1
0

index.php 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285
  1. <?php
  2. define('NO_AUTH_REQUIRED',true);
  3. // Main include
  4. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  5. $TAB = 'login';
  6. /*
  7. // Logout
  8. if (isset($_GET['logout'])) {
  9. setcookie('limit2fa','',time() - 3600,"/");
  10. session_destroy();
  11. }
  12. */
  13. /* ACTIONS FOR CURRENT USER SESSION */
  14. if (isset($_SESSION['user'])) {
  15. // User impersonation
  16. // Allow administrators to view and manipulate contents of other user accounts
  17. if (($_SESSION['userContext'] === 'admin') && (!empty($_GET['loginas']))) {
  18. // Ensure token is passed and matches before granting user impersonation access
  19. if ((!$_GET['token']) || ($_SESSION['token'] != $_GET['token'])) {
  20. header('location: /list/user/');
  21. exit();
  22. } else {
  23. $v_user = escapeshellarg($_GET['loginas']);
  24. exec (HESTIA_CMD . "v-list-user ".$v_user." json", $output, $return_var);
  25. if ( $return_var == 0 ) {
  26. $data = json_decode(implode('', $output), true);
  27. reset($data);
  28. $_SESSION['look'] = key($data);
  29. // Reset account details for File Manager to impersonated user
  30. unset($_SESSION['_sf2_attributes']);
  31. unset($_SESSION['_sf2_meta']);
  32. header("Location: /login/");
  33. }
  34. }
  35. exit;
  36. }
  37. // Set view based on account properties
  38. if (empty($_GET['loginas'])) {
  39. // Default view to Users list for administrator accounts
  40. if (($_SESSION['userContext'] === 'admin') && (!isset($_SESSION['look']))) {
  41. header("Location: /list/user/");
  42. exit;
  43. }
  44. // Obtain account properties
  45. if (($_SESSION['userContext'] === 'admin') && (isset($_SESSION['look']))) {
  46. $v_user = escapeshellarg($_SESSION['look']);
  47. } else {
  48. $v_user = escapeshellarg($_SESSION['user']);
  49. }
  50. exec (HESTIA_CMD . "v-list-user ".$v_user." json", $output, $return_var);
  51. $data = json_decode(implode('', $output), true);
  52. unset($output);
  53. // Determine package features and land user at the first available page
  54. if ($data[$user]['WEB_DOMAINS'] !== "0") {
  55. header("Location: /list/web/");
  56. } else if ($data[$user]['DNS_DOMAINS'] !== "0") {
  57. header("Location: /list/dns/");
  58. } else if ($data[$user]['MAIL_DOMAINS'] !== "0") {
  59. header("Location: /list/mail/");
  60. } else if ($data[$user]['DATABASES'] !== "0") {
  61. header("Location: /list/db/");
  62. } else if ($data[$user]['CRON_JOBS'] !== "0") {
  63. header("Location: /list/cron/");
  64. } else if ($data[$user]['BACKUPS'] !== "0") {
  65. header("Location: /list/backup/");
  66. } else {
  67. header("Location: /error/");
  68. }
  69. exit;
  70. }
  71. // Do not allow non-administrators to access account impersonation
  72. if (($_SESSION['userContext'] !== 'admin') && (!empty($_GET['loginas']))) {
  73. header("Location: /login/");
  74. exit;
  75. }
  76. exit;
  77. }
  78. function authenticate_user($user, $password, $twofa = ''){
  79. unset($_SESSION['login']);
  80. if(isset($_SESSION['token']) && isset($_POST['token']) && $_POST['token'] == $_SESSION['token']) {
  81. $v_user = escapeshellarg($user);
  82. $ip = $_SERVER['REMOTE_ADDR'];
  83. if(isset($_SERVER['HTTP_CF_CONNECTING_IP'])){
