array('csv', 'nids', 'hids', 'xml', 'restSearch', 'stix', 'updateGraph'), 'attributes' => array('text', 'downloadAttachment', 'returnAttributes', 'restSearch', 'rpz'), ); public function __construct($id = false, $table = null, $ds = null) { parent::__construct($id, $table, $ds); $name = get_class($this); $name = str_replace('sController', '', $name); $name = str_replace('Controller', '', $name); $this->defaultModel = $name; } public $components = array( 'Session', 'Auth' => array( 'className' => 'SecureAuth', 'authenticate' => array( 'Form' => array( 'fields' => array('username' => 'email') ) ), 'authError' => 'Unauthorised access.', 'loginRedirect' => array('controller' => 'users', 'action' => 'routeafterlogin'), 'logoutRedirect' => array('controller' => 'users', 'action' => 'login', 'admin' => false), //'authorize' => array('Controller', // Added this line //'Actions' => array('actionPath' => 'controllers')) // TODO ACL, 4: tell actionPath ), 'Security' ); public $mispVersion = '2.4.0'; public function beforeFilter() { $this->Security->blackHoleCallback = 'blackHole'; // Let us access $baseurl from all views $baseurl = Configure::read('MISP.baseurl'); if (substr($baseurl, -1) == '/') { // if the baseurl has a trailing slash, remove it. It can lead to issues with the CSRF protection $baseurl = rtrim($baseurl, '/'); Configure::write('MISP.baseurl', $baseurl); } $this->set('baseurl', h($baseurl)); // send users away that are using ancient versions of IE // Make sure to update this if IE 20 comes out :) if (isset($_SERVER['HTTP_USER_AGENT'])) { if(preg_match('/(?i)msie [2-8]/',$_SERVER['HTTP_USER_AGENT']) && !strpos($_SERVER['HTTP_USER_AGENT'], 'Opera')) throw new MethodNotAllowedException('You are using an unsecure and outdated version of IE, please download Google Chrome, Mozilla Firefox or update to a newer version of IE. If you are running IE9 or newer and still receive this error message, please make sure that you are not running your browser in compatibility mode. If you still have issues accessing the site, get in touch with your administration team at ' . Configure::read('MISP.contact')); } // REST authentication if ($this->_isRest() || $this->_isAutomation()) { // disable CSRF for REST access if (array_key_exists('Security', $this->components)) $this->Security->csrfCheck = false; // Authenticate user with authkey in Authorization HTTP header if (!empty($_SERVER['HTTP_AUTHORIZATION'])) { $found_misp_auth_key = false; $authentication = explode(',', $_SERVER['HTTP_AUTHORIZATION']); $user = false; foreach ($authentication as $auth_key) { if (preg_match('/^[a-zA-Z0-9]{40}$/', trim($auth_key))) { $found_misp_auth_key = true; $temp = $this->checkAuthUser(trim($auth_key)); if ($temp) $user['User'] = $this->checkAuthUser(trim($auth_key)); continue; } } if ($found_misp_auth_key) { if ($user) { unset($user['User']['gpgkey']); // User found in the db, add the user info to the session if (Configure::read('MISP.log_auth')) { $this->Log = ClassRegistry::init('Log'); $this->Log->create(); $log = array( 'org' => $user['User']['Organisation']['name'], 'model' => 'User', 'model_id' => $user['User']['id'], 'email' => $user['User']['email'], 'action' => 'auth', 'title' => 'Successful authentication using API key', 'change' => 'HTTP method: ' . $_SERVER['REQUEST_METHOD'] . PHP_EOL . 'Target: ' . $this->here, ); $this->Log->save($log); } $this->Session->renew(); $this->Session->write(AuthComponent::$sessionKey, $user['User']); } else { // User not authenticated correctly // reset the session information $this->Session->destroy(); $this->Log = ClassRegistry::init('Log'); $this->Log->create(); $log = array( 'org' => 'SYSTEM', 'model' => 'User', 'model_id' => 0, 'email' => 'SYSTEM', 'action' => 'auth_fail', 'title' => 'Failed authentication using API key (' . trim($auth_key) . ')', 'change' => null, ); $this->Log->save($log); throw new ForbiddenException('Authentication failed. Please make sure you pass the API key of an API enabled user along in the Authorization header.'); } unset($user); } } if ($this->Auth->user() == null) throw new ForbiddenException('Authentication failed. Please make sure you pass the API key of an API enabled user along in the Authorization header.'); } else if(!