|
|
@@ -1,7 +1,6 @@
|
|
|
<?php
|
|
|
|
|
|
define('NO_AUTH_REQUIRED',true);
|
|
|
-
|
|
|
// Main include
|
|
|
include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
|
|
|
|
|
|
@@ -9,11 +8,10 @@ $TAB = 'login';
|
|
|
|
|
|
// Logout
|
|
|
if (isset($_GET['logout'])) {
|
|
|
+ setcookie('limit2fa','',time() - 3600,"/");
|
|
|
session_destroy();
|
|
|
}
|
|
|
|
|
|
-
|
|
|
-
|
|
|
// Login as someone else
|
|
|
if (isset($_SESSION['user'])) {
|
|
|
if (empty($_GET['loginas']) ){
|
|
|
@@ -41,14 +39,14 @@ function authenticate_user($user, $password, $twofa = ''){
|
|
|
unset($_SESSION['login']);
|
|
|
if(isset($_SESSION['token']) && isset($_POST['token']) && $_POST['token'] == $_SESSION['token']) {
|
|
|
$v_user = escapeshellarg($user);
|
|
|
- $v_ip = escapeshellarg($_SERVER['REMOTE_ADDR']);
|
|
|
+ $ip = $_SERVER['REMOTE_ADDR'];
|
|
|
if(isset($_SERVER['HTTP_CF_CONNECTING_IP'])){
|
|
|
if(!empty($_SERVER['HTTP_CF_CONNECTING_IP'])){
|
|
|
- $v_ip = escapeshellarg($_SERVER['HTTP_CF_CONNECTING_IP']);
|
|
|
+ $ip = $_SERVER['HTTP_CF_CONNECTING_IP'];
|
|
|
}
|
|
|
- }
|
|
|
-
|
|
|
- // Get user's salt
|
|
|
+ }
|
|
|
+ $v_ip = escapeshellarg($ip);
|
|
|
+ // Get user's salt
|
|
|
$output = '';
|
|
|
exec (HESTIA_CMD."v-get-user-salt ".$v_user." ".$v_ip." json" , $output, $return_var);
|
|
|
$pam = json_decode(implode('', $output), true);
|
|
|
@@ -90,30 +88,28 @@ function authenticate_user($user, $password, $twofa = ''){
|
|
|
$error = "<a class=\"error\">"._('Invalid username or password')."</a>";
|
|
|
return $error;
|
|
|
} else {
|
|
|
+
|
|
|
// Get user speciefic parameters
|
|
|
exec (HESTIA_CMD . "v-list-user ".$v_user." json", $output, $return_var);
|
|
|
$data = json_decode(implode('', $output), true);
|
|
|
- unset($output);
|
|
|
- // Check if 2FA is active
|
|
|
if ($data[$user]['TWOFA'] != '') {
|
|
|
- if (empty($twofa)){
|
|
|
- $_SESSION['login']['username'] = $user;
|
|
|
- $_SESSION['login']['password'] = $password;
|
|
|
+ if(empty($_POST['twofa'])){
|
|
|
return false;
|
|
|
- } else {
|
|
|
- $v_twofa = escapeshellarg($twofa);
|
|
|
- exec(HESTIA_CMD ."v-check-user-2fa ".$v_user." ".$v_twofa, $output, $return_var);
|
|
|
- unset($output);
|
|
|
- if ( $return_var > 0 ) {
|
|
|
- //sleep(2);
|
|
|
- $error = "<a class=\"error\">"._('Invalid or missing 2FA token')."</a>";
|
|
|
- $_SESSION['login']['username'] = $user;
|
|
|
- $_SESSION['login']['password'] = $password;
|
|
|
- return $error;
|
|
|
+ }else{
|
|
|
+ $v_twofa = $_POST['twofa'];
|
|
|
+ exec(HESTIA_CMD ."v-check-user-2fa ".$v_user." ".$v_twofa, $output, $return_var);
|
|
|
+ unset($output);
|
|
|
+ if ( $return_var > 0 ) {
|
|
|
+ sleep(2);
|
|
|
+ $error = "<a class=\"error\">"._('Invalid or missing 2FA token')."</a>";
|
|
|
+ $_SESSION['login']['username'] = $user;
|
|
|
+ $_SESSION['login']['password'] = $password;
