mirror of https://github.com/MISP/MISP
2503 lines
116 KiB
PHP
2503 lines
116 KiB
PHP
<?php
|
|
App::uses('AppController', 'Controller');
|
|
|
|
class UsersController extends AppController
|
|
{
|
|
public $newkey;
|
|
|
|
public $components = array(
|
|
'Security',
|
|
'Email',
|
|
'RequestHandler'
|
|
);
|
|
|
|
public $paginate = array(
|
|
'limit' => 60,
|
|
'recursive' => -1,
|
|
'order' => array(
|
|
'Organisation.name' => 'ASC'
|
|
),
|
|
'contain' => array(
|
|
'Organisation' => array('id', 'name'),
|
|
'Role' => array('id', 'name', 'perm_auth', 'perm_site_admin')
|
|
)
|
|
);
|
|
|
|
public $helpers = array('Js' => array('Jquery'));
|
|
|
|
public function beforeFilter()
|
|
{
|
|
parent::beforeFilter();
|
|
|
|
// what pages are allowed for non-logged-in users
|
|
$allowedActions = array('login', 'logout');
|
|
if (!empty(Configure::read('Security.allow_self_registration'))) {
|
|
$allowedActions[] = 'register';
|
|
}
|
|
$this->Auth->allow($allowedActions);
|
|
}
|
|
|
|
public function view($id = null)
|
|
{
|
|
if ("me" == $id) {
|
|
$id = $this->Auth->user('id');
|
|
}
|
|
if (!$this->_isSiteAdmin() && $this->Auth->user('id') != $id) {
|
|
throw new NotFoundException(__('Invalid user or not authorised.'));
|
|
}
|
|
if (!is_numeric($id) && !empty($id)) {
|
|
$userId = $this->User->find('first', array(
|
|
'conditions' => array('email' => $id),
|
|
'fields' => array('id')
|
|
));
|
|
$id = $userid['User']['id'];
|
|
}
|
|
$user = $this->User->read(null, $id);
|
|
$user = $this->User->find('first', array(
|
|
'recursive' => -1,
|
|
'conditions' => array('User.id' => $id),
|
|
'contain' => array(
|
|
'UserSetting',
|
|
'Role',
|
|
'Organisation'
|
|
)
|
|
));
|
|
if (empty($user)) {
|
|
throw new NotFoundException(__('Invalid user'));
|
|
}
|
|
if (!empty($user['User']['gpgkey'])) {
|
|
$pgpDetails = $this->User->verifySingleGPG($user);
|
|
$user['User']['pgp_status'] = isset($pgpDetails[2]) ? $pgpDetails[2] : 'OK';
|
|
$user['User']['fingerprint'] = !empty($pgpDetails[4]) ? $pgpDetails[4] : 'N/A';
|
|
}
|
|
if ($this->_isRest()) {
|
|
unset($user['User']['server_id']);
|
|
$user['User']['password'] = '*****';
|
|
$temp = array();
|
|
foreach ($user['UserSetting'] as $k => $v) {
|
|
$temp[$v['setting']] = $v['value'];
|
|
}
|
|
$user['UserSetting'] = $temp;
|
|
return $this->RestResponse->viewData($this->__massageUserObject($user), $this->response->type());
|
|
} else {
|
|
$this->set('user', $user);
|
|
}
|
|
}
|
|
|
|
private function __massageUserObject($user)
|
|
{
|
|
unset($user['User']['server_id']);
|
|
$user['User']['password'] = '*****';
|
|
$objectsToInclude = array('User', 'Role', 'UserSetting', 'Organisation');
|
|
foreach ($objectsToInclude as $objectToInclude) {
|
|
if (isset($user[$objectToInclude])) {
|
|
$temp[$objectToInclude] = $user[$objectToInclude];
|
|
}
|
|
}
|
|
return $temp;
|
|
}
|
|
|
|
public function request_API()
|
|
{
|
|
if (Configure::read('MISP.disable_emailing')) {
|
|
return new CakeResponse(array('body'=> json_encode(array('saved' => false, 'errors' => 'API access request failed. E-mailing is currently disabled on this instance.')), 'status'=>200, 'type' => 'json'));
|
|
}
|
|
$responsibleAdmin = $this->User->findAdminsResponsibleForUser($this->Auth->user());
|
|
if (isset($responsibleAdmin['email']) && !empty($responsibleAdmin['email'])) {
|
|
$subject = "[MISP " . Configure::read('MISP.org') . "] User requesting API access";
|
|
$body = "A user (" . $this->Auth->user('email') . ") has sent you a request to enable his/her API key access." . PHP_EOL;
|
|
$body .= "You can edit the user's profile at " . Configure::read('MISP.baseurl') . '/admin/users/edit/' . $this->Auth->user('id');
|
|
$user = $this->User->find('first', array('conditions' => array('User.id' => $responsibleAdmin['id'])));
|
|
$result = $this->User->sendEmail($user, $body, false, $subject);
|
|
if ($result) {
|
|
return new CakeResponse(array('body'=> json_encode(array('saved' => true, 'success' => 'API access requested.')), 'status'=>200, 'type' => 'json'));
|
|
}
|
|
}
|
|
return new CakeResponse(array('body'=> json_encode(array('saved' => false, 'errors' => 'Something went wrong, please try again later.')), 'status'=>200, 'type' => 'json'));
|
|
}
|
|
|
|
public function edit()
|
|
{
|
|
if (!$this->_isAdmin() && Configure::read('MISP.disableUserSelfManagement')) {
|
|
throw new MethodNotAllowedException('User self-management has been disabled on this instance.');
|
|
}
|
|
$currentUser = $this->User->find('first', array(
|
|
'conditions' => array('User.id' => $this->Auth->user('id')),
|
|
'recursive' => -1
|
|
));
|
|
if (empty($currentUser)) {
|
|
throw new NotFoundException('Something went wrong. Your user account could not be accessed.');
|
|
}
|
|
$id = $currentUser['User']['id'];
|
|
if ($this->request->is('post') || $this->request->is('put')) {
|
|
if (empty($this->request->data['User'])) {
|
|
$this->request->data = array('User' => $this->request->data);
|
|
}
|
|
$abortPost = false;
|
|
if (!empty($this->request->data['User']['email']) && !$this->_isSiteAdmin()) {
|
|
$organisation = $this->User->Organisation->find('first', array(
|
|
'conditions' => array('Organisation.id' => $this->Auth->user('org_id')),
|
|
'recursive' => -1
|
|
));
|
|
if (!empty($organisation['Organisation']['restricted_to_domain'])) {
|
|
$abortPost = true;
|
|
foreach ($organisation['Organisation']['restricted_to_domain'] as $restriction) {
|
|
if (
|
|
strlen($this->request->data['User']['email']) > strlen($restriction) &&
|
|
substr($this->request->data['User']['email'], (-1 * strlen($restriction))) === $restriction &&
|
|
in_array($this->request->data['User']['email'][strlen($this->request->data['User']['email']) - strlen($restriction) -1], array('@', '.'))
|
|
) {
|
|
$abortPost = false;
|
|
}
|
|
}
|
|
if ($abortPost) {
|
|
$message = __('Invalid e-mail domain. Your user is restricted to creating users for the following domain(s): ') . implode(', ', $organisation['Organisation']['restricted_to_domain']);
|
|
}
|
|
}
|
|
}
|
|
if (!$abortPost && !$this->_isRest()) {
|
|
if (Configure::read('Security.require_password_confirmation')) {
|
|
if (!empty($this->request->data['User']['current_password'])) {
|
|
$hashed = $this->User->verifyPassword($this->Auth->user('id'), $this->request->data['User']['current_password']);
|
|
if (!$hashed) {
|
|
$abortPost = true;
|
|
$this->Flash->error('Invalid password. Please enter your current password to continue.');
|
|
}
|
|
unset($this->request->data['User']['current_password']);
|
|
} else {
|
|
$abortPost = true;
|
|
$this->Flash->info('Please enter your current password to continue.');
|
|
}
|
|
}
|
|
}
|
|
if (!$abortPost) {
|
|
// What fields should be saved (allowed to be saved)
|
|
$fieldList = array('email', 'autoalert', 'gpgkey', 'certif_public', 'nids_sid', 'contactalert', 'disabled');
|
|
if (!empty($this->request->data['User']['password'])) {
|
|
$fieldList[] = 'password';
|
|
$fieldList[] = 'confirm_password';
|
|
}
|
|
foreach ($this->request->data['User'] as $k => $v) {
|
|
$currentUser['User'][$k] = $v;
|
|
}
|
|
// Save the data
|
|
if ($this->_isRest()) {
|
|
if (!empty($this->request->data['User']['password'])) {
|
|
if ($this->request->data['User']['password'] === '*****') {
|
|
unset($this->request->data['User']['password']);
|
|
} else {
|
|
$currentUser['User']['confirm_password'] = $this->request->data['User']['password'];
|
|
}
|
|
}
|
|
}
|
|
if ($this->User->save($currentUser, true, $fieldList)) {
|
|
if ($this->_isRest()) {
|
|
$user = $this->User->find('first', array(
|
|
'conditions' => array('User.id' => $id),
|
|
'recursive' => -1,
|
|
'contain' => array(
|
|
'Organisation',
|
|
'Role',
|
|
'UserSetting'
|
|
)
|
|
));
|
|
return $this->RestResponse->viewData($this->__massageUserObject($user), $this->response->type());
|
|
} else {
|
|
$this->Flash->success(__('The profile has been updated'));
|
|
$this->_refreshAuth();
|
|
$this->redirect(array('action' => 'view', $id));
|
|
}
|
|
} else {
|
|
$message = __('The profile could not be updated. Please, try again.');
|
|
$abortPost = true;
|
|
}
|
|
}
|
|
if ($abortPost) {
|
|
$this->request->data['User']['password'] = '';
|
|
$this->request->data['User']['confirm_password'] = '';
|
|
if ($this->_isRest()) {
|
|
return $this->RestResponse->saveFailResponse('Users', 'edit', $id, $message, $this->response->type());
|
|
} else {
|
|
$this->Flash->error($message);
|
|
}
|
|
}
|
|
} else {
|
|
$this->User->data = $currentUser;
|
|
$this->User->set('password', '');
|
|
$this->request->data = $this->User->data;
|
|
}
|
|
$this->loadModel('Server');
|
|
$this->set('complexity', !empty(Configure::read('Security.password_policy_complexity')) ? Configure::read('Security.password_policy_complexity') : $this->Server->serverSettings['Security']['password_policy_complexity']['value']);
|
|
$this->set('length', !empty(Configure::read('Security.password_policy_length')) ? Configure::read('Security.password_policy_length') : $this->Server->serverSettings['Security']['password_policy_length']['value']);
|
|
$roles = $this->User->Role->find('list');
|
|
$this->set(compact('roles'));
|
|
$this->set('id', $id);
|
|
}
|
|
|
|
public function change_pw()
|
|
{
|
|
if (!$this->_isAdmin() && Configure::read('MISP.disableUserSelfManagement')) {
|
|
throw new MethodNotAllowedException('User self-management has been disabled on this instance.');
|
|
}
|
|
$id = $this->Auth->user('id');
|
|
$user = $this->User->find('first', array(
|
|
'conditions' => array('User.id' => $id),
|
|
'recursive' => -1
|
|
));
|
|
if ($this->request->is('post') || $this->request->is('put')) {
|
|
if (!isset($this->request->data['User'])) {
|
|
$this->request->data = array('User' => $this->request->data);
|
|
}
|
|
$abortPost = false;
|
|
if (Configure::read('Security.require_password_confirmation')) {
|
|
if (!empty($this->request->data['User']['current_password'])) {
|
|
$hashed = $this->User->verifyPassword($this->Auth->user('id'), $this->request->data['User']['current_password']);
|
|
if (!$hashed) {
|
|
$message = __('Invalid password. Please enter your current password to continue.');
|
|
if ($this->_isRest()) {
|
|
return $this->RestResponse->saveFailResponse('Users', 'change_pw', false, $message, $this->response->type());
|
|
}
|
|
$abortPost = true;
|
|
$this->Flash->error($message);
|
|
}
|
|
unset($this->request->data['User']['current_password']);
|
|
} else if (!$this->_isRest()) {
|
|
$message = __('Please enter your current password to continue.');
|
|
if ($this->_isRest()) {
|
|
return $this->RestResponse->saveFailResponse('Users', 'change_pw', false, $message, $this->response->type());
|
|
}
|
|
$abortPost = true;
|
|
$this->Flash->info($message);
|
|
}
|
|
}
|
|
$hashed = $this->User->verifyPassword($this->Auth->user('id'), $this->request->data['User']['password']);
|
|
if ($hashed) {
|
|
$message = __('Submitted new password cannot be the same as the current one');
|
|
$abortPost = true;
|
|
}
|
|
if (!$abortPost) {
|
|
// What fields should be saved (allowed to be saved)
|
|
$user['User']['change_pw'] = 0;
|
|
$user['User']['password'] = $this->request->data['User']['password'];
|
|
if ($this->_isRest()) {
|
|
$user['User']['confirm_password'] = $this->request->data['User']['password'];
|
|
} else {
|
|
$user['User']['confirm_password'] = $this->request->data['User']['confirm_password'];
|
|
}
|
|
$temp = $user['User']['password'];
|
|
// Save the data
|
|
if ($this->User->save($user)) {
|
|
$message = __('Password Changed.');
|
|
$this->User->extralog($this->Auth->user(), "change_pw", null, null, $user);
|
|
if ($this->_isRest()) {
|
|
return $this->RestResponse->saveSuccessResponse('User', 'change_pw', false, $this->response->type(), $message);
|
|
}
|
|
$this->Flash->success($message);
|
|
$this->_refreshAuth();
|
|
$this->redirect(array('action' => 'view', $id));
|
|
} else {
|
|
$message = __('The password could not be updated. Make sure you meet the minimum password length / complexity requirements.');
|
|
if ($this->_isRest()) {
|
|
return $this->RestResponse->saveFailResponse('Users', 'change_pw', false, $message, $this->response->type());
|
|
}
|
|
$this->Flash->error($message);
|
|
}
|
|
} else {
|
|
$this->Flash->error($message);
|
|
}
|
|
}
|
|
if ($this->_isRest()) {
|
|
return $this->RestResponse->describe('Users', 'change_pw', false, $this->response->type());
|
|
}
|
|
$this->loadModel('Server');
|
|
$this->set('complexity', !empty(Configure::read('Security.password_policy_complexity')) ? Configure::read('Security.password_policy_complexity') : $this->Server->serverSettings['Security']['password_policy_complexity']['value']);
|
|
$this->set('length', !empty(Configure::read('Security.password_policy_length')) ? Configure::read('Security.password_policy_length') : $this->Server->serverSettings['Security']['password_policy_length']['value']);
|
|
$this->User->recursive = 0;
|
|
$this->User->read(null, $id);
|
|
$this->User->set('password', '');
|
|
$this->request->data = $this->User->data;
|
|
$roles = $this->User->Role->find('list');
|
|
$this->set(compact('roles'));
|
|
}
|
|
|
|
public function admin_index()
|
|
{
|
|
if (!$this->_isAdmin()) {
|
|
throw new NotFoundException(__('Invalid user or not authorised.'));
|
|
}
|
|
$this->User->virtualFields['org_ci'] = 'UPPER(Organisation.name)';
|
|
$urlParams = "";
|
|
$passedArgsArray = array();
|
|
$booleanFields = array('autoalert', 'contactalert', 'termsaccepted');
|
|
$textFields = array('role', 'email', 'all', 'authkey');
|
|
// org admins can't see users of other orgs
|
|
if ($this->_isSiteAdmin()) {
|
|
$textFields[] = 'org';
|
|
}
|
|
$this->set('passedArgs', json_encode($this->passedArgs));
