index.php 1.6 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455
  1. <?php
  2. session_start();
  3. define('NO_AUTH_REQUIRED',true);
  4. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  5. if (isset($_GET['logout'])) {
  6. session_destroy();
  7. }
  8. $TAB = 'LOGIN';
  9. if ($return_var != 0) {
  10. header("Location: /error/");
  11. exit;
  12. }
  13. if (isset($_SESSION['user'])) {
  14. if ($_SESSION['user'] == 'admin' && !empty($_GET['loginas'])) {
  15. if ($_GET['loginas'] == 'admin') {
  16. unset($_SESSION['look']);
  17. } else {
  18. $_SESSION['look'] = $_GET['loginas'];
  19. $_SESSION['look_alert'] = $_GET['loginas'];
  20. }
  21. }
  22. header("Location: /");
  23. exit;
  24. } else {
  25. if (isset($_POST['user']) && isset($_POST['password'])) {
  26. $cmd="/usr/bin/sudo /usr/local/vesta/bin/";
  27. $v_user = escapeshellarg($_POST['user']);
  28. $v_password = escapeshellarg($_POST['password']);
  29. $command="$cmd"."v-check-user-password ".$v_user." ".$v_password." '".$_SERVER["REMOTE_ADDR"]."'";
  30. exec ($command, $output, $return_var);
  31. if ( $return_var > 0 ) {
  32. $ERROR = "<a class=\"error\">"._('ERROR: Invalid username or password')."</a>";
  33. } else {
  34. $_SESSION['user'] = $_POST['user'];
  35. if ($_POST['user'] == 'root') $_SESSION['user'] = 'admin';
  36. if (!empty($_SESSION['request_uri'])) {
  37. header("Location: ".$_SESSION['request_uri']);
  38. unset($_SESSION['request_uri']);
  39. exit;
  40. } else {
  41. header("Location: /");
  42. exit;
  43. }
  44. }
  45. }
  46. require_once '../templates/header.html';
  47. require_once '../templates/login.html';
  48. }
  49. ?>