File "util.php"

Full Path: /home/siazco/grocery.siazco.se/wp-content/plugins/better-wp-security/core/modules/site-scanner/util.php
File size: 9.36 KB
MIME-type: text/x-php
Charset: utf-8

<?php

use iThemesSecurity\Site_Scanner\Repository\Vulnerabilities_Options;
use iThemesSecurity\Site_Scanner\Repository\Vulnerabilities_Repository;
use iThemesSecurity\Site_Scanner\Vulnerability;

class ITSEC_Site_Scanner_Util {

	const GRANT = 'itsec-site-scanner-manage-scan';

	/**
	 * Get the log code for a scan result.
	 *
	 * @param array|WP_Error $results
	 *
	 * @return string
	 */
	public static function get_scan_result_code( $results ) {
		if ( is_wp_error( $results ) ) {
			if ( $results->get_error_message( 'itsec-temporary-server-error' ) ) {
				return 'scan-failure-server-error';
			}

			return 'scan-failure-client-error';
		}

		$codes = array();

		if ( ! empty( $results['entries']['malware'] ) ) {
			$codes[] = 'found-malware';
		}

		if ( isset( $results['entries']['blacklist'] ) ) {
			foreach ( $results['entries']['blacklist'] as $blacklist ) {
				if ( 'blacklisted' === $blacklist['status'] ) {
					$codes[] = 'on-blacklist';
					break;
				}
			}
		}

		if ( ! empty( $results['entries']['vulnerabilities'] ) ) {
			foreach ( $results['entries']['vulnerabilities'] as $vulnerability ) {
				foreach ( $vulnerability['issues'] as $issue ) {
					if ( ! ITSEC_Site_Scanner_Util::is_issue_muted( $issue['id'] ) ) {
						$codes[] = 'vulnerable-software';
						break 2;
					}
				}
			}
		}

		if ( $codes ) {
			if ( ! empty( $results['errors'] ) ) {
				$codes[] = 'has-error';
			}

			return implode( '--', $codes );
		}

		if ( ! empty( $results['errors'] ) ) {
			return 'error';
		}

		return 'clean';
	}

	public static function get_scan_code_description( $code ) {
		switch ( $code ) {
			case 'scan-failure-server-error':
			case 'scan-failure-client-error':
			case 'error':
				return esc_html__( 'Scan Error', 'better-wp-security' );
			case 'clean':
				return esc_html__( 'Clean', 'better-wp-security' );
			default:
				return wp_sprintf( '%l', self::translate_findings_code( $code ) );
		}
	}

	public static function translate_findings_code( $code ) {
		$part_labels = array();

		if ( is_string( $code ) ) {
			$parts = explode( '--', $code );
		} else {
			$parts = $code;
		}

		foreach ( $parts as $part ) {
			switch ( $part ) {
				case 'found-malware':
					$part_labels[] = esc_html__( 'Found Malware', 'better-wp-security' );
					break;
				case 'on-blacklist':
					$part_labels[] = esc_html__( 'On Blocklist', 'better-wp-security' );
					break;
				case 'vulnerable-software':
					$part_labels[] = esc_html__( 'Vulnerable Software', 'better-wp-security' );
					break;
				case 'has-error':
					$part_labels[] = esc_html__( 'Scan Error', 'better-wp-security' );
					break;
				default:
					$part_labels[] = $part;
					break;
			}
		}

		return $part_labels;
	}

	/**
	 * Is the given log item a valid scan result.
	 *
	 * @param array $entry
	 *
	 * @return true|WP_Error
	 */
	public static function is_log_item_valid_scan( $entry ) {
		if ( ! $entry ) {
			return new \WP_Error( 'itsec_site_scanner_factory_log_not_found', __( 'Could not find a log item with that id.', 'better-wp-security' ) );
		}

		if ( 'site-scanner' !== $entry['module'] ) {
			return new \WP_Error( 'itsec_site_scanner_factory_invalid_log_item', __( 'Log item does not belong to the Site Scanner module.', 'better-wp-security' ) );
		}

		if ( in_array( $entry['type'], [ 'process-start', 'process-update', 'process-stop' ], true ) ) {
			return new \WP_Error( 'itsec_site_scanner_factory_invalid_log_item_type', __( 'Log item is of the incorrect type.', 'better-wp-security' ) );
		}

		return true;
	}

	/**
	 * Generates a muted issues auth token.
	 *
	 * @param WP_User|null $user
	 *
	 * @return string|WP_Error
	 */
	public static function generate_scan_auth_token( WP_User $user = null ) {
		$user = $user ?: wp_get_current_user();

		$payload = [
			'nbf'   => ITSEC_Core::get_current_time_gmt(),
			'iat'   => ITSEC_Core::get_current_time_gmt(),
			'exp'   => ITSEC_Core::get_current_time_gmt() + WEEK_IN_SECONDS,
			'grant' => self::GRANT,
			'user'  => $user->ID,
		];

		return ITSEC_Lib_JWT::encode( $payload, wp_salt() );
	}

	/**
	 * Validates the muted issues auth token.
	 *
	 * @param string $jwt The JWT
	 *
	 * @return WP_User|WP_Error
	 */
	public static function validate_scan_auth_token( $jwt ) {
		$decoded = ITSEC_Lib_JWT::decode( $jwt, wp_salt(), [ 'HS256' ] );

		if ( is_wp_error( $decoded ) ) {
			return $decoded;
		}

		if ( ! isset( $decoded->grant ) ) {
			return new WP_Error( 'itsec_site_scanner_muted_auth_missing_grant', __( 'Malformed token.', 'better-wp-security' ) );
		}

		if ( $decoded->grant !== self::GRANT ) {
			return new WP_Error( 'itsec_site_scanner_invalid_grant', __( 'Malformed token.', 'better-wp-security' ) );
		}

		if ( empty( $decoded->user ) ) {
			return new WP_Error( 'itsec_site_scanner_muted_auth_missing_user', __( 'Malformed token.', 'better-wp-security' ) );
		}

