index.php 1.2 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253
  1. <?php
  2. use function Hestiacp\quoteshellarg\quoteshellarg;
  3. ob_start();
  4. include $_SERVER["DOCUMENT_ROOT"] . "/inc/main.php";
  5. // Check token
  6. verify_csrf($_GET);
  7. if ($_SESSION["userContext"] === "admin" && !empty($_GET["user"])) {
  8. $user = quoteshellarg($_GET["user"]);
  9. $user_plain = $_GET["user"];
  10. }
  11. // Checks if API access is enabled
  12. $api_status =
  13. !empty($_SESSION["API_SYSTEM"]) && is_numeric($_SESSION["API_SYSTEM"])
  14. ? $_SESSION["API_SYSTEM"]
  15. : 0;
  16. if (
  17. ($user_plain == $_SESSION["ROOT_USER"] && $api_status < 1) ||
  18. ($user_plain != $_SESSION["ROOT_USER"] && $api_status < 2)
  19. ) {
  20. header("Location: /edit/user/");
  21. exit();
  22. }
  23. if (!empty($_GET["key"])) {
  24. $v_key = quoteshellarg(trim($_GET["key"]));
  25. // Key data
  26. exec(HESTIA_CMD . "v-list-access-key " . $v_key . " json", $output, $return_var);
  27. $key_data = json_decode(implode("", $output), true);
  28. unset($output);
  29. if (empty($key_data) || $key_data["USER"] != $user_plain) {
  30. header("Location: /list/access-key/");
  31. exit();
  32. }
  33. exec(HESTIA_CMD . "v-delete-access-key " . $v_key, $output, $return_var);
  34. check_return_code($return_var, $output);
  35. unset($output);
  36. }
  37. $back = $_SESSION["back"];
  38. if (!empty($back)) {
  39. header("Location: " . $back);
  40. exit();
  41. }
  42. header("Location: /list/key/");
  43. exit();