github.com/insionng/yougam@v0.0.0-20170714101924-2bc18d833463/themes/wind/static/libs/tinymce/plugins/jbimages/ci/system/libraries/Upload.php (about) 1 <?php if ( ! defined('BASEPATH')) exit('No direct script access allowed'); 2 /** 3 * CodeIgniter 4 * 5 * An open source application development framework for PHP 5.1.6 or newer 6 * 7 * @package CodeIgniter 8 * @author ExpressionEngine Dev Team 9 * @copyright Copyright (c) 2008 - 2011, EllisLab, Inc. 10 * @license http://codeigniter.com/user_guide/license.html 11 * @link http://codeigniter.com 12 * @since Version 1.0 13 * @filesource 14 */ 15 16 // ------------------------------------------------------------------------ 17 18 /** 19 * File Uploading Class 20 * 21 * @package CodeIgniter 22 * @subpackage Libraries 23 * @category Uploads 24 * @author ExpressionEngine Dev Team 25 * @link http://codeigniter.com/user_guide/libraries/file_uploading.html 26 */ 27 class CI_Upload { 28 29 public $max_size = 0; 30 public $max_width = 0; 31 public $max_height = 0; 32 public $max_filename = 0; 33 public $allowed_types = ""; 34 public $file_temp = ""; 35 public $file_name = ""; 36 public $orig_name = ""; 37 public $file_type = ""; 38 public $file_size = ""; 39 public $file_ext = ""; 40 public $upload_path = ""; 41 public $overwrite = FALSE; 42 public $encrypt_name = FALSE; 43 public $is_image = FALSE; 44 public $image_width = ''; 45 public $image_height = ''; 46 public $image_type = ''; 47 public $image_size_str = ''; 48 public $error_msg = array(); 49 public $mimes = array(); 50 public $remove_spaces = TRUE; 51 public $xss_clean = FALSE; 52 public $temp_prefix = "temp_file_"; 53 public $client_name = ''; 54 55 protected $_file_name_override = ''; 56 57 /** 58 * Constructor 59 * 60 * @access public 61 */ 62 public function __construct($props = array()) 63 { 64 if (count($props) > 0) 65 { 66 $this->initialize($props); 67 } 68 69 log_message('debug', "Upload Class Initialized"); 70 } 71 72 // -------------------------------------------------------------------- 73 74 /** 75 * Initialize preferences 76 * 77 * @param array 78 * @return void 79 */ 80 public function initialize($config = array()) 81 { 82 $defaults = array( 83 'max_size' => 0, 84 'max_width' => 0, 85 'max_height' => 0, 86 'max_filename' => 0, 87 'allowed_types' => "", 88 'file_temp' => "", 89 'file_name' => "", 90 'orig_name' => "", 91 'file_type' => "", 92 'file_size' => "", 93 'file_ext' => "", 94 'upload_path' => "", 95 'overwrite' => FALSE, 96 'encrypt_name' => FALSE, 97 'is_image' => FALSE, 98 'image_width' => '', 99 'image_height' => '', 100 'image_type' => '', 101 'image_size_str' => '', 102 'error_msg' => array(), 103 'mimes' => array(), 104 'remove_spaces' => TRUE, 105 'xss_clean' => FALSE, 106 'temp_prefix' => "temp_file_", 107 'client_name' => '' 108 ); 109 110 111 foreach ($defaults as $key => $val) 112 { 113 if (isset($config[$key])) 114 { 115 $method = 'set_'.$key; 116 if (method_exists($this, $method)) 117 { 118 $this->$method($config[$key]); 119 } 120 else 121 { 122 $this->$key = $config[$key]; 123 } 124 } 125 else 126 { 127 $this->$key = $val; 128 } 129 } 130 131 // if a file_name was provided in the config, use it instead of the user input 132 // supplied file name for all uploads until initialized again 133 $this->_file_name_override = $this->file_name; 134 } 135 136 // -------------------------------------------------------------------- 137 138 /** 139 * Perform the file upload 140 * 141 * @return bool 142 */ 143 public function do_upload($field = 'userfile') 144 { 145 146 // Is $_FILES[$field] set? If not, no reason to continue. 