2012-09-07 15:08:50 +02:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <unistd.h>
|
2012-09-11 14:11:17 +02:00
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/stat.h>
|
2013-09-11 09:19:29 +02:00
|
|
|
#include <dirent.h>
|
2012-09-11 14:11:17 +02:00
|
|
|
#include <fcntl.h>
|
2015-03-16 11:10:52 +01:00
|
|
|
#include <ctype.h>
|
2012-09-07 15:08:50 +02:00
|
|
|
#include <piler.h>
|
|
|
|
|
2012-09-09 23:16:09 +02:00
|
|
|
#ifdef HAVE_ZIP
|
|
|
|
#include <zip.h>
|
|
|
|
#endif
|
2012-09-07 15:08:50 +02:00
|
|
|
|
2012-09-09 23:16:09 +02:00
|
|
|
|
|
|
|
void remove_xml(char *buf, int *html){
|
|
|
|
int i=0;
|
|
|
|
char *p;
|
|
|
|
|
|
|
|
p = buf;
|
|
|
|
|
|
|
|
for(; *p; p++){
|
|
|
|
if(*p == '<'){ *html = 1; }
|
|
|
|
|
|
|
|
if(*html == 0){
|
|
|
|
*(buf+i) = *p;
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(*p == '>'){
|
|
|
|
*html = 0;
|
|
|
|
|
|
|
|
if(i > 2 && *(buf+i-1) != ' '){
|
|
|
|
*(buf+i) = ' '; i++;
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
*(buf+i) = '\0';
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-09-11 14:11:17 +02:00
|
|
|
#ifdef HAVE_ZIP
|
2012-09-09 23:16:09 +02:00
|
|
|
int extract_opendocument(struct session_data *sdata, struct _state *state, char *filename, char *prefix){
|
|
|
|
int errorp, i=0, len=0, html=0;
|
2013-03-24 01:20:12 +01:00
|
|
|
int len2;
|
2012-09-09 23:16:09 +02:00
|
|
|
char buf[MAXBUFSIZE];
|
|
|
|
struct zip *z;
|
|
|
|
struct zip_stat sb;
|
|
|
|
struct zip_file *zf;
|
|
|
|
|
2015-01-26 21:34:03 +01:00
|
|
|
z = zip_open(filename, ZIP_CHECKCONS, &errorp);
|
|
|
|
if(!z){
|
2015-02-01 10:40:18 +01:00
|
|
|
syslog(LOG_INFO, "%s: error: corrupt zip file=%s, error code=%d", sdata->ttmpfile, filename, errorp);
|
2015-01-26 21:34:03 +01:00
|
|
|
return 1;
|
|
|
|
}
|
2012-09-09 23:16:09 +02:00
|
|
|
|
|
|
|
memset(buf, 0, sizeof(buf));
|
|
|
|
|
|
|
|
while(zip_stat_index(z, i, 0, &sb) == 0){
|
2014-04-27 10:59:59 +02:00
|
|
|
if(ZIP_EM_NONE == sb.encryption_method && strncmp(sb.name, prefix, strlen(prefix)) == 0 && (int)sb.size > 0){
|
2012-09-09 23:16:09 +02:00
|
|
|
|
|
|
|
zf = zip_fopen_index(z, i, 0);
|
|
|
|
if(zf){
|
2013-03-24 01:20:12 +01:00
|
|
|
while((len = zip_fread(zf, buf, sizeof(buf)-2)) > 0){
|
2012-09-09 23:16:09 +02:00
|
|
|
|
|
|
|
remove_xml(buf, &html);
|
2013-03-24 01:20:12 +01:00
|
|
|
len2 = strlen(buf);
|
2012-09-09 23:16:09 +02:00
|
|
|
|
2013-03-24 01:20:12 +01:00
|
|
|
if(len2 > 0 && state->bodylen < BIGBUFSIZE-len2-1){
|
|
|
|
memcpy(&(state->b_body[state->bodylen]), buf, len2);
|
|
|
|
state->bodylen += len2;
|
2012-09-09 23:16:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
memset(buf, 0, sizeof(buf));
|
|
|
|
}
|
|
|
|
zip_fclose(zf);
|
|
|
|
}
|
2012-09-11 14:11:17 +02:00
|
|
|
else syslog(LOG_PRIORITY, "%s: cannot extract '%s' from '%s'", sdata->ttmpfile, sb.name, filename);
|
2012-09-09 23:16:09 +02:00
|
|
|
|
|
|
|
if(state->bodylen > BIGBUFSIZE-1024) break;
|
|
|
|
}
|
|
|
|
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
zip_close(z);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-03-16 11:10:52 +01:00
|
|
|
int is_safe_filetype(char *s){
|
|
|
|
|
|
|
|
for(; *s; s++){
|
|
|
|
