/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */ /* * This file is part of the LibreOffice project. * * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. * * This file incorporates work covered by the following license notice: * * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed * with this work for additional information regarding copyright * ownership. The ASF licenses this file to you under the Apache * License, Version 2.0 (the "License"); you may not use this file * except in compliance with the License. You may obtain a copy of * the License at http://www.apache.org/licenses/LICENSE-2.0 . */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #if defined(_WIN32) #include #include #include #include #endif namespace sfx2 { using ::com::sun::star::uno::Reference; using ::com::sun::star::task::XInteractionHandler; using ::com::sun::star::uno::Any; using ::com::sun::star::uno::Sequence; using ::com::sun::star::task::DocumentMacroConfirmationRequest; using ::com::sun::star::uno::Exception; using ::com::sun::star::security::DocumentDigitalSignatures; using ::com::sun::star::security::XDocumentDigitalSignatures; using ::com::sun::star::embed::XStorage; using ::com::sun::star::document::XEmbeddedScripts; using ::com::sun::star::script::XLibraryContainer; using ::com::sun::star::container::XNameAccess; using ::com::sun::star::uno::UNO_QUERY_THROW; namespace MacroExecMode = ::com::sun::star::document::MacroExecMode; //= DocumentMacroMode_Data struct DocumentMacroMode_Data { IMacroDocumentAccess& m_rDocumentAccess; bool m_bHasUnsignedContentError; explicit DocumentMacroMode_Data( IMacroDocumentAccess& rDocumentAccess ) :m_rDocumentAccess( rDocumentAccess ) ,m_bHasUnsignedContentError( false ) { } }; namespace { bool lcl_showMacroWarning( const Reference< XInteractionHandler >& rxHandler, const OUString& rDocumentLocation ) { DocumentMacroConfirmationRequest aRequest; aRequest.DocumentURL = rDocumentLocation; return SfxMedium::CallApproveHandler( rxHandler, Any( aRequest ), true ); } } //= DocumentMacroMode DocumentMacroMode::DocumentMacroMode( IMacroDocumentAccess& rDocumentAccess ) :m_xData( std::make_shared( rDocumentAccess ) ) { } bool DocumentMacroMode::allowMacroExecution() { m_xData->m_rDocumentAccess.setCurrentMacroExecMode( MacroExecMode::ALWAYS_EXECUTE_NO_WARN ); return true; } bool DocumentMacroMode::disallowMacroExecution() { m_xData->m_rDocumentAccess.setCurrentMacroExecMode( MacroExecMode::NEVER_EXECUTE ); return false; } bool DocumentMacroMode::adjustMacroMode( const Reference< XInteractionHandler >& rxInteraction, bool bHasValidContentSignature ) { if ( SvtSecurityOptions::IsMacroDisabled() ) { // no macro should be executed at all return disallowMacroExecution(); } // get setting from configuration if required enum AutoConfirmation { eNoAutoConfirm, eAutoConfirmApprove, eAutoConfirmReject }; AutoConfirmation eAutoConfirm( eNoAutoConfirm ); sal_Int16 nMacroExecutionMode = m_xData->m_rDocumentAccess.getCurrentMacroExecMode(); if ( ( nMacroExecutionMode == MacroExecMode::USE_CONFIG ) || ( nMacroExecutionMode == MacroExecMode::USE_CONFIG_REJECT_CONFIRMATION ) || ( nMacroExecutionMode == MacroExecMode::USE_CONFIG_APPROVE_CONFIRMATION ) ) { // check confirm first, as nMacroExecutionMode is always overwritten by the GetMacroSecurityLevel() switch if (nMacroExecutionMode == MacroExecMode::USE_CONFIG_REJECT_CONFIRMATION) eAutoConfirm = eAutoConfirmReject; else if (nMacroExecutionMode == MacroExecMode::USE_CONFIG_APPROVE_CONFIRMATION) eAutoConfirm = eAutoConfirmApprove; switch ( SvtSecurityOptions::GetMacroSecurityLevel() ) { case 3: // "Very high" nMacroExecutionMode = MacroExecMode::FROM_LIST_NO_WARN; break; case 2: // "High" nMacroExecutionMode = MacroExecMode::FROM_LIST_AND_SIGNED_WARN; break; case 1: // "Medium" nMacroExecutionMode = MacroExecMode::ALWAYS_EXECUTE; break; case 0: // "Low" nMacroExecutionMode = MacroExecMode::ALWAYS_EXECUTE_NO_WARN; break; default: OSL_FAIL( "DocumentMacroMode::adjustMacroMode: unexpected macro security level!" ); nMacroExecutionMode = MacroExecMode::NEVER_EXECUTE; } } if ( nMacroExecutionMode == MacroExecMode::NEVER_EXECUTE ) return disallowMacroExecution(); if ( nMacroExecutionMode == MacroExecMode::ALWAYS_EXECUTE_NO_WARN ) return allowMacroExecution(); SignatureState nSignatureState = SignatureState::UNKNOWN; const OUString sURL(m_xData->m_rDocumentAccess.getDocumentLocation()); try { // get document location from medium name and check whether it is a trusted one // the service is created without document version, since it is not of interest here Reference< XDocumentDigitalSignatures > xSignatures(DocumentDigitalSignatures::createDefault(::comphelper::getProcessComponentContext())); INetURLObject aURLReferer(sURL); OUString aLocation = aURLReferer.GetMainURL( INetURLObject::DecodeMechanism::NONE ); if ( !aLocation.isEmpty() && xSignatures->isLocationTrusted( aLocation ) ) { return allowMacroExecution(); } // at this point it is clear that the document is not in the secure location if ( nMacroExecutionMode == MacroExecMode::FROM_LIST_NO_WARN ) { return disallowMacroExecution(); } // check whether the document is signed with trusted certificate if ( nMacroExecutionMode != MacroExecMode::FROM_LIST ) { nSignatureState = m_xData->m_rDocumentAccess.getScriptingSignatureState(); if (!bHasValidContentSignature && (nMacroExecutionMode == MacroExecMode::FROM_LIST_AND_SIGNED_NO_WARN || nMacroExecutionMode == MacroExecMode::FROM_LIST_AND_SIGNED_WARN) && m_xData->m_rDocumentAccess.macroCallsSeenWhileLoading()) { // When macros are required to be signed, and the document has events which call // macros, the document content needs to be signed, too. Do it here, and avoid // possible UI asking to always trust certificates, after which the user's choice // to allow macros would be ignored anyway. m_xData->m_bHasUnsignedContentError = nSignatureState == SignatureState::OK || nSignatureState == SignatureState::NOTVALIDATED; return disallowMacroExecution(); } // At this point, the possible values of nMacroExecutionMode are: ALWAYS_EXECUTE, // FROM_LIST_AND_SIGNED_WARN (the default), FROM_LIST_AND_SIGNED_NO_WARN. // ALWAYS_EXECUTE corresponds to the Medium security level; it should ask for // confirmation when macros are unsigned or untrusted. FROM_LIST_AND_SIGNED_NO_WARN // should not ask any confirmations. FROM_LIST_AND_SIGNED_WARN should only allow // trusted signed macros at this point; so it may only ask for confirmation to add // certificates to trusted, and shouldn't show UI when trusted list is read-only. const bool bAllowUI = nMacroExecutionMode != MacroExecMode::FROM_LIST_AND_SIGNED_NO_WARN && eAutoConfirm == eNoAutoConfirm && (nMacroExecutionMode == MacroExecMode::ALWAYS_EXECUTE || !SvtSecurityOptions::IsReadOnly( SvtSecurityOptions::EOption::MacroTrustedAuthors)); const bool bHasTrustedMacroSignature = m_xData->m_rDocumentAccess.hasTrustedScriptingSignature(bAllowUI ? rxInteraction : nullptr); if (bHasTrustedMacroSignature) { // there is trusted macro signature, allow macro execution return allowMacroExecution(); } else if ( nSignatureState == SignatureState::OK || nSignatureState == SignatureState::NOTVALIDATED ) { // there is valid signature, but it is not from the trusted author if (eAutoConfirm == eAutoConfirmApprove && nMacroExecutionMode == MacroExecMode::ALWAYS_EXECUTE) { // For ALWAYS_EXECUTE + eAutoConfirmApprove (USE_CONFIG_APPROVE_CONFIRMATION // in Medium security mode), do not approve it right here; let Security Zone // check below do its job first. } else { // All other cases of valid but untrusted signatures should result in denied // macros here. This includes explicit reject from user in the UI in cases // of FROM_LIST_AND_SIGNED_WARN and ALWAYS_EXECUTE return disallowMacroExecution(); } } // Other values of nSignatureState would result in either rejected macros // (FROM_LIST_AND_SIGNED_*), or a confirmation. } } catch ( const Exception& ) { DBG_UNHANDLED_EXCEPTION("sfx.doc"); } // at this point it is clear that the document is neither in secure location nor signed with trusted certificate if ((nMacroExecutionMode == MacroExecMode::FROM_LIST_AND_SIGNED_NO_WARN) || (nMacroExecutionMode == MacroExecMode::FROM_LIST_AND_SIGNED_WARN)) { return disallowMacroExecution(); } #if defined(_WIN32) // Windows specific: try to decide macros loading depending on Windows Security Zones // (is the file local, or it was downloaded from internet, etc?) OUString sFilePath; osl::FileBase::getSystemPathFromFileURL(sURL, sFilePath); sal::systools::COMReference pZoneId; pZoneId.CoCreateInstance(CLSID_PersistentZoneIdentifier); sal::systools::COMReference pPersist(pZoneId, sal::systools::COM_QUERY); DWORD dwZone; if (!pPersist || !SUCCEEDED(pPersist->Load(o3tl::toW(sFilePath.getStr()), STGM_READ)) || !SUCCEEDED(pZoneId->GetId(&dwZone))) { // no Security Zone info found -> assume a local file, not // from the internet dwZone = URLZONE_LOCAL_MACHINE; } // determine action from zone and settings sal_Int32 nAction; switch (dwZone) { case URLZONE_LOCAL_MACHINE: nAction = officecfg::Office::Common::Security::Scripting::WindowsSecurityZone::ZoneLocal::get(); break; case URLZONE_INTRANET: nAction = officecfg::Office::Common::Security::Scripting::WindowsSecurityZone::ZoneIntranet::get(); break; case URLZONE_TRUSTED: nAction = officecfg::Office::Common::Security::Scripting::WindowsSecurityZone::ZoneTrusted::get(); break; case URLZONE_INTERNET: nAction = officecfg::Office::Common::Security::Scripting::WindowsSecurityZone::ZoneInternet::get(); break; case URLZONE_UNTRUSTED: nAction = officecfg::Office::Common::Security::Scripting::WindowsSecurityZone::ZoneUntrusted::get(); break; default: // unknown zone, let's ask the user nAction = 0; break; } // act on result switch (nAction) { case 0: // Ask break; case 1: // Allow if (nSignatureState != SignatureState::BROKEN && nSignatureState != SignatureState::INVALID) return allowMacroExecution(); break; case 2: // Deny return disallowMacroExecution(); } #endif // confirmation is required bool bSecure = false; if ( eAutoConfirm == eNoAutoConfirm ) { OUString