document.php 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329
  1. <?php
  2. /* Copyright (C) 2004-2007 Rodolphe Quiedeville <rodolphe@quiedeville.org>
  3. * Copyright (C) 2004-2013 Laurent Destailleur <eldy@users.sourceforge.net>
  4. * Copyright (C) 2005 Simon Tosser <simon@kornog-computing.com>
  5. * Copyright (C) 2005-2012 Regis Houssin <regis.houssin@inodbox.com>
  6. * Copyright (C) 2010 Pierre Morin <pierre.morin@auguria.net>
  7. * Copyright (C) 2010 Juanjo Menent <jmenent@2byte.es>
  8. * Copyright (C) 2022 Ferran Marcet <fmarcet@2byte.es>
  9. *
  10. * This program is free software; you can redistribute it and/or modify
  11. * it under the terms of the GNU General Public License as published by
  12. * the Free Software Foundation; either version 3 of the License, or
  13. * (at your option) any later version.
  14. *
  15. * This program is distributed in the hope that it will be useful,
  16. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  18. * GNU General Public License for more details.
  19. *
  20. * You should have received a copy of the GNU General Public License
  21. * along with this program. If not, see <https://www.gnu.org/licenses/>.
  22. * or see https://www.gnu.org/
  23. */
  24. /**
  25. * \file htdocs/document.php
  26. * \brief Wrapper to download data files
  27. * \remarks Call of this wrapper is made with URL:
  28. * DOL_URL_ROOT.'/document.php?modulepart=repfichierconcerne&file=relativepathoffile'
  29. * DOL_URL_ROOT.'/document.php?modulepart=logs&file=dolibarr.log'
  30. * DOL_URL_ROOT.'/document.php?hashp=sharekey'
  31. */
  32. //if (! defined('NOREQUIREUSER')) define('NOREQUIREUSER','1'); // Not disabled cause need to load personalized language
  33. //if (! defined('NOREQUIREDB')) define('NOREQUIREDB','1'); // Not disabled cause need to load personalized language
  34. if (!defined('NOTOKENRENEWAL')) {
  35. define('NOTOKENRENEWAL', '1');
  36. }
  37. if (!defined('NOREQUIREMENU')) {
  38. define('NOREQUIREMENU', '1');
  39. }
  40. if (!defined('NOREQUIREHTML')) {
  41. define('NOREQUIREHTML', '1');
  42. }
  43. if (!defined('NOREQUIREAJAX')) {
  44. define('NOREQUIREAJAX', '1');
  45. }
  46. // For direct external download link, we don't need to load/check we are into a login session
  47. if (isset($_GET["hashp"]) && !defined("NOLOGIN")) {
  48. if (!defined("NOLOGIN")) {
  49. define("NOLOGIN", 1);
  50. }
  51. if (!defined("NOCSRFCHECK")) {
  52. define("NOCSRFCHECK", 1); // We accept to go on this page from external web site.
  53. }
  54. if (!defined("NOIPCHECK")) {
  55. define("NOIPCHECK", 1); // Do not check IP defined into conf $dolibarr_main_restrict_ip
  56. }
  57. }
  58. // Some value of modulepart can be used to get resources that are public so no login are required.
  59. if ((isset($_GET["modulepart"]) && $_GET["modulepart"] == 'medias')) {
  60. if (!defined("NOLOGIN")) {
  61. define("NOLOGIN", 1);
  62. }
  63. if (!defined("NOCSRFCHECK")) {
  64. define("NOCSRFCHECK", 1); // We accept to go on this page from external web site.
  65. }
  66. if (!defined("NOIPCHECK")) {
  67. define("NOIPCHECK", 1); // Do not check IP defined into conf $dolibarr_main_restrict_ip
  68. }
  69. }
  70. /**
  71. * Header empty
  72. *
  73. * @ignore
  74. * @return void
  75. */
  76. function llxHeader()
  77. {
  78. }
  79. /**
  80. * Footer empty
  81. *
  82. * @ignore
  83. * @return void
  84. */
  85. function llxFooter()
  86. {
  87. }
  88. require 'main.inc.php'; // Load $user and permissions
  89. require_once DOL_DOCUMENT_ROOT.'/core/lib/files.lib.php';
  90. require_once DOL_DOCUMENT_ROOT.'/core/lib/images.lib.php';
  91. $encoding = '';
  92. $action = GETPOST('action', 'aZ09');
  93. $original_file = GETPOST('file', 'alphanohtml'); // Do not use urldecode here ($_GET are already decoded by PHP).