|
|
|
+ return $error;
|
|
|
+ unset($_POST['twofa']);
|
|
|
+ }
|
|
|
}
|
|
|
- }
|
|
|
}
|
|
|
-
|
|
|
+
|
|
|
if ($data[$user]['ROLE'] == 'admin'){
|
|
|
exec (HESTIA_CMD . "v-list-user admin json", $output, $return_var);
|
|
|
$data = json_decode(implode('', $output), true);
|
|
|
@@ -122,6 +118,12 @@ function authenticate_user($user, $password, $twofa = ''){
|
|
|
// Define session user
|
|
|
$_SESSION['user'] = key($data);
|
|
|
$v_user = $_SESSION['user'];
|
|
|
+ //log successfull login attempt
|
|
|
+ $v_murmur = escapeshellarg($_POST['murmur']);
|
|
|
+ exec(HESTIA_CMD."v-log-user-login ".$v_user." ".$v_ip." ".$v_murmur, $output, $return_var);
|
|
|
+
|
|
|
+ $_SESSION['LAST_ACTIVITY'] = time();
|
|
|
+ $_SESSION['MURMUR'] = $_POST['murmur'];
|
|
|
|
|
|
// Define language
|
|
|
$output = '';
|
|
|
@@ -132,7 +134,6 @@ function authenticate_user($user, $password, $twofa = ''){
|
|
|
} else {
|
|
|
$_SESSION['language'] = 'en';
|
|
|
}
|
|
|
-
|
|
|
// Regenerate session id to prevent session fixation
|
|
|
session_regenerate_id();
|
|
|
|
|
|
@@ -161,11 +162,11 @@ function authenticate_user($user, $password, $twofa = ''){
|
|
|
}
|
|
|
}
|
|
|
if (!empty($_SESSION['login']['username']) && !empty($_SESSION['login']['password']) && !empty($_POST['twofa'])){
|
|
|
- $error = authenticate_user($_SESSION['login']['username'], $_SESSION['login']['password'], $_POST['twofa']);
|
|
|
+ $error = authenticate_user($_SESSION['login']['username'], $_SESSION['login']['password'], $_POST['twofa']);
|
|
|
unset($_POST);
|
|
|
} else if (!empty($_POST['user']) && !empty($_POST['password'])) {
|
|
|
- $error = authenticate_user($_POST['user'], $_POST['password']);
|
|
|
- unset($_POST);
|
|
|
+ $error = authenticate_user($_POST['user'], $_POST['password']);
|
|
|
+ unset($_POST);
|
|
|
}else{
|
|
|
unset($_SESSION['login']);
|
|
|
}
|
|
|
@@ -195,20 +196,20 @@ $_SESSION['token'] = md5(uniqid(mt_rand(), true));
|
|
|
|
|
|
require_once('../templates/header.html');
|
|
|
if(!empty($_SESSION['login'])){
|
|
|
- require_once('../templates/login_2.html');
|
|
|
+ require_once('../templates/login_2.html');
|
|
|
}else if (empty($_POST['user'])) {
|
|
|
if($_SESSION['LOGIN_STYLE'] == 'old'){
|
|
|
- require_once('../templates/login_a.html');
|
|
|
+ require_once('../templates/login_a.html');
|
|
|
}else{
|
|
|
- require_once('../templates/login.html');
|
|
|
+ require_once('../templates/login.html');
|
|
|
}
|
|
|
}else if (empty($_POST['password'])) {
|
|
|
require_once('../templates/login_1.html');
|
|
|
}else{
|
|
|
if($_SESSION['LOGIN_STYLE'] == 'old'){
|
|
|
- require_once('../templates/login_a.html');
|
|
|
+ require_once('../templates/login_a.html');
|
|
|
}else{
|
|
|
- require_once('../templates/login.html');
|
|
|
+ require_once('../templates/login.html');
|
|
|
}
|
|
|
}
|
|
|
?>
|