index.php 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307
  1. <?php
  2. define('NO_AUTH_REQUIRED',true);
  3. // Main include
  4. include($_SERVER['DOCUMENT_ROOT'] . '/inc/main.php');
  5. $TAB = 'login';
  6. /*
  7. // Logout
  8. if (isset($_GET['logout'])) {
  9. setcookie('limit2fa','',time() - 3600,"/");
  10. session_destroy();
  11. }
  12. */
  13. /* ACTIONS FOR CURRENT USER SESSION */
  14. if (isset($_SESSION['user'])) {
  15. // User impersonation
  16. // Allow administrators to view and manipulate contents of other user accounts
  17. if (($_SESSION['userContext'] === 'admin') && (!empty($_GET['loginas']))) {
  18. // Ensure token is passed and matches before granting user impersonation access
  19. if ((!$_GET['token']) || ($_SESSION['token'] != $_GET['token'])) {
  20. header('location: /list/user/');
  21. exit();
  22. } else {
  23. $v_user = escapeshellarg($_GET['loginas']);
  24. $v_impersonator = escapeshellarg($_SESSION['user']);
  25. exec (HESTIA_CMD . "v-list-user ".$v_user." json", $output, $return_var);
  26. if ( $return_var == 0 ) {
  27. $data = json_decode(implode('', $output), true);
  28. reset($data);
  29. $_SESSION['look'] = key($data);
  30. // Log impersonation events
  31. exec (HESTIA_CMD . 'v-log-action ' . $v_impersonator . " 'Info' 'Security' 'Logged in as another user (User: $v_user)'", $output, $return_var);
  32. exec (HESTIA_CMD . "v-log-action system 'Warning' 'Security' 'User impersonation session started (User: $v_user, Administrator: $v_impersonator)'", $output, $return_var);
  33. // Reset account details for File Manager to impersonated user
  34. unset($_SESSION['_sf2_attributes']);
  35. unset($_SESSION['_sf2_meta']);
  36. header('Location: /login/');
  37. }
  38. }
  39. exit;
  40. }
  41. // Set view based on account properties
  42. if (empty($_GET['loginas'])) {
  43. // Default view to Users list for administrator accounts
  44. if (($_SESSION['userContext'] === 'admin') && (!isset($_SESSION['look']))) {
  45. header('Location: /list/user/');
  46. exit;
  47. }
  48. // Obtain account properties
  49. $v_user = escapeshellarg($_SESSION[(($_SESSION['userContext'] === 'admin') && (isset($_SESSION['look']))) ? 'look' : 'user']);
  50. exec (HESTIA_CMD . 'v-list-user ' . $v_user . ' json', $output, $return_var);
  51. $data = json_decode(implode('', $output), true);
  52. unset($output);
  53. // Determine package features and land user at the first available page
  54. if ($data[$user]['WEB_DOMAINS'] !== '0') {
  55. header('Location: /list/web/');
  56. } elseif ($data[$user]['DNS_DOMAINS'] !== '0') {
  57. header('Location: /list/dns/');
  58. } elseif ($data[$user]['MAIL_DOMAINS'] !== '0') {
  59. header('Location: /list/mail/');
  60. } elseif ($data[$user]['DATABASES'] !== '0') {
  61. header('Location: /list/db/');
  62. } elseif ($data[$user]['CRON_JOBS'] !== '0') {
  63. header('Location: /list/cron/');
  64. } elseif ($data[$user]['BACKUPS'] !== '0') {
  65. header('Location: /list/backup/');
  66. } else {
  67. header('Location: /error/');
  68. }
  69. exit;
  70. }
  71. // Do not allow non-administrators to access account impersonation
  72. if (($_SESSION['userContext'] !== 'admin') && (!empty($_GET['loginas']))) {
  73. header('Location: /login/');
  74. exit;
  75. }
  76. exit;
  77. }
  78. function authenticate_user($user, $password, $twofa = ''){
  79. unset($_SESSION['login']);
  80. if(isset($_SESSION['token']) && isset($_POST['token']) && $_POST['token'] == $_SESSION['token']) {
  81. $v_user = escapeshellarg($user);
  82. $ip = $_SERVER['REMOTE_ADDR'];
  83. $user_agent = $_SERVER['HTTP_USER_AGENT'];
  84. if(isset($_SERVER['HTTP_CF_CONNECTING_IP'])){
  85. if(!empty($_SERVER['HTTP_CF_CONNECTING_IP'])){
  86. $ip = $_SERVER['HTTP_CF_CONNECTING_IP'];
  87. }
  88. }
  89. $v_ip = escapeshellarg($ip);
  90. $v_user_agent = escapeshellarg($user_agent);
  91. // Get user's salt
  92. $output = '';
  93. exec (HESTIA_CMD . 'v-get-user-salt ' . $v_user . ' ' . $v_ip . ' json' , $output, $return_var);
