|
@@ -186,7 +186,7 @@ function getURLContent($url, $postorget = 'GET', $param = '', $followlocation =
|
|
|
} elseif (in_array($hosttocheck, array('ip6-localhost', 'ip6-loopback'))) {
|
|
|
$iptocheck = '::1';
|
|
|
} else {
|
|
|
- // Resolve $hosttocheck to get the IP $iptocheck and set CURLOPT_CONNECT_TO to use this ip so curl will not try another resolution that may give a different result
|
|
|
+ // Resolve $hosttocheck to get the IP $iptocheck
|
|
|
if (function_exists('gethostbyname')) {
|
|
|
$iptocheck = gethostbyname($hosttocheck);
|
|
|
} else {
|
|
@@ -201,55 +201,15 @@ function getURLContent($url, $postorget = 'GET', $param = '', $followlocation =
|
|
|
}
|
|
|
|
|
|
if ($iptocheck) {
|
|
|
- if ($localurl == 0) { // Only external url allowed (dangerous, may allow to get malware)
|
|
|
- if (!filter_var($iptocheck, FILTER_VALIDATE_IP, FILTER_FLAG_NO_PRIV_RANGE | FILTER_FLAG_NO_RES_RANGE)) {
|
|
|
- // Deny ips like 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, 0.0.0.0/8, 169.254.0.0/16, 127.0.0.0/8 et 240.0.0.0/4, ::1/128, ::/128, ::ffff:0:0/96, fe80::/10...
|
|
|
- $info['http_code'] = 400;
|
|
|
- $info['content'] = 'Error bad hostname IP (private or reserved range). Must be an external URL.';
|
|
|
- break;
|
|
|
- }
|
|
|
- if (!empty($_SERVER["SERVER_ADDR"]) && $iptocheck == $_SERVER["SERVER_ADDR"]) {
|
|
|
- $info['http_code'] = 400;
|
|
|
- $info['content'] = 'Error bad hostname IP (IP is a local IP). Must be an external URL.';
|
|
|
- break;
|
|
|
- }
|
|
|
- if (!empty($conf->global->MAIN_SECURITY_ANTI_SSRF_SERVER_IP) && in_array($iptocheck, explode(',', $conf->global->MAIN_SECURITY_ANTI_SSRF_SERVER_IP))) {
|
|
|
- $info['http_code'] = 400;
|
|
|
- $info['content'] = 'Error bad hostname IP (IP is a local IP defined into MAIN_SECURITY_SERVER_IP). Must be an external URL.';
|
|
|
- break;
|
|
|
- }
|
|
|
- }
|
|
|
- if ($localurl == 1) { // Only local url allowed (dangerous, may allow to get metadata on server or make internal port scanning)
|
|
|
- // Deny ips NOT like 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, 0.0.0.0/8, 169.254.0.0/16, 127.0.0.0/8 et 240.0.0.0/4, ::1/128, ::/128, ::ffff:0:0/96, fe80::/10...
|
|
|
- if (filter_var($iptocheck, FILTER_VALIDATE_IP, FILTER_FLAG_NO_PRIV_RANGE | FILTER_FLAG_NO_RES_RANGE)) {
|
|
|
- $info['http_code'] = 400;
|
|
|
- $info['content'] = 'Error bad hostname '.$iptocheck.'. Must be a local URL.';
|
|
|
- break;
|
|
|
- }
|
|
|
- if (!empty($conf->global->MAIN_SECURITY_ANTI_SSRF_SERVER_IP) && !in_array($iptocheck, explode(',', $conf->global->MAIN_SECURITY_ANTI_SSRF_SERVER_IP))) {
|
|
|
- $info['http_code'] = 400;
|
|
|
- $info['content'] = 'Error bad hostname IP (IP is not a local IP defined into list MAIN_SECURITY_SERVER_IP). Must be a local URL in allowed list.';
|
|
|
- break;
|
|
|
- }
|
|
|
- }
|
|
|
-
|
|
|
- // Common check on ip (local and external)
|
|
|
- // See list on https://tagmerge.com/gist/a7b9d57ff8ec11d63642f8778609a0b8
|
|
|
- // Not evasive url that ar enot IP are excluded by test on IP v4/v6 validity.
|
|
|
- $arrayofmetadataserver = array(
|
|
|
- '100.100.100.200' => 'Alibaba',
|
|
|
- '192.0.0.192' => 'Oracle',
|
|
|
- '192.80.8.124' => 'Packet',
|
|
|
- '100.88.222.5' => 'Tencent cloud',
|
|
|
- );
|
|
|
- foreach ($arrayofmetadataserver as $ipofmetadataserver => $nameofmetadataserver) {
|
|
|
- if ($iptocheck == $ipofmetadataserver) {
|
|
|
- $info['http_code'] = 400;
|
|
|
- $info['content'] = 'Error bad hostname IP (Used by '.$nameofmetadataserver.' metadata server). This IP is forbidden.';
|
|
|
- break 2; // exit the foreach and the do...
