server.inc 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553
  1. <?php
  2. $socket = null;
  3. $errno = 0;
  4. $context = stream_context_create(array('ssl' => array('local_cert' => dirname(__FILE__).'/cert.pem')));
  5. for ($i=0; $i<10 && !$socket; ++$i) {
  6. $port = rand(50000, 65535);
  7. $socket = @stream_socket_server("tcp://127.0.0.1:$port", $errno, $errstr, STREAM_SERVER_BIND|STREAM_SERVER_LISTEN, $context);
  8. }
  9. //set anther random port that is not the same as $port
  10. do{
  11. $pasv_port = rand(50000, 65535);
  12. }while($pasv_port == $port);
  13. if (!$socket) {
  14. echo "$errstr ($errno)\n";
  15. die("could not start/bind the ftp server\n");
  16. }
  17. $pid = pcntl_fork();
  18. function pasv_listen($action){
  19. global $pasv_port, $tmp_file;
  20. $tmp_file = 'nm2.php';
  21. $pid = pcntl_fork();
  22. if($pid === 0){
  23. $soc = stream_socket_server("tcp://127.0.0.1:$pasv_port");
  24. $fs = stream_socket_accept($soc, 3);
  25. switch ($action) {
  26. case 'fget':
  27. case 'get':
  28. //listen for 3 seconds 3 seconds
  29. fputs($fs, "I am passive.\r\n");
  30. break;
  31. case 'put':
  32. file_put_contents($tmp_file, stream_get_contents($fs));
  33. break;
  34. case 'list':
  35. fputs($fs, "drwxr-x--- 3 owner group 4096 Jul 12 12:16 .\r\n");
  36. fputs($fs, "drwxr-x--- 3 owner group 4096 Jul 12 12:16 ..\r\n");
  37. fputs($fs, "drwxr-x--- 3 owner group 4096 Jul 12 12:16 public_ftp\r\n");
  38. break;
  39. case 'list_null':
  40. fputs($fs, "\r\n");
  41. break;
  42. }
  43. fclose($fs);
  44. exit;
  45. }
  46. }
  47. if ($pid) {
  48. function dump_and_exit($buf)
  49. {
  50. var_dump($buf);
  51. fclose($GLOBALS['s']);
  52. exit;
  53. }
  54. function anonymous()
  55. {
  56. return $GLOBALS['user'] === 'anonymous';
  57. }
  58. /* quick&dirty realpath() like function */
  59. function change_dir($dir)
  60. {
  61. global $cwd;
  62. if ($dir[0] == '/') {
  63. $cwd = $dir;
  64. return;
  65. }
  66. $cwd = "$cwd/$dir";
  67. do {
  68. $old = $cwd;
  69. $cwd = preg_replace('@/?[^/]+/\.\.@', '', $cwd);
  70. } while ($old != $cwd);
  71. $cwd = strtr($cwd, array('//' => '/'));
  72. if (!$cwd) $cwd = '/';
  73. }
  74. $s = stream_socket_accept($socket);
  75. if (!$s) die("Error accepting a new connection\n");
  76. fputs($s, "220----- PHP FTP server 0.3 -----\r\n220 Service ready\r\n");
  77. $buf = fread($s, 2048);
  78. function user_auth($buf) {
  79. global $user, $s, $ssl, $bug37799;
  80. if (!empty($ssl)) {
  81. if ($buf !== "AUTH TLS\r\n") {
  82. fputs($s, "500 Syntax error, command unrecognized.\r\n");
  83. dump_and_exit($buf);
  84. }
  85. if (empty($bug37799)) {
  86. fputs($s, "234 auth type accepted\r\n");
  87. } else {
  88. fputs($s, "666 dummy\r\n");
  89. fputs($s, "666 bogus msg\r\n");
  90. exit;
  91. }
  92. if (!stream_socket_enable_crypto($s, true, STREAM_CRYPTO_METHOD_SSLv23_SERVER)) {
  93. die("SSLv23 handshake failed.\n");
  94. }
  95. if (!preg_match('/^PBSZ \d+\r\n$/', $buf = fread($s, 2048))) {
  96. fputs($s, "501 bogus data\r\n");
  97. dump_and_exit($buf);
  98. }
  99. fputs($s, "200 OK\r\n");
  100. $buf = fread($s, 2048);
  101. if ($buf !== "PROT P\r\n") {
  102. fputs($s, "504 Wrong protection.\r\n");
  103. dump_and_exit($buf);
  104. }
  105. fputs($s, "200 OK\r\n");
  106. $buf = fread($s, 2048);
  107. }
  108. if ($buf == "AUTH TLS\r\n") {
  109. fputs($s, "500 not supported.\r\n");
  110. return ;
