index.php 1.3 KB

1234567891011121314151617181920212223242526272829303132333435363738394041
  1. <?php
  2. session_start();
  3. if (isset($_GET['logout'])) {
  4. session_destroy();
  5. }
  6. if (isset($_SESSION['user'])) {
  7. if ($_SESSION['user'] == 'admin' && !empty($_GET['loginas'])) {
  8. if ($_GET['loginas'] == 'admin') {
  9. unset($_SESSION['look']);
  10. } else {
  11. $_SESSION['look'] = $_GET['loginas'];
  12. $_SESSION['look_alert'] = $_GET['loginas'];
  13. }
  14. }
  15. header("Location: /");
  16. exit;
  17. } else {
  18. if (isset($_POST['user']) && isset($_POST['password'])) {
  19. $cmd="/usr/bin/sudo /usr/local/vesta/bin/";
  20. $command="$cmd"."v_check_user_password '".$_POST['user']."' '".$_POST['password']."' '".$_SERVER["REMOTE_ADDR"]."'";
  21. exec ($command, $output, $return_var);
  22. if ( $return_var > 0 ) {
  23. $ERROR = "<a class=\"error\">ERROR: Invalid username or password</a>";
  24. } else {
  25. $_SESSION['user'] = $_POST['user'];
  26. if ($_POST['user'] == 'root') $_SESSION['user'] = 'admin';
  27. if (!empty($_SESSION['request_uri'])) {
  28. header("Location: ".$_SESSION['request_uri']);
  29. unset($_SESSION['request_uri']);
  30. exit;
  31. } else {
  32. header("Location: /");
  33. exit;
  34. }
  35. }
  36. }
  37. require_once '../templates/login.html';
  38. }
  39. ?>