147 if ( ! isset($_FILES[$field])) 148 { 149 $this->set_error('upload_no_file_selected'); 150 return FALSE; 151 } 152 153 // Is the upload path valid? 154 if ( ! $this->validate_upload_path()) 155 { 156 // errors will already be set by validate_upload_path() so just return FALSE 157 return FALSE; 158 } 159 160 // Was the file able to be uploaded? If not, determine the reason why. 161 if ( ! is_uploaded_file($_FILES[$field]['tmp_name'])) 162 { 163 $error = ( ! isset($_FILES[$field]['error'])) ? 4 : $_FILES[$field]['error']; 164 165 switch($error) 166 { 167 case 1: // UPLOAD_ERR_INI_SIZE 168 $this->set_error('upload_file_exceeds_limit'); 169 break; 170 case 2: // UPLOAD_ERR_FORM_SIZE 171 $this->set_error('upload_file_exceeds_form_limit'); 172 break; 173 case 3: // UPLOAD_ERR_PARTIAL 174 $this->set_error('upload_file_partial'); 175 break; 176 case 4: // UPLOAD_ERR_NO_FILE 177 $this->set_error('upload_no_file_selected'); 178 break; 179 case 6: // UPLOAD_ERR_NO_TMP_DIR 180 $this->set_error('upload_no_temp_directory'); 181 break; 182 case 7: // UPLOAD_ERR_CANT_WRITE 183 $this->set_error('upload_unable_to_write_file'); 184 break; 185 case 8: // UPLOAD_ERR_EXTENSION 186 $this->set_error('upload_stopped_by_extension'); 187 break; 188 default : $this->set_error('upload_no_file_selected'); 189 break; 190 } 191 192 return FALSE; 193 } 194 195 196 // Set the uploaded data as class variables 197 $this->file_temp = $_FILES[$field]['tmp_name']; 198 $this->file_size = $_FILES[$field]['size']; 199 $this->_file_mime_type($_FILES[$field]); 200 $this->file_type = preg_replace("/^(.+?);.*$/", "\\1", $this->file_type); 201 $this->file_type = strtolower(trim(stripslashes($this->file_type), '"')); 202 $this->file_name = $this->_prep_filename($_FILES[$field]['name']); 203 $this->file_ext = $this->get_extension($this->file_name); 204 $this->client_name = $this->file_name; 205 206 // Is the file type allowed to be uploaded? 207 if ( ! $this->is_allowed_filetype()) 208 { 209 $this->set_error('upload_invalid_filetype'); 210 return FALSE; 211 } 212 213 // if we're overriding, let's now make sure the new name and type is allowed 214 if ($this->_file_name_override != '') 215 { 216 $this->file_name = $this->_prep_filename($this->_file_name_override); 217 218 // If no extension was provided in the file_name config item, use the uploaded one 219 if (strpos($this->_file_name_override, '.') === FALSE) 220 { 221 $this->file_name .= $this->file_ext; 222 } 223 224 // An extension was provided, lets have it! 225 else 226 { 227 $this->file_ext = $this->get_extension($this->_file_name_override); 228 } 229 230 if ( ! $this->is_allowed_filetype(TRUE)) 231 { 232 $this->set_error('upload_invalid_filetype'); 233 return FALSE; 234 } 235 } 236 237 // Convert the file size to kilobytes 238 if ($this->file_size > 0) 239 { 240 $this->file_size = round($this->file_size/1024, 2); 241 } 242 243 // Is the file size within the allowed maximum? 244 if ( ! $this->is_allowed_filesize()) 245 { 246 $this->set_error('upload_invalid_filesize'); 247 return FALSE; 248 } 249 250 // Are the image dimensions within the allowed size? 251 // Note: This can fail if the server has an open_basdir restriction. 252 if ( ! $this->is_allowed_dimensions()) 253 { 254 $this->set_error('upload_invalid_dimensions'); 255 return FALSE; 256 } 257 258 // Sanitize the file name for security 259 $this->file_name = $this->clean_file_name($this->file_name); 260 261 // Truncate the file name if it's too long 262 if ($this->max_filename > 0) 263 { 264 $this->file_name = $this->limit_filename_length($this->file_name, $this->max_filename); 265 } 266 267 // Remove white spaces in the name 268 if ($this->remove_spaces == TRUE) 269 { 270 $this->file_name = preg_replace("/\s+/", "_", $this->file_name); 271 } 272 273 /* 274 * Validate the file name 275 * This function appends an number onto the end of 276 * the file if one with the same name already exists. 