|
|
// check each of the passed arguments whether they're a filter (could also be a sort for example) and if yes, add it to the pagination conditions
|
|
if (!empty($this->passedArgs['value'])) {
|
|
$this->passedArgs['searchall'] = $this->passedArgs['value'];
|
|
}
|
|
foreach ($this->passedArgs as $k => $v) {
|
|
if (substr($k, 0, 6) === 'search') {
|
|
if ($v != "") {
|
|
if ($urlParams != "") {
|
|
$urlParams .= "/";
|
|
}
|
|
$urlParams .= $k . ":" . $v;
|
|
}
|
|
$searchTerm = substr($k, 6);
|
|
if (in_array($searchTerm, $booleanFields)) {
|
|
if ($v != "") {
|
|
$this->paginate['conditions'][] = array('User.' . $searchTerm => $v);
|
|
}
|
|
} elseif (in_array($searchTerm, $textFields)) {
|
|
if ($v != "") {
|
|
if ($searchTerm == "role") {
|
|
$searchTerm = "role_id";
|
|
}
|
|
$pieces = explode('|', $v);
|
|
$test = array();
|
|
foreach ($pieces as $piece) {
|
|
if ($piece[0] == '!') {
|
|
if ($searchTerm == 'email') {
|
|
$this->paginate['conditions']['AND'][] = array('LOWER(User.' . $searchTerm . ') NOT LIKE' => '%' . strtolower(substr($piece, 1)) . '%');
|
|
} elseif ($searchTerm == 'org') {
|
|
$this->paginate['conditions']['AND'][] = array('User.org_id !=' => substr($piece, 1));
|
|
} else {
|
|
$this->paginate['conditions']['AND'][] = array('User.' . $searchTerm => substr($piece, 1));
|
|
}
|
|
} else {
|
|
if ($searchTerm == 'email') {
|
|
$test['OR'][] = array('LOWER(User.' . $searchTerm . ') LIKE' => '%' . strtolower($piece) . '%');
|
|
} elseif ($searchTerm == 'org') {
|
|
$this->paginate['conditions']['OR'][] = array('User.org_id' => $piece);
|
|
} elseif ($searchTerm == 'all') {
|
|
$this->paginate['conditions']['AND'][] = array(
|
|
'OR' => array(
|
|
'UPPER(User.email) LIKE' => '%' . strtoupper($piece) . '%',
|
|
'UPPER(Organisation.name) LIKE' => '%' . strtoupper($piece) . '%',
|
|
'UPPER(Role.name) LIKE' => '%' . strtoupper($piece) . '%',
|
|
'UPPER(User.authkey) LIKE' => '%' . strtoupper($piece) . '%'
|
|
),
|
|
);
|
|
} else {
|
|
$test['OR'][] = array('User.' . $searchTerm => $piece);
|
|
}
|
|
}
|
|
}
|
|
if (!empty($test)) {
|
|
$this->paginate['conditions']['AND'][] = $test;
|
|
}
|
|
}
|
|
}
|
|
$passedArgsArray[$searchTerm] = $v;
|
|
}
|
|
}
|
|
$redis = $this->User->setupRedis();
|
|
if ($this->_isRest()) {
|
|
$conditions = array();
|
|
if (isset($this->paginate['conditions'])) {
|
|
$conditions = $this->paginate['conditions'];
|
|
}
|
|
if (!$this->_isSiteAdmin()) {
|
|
$conditions['User.org_id'] = $this->Auth->user('org_id');
|
|
}
|
|
$users = $this->User->find('all', array(
|
|
'conditions' => $conditions,
|
|
'recursive' => -1,
|
|
'fields' => array(
|
|
'id',
|
|
'org_id',
|
|
'server_id',
|
|
'email',
|
|
'autoalert',
|
|
'authkey',
|
|
'invited_by',
|
|
'gpgkey',
|
|
'certif_public',
|
|
'nids_sid',
|
|
'termsaccepted',
|
|
'newsread',
|
|
'role_id',
|
|
'change_pw',
|
|
'contactalert',
|
|
'disabled',
|
|
'expiration',
|
|
'current_login',
|
|
'last_login',
|
|
'force_logout',
|
|
'date_created',
|
|
'date_modified'
|
|
),
|
|
'contain' => array(
|
|
'Organisation' => array('id', 'name'),
|
|
'Role' => array('id', 'name', 'perm_auth', 'perm_site_admin')
|
|
)
|
|
));
|
|
foreach ($users as $key => $value) {
|
|
if (empty($this->Auth->user('Role')['perm_site_admin'])) {
|
|
if ($value['Role']['perm_site_admin']) {
|
|
$users[$key]['User']['authkey'] = __('Redacted');
|
|
}
|
|
} else if (!empty(Configure::read('Security.user_monitoring_enabled'))) {
|
|
$users[$key]['User']['monitored'] = $redis->sismember('misp:monitored_users', $value['User']['id']);
|
|
}
|
|
unset($users[$key]['User']['password']);
|
|
}
|
|
return $this->RestResponse->viewData($users, $this->response->type());
|
|
} else {
|
|
$this->set('urlparams', $urlParams);
|
|
$this->set('passedArgsArray', $passedArgsArray);
|
|
$conditions = array();
|
|
if ($this->_isSiteAdmin()) {
|
|
$users = $this->paginate();
|
|
if (!empty(Configure::read('Security.user_monitoring_enabled'))) {
|
|
foreach ($users as $key => $value) {
|
|
$users[$key]['User']['monitored'] = $redis->sismember('misp:monitored_users', $users[$key]['User']['id']);
|
|
}
|
|
}
|
|
$this->set('users', $users);
|
|
} else {
|
|
$conditions['User.org_id'] = $this->Auth->user('org_id');
|
|
$this->paginate['conditions']['AND'][] = $conditions;
|
|
$users = $this->paginate();
|
|
foreach ($users as $key => $value) {
|
|
if ($value['Role']['perm_site_admin']) {
|
|
$users[$key]['User']['authkey'] = __('Redacted');
|
|
}
|
|
}
|
|
$this->set('users', $users);
|
|
}
|
|
if ($this->request->is('ajax')) {
|
|
$this->autoRender = false;
|
|
$this->layout = false;
|
|
$this->render('ajax/admin_index');
|
|
}
|
|
}
|
|
}
|
|
|
|
public function admin_filterUserIndex()
|
|
{
|
|
if (!$this->_isAdmin() && !$this->_isSiteAdmin()) {
|
|
throw new MethodNotAllowedException();
|
|
}
|
|
$passedArgsArray = array();
|
|
$booleanFields = array('autoalert', 'contactalert', 'termsaccepted');
|
|
$textFields = array('role', 'email', 'authkey');
|
|
$showOrg = 0;
|
|
// org admins can't see users of other orgs
|
|
if ($this->_isSiteAdmin()) {
|
|
$textFields[] = 'org';
|
|
$showOrg = 1;
|
|
}
|
|
$this->set('differentFilters', $booleanFields);
|
|
$this->set('simpleFilters', $textFields);
|
|
$rules = array_merge($booleanFields, $textFields);
|
|
$this->set('showorg', $showOrg);
|
|
|
|
$filtering = array();
|
|
foreach ($booleanFields as $b) {
|
|
$filtering[$b] = '';
|
|
}
|
|
foreach ($textFields as $t) {
|
|
$filtering[$t] = array('OR' => array(), 'NOT' => array());
|
|
}
|
|
|
|
foreach ($this->passedArgs as $k => $v) {
|
|
if (substr($k, 0, 6) === 'search') {
|
|
$searchTerm = substr($k, 6);
|
|
if (in_array($searchTerm, $booleanFields)) {
|
|
$filtering[$searchTerm] = $v;
|
|
} elseif (in_array($searchTerm, $textFields)) {
|
|
$pieces = explode('|', $v);
|
|
foreach ($pieces as $piece) {
|
|
if ($piece[0] == '!') {
|
|
$filtering[$searchTerm]['NOT'][] = substr($piece, 1);
|
|
} else {
|
|
$filtering[$searchTerm]['OR'][] = $piece;
|
|
}
|
|
}
|
|
}
|
|
$passedArgsArray[$searchTerm] = $v;
|
|
}
|
|
}
|
|
$this->set('filtering', json_encode($filtering));
|
|
|
|
$roles = $this->User->Role->find('all', array('recursive' => -1));
|
|
$roleNames = array();
|
|
$roleJSON = array();
|
|
foreach ($roles as $k => $v) {
|
|
$roleNames[$v['Role']['id']] = $v['Role']['name'];
|
|
$roleJSON[] = array('id' => $v['Role']['id'], 'value' => $v['Role']['name']);
|
|
}
|
|
$temp = $this->User->Organisation->find('all', array(
|
|
'conditions' => array('local' => 1),
|
|
'recursive' => -1,
|
|
'fields' => array('id', 'name'),
|
|
'order' => array('LOWER(name) ASC')
|
|
));
|
|
$orgs = array();
|
|
foreach ($temp as $org) {
|
|
$orgs[$org['Organisation']['id']] = $org['Organisation']['name'];
|
|
}
|
|
$this->set('orgs', $orgs);
|
|
$this->set('roles', $roleNames);
|
|
$this->set('roleJSON', json_encode($roleJSON));
|
|
$rules = $this->_arrayToValuesIndexArray($rules);
|
|
$this->set('rules', $rules);
|
|
$this->set('baseurl', Configure::read('MISP.baseurl'));
|
|
$this->layout = 'ajax';
|
|
}
|
|
|
|
public function admin_view($id = null)
|
|
{
|
|
$user = $this->User->find('first', array(
|
|
'recursive' => -1,
|
|
'conditions' => array('User.id' => $id),
|
|
'contain' => array(
|
|
'UserSetting',
|
|
'Role',
|
|
'Organisation'
|
|
)
|
|
));
|
|
if (empty($user)) {
|
|
throw new NotFoundException(__('Invalid user'));
|
|
}
|
|
if (!empty($user['User']['gpgkey'])) {
|
|
$pgpDetails = $this->User->verifySingleGPG($user);
|
|
$user['User']['pgp_status'] = isset($pgpDetails[2]) ? $pgpDetails[2] : 'OK';
|
|
$user['User']['fingerprint'] = !empty($pgpDetails[4]) ? $pgpDetails[4] : 'N/A';
|
|
}
|
|
$user['User']['orgAdmins'] = $this->User->getOrgAdminsForOrg($user['User']['org_id'], $user['User']['id']);
|
|
if (empty($this->Auth->user('Role')['perm_site_admin']) && !(empty($user['Role']['perm_site_admin']))) {
|
|
$user['User']['authkey'] = __('Redacted');
|
|
}
|
|
$this->set('user', $user);
|
|
if (!$this->_isSiteAdmin() && !($this->_isAdmin() && $this->Auth->user('org_id') == $user['User']['org_id'])) {
|
|
throw new MethodNotAllowedException();
|
|
}
|
|
if ($this->_isRest()) {
|
|
$user['User']['password'] = '*****';
|
|
$temp = array();
|
|
foreach ($user['UserSetting'] as $k => $v) {
|
|
$temp[$v['setting']] = $v['value'];
|
|
}
|
|
$user['UserSetting'] = $temp;
|
|
return $this->RestResponse->viewData(array(
|
|
'User' => $user['User'],
|
|
'Role' => $user['Role'],
|
|
'UserSetting' => $user['UserSetting']
|
|
), $this->response->type());
|
|
return $this->RestResponse->viewData(array('User' => $user['User']), $this->response->type());
|
|
} else {
|
|
$user2 = $this->User->find('first', array('conditions' => array('User.id' => $user['User']['invited_by']), 'recursive' => -1));
|
|
$this->set('id', $id);
|
|
$this->set('user2', $user2);
|
|
}
|
|
}
|
|
|
|
public function admin_add()
|
|
{
|
|
if (!$this->_isAdmin()) {
|
|
throw new Exception('Administrators only.');
|
|
}
|
|
$params = null;
|
|
if (!$this->_isSiteAdmin()) {
|
|
$params = array('conditions' => array('perm_site_admin !=' => 1, 'perm_sync !=' => 1, 'perm_regexp_access !=' => 1));
|
|
}
|
|
$this->loadModel('AdminSetting');
|
|
$default_role_id = $this->AdminSetting->getSetting('default_role');
|
|
$roles = $this->User->Role->find('list', $params);
|
|
$syncRoles = $this->User->Role->find('list', array('conditions' => array('perm_sync' => 1), 'recursive' => -1));
|
|
if ($this->request->is('post')) {
|
|
// In case we don't get the data encapsulated in a User object
|
|
if ($this->_isRest()) {
|
|
if (!isset($this->request->data['User'])) {
|
|
$this->request->data = array('User' => $this->request->data);
|
|
}
|
|
if (isset($this->request->data['User']['id'])) {
|
|
unset($this->request->data['User']['id']);
|
|
}
|
|
$required_fields = array('role_id', 'email');
|
|
foreach ($required_fields as $field) {
|
|
$set_field_via_other_means = false;
|
|
if (empty($this->request->data['User'][$field])) {
|
|
if ($field === 'role_id') {
|
|
if (!empty($default_role_id)) {
|
|
$this->request->data['User'][$field] = $default_role_id;
|
|
$set_field_via_other_means = true;
|
|
}
|
|
}
|
|
if (!$set_field_via_other_means) {
|
|
return $this->RestResponse->saveFailResponse('Users', 'admin_add', false, array($field => 'Mandatory field not set.'), $this->response->type());
|
|
}
|
|
}
|
|
}
|
|
if (isset($this->request->data['User']['password'])) {
|
|
$this->request->data['User']['confirm_password'] = $this->request->data['User']['password'];
|
|
}
|
|
$default_publish_alert = Configure::check('MISP.default_publish_alert') ? Configure::read('MISP.default_publish_alert') : 0;
|
|
$defaults = array(
|
|
'external_auth_required' => 0,
|
|
'external_auth_key' => '',
|
|
'server_id' => 0,
|
|
'gpgkey' => '',
|
|
'certif_public' => '',
|
|
'autoalert' => $default_publish_alert,
|
|
'contactalert' => 0,
|
|
'disabled' => 0,
|
|
'newsread' => 0,
|
|
'change_pw' => 1,
|
|
'authkey' => $this->User->generateAuthKey(),
|
|
'termsaccepted' => 0,
|
|
'org_id' => $this->Auth->user('org_id')
|
|
);
|
|
foreach ($defaults as $key => $value) {
|
|
if (!isset($this->request->data['User'][$key])) {
|
|
$this->request->data['User'][$key] = $value;
|
|
}
|
|
}
|
|
}
|
|
$this->request->data['User']['date_created'] = time();
|
|
$this->request->data['User']['date_modified'] = time();
|
|
if (!array_key_exists($this->request->data['User']['role_id'], $syncRoles)) {
|
|
$this->request->data['User']['server_id'] = 0;
|
|
}
|
|
$this->User->create();
|
|
// set invited by
|
|
$this->loadModel('Role');
|
|
$this->Role->recursive = -1;
|
|
$chosenRole = $this->Role->findById($this->request->data['User']['role_id']);
|
|
if (empty($chosenRole)) {
|
|
throw new MethodNotAllowedException('Invalid role');
|
|
}
|
|
$this->request->data['User']['invited_by'] = $this->Auth->user('id');
|
|
if (!$this->_isRest()) {
|
|
if ($chosenRole['Role']['perm_sync']) {
|
|
$this->request->data['User']['change_pw'] = 0;
|
|
$this->request->data['User']['termsaccepted'] = 1;
|
|
} else {
|
|
$this->request->data['User']['change_pw'] = 1;
|
|
$this->request->data['User']['termsaccepted'] = 0;
|
|
}
|
|
}
|
|
if (!isset($this->request->data['User']['disabled'])) {
|
|
$this->request->data['User']['disabled'] = false;
|
|
}
|
|
$this->request->data['User']['newsread'] = 0;
|
|
if (!$this->_isSiteAdmin()) {
|
|
$this->request->data['User']['org_id'] = $this->Auth->user('org_id');
|
|
$this->loadModel('Role');
|
|
$this->Role->recursive = -1;
|
|
$chosenRole = $this->Role->findById($this->request->data['User']['role_id']);
|
|
if (
|
|
$chosenRole['Role']['perm_site_admin'] == 1 ||
|
|
$chosenRole['Role']['perm_regexp_access'] == 1 ||
|
|
$chosenRole['Role']['perm_sync'] == 1 ||
|
|
$chosenRole['Role']['restricted_to_site_admin'] == 1
|
|
) {
|
|
throw new Exception('You are not authorised to assign that role to a user.');
|
|
}
|
|
}
|
|
$organisation = $this->User->Organisation->find('first', array(
|
|
'conditions' => array('Organisation.id' => $this->request->data['User']['org_id']),
|
|
'recursive' => -1
|
|
));
|
|
$fail = false;
|
|
if (!$this->_isSiteAdmin()) {
|
|
if (!empty($organisation['Organisation']['restricted_to_domain'])) {
|
|
$fail = true;
|
|
foreach ($organisation['Organisation']['restricted_to_domain'] as $restriction) {
|
|
if (
|
|
strlen($this->request->data['User']['email']) > strlen($restriction) &&
|
|
substr($this->request->data['User']['email'], (-1 * strlen($restriction))) === $restriction &&
|
|
in_array($this->request->data['User']['email'][strlen($this->request->data['User']['email']) - strlen($restriction) -1], array('@', '.'))
