Revision 1460
Added by Luisehahne over 14 years ago
| upload.php | ||
|---|---|---|
| 66 | 66 |
$file_extension_string=$fetch_result['value']; |
| 67 | 67 |
} |
| 68 | 68 |
$file_extensions=explode(",",$file_extension_string);
|
| 69 |
|
|
| 69 |
// get from settings and add to forbidden list |
|
| 70 |
$rename_file_types = str_replace(',','|',RENAME_FILES_ON_UPLOAD);
|
|
| 71 |
// hardcodet forbidden filetypes |
|
| 72 |
$forbidden_file_types = 'phtml|php5|php4|php|cgi|pl|exe|com|bat|src|'.$rename_file_types; |
|
| 70 | 73 |
// Loop through the files |
| 71 | 74 |
$good_uploads = 0; |
| 72 | 75 |
for($count = 1; $count <= 10; $count++) {
|
| 73 | 76 |
// If file was upload to tmp |
| 74 | 77 |
if(isset($_FILES["file$count"]['name'])) {
|
| 75 | 78 |
// Remove bad characters |
| 76 |
$filename = media_filename($_FILES["file$count"]['name']);
|
|
| 79 |
$filename = trim(media_filename($_FILES["file$count"]['name']),'.') ;
|
|
| 77 | 80 |
// Check if there is still a filename left |
| 78 |
if($filename != '') {
|
|
| 79 |
// Check for potentially malicious files and append 'txt' to their name |
|
| 81 |
// if($filename != '') {
|
|
| 82 |
$info = pathinfo($filename); |
|
| 83 |
$ext = isset($info['extension']) ? $info['extension'] : ''; |
|
| 84 |
|
|
| 85 |
if ( ($filename != '') && !preg_match("/\." . $forbidden_file_types . "$/i", $ext) ) {
|
|
| 86 |
/* |
|
| 87 |
// Check for potentially malicious files and append 'txt' to their name |
|
| 80 | 88 |
foreach($file_extensions as $file_ext) {
|
| 81 | 89 |
$file_ext_len=strlen($file_ext); |
| 82 | 90 |
if (substr($filename,-$file_ext_len)==$file_ext) {
|
| 83 | 91 |
$filename.='.txt'; |
| 84 | 92 |
} |
| 85 |
} |
|
| 93 |
} |
|
| 94 |
*/ |
|
| 86 | 95 |
// Move to relative path (in media folder) |
| 87 |
if(file_exists($relative.$filename) AND $overwrite == true) {
|
|
| 96 |
if(file_exists($relative.$filename) AND $overwrite == true) {
|
|
| 88 | 97 |
if(move_uploaded_file($_FILES["file$count"]['tmp_name'], $relative.$filename)) {
|
| 89 | 98 |
$good_uploads++; |
| 90 | 99 |
// Chmod the uploaded file |
| 91 |
change_mode($relative.$filename, 'file');
|
|
| 100 |
change_mode($relative.$filename); |
|
| 92 | 101 |
} |
| 93 | 102 |
} elseif(!file_exists($relative.$filename)) {
|
| 94 | 103 |
if(move_uploaded_file($_FILES["file$count"]['tmp_name'], $relative.$filename)) {
|
| ... | ... | |
| 97 | 106 |
change_mode($relative.$filename); |
| 98 | 107 |
} |
| 99 | 108 |
} |
| 100 |
|
|
| 109 |
|
|
| 101 | 110 |
if(file_exists($relative.$filename)) {
|
| 102 | 111 |
if ($pathsettings[$resizepath]['width'] || $pathsettings[$resizepath]['height'] ) {
|
| 103 | 112 |
$rimg=new RESIZEIMAGE($relative.$filename); |
| ... | ... | |
| 105 | 114 |
$rimg->close(); |
| 106 | 115 |
} |
| 107 | 116 |
} |
| 108 |
|
|
| 117 |
|
|
| 109 | 118 |
// store file name of first file for possible unzip action |
| 110 | 119 |
if ($count == 1) {
|
| 111 | 120 |
$filename1 = $relative . $filename; |
| ... | ... | |
| 113 | 122 |
} |
| 114 | 123 |
} |
| 115 | 124 |
} |
| 125 |
/* |
|
| 126 |
* Callback function to skip files in black-list |
|
| 127 |
*/ |
|
| 128 |
function pclzipCheckValidFile($p_event, &$p_header) |
