index.php 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215
  1. <?php
  2. define('NO_AUTH_REQUIRED',true);
  3. // Main include
  4. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  5. $TAB = 'login';
  6. // Logout
  7. if (isset($_GET['logout'])) {
  8. session_destroy();
  9. }
  10. // Login as someone else
  11. if (isset($_SESSION['user'])) {
  12. if (empty($_GET['loginas']) ){
  13. header("Location: /list/web/");
  14. exit;
  15. }
  16. if ($_SESSION['user'] == 'admin' && !empty($_GET['loginas'])) {
  17. exec (HESTIA_CMD . "v-list-user ".escapeshellarg($_GET['loginas'])." json", $output, $return_var);
  18. if ( $return_var == 0 ) {
  19. $data = json_decode(implode('', $output), true);
  20. reset($data);
  21. $_SESSION['look'] = key($data);
  22. $_SESSION['look_alert'] = 'yes';
  23. }
  24. }
  25. if ($_SESSION['user'] == 'admin' && empty($_GET['loginas'])) {
  26. header("Location: /list/user/");
  27. } else {
  28. header("Location: /list/web/");
  29. }
  30. exit;
  31. }
  32. function authenticate_user($user, $password, $twofa = ''){
  33. unset($_SESSION['login']);
  34. if(isset($_SESSION['token']) && isset($_POST['token']) && $_POST['token'] == $_SESSION['token']) {
  35. $v_user = escapeshellarg($user);
  36. $v_ip = escapeshellarg($_SERVER['REMOTE_ADDR']);
  37. if(isset($_SERVER['HTTP_CF_CONNECTING_IP'])){
  38. if(!empty($_SERVER['HTTP_CF_CONNECTING_IP'])){
  39. $v_ip = escapeshellarg($_SERVER['HTTP_CF_CONNECTING_IP']);
  40. }
  41. }
  42. // Get user's salt
  43. $output = '';
  44. exec (HESTIA_CMD."v-get-user-salt ".$v_user." ".$v_ip." json" , $output, $return_var);
  45. $pam = json_decode(implode('', $output), true);
  46. if ( $return_var > 0 ) {
  47. sleep(2);
  48. $error = "<a class=\"error\">"._('Invalid username or password')."</a>";
  49. return $error;
  50. } else {
  51. $salt = $pam[$user]['SALT'];
  52. $method = $pam[$user]['METHOD'];
  53. if ($method == 'md5' ) {
  54. $hash = crypt($password, '$1$'.$salt.'$');
  55. }
  56. if ($method == 'sha-512' ) {
  57. $hash = crypt($password, '$6$rounds=5000$'.$salt.'$');
  58. $hash = str_replace('$rounds=5000','',$hash);
  59. }
  60. if ($method == 'des' ) {
  61. $hash = crypt($password, $salt);
  62. }
  63. // Send hash via tmp file
  64. $v_hash = exec('mktemp -p /tmp');
  65. $fp = fopen($v_hash, "w");
  66. fwrite($fp, $hash."\n");
  67. fclose($fp);
  68. // Check user hash
  69. exec(HESTIA_CMD ."v-check-user-hash ".$v_user." ".$v_hash." ".$v_ip, $output, $return_var);
  70. unset($output);
  71. // Remove tmp file
  72. unlink($v_hash);
  73. // Check API answer
  74. if ( $return_var > 0 ) {
  75. sleep(2);
  76. $error = "<a class=\"error\">"._('Invalid username or password')."</a>";
  77. return $error;
  78. } else {
  79. // Get user speciefic parameters
  80. exec (HESTIA_CMD . "v-list-user ".$v_user." json", $output, $return_var);
  81. $data = json_decode(implode('', $output), true);
  82. unset($output);
  83. // Check if 2FA is active
  84. if ($data[$user]['TWOFA'] != '') {
  85. if(empty($twofa)){
  86. $_SESSION['login']['username'] = $user;
  87. $_SESSION['login']['password'] = $password;
  88. return false;
  89. }else{
  90. $v_twofa = escapeshellarg($twofa);
  91. exec(HESTIA_CMD ."v-check-user-2fa ".$v_user." ".$v_twofa, $output, $return_var);
  92. unset($output);
  93. if ( $return_var > 0 ) {
  94. sleep(2);