|
|
) {
|
|
$fail = false;
|
|
}
|
|
}
|
|
if ($abortPost) {
|
|
$this->Flash->error(__('Invalid e-mail domain. Your user is restricted to creating users for the following domain(s): ') . implode(', ', $organisation['Organisation']['restricted_to_domain']));
|
|
}
|
|
}
|
|
}
|
|
if (!$fail) {
|
|
if (empty($organisation)) {
|
|
if ($this->_isRest()) {
|
|
return $this->RestResponse->saveFailResponse('Users', 'admin_add', false, array('Invalid organisation'), $this->response->type());
|
|
} else {
|
|
// reset auth key for a new user
|
|
$this->set('authkey', $this->newkey);
|
|
$this->Flash->error(__('The user could not be saved. Invalid organisation.'));
|
|
}
|
|
} else {
|
|
$fieldList = array('password', 'email', 'external_auth_required', 'external_auth_key', 'enable_password', 'confirm_password', 'org_id', 'role_id', 'authkey', 'nids_sid', 'server_id', 'gpgkey', 'certif_public', 'autoalert', 'contactalert', 'disabled', 'invited_by', 'change_pw', 'termsaccepted', 'newsread', 'date_created', 'date_modified');
|
|
if ($this->User->save($this->request->data, true, $fieldList)) {
|
|
$notification_message = '';
|
|
if (!empty($this->request->data['User']['notify'])) {
|
|
$user = $this->User->find('first', array('conditions' => array('User.id' => $this->User->id), 'recursive' => -1));
|
|
$password = isset($this->request->data['User']['password']) ? $this->request->data['User']['password'] : false;
|
|
$result = $this->User->initiatePasswordReset($user, true, true, $password);
|
|
if ($result && empty(Configure::read('MISP.disable_emailing'))) {
|
|
$notification_message .= ' User notified of new credentials.';
|
|
}
|
|
}
|
|
if ($this->_isRest()) {
|
|
$user = $this->User->find('first', array(
|
|
'conditions' => array('User.id' => $this->User->id),
|
|
'recursive' => -1
|
|
));
|
|
$user['User']['password'] = '******';
|
|
return $this->RestResponse->viewData($user, $this->response->type());
|
|
} else {
|
|
$this->Flash->success(__('The user has been saved.' . $notification_message));
|
|
$this->redirect(array('action' => 'index'));
|
|
}
|
|
} else {
|
|
if ($this->_isRest()) {
|
|
return $this->RestResponse->saveFailResponse('Users', 'admin_add', false, $this->User->validationErrors, $this->response->type());
|
|
} else {
|
|
// reset auth key for a new user
|
|
$this->set('authkey', $this->newkey);
|
|
$this->Flash->error(__('The user could not be saved. Please, try again.'));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
if (!$this->_isRest()) {
|
|
$this->newkey = $this->User->generateAuthKey();
|
|
$this->set('authkey', $this->newkey);
|
|
}
|
|
if ($this->_isRest()) {
|
|
return $this->RestResponse->describe('Users', 'admin_add', false, $this->response->type());
|
|
} else {
|
|
$orgs = $this->User->Organisation->find('list', array(
|
|
'conditions' => array('local' => 1),
|
|
'order' => array('lower(name) asc')
|
|
));
|
|
$this->set('orgs', $orgs);
|
|
// generate auth key for a new user
|
|
$this->loadModel('Server');
|
|
$this->set('complexity', !empty(Configure::read('Security.password_policy_complexity')) ? Configure::read('Security.password_policy_complexity') : $this->Server->serverSettings['Security']['password_policy_complexity']['value']);
|
|
$this->set('length', !empty(Configure::read('Security.password_policy_length')) ? Configure::read('Security.password_policy_length') : $this->Server->serverSettings['Security']['password_policy_length']['value']);
|
|
$conditions = array();
|
|
if (!$this->_isSiteAdmin()) {
|
|
$conditions['Server.org_id LIKE'] = $this->Auth->user('org_id');
|
|
}
|
|
$temp = $this->Server->find('all', array('conditions' => $conditions, 'recursive' => -1, 'fields' => array('id', 'name', 'url')));
|
|
$servers = array(0 => 'Not bound to a server');
|
|
if (!empty($temp)) {
|
|
foreach ($temp as $t) {
|
|
if (!empty($t['Server']['name'])) {
|
|
$servers[$t['Server']['id']] = $t['Server']['name'];
|
|
} else {
|
|
$servers[$t['Server']['id']] = $t['Server']['url'];
|
|
}
|
|
}
|
|
}
|
|
$this->set('currentOrg', $this->Auth->user('org_id'));
|
|
$this->set('isSiteAdmin', $this->_isSiteAdmin());
|
|
$this->set('default_role_id', $default_role_id);
|
|
$this->set('servers', $servers);
|
|
$this->set(compact('roles'));
|
|
$this->set(compact('syncRoles'));
|
|
}
|
|
}
|
|
|
|
public function admin_edit($id = null)
|
|
{
|
|
$this->set('currentOrg', $this->Auth->user('org_id'));
|
|
$this->User->id = $id;
|
|
if (!$this->User->exists()) {
|
|
throw new NotFoundException(__('Invalid user'));
|
|
}
|
|
$params = array();
|
|
$allowedRole = '';
|
|
$userToEdit = $this->User->find('first', array(
|
|
'conditions' => array('User.id' => $id),
|
|
'recursive' => -1,
|
|
'fields' => array('User.id', 'User.role_id', 'User.email', 'User.org_id', 'Role.perm_site_admin'),
|
|
'contain' => array('Role')
|
|
));
|
|
if (!$this->_isSiteAdmin()) {
|
|
// Org admins should be able to select the role that is already assigned to an org user when editing them.
|
|
// What happened previously:
|
|
// Org admin edits another org admin of the same org
|
|
// Org admin is not allowed to set privileged access roles (site_admin/sync/regex)
|
|
// MISP automatically chooses the first available option for the user as the selected setting (usually user)
|
|
// Org admin is downgraded to a user
|
|
// Now we make an exception for the already assigned role, both in the form and the actual edit.
|
|
if ($userToEdit['User']['org_id'] != $this->Auth->user('org_id') || !empty($userToEdit['Role']['perm_site_admin'])) {
|
|
throw new NotFoundException(__('Invalid user'));
|
|
}
|
|
$allowedRole = $userToEdit['User']['role_id'];
|
|
$params = array('conditions' => array(
|
|
'OR' => array(
|
|
'AND' => array(
|
|
'perm_site_admin' => 0, 'perm_sync' => 0, 'perm_regexp_access' => 0, 'restricted_to_site_admin' => 0
|
|
),
|
|
'id' => $allowedRole,
|
|
)
|
|
));
|
|
}
|
|
$roles = $this->User->Role->find('list', $params);
|
|
$syncRoles = $this->User->Role->find('list', array('conditions' => array('perm_sync' => 1), 'recursive' => -1));
|
|
$this->set('currentId', $id);
|
|
if ($this->request->is('post') || $this->request->is('put')) {
|
|
if (!isset($this->request->data['User'])) {
|
|
$this->request->data['User'] = $this->request->data;
|
|
}
|
|
$abortPost = false;
|
|
if (!$this->_isRest()) {
|
|
if (Configure::read('Security.require_password_confirmation')) {
|
|
if (!empty($this->request->data['User']['current_password'])) {
|
|
$hashed = $this->User->verifyPassword($this->Auth->user('id'), $this->request->data['User']['current_password']);
|
|
if (!$hashed) {
|
|
$abortPost = true;
|
|
$this->Flash->error('Invalid password. Please enter your current password to continue.');
|
|
}
|
|
unset($this->request->data['User']['current_password']);
|
|
} else {
|
|
$abortPost = true;
|
|
$this->Flash->info('Please enter your current password to continue.');
|
|
}
|
|
}
|
|
}
|
|
$fail = false;
|
|
if (!$this->_isSiteAdmin() && !$abortPost) {
|
|
$organisation = $this->User->Organisation->find('first', array(
|
|
'conditions' => array('Organisation.id' => $userToEdit['User']['org_id']),
|
|
'recursive' => -1
|
|
));
|
|
if (!empty($organisation['Organisation']['restricted_to_domain'])) {
|
|
$abortPost = true;
|
|
foreach ($organisation['Organisation']['restricted_to_domain'] as $restriction) {
|
|
if (
|
|
strlen($this->request->data['User']['email']) > strlen($restriction) &&
|
|
substr($this->request->data['User']['email'], (-1 * strlen($restriction))) === $restriction &&
|
|
in_array($this->request->data['User']['email'][strlen($this->request->data['User']['email']) - strlen($restriction) -1], array('@', '.'))