277 * If it returns false there was a problem. 278 */ 279 $this->orig_name = $this->file_name; 280 281 if ($this->overwrite == FALSE) 282 { 283 $this->file_name = $this->set_filename($this->upload_path, $this->file_name); 284 285 if ($this->file_name === FALSE) 286 { 287 return FALSE; 288 } 289 } 290 291 /* 292 * Run the file through the XSS hacking filter 293 * This helps prevent malicious code from being 294 * embedded within a file. Scripts can easily 295 * be disguised as images or other file types. 296 */ 297 if ($this->xss_clean) 298 { 299 if ($this->do_xss_clean() === FALSE) 300 { 301 $this->set_error('upload_unable_to_write_file'); 302 return FALSE; 303 } 304 } 305 306 /* 307 * Move the file to the final destination 308 * To deal with different server configurations 309 * we'll attempt to use copy() first. If that fails 310 * we'll use move_uploaded_file(). One of the two should 311 * reliably work in most environments 312 */ 313 if ( ! @copy($this->file_temp, $this->upload_path.$this->file_name)) 314 { 315 if ( ! @move_uploaded_file($this->file_temp, $this->upload_path.$this->file_name)) 316 { 317 $this->set_error('upload_destination_error'); 318 return FALSE; 319 } 320 } 321 322 /* 323 * Set the finalized image dimensions 324 * This sets the image width/height (assuming the 325 * file was an image). We use this information 326 * in the "data" function. 327 */ 328 $this->set_image_properties($this->upload_path.$this->file_name); 329 330 return TRUE; 331 } 332 333 // -------------------------------------------------------------------- 334 335 /** 336 * Finalized Data Array 337 * 338 * Returns an associative array containing all of the information 339 * related to the upload, allowing the developer easy access in one array. 340 * 341 * @return array 342 */ 343 public function data() 344 { 345 return array ( 346 'file_name' => $this->file_name, 347 'file_type' => $this->file_type, 348 'file_path' => $this->upload_path, 349 'full_path' => $this->upload_path.$this->file_name, 350 'raw_name' => str_replace($this->file_ext, '', $this->file_name), 351 'orig_name' => $this->orig_name, 352 'client_name' => $this->client_name, 353 'file_ext' => $this->file_ext, 354 'file_size' => $this->file_size, 355 'is_image' => $this->is_image(), 356 'image_width' => $this->image_width, 357 'image_height' => $this->image_height, 358 'image_type' => $this->image_type, 359 'image_size_str' => $this->image_size_str, 360 ); 361 } 362 363 // -------------------------------------------------------------------- 364 365 /** 366 * Set Upload Path 367 * 368 * @param string 369 * @return void 370 */ 371 public function set_upload_path($path) 372 { 373 // Make sure it has a trailing slash 374 $this->upload_path = rtrim($path, '/').'/'; 375 } 376 377 // -------------------------------------------------------------------- 378 379 /** 380 * Set the file name 381 * 382 * This function takes a filename/path as input and looks for the 383 * existence of a file with the same name. If found, it will append a 384 * number to the end of the filename to avoid overwriting a pre-existing file. 385 * 386 * @param string 387 * @param string 388 * @return string 389 */ 390 public function set_filename($path, $filename) 391 { 392 if ($this->encrypt_name == TRUE) 393 { 394 mt_srand(); 395 $filename = md5(uniqid(mt_rand())).$this->file_ext; 396 } 397 398 if ( ! file_exists($path.