  94. $hashp = GETPOST('hashp', 'aZ09');
  95. $modulepart = GETPOST('modulepart', 'alpha');
  96. $urlsource = GETPOST('urlsource', 'alpha');
  97. $entity = GETPOST('entity', 'int') ?GETPOST('entity', 'int') : $conf->entity;
  98. // Security check
  99. if (empty($modulepart) && empty($hashp)) {
  100. accessforbidden('Bad link. Bad value for parameter modulepart', 0, 0, 1);
  101. }
  102. if (empty($original_file) && empty($hashp)) {
  103. accessforbidden('Bad link. Missing identification to find file (original_file or hashp)', 0, 0, 1);
  104. }
  105. if ($modulepart == 'fckeditor') {
  106. $modulepart = 'medias'; // For backward compatibility
  107. }
  108. $socid = 0;
  109. if ($user->socid > 0) {
  110. $socid = $user->socid;
  111. }
  112. // For some module part, dir may be privates
  113. if (in_array($modulepart, array('facture_paiement', 'unpaid'))) {
  114. if (empty($user->rights->societe->client->voir) || $socid) {
  115. $original_file = 'private/'.$user->id.'/'.$original_file; // If user has no permission to see all, output dir is specific to user
  116. }
  117. }
  118. /*
  119. * Actions
  120. */
  121. // None
  122. /*
  123. * View
  124. */
  125. // If we have a hash public (hashp), we guess the original_file.
  126. $ecmfile='';
  127. if (!empty($hashp)) {
  128. include_once DOL_DOCUMENT_ROOT.'/ecm/class/ecmfiles.class.php';
  129. $ecmfile = new EcmFiles($db);
  130. $result = $ecmfile->fetch(0, '', '', '', $hashp);
  131. if ($result > 0) {
  132. $tmp = explode('/', $ecmfile->filepath, 2); // $ecmfile->filepath is relative to document directory
  133. // filepath can be 'users/X' or 'X/propale/PR11111'
  134. if (is_numeric($tmp[0])) { // If first tmp is numeric, it is subdir of company for multicompany, we take next part.
  135. $tmp = explode('/', $tmp[1], 2);
  136. }
  137. $moduleparttocheck = $tmp[0]; // moduleparttocheck is first part of path
  138. if ($modulepart) { // Not required, so often not defined, for link using public hashp parameter.
  139. if ($moduleparttocheck == $modulepart) {
  140. // We remove first level of directory
  141. $original_file = (($tmp[1] ? $tmp[1].'/' : '').$ecmfile->filename); // this is relative to module dir
  142. //var_dump($original_file); exit;
  143. } else {
  144. accessforbidden('Bad link. File is from another module part.', 0, 0, 1);
  145. }
  146. } else {
  147. $modulepart = $moduleparttocheck;
  148. $original_file = (($tmp[1] ? $tmp[1].'/' : '').$ecmfile->filename); // this is relative to module dir
  149. }
  150. $entity = $ecmfile->entity;
  151. if ($entity != $conf->entity) {
  152. $conf->entity = $entity;
  153. $conf->setValues($db);
  154. }
  155. } else {
  156. $langs->load("errors");
  157. accessforbidden($langs->trans("ErrorFileNotFoundWithSharedLink"), 0, 0, 1);
  158. }
  159. }
  160. // Define attachment (attachment=true to force choice popup 'open'/'save as')
  161. $attachment = true;
  162. if (preg_match('/\.(html|htm)$/i', $original_file)) {
  163. $attachment = false;
  164. }
  165. if (isset($_GET["attachment"])) {
  166. $attachment = GETPOST("attachment", 'alpha') ?true:false;
  167. }
  168. if (!empty($conf->global->MAIN_DISABLE_FORCE_SAVEAS)) {
  169. $attachment = false;
  170. }
  171. // Define mime type
  172. $type = 'application/octet-stream'; // By default
  173. if (GETPOST('type', 'alpha')) {
  174. $type = GETPOST('type', 'alpha');
  175. } else {
  176. $type = dol_mimetype($original_file);
  177. }
  178. // Security: Force to octet-stream if file is a dangerous file. For example when it is a .noexe file
  179. // We do not force if file is a javascript to be able to get js from website module with <script src="
  180. // Note: Force whatever is $modulepart seems ok.
  181. if (!in_array($type, array('text/x-javascript')) && !dolIsAllowedForPreview($original_file)) {
  182. $type = 'application/octet-stream';
  183. }
  184. // Security: Delete string ../ or ..\ into $original_file
  185. $original_file = preg_replace('/\.\.+/', '..', $original_file); // Replace '... or more' with '..'