|
|
) {
|
|
$abortPost = false;
|
|
}
|
|
}
|
|
if ($abortPost) {
|
|
$this->Flash->error(__('Invalid e-mail domain. Your user is restricted to creating users for the following domain(s): ') . implode(', ', $organisation['Organisation']['restricted_to_domain']));
|
|
}
|
|
}
|
|
}
|
|
if (!$abortPost) {
|
|
$this->request->data['User']['id'] = $id;
|
|
if (!isset($this->request->data['User']['email'])) {
|
|
$this->request->data['User']['email'] = $userToEdit['User']['email'];
|
|
}
|
|
if (isset($this->request->data['User']['role_id']) && !array_key_exists($this->request->data['User']['role_id'], $syncRoles)) {
|
|
$this->request->data['User']['server_id'] = 0;
|
|
}
|
|
$fields = array();
|
|
$blockedFields = array('id', 'invited_by');
|
|
if (!$this->_isSiteAdmin()) {
|
|
$blockedFields[] = 'org_id';
|
|
}
|
|
foreach (array_keys($this->request->data['User']) as $field) {
|
|
if (in_array($field, $blockedFields)) {
|
|
continue;
|
|
}
|
|
if ($field != 'password') {
|
|
array_push($fields, $field);
|
|
}
|
|
}
|
|
$fieldsOldValues = array();
|
|
foreach ($fields as $field) {
|
|
if ($field == 'enable_password') {
|
|
continue;
|
|
}
|
|
if ($field != 'confirm_password') {
|
|
$fieldsOldValues[$field] = $this->User->field($field);
|
|
} else {
|
|
$fieldsOldValues[$field] = $this->User->field('password');
|
|
}
|
|
}
|
|
if (
|
|
isset($this->request->data['User']['enable_password']) && $this->request->data['User']['enable_password'] != '0' &&
|
|
isset($this->request->data['User']['password']) && "" != $this->request->data['User']['password']
|
|
) {
|
|
$fields[] = 'password';
|
|
if ($this->_isRest() && !isset($this->request->data['User']['confirm_password'])) {
|
|
$this->request->data['User']['confirm_password'] = $this->request->data['User']['password'];
|
|
$fields[] = 'confirm_password';
|
|
}
|
|
}
|
|
if (!$this->_isRest()) {
|
|
$fields[] = 'role_id';
|
|
}
|
|
if (!$this->_isSiteAdmin()) {
|
|
$this->loadModel('Role');
|
|
$this->Role->recursive = -1;
|
|
$chosenRole = $this->Role->findById($this->request->data['User']['role_id']);
|
|
if (empty($chosenRole) || (($chosenRole['Role']['id'] != $allowedRole) && ($chosenRole['Role']['perm_site_admin'] == 1 || $chosenRole['Role']['perm_regexp_access'] == 1 || $chosenRole['Role']['perm_sync'] == 1))) {
|
|
throw new Exception('You are not authorised to assign that role to a user.');
|
|
}
|
|
}
|
|
if ($this->User->save($this->request->data, true, $fields)) {
|
|
// newValues to array
|
|
$fieldsNewValues = array();
|
|
foreach ($fields as $field) {
|
|
if ($field != 'confirm_password') {
|
|
$newValue = $this->data['User'][$field];
|
|
if (gettype($newValue) == 'array') {
|
|
$newValueStr = '';
|
|
$cP = 0;
|
|
foreach ($newValue as $newValuePart) {
|
|
if ($cP < 2) {
|
|
$newValueStr .= '-' . $newValuePart;
|
|
} else {
|
|
$newValueStr = $newValuePart . $newValueStr;
|
|
}
|
|
$cP++;
|
|
}
|
|
$fieldsNewValues[$field] = $newValueStr;
|
|
} else {
|
|
$fieldsNewValues[$field] = $newValue;
|
|
}
|
|
} else {
|
|
$fieldsNewValues[$field] = $this->data['User']['password'];
|
|
}
|
|
}
|
|
// compare
|
|
$fieldsResult = array();
|
|
foreach ($fields as $field) {
|
|
if (isset($fieldsOldValues[$field]) && $fieldsOldValues[$field] != $fieldsNewValues[$field]) {
|
|
if ($field != 'confirm_password' && $field != 'enable_password') {
|
|
$fieldsResult[$field] = array($fieldsOldValues[$field], $fieldsNewValues[$field]);
|
|
}
|
|
}
|
|
}
|
|
$user = $this->User->find('first', array(
|
|
'recursive' => -1,
|
|
'conditions' => array('User.id' => $this->User->id)
|
|
));
|
|
$this->User->extralog($this->Auth->user(), "edit", "user", $fieldsResult, $user);
|
|
if ($this->_isRest()) {
|
|
$user['User']['password'] = '******';
|
|
return $this->RestResponse->viewData($user, $this->response->type());
|
|
} else {
|
|
$this->Flash->success(__('The user has been saved'));
|
|
$this->_refreshAuth(); // in case we modify ourselves
|
|
$this->redirect(array('action' => 'index'));
|
|
}
|
|
} else {
|
|
if ($this->_isRest()) {
|
|
return $this->RestResponse->saveFailResponse('Users', 'admin_edit', $id, $this->User->validationErrors, $this->response->type());
|
|
} else {
|
|
$this->Flash->error(__('The user could not be saved. Please, try again.'));
|
|
}
|
|
}
|
|
}
|
|
} else {
|
|
if ($this->_isRest()) {
|
|
return $this->RestResponse->describe('Users', 'admin_edit', $id, $this->response->type());
|
|
}
|
|
$this->User->read(null, $id);
|
|
if (!$this->_isSiteAdmin() && $this->Auth->user('org_id') != $this->User->data['User']['org_id']) {
|
|
$this->redirect(array('controller' => 'users', 'action' => 'index', 'admin' => true));
|
|
}
|
|
$this->User->set('password', '');
|
|
$this->request->data = $this->User->data;
|
|
}
|
|
if ($this->_isSiteAdmin()) {
|
|
$orgs = $this->User->Organisation->find('list', array(
|
|
'conditions' => array('local' => 1),
|
|
'order' => array('lower(name) asc')
|
|
));
|
|
} else {
|
|
$orgs = array();
|
|
}
|
|
$this->loadModel('Server');
|
|
$this->set('complexity', !empty(Configure::read('Security.password_policy_complexity')) ? Configure::read('Security.password_policy_complexity') : $this->Server->serverSettings['Security']['password_policy_complexity']['value']);
|
|
$this->set('length', !empty(Configure::read('Security.password_policy_length')) ? Configure::read('Security.password_policy_length') : $this->Server->serverSettings['Security']['password_policy_length']['value']);
|
|
$conditions = array();
|
|
if (!$this->_isSiteAdmin()) {
|
|
$conditions['Server.org_id LIKE'] = $this->Auth->user('org_id');
|
|
}
|
|
$temp = $this->Server->find('all', array('conditions' => $conditions, 'recursive' => -1, 'fields' => array('id', 'name', 'url')));
|
|
$servers = array(0 => 'Not bound to a server');
|
|
foreach ($temp as $t) {
|
|
if (!empty($t['Server']['name'])) {
|
|
$servers[$t['Server']['id']] = $t['Server']['name'];
|
|
} else {
|
|
$servers[$t['Server']['id']] = $t['Server']['url'];
|
|
}
|
|
}
|
|
$this->set('servers', $servers);
|
|
$this->set('orgs', $orgs);
|
|
$this->set('id', $id);
|
|
$this->set(compact('roles'));
|
|
$this->set(compact('syncRoles'));
|
|
}
|
|
|
|
public function admin_delete($id = null)
|
|
{
|
|
if (!$this->request->is('post') && !$this->request->is('delete')) {
|
|
throw new MethodNotAllowedException(__('Action not allowed, post or delete request expected.'));
|
|
}
|
|
if (!$this->_isAdmin()) {
|
|
throw new Exception('Administrators only.');
|
|
}
|
|
$this->User->id = $id;
|
|
$conditions = array('User.id' => $id);
|
|
if (!$this->_isSiteAdmin()) {
|
|
$conditions['org_id'] = $this->Auth->user('org_id');
|
|
}
|
|
$user = $this->User->find('first', array(
|
|
'conditions' => $conditions,
|
|
'recursive' => -1
|
|
));
|
|
if (empty($user)) {
|
|
throw new NotFoundException(__('Invalid user'));
|
|
}
|
|
$fieldsDescrStr = 'User (' . $id . '): ' . $user['User']['email'];
|
|
if ($this->User->delete($id)) {
|
|
$this->User->extralog($this->Auth->user(), "delete", $fieldsDescrStr, '');
|
|
if ($this->_isRest()) {
|
|
return $this->RestResponse->saveSuccessResponse('User', 'admin_delete', $id, $this->response->type(), 'User deleted.');
|
|
} else {
|
|
$this->Flash->success(__('User deleted'));
|
|
$this->redirect(array('action' => 'index'));
|
|
}
|
|
}
|
|
$this->Flash->error(__('User was not deleted'));
|
|
$this->redirect(array('action' => 'index'));
|
|
}
|
|
|
|
public function updateLoginTime()
|
|
{
|
|
if (!$this->request->is('post')) {
|
|
throw new MethodNotAllowedException('This feature is only accessible via POST requests');
|
|
}
|
|
$user = $this->User->find('first', array(
|
|
'recursive' => -1,
|
|
'conditions' => array('User.id' => $this->Auth->user('id'))
|
|
));
|
|
$this->User->id = $this->Auth->user('id');
|
|
$this->User->saveField('last_login', time());
|
|
$this->User->saveField('current_login', time());
|
|
$user = $this->User->getAuthUser($user['User']['id']);
|
|
$this->Auth->login($user);
|
|
$this->redirect(array('Controller' => 'User', 'action' => 'dashboard'));
|
|
}
|
|
|
|
public function login()
|
|
{
|
|
if ($this->request->is('post') || $this->request->is('put')) {
|
|
$this->Bruteforce = ClassRegistry::init('Bruteforce');
|
|
if (!empty($this->request->data['User']['email'])) {
|
|
if ($this->Bruteforce->isBlacklisted($_SERVER['REMOTE_ADDR'], $this->request->data['User']['email'])) {
|
|
$expire = Configure::check('SecureAuth.expire') ? Configure::read('SecureAuth.expire') : 300;
|
|
throw new ForbiddenException('You have reached the maximum number of login attempts. Please wait ' . Configure::read('SecureAuth.expire') . ' seconds and try again.');
|
|
}
|
|
}
|
|
// Check the length of the user's authkey
|
|
$userPass = $this->User->find('first', array(
|
|
'conditions' => array('User.email' => $this->request->data['User']['email']),
|
|
'fields' => array('User.password'),
|
|
'recursive' => -1
|
|
));
|
|
if (!empty($userPass) && strlen($userPass['User']['password']) == 40) {
|
|
$this->AdminSetting = ClassRegistry::init('AdminSetting');
|
|
$db_version = $this->AdminSetting->find('all', array('conditions' => array('setting' => 'db_version')));
|
|
$versionRequirementMet = $this->User->checkVersionRequirements($db_version[0]['AdminSetting']['value'], '2.4.77');
|
|
if ($versionRequirementMet) {
|
|
$passwordToSave = $this->request->data['User']['password'];
|
|
}
|
|
unset($this->Auth->authenticate['Form']['passwordHasher']);
|
|
$this->Auth->constructAuthenticate();
|
|
}
|
|
}
|
|
if ($this->Auth->login()) {
|
|
$this->User->extralog($this->Auth->user(), "login");
|
|
$this->User->Behaviors->disable('SysLogLogable.SysLogLogable');
|
|
$this->User->id = $this->Auth->user('id');
|
|
$user = $this->User->find('first', array(
|
|
'conditions' => array(
|
|
'User.id' => $this->Auth->user('id')
|
|
),
|
|
'recursive' => -1
|
|
));
|
|
$lastUserLogin = $user['User']['last_login'];
|
|
unset($user['User']['password']);
|
|
$user['User']['action'] = 'login';
|
|
$user['User']['last_login'] = $this->Auth->user('current_login');
|
|
$user['User']['current_login'] = time();
|
|
$this->User->save($user['User'], true, array('id', 'last_login', 'current_login'));
|
|
if (empty($this->Auth->authenticate['Form']['passwordHasher']) && !empty($passwordToSave)) {
|
|
$this->User->saveField('password', $passwordToSave);
|
|
}
|
|
$this->User->Behaviors->enable('SysLogLogable.SysLogLogable');
|
|
if ($lastUserLogin) {
|
|
$readableDatetime = (new DateTime())->setTimestamp($lastUserLogin)->format('D, d M y H:i:s O'); // RFC822
|
|
$this->Flash->info(sprintf('Welcome! Last login was on %s', $readableDatetime));
|
|
}
|
|
// no state changes are ever done via GET requests, so it is safe to return to the original page:
|
|
$this->redirect($this->Auth->redirectUrl());
|
|
// $this->redirect(array('controller' => 'events', 'action' => 'index'));
|
|
} else {
|
|
$dataSourceConfig = ConnectionManager::getDataSource('default')->config;
|
|
$dataSource = $dataSourceConfig['datasource'];
|
|
// don't display authError before first login attempt
|
|
if (str_replace("//", "/", $this->webroot . $this->Session->read('Auth.redirect')) == $this->webroot && $this->Session->read('Message.auth.message') == $this->Auth->authError) {
|
|
$this->Session->delete('Message.auth');
|
|
}
|
|
// don't display "invalid user" before first login attempt
|
|
if ($this->request->is('post') || $this->request->is('put')) {
|
|
$this->Flash->error(__('Invalid username or password, try again'));
|
|
if (isset($this->request->data['User']['email'])) {
|
|
$this->Bruteforce->insert($_SERVER['REMOTE_ADDR'], $this->request->data['User']['email']);
|
|
}
|
|
}
|
|
// populate the DB with the first role (site admin) if it's empty
|
|
$this->loadModel('Role');
|
|
if ($this->Role->find('count') == 0) {
|
|
$siteAdmin = array('Role' => array(
|
|
'id' => 1,
|
|
'name' => 'Site Admin',
|
|
'permission' => 3,
|
|
'perm_add' => 1,
|
|
'perm_modify' => 1,
|
|
'perm_modify_org' => 1,
|
|
'perm_publish' => 1,
|
|
'perm_sync' => 1,
|
|
'perm_admin' => 1,
|
|
'perm_audit' => 1,
|
|
'perm_auth' => 1,
|
|
'perm_site_admin' => 1,
|
|
'perm_regexp_access' => 1,
|
|
'perm_sharing_group' => 1,
|
|
'perm_template' => 1,
|
|
'perm_tagger' => 1,
|
|
));
|
|
$this->Role->save($siteAdmin);
|
|
// PostgreSQL: update value of auto incremented serial primary key after setting the column by force
|
|
if ($dataSource == 'Database/Postgres') {
|
|
$sql = "SELECT setval('roles_id_seq', (SELECT MAX(id) FROM roles));";
|
|
$this->Role->query($sql);
|
|
}
|
|
}
|
|
if ($this->User->Organisation->find('count', array('conditions' => array('Organisation.local' => true))) == 0) {
|
|
$this->User->runUpdates();
|
|
$date = date('Y-m-d H:i:s');
|
|
$org = array('Organisation' => array(
|
|
'id' => 1,
|
|
'name' => !empty(Configure::read('MISP.org')) ? Configure::read('MISP.org') : 'ADMIN',
|
|
'description' => 'Automatically generated admin organisation',
|
|
'type' => 'ADMIN',
|
|
'uuid' => CakeText::uuid(),
|
|
'local' => 1,
|
|
'date_created' => $date,
|
|
'sector' => '',
|
|
'nationality' => ''
|
|
));
|
|
