index.php 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196
  1. <?php
  2. define('NO_AUTH_REQUIRED',true);
  3. // Main include
  4. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  5. $TAB = 'login';
  6. // Logout
  7. if (isset($_GET['logout'])) {
  8. setcookie('limit2fa','',time() - 3600,"/");
  9. session_destroy();
  10. }
  11. // Login as someone else
  12. if (isset($_SESSION['user'])) {
  13. if ($_SESSION['user'] == 'admin' && !empty($_GET['loginas'])) {
  14. exec (HESTIA_CMD . "v-list-user ".escapeshellarg($_GET['loginas'])." json", $output, $return_var);
  15. if ( $return_var == 0 ) {
  16. $data = json_decode(implode('', $output), true);
  17. reset($data);
  18. $_SESSION['look'] = key($data);
  19. $_SESSION['look_alert'] = 'yes';
  20. }
  21. }
  22. if ($_SESSION['user'] == 'admin' && empty($_GET['loginas'])) {
  23. header("Location: /list/user/");
  24. } else {
  25. header("Location: /list/web/");
  26. }
  27. exit;
  28. }
  29. function authenticate_user(){
  30. if(isset($_SESSION['token']) && isset($_POST['token']) && $_POST['token'] == $_SESSION['token']) {
  31. $v_user = escapeshellarg($_POST['user']);
  32. $ip = $_SERVER['REMOTE_ADDR'];
  33. if(isset($_SERVER['HTTP_CF_CONNECTING_IP'])){
  34. if(!empty($_SERVER['HTTP_CF_CONNECTING_IP'])){
  35. $ip = $_SERVER['HTTP_CF_CONNECTING_IP'];
  36. }
  37. }
  38. $v_ip = escapeshellarg($ip);
  39. // Get user's salt
  40. $output = '';
  41. exec (HESTIA_CMD."v-get-user-salt ".$v_user." ".$v_ip." json" , $output, $return_var);
  42. $pam = json_decode(implode('', $output), true);
  43. if ( $return_var > 0 ) {
  44. sleep(2);
  45. unset($_POST['password']);
  46. unset($_POST['user']);
  47. $error = "<a class=\"error\">".__('Invalid username or password')."</a>";
  48. return $error;
  49. } else {
  50. $user = $_POST['user'];
  51. $password = $_POST['password'];
  52. $salt = $pam[$user]['SALT'];
  53. $method = $pam[$user]['METHOD'];
  54. if ($method == 'md5' ) {
  55. $hash = crypt($password, '$1$'.$salt.'$');
  56. }
  57. if ($method == 'sha-512' ) {
  58. $hash = crypt($password, '$6$rounds=5000$'.$salt.'$');
  59. $hash = str_replace('$rounds=5000','',$hash);
  60. }
  61. if ($method == 'des' ) {
  62. $hash = crypt($password, $salt);
  63. }
  64. // Send hash via tmp file
  65. $v_hash = exec('mktemp -p /tmp');
  66. $fp = fopen($v_hash, "w");
  67. fwrite($fp, $hash."\n");
  68. fclose($fp);
  69. // Check user hash
  70. exec(HESTIA_CMD ."v-check-user-hash ".$v_user." ".$v_hash." ".$v_ip, $output, $return_var);
  71. unset($output);
  72. // Remove tmp file
  73. unlink($v_hash);
  74. // Check API answer
  75. if ( $return_var > 0 ) {
  76. sleep(2);
  77. unset($_POST['password']);
  78. $error = "<a class=\"error\">".__('Invalid username or password')."</a>";
  79. return $error;
  80. } else {
  81. // Make root admin user
  82. if ($_POST['user'] == 'root') $v_user = 'admin';
  83. // Get user speciefic parameters
  84. exec (HESTIA_CMD . "v-list-user ".$v_user." json", $output, $return_var);
  85. $data = json_decode(implode('', $output), true);
  86. if ($data[$user]['TWOFA'] != '') {
  87. if(password_verify($data[$user]['TWOFA'].$ip.$_POST['murmur'],$_COOKIE['limit2fa'])){
  88. }else{
  89. setcookie('limit2fa','',time() - 3600,"/");
  90. if(empty($_POST['twofa'])){
  91. return false;
  92. }else{
  93. $v_twofa = $_POST['twofa'];
  94. exec(HESTIA_CMD ."v-check-user-2fa ".$v_user." ".$v_twofa, $output, $return_var);
  95. unset($output);
  96. if ( $return_var > 0 ) {
  97. sleep(2);
  98. $error = "<a class=\"error\">".__('Invalid or missing 2FA token')."</a>";
  99. return $error;
  100. unset($_POST['twofa']);
  101. }
  102. }
  103. }
  104. }
  105. // Define session user
  106. $_SESSION['user'] = key($data);
  107. $v_user = $_SESSION['user'];
  108. //rename $_SESSION['TWOFA_VALID_LENGTH'] still to be done!