  186. $original_file = str_replace('../', '/', $original_file);
  187. $original_file = str_replace('..\\', '/', $original_file);
  188. // Find the subdirectory name as the reference
  189. $refname = basename(dirname($original_file)."/");
  190. // Security check
  191. if (empty($modulepart)) {
  192. accessforbidden('Bad value for parameter modulepart');
  193. }
  194. // Check security and set return info with full path of file
  195. $check_access = dol_check_secure_access_document($modulepart, $original_file, $entity, $user, $refname);
  196. $accessallowed = $check_access['accessallowed'];
  197. $sqlprotectagainstexternals = $check_access['sqlprotectagainstexternals'];
  198. $fullpath_original_file = $check_access['original_file']; // $fullpath_original_file is now a full path name
  199. //var_dump($fullpath_original_file.' '.$original_file.' '.$refname.' '.$accessallowed);exit;
  200. if (!empty($hashp)) {
  201. $accessallowed = 1; // When using hashp, link is public so we force $accessallowed
  202. $sqlprotectagainstexternals = '';
  203. } else {
  204. // Basic protection (against external users only)
  205. if ($user->socid > 0) {
  206. if ($sqlprotectagainstexternals) {
  207. $resql = $db->query($sqlprotectagainstexternals);
  208. if ($resql) {
  209. $num = $db->num_rows($resql);
  210. $i = 0;
  211. while ($i < $num) {
  212. $obj = $db->fetch_object($resql);
  213. if ($user->socid != $obj->fk_soc) {
  214. $accessallowed = 0;
  215. break;
  216. }
  217. $i++;
  218. }
  219. }
  220. }
  221. }
  222. }
  223. // Security:
  224. // Limit access if permissions are wrong
  225. if (!$accessallowed) {
  226. accessforbidden();
  227. }
  228. // Security:
  229. // We refuse directory transversal change and pipes in file names
  230. if (preg_match('/\.\./', $fullpath_original_file) || preg_match('/[<>|]/', $fullpath_original_file)) {
  231. dol_syslog("Refused to deliver file ".$fullpath_original_file);
  232. print "ErrorFileNameInvalid: ".dol_escape_htmltag($original_file);
  233. exit;
  234. }
  235. clearstatcache();
  236. $filename = basename($fullpath_original_file);
  237. $filename = preg_replace('/\.noexe$/i', '', $filename);
  238. // Output file on browser
  239. dol_syslog("document.php download $fullpath_original_file filename=$filename content-type=$type");
  240. $fullpath_original_file_osencoded = dol_osencode($fullpath_original_file); // New file name encoded in OS encoding charset
  241. // This test if file exists should be useless. We keep it to find bug more easily
  242. if (!file_exists($fullpath_original_file_osencoded)) {
  243. dol_syslog("ErrorFileDoesNotExists: ".$fullpath_original_file);
  244. print "ErrorFileDoesNotExists: ".$original_file;
  245. exit;
  246. }
  247. // Hooks
  248. if (!is_object($hookmanager)) {
  249. include_once DOL_DOCUMENT_ROOT.'/core/class/hookmanager.class.php';
  250. $hookmanager = new HookManager($this->db);
  251. }
  252. $hookmanager->initHooks(array('document'));
  253. $parameters = array('ecmfile' => $ecmfile, 'modulepart' => $modulepart, 'original_file' => $original_file,
  254. 'entity' => $entity, 'refname' => $refname, 'fullpath_original_file' => $fullpath_original_file,
  255. 'filename' => $filename, 'fullpath_original_file_osencoded' => $fullpath_original_file_osencoded);
  256. $reshook = $hookmanager->executeHooks('downloadDocument', $parameters); // Note that $action and $object may have been
  257. if ($reshook < 0) {
  258. $errors = $hookmanager->error.(is_array($hookmanager->errors) ? (!empty($hookmanager->error) ? ', ' : '').join($separator, $hookmanager->errors) : '');
  259. dol_syslog("document.php - Errors when executing the hook 'downloadDocument' : ".$errors);
  260. print "ErrorDownloadDocumentHooks: ".$errors;
  261. exit;
  262. }
  263. // Permissions are ok and file found, so we return it
  264. top_httphead($type);
  265. header('Content-Description: File Transfer');
  266. if ($encoding) {
  267. header('Content-Encoding: '.$encoding);
  268. }
  269. // Add MIME Content-Disposition from RFC 2183 (inline=automatically displayed, attachment=need user action to open)
  270. if ($attachment) {
  271. header('Content-Disposition: attachment; filename="'.$filename.'"');
  272. } else {
  273. header('Content-Disposition: inline; filename="'.$filename.'"');
  274. }
  275. // Ajout directives pour resoudre bug IE
  276. header('Cache-Control: Public, must-revalidate');
  277. header('Pragma: public');
  278. $readfile = true;
  279. // on view document, can output images with good orientation according to exif infos
  280. if (!$attachment && !empty($conf->global->MAIN_USE_EXIF_ROTATION) && image_format_supported($fullpath_original_file_osencoded) == 1) {
  281. $imgres = correctExifImageOrientation($fullpath_original_file_osencoded, null);
  282. $readfile = !$imgres;
  283. }
  284. if (is_object($db)) {
  285. $db->close();
  286. }
  287. // Send file now
  288. if ($readfile) {
  289. header('Content-Length: '.dol_filesize($fullpath_original_file));
  290. readfileLowMemory($fullpath_original_file_osencoded);
  291. }