$filename)) 399 { 400 return $filename; 401 } 402 403 $filename = str_replace($this->file_ext, '', $filename); 404 405 $new_filename = ''; 406 for ($i = 1; $i < 100; $i++) 407 { 408 if ( ! file_exists($path.$filename.$i.$this->file_ext)) 409 { 410 $new_filename = $filename.$i.$this->file_ext; 411 break; 412 } 413 } 414 415 if ($new_filename == '') 416 { 417 $this->set_error('upload_bad_filename'); 418 return FALSE; 419 } 420 else 421 { 422 return $new_filename; 423 } 424 } 425 426 // -------------------------------------------------------------------- 427 428 /** 429 * Set Maximum File Size 430 * 431 * @param integer 432 * @return void 433 */ 434 public function set_max_filesize($n) 435 { 436 $this->max_size = ((int) $n < 0) ? 0: (int) $n; 437 } 438 439 // -------------------------------------------------------------------- 440 441 /** 442 * Set Maximum File Name Length 443 * 444 * @param integer 445 * @return void 446 */ 447 public function set_max_filename($n) 448 { 449 $this->max_filename = ((int) $n < 0) ? 0: (int) $n; 450 } 451 452 // -------------------------------------------------------------------- 453 454 /** 455 * Set Maximum Image Width 456 * 457 * @param integer 458 * @return void 459 */ 460 public function set_max_width($n) 461 { 462 $this->max_width = ((int) $n < 0) ? 0: (int) $n; 463 } 464 465 // -------------------------------------------------------------------- 466 467 /** 468 * Set Maximum Image Height 469 * 470 * @param integer 471 * @return void 472 */ 473 public function set_max_height($n) 474 { 475 $this->max_height = ((int) $n < 0) ? 0: (int) $n; 476 } 477 478 // -------------------------------------------------------------------- 479 480 /** 481 * Set Allowed File Types 482 * 483 * @param string 484 * @return void 485 */ 486 public function set_allowed_types($types) 487 { 488 if ( ! is_array($types) && $types == '*') 489 { 490 $this->allowed_types = '*'; 491 return; 492 } 493 $this->allowed_types = explode('|', $types); 494 } 495 496 // -------------------------------------------------------------------- 497 498 /** 499 * Set Image Properties 500 * 501 * Uses GD to determine the width/height/type of image 502 * 503 * @param string 504 * @return void 505 */ 506 public function set_image_properties($path = '') 507 { 508 if ( ! $this->is_image()) 509 { 510 return; 511 } 512 513 if (function_exists('getimagesize')) 514 { 515 if (FALSE !== ($D = @getimagesize($path))) 516 { 517 $types = array(1 => 'gif', 2 => 'jpeg', 3 => 'png'); 518 519 $this->image_width = $D['0']; 520 $this->image_height = $D['1']; 521 $this->image_type = ( ! isset($types[$D['2']])) ? 'unknown' : $types[$D['2']]; 522 $this->image_size_str = $D['3']; // string containing height and width 523 } 524 } 525 } 526 527 // -------------------------------------------------------------------- 528 529 /** 530 * Set XSS Clean 531 * 532 * Enables the XSS flag so that the file that was uploaded 533 * will be run through the XSS filter. 534 * 535 * @param bool 536 * @return void 537 */ 538 public function set_xss_clean($flag = FALSE) 539 { 540 $this->xss_clean = ($flag == TRUE) ? TRUE : FALSE; 541 } 542 543 // -------------------------------------------------------------------- 544 545 /** 546 * Validate the image 547 * 548 * @return bool 549 */ 550 public function is_image() 551 { 552 // IE will sometimes return odd mime-types during upload, so here we just standardize all 553 // jpegs or pngs to the same file type. 554 555 $png_mimes = array('image/x-png'); 556 $jpeg_mimes = array('image/jpg', 'image/jpe', 'image/jpeg', 'image/pjpeg'); 557 558 if (in_array($this->file_type, $png_mimes)) 559 { 560 $this->file_type = 'image/png'; 561 } 562 563 if (in_array($this->file_type, $jpeg_mimes)) 564 { 565 $this->file_type = 'image/jpeg'; 566 } 567 568 $img_mimes = array( 569 'image/gif', 570 'image/jpeg', 571 'image/png', 572 ); 573 574 return (in_array($this->file_type, $img_mimes, TRUE)) ? TRUE : FALSE; 575 } 576 577 // -------------------------------------------------------------------- 578 579 /** 580 * Verify that the filetype is allowed 581 * 582 * @return bool 583 */ 584 public function is_allowed_filetype($ignore_mime = FALSE) 585 { 586 if ($this->allowed_types == '*') 587 { 588 return TRUE; 589 } 590 591 if (count($this->allowed_types) == 0 OR ! is_array($this->allowed_types)) 592 { 593 $this->set_error('upload_no_file_types'); 594 return FALSE; 595 } 596 597 $ext = strtolower(ltrim($this->file_ext, '.')); 598 599 if ( ! in_array($ext, $this->allowed_types)) 600 { 601 return FALSE; 602 } 603 604 // Images get some additional checks 605 $image_types = array('gif', 'jpg', 'jpeg', 'png', 'jpe'); 606 607 if (in_array($ext, $image_types)) 608 { 609 if (getimagesize($this->file_temp) === FALSE) 610 { 611 return FALSE; 612 } 613 } 614 615 if ($ignore_mime === TRUE) 616 { 617 return TRUE; 618 } 619 620 $mime = $this->mimes_types($ext); 621 622 if (is_array($mime)) 623 { 624 if (in_array($this->file_type, $mime, TRUE)) 625 { 626 return TRUE; 627 } 628 } 629 elseif ($mime == $this->file_type) 630 { 631 return TRUE; 632 } 633 634 return FALSE; 635 } 636 637 // -------------------------------------------------------------------- 638 639 /** 640 * Verify that the file is within the allowed size 641 * 642 * @return bool 643 */ 644 public function is_allowed_filesize() 645 { 646 if ($this->max_size != 0 AND $this->file_size > $this->max_size) 647 { 648 return FALSE; 649 } 650 else 651 { 652 return TRUE; 653 } 654 } 655 656 // -------------------------------------------------------------------- 657 658 /** 659 * Verify that the image is within the allowed width/height 660 * 661 * @return bool 662 */ 663 public function is_allowed_dimensions() 664 { 665 if ( ! $this->is_image()) 666 { 667 return TRUE; 668 } 669 670 if (function_exists('getimagesize')) 671 { 672 $D = @getimagesize($this->file_temp); 673 674 if ($this->max_width > 0 AND $D['0'] > $this->max_width) 675 { 676 return FALSE; 677 } 678 679 if ($this->max_height > 0 AND $D['1'] > $this->max_height) 680 { 681 return FALSE; 682 } 683 684 return TRUE; 685 } 686 687 return TRUE; 688 } 689 690 // -------------------------------------------------------------------- 691 692 /** 693 * Validate Upload Path 694 * 695 * Verifies that it is a valid upload path with proper permissions. 696 * 697 * 698 * @return bool 699 */ 700 public function validate_upload_path() 701 { 702 if ($this->upload_path == '') 703 { 704 $this->set_error('upload_no_filepath'); 705 return FALSE; 706 } 707 708 if (function_exists('realpath') AND @realpath($this->upload_path) !== FALSE) 709 { 710 $this->upload_path = str_replace("\\", "/", realpath($this->upload_path)); 711 } 712 713 if ( ! @is_dir($this->upload_path)) 714 { 715 $this->set_error('upload_no_filepath'); 716 return FALSE; 717 } 718 719 if ( ! is_really_writable($this->upload_path)) 720 { 721 $this->set_error('upload_not_writable'); 722 return FALSE; 723 } 724 725 $this->upload_path = preg_replace("/(.+?)\/*$/", "\\1/", $this->upload_path); 726 return TRUE; 727 } 728 729 // -------------------------------------------------------------------- 730 731 /** 732 * Extract the file extension 733 * 734 * @param string 735 * @return string 736 */ 737 public function get_extension($filename) 738 { 739 $x = explode('.', $filename); 740 return '.'