  109. if(empty($_COOKIE['limit2fa'] && $_SESSION['TWOFA_VALID_LENGTH'] == 1 && $data[$user]['TWOFA'] != "")){
  110. setcookie('limit2fa',password_hash($data[$user]['TWOFA'].$ip.$_POST['murmur'],PASSWORD_BCRYPT),time()+60*60*24,"/");
  111. };
  112. $_SESSION['LAST_ACTIVITY'] = time();
  113. // Define language
  114. $output = '';
  115. exec (HESTIA_CMD."v-list-sys-languages json", $output, $return_var);
  116. $languages = json_decode(implode('', $output), true);
  117. if (in_array($data[$v_user]['LANGUAGE'], $languages)){
  118. $_SESSION['language'] = $data[$v_user]['LANGUAGE'];
  119. } else {
  120. $_SESSION['language'] = 'en';
  121. }
  122. // Regenerate session id to prevent session fixation
  123. session_regenerate_id();
  124. // Redirect request to control panel interface
  125. if (!empty($_SESSION['request_uri'])) {
  126. header("Location: ".$_SESSION['request_uri']);
  127. unset($_SESSION['request_uri']);
  128. exit;
  129. } else {
  130. if ($v_user == 'admin') {
  131. header("Location: /list/user/");
  132. } else {
  133. header("Location: /list/web/");
  134. }
  135. exit;
  136. }
  137. }
  138. }
  139. }
  140. }
  141. if (!empty($_POST['user']) && !empty($_POST['password']) && !empty($_POST['twofa'])){
  142. $error = authenticate_user();
  143. } else if (!empty($_POST['user']) && !empty($_POST['password'])) {
  144. $error = authenticate_user();
  145. }
  146. // Check system configuration
  147. load_hestia_config();
  148. // Detect language
  149. if (empty($_SESSION['language'])) {
  150. $output = '';
  151. exec (HESTIA_CMD."v-list-sys-config json", $output, $return_var);
  152. $config = json_decode(implode('', $output), true);
  153. $lang = $config['config']['LANGUAGE'];
  154. $output = '';
  155. exec (HESTIA_CMD."v-list-sys-languages json", $output, $return_var);
  156. $languages = json_decode(implode('', $output), true);
  157. if(in_array($lang, $languages)){
  158. $_SESSION['language'] = $lang;
  159. }
  160. else {
  161. $_SESSION['language'] = 'en';
  162. }
  163. }
  164. // Generate CSRF token
  165. $_SESSION['token'] = md5(uniqid(mt_rand(), true));
  166. require_once($_SERVER['DOCUMENT_ROOT'].'/inc/i18n/'.$_SESSION['language'].'.php');
  167. require_once('../templates/header.html');
  168. if (empty($_POST['user'])) {
  169. require_once('../templates/login.html');
  170. }else if (empty($_POST['password'])) {
  171. require_once('../templates/login_1.html');
  172. }else if (empty($_POST['twofa'])) {
  173. require_once('../templates/login_2.html');
  174. } else {
  175. require_once('../templates/login.html');
  176. }
  177. ?>