sReferrer(sURL); osl::FileBase::getSystemPathFromFileURL(sReferrer, sReferrer); bSecure = lcl_showMacroWarning( rxInteraction, sReferrer ); } else bSecure = ( eAutoConfirm == eAutoConfirmApprove ); return ( bSecure ? allowMacroExecution() : disallowMacroExecution() ); } bool DocumentMacroMode::isMacroExecutionDisallowed() const { return m_xData->m_rDocumentAccess.getCurrentMacroExecMode() == MacroExecMode::NEVER_EXECUTE; } bool DocumentMacroMode::containerHasBasicMacros( const Reference< XLibraryContainer >& xContainer ) { bool bHasMacroLib = false; try { if ( xContainer.is() ) { // a library container exists; check if it's empty // if there are libraries except the "Standard" library // we assume that they are not empty (because they have been created by the user) if ( !xContainer->hasElements() ) bHasMacroLib = false; else { static constexpr OUStringLiteral aStdLibName( u"Standard" ); static constexpr OUStringLiteral aVBAProject( u"VBAProject" ); const Sequence< OUString > aElements = xContainer->getElementNames(); for( const OUString& aElement : aElements ) { if( aElement == aStdLibName || aElement == aVBAProject ) { Reference < XNameAccess > xLib; Any aAny = xContainer->getByName( aElement ); aAny >>= xLib; if ( xLib.is() && xLib->hasElements() ) return true; } else return true; } } } } catch( const Exception& ) { DBG_UNHANDLED_EXCEPTION("sfx.doc"); } return bHasMacroLib; } bool DocumentMacroMode::hasMacroLibrary() const { bool bHasMacroLib = false; #if HAVE_FEATURE_SCRIPTING try { Reference< XEmbeddedScripts > xScripts( m_xData->m_rDocumentAccess.getEmbeddedDocumentScripts() ); Reference< XLibraryContainer > xContainer; if ( xScripts.is() ) xContainer.set( xScripts->getBasicLibraries(), UNO_QUERY_THROW ); bHasMacroLib = containerHasBasicMacros( xContainer ); } catch( const Exception& ) { DBG_UNHANDLED_EXCEPTION("sfx.doc"); } #endif return bHasMacroLib; } bool DocumentMacroMode::hasUnsignedContentError() const { return m_xData->m_bHasUnsignedContentError; } bool DocumentMacroMode::storageHasMacros( const Reference< XStorage >& rxStorage ) { bool bHasMacros = false; if ( rxStorage.is() ) { try { static constexpr OUString s_sBasicStorageName( u"Basic"_ustr ); static constexpr OUString s_sScriptsStorageName( u"Scripts"_ustr ); bHasMacros =( ( rxStorage->hasByName( s_sBasicStorageName ) && rxStorage->isStorageElement( s_sBasicStorageName ) ) || ( rxStorage->hasByName( s_sScriptsStorageName ) && rxStorage->isStorageElement( s_sScriptsStorageName ) ) ); } catch ( const Exception& ) { DBG_UNHANDLED_EXCEPTION("sfx.doc"); } } return bHasMacros; } bool DocumentMacroMode::hasMacros() const { return m_xData->m_rDocumentAccess.documentStorageHasMacros() || hasMacroLibrary() || m_xData->m_rDocumentAccess.macroCallsSeenWhileLoading(); } bool DocumentMacroMode::checkMacrosOnLoading( const Reference< XInteractionHandler >& rxInteraction, bool bHasValidContentSignature, bool bHasMacros ) { bool bAllow = false; if ( SvtSecurityOptions::IsMacroDisabled() ) { // no macro should be executed at all bAllow = disallowMacroExecution(); } else { if (bHasMacros) { bAllow = adjustMacroMode( rxInteraction, bHasValidContentSignature ); } else if ( !isMacroExecutionDisallowed() ) { // if macros will be added by the user later, the security check is obsolete bAllow = allowMacroExecution(); } } return bAllow; } } // namespace sfx2 /* vim:set shiftwidth=4 softtabstop=4 expandtab: */