index.php 1.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960
  1. <?php
  2. use function Hestiacp\quoteshellarg\quoteshellarg;
  3. include $_SERVER["DOCUMENT_ROOT"] . "/inc/main.php";
  4. // Check token
  5. verify_csrf($_GET);
  6. // Check if administrator is viewing system log (currently 'admin' user)
  7. if ($_SESSION["userContext"] === "admin" && isset($_GET["user"])) {
  8. $user = quoteshellarg($_GET["user"]);
  9. $token = $_SESSION["token"];
  10. }
  11. // Clear log
  12. exec(HESTIA_CMD . "v-delete-user-auth-log " . $user, $output, $return_var);
  13. check_return_code($return_var, $output);
  14. unset($output);
  15. $ip = $_SERVER["REMOTE_ADDR"];
  16. if (isset($_SERVER["HTTP_CF_CONNECTING_IP"])) {
  17. if (!empty($_SERVER["HTTP_CF_CONNECTING_IP"])) {
  18. $ip = $_SERVER["HTTP_CF_CONNECTING_IP"];
  19. }
  20. }
  21. $v_ip = quoteshellarg($ip);
  22. $user_agent = $_SERVER["HTTP_USER_AGENT"];
  23. $v_user_agent = quoteshellarg($user_agent);
  24. $v_session_id = quoteshellarg($_SESSION["token"]);
  25. // Add current user session back to log unless impersonating another user
  26. if (!isset($_SESSION["look"])) {
  27. exec(
  28. HESTIA_CMD .
  29. "v-log-user-login " .
  30. $user .
  31. " " .
  32. $v_ip .
  33. " success " .
  34. $v_session_id .
  35. " " .
  36. $v_user_agent,
  37. $output,
  38. $return_var,
  39. );
  40. }
  41. // Flush session messages
  42. unset($_SESSION["error_msg"]);
  43. unset($_SESSION["ok_msg"]);
  44. // Set correct page reload target
  45. if ($_SESSION["userContext"] === "admin" && !empty($_GET["user"])) {
  46. header("Location: /list/log/auth/?user=" . $_GET["user"] . "&token=$token");
  47. } else {
  48. header("Location: /list/log/auth/");
  49. }
  50. exit();