$this->User->Organisation->save($org);
|
|
// PostgreSQL: update value of auto incremented serial primary key after setting the column by force
|
|
if ($dataSource == 'Database/Postgres') {
|
|
$sql = "SELECT setval('organisations_id_seq', (SELECT MAX(id) FROM organisations));";
|
|
$this->User->Organisation->query($sql);
|
|
}
|
|
$org_id = $this->User->Organisation->id;
|
|
} else {
|
|
$hostOrg = $this->User->Organisation->find('first', array('conditions' => array('Organisation.name' => Configure::read('MISP.org'), 'Organisation.local' => true), 'recursive' => -1));
|
|
if (!empty($hostOrg)) {
|
|
$org_id = $hostOrg['Organisation']['id'];
|
|
} else {
|
|
$firstOrg = $this->User->Organisation->find('first', array('conditions' => array('Organisation.local' => true), 'order' => 'Organisation.id ASC'));
|
|
$org_id = $firstOrg['Organisation']['id'];
|
|
}
|
|
}
|
|
|
|
// populate the DB with the first user if it's empty
|
|
if ($this->User->find('count') == 0) {
|
|
$this->User->runUpdates();
|
|
$this->User->createInitialUser($org_id);
|
|
}
|
|
}
|
|
}
|
|
|
|
public function routeafterlogin()
|
|
{
|
|
// Events list
|
|
$url = $this->Session->consume('pre_login_requested_url');
|
|
if (empty($url)) {
|
|
$homepage = $this->User->UserSetting->find('first', array(
|
|
'recursive' => -1,
|
|
'conditions' => array(
|
|
'UserSetting.user_id' => $this->Auth->user('id'),
|
|
'UserSetting.setting' => 'homepage'
|
|
),
|
|
'contain' => array('User.id', 'User.org_id')
|
|
));
|
|
if (!empty($homepage)) {
|
|
$url = $homepage['UserSetting']['value']['path'];
|
|
} else {
|
|
$url = array('controller' => 'events', 'action' => 'index');
|
|
}
|
|
}
|
|
$this->redirect($url);
|
|
}
|
|
|
|
public function logout()
|
|
{
|
|
if ($this->Session->check('Auth.User')) {
|
|
$this->User->extralog($this->Auth->user(), "logout");
|
|
}
|
|
$this->Flash->info(__('Good-Bye'));
|
|
$user = $this->User->find('first', array(
|
|
'conditions' => array(
|
|
'User.id' => $this->Auth->user('id')
|
|
),
|
|
'recursive' => -1
|
|
));
|
|
unset($user['User']['password']);
|
|
$user['User']['action'] = 'logout';
|
|
$this->User->save($user['User'], true, array('id'));
|
|
$this->redirect($this->Auth->logout());
|
|
}
|
|
|
|
public function resetauthkey($id = null, $alert = false)
|
|
{
|
|
if (!$this->_isAdmin() && Configure::read('MISP.disableUserSelfManagement')) {
|
|
throw new MethodNotAllowedException('User self-management has been disabled on this instance.');
|
|
}
|
|
if (!$this->request->is('post') && !$this->request->is('put')) {
|
|
throw new MethodNotAllowedException(__('This functionality is only accessible via POST requests.'));
|
|
}
|
|
if ($id == 'me') {
|
|
$id = $this->Auth->user('id');
|
|
}
|
|
if (!$this->userRole['perm_auth']) {
|
|
throw new MethodNotAllowedException(__('Invalid action.'));
|
|
}
|
|
$newkey = $this->User->resetauthkey($this->Auth->user(), $id, $alert);
|
|
if ($newkey === false) {
|
|
throw new MethodNotAllowedException(__('Invalid user.'));
|
|
}
|
|
if (!$this->_isRest()) {
|
|
$this->Flash->success(__('New authkey generated.', true));
|
|
$this->_refreshAuth();
|
|
$this->redirect($this->referer());
|
|
} else {
|
|
return $this->RestResponse->saveSuccessResponse('User', 'resetauthkey', $id, $this->response->type(), 'Authkey updated: ' . $newkey);
|
|
}
|
|
}
|
|
|
|
public function resetAllSyncAuthKeys()
|
|
{
|
|
if (!$this->request->is('post')) {
|
|
throw new MethodNotAllowedException(__('This functionality is only accessible via POST requests.'));
|
|
}
|
|
$results = $this->User->resetAllSyncAuthKeysRouter($this->Auth->user());
|
|
if ($results === true) {
|
|
$message = __('Job initiated.');
|
|
} else {
|
|
$message = __('%s authkeys reset, %s could not be reset.', $results['success'], $results['fails']);
|
|
}
|
|
if (!$this->_isRest()) {
|
|
$this->Flash->info($message);
|
|
$this->redirect($this->referer());
|
|
} else {
|
|
return $this->RestResponse->saveSuccessResponse('User', 'resetAllSyncAuthKeys', false, $this->response->type(), $message);
|
|
}
|
|
}
|
|
|
|
public function histogram($selected = null)
|
|
{
|
|
//if (!$this->request->is('ajax') && !$this->_isRest()) throw new MethodNotAllowedException('This function can only be accessed via AJAX or the API.');
|
|
if ($selected == '[]') {
|
|
$selected = null;
|
|
}
|
|
$selectedTypes = array();
|
|
if ($selected) {
|
|
$selectedTypes = json_decode($selected);
|
|
}
|
|
if (!$this->_isSiteAdmin() && !empty(Configure::read('Security.hide_organisation_index_from_users'))) {
|
|
$org_ids = array($this->Auth->user('org_id'));
|
|
} else {
|
|
$org_ids = $this->User->Event->find('list', array(
|
|
'fields' => array('Event.orgc_id', 'Event.orgc_id'),
|
|
'group' => array('Event.orgc_id')
|
|
));
|
|
}
|
|
$orgs_temp = $this->User->Organisation->find('list', array(
|
|
'fields' => array('Organisation.id', 'Organisation.name'),
|
|
'conditions' => array('Organisation.id' => $org_ids)
|
|
));
|
|
$orgs = array(0 => 'All organisations');
|
|
foreach ($org_ids as $v) {
|
|
if (!empty($orgs_temp[$v])) {
|
|
$orgs[$v] = $orgs_temp[$v];
|
|
}
|
|
}
|
|
$data = array();
|
|
$max = 1;
|
|
foreach ($orgs as $org_id => $org_name) {
|
|
$conditions = array('Attribute.deleted' => 0);
|
|
if ($selected) {
|
|
$conditions['Attribute.type'] = $selectedTypes;
|
|
}
|
|
if ($org_id != 0) {
|
|
$conditions['Event.orgc_id'] = $org_id;
|
|
}
|
|
$params = array(
|
|
'recursive' => -1,
|
|
'fields' => array('Attribute.type', 'COUNT(*) as num_types'),
|
|
'group' => array('Attribute.type'),
|
|
'joins' => array(
|
|
array(
|
|
'table' => 'events',
|
|
'alias' => 'Event',
|
|
'type' => 'LEFT',
|
|
'conditions' => array(
|
|
'Attribute.event_id = Event.id'
|
|
)
|
|
)
|
|
),
|
|
//'order' => array('num_types DESC'),
|
|
'conditions' => $conditions,
|
|
'order' => false
|
|
);
|
|
if ($org_id == 0) {
|
|
unset($params['joins']);
|
|
}
|
|
$temp = $this->User->Event->Attribute->find('all', $params);
|
|
$temp = Hash::combine($temp, '{n}.Attribute.type', '{n}.0.num_types');
|
|
$total = 0;
|
|
foreach ($temp as $k => $v) {
|
|
if (intval($v) > $max) {
|
|
$max = intval($v);
|
|
}
|
|
$total += intval($v);
|
|
}
|
|
$data[$org_id]['data'] = $temp;
|
|
$data[$org_id]['org_name'] = $org_name;
|
|
$data[$org_id]['total'] = $total;
|
|
}
|
|
uasort($data, function ($a, $b) {
|
|
return $b['total'] - $a['total'];
|
|
});
|
|
$data = array_values($data);
|
|
$this->set('data', $data);
|
|
$this->set('max', $max);
|
|
$this->set('selectedTypes', $selectedTypes);
|
|
|
|
// Nice graphical histogram
|
|
$sigTypes = array_keys($this->User->Event->Attribute->typeDefinitions);
|
|
App::uses('ColourPaletteTool', 'Tools');
|
|
$paletteTool = new ColourPaletteTool();
|
|
$colours = $paletteTool->createColourPalette(count($sigTypes));
|
|
$typeDb = array();
|
|
foreach ($sigTypes as $k => $type) {
|
|
$typeDb[$type] = $colours[$k];
|
|
}
|
|
if ($this->_isRest()) {
|
|
return $this->RestResponse->viewData($data, $this->response->type());
|
|
} else {
|
|
$this->set('typeDb', $typeDb);
|
|
$this->set('sigTypes', $sigTypes);
|
|
$this->layout = 'ajax';
|
|
}
|
|
}
|
|
|
|
public function terms()
|
|
{
|
|
if ($this->request->is('post') || $this->request->is('put')) {
|
|
$this->User->id = $this->Auth->user('id');
|
|
$this->User->saveField('termsaccepted', true);
|
|
$this->_refreshAuth(); // refresh auth info
|
|
$this->Flash->success(__('You accepted the Terms and Conditions.'));
|
|
$this->redirect(array('action' => 'routeafterlogin'));
|
|
}
|
|
$this->set('termsaccepted', $this->Auth->user('termsaccepted'));
|
|
}
|
|
|
|
public function downloadTerms()
|
|
{
|
|
if (!Configure::read('MISP.terms_file')) {
|
|
$termsFile = APP ."View/Users/terms";
|
|
} else {
|
|
$termsFile = APP . 'files' . DS . 'terms' . DS . Configure::read('MISP.terms_file');
|
|
}
|
|
$this->response->file($termsFile, array('download' => true, 'name' => Configure::read('MISP.terms_file')));
|
|
return $this->response;
|
|
}
|
|
|
|
public function checkAndCorrectPgps()
|
|
{
|
|
if (!self::_isAdmin()) {
|
|
throw new NotFoundException();
|
|
}
|
|
$this->set('fails', $this->User->checkAndCorrectPgps());
|
|
}
|
|
|
|
public function admin_quickEmail($user_id)
|
|
{
|
|
if (!$this->_isAdmin()) {
|
|
throw new MethodNotAllowedException();
|
|
}
|
|
$conditions = array('User.id' => $user_id);
|
|
if (!$this->_isSiteAdmin()) {
|
|
$conditions['User.org_id'] = $this->Auth->user('org_id');
|
|
}
|
|
$user = $this->User->find('first', array(
|
|
'conditions' => $conditions,
|
|
'recursive' => -1
|
|
));
|
|
$error = false;
|
|
if (empty($user)) {
|
|
$error = 'Invalid user.';
|
|
}
|
|
if (!$error && $user['User']['disabled']) {
|
|
$error = 'Cannot send an e-mail to this user as the account is disabled.';
|
|
}
|
|
$encryption = false;
|
|
if (!$error && !empty($user['User']['gpgkey'])) {
|
|
$encryption = 'PGP';
|
|
} elseif (!$error && !empty($user['User']['certif_public'])) {
|
|
$encryption = 'SMIME';
|
|
}
|
|
$this->set('encryption', $encryption);
|
|
if (!$error && !$encryption && (Configure::read('GnuPG.onlyencrypted') || Configure::read('GnuPG.bodyonlyencrypted'))) {
|
|
$error = 'No encryption key found for the user and the instance posture blocks non encrypted e-mails from being sent.';
|
|
}
|
|
if ($error) {
|
|
if ($this->_isRest()) {
|
|
return $this->RestResponse->saveFailResponse('Users', 'admin_quickEmail', false, $error, $this->response->type());
|
|
} else {
|
|
$this->Flash->error('Cannot send an e-mail to this user as the account is disabled.');
|
|
$this->redirect('/admin/users/view/' . $user_id);
|
|
}
|
|
}
|
|
if ($this->request->is('post')) {
|
|
if (!isset($this->request->data['User'])) {
|
|
$this->request->data['User'] = $this->request->data;
|
|
}
|
|
if (empty($this->request->data['User']['subject']) || empty($this->request->data['User']['body'])) {
|
|
$message = 'Both the subject and the body have to be set.';
|
|
if ($this->_isRest()) {
|
|
throw new MethodNotAllowedException($message);
|
|
} else {
|
|
$this->Flash->error($message);
|
|
$this->redirect('/admin/users/quickEmail/' . $user_id);
|
|
}
|
|
}
|
|
$result = $this->User->sendEmail($user, $this->request->data['User']['body'], false, $this->request->data['User']['subject']);
|
|
if ($this->_isRest()) {
|
|
if ($result) {
|
|
return $this->RestResponse->saveSuccessResponse('User', 'admin_quickEmail', $id, $this->response->type(), 'User deleted.');
|
|
} else {
|
|
return $this->RestResponse->saveFailResponse('Users', 'admin_quickEmail', false, $this->User->validationErrors, $this->response->type());
|
|
}
|
|
} else {
|
|
if ($result) {
|
|
$this->Flash->success('Email sent.');
|
|
} else {
|
|
$this->Flash->error('Could not send e-mail.');
|
|
}
|
|
$this->redirect('/admin/users/view/' . $user_id);
|
|
}
|
|
} elseif ($this->_isRest()) {
|
|
return $this->RestResponse->describe('Users', 'admin_quickEmail', false, $this->response->type());
|
|
}
|
|
$this->set('encryption', $encryption);
|
|
$this->set('user', $user);
|
|
}
|
|
|
|
public function admin_email($isPreview=false)
|
|
{
|
|
if (!$this->_isAdmin()) {
|
|
throw new MethodNotAllowedException();
|
|
}
|
|
$isPostOrPut = $this->request->is('post') || $this->request->is('put');
|
|
$conditions = array();
|
|
if (!$this->_isSiteAdmin()) {
|
|
$conditions = array('org_id' => $this->Auth->user('org_id'));
|
|
}
|
|
|
|
// harvest parameters
|
|
if ($isPostOrPut) {
|
|
$recipient = $this->request->data['User']['recipient'];
|
|
} else {
|
|
$recipient = isset($this->request->query['recipient']) ? $this->request->query['recipient'] : null;
|
|
}
|
|
if ($isPostOrPut) {
|
|
$recipientEmailList = $this->request->data['User']['recipientEmailList'];
|
|
} else {
|
|
$recipientEmailList = isset($this->request->query['recipientEmailList']) ? $this->request->query['recipientEmailList'] : null;
|
|
}
|
|
if ($isPostOrPut) {
|
|
$orgNameList = $this->request->data['User']['orgNameList'];
|
|
} else {
|
|
$orgNameList = isset($this->request->query['orgNameList']) ? $this->request->query['orgNameList'] : null;
|
|
}
|
|
|
|
if (!is_null($recipient) && $recipient == 0) {
|
|
if (is_null($recipientEmailList)) {
|
|
throw new NotFoundException(__('Recipient email not provided'));
|
|
}
|
|
$conditions['id'] = $recipientEmailList;
|
|
} elseif (!is_null($recipient) && $recipient == 2) {
|
|
if (is_null($orgNameList)) {
|
|
throw new NotFoundException(__('Recipient organisation not provided'));
|
|
}
|
|
$conditions['org_id'] = $orgNameList;
|
|
}
|
|
$conditions['AND'][] = array('User.disabled' => 0);
|
|
|
|
// Allow to mimic real form post
|
|
if ($isPreview) {
|
|
$users = $this->User->find('list', array('recursive' => -1, 'order' => array('email ASC'), 'conditions' => $conditions, 'fields' => array('email')));
|
|
$this->set('emails', $users);
|
|
$this->set('emailsCount', count($users));
|
|
$this->render('ajax/emailConfirmTemplate');
|
|
} else {
|
|
$users = $this->User->find('all', array('recursive' => -1, 'order' => array('email ASC'), 'conditions' => $conditions));
|
|
// User has filled in his contact form, send out the email.
