index.php 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123
  1. <?php
  2. session_start();
  3. define('NO_AUTH_REQUIRED', true);
  4. $TAB = 'RESET PASSWORD';
  5. if (isset($_SESSION['user'])) {
  6. header("Location: /list/user");
  7. }
  8. // Main include
  9. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  10. if ((!empty($_POST['user'])) && (empty($_POST['code']))) {
  11. // Check token
  12. verify_csrf($_POST);
  13. $v_user = escapeshellarg($_POST['user']);
  14. $user = $_POST['user'];
  15. $email = $_POST['email'];
  16. $cmd="/usr/bin/sudo /usr/local/hestia/bin/v-list-user";
  17. exec($cmd." ".$v_user." json", $output, $return_var);
  18. if ($return_var == 0) {
  19. $data = json_decode(implode('', $output), true);
  20. if ($email == $data[$user]['CONTACT']) {
  21. //genrate new rkey
  22. $rkey = substr(password_hash(rand(0, 10), PASSWORD_DEFAULT), 5, 12);
  23. $hash = password_hash($rkey, PASSWORD_DEFAULT);
  24. $v_rkey = tempnam("/tmp", "vst");
  25. $fp = fopen($v_rkey, "w");
  26. fwrite($fp, $hash."\n");
  27. fclose($fp);
  28. exec("/usr/bin/sudo /usr/local/hestia/bin/v-change-user-rkey ".$v_user." ".$v_rkey."", $output, $return_var);
  29. unset($output);
  30. unlink($v_rkey);
  31. $name = $data[$user]['NAME'];
  32. $contact = $data[$user]['CONTACT'];
  33. $to = $data[$user]['CONTACT'];
  34. $subject = sprintf(_('MAIL_RESET_SUBJECT'), date("Y-m-d H:i:s"));
  35. $hostname = exec('hostname');
  36. $from = "noreply@".$hostname;
  37. $from_name = _('Hestia Control Panel');
  38. if (!empty($name)) {
  39. $mailtext = sprintf(_('GREETINGS_GORDON'), $name);
  40. } else {
  41. $mailtext = _('GREETINGS');
  42. }
  43. if (in_array(str_replace(':'.$_SERVER['SERVER_PORT'], '.conf', $_SERVER['HTTP_HOST']), array_merge(scandir('/etc/nginx/conf.d'), scandir('/etc/nginx/conf.d/domains'), scandir('/etc/apache2/conf.d/domains'), scandir('/etc/apache2/conf.d')))) {
  44. $mailtext .= sprintf(_('PASSWORD_RESET_REQUEST'), $_SERVER['HTTP_HOST'], $user, $rkey, $_SERVER['HTTP_HOST'], $user, $rkey);
  45. if (!empty($rkey)) {
  46. send_email($to, $subject, $mailtext, $from, $from_name, $data[$user]['NAME']);
  47. }
  48. header("Location: /reset/?action=code&user=".$_POST['user']);
  49. exit;
  50. } else {
  51. $ERROR = "<a class=\"error\">"._('Invalid host domain')."</a>";
  52. }
  53. }
  54. }
  55. unset($output);
  56. }
  57. if ((!empty($_POST['user'])) && (!empty($_POST['code'])) && (!empty($_POST['password']))) {
  58. // Check token
  59. verify_csrf($_POST);
  60. if ($_POST['password'] == $_POST['password_confirm']) {
  61. $v_user = escapeshellarg($_POST['user']);
  62. $user = $_POST['user'];
  63. $cmd="/usr/bin/sudo /usr/local/hestia/bin/v-list-user";
  64. exec($cmd." ".$v_user." json", $output, $return_var);
  65. if ($return_var == 0) {
  66. $data = json_decode(implode('', $output), true);
  67. $rkey = $data[$user]['RKEY'];
  68. if (password_verify($_POST['code'], $rkey)) {
  69. unset($output);
  70. exec("/usr/bin/sudo /usr/local/hestia/bin/v-get-user-value ".$v_user." RKEYEXP", $output, $return_var);
  71. if ($output[0] > time() - 900) {
  72. $v_password = tempnam("/tmp", "vst");
  73. $fp = fopen($v_password, "w");
  74. fwrite($fp, $_POST['password']."\n");
  75. fclose($fp);
  76. $cmd="/usr/bin/sudo /usr/local/hestia/bin/v-change-user-password";
  77. exec($cmd." ".$v_user." ".$v_password, $output, $return_var);
  78. unlink($v_password);
  79. if ($return_var > 0) {
  80. sleep(5);
  81. $ERROR = "<a class=\"error\">"._('An internal error occurred')."</a>";
  82. } else {
  83. $_SESSION['user'] = $_POST['user'];
  84. header("Location: /");
  85. exit;
  86. }
  87. } else {
  88. sleep(5);
  89. $ERROR = "<a class=\"error\">"._('Code has been expired')."</a>";
  90. exec(HESTIA_CMD . 'v-log-user-login ' . $v_user . ' ' . $v_ip . ' failed ' . $v_session_id . ' ' . $v_user_agent .' yes "Reset code has been expired"', $output, $return_var);
  91. }
  92. } else {
  93. sleep(5);
  94. $ERROR = "<a class=\"error\">"._('Invalid username or code')."</a>";
  95. exec(HESTIA_CMD . 'v-log-user-login ' . $v_user . ' ' . $v_ip . ' failed ' . $v_session_id . ' ' . $v_user_agent .' yes "Invalid Username or Code"', $output, $return_var);
  96. }
  97. } else {
  98. sleep(5);
  99. $ERROR = "<a class=\"error\">"._('Invalid username or code')."</a>";
  100. exec(HESTIA_CMD . 'v-log-user-login ' . $v_user . ' ' . $v_ip . ' failed ' . $v_session_id . ' ' . $v_user_agent .' yes "Invalid Username or Code"', $output, $return_var);
  101. }
  102. } else {
  103. $ERROR = "<a class=\"error\">"._('Passwords not match')."</a>";
  104. }
  105. }
  106. if (empty($_GET['action'])) {
  107. require_once '../templates/header.html';
  108. require_once '../templates/pages/login/reset_1.html';
  109. } else {
  110. require_once '../templates/header.html';
  111. if ($_GET['action'] == 'code') {
  112. require_once '../templates/pages/login/reset_2.html';
  113. }
  114. if (($_GET['action'] == 'confirm') && (!empty($_GET['code']))) {
  115. require_once '../templates/pages/login/reset_3.html';
  116. }
  117. }