.end($x); 741 } 742 743 // -------------------------------------------------------------------- 744 745 /** 746 * Clean the file name for security 747 * 748 * @param string 749 * @return string 750 */ 751 public function clean_file_name($filename) 752 { 753 $bad = array( 754 "<!--", 755 "-->", 756 "'", 757 "<", 758 ">", 759 '"', 760 '&', 761 '$', 762 '=', 763 ';', 764 '?', 765 '/', 766 "%20", 767 "%22", 768 "%3c", // < 769 "%253c", // < 770 "%3e", // > 771 "%0e", // > 772 "%28", // ( 773 "%29", // ) 774 "%2528", // ( 775 "%26", // & 776 "%24", // $ 777 "%3f", // ? 778 "%3b", // ; 779 "%3d" // = 780 ); 781 782 $filename = str_replace($bad, '', $filename); 783 784 return stripslashes($filename); 785 } 786 787 // -------------------------------------------------------------------- 788 789 /** 790 * Limit the File Name Length 791 * 792 * @param string 793 * @return string 794 */ 795 public function limit_filename_length($filename, $length) 796 { 797 if (strlen($filename) < $length) 798 { 799 return $filename; 800 } 801 802 $ext = ''; 803 if (strpos($filename, '.') !== FALSE) 804 { 805 $parts = explode('.', $filename); 806 $ext = '.'.array_pop($parts); 807 $filename = implode('.', $parts); 808 } 809 810 return substr($filename, 0, ($length - strlen($ext))).$ext; 811 } 812 813 // -------------------------------------------------------------------- 814 815 /** 816 * Runs the file through the XSS clean function 817 * 818 * This prevents people from embedding malicious code in their files. 819 * I'm not sure that it won't negatively affect certain files in unexpected ways, 820 * but so far I haven't found that it causes trouble. 821 * 822 * @return void 823 */ 824 public function do_xss_clean() 825 { 826 $file = $this->file_temp; 827 828 if (filesize($file) == 0) 829 { 830 return FALSE; 831 } 832 833 if (function_exists('memory_get_usage') && memory_get_usage() && ini_get('memory_limit') != '') 834 { 835 $current = ini_get('memory_limit') * 1024 * 1024; 836 837 // There was a bug/behavioural change in PHP 5.2, where numbers over one million get output 838 // into scientific notation. number_format() ensures this number is an integer 839 // http://bugs.php.net/bug.php?id=43053 840 841 $new_memory = number_format(ceil(filesize($file) + $current), 0, '.', ''); 842 843 ini_set('memory_limit', $new_memory); // When an integer is used, the value is measured in bytes. - PHP.net 844 } 845 846 // If the file being uploaded is an image, then we should have no problem with XSS attacks (in theory), but 847 // IE can be fooled into mime-type detecting a malformed image as an html file, thus executing an XSS attack on anyone 848 // using IE who looks at the image. It does this by inspecting the first 255 bytes of an image. To get around this 849 // CI will itself look at the first 255 bytes of an image to determine its relative safety. This can save a lot of 850 // processor power and time if it is actually a clean image, as it will be in nearly all instances _except_ an 851 // attempted XSS attack. 852 853 if (function_exists('getimagesize') && @getimagesize($file) !== FALSE) 854 { 855 if (($file = @fopen($file, 'rb')) === FALSE) // "b" to force binary 856 { 857 return FALSE; // Couldn't open the file, return FALSE 858 } 859 860 $opening_bytes = fread($file, 256); 861 fclose($file); 862 863 // These are known to throw IE into mime-type detection chaos 864 // <a, <body, <head, <html, <img, <plaintext, <pre, <script, <table, <title 865 // title is basically just in SVG, but we filter it anyhow 866 867 if ( ! preg_match('/<(a|body|head|html|img|plaintext|pre|script|table|title)[\s>]/i', $opening_bytes)) 868 { 869 return TRUE; // its an image, no "triggers" detected in the first 256 bytes, we're good 870 } 871 else 872 { 873 return FALSE; 