nonce; // re-use an unexpired nonce (a small deviation from the "used only once" principle, so long as we do not reset the expiration) // to handle browser pre-fetch or double fetch caused by some browser add-ons/extensions if (empty($nonce)) { // generate a new nonce $nonce = md5(SettingsPiwik::getSalt() . time() . Common::generateUniqId()); $ns->nonce = $nonce; } // extend lifetime if nonce is requested again to prevent from early timeout if nonce is requested again // a few seconds before timeout $ns->setExpirationSeconds($ttl, 'nonce'); return $nonce; } /** * Returns if a nonce is valid and comes from a valid request. * * A nonce is valid if it matches the current nonce and if the current nonce * has not expired. * * The request is valid if the referrer is a local URL (see {@link Url::isLocalUrl()}) * and if the HTTP origin is valid (see {@link getAcceptableOrigins()}). * * @param string $id The nonce's unique ID. See {@link getNonce()}. * @param string $cnonce Nonce sent from client. * @param null|string $expectedReferrerHost The expected referrer host for the HTTP referrer URL. * @return bool `true` if valid; `false` otherwise. */ public static function verifyNonce($id, $cnonce, $expectedReferrerHost = null) { // load error with message function. $error = self::verifyNonceWithErrorMessage($id, $cnonce, $expectedReferrerHost); return $error === ""; } /** * Returns error message * * A nonce is valid if it matches the current nonce and if the current nonce * has not expired. * * The request is valid if the referrer is a local URL (see {@link Url::isLocalUrl()}) * and if the HTTP origin is valid (see {@link getAcceptableOrigins()}). * * @param string $id The nonce's unique ID. See {@link getNonce()}. * @param string $cnonce Nonce sent from client. * @param null $expectedReferrerHost The expected referrer host for the HTTP referrer URL. * @return string if empty is valid otherwise return error message */ public static function verifyNonceWithErrorMessage($id, $cnonce, $expectedReferrerHost = null) { $ns = new SessionNamespace($id); $nonce = $ns->nonce; $additionalErrors = ''; // The Session cookie is set to a secure cookie, when SSL is mis-configured, it can cause the PHP session cookie ID to change on each page view. // Indicate to user how to solve this particular use case by forcing secure connections. if (Url::isSecureConnectionAssumedByPiwikButNotForcedYet()) { $additionalErrors = '

' . Piwik::translate('Login_InvalidNonceSSLMisconfigured', array( '', '', 'config/config.ini.php', '
force_ssl=1
', '
[General]
', ) ); } // validate token if (empty($cnonce) || $cnonce !== $nonce) { return Piwik::translate('Login_InvalidNonceToken'); } // validate referrer $referrer = Url::getReferrer(); if (empty($expectedReferrerHost) && !empty($referrer) && !Url::isLocalUrl($referrer)) { return Piwik::translate('Login_InvalidNonceReferrer', array( '', '' )) . $additionalErrors; } //referrer is different expected host if (!empty($expectedReferrerHost) && !self::isReferrerHostValid($referrer, $expectedReferrerHost)) { return Piwik::translate('Login_InvalidNonceUnexpectedReferrer') . $additionalErrors; } // validate origin $origin = self::getOrigin(); if (!empty($origin) && ($origin == 'null' || !in_array($origin, self::getAcceptableOrigins())) ) { return Piwik::translate('Login_InvalidNonceOrigin') . $additionalErrors; } return ''; } // public for tests public static function isReferrerHostValid($referrer, $expectedReferrerHost) { if (empty($referrer)) { return false; } $referrerHost = Url::getHostFromUrl($referrer); return preg_match('/(^|\.)' . preg_quote($expectedReferrerHost) . '$/i', $referrerHost); } /** * Force expiration of the current nonce. * * @param string $id The unique nonce ID. */ public static function discardNonce($id) { $ns = new SessionNamespace($id); $ns->unsetAll(); } /** * Returns the **Origin** HTTP header or `false` if not found. * * @return string|bool */ public static function getOrigin() { if (!empty($_SERVER['HTTP_ORIGIN'])) { return $_SERVER['HTTP_ORIGIN']; } return false; } /** * Returns a list acceptable values for the HTTP **Origin** header. * * @return array */ public static function getAcceptableOrigins() { $host = Url::getCurrentHost(null); if (empty($host)) { return array(); } // parse host:port if (preg_match('/^([^:]+):([0-9]+)$/D', $host, $matches)) { $host = $matches[1]; $port = $matches[2]; $origins = array( 'http://' . $host, 'https://' . $host, ); if ($port != 443) { $origins[] = 'http://' . $host .':' . $port; } $origins[] = 'https://' . $host . ':' . $port; } elseif (Config::getInstance()->General['force_ssl']) { $origins = array( 'https://' . $host, 'https://' . $host . ':443', ); } else { $origins = array( 'http://' . $host, 'https://' . $host, 'http://' . $host . ':80', 'https://' . $host . ':443', ); } return $origins; } /** * Verifies and discards a nonce. * * @param string $nonceName The nonce's unique ID. See {@link getNonce()}. * @param string|null $nonce The nonce from the client. If `null`, the value from the * **nonce** query parameter is used. * @throws \Exception if the nonce is invalid. See {@link verifyNonce()}. */ public static function checkNonce($nonceName, $nonce = null, $expectedReferrerHost = null) { if ($nonce === null) { $nonce = Common::getRequestVar('nonce', null, 'string'); } if (!self::verifyNonce($nonceName, $nonce, $expectedReferrerHost)) { throw new \Exception(Piwik::translate('General_ExceptionNonceMismatch')); } self::discardNonce($nonceName); } }