if(*s != 46 && !isalnum(*s)){
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-11-04 12:01:39 +01:00
|
|
|
int unzip_file(struct session_data *sdata, struct _state *state, char *filename, int *rec, struct __config *cfg){
|
2015-03-16 11:10:52 +01:00
|
|
|
int errorp, i=0, len=0, fd, safe_extension=0;
|
2012-09-11 14:11:17 +02:00
|
|
|
char *p, extracted_filename[SMALLBUFSIZE], buf[MAXBUFSIZE];
|
|
|
|
struct zip *z;
|
|
|
|
struct zip_stat sb;
|
|
|
|
struct zip_file *zf;
|
|
|
|
|
|
|
|
(*rec)++;
|
|
|
|
|
2015-01-26 21:34:03 +01:00
|
|
|
z = zip_open(filename, ZIP_CHECKCONS, &errorp);
|
|
|
|
if(!z){
|
2015-02-01 10:40:18 +01:00
|
|
|
syslog(LOG_INFO, "%s: error: corrupt zip file=%s, error code=%d", sdata->ttmpfile, filename, errorp);
|
2015-01-26 21:34:03 +01:00
|
|
|
return 1;
|
|
|
|
}
|
2012-09-11 14:11:17 +02:00
|
|
|
|
|
|
|
while(zip_stat_index(z, i, 0, &sb) == 0){
|
2012-12-04 12:01:33 +01:00
|
|
|
//printf("processing file inside the zip: %s, index: %d, size: %d\n", sb.name, sb.index, (int)sb.size);
|
|
|
|
|
2014-04-27 10:59:59 +02:00
|
|
|
if(ZIP_EM_NONE == sb.encryption_method) {
|
2012-09-11 14:11:17 +02:00
|
|
|
|
2014-04-27 10:59:59 +02:00
|
|
|
p = strrchr(sb.name, '.');
|
2015-03-16 11:10:52 +01:00
|
|
|
safe_extension = 0;
|
|
|
|
|
|
|
|
if(p) safe_extension = is_safe_filetype(p);
|
2012-09-11 14:11:17 +02:00
|
|
|
|
2015-03-16 11:10:52 +01:00
|
|
|
if(safe_extension == 0) syslog(LOG_INFO, "%s: invalid filename in zip: '%s'", sdata->ttmpfile, (char*)sb.name);
|
|
|
|
|
|
|
|
if((int)sb.size > 0 && safe_extension == 1 && strcmp(get_attachment_extractor_by_filename((char*)sb.name), "other")){
|
2012-09-11 14:11:17 +02:00
|
|
|
|
2014-04-27 10:59:59 +02:00
|
|
|
snprintf(extracted_filename, sizeof(extracted_filename)-1, "%s-%d-%d%s", sdata->ttmpfile, *rec, i, p);
|
|
|
|
|
2015-03-16 11:10:52 +01:00
|
|
|
if(cfg->verbosity >= _LOG_DEBUG) syslog(LOG_INFO, "%s: writing zip content to '%s'", sdata->ttmpfile, extracted_filename);
|
|
|
|
|
2014-04-27 10:59:59 +02:00
|
|
|
fd = open(extracted_filename, O_CREAT|O_RDWR, S_IRUSR|S_IWUSR|S_IRGRP|S_IROTH);
|
|
|
|
if(fd != -1){
|
|
|
|
zf = zip_fopen_index(z, i, 0);
|
|
|
|
if(zf){
|
|
|
|
while((len = zip_fread(zf, buf, sizeof(buf))) > 0){
|
|
|
|
write(fd, buf, len);
|
|
|
|
}
|
|
|
|
zip_fclose(zf);
|
2012-09-11 14:11:17 +02:00
|
|
|
}
|
2014-04-27 10:59:59 +02:00
|
|
|
else syslog(LOG_PRIORITY, "%s: cannot extract '%s' from '%s'", sdata->ttmpfile, sb.name, extracted_filename);
|
2012-09-11 14:11:17 +02:00
|
|
|
|
2014-04-27 10:59:59 +02:00
|
|
|
close(fd);
|
2012-09-11 14:11:17 +02:00
|
|
|
|
2014-11-04 12:01:39 +01:00
|
|
|
extract_attachment_content(sdata, state, extracted_filename, get_attachment_extractor_by_filename(extracted_filename), rec, cfg);
|
2012-09-11 14:11:17 +02:00
|
|
|
|
2014-04-27 10:59:59 +02:00
|
|
|
unlink(extracted_filename);
|
2012-09-11 14:11:17 +02:00
|
|
|
|
2014-04-27 10:59:59 +02:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
syslog(LOG_PRIORITY, "%s: cannot open '%s'", sdata->ttmpfile, extracted_filename);
|
|
|
|
}
|
2012-09-11 14:11:17 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
}
|
2014-04-27 10:59:59 +02:00
|
|
|