  94. $pam = json_decode(implode('', $output), true);
  95. if ( $return_var > 0 ) {
  96. sleep(2);
  97. $error = '<a class="error">' . _('Invalid username or password') . '</a>';
  98. return $error;
  99. } else {
  100. $salt = $pam[$user]['SALT'];
  101. $method = $pam[$user]['METHOD'];
  102. if ($method == 'md5' ) {
  103. $hash = crypt($password, '$1$' . $salt . '$');
  104. }
  105. if ($method == 'sha-512' ) {
  106. $hash = crypt($password, '$6$rounds=5000$' . $salt . '$');
  107. $hash = str_replace('$rounds=5000', '', $hash);
  108. }
  109. if ($method == 'des' ) {
  110. $hash = crypt($password, $salt);
  111. }
  112. // Send hash via tmp file
  113. $v_hash = exec('mktemp -p /tmp');
  114. $fp = fopen($v_hash, 'w');
  115. fwrite($fp, $hash."\n");
  116. fclose($fp);
  117. // Check user hash
  118. exec(HESTIA_CMD . 'v-check-user-hash ' . $v_user . ' ' . $v_hash . ' ' . $v_ip, $output, $return_var);
  119. unset($output);
  120. // Remove tmp file
  121. unlink($v_hash);
  122. // Check API answer
  123. if ( $return_var > 0 ) {
  124. sleep(2);
  125. $error = '<a class="error">' . _('Invalid username or password') . '</a>';
  126. $v_session_id = escapeshellarg($_POST['token']);
  127. exec(HESTIA_CMD . 'v-log-user-login ' . $v_user . ' ' . $v_ip . ' failed ' . $v_session_id . ' ' . $v_user_agent, $output, $return_var);
  128. return $error;
  129. } else {
  130. // Get user specific parameters
  131. exec (HESTIA_CMD . 'v-list-user ' . $v_user . ' json', $output, $return_var);
  132. $data = json_decode(implode('', $output), true);
  133. unset($output);
  134. if ($data[$user]['LOGIN_DISABLED'] === 'yes') {
  135. sleep(2);
  136. $error = '<a class="error">' . _('Invalid username or password') . '</a>';
  137. $v_session_id = escapeshellarg($_POST['token']);
  138. exec(HESTIA_CMD . 'v-log-user-login ' . $v_user . ' ' . $v_ip . ' failed ' . $v_session_id . ' ' . $v_user_agent, $output, $return_var);
  139. return $error;
  140. }
  141. if ($data[$user]['LOGIN_USE_IPLIST'] === 'yes') {
  142. $v_login_user_allowed_ips = explode(',', $data[$user]['LOGIN_ALLOW_IPS']);
  143. if (!in_array($ip, $v_login_user_allowed_ips)) {
  144. sleep(2);
  145. $error = '<a class="error">' . _('Invalid username or password') . '</a>';
  146. $v_session_id = escapeshellarg($_POST['token']);
  147. exec(HESTIA_CMD . 'v-log-user-login ' . $v_user . ' ' . $v_ip . ' failed ' . $v_session_id . ' ' . $v_user_agent, $output, $return_var);
  148. return $error;
  149. }
  150. }
  151. if ($data[$user]['TWOFA'] != '') {
  152. exec(HESTIA_CMD . "v-check-user-2fa " . $v_user . " " . $v_twofa, $output, $return_var);
  153. $error = "<a class=\"error\">" . _('Invalid or missing 2FA token') . "</a>";
  154. if(empty($twofa)){
  155. $_SESSION['login']['username'] = $user;
  156. $_SESSION['login']['password'] = $password;
  157. return false;
  158. }else{
  159. $v_twofa = escapeshellarg($twofa);
  160. exec(HESTIA_CMD .'v-check-user-2fa '.$v_user.' '.$v_twofa, $output, $return_var);
  161. unset($output);
  162. if ( $return_var > 0 ) {
  163. sleep(2);
  164. $error = '<a class="error">' ._ ('Invalid or missing 2FA token') . '</a>';
  165. $_SESSION['login']['username'] = $user;
  166. $_SESSION['login']['password'] = $password;
  167. $v_session_id = escapeshellarg($_POST['token']);
  168. exec(HESTIA_CMD.'v-log-user-login ' . $v_user . ' ' . $v_ip . ' failed ' . $v_session_id . ' ' . $v_user_agent, $output, $return_var);
  169. unset($_POST['twofa']);
  170. return $error;
  171. }
  172. }
  173. }
  174. // Define session user
  175. $_SESSION['user'] = key($data);
  176. $v_user = $_SESSION['user'];
  177. //log successfull login attempt
  178. $v_session_id = escapeshellarg($_POST['token']);
  179. exec(HESTIA_CMD."v-log-user-login ".$v_user." ".$v_ip." success ".$v_session_id." ".$v_user_agent, $output, $return_var);
  180. $_SESSION['LAST_ACTIVITY'] = time();
  181. $_SESSION['MURMUR'] = $_POST['murmur'];