  111. } else if (!preg_match('/^USER (\w+)\r\n$/', $buf, $m)) {
  112. fputs($s, "500 Syntax error, command unrecognized.\r\n");
  113. dump_and_exit($buf);
  114. }
  115. $user = $m[1];
  116. if ($user !== 'user' && $user !== 'anonymous') {
  117. fputs($s, "530 Not logged in.\r\n");
  118. fclose($s);
  119. exit;
  120. }
  121. if (anonymous()) {
  122. fputs($s, "230 Anonymous user logged in\r\n");
  123. } else {
  124. fputs($s, "331 User name ok, need password\r\n");
  125. if (!preg_match('/^PASS (\w+)\r\n$/', $buf = fread($s, 100), $m)) {
  126. fputs($s, "500 Syntax error, command unrecognized.\r\n");
  127. dump_and_exit($buf);
  128. }
  129. $pass = $m[1];
  130. if ($pass === 'pass') {
  131. fputs($s, "230 User logged in\r\n");
  132. } else {
  133. fputs($s, "530 Not logged in.\r\n");
  134. fclose($s);
  135. exit;
  136. }
  137. }
  138. }
  139. user_auth($buf);
  140. $cwd = '/';
  141. $num_bogus_cmds = 0;
  142. while($buf = fread($s, 4098)) {
  143. if (!empty($bogus)) {
  144. fputs($s, "502 Command not implemented (".$num_bogus_cmds++.").\r\n");
  145. } else if ($buf === "HELP\r\n") {
  146. fputs($s, "214-There is help available for the following commands:\r\n");
  147. fputs($s, " USER\r\n");
  148. fputs($s, " HELP\r\n");
  149. fputs($s, "214 end of list\r\n");
  150. } elseif ($buf === "HELP HELP\r\n") {
  151. fputs($s, "214 Syntax: HELP [<SP> <string>] <CRLF>\r\n");
  152. } elseif ($buf === "PWD\r\n") {
  153. fputs($s, "257 \"$cwd\" is current directory.\r\n");
  154. } elseif ($buf === "CDUP\r\n") {
  155. change_dir('..');
  156. fputs($s, "250 CDUP command successful.\r\n");
  157. } elseif ($buf === "SYST\r\n") {
  158. if (isset($bug27809)) {
  159. fputs($s, "215 OS/400 is the remote operating system. The TCP/IP version is \"V5R2M0\"\r\n");
  160. } else {
  161. fputs($s, "215 UNIX Type: L8.\r\n");
  162. }
  163. } elseif ($buf === "TYPE A\r\n") {
  164. $ascii = true;
  165. fputs($s, "200 OK\r\n");
  166. } elseif ($buf === "AUTH SSL\r\n") {
  167. $ascii = true;
  168. fputs($s, "500 not supported\r\n");
  169. } elseif ($buf === "TYPE I\r\n") {
  170. $ascii = false;
  171. fputs($s, "200 OK\r\n");
  172. } elseif ($buf === "QUIT\r\n") {
  173. break;
  174. } elseif (preg_match("~^PORT (\d+),(\d+),(\d+),(\d+),(\d+),(\d+)\r\n$~", $buf, $m)) {
  175. $host = "$m[1].$m[2].$m[3].$m[4]";
  176. $port = ((int)$m[5] << 8) + (int)$m[6];
  177. fputs($s, "200 OK.\r\n");
  178. } elseif (preg_match("~^STOR ([\w/.-]+)\r\n$~", $buf, $m)) {
  179. fputs($s, "150 File status okay; about to open data connection\r\n");
  180. if(empty($pasv))
  181. {
  182. if (!$fs = stream_socket_client("tcp://$host:$port")) {
  183. fputs($s, "425 Can't open data connection\r\n");
  184. continue;
  185. }
  186. $data = stream_get_contents($fs);
  187. $orig = file_get_contents(dirname(__FILE__).'/'.$m[1]);
  188. if (isset($ascii) && !$ascii && $orig === $data) {
  189. fputs($s, "226 Closing data Connection.\r\n");
  190. } elseif ((!empty($ascii) || isset($bug39583)) && $data === strtr($orig, array("\r\n" => "\n", "\r" => "\n", "\n" => "\r\n"))) {
  191. fputs($s, "226 Closing data Connection.\r\n");
  192. } else {
  193. var_dump($data);
  194. var_dump($orig);
  195. fputs($s, "552 Requested file action aborted.\r\n");
  196. }
  197. fclose($fs);
  198. }else{
  199. $data = file_get_contents('nm2.php');
  200. $orig = file_get_contents(dirname(__FILE__).'/'.$m[1]);
  201. if ( $orig === $data) {