|
| 129 |
{
|
|
| 130 |
// return 1; |
|
| 131 |
$rename_file_types = str_replace(',','|',RENAME_FILES_ON_UPLOAD);
|
|
| 132 |
// hardcodet forbidden filetypes |
|
| 133 |
$forbidden_file_types = 'phtml|php5|php4|php|cgi|pl|exe|com|bat|src|'.$rename_file_types; |
|
| 134 |
$info = pathinfo($p_header['filename']); |
|
| 135 |
$ext = isset($info['extension']) ? $info['extension'] : ''; |
|
| 136 |
$dots = (substr($info['basename'], 0, 1) == '.') || (substr($info['basename'], -1, 1) == '.'); |
|
| 137 |
if( !preg_match('/'.$forbidden_file_types.'$/i', $ext) && $dots != '.' )
|
|
| 138 |
{ // ----- allowed file types are extracted
|
|
| 139 |
return 1; |
|
| 140 |
}else |
|
| 141 |
{ // ----- all other files are skiped
|
|
| 142 |
return 0; |
|
| 143 |
} |
|
| 144 |
} |
|
| 145 |
/* ********************************* */ |
|
| 116 | 146 |
|
| 117 | 147 |
// If the user chose to unzip the first file, unzip into the current folder |
| 118 | 148 |
if (isset($_POST['unzip']) && isset($filename1) && file_exists($filename1) ) {
|
| 119 | 149 |
$archive = new PclZip($filename1); |
| 120 |
$list = $archive->extract(PCLZIP_OPT_PATH, $relative); |
|
| 150 |
|
|
| 151 |
$list = $archive->extract(PCLZIP_OPT_PATH, $relative,PCLZIP_CB_PRE_EXTRACT, 'pclzipCheckValidFile'); |
|
| 152 |
|
|
| 121 | 153 |
if($list == 0) {
|
| 122 | 154 |
// error while trying to extract the archive (most likely wrong format) |
| 123 | 155 |
$admin->print_error('UNABLE TO UNZIP FILE' . $archive -> errorInfo(true));
|
| 124 | 156 |
} |
| 125 |
|
|
| 157 |
|
|
| 158 |
$sum_dirs = 0; |
|
| 159 |
$sum_files = 0; |
|
| 160 |
|
|
| 126 | 161 |
// rename executable files! |
| 127 |
foreach ($list as $val) {
|
|
| 128 |
$fn = $val['filename']; |
|
| 129 |
$fnp = pathinfo($fn); |
|
| 130 |
if (isset($fnp['extension'])) {
|
|
| 131 |
$fext = $fnp['extension']; |
|
| 132 |
if (in_array($fext, $file_extensions)) {
|
|
| 133 |
rename($fn, $fn.".txt"); |
|
| 134 |
} |
|
| 162 |
foreach ($list as $key => $val) {
|
|
| 163 |
if( ($val['folder'] ) && change_mode($val['filename']) ) {
|
|
| 164 |
$sum_dirs++; |
|
| 165 |
} elseif( is_writable($val['filename']) && ($val['status'] == 'ok') && change_mode($val['filename']) ) {
|
|
| 166 |
$sum_files++; |
|
| 135 | 167 |
} |
| 136 | 168 |
} |
| 169 |
if (isset($_POST['delzip'])) { unlink($filename1); }
|
|
| 137 | 170 |
} |
| 138 |
|
|
| 171 |
unset($list); |
|
| 139 | 172 |
if($good_uploads == 1) {
|
| 140 |
$admin->print_success($good_uploads.' '.$MESSAGE['MEDIA']['SINGLE_UPLOADED'] ); |
|
| 141 |
if (isset($_POST['delzip'])) {
|
|
| 142 |
unlink($filename1); |
|
| 143 |
} |
|
| 173 |
$admin->print_success($sum_files.' '.$MESSAGE['MEDIA']['SINGLE_UPLOADED'] ); |
|
| 144 | 174 |
} else {
|
| 145 | 175 |
$admin->print_success($good_uploads.' '.$MESSAGE['MEDIA']['UPLOADED'] ); |
| 146 | 176 |
} |
Also available in: Unified diff
Ticket 1101, phtml|php5|php4|php|cgi|pl|exe|com|bat|src| will be hardcoded
additional you can set more extension in settings extended in field rename_file_types
rename_file_types now is a blacklist and will no longer be renamed to .txt
update admintools modules to work with SecureForm Patch from NorHei