summaryrefslogtreecommitdiff
path: root/modules
diff options
context:
space:
mode:
authorBharat Mediratta <bharat@menalto.com>2013-01-29 10:29:25 -0800
committerBharat Mediratta <bharat@menalto.com>2013-01-29 10:29:25 -0800
commited7e2d5089e3373f35fe37e0c58412a98949ae54 (patch)
tree33bae3bfa01a32e06c0ef4352e6bd9fcea1b7147 /modules
parent899590873bbc444a35654573473f3c7326a95f87 (diff)
parent4cf31d8850c7df4d53a2bc56e6832bbe11388d13 (diff)
Merge pull request #108 from shadlaws/fix_1970
#1970 - Make add watermarks more secure and add unit tests.
Diffstat (limited to 'modules')
-rw-r--r--modules/watermark/controllers/admin_watermarks.php7
-rw-r--r--modules/watermark/tests/Admin_Watermarks_Controller_Test.php124
2 files changed, 129 insertions, 2 deletions
diff --git a/modules/watermark/controllers/admin_watermarks.php b/modules/watermark/controllers/admin_watermarks.php
index 14c2b394..1cc0c392 100644
--- a/modules/watermark/controllers/admin_watermarks.php
+++ b/modules/watermark/controllers/admin_watermarks.php
@@ -93,7 +93,9 @@ class Admin_Watermarks_Controller extends Admin_Controller {
access::verify_csrf();
$form = watermark::get_add_form();
- if ($form->validate()) {
+ // For TEST_MODE, we want to simulate a file upload. Because this is not a true upload, Forge's
+ // validation logic will correctly reject it. So, we skip validation when we're running tests.
+ if (TEST_MODE || $form->validate()) {
$file = $_POST["file"];
$pathinfo = pathinfo($file);
// Forge prefixes files with "uploadfile-xxxxxxx" for uniqueness
@@ -101,7 +103,8 @@ class Admin_Watermarks_Controller extends Admin_Controller {
$name = legal_file::smash_extensions($name);
list ($width, $height, $mime_type, $extension) = photo::get_file_metadata($file);
- if (!legal_file::get_photo_extensions($extension)) {
+ if (!$width || !$height || !$mime_type || !$extension ||
+ !in_array($extension, legal_file::get_photo_extensions())) {
message::error(t("Invalid or unidentifiable image file"));
@unlink($file);
return;
diff --git a/modules/watermark/tests/Admin_Watermarks_Controller_Test.php b/modules/watermark/tests/Admin_Watermarks_Controller_Test.php
new file mode 100644
index 00000000..0b4ba84b
--- /dev/null
+++ b/modules/watermark/tests/Admin_Watermarks_Controller_Test.php
@@ -0,0 +1,124 @@
+<?php defined("SYSPATH") or die("No direct script access.");
+/**
+ * Gallery - a web based photo album viewer and editor
+ * Copyright (C) 2000-2013 Bharat Mediratta
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or (at
+ * your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA.