|
|
if ($isPostOrPut) {
|
|
$this->request->data['User']['message'] = $this->User->adminMessageResolve($this->request->data['User']['message']);
|
|
$failures = '';
|
|
foreach ($users as $user) {
|
|
$password = $this->User->generateRandomPassword();
|
|
$body = str_replace('$password', $password, $this->request->data['User']['message']);
|
|
$body = str_replace('$username', $user['User']['email'], $body);
|
|
$result = $this->User->sendEmail($user, $body, false, $this->request->data['User']['subject']);
|
|
// if sending successful and action was a password change, update the user's password.
|
|
if ($result && $this->request->data['User']['action'] != '0') {
|
|
$this->User->id = $user['User']['id'];
|
|
$this->User->saveField('password', $password);
|
|
$this->User->saveField('change_pw', '1');
|
|
}
|
|
if (!$result) {
|
|
if ($failures != '') {
|
|
$failures .= ', ';
|
|
}
|
|
$failures .= $user['User']['email'];
|
|
}
|
|
}
|
|
if ($failures != '') {
|
|
$this->Flash->success(__('E-mails sent, but failed to deliver the messages to the following recipients: ' . $failures));
|
|
} else {
|
|
$this->Flash->success(__('E-mails sent.'));
|
|
}
|
|
}
|
|
$conditions = array();
|
|
if (!$this->_isSiteAdmin()) {
|
|
$conditions = array('org_id' => $this->Auth->user('org_id'));
|
|
}
|
|
$conditions['User.disabled'] = 0;
|
|
$temp = $this->User->find('all', array('recursive' => -1, 'fields' => array('id', 'email', 'Organisation.name'), 'order' => array('email ASC'), 'conditions' => $conditions, 'contain' => array('Organisation')));
|
|
$emails = array();
|
|
$orgName = array();
|
|
// save all the emails of the users and set it for the dropdown list in the form
|
|
foreach ($temp as $user) {
|
|
$emails[$user['User']['id']] = $user['User']['email'];
|
|
$orgName[$user['Organisation']['id']] = $user['Organisation']['name'];
|
|
}
|
|
|
|
$this->set('users', $temp);
|
|
$this->set('recipientEmail', $emails);
|
|
$this->set('orgName', $orgName);
|
|
$this->set('org', Configure::read('MISP.org'));
|
|
$textsToFetch = array('newUserText', 'passwordResetText');
|
|
$this->loadModel('Server');
|
|
foreach ($textsToFetch as $text) {
|
|
${$text} = Configure::read('MISP.' . $text);
|
|
if (!${$text}) {
|
|
${$text} = $this->Server->serverSettings['MISP'][$text]['value'];
|
|
}
|
|
$this->set($text, ${$text});
|
|
}
|
|
}
|
|
}
|
|
|
|
public function initiatePasswordReset($id, $firstTime = false)
|
|
{
|
|
if (!$this->_isAdmin()) {
|
|
throw new MethodNotAllowedException('You are not authorised to do that.');
|
|
}
|
|
$user = $this->User->find('first', array(
|
|
'conditions' => array('id' => $id),
|
|
'recursive' => -1
|
|
));
|
|
if (!$this->_isSiteAdmin() && $this->Auth->user('org_id') != $user['User']['org_id']) {
|
|
throw new MethodNotAllowedException('You are not authorised to do that.');
|
|
}
|
|
if ($this->request->is('post')) {
|
|
if (isset($this->request->data['User']['firstTime'])) {
|
|
$firstTime = $this->request->data['User']['firstTime'];
|
|
}
|
|
return new CakeResponse($this->User->initiatePasswordReset($user, $firstTime));
|
|
} else {
|
|
$error = false;
|
|
$encryption = false;
|
|
if (!empty($user['User']['gpgkey'])) {
|
|
$encryption = 'PGP';
|
|
} elseif (!$error && !empty($user['User']['certif_public'])) {
|
|
$encryption = 'SMIME';
|
|
}
|
|
$this->set('encryption', $encryption);
|
|
if (!$encryption && (Configure::read('GnuPG.onlyencrypted') || Configure::read('GnuPG.bodyonlyencrypted'))) {
|
|
$error = 'No encryption key found for the user and the instance posture blocks non encrypted e-mails from being sent.';
|
|
}
|
|
$this->set('error', $error);
|
|
$this->layout = 'ajax';
|
|
$this->set('user', $user);
|
|
$this->set('firstTime', $firstTime);
|
|
$this->render('ajax/passwordResetConfirmationForm');
|
|
}
|
|
}
|
|
|
|
// shows some statistics about the instance
|
|
public function statistics($page = 'data')
|
|
{
|
|
$this->set('page', $page);
|
|
$pages = array('data' => __('Usage data'),
|
|
'orgs' => __('Organisations'),
|
|
'users' => __('User and Organisation statistics'),
|
|
'tags' => __('Tags'),
|
|
'attributehistogram' => __('Attribute histogram'),
|
|
'sightings' => __('Sightings toplists'),
|
|
'galaxyMatrix' => __('Galaxy Matrix'));
|
|
if (!$this->_isSiteAdmin() && !empty(Configure::read('Security.hide_organisation_index_from_users'))) {
|
|
unset($pages['orgs']);
|
|
}
|
|
$this->set('pages', $pages);
|
|
$result = array();
|
|
if ($page == 'data') {
|
|
$result = $this->__statisticsData($this->params['named']);
|
|
} elseif ($page == 'orgs') {
|
|
if (!$this->_isSiteAdmin() && !empty(Configure::read('Security.hide_organisation_index_from_users'))) {
|
|
throw new MethodNotAllowedException('This feature is currently disabled.');
|
|
}
|
|
$result = $this->__statisticsOrgs($this->params['named']);
|
|
} elseif ($page == 'users') {
|
|
$result = $this->__statisticsUsers($this->params['named']);
|
|
} elseif ($page == 'tags') {
|
|
$result = $this->__statisticsTags($this->params['named']);
|
|
} elseif ($page == 'attributehistogram') {
|
|
if ($this->_isRest()) {
|
|
return $this->histogram($selected = null);
|
|
} else {
|
|
$this->render('statistics_histogram');
|
|
}
|
|
} elseif ($page == 'sightings') {
|
|
$result = $this->__statisticsSightings($this->params['named']);
|
|
} elseif ($page == 'galaxyMatrix') {
|
|
$result = $this->__statisticsGalaxyMatrix($this->params['named']);
|
|
}
|
|
if ($this->_isRest()) {
|
|
return $result;
|
|
}
|
|
}
|
|
|
|
private function __statisticsData($params = array())
|
|
{
|
|
// set all of the data up for the heatmaps
|
|
$params = array(
|
|
'fields' => array('name'),
|
|
'recursive' => -1,
|
|
'conditions' => array()
|
|
);
|
|
if (!$this->_isSiteAdmin() && !empty(Configure::read('Security.hide_organisation_index_from_users'))) {
|
|
$params['conditions'] = array('Organisation.id' => $this->Auth->user('org_id'));
|
|
}
|
|
$orgs = $this->User->Organisation->find('all', $params);
|
|
$local_orgs_params = $params;
|
|
$local_orgs_params['conditions']['Organisation.local'] = 1;
|
|
$local_orgs = $this->User->Organisation->find('all', $local_orgs_params);
|
|
$this->loadModel('Log');
|
|
$year = date('Y');
|
|
$month = date('n');
|
|
$month = $month - 5;
|
|
if ($month < 1) {
|
|
$year--;
|
|
$month = 12 + $month;
|
|
}
|
|
// Some additional statistics
|
|
$this_month = strtotime('first day of this month');
|
|
$stats['event_count'] = $this->User->Event->find('count', array('recursive' => -1));
|
|
$stats['event_count_month'] = $this->User->Event->find('count', array('conditions' => array('Event.timestamp >' => $this_month), 'recursive' => -1));
|
|
|
|
$stats['attribute_count'] = $this->User->Event->Attribute->find('count', array('conditions' => array('Attribute.deleted' => 0), 'recursive' => -1));
|
|
$stats['attribute_count_month'] = $this->User->Event->Attribute->find('count', array('conditions' => array('Attribute.timestamp >' => $this_month, 'Attribute.deleted' => 0), 'recursive' => -1));
|
|
$stats['attributes_per_event'] = round($stats['attribute_count'] / $stats['event_count']);
|
|
|
|
$this->loadModel('Correlation');
|
|
$this->Correlation->recursive = -1;
|
|
$stats['correlation_count'] = $this->Correlation->find('count', array('recursive' => -1));
|
|
$stats['correlation_count'] = $stats['correlation_count'] / 2;
|
|
|
|
$stats['proposal_count'] = $this->User->Event->ShadowAttribute->find('count', array('recursive' => -1));
|
|
|
|
$stats['user_count'] = $this->User->find('count', array('recursive' => -1));
|
|
$stats['user_count_pgp'] = $this->User->find('count', array('recursive' => -1, 'conditions' => array('User.gpgkey !=' => '')));
|
|
$stats['org_count'] = count($orgs);
|
|
$stats['local_org_count'] = count($local_orgs);
|
|
$stats['average_user_per_org'] = round($stats['user_count'] / $stats['local_org_count'], 1);
|
|
|
|
$this->loadModel('Thread');
|
|
$stats['thread_count'] = $this->Thread->find('count', array('conditions' => array('Thread.post_count >' => 0), 'recursive' => -1));
|
|
$stats['thread_count_month'] = $this->Thread->find('count', array('conditions' => array('Thread.date_created >' => date("Y-m-d H:i:s", $this_month), 'Thread.post_count >' => 0), 'recursive' => -1));
|
|
|
|
$stats['post_count'] = $this->Thread->Post->find('count', array('recursive' => -1));
|
|
$stats['post_count_month'] = $this->Thread->Post->find('count', array('conditions' => array('Post.date_created >' => date("Y-m-d H:i:s", $this_month)), 'recursive' => -1));
|
|
|
|
|
|
if ($this->_isRest()) {
|
|
$data = array(
|
|
'stats' => $stats
|
|
);
|
|
return $this->RestResponse->viewData($data, $this->response->type());
|
|
} else {
|
|
$this->set('stats', $stats);
|
|
$this->set('orgs', $orgs);
|
|
$this->set('start', strtotime(date('Y-m-d H:i:s') . ' -5 months'));
|
|
$this->set('end', strtotime(date('Y-m-d H:i:s')));
|
|
$this->set('startDateCal', $year . ', ' . $month . ', 01');
|
|
$range = '[5, 10, 50, 100]';
|
|
$this->set('range', $range);
|
|
$this->render('statistics_data');
|
|
}
|
|
}
|
|
|
|
private function __statisticsSightings($params = array())
|
|
{
|
|
$this->loadModel('Sighting');
|
|
$conditions = array('Sighting.org_id' => $this->Auth->user('org_id'));
|
|
if (isset($params['timestamp'])) {
|
|
$conditions['Sighting.date_sighting >'] = $params['timestamp'];
|
|
}
|
|
$sightings = $this->Sighting->find('all', array(
|
|
'conditions' => $conditions,
|
|
'fields' => array('Sighting.date_sighting', 'Sighting.type', 'Sighting.source', 'Sighting.event_id')
|
|
));
|
|
$data = array();
|
|
$toplist = array();
|
|
$eventids = array();
|
|
foreach ($sightings as $k => $v) {
|
|
if ($v['Sighting']['source'] == '') {
|
|
$v['Sighting']['source'] = 'Undefined';
|
|
}
|
|
$v['Sighting']['type'] = array('sighting', 'false-positive', 'expiration')[$v['Sighting']['type']];
|
|
if (isset($data[$v['Sighting']['source']][$v['Sighting']['type']])) {
|
|
$data[$v['Sighting']['source']][$v['Sighting']['type']]++;
|
|
} else {
|
|
$data[$v['Sighting']['source']][$v['Sighting']['type']] = 1;
|
|
}
|
|
if (!isset($toplist[$v['Sighting']['source']])) {
|
|
$toplist[$v['Sighting']['source']] = 1;
|
|
} else {
|
|
$toplist[$v['Sighting']['source']]++;
|
|
}
|
|
if (!isset($eventids[$v['Sighting']['source']][$v['Sighting']['type']])) {
|
|
$eventids[$v['Sighting']['source']][$v['Sighting']['type']] = array();
|
|
}
|
|
if (!in_array($v['Sighting']['event_id'], $eventids[$v['Sighting']['source']][$v['Sighting']['type']])) {
|
|
$eventids[$v['Sighting']['source']][$v['Sighting']['type']][] = $v['Sighting']['event_id'];
|
|
}
|
|
}
|
|
arsort($toplist);
|
|
if ($this->_isRest()) {
|
|
$data = array(
|
|
'toplist' => $toplist,
|
|
'eventids' => $eventids
|
|
);
|
|
return $this->RestResponse->viewData($data, $this->response->type());
|
|
} else {
|
|
$this->set('eventids', $eventids);
|
|
$this->set('toplist', $toplist);
|
|
$this->set('data', $data);
|
|
$this->render('statistics_sightings');
|
|
}
|
|
}
|
|
|
|
private function __statisticsOrgs($params = array())
|
|
{
|
|
$this->loadModel('Organisation');
|
|
$conditions = array();
|
|
if (!isset($params['scope']) || $params['scope'] == 'local') {
|
|
$params['scope'] = 'local';
|
|
$conditions['Organisation.local'] = 1;
|
|
} elseif ($params['scope'] == 'external') {
|
|
$conditions['Organisation.local'] = 0;
|
|
}
|
|
$orgs = array();
|
|
$orgs = $this->Organisation->find('all', array(
|
|
'recursive' => -1,
|
|
'conditions' => $conditions,
|
|