  182. // Define user role / context
  183. $_SESSION['userContext'] = $data[$user]['ROLE'];
  184. // Set active user theme on login
  185. $_SESSION['userTheme'] = $data[$user]['THEME'];
  186. if ($_SESSION['POLICY_USER_CHANGE_THEME'] !== 'yes') {
  187. unset($_SESSION['userTheme']);
  188. }
  189. $_SESSION['userSortOrder'] = (!empty($data[$user]['PREF_UI_SORT'])) ? $data[$user]['PREF_UI_SORT'] : 'name';
  190. // Define language
  191. $output = '';
  192. exec (HESTIA_CMD . 'v-list-sys-languages json', $output, $return_var);
  193. $languages = json_decode(implode('', $output), true);
  194. $_SESSION['language'] = (in_array($data[$v_user]['LANGUAGE'], $languages)) ? $data[$user]['LANGUAGE'] : 'en';
  195. // Regenerate session id to prevent session fixation
  196. session_regenerate_id(true);
  197. // Redirect request to control panel interface
  198. if (!empty($_SESSION['request_uri'])) {
  199. header('Location: ' . $_SESSION['request_uri']);
  200. unset($_SESSION['request_uri']);
  201. exit;
  202. } else {
  203. if ($_SESSION['userContext'] === 'admin') {
  204. header('Location: /list/user/');
  205. } else {
  206. if($data[$user]['WEB_DOMAINS'] != '0') {
  207. header('Location: /list/web/');
  208. } elseif ($data[$user]['DNS_DOMAINS'] != '0') {
  209. header('Location: /list/dns/');
  210. } elseif ($data[$user]['MAIL_DOMAINS'] != '0') {
  211. header('Location: /list/mail/');
  212. } elseif ($data[$user]['DATABASES'] != '0') {
  213. header('Location: /list/db/');
  214. } elseif ($data[$user]['CRON_JOBS'] != '0') {
  215. header('Location: /list/cron/');
  216. } elseif ($data[$user]['BACKUPS'] != '0') {
  217. header('Location: /list/backup/');
  218. } else {
  219. header('Location: /error/');
  220. }
  221. }
  222. exit;
  223. }
  224. }
  225. }
  226. } else {
  227. unset($_POST);
  228. unset($_GET);
  229. unset($_SESSION);
  230. // Delete old session and start a new one
  231. session_write_close();
  232. session_unset();
  233. session_destroy();
  234. session_start();
  235. return false;
  236. }
  237. }
  238. if (preg_match('/^[[:alnum:]][-|\.|_[:alnum:]]{0,28}[[:alnum:]]$/',$_POST['user'])) {
  239. $_SESSION['login']['username'] = $_POST['user'];
  240. }else{
  241. $user = '';
  242. }
  243. if (!empty($_SESSION['login']['username']) && !empty($_SESSION['login']['password']) && !empty($_POST['twofa'])) {
  244. $error = authenticate_user($_SESSION['login']['username'], $_SESSION['login']['password'], $_POST['twofa']);
  245. unset($_POST);
  246. } elseif (!empty($_SESSION['login']['username']) && !empty($_POST['password'])) {
  247. $error = authenticate_user($_SESSION['login']['username'], $_POST['password']);
  248. unset($_POST);
  249. }
  250. // Check system configuration
  251. load_hestia_config();
  252. // Detect language
  253. if (empty($_SESSION['language'])) {
  254. $output = '';
  255. exec (HESTIA_CMD . 'v-list-sys-config json', $output, $return_var);
  256. $config = json_decode(implode('', $output), true);
  257. $lang = $config['config']['LANGUAGE'];
  258. $output = '';
  259. exec (HESTIA_CMD . 'v-list-sys-languages json', $output, $return_var);
  260. $languages = json_decode(implode('', $output), true);
  261. $_SESSION['language'] = (in_array($lang, $languages)) ? $lang : 'en';
  262. }
  263. // Generate CSRF token
  264. $_SESSION['token'] = md5(uniqid(mt_rand(), true));
  265. require_once('../templates/header.html');
  266. if (!empty($_SESSION['login']['password'])) {
  267. require_once('../templates/pages/login/login_2.html');
  268. } elseif (empty($_SESSION['login']['username'])) {
  269. require_once('../templates/pages/login/login' . (($_SESSION['LOGIN_STYLE'] != 'old') ? '' : '_a') . '.html');
  270. } elseif (empty($_POST['password'])) {
  271. require_once('../templates/pages/login/login_1.html');
  272. } else {
  273. require_once('../templates/pages/login/login' . (($_SESSION['LOGIN_STYLE'] != 'old') ? '' : '_a') . '.html');
  274. }