office-gobmx/sfx2/source/doc/docmacromode.cxx
Mike Kaganski 7a73eedf00 Fix USE_CONFIG_APPROVE_CONFIRMATION and USE_CONFIG_REJECT_CONFIRMATION
They still showed UI in case of signed macros.
Two decisions were made, to improve security of USE_CONFIG_APPROVE_CONFIRMATION:
1. In case of High macro security mode, valid but untrusted certificate will be
   automatically rejected (because it is not safe to automatically add trusted
   certificates) - so in this mode, USE_CONFIG_APPROVE_CONFIRMATION is the same
   as USE_CONFIG_REJECT_CONFIRMATION;
2. In case of Medium macro security mode, valid but untrusted certificate will
   not automatically allow macros execution, but will proceed to the following
   checks - which on Windows will try to check the source's Security Zone, and
   may disallow macros based on that. Only after Security Zone check the macros
   will be automatically allowed.

Change-Id: I1a9c92c6b940b689599c5d106798ecfc691dad46
Reviewed-on: https://gerrit.libreoffice.org/c/core/+/159214
Tested-by: Jenkins
Reviewed-by: Mike Kaganski <mike.kaganski@collabora.com>
2023-11-09 18:37:26 +01:00

469 lines
19 KiB
C++

/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
/*
* This file is part of the LibreOffice project.
*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
*
* This file incorporates work covered by the following license notice:
*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed
* with this work for additional information regarding copyright
* ownership. The ASF licenses this file to you under the Apache
* License, Version 2.0 (the "License"); you may not use this file
* except in compliance with the License. You may obtain a copy of
* the License at http://www.apache.org/licenses/LICENSE-2.0 .
*/
#include <config_features.h>
#include <sfx2/docmacromode.hxx>
#include <sfx2/signaturestate.hxx>
#include <sfx2/docfile.hxx>
#include <com/sun/star/document/MacroExecMode.hpp>
#include <com/sun/star/task/ErrorCodeRequest.hpp>
#include <com/sun/star/task/DocumentMacroConfirmationRequest.hpp>
#include <com/sun/star/security/DocumentDigitalSignatures.hpp>
#include <com/sun/star/script/XLibraryContainer.hpp>
#include <com/sun/star/document/XEmbeddedScripts.hpp>
#include <comphelper/processfactory.hxx>
#include <framework/interaction.hxx>
#include <osl/file.hxx>
#include <unotools/securityoptions.hxx>
#include <svtools/sfxecode.hxx>
#include <comphelper/diagnose_ex.hxx>
#include <tools/urlobj.hxx>
#if defined(_WIN32)
#include <o3tl/char16_t2wchar_t.hxx>
#include <officecfg/Office/Common.hxx>
#include <systools/win32/comtools.hxx>
#include <urlmon.h>
#endif
namespace sfx2
{
using ::com::sun::star::uno::Reference;
using ::com::sun::star::task::XInteractionHandler;
using ::com::sun::star::uno::Any;
using ::com::sun::star::uno::Sequence;
using ::com::sun::star::task::DocumentMacroConfirmationRequest;
using ::com::sun::star::uno::Exception;
using ::com::sun::star::security::DocumentDigitalSignatures;
using ::com::sun::star::security::XDocumentDigitalSignatures;
using ::com::sun::star::embed::XStorage;
using ::com::sun::star::document::XEmbeddedScripts;
using ::com::sun::star::script::XLibraryContainer;
using ::com::sun::star::container::XNameAccess;
using ::com::sun::star::uno::UNO_QUERY_THROW;
namespace MacroExecMode = ::com::sun::star::document::MacroExecMode;
//= DocumentMacroMode_Data
struct DocumentMacroMode_Data
{
IMacroDocumentAccess& m_rDocumentAccess;
bool m_bHasUnsignedContentError;
explicit DocumentMacroMode_Data( IMacroDocumentAccess& rDocumentAccess )
:m_rDocumentAccess( rDocumentAccess )
,m_bHasUnsignedContentError( false )
{
}
};
namespace
{
bool lcl_showMacroWarning( const Reference< XInteractionHandler >& rxHandler,
const OUString& rDocumentLocation )
{
DocumentMacroConfirmationRequest aRequest;
aRequest.DocumentURL = rDocumentLocation;
return SfxMedium::CallApproveHandler( rxHandler, Any( aRequest ), true );
}
}
//= DocumentMacroMode
DocumentMacroMode::DocumentMacroMode( IMacroDocumentAccess& rDocumentAccess )