'fields' => array('id', 'name', 'description', 'local', 'contacts', 'type', 'sector', 'nationality'),
|
|
));
|
|
$orgs = Set::combine($orgs, '{n}.Organisation.id', '{n}.Organisation');
|
|
$users = $this->User->find('all', array(
|
|
'group' => 'User.org_id',
|
|
'conditions' => array('User.org_id' => array_keys($orgs)),
|
|
'recursive' => -1,
|
|
'fields' => array('org_id', 'count(*)')
|
|
));
|
|
foreach ($users as $user) {
|
|
$orgs[$user['User']['org_id']]['userCount'] = $user[0]['count(*)'];
|
|
}
|
|
unset($users);
|
|
$events = $this->User->Event->find('all', array(
|
|
'group' => 'Event.orgc_id',
|
|
'conditions' => array('Event.orgc_id' => array_keys($orgs)),
|
|
'recursive' => -1,
|
|
'fields' => array('Event.orgc_id', 'count(*)', 'sum(Event.attribute_count) as attributeCount')
|
|
));
|
|
foreach ($events as $event) {
|
|
$orgs[$event['Event']['orgc_id']]['eventCount'] = $event[0]['count(*)'];
|
|
$orgs[$event['Event']['orgc_id']]['attributeCount'] = $event[0]['attributeCount'];
|
|
$orgs[$event['Event']['orgc_id']]['orgActivity'] = $this->User->getOrgActivity($event['Event']['orgc_id'], array('event_timestamp' => '365d'));
|
|
}
|
|
unset($events);
|
|
$orgs = Set::combine($orgs, '{n}.name', '{n}');
|
|
// f*** php
|
|
uksort($orgs, 'strcasecmp');
|
|
foreach ($orgs as $k => $value) {
|
|
if (file_exists(APP . 'webroot' . DS . 'img' . DS . 'orgs' . DS . $k . '.png')) {
|
|
$orgs[$k]['logo'] = true;
|
|
}
|
|
}
|
|
if ($this->_isRest()) {
|
|
return $this->RestResponse->viewData($orgs, $this->response->type());
|
|
} else {
|
|
$this->set('scope', $params['scope']);
|
|
$this->set('orgs', $orgs);
|
|
$this->render('statistics_orgs');
|
|
}
|
|
}
|
|
|
|
private function __statisticsUsers($params = array())
|
|
{
|
|
$this->loadModel('Organisation');
|
|
$this->loadModel('User');
|
|
$this_month = strtotime(date('Y/m') . '/01');
|
|
$this_year = strtotime(date('Y') . '/01/01');
|
|
$ranges = array(
|
|
'total' => null,
|
|
'month' => $this_month,
|
|
'year' => $this_year
|
|
);
|
|
$scopes = array(
|
|
'user' => array(
|
|
'conditions' => array(),
|
|
'model' => 'User',
|
|
'date_created' => 'timestamp'
|
|
),
|
|
'org_local' => array(
|
|
'conditions' => array('Organisation.local' => 1),
|
|
'model' => 'Organisation',
|
|
'date_created' => 'datetime'
|
|
),
|
|
'org_external' => array(
|
|
'conditions' => array('Organisation.local' => 0),
|
|
'model' => 'Organisation',
|
|
'date_created' => 'datetime'
|
|
)
|
|
);
|
|
$statistics = array();
|
|
foreach ($scopes as $scope => $scope_data) {
|
|
foreach ($ranges as $range => $condition) {
|
|
$params = array(
|
|
'recursive' => -1
|
|
);
|
|
$filter = array();
|
|
if (!empty($condition)) {
|
|
if ($scope_data['date_created'] === 'datetime') {
|
|
$condition = date('Y-m-d H:i:s', $condition);
|
|
}
|
|
$filter = array($scope_data['model'] . '.date_created >=' => $condition);
|
|
}
|
|
$params['conditions'] = array_merge($scopes[$scope]['conditions'], $filter);
|
|
$statistics[$scope]['data'][$range] = $this->{$scope_data['model']}->find('count', $params);
|
|
}
|
|
}
|
|
if ($this->_isRest()) {
|
|
return $this->RestResponse->viewData($statistics, $this->response->type());
|
|
} else {
|
|
$this->set('statistics', $statistics);
|
|
$this->render('statistics_users');
|
|
}
|
|
}
|
|
|
|
public function tagStatisticsGraph()
|
|
{
|
|
$this->loadModel('EventTag');
|
|
$tags = $this->EventTag->getSortedTagList();
|
|
$this->loadModel('Taxonomy');
|
|
$taxonomies = $this->Taxonomy->find('list', array(
|
|
'conditions' => array('enabled' => true),
|
|
'fields' => array('Taxonomy.namespace')
|
|
));
|
|
$flatData = array();
|
|
$tagIds = $this->EventTag->Tag->find('list', array('fields' => array('Tag.name', 'Tag.id')));
|
|
$this->set('tagIds', $tagIds);
|
|
foreach ($tags as $key => $value) {
|
|
$name = explode(':', $value['name']);
|
|
$tags[$key]['taxonomy'] = 'custom';
|
|
if (count($name) > 1) {
|
|
if (in_array($name[0], $taxonomies)) {
|
|
$tags[$key]['taxonomy'] = $name[0];
|
|
}
|
|
}
|
|
$flatData[$tags[$key]['taxonomy']][$value['name']] = array('name' => $value['name'], 'size' => $value['eventCount']);
|
|
}
|
|
$treemap = array(
|
|
'name' => 'tags',
|
|
'children' => array()
|
|
);
|
|
|
|
foreach ($flatData as $key => $value) {
|
|
$newElement = array(
|
|
'name' => $key,
|
|
'children' => array()
|
|
);
|
|
foreach ($value as $tag) {
|
|
$newElement['children'][] = array('name' => $tag['name'], 'size' => $tag['size']);
|
|
}
|
|
$treemap['children'][] = $newElement;
|
|
}
|
|
$taxonomyColourCodes = array();
|
|
$taxonomies = array_merge(array('custom'), $taxonomies);
|
|
if ($this->_isRest()) {
|
|
$data = array(
|
|
'flatData' => $flatData,
|
|
'treemap' => $treemap
|
|
);
|
|
return $this->RestResponse->viewData($data, $this->response->type());
|
|
} else {
|
|
$this->set('taxonomyColourCodes', $taxonomyColourCodes);
|
|
$this->set('taxonomies', $taxonomies);
|
|
$this->set('flatData', $flatData);
|
|
$this->set('treemap', $treemap);
|
|
$this->set('tags', $tags);
|
|
$this->layout = 'treemap';
|
|
$this->render('ajax/tag_statistics_graph');
|
|
}
|
|
}
|
|
|
|
private function __statisticsTags($params = array())
|
|
{
|
|
$trending_tags = array();
|
|
$all_tags = array();
|
|
if ($this->_isRest()) {
|
|
return $this->tagStatisticsGraph();
|
|
} else {
|
|
$this->render('statistics_tags');
|
|
}
|
|
}
|
|
|
|
private function __statisticsGalaxyMatrix($params = array())
|
|
{
|
|
$this->loadModel('Event');
|
|
$this->loadModel('Galaxy');
|
|
$mitre_galaxy_id = $this->Galaxy->getMitreAttackGalaxyId();
|
|
if (isset($params['galaxy_id'])) {
|
|
$galaxy_id = $params['galaxy_id'];
|
|
} else {
|
|
$galaxy_id = $mitre_galaxy_id;
|
|
}
|
|
$organisations = $this->User->Organisation->find('all', array(
|
|
'recursive' => -1,
|
|
));
|
|
array_unshift($organisations, array('Organisation' => array('id' => 0, 'name' => 'All')));
|
|
$this->set('organisations', $organisations);
|
|
$picked_organisation = 0;
|
|
if (isset($params['organisation']) && $params['organisation'] != 0) {
|
|
$org = $this->User->Organisation->find('first', array(
|
|
'recursive' => -1,
|
|
'conditions' => array('id' => $params['organisation']),
|
|
));
|
|
if (!empty($org)) {
|
|
$picked_organisation = $org;
|
|
$this->set('picked_organisation', $picked_organisation);
|
|
} else {
|
|
$this->set('picked_organisation', array('Organisation' => array('id' => '')));
|
|
}
|
|
} else {
|
|
$this->set('picked_organisation', array('Organisation' => array('id' => '')));
|
|
}
|
|
|
|
$rest_response_empty = true;
|
|
$ignore_score = false;
|
|
if (
|
|
isset($params['dateFrom'])
|
|
|| isset($params['dateTo'])
|
|
|| isset($params['organisation']) && $params['organisation'] != 0
|
|
) { // use restSearch
|
|
$ignore_score = true;
|
|
$filters = array();
|
|
if (isset($params['dateFrom'])) {
|
|
$filters['from'] = $params['dateFrom'];
|
|
$this->set('dateFrom', $params['dateFrom']);
|
|
}
|
|
if (isset($params['dateTo'])) {
|
|
$filters['to'] = $params['dateTo'];
|
|
$this->set('dateTo', $params['dateTo']);
|
|
}
|
|
if (isset($params['organisation'])) {
|
|
$filters['org'] = $params['organisation'];
|
|
}
|
|
$elementCounter = 0;
|
|
$renderView = '';
|
|
$final = $this->Event->restSearch($this->Auth->user(), 'attack', $filters, false, false, $elementCounter, $renderView);
|
|
|
|
$final = json_decode($final, true);
|
|
if (!empty($final)) {
|
|
$rest_response_empty = false;
|
|
foreach ($final as $key => $data) {
|
|
$this->set($key, $data);
|
|
}
|
|
}
|
|
}
|
|
|
|
// No need for restSearch or result is empty
|
|
if ($rest_response_empty) {
|
|
$matrixData = $this->Galaxy->getMatrix($galaxy_id);
|
|
$tabs = $matrixData['tabs'];
|
|
$matrixTags = $matrixData['matrixTags'];
|
|
$killChainOrders = $matrixData['killChain'];
|
|
$instanceUUID = $matrixData['instance-uuid'];
|
|
if ($ignore_score) {
|
|
$scores_uniform = array('scores' => array(), 'maxScore' => 0);
|
|
} else {
|
|
$scores_uniform = $this->Event->EventTag->getTagScoresUniform(0, $matrixTags);
|
|
}
|
|
$scores = $scores_uniform['scores'];
|
|
$maxScore = $scores_uniform['maxScore'];
|
|
// FIXME: temporary fix: add the score of deprecated mitre galaxies to the new one (for the stats)
|
|
if ($matrixData['galaxy']['id'] == $mitre_galaxy_id) {
|
|
$mergedScore = array();
|
|
foreach ($scores as $tag => $v) {
|
|
$predicateValue = explode(':', $tag, 2)[1];
|
|
$predicateValue = explode('=', $predicateValue, 2);
|
|
$predicate = $predicateValue[0];
|
|
$clusterValue = $predicateValue[1];
|
|
$mappedTag = '';
|
|
$mappingWithoutExternalId = array();
|
|
if ($predicate == 'mitre-attack-pattern') {
|
|
$mappedTag = $tag;
|
|
$name = explode(" ", $tag);
|
|
$name = join(" ", array_slice($name, 0, -2)); // remove " - external_id"
|
|
$mappingWithoutExternalId[$name] = $tag;
|
|
} else {
|
|
$name = explode(" ", $clusterValue);
|
|
$name = join(" ", array_slice($name, 0, -2)); // remove " - external_id"
|
|
if (isset($mappingWithoutExternalId[$name])) {
|
|
$mappedTag = $mappingWithoutExternalId[$name];
|
|
} else {
|
|
$adjustedTagName = $this->Galaxy->GalaxyCluster->find('list', array(
|
|
'group' => array('GalaxyCluster.id', 'GalaxyCluster.tag_name'),
|
|
'conditions' => array('GalaxyCluster.tag_name LIKE' => 'misp-galaxy:mitre-attack-pattern=' . $name . '% T%'),
|
|
'fields' => array('GalaxyCluster.tag_name')
|
|
));
|
|
if (!empty($adjustedTagName)) {
|
|
$adjustedTagName = array_values($adjustedTagName)[0];
|
|
$mappingWithoutExternalId[$name] = $adjustedTagName;
|
|
$mappedTag = $mappingWithoutExternalId[$name];
|
|
}
|
|
}
|
|
}
|
|
if (isset($mergedScore[$mappedTag])) {
|
|
$mergedScore[$mappedTag] += $v;
|
|
} else {
|
|
$mergedScore[$mappedTag] = $v;
|
|
}
|
|
}
|
|
$scores = $mergedScore;
|
|
$maxScore = !empty($mergedScore) ? max(array_values($mergedScore)) : 0;
|
|
}
|
|
// end FIXME
|
|
|
|
$this->Galaxy->sortMatrixByScore($tabs, $scores);
|
|
if ($this->_isRest()) {
|
|
$json = array('matrix' => $tabs, 'scores' => $scores, 'instance-uuid' => $instanceUUID);
|
|
return $this->RestResponse->viewData($json, $this->response->type());
|
|
} else {
|
|
App::uses('ColourGradientTool', 'Tools');
|
|
$gradientTool = new ColourGradientTool();
|
|
$colours = $gradientTool->createGradientFromValues($scores);
|
|
|
|
$this->set('target_type', 'attribute');
|
|
$this->set('columnOrders', $killChainOrders);
|
|
$this->set('tabs', $tabs);
|
|
$this->set('scores', $scores);
|
|
$this->set('maxScore', $maxScore);
|
|
if (!empty($colours)) {
|
|
$this->set('colours', $colours['mapping']);
|
|
$this->set('interpolation', $colours['interpolation']);
|
|
}
|
|
$this->set('pickingMode', false);
|
|
if ($matrixData['galaxy']['id'] == $mitre_galaxy_id) {
|
|
$this->set('defaultTabName', "mitre-attack");
|
|
$this->set('removeTrailling', 2);
|
|
}
|
|
|
|
$this->set('galaxyName', $matrixData['galaxy']['name']);
|
|
$this->set('galaxyId', $matrixData['galaxy']['id']);
|
|
$matrixGalaxies = $this->Galaxy->getAllowedMatrixGalaxies();
|
|
$this->set('matrixGalaxies', $matrixGalaxies);
|
|
}
|
|
}
|
|
$this->render('statistics_galaxymatrix');
|
|
}
|
|
|
|
public function verifyGPG($full = false)
|
|
{
|
|
if (!self::_isSiteAdmin()) {
|
|
throw new NotFoundException();
|
|
}
|
|
$user_results = $this->User->verifyGPG($full);
|
|
$this->set('users', $user_results);
|
|
}
|
|
|
|
public function verifyCertificate()
|
|
{
|
|
$user_results = $this->User->verifyCertificate();
|
|
$this->set('users', $user_results);
|
|
}
|
|
|
|
// Refreshes the Auth session with new/updated data
|
|
