Explorar o código

Merge pull request #2256 from serghey-rodin/feature/reset-mail

Added mail reset in API
Anton Reutov %!s(int64=3) %!d(string=hai) anos
pai
achega
e527827174
Modificáronse 1 ficheiros con 168 adicións e 0 borrados
  1. 168 0
      web/api/v1/reset/mail/index.php

+ 168 - 0
web/api/v1/reset/mail/index.php

@@ -0,0 +1,168 @@
+<?php
+// Init
+define('NO_AUTH_REQUIRED',true);
+define('NO_AUTH_REQUIRED2',true);
+
+error_reporting(NULL);
+
+include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
+
+// Checking IP of incoming connection, checking is it NAT address
+$ok=0;
+$ip=$_SERVER['REMOTE_ADDR'];
+exec (VESTA_CMD."v-list-sys-ips json", $output, $return_var);
+$output=implode('', $output);
+$arr=json_decode($output, true);
+foreach ($arr as $arr_key => $arr_val) {
+    // search for NAT IPs and allow them
+	if ($ip==$arr_key || $ip==$arr_val['NAT']) {
+		$ok=1;
+		break;
+	}
+}
+if ($ip == $_SERVER['SERVER_ADDR']) $ok=1;
+if ($ip == '127.0.0.1') $ok=1;
+if ($ok==0) exit;
+if (isset($_SERVER['HTTP_X_REAL_IP']) || isset($_SERVER['HTTP_X_FORWARDED_FOR'])) exit;
+
+//
+// sourceforge.net/projects/postfixadmin/
+// md5crypt 
+// Action: Creates MD5 encrypted password
+// Call: md5crypt (string cleartextpassword)
+//
+
+function md5crypt ($pw, $salt="", $magic="")
+{
+    $MAGIC = "$1$";
+
+    if ($magic == "") $magic = $MAGIC;
+    if ($salt == "") $salt = create_salt ();
+    $slist = explode ("$", $salt);
+    if ($slist[0] == "1") $salt = $slist[1];
+
+    $salt = substr ($salt, 0, 8);
+    $ctx = $pw . $magic . $salt;
+    $final = hex2bin (md5 ($pw . $salt . $pw));
+
+    for ($i=strlen ($pw); $i>0; $i-=16)
+    {
+        if ($i > 16)
+        {
+            $ctx .= substr ($final,0,16);
+        }
+        else
+        {
+            $ctx .= substr ($final,0,$i);
+        }
+    }
+    $i = strlen ($pw);
+
+    while ($i > 0)
+    {
+        if ($i & 1) $ctx .= chr (0);
+        else $ctx .= $pw[0];
+        $i = $i >> 1;
+    }
+    $final = hex2bin (md5 ($ctx));
+
+    for ($i=0;$i<1000;$i++)
+    {
+        $ctx1 = "";
+        if ($i & 1)
+        {
+            $ctx1 .= $pw;
+        }
+        else
+        {
+            $ctx1 .= substr ($final,0,16);
+        }
+        if ($i % 3) $ctx1 .= $salt;
+        if ($i % 7) $ctx1 .= $pw;
+        if ($i & 1)
+        {
+            $ctx1 .= substr ($final,0,16);
+        }
+        else
+        {
+            $ctx1 .= $pw;
+        }
+        $final = hex2bin (md5 ($ctx1));
+    }
+    $passwd = "";
+    $passwd .= to64 (((ord ($final[0]) << 16) | (ord ($final[6]) << 8) | (ord ($final[12]))), 4);
+    $passwd .= to64 (((ord ($final[1]) << 16) | (ord ($final[7]) << 8) | (ord ($final[13]))), 4);
+    $passwd .= to64 (((ord ($final[2]) << 16) | (ord ($final[8]) << 8) | (ord ($final[14]))), 4);
+    $passwd .= to64 (((ord ($final[3]) << 16) | (ord ($final[9]) << 8) | (ord ($final[15]))), 4);
+    $passwd .= to64 (((ord ($final[4]) << 16) | (ord ($final[10]) << 8) | (ord ($final[5]))), 4);
+    $passwd .= to64 (ord ($final[11]), 2);
+    return "$magic$salt\$$passwd";
+}
+
+
+//
+// sourceforge.net/projects/postfixadmin/
+// to64
+//
+
+function to64 ($v, $n)
+{
+    $ITOA64 = "./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
+    $ret = "";
+    while (($n - 1) >= 0)
+    {
+        $n--;
+        $ret .= $ITOA64[$v & 0x3f];
+        $v = $v >> 6;
+    }
+    return $ret;
+}
+
+
+// Check arguments
+if ((!empty($_POST['email'])) && (!empty($_POST['password'])) && (!empty($_POST['new']))) {
+    list($v_account, $v_domain) = explode('@', $_POST['email']);
+    $v_domain = escapeshellarg($v_domain);
+    $v_account = escapeshellarg($v_account);
+    $v_password = $_POST['password'];
+
+    // Get domain owner
+    exec (VESTA_CMD."v-search-domain-owner ".$v_domain." mail", $output, $return_var);
+    if (($return_var == 0) && (!empty($output[0]))) {
+        $v_user = escapeshellarg($output[0]);
+    }
+    unset($output);
+
+    // Get current md5 hash
+    if (!empty($v_user)) {
+        exec (VESTA_CMD."v-get-mail-account-value ".$v_user." ".$v_domain." ".$v_account." md5", $output, $return_var);
+        if ($return_var == 0) {
+            $v_hash = $output[0];
+        }
+    }
+    unset($output);
+
+    // Compare hashes
+    if (!empty($v_hash)) {
+        $salt = explode('$', $v_hash);
+        $n_hash = md5crypt($v_password, $salt[2]);
+        $n_hash = '{MD5}'.$n_hash;
+
+        // Change password
+        if ( hash_equals($v_hash, $n_hash ) ) {
+            $v_new_password = tempnam("/tmp","vst");
+            $fp = fopen($v_new_password, "w");
+            fwrite($fp, $_POST['new']."\n");
+            fclose($fp);
+            exec (VESTA_CMD."v-change-mail-account-password ".$v_user." ".$v_domain." ".$v_account." ".$v_new_password, $output, $return_var);
+            if ($return_var == 0) {
+                echo "==ok==";
+                exit;
+            }
+        }
+    }
+}
+
+echo 'error';
+
+exit;