874 } 875 } 876 877 if (($data = @file_get_contents($file)) === FALSE) 878 { 879 return FALSE; 880 } 881 882 $CI =& get_instance(); 883 return $CI->security->xss_clean($data, TRUE); 884 } 885 886 // -------------------------------------------------------------------- 887 888 /** 889 * Set an error message 890 * 891 * @param string 892 * @return void 893 */ 894 public function set_error($msg) 895 { 896 $CI =& get_instance(); 897 $CI->lang->load('upload'); 898 899 if (is_array($msg)) 900 { 901 foreach ($msg as $val) 902 { 903 $msg = ($CI->lang->line($val) == FALSE) ? $val : $CI->lang->line($val); 904 $this->error_msg[] = $msg; 905 log_message('error', $msg); 906 } 907 } 908 else 909 { 910 $msg = ($CI->lang->line($msg) == FALSE) ? $msg : $CI->lang->line($msg); 911 $this->error_msg[] = $msg; 912 log_message('error', $msg); 913 } 914 } 915 916 // -------------------------------------------------------------------- 917 918 /** 919 * Display the error message 920 * 921 * @param string 922 * @param string 923 * @return string 924 */ 925 public function display_errors($open = '<p>', $close = '</p>') 926 { 927 $str = ''; 928 foreach ($this->error_msg as $val) 929 { 930 $str .= $open.$val.$close; 931 } 932 933 return $str; 934 } 935 936 // -------------------------------------------------------------------- 937 938 /** 939 * List of Mime Types 940 * 941 * This is a list of mime types. We use it to validate 942 * the "allowed types" set by the developer 943 * 944 * @param string 945 * @return string 946 */ 947 public function mimes_types($mime) 948 { 949 global $mimes; 950 951 if (count($this->mimes) == 0) 952 { 953 if (defined('ENVIRONMENT') AND is_file(APPPATH.'config/'.ENVIRONMENT.'/mimes.php')) 954 { 955 include(APPPATH.'config/'.ENVIRONMENT.'/mimes.php'); 956 } 957 elseif (is_file(APPPATH.'config/mimes.php')) 958 { 959 include(APPPATH.'config//mimes.php'); 960 } 961 else 962 { 963 return FALSE; 964 } 965 966 $this->mimes = $mimes; 967 unset($mimes); 968 } 969 970 return ( ! isset($this->mimes[$mime])) ? FALSE : $this->mimes[$mime]; 971 } 972 973 // -------------------------------------------------------------------- 974 975 /** 976 * Prep Filename 977 * 978 * Prevents possible script execution from Apache's handling of files multiple extensions 979 * http://httpd.apache.org/docs/1.3/mod/mod_mime.html#multipleext 980 * 981 * @param string 982 * @return string 983 */ 984 protected function _prep_filename($filename) 985 { 986 if (strpos($filename, '.') === FALSE OR $this->allowed_types == '*') 987 { 988 return $filename; 989 } 990 991 $parts = explode('.', $filename); 992 $ext = array_pop($parts); 993 $filename = array_shift($parts); 994 995 foreach ($parts as $part) 996 { 997 if ( ! in_array(strtolower($part), $this->allowed_types) OR $this->mimes_types(strtolower($part)) === FALSE) 998 { 999 $filename .= '.'.$part.'_'; 1000 } 1001 else 1002 { 1003 $filename .= '.'.$part; 1004 } 1005 } 1006 1007 $filename .= '.'.$ext; 1008 1009 return $filename; 1010 } 1011 1012 // -------------------------------------------------------------------- 1013 1014 /** 1015 * File MIME type 1016 * 1017 * Detects the (actual) MIME type of the uploaded file, if possible. 1018 * The input array is expected to be $_FILES[$field] 1019 * 1020 * @param array 1021 * @return void 1022 */ 1023 protected function _file_mime_type($file) 1024 { 1025 // We'll need this to validate the MIME info string (e.g. text/plain; charset=us-ascii) 1026 $regexp = '/^([a-z\-]+\/[a-z0-9\-\.\+]+)(;\s.+)?$/'; 1027 1028 /* Fileinfo extension - most reliable method 1029 * 1030 * Unfortunately, prior to PHP 5.3 - it's only available as a PECL extension and the 1031 * more convenient FILEINFO_MIME_TYPE flag doesn't exist. 