  202. fputs($s, "226 Closing data Connection.\r\n");
  203. } else {
  204. var_dump($data);
  205. var_dump($orig);
  206. fputs($s, "552 Requested file action aborted.\r\n");
  207. }
  208. }
  209. } elseif (preg_match("~^APPE ([\w/.-]+)\r\n$~", $buf, $m)) {
  210. fputs($s, "150 File status okay; about to open data connection\r\n");
  211. if(empty($pasv))
  212. {
  213. if (!$fs = stream_socket_client("tcp://$host:$port")) {
  214. fputs($s, "425 Can't open data connection\r\n");
  215. continue;
  216. }
  217. $data = stream_get_contents($fs);
  218. file_put_contents(__DIR__.'/'.$m[1], $data, FILE_APPEND);
  219. fputs($s, "226 Closing data Connection.\r\n");
  220. fclose($fs);
  221. }else{
  222. $data = stream_get_contents($fs);
  223. file_put_contents(__DIR__.'/'.$m[1], $data, FILE_APPEND);
  224. fputs($s, "226 Closing data Connection.\r\n");
  225. fclose($fs);
  226. }
  227. }elseif (preg_match("~^CWD ([A-Za-z./]+)\r\n$~", $buf, $m)) {
  228. if (isset($bug77680)) {
  229. fputs($s, "550 Directory change to $m[1] failed: file does not exist\r\n");
  230. var_dump($buf);
  231. } else {
  232. change_dir($m[1]);
  233. fputs($s, "250 CWD command successful.\r\n");
  234. }
  235. } elseif (preg_match("~^NLST(?: ([A-Za-z./]+))?\r\n$~", $buf, $m)) {
  236. if (isset($m[1]) && (($m[1] === 'bogusdir') || ($m[1] === '/bogusdir'))) {
  237. fputs($s, "250 $m[1]: No such file or directory\r\n");
  238. continue;
  239. }
  240. // there are some servers that don't open the ftp-data socket if there's nothing to send
  241. if (isset($bug39458) && isset($m[1]) && $m[1] === 'emptydir') {
  242. fputs($s, "226 Transfer complete.\r\n");
  243. continue;
  244. }
  245. if (empty($pasv)) {
  246. fputs($s, "150 File status okay; about to open data connection\r\n");
  247. if (!$fs = stream_socket_client("tcp://$host:$port")) {
  248. fputs($s, "425 Can't open data connection\r\n");
  249. continue;
  250. }
  251. } else {
  252. fputs($s, "125 Data connection already open; transfer starting.\r\n");
  253. $fs=$pasvs;
  254. }
  255. if ((!empty($ssl)) && (!stream_socket_enable_crypto($pasvs, true, STREAM_CRYPTO_METHOD_SSLv23_SERVER))) {
  256. die("SSLv23 handshake failed.\n");
  257. }
  258. if (empty($m[1]) || $m[1] !== 'emptydir') {
  259. fputs($fs, "file1\r\nfile1\r\nfile\nb0rk\r\n");
  260. }
  261. fputs($s, "226 Closing data Connection.\r\n");
  262. fclose($fs);
  263. } elseif (preg_match("~^MKD ([A-Za-z./]+)\r\n$~", $buf, $m)) {
  264. if (isset($bug7216)) {
  265. fputs($s, "257 OK.\r\n");
  266. } else {
  267. if (isset($bug77680)) {
  268. var_dump($buf);
  269. }
  270. fputs($s, "257 \"/path/to/ftproot$cwd$m[1]\" created.\r\n");
  271. }
  272. } elseif (preg_match('/^USER /', $buf)) {
  273. user_auth($buf);
  274. } elseif (preg_match('/^MDTM ([\w\h]+)/', $buf, $matches)) {
  275. switch ($matches [1]){
  276. case "A":
  277. fputs($s, "213 19980615100045.014\r\n");
  278. break;
  279. case "B":
  280. fputs($s, "213 19980615100045.014\r\n");
  281. break;
  282. case "C":
  283. fputs($s, "213 19980705132316\r\n");
  284. break;
  285. case "19990929043300 File6":
  286. fputs($s, "213 19991005213102\r\n");
  287. break;
  288. default :
  289. fputs($s, "550 No file named \"{$matches [1]}\"\r\n");
  290. break;
  291. }
  292. }elseif (preg_match('/^RETR ([\/]*[\w\h]+)/', $buf, $matches)) {
  293. if(!empty($pasv)){
  294. ;
  295. }
  296. else if (!$fs = stream_socket_client("tcp://$host:$port")) {