protected function _refreshAuth()
|
|
{
|
|
$oldUser = $this->Auth->user();
|
|
$newUser = $this->User->find('first', array('conditions' => array('User.id' => $oldUser['id']), 'recursive' => -1,'contain' => array('Organisation', 'Role')));
|
|
// Rearrange it a bit to match the Auth object created during the login
|
|
$newUser['User']['Role'] = $newUser['Role'];
|
|
$newUser['User']['Organisation'] = $newUser['Organisation'];
|
|
unset($newUser['Organisation'], $newUser['Role']);
|
|
$this->Auth->login($newUser['User']);
|
|
}
|
|
|
|
public function searchGpgKey($email = false)
|
|
{
|
|
if (!$email) {
|
|
throw new NotFoundException('No email provided.');
|
|
}
|
|
$keys = $this->User->searchGpgKey($email);
|
|
if (empty($keys)) {
|
|
throw new NotFoundException('No keys found for given email at keyserver.');
|
|
}
|
|
$this->set('keys', $keys);
|
|
$this->autorender = false;
|
|
$this->layout = false;
|
|
$this->render('ajax/fetchpgpkey');
|
|
}
|
|
|
|
public function fetchGpgKey($fingerprint = null)
|
|
{
|
|
if (!$fingerprint) {
|
|
throw new NotFoundException('No fingerprint provided.');
|
|
}
|
|
$key = $this->User->fetchGpgKey($fingerprint);
|
|
if (!$key) {
|
|
throw new NotFoundException('No key with given fingerprint found.');
|
|
}
|
|
return new CakeResponse(array('body' => $key));
|
|
}
|
|
|
|
public function checkIfLoggedIn()
|
|
{
|
|
return new CakeResponse(array('body'=> 'OK','status' => 200));
|
|
}
|
|
|
|
public function admin_monitor($id)
|
|
{
|
|
$user = $this->User->find('first', array(
|
|
'recursive' => -1,
|
|
'conditions' => array('User.id' => $id),
|
|
'fields' => array('User.id')
|
|
));
|
|
if (empty($user)) {
|
|
throw new NotFoundException(__('Invalid user.'));
|
|
}
|
|
$redis = $this->User->setupRedis();
|
|
$alreadyMonitored = $redis->sismember('misp:monitored_users', $id);
|
|
if ($this->request->is('post')) {
|
|
if (isset($this->request->data['User'])) {
|
|
$this->request->data = $this->request->data['User'];
|
|
}
|
|
if (isset($this->request->data['value'])) {
|
|
$this->request->data = $this->request->data['value'];
|
|
}
|
|
if (empty($this->request->data)) {
|
|
$redis->srem('misp:monitored_users', $id);
|
|
} else {
|
|
$redis->sadd('misp:monitored_users', $id);
|
|
}
|
|
return $this->RestResponse->viewData($alreadyMonitored ? 0 : 1, $this->response->type());
|
|
} else {
|
|
if ($this->_isRest()) {
|
|
return $this->RestResponse->viewData($alreadyMonitored ? 0 : 1, $this->response->type());
|
|
} else {
|
|
$this->set('data', $alreadyMonitored);
|
|
$this->layout = false;
|
|
$this->render('/Elements/genericElements/toggleForm');
|
|
}
|
|
}
|
|
}
|
|
|
|
public function register()
|
|
{
|
|
if (empty(Configure::read('Security.allow_self_registration'))) {
|
|
throw new MethodNotAllowedException(__('Self registration is not enabled on this instance.'));
|
|
}
|
|
if ($this->request->is('post')) {
|
|
if (isset($this->request->data['User'])) {
|
|
$this->request->data = $this->request->data['User'];
|
|
}
|
|
$validKeys = array(
|
|
'email',
|
|
'org_name',
|
|
'org_uuid',
|
|
'message',
|
|
'custom_perms',
|
|
'perm_sync',
|
|
'perm_publish',
|
|
'perm_admin'
|
|
);
|
|
$requestObject = array();
|
|
foreach ($validKeys as $key) {
|
|
if (isset($this->request->data[$key])) {
|
|
$requestObject[$key] = trim($this->request->data[$key]);
|
|
}
|
|
}
|
|
if (empty($requestObject['email']) || empty($requestObject['org_name'])) {
|
|
throw new InvalidArgumentException(__('We require at least the email and org_name fields to be filled.'));
|
|
}
|
|
$this->loadModel('Inbox');
|
|
$this->Inbox->create();
|
|
$data = array(
|
|
'Inbox' => array(
|
|
'title' => __('User registration for %s.', $requestObject['email']),
|
|
'type' => 'registration',
|
|
'comment' => $requestObject['message'],
|
|
'data' => json_encode($requestObject)
|
|
)
|
|
);
|
|
$result = $this->Inbox->save($data);
|
|
if (empty($result)) {
|
|
$message = __('Request could not be created. Make sure that the email and org name fields are filled.');
|
|
if ($this->_isRest()) {
|
|
return $this->RestResponse->saveFailResponse('Users', 'register', false, $message, $this->response->type());
|
|
} else {
|
|
$this->Flash->error($message);
|
|
}
|
|
} else {
|
|
$message = __('Request sent. The administrators of this community have been notified.');
|
|
if ($this->_isRest()) {
|
|
return $this->RestResponse->saveSuccessResponse('User', 'register', false, $this->response->type(), $message);
|
|
} else {
|
|
$this->Flash->success($message);
|
|
$this->redirect('/');
|
|
}
|
|
}
|
|
} else {
|
|
$message = Configure::read('Security.self_registration_message');
|
|
if (empty($message)) {
|
|
$this->loadModel('Server');
|
|
$message = $this->Server->serverSettings['Security']['self_registration_message']['value'];
|
|
}
|
|
$this->set('message', $message);
|
|
}
|
|
}
|
|
|
|
public function registrations()
|
|
{
|
|
$this->loadModel('Inbox');
|
|
$params = array(
|
|
'recursive' => -1,
|
|
'conditions' => array(
|
|
'deleted' => 0,
|
|
'type' => 'registration'
|
|
),
|
|
'order' => array(
|
|
'timestamp desc'
|
|
)
|
|
);
|
|
$passedArgs = $this->passedArgs;
|
|
if (!empty($passedArgs['value'])) {
|
|
$lookup = strtolower($passedArgs['value']);
|
|
$allSearchFields = array('data', 'user_agent', 'ip');
|
|
foreach ($allSearchFields as $field) {
|
|
$params['conditions']['AND']['OR'][] = array('LOWER(Inbox.' . $field . ') LIKE' => '%' . $lookup . '%');
|
|
}
|
|
}
|
|
$this->set('passedArgs', json_encode($passedArgs));
|
|
if ($this->_isRest()) {
|
|
$data = $this->Inbox->find('all', array(
|
|
'recursive' => -1,
|
|
'conditions' => $params['conditions']
|
|
));
|
|
foreach ($data as $k => $v) {
|
|
$data[$k]['Inbox']['data'] = json_decode($data[$k]['Inbox']['data'], true);
|
|
}
|
|
return $this->RestResponse->viewData($data, $this->response->type());
|
|
} else {
|
|
$this->paginate = $params;
|
|
$data = $this->paginate('Inbox');
|
|
foreach ($data as $k => $message) {
|
|
$data[$k]['Inbox']['data'] = json_decode($data[$k]['Inbox']['data'], true);
|
|
$data[$k]['Inbox']['requested_role'] = __('default');
|
|
if (!empty($data[$k]['Inbox']['data']['custom_perms'])) {
|
|
$data[$k]['Inbox']['requested_role'] = array(
|
|
'perm_publish' => !empty($data[$k]['Inbox']['data']['perm_publish']) ? __('Yes') : __('No'),
|
|
'perm_sync' => !empty($data[$k]['Inbox']['data']['perm_sync']) ? __('Yes') : __('No'),
|
|
'perm_admin' => !empty($data[$k]['Inbox']['data']['perm_admin']) ? __('Yes') : __('No')
|
|
);
|
|
}
|
|
}
|
|
$this->set('data', $data);
|
|
}
|
|
}
|
|
|
|
public function discardRegistrations($id = false)
|
|
{
|
|
if (!$this->request->is('post') && !$this->request->is('delete')) {
|
|
$this->set('id', $id);
|
|
$this->set('type', 'discardRegistrations');
|
|
$this->render('ajax/discardRegistrations');
|
|
} else {
|
|
if (empty($id) && !empty($this->params['named']['id'])) {
|
|
$id = $this->params['named']['id'];
|
|
}
|
|
$this->loadModel('Inbox');
|
|
$registrations = $this->Inbox->find('all', array(
|
|
'recursive' => -1,
|
|
'conditions' => array(
|
|
'deleted' => 0,
|
|
'type' => 'registration',
|
|
'id' => $id
|
|
)
|
|
));
|
|
foreach ($registrations as $registration) {
|
|
$this->Inbox->delete($registration['Inbox']['id']);
|
|
}
|
|
$message = sprintf(
|
|
'%s registration(s) discarded.',
|
|
count($registrations)
|
|
);
|
|
if ($this->_isRest()) {
|
|
return $this->RestResponse->saveSuccessResponse('User', 'discardRegistrations', false, $this->response->type(), $message);
|
|
} else {
|
|
$this->Flash->success($message);
|
|
$this->redirect(array('controller' => 'users', 'action' => 'registrations'));
|
|
}
|
|
}
|
|
}
|
|
|
|
public function acceptRegistrations($id = false)
|
|
{
|
|
if (empty($id) && !empty($this->params['named']['id'])) {
|
|
$id = $this->params['named']['id'];
|
|
}
|
|
$this->loadModel('Inbox');
|
|
$registrations = $this->Inbox->find('all', array(
|
|
'recursive' => -1,
|
|
'conditions' => array(
|
|
'deleted' => 0,
|
|
'type' => 'registration',
|
|
'id' => $id
|
|
)
|
|
));
|
|
$suggestedOrg = null;
|
|
$suggestedRole = null;
|
|
$orgCache = array();
|
|
foreach ($registrations as $k => $v) {
|
|
$registrations[$k]['Inbox']['data'] = json_decode($registrations[$k]['Inbox']['data'], true);
|
|
$roleRequirements = array();
|
|
if ($this->request->is('get')) {
|
|
$suggestedOrg = $this->User->Organisation->checkDesiredOrg($suggestedOrg, $registrations[$k]);
|
|
$suggestedRole = $this->User->Role->checkDesiredRole($suggestedRole, $registrations[$k]);
|
|
}
|
|
}
|
|
if ($this->request->is('get')) {
|
|
if (!is_array($id)) {
|
|
$id = array($id);
|
|
}
|
|
foreach ($id as $k => $v) {
|
|
$id[$k] = 'id[]:' . intval($v);
|
|
}
|
|
$roles_raw = $this->User->Role->find('all', array(
|
|
'recursive' => -1
|
|
));
|
|
//roles = id => name
|
|
$roles = array();
|
|
$role_perms = array();
|
|
foreach ($roles_raw as $role) {
|
|
$roles[$role['Role']['id']] = $role['Role']['name'];
|
|
$role_perms[$role['Role']['id']] = array(
|
|
'perm_publish' => $role['Role']['perm_publish'],
|
|
'perm_sync' => $role['Role']['perm_sync'],
|
|
'perm_admin' => $role['Role']['perm_admin']
|
|
);
|
|
}
|
|
$default_role = $this->User->Role->find('first', array(
|
|
'recursive' => -1,
|
|
'conditions' => array('Role.default_role' => 1),
|
|
'fields' => array('Role.id')
|
|
));
|
|
if (!empty($default_role)) {
|
|
$this->request->data['User']['role_id'] = $default_role['Role']['id'];
|
|
}
|
|
$this->set('roles', $roles);
|
|
$this->set('role_perms', $role_perms);
|
|
$this->set('orgs', $this->User->Organisation->find('list', array(
|
|
'fields' => array('id', 'name'),
|
|
'recursive' => -1,
|
|
'conditions' => array('local' => 1)
|
|
)));
|
|
$this->set('registration', $registrations[$k]);
|
|
$this->set('suggestedOrg', $suggestedOrg);
|
|
$this->set('suggestedRole', $suggestedRole);
|
|
$id = implode('/', $id);
|
|
$this->set('id', $id);
|
|
$this->layout = false;
|
|
} else {
|
|
$results = array('successes' => 0, 'fails' => 0);
|
|
foreach ($registrations as $registration) {
|
|
$result = $this->User->registerUser(
|
|
$this->Auth->user(),
|
|
$registration['Inbox'],
|
|
$this->request->data['User']['org_id'],
|
|
$this->request->data['User']['role_id']
|
|
);
|
|
$results[($result ? 'successes' : 'fails')] += 1;
|
|
}
|
|
$message = array();
|
|
if (!empty($results['successes'])) {
|
|
$message[] = __('Added %s user(s).', $results['successes']);
|
|
}
|
|
if (!empty($results['fails'])) {
|
|
$message[] = __('Could not add %s user(s), reasons for the failure have been logged.', $results['fails']);
|
|
}
|
|
if (empty($message)) {
|
|
$message[] = __('No new users added - there was nothing to add.');
|
|
}
|
|
$message = implode(' ', $message);
|
|
if ($this->_isRest()) {
|
|
if (empty($results['fails']) && !empty($results['successes'])) {
|
|
return $this->RestResponse->saveSuccessResponse('User', 'acceptRegistrations', false, $this->response->type(), $message);
|
|
} else {
|
|
return $this->RestResponse->saveFailResponse('Users', 'acceptRegistrations', false, $message, $this->response->type());
|
|
}
|
|
} else {
|
|
if (empty($results['fails']) && !empty($results['successes'])) {
|
|
return new CakeResponse(array('body'=> json_encode(array('saved' => true, 'errors' => $message)), 'status'=>200, 'type' => 'json'));
|
|
} else {
|
|
return new CakeResponse(array('body'=> json_encode(array('saved' => false, 'success' => $message)), 'status'=>200, 'type' => 'json'));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|