index.php 1.3 KB

123456789101112131415161718192021222324252627282930313233343536373839
  1. <?php
  2. define('NO_AUTH_REQUIRED', true);
  3. $TAB = 'RESET PASSWORD';
  4. if (isset($_SESSION['user'])) {
  5. header("Location: /list/user");
  6. }
  7. // Main include
  8. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  9. //Check values
  10. if (!empty($_POST['user']) && !empty($_POST['twofa'])) {
  11. // Check token
  12. verify_csrf($_POST);
  13. $error = true;
  14. $v_user = escapeshellarg($_POST['user']);
  15. $user = $_POST['user'];
  16. $twofa = $_POST['twofa'];
  17. exec(HESTIA_CMD . "v-list-user ".$v_user .' json', $output, $return_var);
  18. if ($return_var == 0) {
  19. $data = json_decode(implode('', $output), true);
  20. if ($data[$user]['TWOFA'] == $twofa) {
  21. $success = true;
  22. exec(HESTIA_CMD . "v-delete-user-2fa ".$v_user, $output, $return_var);
  23. session_destroy();
  24. } else {
  25. exec(HESTIA_CMD . 'v-log-user-login ' . $v_user . ' ' . $v_ip . ' failed ' . $v_session_id . ' ' . $v_user_agent .' yes "Failed to enter correct 2FA reset key"', $output, $return_var);
  26. sleep(5);
  27. }
  28. } else {
  29. exec(HESTIA_CMD . 'v-log-user-login ' . $v_user . ' ' . $v_ip . ' failed ' . $v_session_id . ' ' . $v_user_agent .' yes "Failed to enter correct 2FA reset key"', $output, $return_var);
  30. sleep(5);
  31. }
  32. }
  33. require_once '../templates/header.html';
  34. require_once '../templates/pages/login/reset2fa.html';