index.php 1.4 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546
  1. <?php
  2. session_start();
  3. if (isset($_GET['logout'])) {
  4. session_destroy();
  5. }
  6. $TAB = 'LOGIN';
  7. if (isset($_SESSION['user'])) {
  8. if ($_SESSION['user'] == 'admin' && !empty($_GET['loginas'])) {
  9. if ($_GET['loginas'] == 'admin') {
  10. unset($_SESSION['look']);
  11. } else {
  12. $_SESSION['look'] = $_GET['loginas'];
  13. $_SESSION['look_alert'] = $_GET['loginas'];
  14. }
  15. }
  16. header("Location: /");
  17. exit;
  18. } else {
  19. if (isset($_POST['user']) && isset($_POST['password'])) {
  20. $cmd="/usr/bin/sudo /usr/local/vesta/bin/";
  21. $v_user = escapeshellarg($_POST['user']);
  22. $v_password = escapeshellarg($_POST['password']);
  23. $command="$cmd"."v-check-user-password ".$v_user." ".$v_password." '".$_SERVER["REMOTE_ADDR"]."'";
  24. exec ($command, $output, $return_var);
  25. if ( $return_var > 0 ) {
  26. $ERROR = "<a class=\"error\">ERROR: Invalid username or password</a>";
  27. } else {
  28. $_SESSION['user'] = $_POST['user'];
  29. if ($_POST['user'] == 'root') $_SESSION['user'] = 'admin';
  30. if (!empty($_SESSION['request_uri'])) {
  31. header("Location: ".$_SESSION['request_uri']);
  32. unset($_SESSION['request_uri']);
  33. exit;
  34. } else {
  35. header("Location: /");
  36. exit;
  37. }
  38. }
  39. }
  40. require_once '../templates/header.html';
  41. require_once '../templates/login.html';
  42. }
  43. ?>