Session::logcheck("MenuIntelligence", "CorrelationDirectives"); require_once 'classes/Security.inc'; require_once 'include/category.php'; require_once 'include/groups.php'; require_once "include/utils.php"; ossim_valid($_GET["enable"], OSS_LETTER, OSS_DIGIT, OSS_SCORE, OSS_SPACE, OSS_NULLABLE, 'illegal:' . _("enable")); ossim_valid($_GET["disable"], OSS_LETTER, OSS_DIGIT, OSS_SCORE, OSS_SPACE, OSS_NULLABLE, 'illegal:' . _("disable")); ossim_valid($_GET["id"], OSS_DIGIT, OSS_SCORE, OSS_NULLABLE, 'illegal:' . _("id")); ossim_valid($_GET["directive"], OSS_DIGIT, OSS_NULLABLE, 'illegal:' . _("directive")); ossim_valid($_GET["xml_file"], OSS_ALPHA, OSS_DOT, OSS_SCORE, OSS_NULLABLE, 'illegal:' . _("xml_file")); ossim_valid($_GET["add"], OSS_DIGIT, OSS_NULLABLE, 'illegal:' . _("add")); if (ossim_error()) { die(ossim_error()); } if ($_GET["enable"] != "") { enable_category($_GET["enable"]); } if ($_GET["disable"] != "") { disable_category($_GET["disable"]); } init_groups(); init_categories(); $pattern = "/firefox/i"; $test = preg_match($pattern, $_SERVER['HTTP_USER_AGENT']); if ($test == 0) { $cols = "262,100%"; } else { $cols = "350,100%"; } ?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
} return $ret; } $action = GET('action'); $category_file = GET('xml_file'); $category_name = GET('name'); $query = POST('query'); ossim_valid($action, OSS_ALPHA, OSS_SCORE, OSS_NULLABLE, 'illegal:' . _("action")); ossim_valid($category_file, OSS_ALPHA, OSS_DOT, OSS_SCORE, OSS_NULLABLE, 'illegal:' . _("xml_file")); ossim_valid($category_name, OSS_LETTER, OSS_DIGIT, OSS_SCORE, OSS_SPACE, OSS_NULLABLE, 'illegal:' . _("name")); ossim_valid($query, OSS_TEXT, OSS_PUNC, OSS_NULLABLE, 'illegal:' . _("query")); if (ossim_error()) { die(ossim_error()); } if ($action == "enable_category") { enable_category($category_name, $category_file); } elseif ($action == "disable_category") { disable_category($category_name, $category_file); } init_groups(); init_categories(); $conf = $GLOBALS["CONF"]; $XML_FILE = '/etc/ossim/server/directives.xml'; $xml = domxml_open_file($XML_FILE, DOMXML_LOAD_SUBSTITUTE_ENTITIES); // Edit Disallowed categories $cannotedit = array("alienvault-attacks.xml" => 1, "alienvault-bruteforce.xml" => 1, "alienvault-dos.xml" => 1, "alienvault-malware.xml" => 1, "alienvault-misc.xml" => 1, "alienvault-network.xml" => 1, "alienvault-policy.xml" => 1, "alienvault-scada.xml" => 1, "alienvault-scan.xml" => 1, "alienvault-worms.xml" => 1, "abnormal.xml" => 1, "attacks.xml" => 1, "dos.xml" => 1, "generic.xml" => 1, "misc.xml" => 1, "network.xml" => 1, "scan.xml" => 1, "trojans.xml" => 1, "webattack.xml" => 1, "worms.xml" => 1); $categories = unserialize($_SESSION['categories']); $tab = $xml->get_elements_by_tagname('directive'); $search_results = array(); foreach ($tab as $lign) { $field = $lign->get_attribute('name');
$tab_file = file($filet); unlink($filet); $fic = fopen($filen, 'w'); foreach ($tab_file as $lign) { fwrite($fic, $lign); } fclose($fic); } } else { $categories = $dom->get_elements_by_tagname('categories'); $categories = $categories[0]; $categories->append_child($new_node); $dom->dump_file($file); } // modify directives.xml now enable_category(str_replace(" ", "-", $_POST["name"]), str_replace(" ", "_", $_POST["xml_file"])); echo "<html><body onload=\"top.frames['main'].document.location.href='../numbering.php'\"></body></html>"; } elseif ($query == "delete_category") { $file = '/etc/ossim/server/categories.xml'; if (!($dom = domxml_open_file($file, DOMXML_LOAD_SUBSTITUTE_ENTITIES))) { echo _("Error while parsing the document") . "\n"; exit; } $id = $_GET['id']; $category = get_category_by_id($id); $tab_category = $dom->get_elements_by_tagname('category'); foreach ($tab_category as $cat) { if ($cat->get_attribute('xml_file') == $category->xml_file) { $node = $cat; } }