Fix epic fail in r64860
[lhc/web/wiklou.git] / includes / specials / SpecialUserlogin.php
index 5e8e3d8..bfc6c26 100644 (file)
@@ -34,17 +34,21 @@ class LoginForm {
        const ABORTED = 8;
        const CREATE_BLOCKED = 9;
        const THROTTLED = 10;
+       const USER_BLOCKED = 11;
+       const NEED_TOKEN = 12;
+       const WRONG_TOKEN = 13;
 
        var $mName, $mPassword, $mRetype, $mReturnTo, $mCookieCheck, $mPosted;
        var $mAction, $mCreateaccount, $mCreateaccountMail, $mMailmypassword;
        var $mLoginattempt, $mRemember, $mEmail, $mDomain, $mLanguage;
-       var $mSkipCookieCheck, $mReturnToQuery;
+       var $mSkipCookieCheck, $mReturnToQuery, $mToken;
 
        private $mExtUser = null;
 
        /**
         * Constructor
-        * @param WebRequest $request A WebRequest object passed by reference
+        * @param $request WebRequest: a WebRequest object passed by reference
+        * @param $par String: subpage parameter
         */
        function LoginForm( &$request, $par = '' ) {
                global $wgAuth, $wgHiddenPrefs, $wgEnableEmail, $wgRedirectOnLogin;
@@ -68,6 +72,7 @@ class LoginForm {
                $this->mRemember = $request->getCheck( 'wpRemember' );
                $this->mLanguage = $request->getText( 'uselang' );
                $this->mSkipCookieCheck = $request->getCheck( 'wpSkipCookieCheck' );
+               $this->mToken = $request->getVal( 'wpLoginToken' );
 
                if ( $wgRedirectOnLogin ) {
                        $this->mReturnTo = $wgRedirectOnLogin;
@@ -264,11 +269,6 @@ class LoginForm {
                # Now create a dummy user ($u) and check if it is valid
                $name = trim( $this->mName );
                $u = User::newFromName( $name, 'creatable' );
-               if ( WikiError::isError( $u ) ) {
-                       $this->mainLoginForm( wfMsg( $u->getMessage() ) );
-                       return false;
-               }
-
                if ( !is_object( $u ) ) {
                        $this->mainLoginForm( wfMsg( 'noname' ) );
                        return false;
@@ -398,6 +398,21 @@ class LoginForm {
                        return self::NO_NAME;
                }
                
+               // We require a login token to prevent login CSRF
+               // Handle part of this before incrementing the throttle so
+               // token-less login attempts don't count towards the throttle
+               // but wrong-token attempts do.
+               
+               // If the user doesn't have a login token yet, set one.
+               if ( !self::getLoginToken() ) {
+                       self::setLoginToken();
+                       return self::NEED_TOKEN;
+               }
+               // If the user didn't pass a login token, tell them we need one
+               if ( !$this->mToken ) {
+                       return self::NEED_TOKEN;
+               }
+               
                global $wgPasswordAttemptThrottle;
 
                $throttleCount = 0;
@@ -416,6 +431,11 @@ class LoginForm {
                                return self::THROTTLED;
                        }
                }
+               
+               // Validate the login token
+               if ( $this->mToken !== self::getLoginToken() ) {
+                       return self::WRONG_TOKEN;
+               }
 
                // Load $wgUser now, and check to see if we're logging in as the same
                // name. This is necessary because loading $wgUser (say by calling
@@ -433,7 +453,7 @@ class LoginForm {
                # TODO: Allow some magic here for invalid external names, e.g., let the
                # user choose a different wiki name.
                $u = User::newFromName( $this->mName );
-               if( is_null( $u ) || !User::isUsableName( $u->getName() ) ) {
+               if( !( $u instanceof User ) || !User::isUsableName( $u->getName() ) ) {
                        return self::ILLEGAL;
                }
 
@@ -464,6 +484,7 @@ class LoginForm {
                        return $abort;
                }
 
