeTypeBlacklist; if( isset($wgMimeTypeBlacklist) && !is_null($wgMimeTypeBlacklist) && $this->checkFileExtension( $mime, $wgMimeTypeBlacklist ) ) { return new WikiErrorMsg( 'badfiletype', htmlspecialchars( $mime ) ); } } #check for htmlish code and javascript if( $this->detectScript ( $tmpfile, $mime, $extension ) ) { return new WikiErrorMsg( 'uploadscripted' ); } /** * Scan the uploaded file for viruses */ $virus= $this->detectVirus($tmpfile); if ( $virus ) { return new WikiErrorMsg( 'uploadvirus', htmlspecialchars($virus) ); } wfDebug( "$fname: all clear; passing.\n" ); return true; } /** * Checks if the mime type of the uploaded file matches the file extension. * * @param string $mime the mime type of the uploaded file * @param string $extension The filename extension that the file is to be served with * @return bool */ function verifyExtension( $mime, $extension ) { $fname = 'SpecialUpload::verifyExtension'; $magic =& wfGetMimeMagic(); if ( ! $mime || $mime == 'unknown' || $mime == 'unknown/unknown' ) if ( ! $magic->isRecognizableExtension( $extension ) ) { wfDebug( "$fname: passing file with unknown detected mime type; unrecognized extension '$extension', can't verify\n" ); return true; } else { wfDebug( "$fname: rejecting file with unknown detected mime type; recognized extension '$extension', so probably invalid file\n" ); return false; } $match= $magic->isMatchingExtension($extension,$mime); if ($match===NULL) { wfDebug( "$fname: no file extension known for mime type $mime, passing file\n" ); return true; } elseif ($match===true) { wfDebug( "$fname: mime type $mime matches extension $extension, passing file\n" ); #TODO: if it's a bitmap, make sure PHP or ImageMagic resp. can handle it! return true; } else { wfDebug( "$fname: mime type $mime mismatches file extension $extension, rejecting file\n" ); return false; } } /** Heuristig for detecting files that *could* contain JavaScript instructions or * things that may look like HTML to a browser and are thus * potentially harmful. The present implementation will produce false positives in some situations. * * @param string $file Pathname to the temporary upload file * @param string $mime The mime type of the file * @param string $extension The extension of the file * @return bool true if the file contains something looking like embedded scripts */ function detectScript($file, $mime, $extension) { global $wgAllowTitlesInSVG; #ugly hack: for text files, always look at the entire file. #For binarie field, just check the first K. if (strpos($mime,'text/')===0) $chunk = file_get_contents( $file ); else { $fp = fopen( $file, 'rb' ); $chunk = fread( $fp, 1024 ); fclose( $fp ); } $chunk= strtolower( $chunk ); if (!$chunk) return false; #decode from UTF-16 if needed (could be used for obfuscation). if (substr($chunk,0,2)=="\xfe\xff") $enc= "UTF-16BE"; elseif (substr($chunk,0,2)=="\xff\xfe") $enc= "UTF-16LE"; else $enc= NULL; if ($enc) $chunk= iconv($enc,"ASCII//IGNORE",$chunk); $chunk= trim($chunk); #FIXME: convert from UTF-16 if necessarry! wfDebug("SpecialUpload::detectScript: checking for embedded scripts and HTML stuff\n"); #check for HTML doctype if (eregi("<!DOCTYPE *X?HTML",$chunk)) return true; /** * Internet Explorer for Windows performs some really stupid file type * autodetection which can cause it to interpret valid image files as HTML * and potentially execute JavaScript, creating a cross-site scripting * attack vectors. * * Apple's Safari browser also performs some unsafe file type autodetection * which can cause legitimate files to be interpreted as HTML if the * web server is not correctly configured to send the right content-type * (or if you're really uploading plain text and octet streams!) * * Returns true if IE is likely to mistake the given file for HTML. * Also returns true if Safari would mistake the given file for HTML * when served with a generic content-type. */ $tags = array( '<body', '<head', '<html', #also in safari '<img', '<pre', '<script', #also in safari '<table' ); if( ! $wgAllowTitlesInSVG && $extension !== 'svg' && $mime !== 'image/svg' ) { $tags[] = '<title'; } foreach( $tags as $tag ) { if( false !== strpos( $chunk, $tag ) ) { return true; } } /* * look for javascript */ #resolve entity-refs to look at attributes. may be harsh on big files... cache result? $chunk = Sanitizer::decodeCharReferences( $chunk ); #look for script-types if (preg_match("!type\s*=\s*['\"]?\s*(\w*/)?(ecma|java)!sim",$chunk)) return true; #look for html-style script-urls if (preg_match("!(href|src|data)\s*=\s*['\"]?\s*(ecma|java)script:!sim",$chunk)) return true; #look for css-style script-urls if (preg_match("!url\s*\(\s*['\"]?