|
|
@@ -25,6 +25,7 @@ declare(strict_types=1); |
|
|
|
*/ |
|
|
|
namespace OC\Http\Client; |
|
|
|
|
|
|
|
use IPLib\Address\IPv6; |
|
|
|
use IPLib\Factory; |
|
|
|
use IPLib\ParseStringFlag; |
|
|
|
use OCP\Http\Client\LocalServerException; |
|
|
@@ -48,7 +49,11 @@ class LocalAddressChecker { |
|
|
|
return; |
|
|
|
} |
|
|
|
/* Replace by normalized form */ |
|
|
|
$ip = (string)$parsedIp; |
|
|
|
if ($parsedIp instanceof IPv6) { |
|
|
|
$ip = (string)($parsedIp->toIPv4() ?? $parsedIp); |
|
|
|
} else { |
|
|
|
$ip = (string)$parsedIp; |
|
|
|
} |
|
|
|
|
|
|
|
$localRanges = [ |
|
|
|
'100.64.0.0/10', // See RFC 6598 |
|
|
@@ -63,19 +68,6 @@ class LocalAddressChecker { |
|
|
|
$this->logger->warning("Host $ip was not connected to because it violates local access rules"); |
|
|
|
throw new LocalServerException('Host violates local access rules'); |
|
|
|
} |
|
|
|
|
|
|
|
// Also check for IPv6 IPv4 nesting, because that's not covered by filter_var |
|
|
|
if ((bool)filter_var($ip, FILTER_VALIDATE_IP, FILTER_FLAG_IPV6) && substr_count($ip, '.') > 0) { |
|
|
|
$delimiter = strrpos($ip, ':'); // Get last colon |
|
|
|
$ipv4Address = substr($ip, $delimiter + 1); |
|
|
|
|
|
|
|
if ( |
|
|
|
!filter_var($ipv4Address, FILTER_VALIDATE_IP, FILTER_FLAG_NO_PRIV_RANGE | FILTER_FLAG_NO_RES_RANGE) || |
|
|
|
IpUtils::checkIp($ip, $localRanges)) { |
|
|
|
$this->logger->warning("Host $ip was not connected to because it violates local access rules"); |
|
|
|
throw new LocalServerException('Host violates local access rules'); |
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
public function ThrowIfLocalAddress(string $uri) : void { |