:m_xData( std::make_shared<DocumentMacroMode_Data>( rDocumentAccess ) )
{
}
bool DocumentMacroMode::allowMacroExecution()
{
m_xData->m_rDocumentAccess.setCurrentMacroExecMode( MacroExecMode::ALWAYS_EXECUTE_NO_WARN );
return true;
}
bool DocumentMacroMode::disallowMacroExecution()
{
m_xData->m_rDocumentAccess.setCurrentMacroExecMode( MacroExecMode::NEVER_EXECUTE );
return false;
}
bool DocumentMacroMode::adjustMacroMode( const Reference< XInteractionHandler >& rxInteraction, bool bHasValidContentSignature )
{
if ( SvtSecurityOptions::IsMacroDisabled() )
{
// no macro should be executed at all
return disallowMacroExecution();
}
// get setting from configuration if required
enum AutoConfirmation
{
eNoAutoConfirm,
eAutoConfirmApprove,
eAutoConfirmReject
};
AutoConfirmation eAutoConfirm( eNoAutoConfirm );
sal_Int16 nMacroExecutionMode = m_xData->m_rDocumentAccess.getCurrentMacroExecMode();
if ( ( nMacroExecutionMode == MacroExecMode::USE_CONFIG )
|| ( nMacroExecutionMode == MacroExecMode::USE_CONFIG_REJECT_CONFIRMATION )
|| ( nMacroExecutionMode == MacroExecMode::USE_CONFIG_APPROVE_CONFIRMATION )
)
{
// check confirm first, as nMacroExecutionMode is always overwritten by the GetMacroSecurityLevel() switch
if (nMacroExecutionMode == MacroExecMode::USE_CONFIG_REJECT_CONFIRMATION)
eAutoConfirm = eAutoConfirmReject;
else if (nMacroExecutionMode == MacroExecMode::USE_CONFIG_APPROVE_CONFIRMATION)
eAutoConfirm = eAutoConfirmApprove;
switch ( SvtSecurityOptions::GetMacroSecurityLevel() )
{
case 3: // "Very high"
nMacroExecutionMode = MacroExecMode::FROM_LIST_NO_WARN;
break;
case 2: // "High"
nMacroExecutionMode = MacroExecMode::FROM_LIST_AND_SIGNED_WARN;
break;
case 1: // "Medium"
nMacroExecutionMode = MacroExecMode::ALWAYS_EXECUTE;
break;
case 0: // "Low"
nMacroExecutionMode = MacroExecMode::ALWAYS_EXECUTE_NO_WARN;
break;
default:
OSL_FAIL( "DocumentMacroMode::adjustMacroMode: unexpected macro security level!" );
nMacroExecutionMode = MacroExecMode::NEVER_EXECUTE;
}
}
if ( nMacroExecutionMode == MacroExecMode::NEVER_EXECUTE )
return disallowMacroExecution();
if ( nMacroExecutionMode == MacroExecMode::ALWAYS_EXECUTE_NO_WARN )
return allowMacroExecution();
SignatureState nSignatureState = SignatureState::UNKNOWN;
const OUString sURL(m_xData->m_rDocumentAccess.getDocumentLocation());
try
{
// get document location from medium name and check whether it is a trusted one
// the service is created without document version, since it is not of interest here
Reference< XDocumentDigitalSignatures > xSignatures(DocumentDigitalSignatures::createDefault(::comphelper::getProcessComponentContext()));
INetURLObject aURLReferer(sURL);
OUString aLocation = aURLReferer.GetMainURL( INetURLObject::DecodeMechanism::NONE );
if ( !aLocation.isEmpty() && xSignatures->isLocationTrusted( aLocation ) )
{
return allowMacroExecution();
}
// at this point it is clear that the document is not in the secure location
if ( nMacroExecutionMode == MacroExecMode::FROM_LIST_NO_WARN )
{
return disallowMacroExecution();
}
// check whether the document is signed with trusted certificate
if ( nMacroExecutionMode != MacroExecMode::FROM_LIST )
{
nSignatureState = m_xData->m_rDocumentAccess.getScriptingSignatureState();
if (!bHasValidContentSignature
&& (nMacroExecutionMode == MacroExecMode::FROM_LIST_AND_SIGNED_NO_WARN
|| nMacroExecutionMode == MacroExecMode::FROM_LIST_AND_SIGNED_WARN)
&& m_xData->m_rDocumentAccess.macroCallsSeenWhileLoading())
{
// When macros are required to be signed, and the document has events which call
// macros, the document content needs to be signed, too. Do it here, and avoid
// possible UI asking to always trust certificates, after which the user's choice
// to allow macros would be ignored anyway.
m_xData->m_bHasUnsignedContentError
= nSignatureState == SignatureState::OK
|| nSignatureState == SignatureState::NOTVALIDATED;
return disallowMacroExecution();
}
// At this point, the possible values of nMacroExecutionMode are: ALWAYS_EXECUTE,
// FROM_LIST_AND_SIGNED_WARN (the default), FROM_LIST_AND_SIGNED_NO_WARN.