  84. if(!empty($_SERVER['HTTP_CF_CONNECTING_IP'])){
  85. $ip = $_SERVER['HTTP_CF_CONNECTING_IP'];
  86. }
  87. }
  88. $v_ip = escapeshellarg($ip);
  89. // Get user's salt
  90. $output = '';
  91. exec (HESTIA_CMD."v-get-user-salt ".$v_user." ".$v_ip." json" , $output, $return_var);
  92. $pam = json_decode(implode('', $output), true);
  93. if ( $return_var > 0 ) {
  94. sleep(2);
  95. $error = "<a class=\"error\">"._('Invalid username or password')."</a>";
  96. return $error;
  97. } else {
  98. $salt = $pam[$user]['SALT'];
  99. $method = $pam[$user]['METHOD'];
  100. if ($method == 'md5' ) {
  101. $hash = crypt($password, '$1$'.$salt.'$');
  102. }
  103. if ($method == 'sha-512' ) {
  104. $hash = crypt($password, '$6$rounds=5000$'.$salt.'$');
  105. $hash = str_replace('$rounds=5000','',$hash);
  106. }
  107. if ($method == 'des' ) {
  108. $hash = crypt($password, $salt);
  109. }
  110. // Send hash via tmp file
  111. $v_hash = exec('mktemp -p /tmp');
  112. $fp = fopen($v_hash, "w");
  113. fwrite($fp, $hash."\n");
  114. fclose($fp);
  115. // Check user hash
  116. exec(HESTIA_CMD ."v-check-user-hash ".$v_user." ".$v_hash." ".$v_ip, $output, $return_var);
  117. unset($output);
  118. // Remove tmp file
  119. unlink($v_hash);
  120. // Check API answer
  121. if ( $return_var > 0 ) {
  122. sleep(2);
  123. $error = "<a class=\"error\">"._('Invalid username or password')."</a>";
  124. $v_murmur = escapeshellarg($_POST['murmur']);
  125. exec(HESTIA_CMD."v-log-user-login ".$v_user." ".$v_ip." failed ".$v_murmur, $output, $return_var);
  126. return $error;
  127. } else {
  128. // Get user specific parameters
  129. exec (HESTIA_CMD . "v-list-user ".$v_user." json", $output, $return_var);
  130. $data = json_decode(implode('', $output), true);
  131. unset($output);
  132. if ($data[$user]['TWOFA'] != '') {
  133. if(empty($twofa)){
  134. $_SESSION['login']['username'] = $user;
  135. $_SESSION['login']['password'] = $password;
  136. return false;
  137. }else{
  138. $v_twofa = escapeshellarg($twofa);
  139. exec(HESTIA_CMD ."v-check-user-2fa ".$v_user." ".$v_twofa, $output, $return_var);
  140. unset($output);
  141. if ( $return_var > 0 ) {
  142. sleep(2);
  143. $error = "<a class=\"error\">"._('Invalid or missing 2FA token')."</a>";
  144. $_SESSION['login']['username'] = $user;
  145. $_SESSION['login']['password'] = $password;
  146. $v_murmur = escapeshellarg($_POST['murmur']);
  147. exec(HESTIA_CMD."v-log-user-login ".$v_user." ".$v_ip." failed ".$v_murmur, $output, $return_var);
  148. return $error;
  149. unset($_POST['twofa']);
  150. }
  151. }
  152. }
  153. $_SESSION['userContext'] = $data[$user]['ROLE'];
  154. // Define session user
  155. $_SESSION['user'] = key($data);
  156. $v_user = $_SESSION['user'];
  157. //log successfull login attempt
  158. $v_murmur = escapeshellarg($_POST['murmur']);
  159. exec(HESTIA_CMD."v-log-user-login ".$v_user." ".$v_ip." success ".$v_murmur, $output, $return_var);
  160. $_SESSION['LAST_ACTIVITY'] = time();
  161. $_SESSION['MURMUR'] = $_POST['murmur'];
  162. // Define language
  163. $output = '';
  164. exec (HESTIA_CMD."v-list-sys-languages json", $output, $return_var);
  165. $languages = json_decode(implode('', $output), true);