+ */
+class Admin_Watermarks_Controller_Test extends Gallery_Unit_Test_Case {
+ public function setup() {
+ $this->_save = array($_POST, $_SERVER);
+ $_SERVER["HTTP_REFERER"] = "HTTP_REFERER";
+ }
+
+ public function teardown() {
+ list($_POST, $_SERVER) = $this->_save;
+ }
+
+ public function add_watermark_test() {
+ // Source is a jpg file, watermark path has extension jpg
+ $name = test::random_name();
+ $source_path = MODPATH . "gallery/images/imagemagick.jpg";
+ $watermark_path = TMPPATH . "uploadfile-123-{$name}.jpg";
+ copy($source_path, $watermark_path);
+
+ // Setup and run Admin_Watermarks_Controller::add
+ $controller = new Admin_Watermarks_Controller();
+ $_POST["file"] = $watermark_path;
+ $_POST["csrf"] = access::csrf_token();
+ ob_start();
+ $controller->add();
+ $results = ob_get_clean();
+
+ // Add should be successful
+ $this->assert_equal(json_encode(array("result" => "success",
+ "location" => url::site("admin/watermarks"))), $results);
+ $this->assert_equal(file_get_contents($source_path),
+ file_get_contents(VARPATH . "modules/watermark/$name.jpg"));
+ $this->assert_equal("$name.jpg", module::get_var("watermark", "name"));
+ $this->assert_equal(114, module::get_var("watermark", "width"));
+ $this->assert_equal(118, module::get_var("watermark", "height"));
+ $this->assert_equal("image/jpeg", module::get_var("watermark", "mime_type"));
+ }
+
+ public function add_watermark_reject_illegal_file_test() {
+ // Source is a php file, watermark path has extension php
+ $name = test::random_name();
+ $source_path = MODPATH . "watermark/tests/Admin_Watermarks_Controller_Test.php";
+ $watermark_path = TMPPATH . "uploadfile-123-{$name}.php";
+ copy($source_path, $watermark_path);
+
+ // Setup and run Admin_Watermarks_Controller::add
+ $controller = new Admin_Watermarks_Controller();
+ $_POST["file"] = $watermark_path;
+ $_POST["csrf"] = access::csrf_token();
+ ob_start();
+ $controller->add();
+ $results = ob_get_clean();
+
+ // Add should *not* be successful, and watermark should be deleted
+ $this->assert_equal("", $results);
+ $this->assert_false(file_exists($watermark_path));
+ $this->assert_false(file_exists(VARPATH . "modules/watermark/$name.php"));
+ }
+
+ public function add_watermark_rename_legal_file_with_illegal_extension_test() {
+ // Source is a jpg file, watermark path has extension php
+ $name = test::random_name();
+ $source_path = MODPATH . "gallery/images/imagemagick.jpg";
+ $watermark_path = TMPPATH . "uploadfile-123-{$name}.php";
+ copy($source_path, $watermark_path);
+
+ // Setup and run Admin_Watermarks_Controller::add
+ $controller = new Admin_Watermarks_Controller();
+ $_POST["file"] = $watermark_path;
+ $_POST["csrf"] = access::csrf_token();
+ ob_start();
+ $controller->add();
+ $results = ob_get_clean();
+
+ // Add should be successful with file renamed as jpg
+ $this->assert_equal(json_encode(array("result" => "success",
+ "location" => url::site("admin/watermarks"))), $results);
+ $this->assert_equal(file_get_contents($source_path),
+ file_get_contents(VARPATH . "modules/watermark/$name.jpg"));
+ $this->assert_equal("$name.jpg", module::get_var("watermark", "name"));
+ $this->assert_equal(114, module::get_var("watermark", "width"));
+ $this->assert_equal(118, module::get_var("watermark", "height"));
+ $this->assert_equal("image/jpeg", module::get_var("watermark", "mime_type"));
+ }
+
+ public function add_watermark_reject_illegal_file_with_legal_extension_test() {
+ // Source is a php file, watermark path has extension jpg
+ $name = test::random_name();
+ $source_path = MODPATH . "watermark/tests/Admin_Watermarks_Controller_Test.php";
+ $watermark_path = TMPPATH . "uploadfile-123-{$name}.jpg";
+ copy($source_path, $watermark_path);
+
+ // Setup and run Admin_Watermarks_Controller::add
+ $controller = new Admin_Watermarks_Controller();
+ $_POST["file"] = $watermark_path;
+ $_POST["csrf"] = access::csrf_token();
+ ob_start();
+ $controller->add();
+ $results = ob_get_clean();
+
+ // Add should *not* be successful, and watermark should be deleted
+ $this->assert_equal("", $results);
+ $this->assert_false(file_exists($watermark_path));
+ $this->assert_false(file_exists(VARPATH . "modules/watermark/$name.php"));
+ $this->assert_false(file_exists(VARPATH . "modules/watermark/$name.jpg"));
+ }
+}