// ALWAYS_EXECUTE corresponds to the Medium security level; it should ask for
// confirmation when macros are unsigned or untrusted. FROM_LIST_AND_SIGNED_NO_WARN
// should not ask any confirmations. FROM_LIST_AND_SIGNED_WARN should only allow
// trusted signed macros at this point; so it may only ask for confirmation to add
// certificates to trusted, and shouldn't show UI when trusted list is read-only.
const bool bAllowUI
= nMacroExecutionMode != MacroExecMode::FROM_LIST_AND_SIGNED_NO_WARN
&& eAutoConfirm == eNoAutoConfirm
&& (nMacroExecutionMode == MacroExecMode::ALWAYS_EXECUTE
|| !SvtSecurityOptions::IsReadOnly(
SvtSecurityOptions::EOption::MacroTrustedAuthors));
const bool bHasTrustedMacroSignature = m_xData->m_rDocumentAccess.hasTrustedScriptingSignature(bAllowUI ? rxInteraction : nullptr);
if (bHasTrustedMacroSignature)
{
// there is trusted macro signature, allow macro execution
return allowMacroExecution();
}
else if ( nSignatureState == SignatureState::OK
|| nSignatureState == SignatureState::NOTVALIDATED )
{
// there is valid signature, but it is not from the trusted author
if (eAutoConfirm == eAutoConfirmApprove
&& nMacroExecutionMode == MacroExecMode::ALWAYS_EXECUTE)
{
// For ALWAYS_EXECUTE + eAutoConfirmApprove (USE_CONFIG_APPROVE_CONFIRMATION
// in Medium security mode), do not approve it right here; let Security Zone
// check below do its job first.
}
else
{
// All other cases of valid but untrusted signatures should result in denied
// macros here. This includes explicit reject from user in the UI in cases
// of FROM_LIST_AND_SIGNED_WARN and ALWAYS_EXECUTE
return disallowMacroExecution();
}
}
// Other values of nSignatureState would result in either rejected macros
// (FROM_LIST_AND_SIGNED_*), or a confirmation.
}
}
catch ( const Exception& )
{
DBG_UNHANDLED_EXCEPTION("sfx.doc");
}
// at this point it is clear that the document is neither in secure location nor signed with trusted certificate
if ((nMacroExecutionMode == MacroExecMode::FROM_LIST_AND_SIGNED_NO_WARN)
|| (nMacroExecutionMode == MacroExecMode::FROM_LIST_AND_SIGNED_WARN))
{
return disallowMacroExecution();
}
#if defined(_WIN32)
// Windows specific: try to decide macros loading depending on Windows Security Zones
// (is the file local, or it was downloaded from internet, etc?)
OUString sFilePath;
osl::FileBase::getSystemPathFromFileURL(sURL, sFilePath);
sal::systools::COMReference<IZoneIdentifier> pZoneId;
pZoneId.CoCreateInstance(CLSID_PersistentZoneIdentifier);
sal::systools::COMReference<IPersistFile> pPersist(pZoneId, sal::systools::COM_QUERY);
DWORD dwZone;
if (!pPersist || !SUCCEEDED(pPersist->Load(o3tl::toW(sFilePath.getStr()), STGM_READ)) ||
!SUCCEEDED(pZoneId->GetId(&dwZone)))
{
// no Security Zone info found -> assume a local file, not
// from the internet
dwZone = URLZONE_LOCAL_MACHINE;
}
// determine action from zone and settings
sal_Int32 nAction;
switch (dwZone) {
case URLZONE_LOCAL_MACHINE:
nAction = officecfg::Office::Common::Security::Scripting::WindowsSecurityZone::ZoneLocal::get();
break;
case URLZONE_INTRANET:
nAction = officecfg::Office::Common::Security::Scripting::WindowsSecurityZone::ZoneIntranet::get();
break;
case URLZONE_TRUSTED:
nAction = officecfg::Office::Common::Security::Scripting::WindowsSecurityZone::ZoneTrusted::get();
break;
case URLZONE_INTERNET:
nAction = officecfg::Office::Common::Security::Scripting::WindowsSecurityZone::ZoneInternet::get();
break;
case URLZONE_UNTRUSTED:
nAction = officecfg::Office::Common::Security::Scripting::WindowsSecurityZone::ZoneUntrusted::get();
break;
default:
// unknown zone, let's ask the user
nAction = 0;
break;
}
// act on result
switch (nAction)
{
case 0: // Ask
break;
case 1: // Allow