  297. fputs($s, "425 Can't open data connection\r\n");
  298. continue;
  299. }
  300. switch($matches[1]){
  301. case "pasv":
  302. fputs($s, "150 File status okay; about to open data connection.\r\n");
  303. //the data connection is handled in another forked process
  304. // called from outside this while loop
  305. fputs($s, "226 Closing data Connection.\r\n");
  306. break;
  307. case "a story":
  308. fputs($s, "150 File status okay; about to open data connection.\r\n");
  309. fputs($fs, "For sale: baby shoes, never worn.\r\n");
  310. fputs($s, "226 Closing data Connection.\r\n");
  311. break;
  312. case "binary data":
  313. fputs($s, "150 File status okay; about to open data connection.\r\n");
  314. $transfer_type = $ascii? 'ASCII' : 'BINARY' ;
  315. fputs($fs, $transfer_type."Foo\0Bar\r\n");
  316. fputs($s, "226 Closing data Connection.\r\n");
  317. break;
  318. case "fget":
  319. fputs($s, "150 File status okay; about to open data connection.\r\n");
  320. $transfer_type = $ascii? 'ASCII' : 'BINARY' ;
  321. fputs($fs, $transfer_type."FooBar\r\n");
  322. fputs($s, "226 Closing data Connection.\r\n");
  323. break;
  324. case "fgetresume":
  325. fputs($s, "150 File status okay; about to open data connection.\r\n");
  326. $transfer_type = $ascii? 'ASCII' : 'BINARY' ;
  327. fputs($fs, "Bar\r\n");
  328. fputs($s, "226 Closing data Connection.\r\n");
  329. break;
  330. case "fget_large":
  331. fputs($s, "150 File status okay; about to open data connection.\r\n");
  332. $transfer_type = $ascii? 'ASCII' : 'BINARY' ;
  333. if ($GLOBALS['rest_pos'] == '5368709119') {
  334. fputs($fs, "X");
  335. } else {
  336. fputs($fs, "Y");
  337. }
  338. fputs($s, "226 Closing data Connection.\r\n");
  339. break;
  340. case "mediumfile":
  341. fputs($s, "150 File status okay; about to open data connection.\r\n");
  342. for($i = 0; $i < 150; $i++){
  343. fputs($fs, "This is line $i of the test data.\n");
  344. }
  345. fputs($s, "226 Closing data Connection.\r\n");
  346. break;
  347. case "/bug73457":
  348. fputs($s, "150 File status okay; about to open data connection.\r\n");
  349. break;
  350. default:
  351. fputs($s, "550 {$matches[1]}: No such file or directory \r\n");
  352. break;
  353. }
  354. if(isset($fs))
  355. fclose($fs);
  356. }elseif (preg_match('/^PASV/', $buf, $matches)) {
  357. $pasv=true;
  358. $host = "127.0.0.1";
  359. $i=0;
  360. if (empty($bug73457)) {
  361. do {
  362. if (!empty($ssl)) {
  363. $soc = @stream_socket_server("tcp://127.0.0.1:$pasv_port", $errno, $errstr, STREAM_SERVER_BIND|STREAM_SERVER_LISTEN, $context);
  364. } else {
  365. $soc = @stream_socket_server("tcp://127.0.0.1:$pasv_port");
  366. }
  367. /* Could bind port, Try another port */
  368. if (!$soc) {
  369. $pasv_port = rand(50000, 65535);
  370. }
  371. $i++;
  372. } while ($i<10 && !$soc);
  373. if (!$soc) {
  374. echo "$errstr ($errno)\n";
  375. die("could not bind passive port\n");
  376. }
  377. } else {
  378. $pasv_port=1234;
  379. }
  380. $p2 = $pasv_port % ((int) 1 << 8);
  381. $p1 = ($pasv_port-$p2)/((int) 1 << 8);
  382. fputs($s, "227 Entering Passive Mode. (127,0,0,1,{$p1},{$p2})\r\n");
  383. if (empty($bug73457)) {
  384. $pasvs = stream_socket_accept($soc,10);
  385. }
  386. } elseif (preg_match('/^EPSV/', $buf, $matches)) {
  387. fputs($s, "550 Extended passsive mode not supported.\r\n");
  388. } elseif (preg_match('/^SITE EXEC/', $buf, $matches)) {
  389. fputs($s, "200 OK\r\n");