$this->Session->read(AuthComponent::$sessionKey)) { // load authentication plugins from Configure::read('Security.auth') $auth = Configure::read('Security.auth'); if($auth) { $this->Auth->authenticate = array_merge($auth, $this->Auth->authenticate); if($this->Auth->startup($this)) { $user = $this->Auth->user(); if ($user) { unset($user['gpgkey']); // User found in the db, add the user info to the session $this->Session->renew(); $this->Session->write(AuthComponent::$sessionKey, $user); } unset($user); } } unset($auth); } // user must accept terms // //grab the base path from our base url for use in the following checks $base_dir = parse_url($baseurl, PHP_URL_PATH); // if MISP is running out of the web root already, just set this variable to blank so we don't wind up with '//' in the following if statements if ($base_dir == '/') { $base_dir = ''; } if ($this->Auth->user()) { if ($this->Auth->user('disabled')) { $this->Log = ClassRegistry::init('Log'); $this->Log->create(); $log = array( 'org' => $this->Auth->user('Organisation')['name'], 'model' => 'User', 'model_id' => $this->Auth->user('id'), 'email' => $this->Auth->user('email'), 'action' => 'auth_fail', 'title' => 'Login attempt by disabled user.', 'change' => null, ); $this->Log->save($log); $this->Auth->logout(); if ($this->_isRest()) { throw new ForbiddenException('Authentication failed. Your user account has been disabled.'); } else { $this->Session->setFlash('Your user account has been disabled.'); $this->redirect(array('controller' => 'users', 'action' => 'login', 'admin' => false)); } } } else { if (!($this->params['controller'] === 'users' && $this->params['action'] === 'login')) $this->redirect(array('controller' => 'users', 'action' => 'login', 'admin' => false)); } // check if MISP is live if ($this->Auth->user() && !Configure::read('MISP.live')) { $role = $this->getActions(); if (!$role['perm_site_admin']) { $message = Configure::read('MISP.maintenance_message'); if (empty($messaage)) { $this->loadModel('Server'); $message = $this->Server->serverSettings['MISP']['maintenance_message']['value']; } if (strpos($message, '$email') && Configure::read('MISP.email')) { $email = Configure::read('MISP.email'); $message = str_replace('$email', $email, $message); } $this->Auth->logout(); throw new MethodNotAllowedException($message); } else { $this->Session->setFlash('Warning: MISP is currently disabled for all users. Enable it in Server Settings (Administration -> Server Settings -> MISP tab -> live)'); } } if ($this->Session->check(AuthComponent::$sessionKey) && !$this->Auth->user('termsaccepted') && (!in_array($this->request->here, array($base_dir.'/users/terms', $base_dir.'/users/logout', $base_dir.'/users/login')))) { $this->redirect(array('controller' => 'users', 'action' => 'terms', 'admin' => false)); } if ($this->Session->check(AuthComponent::$sessionKey) && $this->Auth->user('change_pw') && (!in_array($this->request->here, array($base_dir.'/users/terms', $base_dir.'/users/change_pw', $base_dir.'/users/logout', $base_dir.'/users/login')))) { $this->redirect(array('controller' => 'users', 'action' => 'change_pw', 'admin' => false)); } unset($base_dir); // We don't want to run these role checks before the user is logged in, but we want them available for every view once the user is logged on // instead of using checkAction(), like we normally do from controllers when trying to find out about a permission flag, we can use getActions() // getActions returns all the flags in a single SQL query if ($this->Auth->user()) { //$this->_refreshAuth(); $versionArray = $this->{$this->modelClass}->checkMISPVersion(); $this->mispVersionFull = implode('.', array_values($versionArray)); $this->set('mispVersion', $this->mispVersion); $this->set('mispVersionFull', $this->mispVersionFull); $role = $this->getActions(); $this->set('me', $this->Auth->user()); $this->set('isAdmin', $role['perm_admin']); $this->set('isSiteAdmin', $role['perm_site_admin']); $this->set('isAclAdd', $role['perm_add']); $this->set('isAclModify', $role['perm_modify']); $this->set('isAclModifyOrg', $role['perm_modify_org']); $this->set('isAclPublish', $role['perm_publish']); $this->set('isAclSync', $role['perm_sync']); $this->set('isAclAdmin', $role['perm_admin']); $this->set('isAclAudit', $role['perm_audit']); $this->set('isAclAuth', $role['perm_auth']); $this->set('isAclRegexp', $role['perm_regexp_access']); $this->set('isAclTagger', $role['perm_tagger']); $this->set('isAclTemplate', $role['perm_template']); $this->set('isAclSharingGroup', $role['perm_sharing_group']); $this->userRole = $role; $proposalCount = $this->_getProposalCount(); $this->set('proposalCount', $proposalCount[0]); $this->set('proposalEventCount', $proposalCount[1]); $this->set('mispVersion', $this->mispVersion); } else { $this->set('me', false); } if (Configure::read('site_admin_debug') && $this->_isSiteAdmin() && (Configure::read('debug') < 2)) { Configure::write('debug', 1); } $this->debugMode = 'debugOff'; if (Configure::read('debug') > 1) $this->debugMode = 'debugOn'; $this->set('debugMode', $this->debugMode); } public function blackhole($type) { if ($type === 'csrf') throw new BadRequestException(__d('cake_dev', $type)); throw new BadRequestException(__d('cake_dev', 'The request has been black-holed')); } public $userRole = null; protected function _isJson($data=false) { if ($data) return (json_decode($data) != NULL) ? true : false; return $this->request->header('Accept') === 'application/json' || $this->RequestHandler->prefers() === 'json'; } //public function blackhole($type) { // // handle errors. // throw new Exception(__d('cake_dev', 'The request has been black-holed')); // //throw new BadRequestException(__d('cake_dev', 'The request has been black-holed')); //} protected function _isRest() { return (isset($this->RequestHandler) && ($this->RequestHandler->isXml() || $this->_isJson())); } protected function _isAutomation() { foreach ($this->automationArray as $controllerName => $controllerActions) { if ($this->params['controller'] == $controllerName && in_array($this->params['action'], $controllerActions)) return true; } return false; } private function _getProposalCount() { $this->loadModel('ShadowAttribute'); $this->ShadowAttribute->recursive = -1; $shadowAttributes = $this->ShadowAttribute->find('all', array( 'recursive' => -1, 'fields' => array('event_id', 'event_org_id'), 'conditions' => array( 'ShadowAttribute.event_org_id' => $this->Auth->user('org_id'), 'ShadowAttribute.deleted' => 0, ))); $results = array(); $eventIds = array(); $results[0] = count($shadowAttributes); foreach ($shadowAttributes as $sa) { if (!in_array($sa['ShadowAttribute']['event_id'], $eventIds)) $eventIds[] = $sa['ShadowAttribute']['event_id']; } $results[1] = count($eventIds); return $results; } /** * Convert an array to the same array but with the values also as index instead of an interface_exists */ protected function _arrayToValuesIndexArray($oldArray) { $newArray = Array(); foreach ($oldArray as $value) $newArray[$value] = $value; return $newArray; } /** * checks if the currently logged user is an administrator (an admin that can manage the users and events of his own organisation) */ protected function _isAdmin() { if ($this->userRole['perm_site_admin'] || $this->userRole['perm_admin']) { return true; } return false; } /** * checks if the currently logged user is a site administrator (an admin that can manage any user or event on the instance and create / edit the roles). */ protected function _isSiteAdmin() { return $this->userRole['perm_site_admin']; } protected function _checkOrg() { return $this->Auth->user('org_id'); } /** * * @param $action * @return boolean */ // pass an action to this method for it to check the active user's access to the action public function checkAction($action = 'perm_sync') { $this->loadModel('Role'); $this->Role->recursive = -1; $role = $this->Role->findById($this->Auth->user('role_id')); if ($role['Role'][$action]) return true; return false; } // returns the role of the currently authenticated user as an array, used to set the permission variables for views in the AppController's beforeFilter() method public function getActions() { $this->loadModel('Role'); $this->Role->recursive = -1; $role = $this->Role->findById($this->Auth->user('role_id')); return $role['Role']; } /** * * @param unknown $authkey * @return boolean or user array */ public function checkAuthUser($authkey) { $this->loadModel('User'); $this->User->recursive = -1; $user = $this->User->getAuthUser($authkey); if (empty($user)) return false; if ($user['Role']['perm_site_admin']) $user['siteadmin'] = true; return $user; } public function generateCount() { if (!self::_isSiteAdmin() || !