if (nSignatureState != SignatureState::BROKEN
&& nSignatureState != SignatureState::INVALID)
return allowMacroExecution();
break;
case 2: // Deny
return disallowMacroExecution();
}
#endif
// confirmation is required
bool bSecure = false;
if ( eAutoConfirm == eNoAutoConfirm )
{
OUString sReferrer(sURL);
osl::FileBase::getSystemPathFromFileURL(sReferrer, sReferrer);
bSecure = lcl_showMacroWarning( rxInteraction, sReferrer );
}
else
bSecure = ( eAutoConfirm == eAutoConfirmApprove );
return ( bSecure ? allowMacroExecution() : disallowMacroExecution() );
}
bool DocumentMacroMode::isMacroExecutionDisallowed() const
{
return m_xData->m_rDocumentAccess.getCurrentMacroExecMode() == MacroExecMode::NEVER_EXECUTE;
}
bool DocumentMacroMode::containerHasBasicMacros( const Reference< XLibraryContainer >& xContainer )
{
bool bHasMacroLib = false;
try
{
if ( xContainer.is() )
{
// a library container exists; check if it's empty
// if there are libraries except the "Standard" library
// we assume that they are not empty (because they have been created by the user)
if ( !xContainer->hasElements() )
bHasMacroLib = false;
else
{
static constexpr OUStringLiteral aStdLibName( u"Standard" );
static constexpr OUStringLiteral aVBAProject( u"VBAProject" );
const Sequence< OUString > aElements = xContainer->getElementNames();
for( const OUString& aElement : aElements )
{
if( aElement == aStdLibName || aElement == aVBAProject )
{
Reference < XNameAccess > xLib;
Any aAny = xContainer->getByName( aElement );
aAny >>= xLib;
if ( xLib.is() && xLib->hasElements() )
return true;
}
else
return true;
}
}
}
}
catch( const Exception& )
{
DBG_UNHANDLED_EXCEPTION("sfx.doc");
}
return bHasMacroLib;
}
bool DocumentMacroMode::hasMacroLibrary() const
{
bool bHasMacroLib = false;
#if HAVE_FEATURE_SCRIPTING
try
{
Reference< XEmbeddedScripts > xScripts( m_xData->m_rDocumentAccess.getEmbeddedDocumentScripts() );
Reference< XLibraryContainer > xContainer;
if ( xScripts.is() )
xContainer.set( xScripts->getBasicLibraries(), UNO_QUERY_THROW );
bHasMacroLib = containerHasBasicMacros( xContainer );
}
catch( const Exception& )
{
DBG_UNHANDLED_EXCEPTION("sfx.doc");
}
#endif
return bHasMacroLib;
}
bool DocumentMacroMode::hasUnsignedContentError() const
{
return m_xData->m_bHasUnsignedContentError;
}
bool DocumentMacroMode::storageHasMacros( const Reference< XStorage >& rxStorage )
{
bool bHasMacros = false;
if ( rxStorage.is() )
{
try
{
static constexpr OUString s_sBasicStorageName( u"Basic"_ustr );
static constexpr OUString s_sScriptsStorageName( u"Scripts"_ustr );
bHasMacros =( ( rxStorage->hasByName( s_sBasicStorageName )
&& rxStorage->isStorageElement( s_sBasicStorageName )
)
|| ( rxStorage->hasByName( s_sScriptsStorageName )
&& rxStorage->isStorageElement( s_sScriptsStorageName )
)
);
}
catch ( const Exception& )
{
DBG_UNHANDLED_EXCEPTION("sfx.doc");
}
}
return bHasMacros;
}
bool DocumentMacroMode::hasMacros() const
{
return m_xData->m_rDocumentAccess.documentStorageHasMacros() || hasMacroLibrary() || m_xData->m_rDocumentAccess.macroCallsSeenWhileLoading();
}
bool DocumentMacroMode::checkMacrosOnLoading( const Reference< XInteractionHandler >& rxInteraction, bool bHasValidContentSignature, bool bHasMacros )
{
bool bAllow = false;
if ( SvtSecurityOptions::IsMacroDisabled() )
{
// no macro should be executed at all
bAllow = disallowMacroExecution();
}
else
{
if (bHasMacros)
{
bAllow = adjustMacroMode( rxInteraction, bHasValidContentSignature );
}
else if ( !isMacroExecutionDisallowed() )
{
// if macros will be added by the user later, the security check is obsolete
bAllow = allowMacroExecution();
}
}
return bAllow;
}
} // namespace sfx2
/* vim:set shiftwidth=4 softtabstop=4 expandtab: */