  95. $error = "<a class=\"error\">"._('Invalid or missing 2FA token')."</a>";
  96. $_SESSION['login']['username'] = $user;
  97. $_SESSION['login']['password'] = $password;
  98. return $error;
  99. unset($_POST['twofa']);
  100. }
  101. }
  102. }
  103. }
  104. if ($data[$user]['ROLE'] == 'admin'){
  105. exec (HESTIA_CMD . "v-list-user admin json", $output, $return_var);
  106. $data = json_decode(implode('', $output), true);
  107. unset($output);
  108. }
  109. // Define session user
  110. $_SESSION['user'] = key($data);
  111. $v_user = $_SESSION['user'];
  112. // Define language
  113. $output = '';
  114. exec (HESTIA_CMD."v-list-sys-languages json", $output, $return_var);
  115. $languages = json_decode(implode('', $output), true);
  116. if (in_array($data[$v_user]['LANGUAGE'], $languages)){
  117. $_SESSION['language'] = $data[$user]['LANGUAGE'];
  118. } else {
  119. $_SESSION['language'] = 'en';
  120. }
  121. // Regenerate session id to prevent session fixation
  122. session_regenerate_id();
  123. // Redirect request to control panel interface
  124. if (!empty($_SESSION['request_uri'])) {
  125. header("Location: ".$_SESSION['request_uri']);
  126. unset($_SESSION['request_uri']);
  127. exit;
  128. } else {
  129. if ($user == 'admin') {
  130. header("Location: /list/user/");
  131. } else {
  132. header("Location: /list/web/");
  133. }
  134. exit;
  135. }
  136. }
  137. } else {
  138. unset($_POST);
  139. unset($_GET);
  140. unset($_SESSION);
  141. session_destroy();
  142. session_start();
  143. return false;
  144. }
  145. }
  146. if (!empty($_SESSION['login']['username']) && !empty($_SESSION['login']['password']) && !empty($_POST['twofa'])){
  147. $error = authenticate_user($_SESSION['login']['username'], $_SESSION['login']['password'], $_POST['twofa']);
  148. unset($_POST);
  149. } else if (!empty($_POST['user']) && !empty($_POST['password'])) {
  150. $error = authenticate_user($_POST['user'], $_POST['password']);
  151. unset($_POST);
  152. }else{
  153. unset($_SESSION['login']);
  154. }
  155. // Check system configuration
  156. load_hestia_config();
  157. // Detect language
  158. if (empty($_SESSION['language'])) {
  159. $output = '';
  160. exec (HESTIA_CMD."v-list-sys-config json", $output, $return_var);
  161. $config = json_decode(implode('', $output), true);
  162. $lang = $config['config']['LANGUAGE'];
  163. $output = '';
  164. exec (HESTIA_CMD."v-list-sys-languages json", $output, $return_var);
  165. $languages = json_decode(implode('', $output), true);
  166. if(in_array($lang, $languages)){
  167. $_SESSION['language'] = $lang;
  168. }
  169. else {
  170. $_SESSION['language'] = 'en';
  171. }
  172. }
  173. // Generate CSRF token
  174. $_SESSION['token'] = md5(uniqid(mt_rand(), true));
  175. require_once('../templates/header.html');
  176. if(!empty($_SESSION['login'])){
  177. require_once('../templates/login_2.html');
  178. }else if (empty($_POST['user'])) {
  179. if($_SESSION['LOGIN_STYLE'] == 'old'){
  180. require_once('../templates/login_a.html');
  181. }else{
  182. require_once('../templates/login.html');
  183. }
  184. }else if (empty($_POST['password'])) {
  185. require_once('../templates/login_1.html');
  186. }else{
  187. if($_SESSION['LOGIN_STYLE'] == 'old'){
  188. require_once('../templates/login_a.html');
  189. }else{
  190. require_once('../templates/login.html');
  191. }
  192. }
  193. ?>