index.php 8.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225
  1. <?php
  2. define('NO_AUTH_REQUIRED',true);
  3. // Main include
  4. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  5. $TAB = 'login';
  6. // Logout
  7. if (isset($_GET['logout'])) {
  8. setcookie('limit2fa','',time() - 3600,"/");
  9. session_destroy();
  10. }
  11. // Login as someone else
  12. if (isset($_SESSION['user'])) {
  13. if (empty($_GET['loginas']) ){
  14. header("Location: /list/web/");
  15. exit;
  16. }
  17. if ($_SESSION['user'] == 'admin' && !empty($_GET['loginas'])) {
  18. exec (HESTIA_CMD . "v-list-user ".escapeshellarg($_GET['loginas'])." json", $output, $return_var);
  19. if ( $return_var == 0 ) {
  20. $data = json_decode(implode('', $output), true);
  21. reset($data);
  22. $_SESSION['look'] = key($data);
  23. $_SESSION['look_alert'] = 'yes';
  24. # Remove current path for filemanager
  25. unset($_SESSION['_sf2_attributes']);
  26. unset($_SESSION['_sf2_meta']);
  27. }
  28. }
  29. if ($_SESSION['user'] == 'admin' && empty($_GET['loginas'])) {
  30. header("Location: /list/user/");
  31. } else {
  32. header("Location: /list/web/");
  33. }
  34. exit;
  35. }
  36. function authenticate_user($user, $password, $twofa = ''){
  37. unset($_SESSION['login']);
  38. if(isset($_SESSION['token']) && isset($_POST['token']) && $_POST['token'] == $_SESSION['token']) {
  39. $v_user = escapeshellarg($user);
  40. $ip = $_SERVER['REMOTE_ADDR'];
  41. if(isset($_SERVER['HTTP_CF_CONNECTING_IP'])){
  42. if(!empty($_SERVER['HTTP_CF_CONNECTING_IP'])){
  43. $ip = $_SERVER['HTTP_CF_CONNECTING_IP'];
  44. }
  45. }
  46. $v_ip = escapeshellarg($ip);
  47. // Get user's salt
  48. $output = '';
  49. exec (HESTIA_CMD."v-get-user-salt ".$v_user." ".$v_ip." json" , $output, $return_var);
  50. $pam = json_decode(implode('', $output), true);
  51. if ( $return_var > 0 ) {
  52. sleep(2);
  53. $error = "<a class=\"error\">"._('Invalid username or password')."</a>";
  54. return $error;
  55. } else {
  56. $salt = $pam[$user]['SALT'];
  57. $method = $pam[$user]['METHOD'];
  58. if ($method == 'md5' ) {
  59. $hash = crypt($password, '$1$'.$salt.'$');
  60. }
  61. if ($method == 'sha-512' ) {
  62. $hash = crypt($password, '$6$rounds=5000$'.$salt.'$');
  63. $hash = str_replace('$rounds=5000','',$hash);
  64. }
  65. if ($method == 'des' ) {
  66. $hash = crypt($password, $salt);
  67. }
  68. // Send hash via tmp file
  69. $v_hash = exec('mktemp -p /tmp');
  70. $fp = fopen($v_hash, "w");
  71. fwrite($fp, $hash."\n");
  72. fclose($fp);
  73. // Check user hash
  74. exec(HESTIA_CMD ."v-check-user-hash ".$v_user." ".$v_hash." ".$v_ip, $output, $return_var);
  75. unset($output);
  76. // Remove tmp file
  77. unlink($v_hash);
  78. // Check API answer
  79. if ( $return_var > 0 ) {
  80. sleep(2);
  81. $error = "<a class=\"error\">"._('Invalid username or password')."</a>";
  82. $v_murmur = escapeshellarg($_POST['murmur']);
  83. exec(HESTIA_CMD."v-log-user-login ".$v_user." ".$v_ip." failed ".$v_murmur, $output, $return_var);
  84. return $error;
  85. } else {
  86. // Get user speciefic parameters
  87. exec (HESTIA_CMD . "v-list-user ".$v_user." json", $output, $return_var);
  88. $data = json_decode(implode('', $output), true);
  89. unset($output);
  90. if ($data[$user]['TWOFA'] != '') {
  91. if(empty($twofa)){
  92. $_SESSION['login']['username'] = $user;
  93. $_SESSION['login']['password'] = $password;
  94. return false;
  95. }else{
  96. $v_twofa = escapeshellarg($twofa);
  97. exec(HESTIA_CMD ."v-check-user-2fa ".$v_user." ".$v_twofa, $output, $return_var);
  98. unset($output);
  99. if ( $return_var > 0 ) {
  100. sleep(2);
  101. $error = "<a class=\"error\">"._('Invalid or missing 2FA token')."</a>";
