index.php 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318
  1. <?php
  2. define('NO_AUTH_REQUIRED', true);
  3. // Main include
  4. include($_SERVER['DOCUMENT_ROOT'] . '/inc/main.php');
  5. $TAB = 'login';
  6. if (isset($_GET['logout'])) {
  7. unset($_SESSION);
  8. session_unset();
  9. session_destroy();
  10. header('Location: /login/');
  11. }
  12. /* ACTIONS FOR CURRENT USER SESSION */
  13. if (isset($_SESSION['user'])) {
  14. // User impersonation
  15. // Allow administrators to view and manipulate contents of other user accounts
  16. if (($_SESSION['userContext'] === 'admin') && (!empty($_GET['loginas']))) {
  17. // Ensure token is passed and matches before granting user impersonation access
  18. if (verify_csrf($_GET)) {
  19. $v_user = escapeshellarg($_GET['loginas']);
  20. $v_impersonator = escapeshellarg($_SESSION['user']);
  21. exec(HESTIA_CMD . "v-list-user ".$v_user." json", $output, $return_var);
  22. if ($return_var == 0) {
  23. $data = json_decode(implode('', $output), true);
  24. reset($data);
  25. $_SESSION['look'] = key($data);
  26. // Log impersonation events
  27. exec(HESTIA_CMD . 'v-log-action ' . $v_impersonator . " 'Info' 'Security' 'Logged in as another user (User: $v_user)'", $output, $return_var);
  28. exec(HESTIA_CMD . "v-log-action system 'Warning' 'Security' 'User impersonation session started (User: $v_user, Administrator: $v_impersonator)'", $output, $return_var);
  29. // Reset account details for File Manager to impersonated user
  30. unset($_SESSION['_sf2_attributes']);
  31. unset($_SESSION['_sf2_meta']);
  32. header('Location: /login/');
  33. }
  34. }
  35. exit;
  36. }
  37. // Set view based on account properties
  38. if (empty($_GET['loginas'])) {
  39. // Default view to Users list for administrator accounts
  40. if (($_SESSION['userContext'] === 'admin') && (!isset($_SESSION['look']))) {
  41. header('Location: /list/user/');
  42. exit;
  43. }
  44. // Obtain account properties
  45. $v_user = escapeshellarg($_SESSION[(($_SESSION['userContext'] === 'admin') && (isset($_SESSION['look']))) ? 'look' : 'user']);
  46. exec(HESTIA_CMD . 'v-list-user ' . $v_user . ' json', $output, $return_var);
  47. $data = json_decode(implode('', $output), true);
  48. unset($output);
  49. // Determine package features and land user at the first available page
  50. if ($data[$user]['WEB_DOMAINS'] !== '0') {
  51. header('Location: /list/web/');
  52. } elseif ($data[$user]['DNS_DOMAINS'] !== '0') {
  53. header('Location: /list/dns/');
  54. } elseif ($data[$user]['MAIL_DOMAINS'] !== '0') {
  55. header('Location: /list/mail/');
  56. } elseif ($data[$user]['DATABASES'] !== '0') {
  57. header('Location: /list/db/');
  58. } elseif ($data[$user]['CRON_JOBS'] !== '0') {
  59. header('Location: /list/cron/');
  60. } elseif ($data[$user]['BACKUPS'] !== '0') {
  61. header('Location: /list/backup/');
  62. } else {
  63. header('Location: /error/');
  64. }
  65. exit;
  66. }
  67. // Do not allow non-administrators to access account impersonation
  68. if (($_SESSION['userContext'] !== 'admin') && (!empty($_GET['loginas']))) {
  69. header('Location: /login/');
  70. exit;
  71. }
  72. exit;
  73. }
  74. function authenticate_user($user, $password, $twofa = '')
  75. {
  76. unset($_SESSION['login']);
  77. if (verify_csrf($_POST, true)) {
  78. $v_user = escapeshellarg($user);
  79. $ip = $_SERVER['REMOTE_ADDR'];
  80. $user_agent = $_SERVER['HTTP_USER_AGENT'];
  81. if (isset($_SERVER['HTTP_CF_CONNECTING_IP'])) {
  82. if (!empty($_SERVER['HTTP_CF_CONNECTING_IP'])) {
  83. $ip = $_SERVER['HTTP_CF_CONNECTING_IP'];
  84. }
  85. }
  86. $v_ip = escapeshellarg($ip);
  87. $v_user_agent = escapeshellarg($user_agent);
  88. // Get user's salt
  89. $output = '';
