diff options
author | Scott Ullrich <sullrich@pfsense.org> | 2008-04-17 23:24:12 +0000 |
---|---|---|
committer | Scott Ullrich <sullrich@pfsense.org> | 2008-04-17 23:24:12 +0000 |
commit | 7417b3066972831f7d9e6aa9c561064158c4cf5c (patch) | |
tree | 7609bb1e01a222c585f62dbfe36e324a9a08733c /packages/spamd_db_ext.php | |
parent | 8fa10e549a924194b1997a28449892e117b1c1f3 (diff) | |
download | pfsense-packages-7417b3066972831f7d9e6aa9c561064158c4cf5c.tar.gz pfsense-packages-7417b3066972831f7d9e6aa9c561064158c4cf5c.tar.bz2 pfsense-packages-7417b3066972831f7d9e6aa9c561064158c4cf5c.zip |
* General cleanups
* Update (C)
Diffstat (limited to 'packages/spamd_db_ext.php')
-rw-r--r-- | packages/spamd_db_ext.php | 40 |
1 files changed, 22 insertions, 18 deletions
diff --git a/packages/spamd_db_ext.php b/packages/spamd_db_ext.php index 087eb793..12bb17ea 100644 --- a/packages/spamd_db_ext.php +++ b/packages/spamd_db_ext.php @@ -2,7 +2,7 @@ /* $Id$ */ /* spamd_db_ext.php - Copyright (C) 2006 Scott Ullrich + Copyright (C) 2008 Scott Ullrich All rights reserved. Redistribution and use in source and binary forms, with or without @@ -27,7 +27,7 @@ POSSIBILITY OF SUCH DAMAGE. */ -require("config.inc"); +require("guiconfig.inc"); if($_GET['loginname']) $loginname = " Username: " . $_GET['loginname']; @@ -56,17 +56,17 @@ exec("echo {$_GET['action']} > /tmp/tmp"); /* handle AJAX operations */ if($_GET['action'] or $_POST['action']) { if($_GET['action']) - $action = trim($_GET['action']); + $action = escapeshellarg(trim($_GET['action'])); if($_POST['action']) - $action = trim($_POST['action']); + $action = escapeshellarg(trim($_POST['action'])); if($_GET['srcip']) - $srcip = trim($_GET['srcip']); + $srcip = escapeshellarg(trim($_GET['srcip'])); if($_POST['srcip']) - $srcip = trim($_POST['srcip']); + $srcip = escapeshellarg(trim($_POST['srcip'])); if($_POST['email']) - $email = trim($_POST['email']); + $email = escapeshellarg(trim($_POST['email'])); if($_GET['email']) - $email = trim($_GET['email']); + $email = escapeshellarg(trim($_GET['email'])); /* execute spamdb command */ if($action == "whitelist") { delete_from_spamd_db($srcip); @@ -113,16 +113,18 @@ if($_GET['action'] or $_POST['action']) { /* spam trap e-mail address */ if($_POST['spamtrapemail'] <> "") { - exec("/usr/local/sbin/spamdb -d {$_POST['spamtrapemail']}"); - exec("/usr/local/sbin/spamdb -d -T \"{$_POST['spamtrapemail']}\""); - exec("/usr/local/sbin/spamdb -d -t \"{$_POST['spamtrapemail']}\""); - mwexec("/usr/local/sbin/spamdb -T -a \"{$_POST['spamtrapemail']}\""); + $spamtrapemail = escapeshellarg($_POST['spamtrapemail']); + exec("/usr/local/sbin/spamdb -d {$spamtrapemail}"); + exec("/usr/local/sbin/spamdb -d -T \"{$spamtrapemail}\""); + exec("/usr/local/sbin/spamdb -d -t \"{$spamtrapemail}\""); + mwexec("/usr/local/sbin/spamdb -T -a \"{$spamtrapemail}\""); mwexec("killall -HUP spamlogd"); - $savemsg = $_POST['spamtrapemail'] . " added to spam trap database."; + $savemsg = htmlentities($_POST['spamtrapemail']) . " added to spam trap database."; } if($_GET['getstatus'] <> "") { - $status = exec("/usr/local/sbin/spamdb | grep \"{$_GET['getstatus']}\""); + $getstatus = escapeshellarg($_GET['getstatus']); + $status = exec("/usr/local/sbin/spamdb | grep \"{$getstatus}\""); if(stristr($status, "WHITE") == true) { echo "WHITE"; } else if(stristr($status, "TRAPPED") == true) { @@ -139,23 +141,25 @@ if($_GET['getstatus'] <> "") { /* spam trap e-mail address */ if($_GET['spamtrapemail'] <> "") { - $status = exec("spamdb -T -a \"{$_GET['spamtrapemail']}\""); + $spamtrapemail = escapeshellarg($_GET['spamtrapemail']); + $status = exec("spamdb -T -a \"{$spamtrapemail}\""); mwexec("killall -HUP spamlogd"); if($status) echo $status; else - echo $_POST['spamtrapemail'] . " added to spam trap database."; + echo htmlentities($_POST['spamtrapemail']) . " added to spam trap database."; exit; } /* spam trap e-mail address */ if($_GET['whitelist'] <> "") { - $status = exec("spamdb -a \"{$_GET['spamtrapemail']}\""); + $spamtrapemail = escapeshellarg($_GET['spamtrapemail']); + $status = exec("spamdb -a \"{$spamtrapemail}\""); mwexec("killall -HUP spamlogd"); if($status) echo $status; else - echo $_POST['spamtrapemail'] . " added to whitelist database."; + echo htmlentities($_POST['spamtrapemail']) . " added to whitelist database."; exit; } |