index.php 1.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051
  1. <?php
  2. session_start();
  3. define('NO_AUTH_REQUIRED',true);
  4. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  5. if (isset($_GET['logout'])) {
  6. session_destroy();
  7. }
  8. $TAB = 'LOGIN';
  9. if (isset($_SESSION['user'])) {
  10. if ($_SESSION['user'] == 'admin' && !empty($_GET['loginas'])) {
  11. if ($_GET['loginas'] == 'admin') {
  12. unset($_SESSION['look']);
  13. } else {
  14. $_SESSION['look'] = $_GET['loginas'];
  15. $_SESSION['look_alert'] = $_GET['loginas'];
  16. }
  17. }
  18. header("Location: /");
  19. exit;
  20. } else {
  21. if (isset($_POST['user']) && isset($_POST['password'])) {
  22. $cmd="/usr/bin/sudo /usr/local/vesta/bin/";
  23. $v_user = escapeshellarg($_POST['user']);
  24. $v_password = escapeshellarg($_POST['password']);
  25. $command="$cmd"."v-check-user-password ".$v_user." ".$v_password." '".$_SERVER["REMOTE_ADDR"]."'";
  26. exec ($command, $output, $return_var);
  27. if ( $return_var > 0 ) {
  28. $ERROR = "<a class=\"error\">"._('ERROR: Invalid username or password')."</a>";
  29. } else {
  30. $_SESSION['user'] = $_POST['user'];
  31. if ($_POST['user'] == 'root') $_SESSION['user'] = 'admin';
  32. if (!empty($_SESSION['request_uri'])) {
  33. header("Location: ".$_SESSION['request_uri']);
  34. unset($_SESSION['request_uri']);
  35. exit;
  36. } else {
  37. header("Location: /");
  38. exit;
  39. }
  40. }
  41. }
  42. require_once '../templates/header.html';
  43. require_once '../templates/login.html';
  44. }
  45. ?>