index.php 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172
  1. <?php
  2. define('NO_AUTH_REQUIRED',true);
  3. // Main include
  4. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  5. $TAB = 'LOGIN';
  6. // Logout
  7. if (isset($_GET['logout'])) {
  8. session_destroy();
  9. }
  10. // Login as someone else
  11. if (isset($_SESSION['user'])) {
  12. if ($_SESSION['user'] == 'admin' && !empty($_GET['loginas'])) {
  13. exec (HESTIA_CMD . "v-list-user ".escapeshellarg($_GET['loginas'])." json", $output, $return_var);
  14. if ( $return_var == 0 ) {
  15. $data = json_decode(implode('', $output), true);
  16. reset($data);
  17. $_SESSION['look'] = key($data);
  18. $_SESSION['look_alert'] = 'yes';
  19. }
  20. }
  21. header("Location: /list/user/");
  22. exit;
  23. }
  24. // Basic auth
  25. if (isset($_POST['user']) && isset($_POST['password'])) {
  26. if(isset($_SESSION['token']) && isset($_POST['token']) && $_POST['token'] == $_SESSION['token']) {
  27. $v_user = escapeshellarg($_POST['user']);
  28. $v_ip = escapeshellarg($_SERVER['REMOTE_ADDR']);
  29. if (isset($_POST['twofa'])) {
  30. $v_twofa = escapeshellarg($_POST['twofa']);
  31. }
  32. // Get user's salt
  33. $output = '';
  34. exec (HESTIA_CMD."v-get-user-salt ".$v_user." ".$v_ip." json" , $output, $return_var);
  35. $pam = json_decode(implode('', $output), true);
  36. if ( $return_var > 0 ) {
  37. $ERROR = "<a class=\"error\">".__('Invalid username or password')."</a>";
  38. } else {
  39. $user = $_POST['user'];
  40. $password = $_POST['password'];
  41. $salt = $pam[$user]['SALT'];
  42. $method = $pam[$user]['METHOD'];
  43. if ($method == 'md5' ) {
  44. $hash = crypt($password, '$1$'.$salt.'$');
  45. }
  46. if ($method == 'sha-512' ) {
  47. $hash = crypt($password, '$6$rounds=5000$'.$salt.'$');
  48. $hash = str_replace('$rounds=5000','',$hash);
  49. }
  50. if ($method == 'des' ) {
  51. $hash = crypt($password, $salt);
  52. }
  53. // Send hash via tmp file
  54. $v_hash = exec('mktemp -p /tmp');
  55. $fp = fopen($v_hash, "w");
  56. fwrite($fp, $hash."\n");
  57. fclose($fp);
  58. // Check user hash
  59. exec(HESTIA_CMD ."v-check-user-hash ".$v_user." ".$v_hash." ".$v_ip, $output, $return_var);
  60. unset($output);
  61. // Remove tmp file
  62. unlink($v_hash);
  63. // Check API answer
  64. if ( $return_var > 0 ) {
  65. $ERROR = "<a class=\"error\">".__('Invalid username or password')."</a>";
  66. } else {
  67. // Make root admin user
  68. if ($_POST['user'] == 'root') $v_user = 'admin';
  69. // Get user speciefic parameters
  70. exec (HESTIA_CMD . "v-list-user ".$v_user." json", $output, $return_var);
  71. $data = json_decode(implode('', $output), true);
  72. // Check if 2FA is active
  73. if ($data[$_POST['user']]['TWOFA'] != '') {
  74. if (isset($v_twofa)){
  75. exec(HESTIA_CMD ."v-check-user-2fa ".$v_user." ".$v_twofa, $output, $return_var);
  76. unset($output);
  77. if ( $return_var > 0 ) {
  78. $ERROR = "<a class=\"error\">".__('Invalid or missing 2FA token')."</a>";
  79. }
  80. } else {
  81. $ERROR = "<a class=\"error\">".__('Invalid or missing 2FA token')."</a>";
  82. }
  83. }
  84. // Check if 2FA was successfully
  85. if ( ! isset($v_twofa) || $ERROR == '' ) {
  86. // Define session user
  87. $_SESSION['user'] = key($data);
  88. $v_user = $_SESSION['user'];
  89. // Get user favorites
  90. get_favourites();
  91. // Define language
  92. $output = '';
  93. exec (HESTIA_CMD."v-list-sys-languages json", $output, $return_var);
  94. $languages = json_decode(implode('', $output), true);
  95. if (in_array($data[$v_user]['LANGUAGE'], $languages)){
  96. $_SESSION['language'] = $data[$v_user]['LANGUAGE'];
  97. } else {
  98. $_SESSION['language'] = 'en';
  99. }
  100. // Regenerate session id to prevent session fixation
  101. session_regenerate_id();
  102. // Redirect request to control panel interface
  103. if (!empty($_SESSION['request_uri'])) {
  104. header("Location: ".$_SESSION['request_uri']);
  105. unset($_SESSION['request_uri']);
  106. exit;
  107. } else {
  108. header("Location: /list/user/");
  109. exit;
  110. }
  111. }
  112. }
  113. }
  114. } else {
  115. $ERROR = "<a class=\"error\">".__('Invalid or missing token')."</a>";
  116. }
  117. }
  118. // Check system configuration
  119. exec (HESTIA_CMD . "v-list-sys-config json", $output, $return_var);
  120. $data = json_decode(implode('', $output), true);
  121. $sys_arr = $data['config'];
  122. foreach ($sys_arr as $key => $value) {
  123. $_SESSION[$key] = $value;
  124. }
  125. // Detect language
  126. if (empty($_SESSION['language'])) {
  127. $output = '';
  128. exec (HESTIA_CMD."v-list-sys-config json", $output, $return_var);
  129. $config = json_decode(implode('', $output), true);
  130. $lang = $config['config']['LANGUAGE'];
  131. $output = '';
  132. exec (HESTIA_CMD."v-list-sys-languages json", $output, $return_var);
  133. $languages = json_decode(implode('', $output), true);
  134. if(in_array($lang, $languages)){
  135. $_SESSION['language'] = $lang;
  136. }
  137. else {
  138. $_SESSION['language'] = 'en';
  139. }
  140. }
  141. // Generate CSRF token
  142. $_SESSION['token'] = md5(uniqid(mt_rand(), true));
  143. require_once($_SERVER['DOCUMENT_ROOT'].'/inc/i18n/'.$_SESSION['language'].'.php');
  144. require_once('../templates/header.html');
  145. require_once('../templates/login.html');