1032 */ 1033 if (function_exists('finfo_file')) 1034 { 1035 $finfo = finfo_open(FILEINFO_MIME); 1036 if (is_resource($finfo)) // It is possible that a FALSE value is returned, if there is no magic MIME database file found on the system 1037 { 1038 $mime = @finfo_file($finfo, $file['tmp_name']); 1039 finfo_close($finfo); 1040 1041 /* According to the comments section of the PHP manual page, 1042 * it is possible that this function returns an empty string 1043 * for some files (e.g. if they don't exist in the magic MIME database) 1044 */ 1045 if (is_string($mime) && preg_match($regexp, $mime, $matches)) 1046 { 1047 $this->file_type = $matches[1]; 1048 return; 1049 } 1050 } 1051 } 1052 1053 /* This is an ugly hack, but UNIX-type systems provide a "native" way to detect the file type, 1054 * which is still more secure than depending on the value of $_FILES[$field]['type'], and as it 1055 * was reported in issue #750 (https://github.com/EllisLab/CodeIgniter/issues/750) - it's better 1056 * than mime_content_type() as well, hence the attempts to try calling the command line with 1057 * three different functions. 1058 * 1059 * Notes: 1060 * - the DIRECTORY_SEPARATOR comparison ensures that we're not on a Windows system 1061 * - many system admins would disable the exec(), shell_exec(), popen() and similar functions 1062 * due to security concerns, hence the function_exists() checks 1063 */ 1064 if (DIRECTORY_SEPARATOR !== '\\') 1065 { 1066 $cmd = 'file --brief --mime ' . escapeshellarg($file['tmp_name']) . ' 2>&1'; 1067 1068 if (function_exists('exec')) 1069 { 1070 /* This might look confusing, as $mime is being populated with all of the output when set in the second parameter. 1071 * However, we only neeed the last line, which is the actual return value of exec(), and as such - it overwrites 1072 * anything that could already be set for $mime previously. This effectively makes the second parameter a dummy 1073 * value, which is only put to allow us to get the return status code. 1074 */ 1075 $mime = @exec($cmd, $mime, $return_status); 1076 if ($return_status === 0 && is_string($mime) && preg_match($regexp, $mime, $matches)) 1077 { 1078 $this->file_type = $matches[1]; 1079 return; 1080 } 1081 } 1082 1083 if ( (bool) @ini_get('safe_mode') === FALSE && function_exists('shell_exec')) 1084 { 1085 $mime = @shell_exec($cmd); 1086 if (strlen($mime) > 0) 1087 { 1088 $mime = explode("\n", trim($mime)); 1089 if (preg_match($regexp, $mime[(count($mime) - 1)], $matches)) 1090 { 1091 $this->file_type = $matches[1]; 1092 return; 1093 } 1094 } 1095 } 1096 1097 if (function_exists('popen')) 1098 { 1099 $proc = @popen($cmd, 'r'); 1100 if (is_resource($proc)) 1101 { 1102 $mime = @fread($proc, 512); 1103 @pclose($proc); 1104 if ($mime !== FALSE) 1105 { 1106 $mime = explode("\n", trim($mime)); 1107 if (preg_match($regexp, $mime[(count($mime) - 1)], $matches)) 1108 { 1109 $this->file_type = $matches[1]; 1110 return; 1111 } 1112 } 1113 } 1114 } 1115 } 1116 1117 // Fall back to the deprecated mime_content_type(), if available (still better than $_FILES[$field]['type']) 1118 if (function_exists('mime_content_type')) 1119 { 1120 $this->file_type = @mime_content_type($file['tmp_name']); 1121 if (strlen($this->file_type) > 0) // It's possible that mime_content_type() returns FALSE or an empty string 1122 { 1123 return; 1124 } 1125 } 1126 1127 $this->file_type = $file['type']; 1128 } 1129 1130 // -------------------------------------------------------------------- 1131 1132 } 1133 // END Upload Class 1134 1135 /* End of file Upload.php */ 1136 /* Location: ./system/libraries/Upload.php */