index.php 9.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247
  1. <?php
  2. define('NO_AUTH_REQUIRED',true);
  3. // Main include
  4. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  5. $TAB = 'login';
  6. // Logout
  7. if (isset($_GET['logout'])) {
  8. setcookie('limit2fa','',time() - 3600,"/");
  9. session_destroy();
  10. }
  11. // Login as someone else
  12. if (isset($_SESSION['user'])) {
  13. // Default location
  14. if (empty($_GET['loginas']) ){
  15. header("Location: /list/web/");
  16. exit;
  17. }
  18. if ($_SESSION['userContext'] === 'admin' && !empty($_GET['loginas'])) {
  19. // Ensure token is passed and matches before granting user impersonation
  20. if ((!$_GET['token']) || ($_SESSION['token'] != $_GET['token'])) {
  21. header('location: /list/user/');
  22. exit();
  23. } else {
  24. exec (HESTIA_CMD . "v-list-user ".escapeshellarg($_GET['loginas'])." json", $output, $return_var);
  25. if ( $return_var == 0 ) {
  26. $data = json_decode(implode('', $output), true);
  27. reset($data);
  28. $_SESSION['look'] = key($data);
  29. $_SESSION['look_alert'] = 'yes';
  30. # Remove current path for filemanager
  31. unset($_SESSION['_sf2_attributes']);
  32. unset($_SESSION['_sf2_meta']);
  33. }
  34. }
  35. }
  36. // Set correct entry point into the panel
  37. if ($_SESSION['userContext'] === 'admin' && empty($_GET['loginas'])) {
  38. header("Location: /list/user/");
  39. } else {
  40. header("Location: /list/web/");
  41. }
  42. exit;
  43. }
  44. function authenticate_user($user, $password, $twofa = ''){
  45. unset($_SESSION['login']);
  46. if(isset($_SESSION['token']) && isset($_POST['token']) && $_POST['token'] == $_SESSION['token']) {
  47. $v_user = escapeshellarg($user);
  48. $ip = $_SERVER['REMOTE_ADDR'];
  49. if(isset($_SERVER['HTTP_CF_CONNECTING_IP'])){
  50. if(!empty($_SERVER['HTTP_CF_CONNECTING_IP'])){
  51. $ip = $_SERVER['HTTP_CF_CONNECTING_IP'];
  52. }
  53. }
  54. $v_ip = escapeshellarg($ip);
  55. // Get user's salt
  56. $output = '';
  57. exec (HESTIA_CMD."v-get-user-salt ".$v_user." ".$v_ip." json" , $output, $return_var);
  58. $pam = json_decode(implode('', $output), true);
  59. if ( $return_var > 0 ) {
  60. sleep(2);
  61. $error = "<a class=\"error\">"._('Invalid username or password')."</a>";
  62. return $error;
  63. } else {
  64. $salt = $pam[$user]['SALT'];
  65. $method = $pam[$user]['METHOD'];
  66. if ($method == 'md5' ) {
  67. $hash = crypt($password, '$1$'.$salt.'$');
  68. }
  69. if ($method == 'sha-512' ) {
  70. $hash = crypt($password, '$6$rounds=5000$'.$salt.'$');
  71. $hash = str_replace('$rounds=5000','',$hash);
  72. }
  73. if ($method == 'des' ) {
  74. $hash = crypt($password, $salt);
  75. }
  76. // Send hash via tmp file
  77. $v_hash = exec('mktemp -p /tmp');
  78. $fp = fopen($v_hash, "w");
  79. fwrite($fp, $hash."\n");
  80. fclose($fp);
  81. // Check user hash
  82. exec(HESTIA_CMD ."v-check-user-hash ".$v_user." ".$v_hash." ".$v_ip, $output, $return_var);
  83. unset($output);
  84. // Remove tmp file
  85. unlink($v_hash);
  86. // Check API answer
  87. if ( $return_var > 0 ) {
  88. sleep(2);
  89. $error = "<a class=\"error\">"._('Invalid username or password')."</a>";
  90. $v_murmur = escapeshellarg($_POST['murmur']);
  91. exec(HESTIA_CMD."v-log-user-login ".$v_user." ".$v_ip." failed ".$v_murmur, $output, $return_var);
  92. return $error;
  93. } else {
  94. // Get user specific parameters
  95. exec (HESTIA_CMD . "v-list-user ".$v_user." json", $output, $return_var);
  96. $data = json_decode(implode('', $output), true);
  97. unset($output);
  98. if ($data[$user]['TWOFA'] != '') {
  99. if(empty($twofa)){
  100. $_SESSION['login']['username'] = $user;
  101. $_SESSION['login']['password'] = $password;
  102. return false;
  103. }else{
  104. $v_twofa = escapeshellarg($twofa);
  105. exec(HESTIA_CMD ."v-check-user-2fa ".$v_user." ".$v_twofa, $output, $return_var);
  106. unset($output);
  107. if ( $return_var > 0 ) {
  108. sleep(2);
  109. $error = "<a class=\"error\">"._('Invalid or missing 2FA token')."</a>";
  110. $_SESSION['login']['username'] = $user;
  111. $_SESSION['login']['password'] = $password;