+               global $wgBlockDisablesLogin;
                if (!$u->checkPassword( $this->mPassword )) {
                        if( $u->checkTemporaryPassword( $this->mPassword ) ) {
                                // The e-mailed temporary password should not be used for actu-
@@ -494,6 +515,9 @@ class LoginForm {
                        } else {
                                $retval = ($this->mPassword  == '') ? self::EMPTY_PASS : self::WRONG_PASS;
                        }
+               } elseif ( $wgBlockDisablesLogin && $u->isBlocked() ) {
+                       // If we've enabled it, make it so that a blocked user cannot login
+                       $retval = self::USER_BLOCKED;
                } else {
                        $wgAuth->updateUser( $u );
                        $wgUser = $u;
@@ -574,6 +598,7 @@ class LoginForm {
                                        $wgUser->invalidateCache();
                                }
                                $wgUser->setCookies();
+                               self::clearLoginToken();
 
                                // Reset the throttle
                                $key = wfMemcKey( 'password-throttle', wfGetIP(), md5( $this->mName ) );
@@ -592,7 +617,11 @@ class LoginForm {
                                        return $this->cookieRedirectCheck( 'login' );
                                }
                                break;
-
+                       
+                       case self::NEED_TOKEN:
+                       case self::WRONG_TOKEN:
+                               $this->mainLoginForm( wfMsg( 'sessionfailure' ) );
+                               break;
                        case self::NO_NAME:
                        case self::ILLEGAL:
                                $this->mainLoginForm( wfMsg( 'noname' ) );
@@ -622,6 +651,10 @@ class LoginForm {
                        case self::THROTTLED:
                                $this->mainLoginForm( wfMsg( 'login-throttled' ) );
                                break;
+                       case self::USER_BLOCKED:
+                               $this->mainLoginForm( wfMsgExt( 'login-userblocked',
+                                       array( 'parsemag', 'escape' ), $this->mName ) );
+                               break;
                        default:
                                throw new MWException( "Unhandled case value" );
                }
@@ -675,7 +708,7 @@ class LoginForm {
                        return;
                }
                $u = User::newFromName( $this->mName );
-               if( is_null( $u ) ) {
+               if( !$u instanceof User ) {
                        $this->mainLoginForm( wfMsg( 'noname' ) );
                        return;
                }
@@ -704,11 +737,11 @@ class LoginForm {
 
 
        /**
-        * @param object user
-        * @param bool throttle
-        * @param string message name of email title
-        * @param string message name of email text
-        * @return mixed true on success, WikiError on failure
+        * @param $u User object
+        * @param $throttle Boolean
+        * @param $emailTitle String: message name of email title
+        * @param $emailText String: message name of email text
+        * @return Mixed: true on success, WikiError on failure
         * @private
         */
        function mailPasswordInternal( $u, $throttle = true, $emailTitle = 'passwordremindertitle', $emailText = 'passwordremindertext' ) {
@@ -932,6 +965,11 @@ class LoginForm {
                $template->set( 'canremember', ( $wgCookieExpiration > 0 ) );
                $template->set( 'remember', $wgUser->getOption( 'rememberpassword' ) or $this->mRemember  );
 
+               if ( !self::getLoginToken() ) {
+                       self::setLoginToken();
+               }
+               $template->set( 'token', self::getLoginToken() );
+
                # Prepare language selection links as needed
                if( $wgLoginLanguageSelector ) {
                        $template->set( 'languages', $this->makeLanguageSelector() );
@@ -986,6 +1024,32 @@ class LoginForm {
                global $wgDisableCookieCheck, $wgRequest;
                return $wgDisableCookieCheck ? true : $wgRequest->checkSessionCookie();
        }
+       
+       /**
+        * Get the login token from the current session
+        */
+       public static function getLoginToken() {
+               global $wgRequest;
+               return $wgRequest->getSessionData( 'wsLoginToken' );
+       }
+       
+       /**
+        * Generate a new login token and attach it to the current session
+        */
+       public static function setLoginToken() {
+               global $wgRequest;
+               // Use User::generateToken() instead of $user->editToken()
+               // because the latter reuses $_SESSION['wsEditToken']
+               $wgRequest->setSessionData( 'wsLoginToken', User::generateToken() );
+       }
+       
+       /**
+        * Remove any login token attached to the current session
+        */
+       public static  function clearLoginToken() {
+               global $wgRequest;
+               $wgRequest->setSessionData( 'wsLoginToken', null );
+       }
 
        /**
         * @private