  390. } elseif (preg_match('/^RMD/', $buf, $matches)) {
  391. fputs($s, "250 OK\r\n");
  392. } elseif (preg_match('/^SITE CHMOD/', $buf, $matches)) {
  393. fputs($s, "200 OK\r\n");
  394. } elseif (preg_match('/^DELE/', $buf, $matches)) {
  395. fputs($s, "250 OK\r\n");
  396. } elseif (preg_match('/^ALLO (\d+)/', $buf, $matches)) {
  397. fputs($s, "200 " . $matches[1] . " bytes allocated\r\n");
  398. }elseif (preg_match('/^LIST www\//', $buf, $matches)) {
  399. fputs($s, "226 Transfer complete\r\n");
  400. }elseif (preg_match('/^LIST no_exists\//', $buf, $matches)) {
  401. fputs($s, "425 Error establishing connection\r\n");
  402. }elseif (preg_match('/^REST (\d+)/', $buf, $matches)) {
  403. $GLOBALS['rest_pos'] = $matches[1];
  404. fputs($s, "350 OK\r\n");
  405. }elseif (preg_match('/^SIZE largefile/', $buf)) {
  406. fputs($s, "213 5368709120\r\n");
  407. }elseif (preg_match('/^RNFR existing_file/', $buf, $matches)) {
  408. fputs($s, "350 File or directory exists, ready for destination name\r\n");
  409. }elseif (preg_match('/^RNFR nonexisting_file/', $buf, $matches)) {
  410. fputs($s, "550 No such file or directory\r\n");
  411. }elseif (preg_match('/^RNTO nonexisting_file/', $buf, $matches)) {
  412. fputs($s, "250 Rename successful\r\n");
  413. }elseif (preg_match('/^MLSD no_exists\//', $buf, $matches)) {
  414. fputs($s, "425 Error establishing connection\r\n");
  415. }elseif (preg_match("~^MLSD(?: ([A-Za-z./]+))?\r\n$~", $buf, $m)) {
  416. if(isset($m[1]) && (($m[1] === 'bogusdir') || ($m[1] === '/bogusdir'))) {
  417. fputs($s, "250 $m[1]: No such file or directory\r\n");
  418. continue;
  419. }
  420. // there are some servers that don't open the ftp-data socket if there's nothing to send
  421. if(isset($bug39458) && isset($m[1]) && $m[1] === 'emptydir') {
  422. fputs($s, "226 Transfer complete.\r\n");
  423. continue;
  424. }
  425. if(empty($pasv)) {
  426. fputs($s, "150 File status okay; about to open data connection\r\n");
  427. if(!$fs = stream_socket_client("tcp://$host:$port")) {
  428. fputs($s, "425 Can't open data connection\r\n");
  429. continue;
  430. }
  431. } else {
  432. fputs($s, "125 Data connection already open; transfer starting.\r\n");
  433. $fs = $pasvs;
  434. }
  435. if((!empty($ssl)) && (!stream_socket_enable_crypto($pasvs, TRUE, STREAM_CRYPTO_METHOD_SSLv23_SERVER))) {
  436. die("SSLv23 handshake failed.\n");
  437. }
  438. if(empty($m[1]) || $m[1] !== 'emptydir') {
  439. fputs($fs, "modify=20170127230002;perm=flcdmpe;type=cdir;unique=811U4340002;UNIX.group=33;UNIX.mode=0755;UNIX.owner=33; .\r\n");
  440. fputs($fs, "modify=20170127230002;perm=flcdmpe;type=pdir;unique=811U4340002;UNIX.group=33;UNIX.mode=0755;UNIX.owner=33; ..\r\n");
  441. fputs($fs, "modify=20170126121225;perm=adfrw;size=4729;type=file;unique=811U4340CB9;UNIX.group=33;UNIX.mode=0644;UNIX.owner=33; foobar\r\n");
  442. fputs($fs, "fact=val=ue;empty=; path;name\r\n");
  443. fputs($fs, "no_space\r\n");
  444. fputs($fs, "no_semi pathname\r\n");
  445. fputs($fs, "no_eq; pathname\r\n");
  446. }
  447. fputs($s, "226 Closing data Connection.\r\n");
  448. fclose($fs);
  449. }elseif (preg_match('/^SIZE \/bug73457/', $buf)) {
  450. fputs($s, "213 10\r\n");
  451. }elseif (preg_match("/^SITE/", $buf)) {
  452. fputs($s, "500 Syntax error, command unrecognized.\r\n");
  453. }else {
  454. dump_and_exit($buf);
  455. }
  456. }
  457. fclose($s);
  458. exit;
  459. }
  460. fclose($socket);
  461. ?>