  90. exec(HESTIA_CMD . 'v-get-user-salt ' . $v_user . ' ' . $v_ip . ' json', $output, $return_var);
  91. $pam = json_decode(implode('', $output), true);
  92. if ($return_var > 0) {
  93. sleep(2);
  94. if($return_var == 5){
  95. $error = '<a class="error">' . _('Account has been suspended') . '</a>';
  96. }else{
  97. $error = '<a class="error">' . _('Invalid username or password') . '</a>';
  98. }
  99. return $error;
  100. } else {
  101. $salt = $pam[$user]['SALT'];
  102. $method = $pam[$user]['METHOD'];
  103. if ($method == 'md5') {
  104. $hash = crypt($password, '$1$' . $salt . '$');
  105. }
  106. if ($method == 'sha-512') {
  107. $hash = crypt($password, '$6$rounds=5000$' . $salt . '$');
  108. $hash = str_replace('$rounds=5000', '', $hash);
  109. }
  110. if ($method == 'des') {
  111. $hash = crypt($password, $salt);
  112. }
  113. // Send hash via tmp file
  114. $v_hash = exec('mktemp -p /tmp');
  115. $fp = fopen($v_hash, 'w');
  116. fwrite($fp, $hash."\n");
  117. fclose($fp);
  118. // Check user hash
  119. exec(HESTIA_CMD . 'v-check-user-hash ' . $v_user . ' ' . $v_hash . ' ' . $v_ip, $output, $return_var);
  120. unset($output);
  121. // Remove tmp file
  122. unlink($v_hash);
  123. // Check API answer
  124. if ($return_var > 0) {
  125. sleep(2);
  126. $error = '<a class="error">' . _('Invalid username or password') . '</a>';
  127. $v_session_id = escapeshellarg($_POST['token']);
  128. exec(HESTIA_CMD . 'v-log-user-login ' . $v_user . ' ' . $v_ip . ' failed ' . $v_session_id . ' ' . $v_user_agent, $output, $return_var);
  129. return $error;
  130. } else {
  131. // Get user specific parameters
  132. exec(HESTIA_CMD . 'v-list-user ' . $v_user . ' json', $output, $return_var);
  133. $data = json_decode(implode('', $output), true);
  134. unset($output);
  135. if ($data[$user]['LOGIN_DISABLED'] === 'yes') {
  136. sleep(2);
  137. $error = '<a class="error">' . _('Invalid username or password') . '</a>';
  138. $v_session_id = escapeshellarg($_POST['token']);
  139. exec(HESTIA_CMD . 'v-log-user-login ' . $v_user . ' ' . $v_ip . ' failed ' . $v_session_id . ' ' . $v_user_agent .' yes "Login disabled for this user"', $output, $return_var);
  140. return $error;
  141. }
  142. if ($data[$user]['LOGIN_USE_IPLIST'] === 'yes') {
  143. $v_login_user_allowed_ips = explode(',', $data[$user]['LOGIN_ALLOW_IPS']);
  144. $v_login_user_allowed_ips = array_map('trim', $v_login_user_allowed_ips);
  145. if (!in_array($ip, $v_login_user_allowed_ips, true)) {
  146. sleep(2);
  147. $error = '<a class="error">' . _('Invalid username or password') . '</a>';
  148. $v_session_id = escapeshellarg($_POST['token']);
  149. exec(HESTIA_CMD . 'v-log-user-login ' . $v_user . ' ' . $v_ip . ' failed ' . $v_session_id . ' ' . $v_user_agent .' yes "Ip not in allowed list"', $output, $return_var);
  150. return $error;
  151. }
  152. }
  153. if ($data[$user]['TWOFA'] != '') {
  154. exec(HESTIA_CMD . "v-check-user-2fa " . $v_user . " " . $v_twofa, $output, $return_var);
  155. $error = "<a class=\"error\">" . _('Invalid or missing 2FA token') . "</a>";
  156. if (empty($twofa)) {
  157. $_SESSION['login']['username'] = $user;
  158. $_SESSION['login']['password'] = $password;
  159. return false;
  160. } else {
  161. $v_twofa = escapeshellarg($twofa);
  162. exec(HESTIA_CMD .'v-check-user-2fa '.$v_user.' '.$v_twofa, $output, $return_var);
  163. unset($output);
  164. if ($return_var > 0) {
  165. sleep(2);
  166. $error = '<a class="error">' ._('Invalid or missing 2FA token') . '</a>';
  167. $_SESSION['login']['username'] = $user;
  168. $_SESSION['login']['password'] = $password;
  169. $v_session_id = escapeshellarg($_POST['token']);
  170. if (isset($_SESSION['failed_twofa'])) {
  171. //allow a few failed attemps before start of logging.
