index.php 1.2 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152
  1. <?php
  2. use function Hestiacp\quoteshellarg\quoteshellarg;
  3. ob_start();
  4. include $_SERVER["DOCUMENT_ROOT"] . "/inc/main.php";
  5. // Check token
  6. verify_csrf($_POST);
  7. if ($_SESSION["userContext"] === "admin" && !empty($_GET["user"])) {
  8. $user = quoteshellarg($_GET["user"]);
  9. $user_plain = $_GET["user"];
  10. }
  11. // Checks if API access is enabled
  12. $api_status =
  13. !empty($_SESSION["API_SYSTEM"]) && is_numeric($_SESSION["API_SYSTEM"])
  14. ? $_SESSION["API_SYSTEM"]
  15. : 0;
  16. if (($user_plain == "admin" && $api_status < 1) || ($user_plain != "admin" && $api_status < 2)) {
  17. header("Location: /edit/user/");
  18. exit();
  19. }
  20. $key = $_POST["key"];
  21. $action = $_POST["action"];
  22. switch ($action) {
  23. case "delete":
  24. $cmd = "v-delete-access-key";
  25. break;
  26. default:
  27. header("Location: /list/access-key/");
  28. exit();
  29. }
  30. foreach ($key as $value) {
  31. $v_key = quoteshellarg(trim($value));
  32. // Key data
  33. exec(HESTIA_CMD . "v-list-access-key " . $v_key . " json", $output, $return_var);
  34. $key_data = json_decode(implode("", $output), true);
  35. unset($output);
  36. if (!empty($key_data) && $key_data["USER"] == $user_plain) {
  37. exec(HESTIA_CMD . $cmd . " " . $v_key, $output, $return_var);
  38. unset($output);
  39. }
  40. }
  41. header("Location: /list/access-key/");