$this->request->is('post')) throw new NotFoundException(); // do one SQL query with the counts // loop over events, update in db $this->loadModel('Attribute'); $events = $this->Attribute->find('all', array( 'recursive' => -1, 'fields' => array('event_id', 'count(event_id) as attribute_count'), 'group' => array('Attribute.event_id'), 'order' => array('Attribute.event_id ASC'), )); foreach ($events as $k => $event) { $this->Event->read(null, $event['Attribute']['event_id']); $this->Event->set('attribute_count', $event[0]['attribute_count']); $this->Event->save(); } $this->Session->setFlash(__('All done. attribute_count generated from scratch for ' . $k . ' events.')); $this->redirect(array('controller' => 'pages', 'action' => 'display', 'administration')); } public function pruneDuplicateUUIDs() { if (!$this->_isSiteAdmin() || !$this->request->is('post')) throw new MethodNotAllowedException(); $this->LoadModel('Attribute'); $duplicates = $this->Attribute->find('all', array( 'fields' => array('Attribute.uuid', 'count(*) as occurance'), 'recursive' => -1, 'group' => array('Attribute.uuid HAVING COUNT(*) > 1'), )); $counter = 0; foreach ($duplicates as $duplicate) { $attributes = $this->Attribute->find('all', array( 'recursive' => -1, 'conditions' => array('uuid' => $duplicate['Attribute']['uuid']) )); foreach ($attributes as $k => $attribute) { if ($k > 0) { $attribute['Attribute']['uuid'] = $this->Attribute->generateUuid(); $this->Attribute->save($attribute); $counter++; } } } $this->Server->updateDatabase('makeAttributeUUIDsUnique'); $this->Session->setFlash('Done. Assigned new UUIDs to ' . $counter . ' attribute(s).'); $this->redirect(array('controller' => 'pages', 'action' => 'display', 'administration')); } public function removeDuplicateEvents() { if (!$this->_isSiteAdmin() || !$this->request->is('post')) throw new MethodNotAllowedException(); $this->LoadModel('Event'); $duplicates = $this->Event->find('all', array( 'fields' => array('Event.uuid', 'count(*) as occurance'), 'recursive' => -1, 'group' => array('Event.uuid HAVING COUNT(*) > 1'), )); $counter = 0; // load this so we can remove the blacklist item that will be created, this is the one case when we do not want it. if (Configure::read('MISP.enableEventBlacklisting')) $this->EventBlacklist = ClassRegistry::init('EventBlacklist'); foreach ($duplicates as $duplicate) { $events = $this->Event->find('all', array( 'recursive' => -1, 'conditions' => array('uuid' => $duplicate['Event']['uuid']) )); foreach ($events as $k => $event) { if ($k > 0) { $uuid = $event['Event']['uuid']; $this->Event->delete($event['Event']['id']); $counter++; // remove the blacklist entry that we just created with the event deletion, if the feature is enabled // We do not want to block the UUID, since we just deleted a copy if (Configure::read('MISP.enableEventBlacklisting')) { $this->EventBlacklist->deleteAll(array('EventBlacklist.event_uuid' => $uuid)); } } } } $this->Server->updateDatabase('makeEventUUIDsUnique'); $this->Session->setFlash('Done. Removed ' . $counter . ' duplicate events.'); $this->redirect(array('controller' => 'pages', 'action' => 'display', 'administration')); } public function updateDatabase($command) { if (!$this->_isSiteAdmin() || !$this->request->is('post')) throw new MethodNotAllowedException(); $this->loadModel('Server'); $this->Server->updateDatabase($command); $this->Session->setFlash('Done.'); $this->redirect(array('controller' => 'pages', 'action' => 'display', 'administration')); } public function upgrade2324() { if (!$this->_isSiteAdmin() || !$this->request->is('post')) throw new MethodNotAllowedException(); $this->loadModel('Server'); if (!Configure::read('MISP.background_jobs')) { $this->Server->upgrade2324($this->Auth->user('id')); $this->Session->setFlash('Done. For more details check the audit logs.'); $this->redirect(array('controller' => 'pages', 'action' => 'display', 'administration')); } else { $job = ClassRegistry::init('Job'); $job->create(); $data = array( 'worker' => 'default', 'job_type' => 'upgrade_24', 'job_input' => 'Old database', 'status' => 0, 'retries' => 0, 'org_id' => 0, 'message' => 'Job created.', ); $job->save($data); $jobId = $job->id; $process_id = CakeResque::enqueue( 'default', 'AdminShell', array('jobUpgrade24', $jobId, $this->Auth->user('id')) ); $job->saveField('process_id', $process_id); $this->Session->setFlash(__('Job queued. You can view the progress if you navigate to the active jobs view (administration -> jobs).')); $this->redirect(array('controller' => 'pages', 'action' => 'display', 'administration')); } } }