  112. $v_murmur = escapeshellarg($_POST['murmur']);
  113. exec(HESTIA_CMD."v-log-user-login ".$v_user." ".$v_ip." failed ".$v_murmur, $output, $return_var);
  114. return $error;
  115. unset($_POST['twofa']);
  116. }
  117. }
  118. }
  119. $_SESSION['userContext'] = $data[$user]['ROLE'];
  120. // Define session user
  121. $_SESSION['user'] = key($data);
  122. $v_user = $_SESSION['user'];
  123. //log successfull login attempt
  124. $v_murmur = escapeshellarg($_POST['murmur']);
  125. exec(HESTIA_CMD."v-log-user-login ".$v_user." ".$v_ip." success ".$v_murmur, $output, $return_var);
  126. $_SESSION['LAST_ACTIVITY'] = time();
  127. $_SESSION['MURMUR'] = $_POST['murmur'];
  128. // Define language
  129. $output = '';
  130. exec (HESTIA_CMD."v-list-sys-languages json", $output, $return_var);
  131. $languages = json_decode(implode('', $output), true);
  132. if (in_array($data[$v_user]['LANGUAGE'], $languages)){
  133. $_SESSION['language'] = $data[$user]['LANGUAGE'];
  134. } else {
  135. $_SESSION['language'] = 'en';
  136. }
  137. // Regenerate session id to prevent session fixation
  138. session_regenerate_id();
  139. // Redirect request to control panel interface
  140. if (!empty($_SESSION['request_uri'])) {
  141. header("Location: ".$_SESSION['request_uri']);
  142. unset($_SESSION['request_uri']);
  143. exit;
  144. } else {
  145. if ($_SESSION['userContext'] === 'admin') {
  146. header("Location: /list/user/");
  147. } else {
  148. if($data[$user]['WEB_DOMAINS'] != "0") {
  149. header("Location: /list/web/");
  150. } else if ($data[$user]['DNS_DOMAINS'] != "0") {
  151. header("Location: /list/dns/");
  152. } else if ($data[$user]['MAIL_DOMAINS'] != "0") {
  153. header("Location: /list/mail/");
  154. } else if ($data[$user]['DATABASES'] != "0") {
  155. header("Location: /list/db/");
  156. } else if ($data[$user]['CRON_JOBS'] != "0") {
  157. header("Location: /list/cron/");
  158. } else if ($data[$user]['BACKUPS'] != "0") {
  159. header("Location: /list/backup/");
  160. } else {
  161. header("Location: /list/web/");
  162. }
  163. }
  164. exit;
  165. }
  166. }
  167. }
  168. } else {
  169. unset($_POST);
  170. unset($_GET);
  171. unset($_SESSION);
  172. session_destroy();
  173. session_start();
  174. return false;
  175. }
  176. }
  177. if (!empty($_SESSION['login']['username']) && !empty($_SESSION['login']['password']) && !empty($_POST['twofa'])){
  178. $error = authenticate_user($_SESSION['login']['username'], $_SESSION['login']['password'], $_POST['twofa']);
  179. unset($_POST);
  180. } else if (!empty($_POST['user']) && !empty($_POST['password'])) {
  181. $error = authenticate_user($_POST['user'], $_POST['password']);
  182. unset($_POST);
  183. }else{
  184. unset($_SESSION['login']);
  185. }
  186. // Check system configuration
  187. load_hestia_config();
  188. // Detect language
  189. if (empty($_SESSION['language'])) {
  190. $output = '';
  191. exec (HESTIA_CMD."v-list-sys-config json", $output, $return_var);
  192. $config = json_decode(implode('', $output), true);
  193. $lang = $config['config']['LANGUAGE'];
  194. $output = '';
  195. exec (HESTIA_CMD."v-list-sys-languages json", $output, $return_var);
  196. $languages = json_decode(implode('', $output), true);
  197. if(in_array($lang, $languages)){
  198. $_SESSION['language'] = $lang;
  199. }
  200. else {
  201. $_SESSION['language'] = 'en';
  202. }
  203. }
  204. // Generate CSRF token
  205. $_SESSION['token'] = md5(uniqid(mt_rand(), true));
  206. require_once('../templates/header.html');
  207. if(!empty($_SESSION['login'])){
  208. require_once('../templates/login_2.html');
  209. }else if (empty($_POST['user'])) {
  210. if($_SESSION['LOGIN_STYLE'] == 'old'){
  211. require_once('../templates/login_a.html');
  212. }else{
  213. require_once('../templates/login.html');
  214. }
  215. }else if (empty($_POST['password'])) {
  216. require_once('../templates/login_1.html');
  217. }else{
  218. if($_SESSION['LOGIN_STYLE'] == 'old'){
  219. require_once('../templates/login_a.html');
  220. }else{
  221. require_once('../templates/login.html');
  222. }
  223. }
  224. ?>