X-Git-Url: https://vcs.fsf.org/?p=squirrelmail.git;a=blobdiff_plain;f=src%2Fredirect.php;h=97600d23e347a9439b46ad67f1fa2e91932dc827;hp=354cbc9f7e1c306ca72279680645c4739fa79178;hb=a9805897ba12de9a63b9a435ccbb49a027d86e4a;hpb=ef33def68208a5b7050aaa0ac61399d4d19de6e6 diff --git a/src/redirect.php b/src/redirect.php index 354cbc9f..97600d23 100644 --- a/src/redirect.php +++ b/src/redirect.php @@ -5,7 +5,7 @@ * * Derived from webmail.php by Ralf Kraudelt * - * @copyright © 1999-2007 The SquirrelMail Project Team + * @copyright 1999-2014 The SquirrelMail Project Team * @license http://opensource.org/licenses/gpl-license.php GNU Public License * @version $Id$ * @package squirrelmail @@ -23,7 +23,11 @@ require('../include/init.php'); require_once(SM_PATH . 'functions/imap_general.php'); require_once(SM_PATH . 'functions/strings.php'); +// Disable browser caching +// +header('Cache-Control: no-cache, no-store, must-revalidate, max-age=0'); header('Pragma: no-cache'); +header('Expires: Sat, 1 Jan 2000 00:00:00 GMT'); $location = get_location(); // session_set_cookie_params (0, $base_uri); @@ -67,14 +71,27 @@ if ($force_username_lowercase) { } /* Verify that username and password are correct. */ -$imapConnection = sqimap_login($login_username, $key, $imapServerAddress, $imapPort, 0); +global $imap_stream_options; // in case not defined in config +$imapConnection = sqimap_login($login_username, $key, $imapServerAddress, $imapPort, 0, $imap_stream_options); /* From now on we are logged it. If the login failed then sqimap_login handles it */ -/* regenerate the session id to avoid session hyijacking */ -//FIXME! IMPORTANT! SOMEONE PLEASE EXPLAIN THE SECURITY CONCERN HERE; THIS session_destroy() BORKS ANY SESSION INFORMATION ADDED ON THE LOGIN PAGE (SPECIFICALLY THE SESSION RESTORE DATA, BUT ALSO ANYTHING ADDED BY PLUGINS, ETC)... I HAVE DISABLED THIS (AND NOTE THAT THE LOGIN PAGE ALREADY EXECUTES A session_destroy() (see includes/init.php)), SO PLEASE, WHOEVER ADDED THIS, PLEASE ANALYSE THIS SITUATION AND COMMENT ON IF IT IS OK LIKE THIS!! WHAT HIJACKING ISSUES ARE WE SUPPOSED TO BE PREVENTING HERE? -//sqsession_destroy(); -//@sqsession_is_active(); -//session_regenerate_id(); +/** + * Regenerate session id to make sure that authenticated session uses + * different ID than one used before user authenticated. This is a + * countermeasure against session fixation attacks. + * NB: session_regenerate_id() was added in PHP 4.3.2 (and new session + * cookie is only sent out in this call as of PHP 4.3.3), but PHP 4 + * is not vulnerable to session fixation problems in SquirrelMail + * because it prioritizes $base_uri subdirectory cookies differently + * than PHP 5, which is otherwise vulnerable. If we really want to, + * we could define our own session_regenerate_id() when one does not + * exist, but there seems to be no reason to do so. + */ +sqsession_is_active(); +if (function_exists('session_regenerate_id')) { + session_regenerate_id(); +} + /** * The cookie part. session_start and session_regenerate_session normally set * their own cookie. SquirrelMail sets another cookie which overwites the @@ -139,7 +156,8 @@ if ( sqgetGlobalVar('HTTP_ACCEPT', $http_accept, SQ_SERVER) && // having just logged in, need to synch the template file cache // so the right template set is displayed (per user prefs) require(SM_PATH . 'include/load_prefs.php'); -Template::cache_template_file_hierarchy(TRUE); +global $sTemplateID; +Template::cache_template_file_hierarchy($sTemplateID, TRUE); /* Complete autodetection of Javascript. */ checkForJavascript();