else {
|
|
|
|
syslog(LOG_PRIORITY, "ERR: attachment ('%s') is in encrypted zip file", sb.name);
|
|
|
|
}
|
2012-09-11 14:11:17 +02:00
|
|
|
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
zip_close(z);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2013-09-24 21:04:15 +02:00
|
|
|
|
|
|
|
#ifdef HAVE_TNEF
|
|
|
|
|
2014-11-04 12:01:39 +01:00
|
|
|
int extract_tnef(struct session_data *sdata, struct _state *state, char *filename, struct __config *cfg){
|
2013-09-24 21:04:15 +02:00
|
|
|
int rc=0, n, rec=1;
|
|
|
|
char tmpdir[BUFLEN], buf[SMALLBUFSIZE];
|
|
|
|
struct dirent **namelist;
|
|
|
|
|
|
|
|
memset(tmpdir, 0, sizeof(tmpdir));
|
|
|
|
make_random_string(&tmpdir[0], sizeof(tmpdir)-3);
|
|
|
|
|
|
|
|
memcpy(&tmpdir[sizeof(tmpdir)-3], ".d", 2);
|
|
|
|
|
|
|
|
if(mkdir(tmpdir, 0700)) return rc;
|
|
|
|
|
2013-12-16 22:20:23 +01:00
|
|
|
snprintf(buf, sizeof(buf)-1, "%s --unix-paths -C %s %s", HAVE_TNEF, tmpdir, filename);
|
2013-09-24 21:04:15 +02:00
|
|
|
|
|
|
|
system(buf);
|
|
|
|
|
|
|
|
n = scandir(tmpdir, &namelist, NULL, alphasort);
|
|
|
|
if(n < 0) syslog(LOG_INFO, "error reading %s", tmpdir);
|
|
|
|
else {
|
|
|
|
while(n--){
|
|
|
|
if(strcmp(namelist[n]->d_name, ".") && strcmp(namelist[n]->d_name, "..")){
|
|
|
|
snprintf(buf, sizeof(buf)-1, "%s/%s", tmpdir, namelist[n]->d_name);
|
|
|
|
|
2014-11-04 12:01:39 +01:00
|
|
|
extract_attachment_content(sdata, state, buf, get_attachment_extractor_by_filename(buf), &rec, cfg);
|
2013-09-24 21:04:15 +02:00
|
|
|
|
|
|
|
unlink(buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
free(namelist[n]);
|
|
|
|
}
|
|
|
|
free(namelist);
|
|
|
|
}
|
|
|
|
|
|
|
|
rmdir(tmpdir);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2014-11-04 12:01:39 +01:00
|
|
|
void read_content_with_popen(struct session_data *sdata, struct _state *state, char *cmd, struct __config *cfg){
|
2012-09-07 15:08:50 +02:00
|
|
|
int len;
|
|
|
|
char buf[MAXBUFSIZE];
|
|
|
|
FILE *f;
|
|
|
|
|
2014-11-04 12:01:39 +01:00
|
|
|
if(cfg->verbosity >= _LOG_DEBUG) syslog(LOG_INFO, "running command: '%s'", cmd);
|
|
|
|
|
2012-09-09 23:16:09 +02:00
|
|
|
f = popen(cmd, "r");
|
2012-09-07 15:08:50 +02:00
|
|
|
if(f){
|
|
|
|
while(fgets(buf, sizeof(buf)-1, f)){
|
|
|
|
len = strlen(buf);
|
|
|
|
|
|
|
|
if(state->bodylen < BIGBUFSIZE-len-1){
|
|
|
|
memcpy(&(state->b_body[state->bodylen]), buf, len);
|
|
|
|
state->bodylen += len;
|
|
|
|
}
|
|
|
|
else break;
|
|
|
|
}
|
|
|
|
|
|
|
|
fclose(f);
|
|
|
|
}
|
|
|
|
else syslog(LOG_PRIORITY, "%s: popen(): %s", sdata->ttmpfile, buf);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-11-04 12:01:39 +01:00
|
|
|
void extract_attachment_content(struct session_data *sdata, struct _state *state, char *filename, char *type, int *rec, struct __config *cfg){
|
|
|
|
char cmd[SMALLBUFSIZE], timeout[SMALLBUFSIZE];
|
2012-09-09 23:16:09 +02:00
|
|
|
|
|
|
|
if(strcmp(type, "other") == 0) return;
|
|
|
|
|
|
|
|
memset(cmd, 0, sizeof(cmd));
|
2014-11-04 12:01:39 +01:00
|
|
|
memset(timeout, 0, sizeof(timeout));
|
|
|
|
|
|
|
|
#ifdef TIMEOUT_BINARY
|
|
|
|
if(cfg->helper_timeout > 0) snprintf(timeout, sizeof(timeout)-1, "%s %d ", TIMEOUT_BINARY, cfg->helper_timeout);