  166. if (in_array($data[$v_user]['LANGUAGE'], $languages)){
  167. $_SESSION['language'] = $data[$user]['LANGUAGE'];
  168. } else {
  169. $_SESSION['language'] = 'en';
  170. }
  171. // Regenerate session id to prevent session fixation
  172. session_regenerate_id();
  173. // Redirect request to control panel interface
  174. if (!empty($_SESSION['request_uri'])) {
  175. header("Location: ".$_SESSION['request_uri']);
  176. unset($_SESSION['request_uri']);
  177. exit;
  178. } else {
  179. if ($_SESSION['userContext'] === 'admin') {
  180. header("Location: /list/user/");
  181. } else {
  182. if($data[$user]['WEB_DOMAINS'] != "0") {
  183. header("Location: /list/web/");
  184. } else if ($data[$user]['DNS_DOMAINS'] != "0") {
  185. header("Location: /list/dns/");
  186. } else if ($data[$user]['MAIL_DOMAINS'] != "0") {
  187. header("Location: /list/mail/");
  188. } else if ($data[$user]['DATABASES'] != "0") {
  189. header("Location: /list/db/");
  190. } else if ($data[$user]['CRON_JOBS'] != "0") {
  191. header("Location: /list/cron/");
  192. } else if ($data[$user]['BACKUPS'] != "0") {
  193. header("Location: /list/backup/");
  194. } else {
  195. header("Location: /error/");
  196. }
  197. }
  198. exit;
  199. }
  200. }
  201. }
  202. } else {
  203. unset($_POST);
  204. unset($_GET);
  205. unset($_SESSION);
  206. session_destroy();
  207. session_start();
  208. return false;
  209. }
  210. }
  211. if (!empty($_SESSION['login']['username']) && !empty($_SESSION['login']['password']) && !empty($_POST['twofa'])){
  212. $error = authenticate_user($_SESSION['login']['username'], $_SESSION['login']['password'], $_POST['twofa']);
  213. unset($_POST);
  214. } else if (!empty($_POST['user']) && !empty($_POST['password'])) {
  215. $error = authenticate_user($_POST['user'], $_POST['password']);
  216. unset($_POST);
  217. }else{
  218. unset($_SESSION['login']);
  219. }
  220. // Check system configuration
  221. load_hestia_config();
  222. // Detect language
  223. if (empty($_SESSION['language'])) {
  224. $output = '';
  225. exec (HESTIA_CMD."v-list-sys-config json", $output, $return_var);
  226. $config = json_decode(implode('', $output), true);
  227. $lang = $config['config']['LANGUAGE'];
  228. $output = '';
  229. exec (HESTIA_CMD."v-list-sys-languages json", $output, $return_var);
  230. $languages = json_decode(implode('', $output), true);
  231. if(in_array($lang, $languages)){
  232. $_SESSION['language'] = $lang;
  233. }
  234. else {
  235. $_SESSION['language'] = 'en';
  236. }
  237. }
  238. // Generate CSRF token
  239. $_SESSION['token'] = md5(uniqid(mt_rand(), true));
  240. require_once('../templates/header.html');
  241. if(!empty($_SESSION['login'])){
  242. require_once('../templates/login_2.html');
  243. }else if (empty($_POST['user'])) {
  244. if($_SESSION['LOGIN_STYLE'] == 'old'){
  245. require_once('../templates/login_a.html');
  246. }else{
  247. require_once('../templates/login.html');
  248. }
  249. }else if (empty($_POST['password'])) {
  250. require_once('../templates/login_1.html');
  251. }else{
  252. if($_SESSION['LOGIN_STYLE'] == 'old'){
  253. require_once('../templates/login_a.html');
  254. }else{
  255. require_once('../templates/login.html');
  256. }
  257. }
  258. ?>