\s*(ecma|java)script:!sim",$chunk)) return true; wfDebug("SpecialUpload::detectScript: no scripts found\n"); return false; } /** Generic wrapper function for a virus scanner program. * This relies on the $wgAntivirus and $wgAntivirusSetup variables. * $wgAntivirusRequired may be used to deny upload if the scan fails. * * @param string $file Pathname to the temporary upload file * @return mixed false if not virus is found, NULL if the scan fails or is disabled, * or a string containing feedback from the virus scanner if a virus was found. * If textual feedback is missing but a virus was found, this function returns true. */ function detectVirus($file) { global $wgAntivirus, $wgAntivirusSetup, $wgAntivirusRequired, $wgOut; $fname= "SpecialUpload::detectVirus"; if (!$wgAntivirus) { #disabled? wfDebug("$fname: virus scanner disabled\n"); return NULL; } if (!$wgAntivirusSetup[$wgAntivirus]) { wfDebug("$fname: unknown virus scanner: $wgAntivirus\n"); $wgOut->addHTML( "<div class='error'>Bad configuration: unknown virus scanner: <i>$wgAntivirus</i></div>\n" ); #LOCALIZE return "unknown antivirus: $wgAntivirus"; } #look up scanner configuration $virus_scanner= $wgAntivirusSetup[$wgAntivirus]["command"]; #command pattern $virus_scanner_codes= $wgAntivirusSetup[$wgAntivirus]["codemap"]; #exit-code map $msg_pattern= $wgAntivirusSetup[$wgAntivirus]["messagepattern"]; #message pattern $scanner= $virus_scanner; #copy, so we can resolve the pattern if (strpos($scanner,"%f")===false) $scanner.= " ".wfEscapeShellArg($file); #simple pattern: append file to scan else $scanner= str_replace("%f",wfEscapeShellArg($file),$scanner); #complex pattern: replace "%f" with file to scan wfDebug("$fname: running virus scan: $scanner \n"); #execute virus scanner $code= false; #NOTE: there's a 50 line workaround to make stderr redirection work on windows, too. # that does not seem to be worth the pain. # Ask me (Duesentrieb) about it if it's ever needed. if (wfIsWindows()) exec("$scanner",$output,$code); else exec("$scanner 2>&1",$output,$code); $exit_code= $code; #remeber for user feedback if ($virus_scanner_codes) { #map exit code to AV_xxx constants. if (isset($virus_scanner_codes[$code])) $code= $virus_scanner_codes[$code]; #explicite mapping else if (isset($virus_scanner_codes["*"])) $code= $virus_scanner_codes["*"]; #fallback mapping } if ($code===AV_SCAN_FAILED) { #scan failed (code was mapped to false by $virus_scanner_codes) wfDebug("$fname: failed to scan $file (code $exit_code).\n"); if ($wgAntivirusRequired) return "scan failed (code $exit_code)"; else return NULL; } else if ($code===AV_SCAN_ABORTED) { #scan failed because filetype is unknown (probably imune) wfDebug("$fname: unsupported file type $file (code $exit_code).\n"); return NULL; } else if ($code===AV_NO_VIRUS) { wfDebug("$fname: file passed virus scan.\n"); return false; #no virus found } else { $output= join("\n",$output); $output= trim($output); if (!$output) $output= true; #if ther's no output, return true else if ($msg_pattern) { $groups= array(); if (preg_match($msg_pattern,$output,$groups)) { if ($groups[1]) $output= $groups[1]; } } wfDebug("$fname: FOUND VIRUS! scanner feedback: $output"); return $output; } } /** * Check if the temporary file is MacBinary-encoded, as some uploads * from Internet Explorer on Mac OS Classic and Mac OS X will be. * If so, the data fork will be extracted to a second temporary file, * which will then be checked for validity and either kept or discarded. * * @access private */ function checkMacBinary() { $macbin = new MacBinary( $this->mUploadTempName ); if( $macbin->isValid() ) { $dataFile = tempnam( wfTempDir(), "WikiMacBinary" ); $dataHandle = fopen( $dataFile, 'wb' ); wfDebug( "SpecialUpload::checkMacBinary: Extracting MacBinary data fork to $dataFile\n" ); $macbin->extractData( $dataHandle ); $this->mUploadTempName = $dataFile; $this->mUploadSize = $macbin->dataForkLength(); // We'll have to manually remove the new file if it's not kept. $this->mRemoveTempFile = true; } $macbin->close(); } /** * If we've modified the upload file we need to manually remove it * on exit to clean up. * @access private */ function cleanupTempFile() { if( $this->mRemoveTempFile && file_exists( $this->mUploadTempName ) ) { wfDebug( "SpecialUpload::cleanupTempFile: Removing temporary file $this->mUploadTempName\n" ); unlink( $this->mUploadTempName ); } } /** * Check if there's an overwrite conflict and, if so, if restrictions * forbid this user from performing the upload. * * @return mixed true on success, WikiError on failure * @access private */ function checkOverwrite( $name ) { $img = Image::newFromName( $name ); if( is_null( $img ) ) { // Uh... this shouldn't happen ;) // But if it does, fall through to previous behavior return false; } $error = ''; if( $img->exists() ) { global $wgUser, $wgOut; if( $img->isLocal() ) { if( !$wgUser->isAllowed( 'reupload' ) ) { $error = 'fileexists-forbidden'; } } else { if( !$wgUser->isAllowed( 'reupload' ) || !$wgUser->isAllowed( 'reupload-shared' ) ) { $error = "fileexists-shared-forbidden"; } } } if( $error ) { $errorText = wfMsg( $error, wfEscapeWikiText( $img->getName() ) ); return new WikiError( $wgOut->parse( $errorText ) ); } // Rockin', go ahead and upload return true; }}?>
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?