index.php 1.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869
  1. <?php
  2. use function Hestiacp\quoteshellarg\quoteshellarg;
  3. ob_start();
  4. $TAB = "FIREWALL";
  5. // Main include
  6. include $_SERVER["DOCUMENT_ROOT"] . "/inc/main.php";
  7. // Check user
  8. if ($_SESSION["userContext"] != "admin") {
  9. header("Location: /list/user");
  10. exit();
  11. }
  12. // Check POST request
  13. if (!empty($_POST["ok"])) {
  14. // Check token
  15. verify_csrf($_POST);
  16. // Check empty fields
  17. if (empty($_POST["v_chain"])) {
  18. $errors[] = _("Banlist");
  19. }
  20. if (empty($_POST["v_ip"])) {
  21. $errors[] = _("IP Address");
  22. }
  23. if (!empty($errors[0])) {
  24. foreach ($errors as $i => $error) {
  25. if ($i == 0) {
  26. $error_msg = $error;
  27. } else {
  28. $error_msg = $error_msg . ", " . $error;
  29. }
  30. }
  31. $_SESSION["error_msg"] = sprintf(_('Field "%s" can not be blank.'), $error_msg);
  32. }
  33. // Protect input
  34. $v_chain = quoteshellarg($_POST["v_chain"]);
  35. $v_ip = quoteshellarg($_POST["v_ip"]);
  36. // Add firewall rule
  37. if (empty($_SESSION["error_msg"])) {
  38. exec(HESTIA_CMD . "v-add-firewall-ban " . $v_ip . " " . $v_chain, $output, $return_var);
  39. check_return_code($return_var, $output);
  40. unset($output);
  41. }
  42. // Flush field values on success
  43. if (empty($_SESSION["error_msg"])) {
  44. $_SESSION["ok_msg"] = _("IP address has been banned successfully.");
  45. unset($v_chain);
  46. unset($v_ip);
  47. }
  48. }
  49. if (empty($v_ip)) {
  50. $v_ip = "";
  51. }
  52. if (empty($v_chain)) {
  53. $v_chain = "";
  54. }
  55. // Render
  56. render_page($user, $TAB, "add_firewall_banlist");
  57. // Flush session messages
  58. unset($_SESSION["error_msg"]);
  59. unset($_SESSION["ok_msg"]);