  102. $_SESSION['login']['username'] = $user;
  103. $_SESSION['login']['password'] = $password;
  104. $v_murmur = escapeshellarg($_POST['murmur']);
  105. exec(HESTIA_CMD."v-log-user-login ".$v_user." ".$v_ip." failed ".$v_murmur, $output, $return_var);
  106. return $error;
  107. unset($_POST['twofa']);
  108. }
  109. }
  110. }
  111. if ($data[$user]['ROLE'] == 'admin'){
  112. exec (HESTIA_CMD . "v-list-user admin json", $output, $return_var);
  113. $data = json_decode(implode('', $output), true);
  114. unset($output);
  115. }
  116. // Define session user
  117. $_SESSION['user'] = key($data);
  118. $v_user = $_SESSION['user'];
  119. //log successfull login attempt
  120. $v_murmur = escapeshellarg($_POST['murmur']);
  121. exec(HESTIA_CMD."v-log-user-login ".$v_user." ".$v_ip." success ".$v_murmur, $output, $return_var);
  122. $_SESSION['LAST_ACTIVITY'] = time();
  123. $_SESSION['MURMUR'] = $_POST['murmur'];
  124. // Define language
  125. $output = '';
  126. exec (HESTIA_CMD."v-list-sys-languages json", $output, $return_var);
  127. $languages = json_decode(implode('', $output), true);
  128. if (in_array($data[$v_user]['LANGUAGE'], $languages)){
  129. $_SESSION['language'] = $data[$user]['LANGUAGE'];
  130. } else {
  131. $_SESSION['language'] = 'en';
  132. }
  133. // Regenerate session id to prevent session fixation
  134. session_regenerate_id();
  135. // Redirect request to control panel interface
  136. if (!empty($_SESSION['request_uri'])) {
  137. header("Location: ".$_SESSION['request_uri']);
  138. unset($_SESSION['request_uri']);
  139. exit;
  140. } else {
  141. if ($user == 'admin') {
  142. header("Location: /list/user/");
  143. } else {
  144. header("Location: /list/web/");
  145. }
  146. exit;
  147. }
  148. }
  149. }
  150. } else {
  151. unset($_POST);
  152. unset($_GET);
  153. unset($_SESSION);
  154. session_destroy();
  155. session_start();
  156. return false;
  157. }
  158. }
  159. if (!empty($_SESSION['login']['username']) && !empty($_SESSION['login']['password']) && !empty($_POST['twofa'])){
  160. $error = authenticate_user($_SESSION['login']['username'], $_SESSION['login']['password'], $_POST['twofa']);
  161. unset($_POST);
  162. } else if (!empty($_POST['user']) && !empty($_POST['password'])) {
  163. $error = authenticate_user($_POST['user'], $_POST['password']);
  164. unset($_POST);
  165. }else{
  166. unset($_SESSION['login']);
  167. }
  168. // Check system configuration
  169. load_hestia_config();
  170. // Detect language
  171. if (empty($_SESSION['language'])) {
  172. $output = '';
  173. exec (HESTIA_CMD."v-list-sys-config json", $output, $return_var);
  174. $config = json_decode(implode('', $output), true);
  175. $lang = $config['config']['LANGUAGE'];
  176. $output = '';
  177. exec (HESTIA_CMD."v-list-sys-languages json", $output, $return_var);
  178. $languages = json_decode(implode('', $output), true);
  179. if(in_array($lang, $languages)){
  180. $_SESSION['language'] = $lang;
  181. }
  182. else {
  183. $_SESSION['language'] = 'en';
  184. }
  185. }
  186. // Generate CSRF token
  187. $_SESSION['token'] = md5(uniqid(mt_rand(), true));
  188. require_once('../templates/header.html');
  189. if(!empty($_SESSION['login'])){
  190. require_once('../templates/login_2.html');
  191. }else if (empty($_POST['user'])) {
  192. if($_SESSION['LOGIN_STYLE'] == 'old'){
  193. require_once('../templates/login_a.html');
  194. }else{
  195. require_once('../templates/login.html');
  196. }
  197. }else if (empty($_POST['password'])) {
  198. require_once('../templates/login_1.html');
  199. }else{
  200. if($_SESSION['LOGIN_STYLE'] == 'old'){
  201. require_once('../templates/login_a.html');
  202. }else{
  203. require_once('../templates/login.html');
  204. }
  205. }
  206. ?>