  172. if ($_SESSION['failed_twofa'] > 2) {
  173. exec(HESTIA_CMD.'v-log-user-login ' . $v_user . ' ' . $v_ip . ' failed ' . $v_session_id . ' ' . $v_user_agent .' yes "Invalid or missing 2FA token"', $output, $return_var);
  174. }
  175. $_SESSION['failed_twofa']++;
  176. } else {
  177. $_SESSION['failed_twofa'] = 1;
  178. }
  179. unset($_POST['twofa']);
  180. return $error;
  181. }
  182. }
  183. }
  184. // Define session user
  185. $_SESSION['user'] = key($data);
  186. $v_user = $_SESSION['user'];
  187. //log successfull login attempt
  188. $v_session_id = escapeshellarg($_POST['token']);
  189. exec(HESTIA_CMD."v-log-user-login ".$v_user." ".$v_ip." success ".$v_session_id." ".$v_user_agent, $output, $return_var);
  190. $_SESSION['LAST_ACTIVITY'] = time();
  191. $_SESSION['MURMUR'] = $_POST['murmur'];
  192. // Define user role / context
  193. $_SESSION['userContext'] = $data[$user]['ROLE'];
  194. // Set active user theme on login
  195. $_SESSION['userTheme'] = $data[$user]['THEME'];
  196. if ($_SESSION['POLICY_USER_CHANGE_THEME'] !== 'yes') {
  197. unset($_SESSION['userTheme']);
  198. }
  199. $_SESSION['userSortOrder'] = (!empty($data[$user]['PREF_UI_SORT'])) ? $data[$user]['PREF_UI_SORT'] : 'name';
  200. // Define language
  201. $output = '';
  202. exec(HESTIA_CMD . 'v-list-sys-languages json', $output, $return_var);
  203. $languages = json_decode(implode('', $output), true);
  204. $_SESSION['language'] = (in_array($data[$v_user]['LANGUAGE'], $languages)) ? $data[$user]['LANGUAGE'] : 'en';
  205. // Regenerate session id to prevent session fixation
  206. session_regenerate_id(true);
  207. // Redirect request to control panel interface
  208. if (!empty($_SESSION['request_uri'])) {
  209. header('Location: ' . $_SESSION['request_uri']);
  210. unset($_SESSION['request_uri']);
  211. exit;
  212. } else {
  213. if ($_SESSION['userContext'] === 'admin') {
  214. header('Location: /list/user/');
  215. } else {
  216. if ($data[$user]['WEB_DOMAINS'] != '0') {
  217. header('Location: /list/web/');
  218. } elseif ($data[$user]['DNS_DOMAINS'] != '0') {
  219. header('Location: /list/dns/');
  220. } elseif ($data[$user]['MAIL_DOMAINS'] != '0') {
  221. header('Location: /list/mail/');
  222. } elseif ($data[$user]['DATABASES'] != '0') {
  223. header('Location: /list/db/');
  224. } elseif ($data[$user]['CRON_JOBS'] != '0') {
  225. header('Location: /list/cron/');
  226. } elseif ($data[$user]['BACKUPS'] != '0') {
  227. header('Location: /list/backup/');
  228. } else {
  229. header('Location: /error/');
  230. }
  231. }
  232. exit;
  233. }
  234. }
  235. }
  236. } else {
  237. unset($_POST);
  238. unset($_GET);
  239. unset($_SESSION);
  240. // Delete old session and start a new one
  241. session_write_close();
  242. session_unset();
  243. session_destroy();
  244. session_start();
  245. return false;
  246. }
  247. }
  248. if (preg_match('/^[[:alnum:]][-|\.|_[:alnum:]]{0,28}[[:alnum:]]$/', $_POST['user'])) {
  249. $_SESSION['login']['username'] = $_POST['user'];
  250. } else {
  251. $user = '';
  252. }
  253. if (!empty($_SESSION['login']['username']) && !empty($_SESSION['login']['password']) && !empty($_POST['twofa'])) {
  254. $error = authenticate_user($_SESSION['login']['username'], $_SESSION['login']['password'], $_POST['twofa']);
  255. unset($_POST);
  256. } elseif (!empty($_SESSION['login']['username']) && !empty($_POST['password'])) {
  257. $error = authenticate_user($_SESSION['login']['username'], $_POST['password']);
  258. unset($_POST);
  259. }
  260. // Check system configuration
  261. load_hestia_config();
  262. // Detect language
  263. if (empty($_SESSION['language'])) {
  264. $output = '';
  265. exec(HESTIA_CMD . 'v-list-sys-config json', $output, $return_var);
  266. $config = json_decode(implode('', $output), true);
  267. $lang = $config['config']['LANGUAGE'];
  268. $output = '';
  269. exec(HESTIA_CMD . 'v-list-sys-languages json', $output, $return_var);
  270. $languages = json_decode(implode('', $output), true);
  271. $_SESSION['language'] = (in_array($lang, $languages)) ? $lang : 'en';
  272. }
  273. // Generate CSRF token
  274. $token = bin2hex(file_get_contents('/dev/urandom', false, null, 0, 16));
  275. $_SESSION['token'] = $token;
  276. require_once('../templates/header.html');
  277. if (!empty($_SESSION['login']['password'])) {
  278. require_once('../templates/pages/login/login_2.html');
  279. } elseif (empty($_SESSION['login']['username'])) {
  280. require_once('../templates/pages/login/login' . (($_SESSION['LOGIN_STYLE'] != 'old') ? '' : '_a') . '.html');
  281. } elseif (empty($_POST['password'])) {
  282. require_once('../templates/pages/login/login_1.html');
  283. } else {
  284. require_once('../templates/pages/login/login' . (($_SESSION['LOGIN_STYLE'] != 'old') ? '' : '_a') . '.html');
  285. }