		$user = get_userdata( $decoded->user );

		if ( ! $user instanceof WP_User ) {
			return new WP_Error( 'itsec_site_scanner_muted_auth_invalid_user', __( 'Malformed token.', 'better-wp-security' ) );
		}

		return $user;
	}

	/**
	 * Adds a URL parameter to give authentication for muted issues.
	 *
	 * @param string  $link
	 * @param WP_User $user
	 *
	 * @return string
	 */
	public static function authenticate_vulnerability_link( $link, WP_User $user = null ) {
		$user = $user ?: wp_get_current_user();

		if ( user_can( $user, ITSEC_Core::get_required_cap() ) ) {
			$token = self::generate_scan_auth_token( $user );

			if ( ! is_wp_error( $token ) ) {
				$link = add_query_arg( 'token', rawurlencode( $token ), $link );
			}
		}

		return $link;
	}

	/**
	 * Mutes an issue.
	 *
	 * @param string $issue_id
	 * @param array  $args
	 *
	 * @return array|WP_Error
	 */
	public static function mute_issue( $issue_id, array $args = [] ) {
		$repository          = ITSEC_Modules::get_container()
		                                    ->get( Vulnerabilities_Repository::class );
		$found_vulnerability = $repository->find( $issue_id );

		if ( ! $found_vulnerability->is_success() ) {
			return $found_vulnerability->get_error();
		}

		$vulnerability = $found_vulnerability->get_data();

		if ( ! $vulnerability ) {
			return new WP_Error(
				'itsec.site-scanner.vulnerabilities.mute.not-found',
				__( 'Vulnerability not found.', 'better-wp-security' ),
				[
					'id' => $issue_id,
				]
			);
		}

		if ( $vulnerability->is_muted() ) {
			return new WP_Error(
				'itsec_site_scanner_issue_already_muted',
				__( 'Issue already muted.', 'better-wp-security' ),
				[
					'id' => $issue_id,
				]
			);
		}

		$muted_by = wp_get_current_user();

		if ( isset( $args['muted_by'] ) ) {
			$muted_by = get_userdata( $args['muted_by'] );
		}

		$vulnerability->muted( $muted_by && $muted_by->exists() ? $muted_by : null );
		$persisted = $repository->persist( $vulnerability );

		if ( $persisted->is_success() ) {
			return self::format_vulnerability( $vulnerability );
		}

		return $persisted->get_error();
	}

	/**
	 * Is the given issue muted.
	 *
	 * @param string $issue_id
	 *
	 * @return bool
	 */
	public static function is_issue_muted( $issue_id ) {
		return (bool) static::get_muted_issue( $issue_id );
	}

	/**
	 * Unmute an issue.
	 *
	 * @param string $issue_id
	 *
	 * @return bool|WP_Error
	 */
	public static function unmute_issue( $issue_id ) {
		$repository          = ITSEC_Modules::get_container()
		                                    ->get( Vulnerabilities_Repository::class );
		$found_vulnerability = $repository->find( $issue_id );

		if ( ! $found_vulnerability->is_success() ) {
			return $found_vulnerability->get_error();
		}

		$vulnerability = $found_vulnerability->get_data();

		if ( ! $vulnerability ) {
			return true;
		}

		if ( ! $vulnerability->is_muted() ) {
			return new WP_Error(
				'itsec_site_scanner_issue_not_muted',
				__( 'Issue already not muted.', 'better-wp-security' ),
				[
					'id' => $issue_id,
				]
			);
		}

		$vulnerability->unmute();
		$persisted = $repository->persist( $vulnerability );

		if ( $persisted->is_success() ) {
			return true;
		}

		return $persisted->get_error();
	}

	/**
	 * Get a muted issue.
	 *
	 * @param string $issue_id
	 *
	 * @return array|null
	 */
	public static function get_muted_issue( $issue_id ): ?array {
		$repository    = ITSEC_Modules::get_container()
		                              ->get( Vulnerabilities_Repository::class );
		$vulnerability = $repository->find( $issue_id );

		if ( ! $vulnerability->is_success() || ! $vulnerability->get_data() ) {
			return null;
		}

		if ( ! $vulnerability->get_data()->is_muted() ) {
			return null;
		}

		return self::format_vulnerability( $vulnerability->get_data() );
	}

	/**
	 * Gets a list of all the muted issues.
	 *
	 * @return array[]
	 */
	public static function get_muted_issues() {
		$repository      = ITSEC_Modules::get_container()
		                                ->get( Vulnerabilities_Repository::class );
		$vulnerabilities = $repository->get_vulnerabilities(
			( new Vulnerabilities_Options() )
				->set_resolutions( [ Vulnerability::R_MUTED ] )
		);

		if ( $vulnerabilities->is_success() ) {
			return array_map( [ self::class, 'format_vulnerability' ], $vulnerabilities->get_data() );
		}

		return [];
	}

	private static function format_vulnerability( Vulnerability $vulnerability ): array {
		return [
			'id'       => $vulnerability->get_id(),
			'muted_by' => $vulnerability->get_resolved_by() ? $vulnerability->get_resolved_by()->ID : 0,
			'muted_at' => $vulnerability->get_resolved_at()->getTimestamp(),
		];
	}
}