index.php 6.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190
  1. <?php
  2. define('NO_AUTH_REQUIRED',true);
  3. // Main include
  4. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  5. $TAB = 'login';
  6. // Logout
  7. if (isset($_GET['logout'])) {
  8. session_destroy();
  9. }
  10. // Login as someone else
  11. if (isset($_SESSION['user'])) {
  12. if ($_SESSION['user'] == 'admin' && !empty($_GET['loginas'])) {
  13. exec (HESTIA_CMD . "v-list-user ".escapeshellarg($_GET['loginas'])." json", $output, $return_var);
  14. if ( $return_var == 0 ) {
  15. $data = json_decode(implode('', $output), true);
  16. reset($data);
  17. $_SESSION['look'] = key($data);
  18. $_SESSION['look_alert'] = 'yes';
  19. }
  20. }
  21. if ($_SESSION['user'] == 'admin' && empty($_GET['loginas'])) {
  22. header("Location: /list/user/");
  23. } else {
  24. header("Location: /list/web/");
  25. }
  26. exit;
  27. }
  28. function authenticate_user(){
  29. if(isset($_SESSION['token']) && isset($_POST['token']) && $_POST['token'] == $_SESSION['token']) {
  30. $v_user = escapeshellarg($_POST['user']);
  31. $v_ip = escapeshellarg($_SERVER['REMOTE_ADDR']);
  32. if(isset($_SERVER['HTTP_CF_CONNECTING_IP'])){
  33. if(!empty($_SERVER['HTTP_CF_CONNECTING_IP'])){
  34. $v_ip = escapeshellarg($_SERVER['HTTP_CF_CONNECTING_IP']);
  35. }
  36. }
  37. // Get user's salt
  38. $output = '';
  39. exec (HESTIA_CMD."v-get-user-salt ".$v_user." ".$v_ip." json" , $output, $return_var);
  40. $pam = json_decode(implode('', $output), true);
  41. if ( $return_var > 0 ) {
  42. sleep(2);
  43. unset($_POST['password']);
  44. unset($_POST['user']);
  45. $error = "<a class=\"error\">".__('Invalid username or password')."</a>";
  46. return $error;
  47. } else {
  48. $user = $_POST['user'];
  49. $password = $_POST['password'];
  50. $salt = $pam[$user]['SALT'];
  51. $method = $pam[$user]['METHOD'];
  52. if ($method == 'md5' ) {
  53. $hash = crypt($password, '$1$'.$salt.'$');
  54. }
  55. if ($method == 'sha-512' ) {
  56. $hash = crypt($password, '$6$rounds=5000$'.$salt.'$');
  57. $hash = str_replace('$rounds=5000','',$hash);
  58. }
  59. if ($method == 'des' ) {
  60. $hash = crypt($password, $salt);
  61. }
  62. // Send hash via tmp file
  63. $v_hash = exec('mktemp -p /tmp');
  64. $fp = fopen($v_hash, "w");
  65. fwrite($fp, $hash."\n");
  66. fclose($fp);
  67. // Check user hash
  68. exec(HESTIA_CMD ."v-check-user-hash ".$v_user." ".$v_hash." ".$v_ip, $output, $return_var);
  69. unset($output);
  70. // Remove tmp file
  71. unlink($v_hash);
  72. // Check API answer
  73. if ( $return_var > 0 ) {
  74. sleep(2);
  75. unset($_POST['password']);
  76. $error = "<a class=\"error\">".__('Invalid username or password')."</a>";
  77. return $error;
  78. } else {
  79. // Make root admin user
  80. if ($_POST['user'] == 'root') $v_user = 'admin';
  81. // Get user speciefic parameters
  82. exec (HESTIA_CMD . "v-list-user ".$v_user." json", $output, $return_var);
  83. $data = json_decode(implode('', $output), true);
  84. // Check if 2FA is active
  85. if ($data[$_POST['user']]['TWOFA'] != '') {
  86. if (empty($_POST['twofa'])){
  87. return false;
  88. }else{
  89. $v_twofa = $_POST['twofa'];
  90. exec(HESTIA_CMD ."v-check-user-2fa ".$v_user." ".$v_twofa, $output, $return_var);
  91. unset($output);
  92. if ( $return_var > 0 ) {
  93. sleep(2);
  94. $error = "<a class=\"error\">".__('Invalid or missing 2FA token')."</a>";
  95. return $error;
  96. unset($_POST['twofa']);
  97. }
  98. }
  99. }
  100. // Define session user
  101. $_SESSION['user'] = key($data);
  102. $v_user = $_SESSION['user'];
  103. // Define language
  104. $output = '';
  105. exec (HESTIA_CMD."v-list-sys-languages json", $output, $return_var);
  106. $languages = json_decode(implode('', $output), true);
  107. if (in_array($data[$v_user]['LANGUAGE'], $languages)){
  108. $_SESSION['language'] = $data[$v_user]['LANGUAGE'];
  109. } else {
  110. $_SESSION['language'] = 'en';
  111. }
  112. // Regenerate session id to prevent session fixation
  113. session_regenerate_id();
  114. // Redirect request to control panel interface
  115. if (!empty($_SESSION['request_uri'])) {
  116. header("Location: ".$_SESSION['request_uri']);
  117. unset($_SESSION['request_uri']);
  118. exit;
  119. } else {
  120. if ($v_user == 'admin') {
  121. header("Location: /list/user/");
  122. } else {
  123. header("Location: /list/web/");
  124. }
  125. exit;
  126. }
  127. }
  128. }
  129. }
  130. }
  131. if (!empty($_POST['user']) && !empty($_POST['password']) && !empty($_POST['twofa'])){
  132. $error = authenticate_user();
  133. } else if (!empty($_POST['user']) && !empty($_POST['password'])) {
  134. $error = authenticate_user();
  135. }
  136. // Check system configuration
  137. load_hestia_config();
  138. // Detect language
  139. if (empty($_SESSION['language'])) {
  140. $output = '';
  141. exec (HESTIA_CMD."v-list-sys-config json", $output, $return_var);
  142. $config = json_decode(implode('', $output), true);
  143. $lang = $config['config']['LANGUAGE'];
  144. $output = '';
  145. exec (HESTIA_CMD."v-list-sys-languages json", $output, $return_var);
  146. $languages = json_decode(implode('', $output), true);
  147. if(in_array($lang, $languages)){
  148. $_SESSION['language'] = $lang;
  149. }
  150. else {
  151. $_SESSION['language'] = 'en';
  152. }
  153. }
  154. // Generate CSRF token
  155. $_SESSION['token'] = md5(uniqid(mt_rand(), true));
  156. require_once($_SERVER['DOCUMENT_ROOT'].'/inc/i18n/'.$_SESSION['language'].'.php');
  157. require_once('../templates/header.html');
  158. if (empty($_POST['user'])) {
  159. require_once('../templates/login.html');
  160. }else if (empty($_POST['password'])) {
  161. require_once('../templates/login_1.html');
  162. }else if (empty($_POST['twofa'])) {
  163. require_once('../templates/login_2.html');
  164. } else {
  165. require_once('../templates/login.html');
  166. }
  167. ?>