Files
bpfire/html/html/clwarn.cgi
2022-04-23 19:36:57 +00:00

151 lines
4.2 KiB
Perl

#!/usr/bin/perl
###############################################################################
# #
# IPFire.org - A linux based firewall #
# Copyright (C) 2007 Michael Tremer & Christian Schmidt #
# #
# This program is free software: you can redistribute it and/or modify #
# it under the terms of the GNU General Public License as published by #
# the Free Software Foundation, either version 3 of the License, or #
# (at your option) any later version. #
# #
# This program is distributed in the hope that it will be useful, #
# but WITHOUT ANY WARRANTY; without even the implied warranty of #
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the #
# GNU General Public License for more details. #
# #
# You should have received a copy of the GNU General Public License #
# along with this program. If not, see <http://www.gnu.org/licenses/>. #
# #
###############################################################################
use CGI qw(param);
# enable only the following on debugging purpose
use warnings;
use CGI::Carp 'fatalsToBrowser';
$swroot="/var/ipfire";
&readhash("$swroot/ethernet/settings", \%netsettings);
my $TITLE_VIRUS = "SquidClamAv Virus detection";
my $url = param('url') || '';
my $virus = param('virus') || '';
my $source = param('source') || '';
$source =~ s/\/-//;
my $user = param('user') || '';
# Remove clamd infos
$virus =~ s/stream: //;
$virus =~ s/ FOUND//;
print "Pragma: no-cache\n";
print "Cache-control: no-cache\n";
print "Connection: close\n";
print "Content-type: text/html\n\n";
print <<END
<html>
<head>
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>ACCESS MESSAGE</title>
</head>
<body>
<table width="100%" height='100%' border="0">
<tr>
<td colspan='3' width='100%' height='130' align="center" background="http://$netsettings{'GREEN_ADDRESS'}:81/images/background.gif">
<tr> <td width='10%'><td align='center' bgcolor='#CC000000' width='80%'><font face="verdana, arial, sans serif" color="#FFFFFF" size="5">
<b>$TITLE_VIRUS</b>
</font>
<td width='10%'>
END
;
if (!($virus eq ""))
{
print <<END
<tr> <td colspan='3' align='center'>
<font face="verdana, arial, sans serif" color="#CC000000" size="1">
<b>$virus found</b>
</font>
END
;
}
print <<END
<tr>
<td colspan='3' align="center">
<font face="verdana, arial, sans serif" color="#000000" size="4">
<b>Access to the requested page has been denied</b>
</font>
<font face="verdana,arial,sans serif" color="#000000" size="2">
END
;
if (!($url eq ""))
{
print <<END
<p>URL: <a href="$url">$url</a>
END
;
}
if (!($source eq ""))
{
print <<END
<p>Client IP address: <i>$source</i>
END
;
}
print <<END
<br><p>Please contact the Network Administrator if you think there has been an error
</font>
<tr>
<td colspan='3' height='60%' valign="bottom" align="right">
<font face="verdana,arial,sans serif" color="#656565" size="1">Web Filtering by
</font>
<a href="http://www.ipfire.org" target="_blank"><b>
<font face="verdana,arial,sans serif" color="#656565" size="1">IPFire</b></a>
</font>
</table>
</body>
</html>
END
;
sub readhash
{
my $filename = $_[0];
my $hash = $_[1];
my ($var, $val);
if (-e $filename)
{
open(FILE, $filename) or die "Unable to read file $filename";
while (<FILE>)
{
chop;
($var, $val) = split /=/, $_, 2;
if ($var)
{
$val =~ s/^\'//g;
$val =~ s/\'$//g;
# Untaint variables read from hash
$var =~ /([A-Za-z0-9_-]*)/; $var = $1;
$val =~ /([\w\W]*)/; $val = $1;
$hash->{$var} = $val;
}
}
close FILE;
}
}