index.php 1.4 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243
  1. <?php
  2. session_start();
  3. if (isset($_GET['logout'])) {
  4. session_destroy();
  5. }
  6. if (isset($_SESSION['user'])) {
  7. if ($_SESSION['user'] == 'admin' && !empty($_GET['loginas'])) {
  8. if ($_GET['loginas'] == 'admin') {
  9. unset($_SESSION['look']);
  10. } else {
  11. $_SESSION['look'] = $_GET['loginas'];
  12. $_SESSION['look_alert'] = $_GET['loginas'];
  13. }
  14. }
  15. header("Location: /");
  16. exit;
  17. } else {
  18. if (isset($_POST['user']) && isset($_POST['password'])) {
  19. $cmd="/usr/bin/sudo /usr/local/vesta/bin/";
  20. $v_user = escapeshellarg($_POST['user']);
  21. $v_password = escapeshellarg($_POST['password']);
  22. $command="$cmd"."v_check_user_password ".$v_user." ".$v_password." '".$_SERVER["REMOTE_ADDR"]."'";
  23. exec ($command, $output, $return_var);
  24. if ( $return_var > 0 ) {
  25. $ERROR = "<a class=\"error\">ERROR: Invalid username or password</a>";
  26. } else {
  27. $_SESSION['user'] = $_POST['user'];
  28. if ($_POST['user'] == 'root') $_SESSION['user'] = 'admin';
  29. if (!empty($_SESSION['request_uri'])) {
  30. header("Location: ".$_SESSION['request_uri']);
  31. unset($_SESSION['request_uri']);
  32. exit;
  33. } else {
  34. header("Location: /");
  35. exit;
  36. }
  37. }
  38. }
  39. require_once '../templates/login.html';
  40. }
  41. ?>