|
|
|
|
#endif
|
2012-09-09 23:16:09 +02:00
|
|
|
|
|
|
|
#ifdef HAVE_PDFTOTEXT
|
2014-11-04 12:01:39 +01:00
|
|
|
if(strcmp(type, "pdf") == 0) snprintf(cmd, sizeof(cmd)-1, "%s%s -enc UTF-8 %s -", timeout, HAVE_PDFTOTEXT, filename);
|
2012-09-09 23:16:09 +02:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef HAVE_CATDOC
|
2014-11-04 12:01:39 +01:00
|
|
|
if(strcmp(type, "doc") == 0) snprintf(cmd, sizeof(cmd)-1, "%s%s -d utf-8 %s", timeout, HAVE_CATDOC, filename);
|
2012-09-09 23:16:09 +02:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef HAVE_CATPPT
|
2014-11-04 12:01:39 +01:00
|
|
|
if(strcmp(type, "ppt") == 0) snprintf(cmd, sizeof(cmd)-1, "%s%s -d utf-8 %s", timeout, HAVE_CATPPT, filename);
|
2012-09-09 23:16:09 +02:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef HAVE_XLS2CSV
|
2014-11-04 12:01:39 +01:00
|
|
|
if(strcmp(type, "xls") == 0) snprintf(cmd, sizeof(cmd)-1, "%s%s -d utf-8 %s", timeout, HAVE_XLS2CSV, filename);
|
2012-09-09 23:16:09 +02:00
|
|
|
#endif
|
|
|
|
|
2012-10-01 14:10:56 +02:00
|
|
|
#ifdef HAVE_PPTHTML
|
2014-11-04 12:01:39 +01:00
|
|
|
if(strcmp(type, "ppt") == 0) snprintf(cmd, sizeof(cmd)-1, "%s%s %s", timeout, HAVE_PPTHTML, filename);
|
2012-10-01 14:10:56 +02:00
|
|
|
#endif
|
|
|
|
|
2012-09-14 15:03:00 +02:00
|
|
|
#ifdef HAVE_UNRTF
|
2014-11-04 12:01:39 +01:00
|
|
|
if(strcmp(type, "rtf") == 0) snprintf(cmd, sizeof(cmd)-1, "%s%s --text %s", timeout, HAVE_UNRTF, filename);
|
2012-09-14 15:03:00 +02:00
|
|
|
#endif
|
|
|
|
|
2013-09-11 09:19:29 +02:00
|
|
|
#ifdef HAVE_TNEF
|
|
|
|
if(strcmp(type, "tnef") == 0){
|
2014-11-04 12:01:39 +01:00
|
|
|
extract_tnef(sdata, state, filename, cfg);
|
2013-09-11 09:19:29 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2012-09-09 23:16:09 +02:00
|
|
|
if(strlen(cmd) > 12){
|
2014-11-04 12:01:39 +01:00
|
|
|
read_content_with_popen(sdata, state, cmd, cfg);
|
2012-09-09 23:16:09 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#ifdef HAVE_ZIP
|
2013-09-11 09:19:29 +02:00
|
|
|
|
2012-09-09 23:16:09 +02:00
|
|
|
if(strcmp(type, "odf") == 0){
|
|
|
|
extract_opendocument(sdata, state, filename, "content.xml");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(strcmp(type, "docx") == 0){
|
|
|
|
extract_opendocument(sdata, state, filename, "word/document.xml");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(strcmp(type, "xlsx") == 0){
|
2012-09-26 15:26:59 +02:00
|
|
|
extract_opendocument(sdata, state, filename, "xl/sharedStrings.xml");
|
2012-09-09 23:16:09 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(strcmp(type, "pptx") == 0){
|
|
|
|
extract_opendocument(sdata, state, filename, "ppt/slides/slide");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-09-11 14:11:17 +02:00
|
|
|
if(strcmp(type, "zip") == 0){
|
|
|
|
if(*rec < MAX_ZIP_RECURSION_LEVEL){
|
2014-11-04 12:01:39 +01:00
|
|
|
unzip_file(sdata, state, filename, rec, cfg);
|
2012-09-11 14:11:17 +02:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
syslog(LOG_PRIORITY, "%s: multiple recursion level zip attachment, skipping %s", sdata->ttmpfile, filename);
|
|
|
|
}
|
2012-09-09 23:16:09 +02:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|