|
|
|
- }
|
|
|
+ $tmpresult = isIPAllowed($iptocheck, $localurl);
|
|
|
+ if ($tmpresult) {
|
|
|
+ $info['http_code'] = 400;
|
|
|
+ $info['content'] = $tmpresult;
|
|
|
+ break;
|
|
|
}
|
|
|
+ }
|
|
|
|
|
|
+ if ($iptocheck) {
|
|
|
// Set CURLOPT_CONNECT_TO so curl will not try another resolution that may give a different result. Possible only on PHP v7+
|
|
|
if (defined('CURLOPT_CONNECT_TO')) {
|
|
|
$connect_to = array(sprintf("%s:%d:%s:%d", $newUrlArray['host'], empty($newUrlArray['port'])?'':$newUrlArray['port'], $iptocheck, empty($newUrlArray['port'])?'':$newUrlArray['port']));
|
|
@@ -317,6 +277,62 @@ function getURLContent($url, $postorget = 'GET', $param = '', $followlocation =
|
|
|
return $rep;
|
|
|
}
|
|
|
|
|
|
+/**
|
|
|
+ * Is IP allowed
|
|
|
+ *
|
|
|
+ * @param string $iptocheck IP to check
|
|
|
+ * @param int $localurl 0=external url only, 1=internal url only
|
|
|
+ * @return string Error message or ''
|
|
|
+ */
|
|
|
+function isIPAllowed($iptocheck, $localurl)
|
|
|
+{
|
|
|
+ global $conf;
|
|
|
+
|
|
|
+ if ($localurl == 0) { // Only external url allowed (dangerous, may allow to get malware)
|
|
|
+ if (!filter_var($iptocheck, FILTER_VALIDATE_IP, FILTER_FLAG_NO_PRIV_RANGE | FILTER_FLAG_NO_RES_RANGE)) {
|
|
|
+ // Deny ips like 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, 0.0.0.0/8, 169.254.0.0/16, 127.0.0.0/8 et 240.0.0.0/4, ::1/128, ::/128, ::ffff:0:0/96, fe80::/10...
|
|
|
+ $errormsg = 'Error bad hostname IP (private or reserved range). Must be an external URL.';
|
|
|
+ return $errormsg;
|
|
|
+ }
|
|
|
+ if (!empty($_SERVER["SERVER_ADDR"]) && $iptocheck == $_SERVER["SERVER_ADDR"]) {
|
|
|
+ $errormsg = 'Error bad hostname IP (IP is a local IP). Must be an external URL.';
|
|
|
+ return $errormsg;
|
|
|
+ }
|
|
|
+ if (!empty($conf->global->MAIN_SECURITY_ANTI_SSRF_SERVER_IP) && in_array($iptocheck, explode(',', $conf->global->MAIN_SECURITY_ANTI_SSRF_SERVER_IP))) {
|
|
|
+ $errormsg = 'Error bad hostname IP (IP is a local IP defined into MAIN_SECURITY_SERVER_IP). Must be an external URL.';
|
|
|
+ return $errormsg;
|
|
|
+ }
|
|
|
+ }
|
|
|
+ if ($localurl == 1) { // Only local url allowed (dangerous, may allow to get metadata on server or make internal port scanning)
|
|
|
+ // Deny ips NOT like 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, 0.0.0.0/8, 169.254.0.0/16, 127.0.0.0/8 et 240.0.0.0/4, ::1/128, ::/128, ::ffff:0:0/96, fe80::/10...
|
|
|
+ if (filter_var($iptocheck, FILTER_VALIDATE_IP, FILTER_FLAG_NO_PRIV_RANGE | FILTER_FLAG_NO_RES_RANGE)) {
|
|
|
+ $errormsg = 'Error bad hostname '.$iptocheck.'. Must be a local URL.';
|
|
|
+ return $errormsg;
|
|
|
+ }
|
|
|
+ if (!empty($conf->global->MAIN_SECURITY_ANTI_SSRF_SERVER_IP) && !in_array($iptocheck, explode(',', $conf->global->MAIN_SECURITY_ANTI_SSRF_SERVER_IP))) {
|
|
|
+ $errormsg = 'Error bad hostname IP (IP is not a local IP defined into list MAIN_SECURITY_SERVER_IP). Must be a local URL in allowed list.';
|
|
|
+ return $errormsg;
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ // Common check on ip (local and external)
|
|
|
+ // See list on https://tagmerge.com/gist/a7b9d57ff8ec11d63642f8778609a0b8
|
|
|
+ // Not evasive url that ar enot IP are excluded by test on IP v4/v6 validity.
|
|
|
+ $arrayofmetadataserver = array(
|
|
|
+ '100.100.100.200' => 'Alibaba',
|
|
|
+ '192.0.0.192' => 'Oracle',
|
|
|
+ '192.80.8.124' => 'Packet',
|
|
|
+ '100.88.222.5' => 'Tencent cloud',
|
|
|
+ );
|
|
|
+ foreach ($arrayofmetadataserver as $ipofmetadataserver => $nameofmetadataserver) {
|
|
|
+ if ($iptocheck == $ipofmetadataserver) {
|
|
|
+ $errormsg = 'Error bad hostname IP (Used by '.$nameofmetadataserver.' metadata server). This IP is forbidden.';
|
|
|
+ return $errormsg;
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ return '';
|
|
|
+}
|
|
|
|
|
|
/**
|
|
|
* Function get second level domain name.
|