index.php 5.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166
  1. <?php
  2. define('NO_AUTH_REQUIRED',true);
  3. // Main include
  4. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  5. $TAB = 'LOGIN';
  6. // Logout
  7. if (isset($_GET['logout'])) {
  8. session_destroy();
  9. }
  10. // Login as someone else
  11. if (isset($_SESSION['user'])) {
  12. if ((!isset($_GET['token'])) || ($_SESSION['token'] != $_GET['token'])) {
  13. session_destroy();
  14. session_start();
  15. header('Location: /login/');
  16. exit();
  17. }
  18. if ($_SESSION['user'] == 'admin' && !empty($_GET['loginas'])) {
  19. exec (VESTA_CMD . "v-list-user ".escapeshellarg($_GET['loginas'])." json", $output, $return_var);
  20. if ( $return_var == 0 ) {
  21. $data = json_decode(implode('', $output), true);
  22. reset($data);
  23. $_SESSION['look'] = key($data);
  24. $_SESSION['look_alert'] = 'yes';
  25. }
  26. }
  27. header("Location: /list/user/");
  28. exit;
  29. }
  30. // Basic auth
  31. if (isset($_POST['user']) && isset($_POST['password'])) {
  32. if(isset($_SESSION['token']) && isset($_POST['token']) && $_POST['token'] == $_SESSION['token']) {
  33. $v_user = escapeshellarg($_POST['user']);
  34. $v_ip = escapeshellarg($_SERVER['REMOTE_ADDR']);
  35. if($_POST['user'] == 'root'){
  36. unset($_POST['password']);
  37. unset($_POST['user']);
  38. $ERROR = "<a class=\"error\">".__('Login with root has been disabled')."</a>";
  39. } else {
  40. // Get user's salt
  41. $output = '';
  42. exec (VESTA_CMD."v-get-user-salt ".$v_user." ".$v_ip." json" , $output, $return_var);
  43. $pam = json_decode(implode('', $output), true);
  44. if ( $return_var > 0 ) {
  45. $ERROR = "<a class=\"error\">".__('Invalid username or password')."</a>";
  46. } else {
  47. $user = $_POST['user'];
  48. $password = $_POST['password'];
  49. $salt = $pam[$user]['SALT'];
  50. $method = $pam[$user]['METHOD'];
  51. if ($method == 'md5' ) {
  52. $hash = crypt($password, '$1$'.$salt.'$');
  53. }
  54. if ($method == 'sha-512' ) {
  55. $hash = crypt($password, '$6$rounds=5000$'.$salt.'$');
  56. $hash = str_replace('$rounds=5000','',$hash);
  57. }
  58. if ($method == 'des' ) {
  59. $hash = crypt($password, $salt);
  60. }
  61. // Send hash via tmp file
  62. $v_hash = exec('mktemp -p /tmp');
  63. $fp = fopen($v_hash, "w");
  64. fwrite($fp, $hash."\n");
  65. fclose($fp);
  66. // Check user hash
  67. exec(VESTA_CMD ."v-check-user-hash ".$v_user." ".$v_hash." ".$v_ip, $output, $return_var);
  68. unset($output);
  69. // Remove tmp file
  70. unlink($v_hash);
  71. // Check API answer
  72. if ( $return_var > 0 ) {
  73. $ERROR = "<a class=\"error\">".__('Invalid username or password')."</a>";
  74. } else {
  75. // Make root admin user
  76. // if ($_POST['user'] == 'root') $v_user = 'admin';
  77. // Get user speciefic parameters
  78. exec (VESTA_CMD . "v-list-user ".$v_user." json", $output, $return_var);
  79. $data = json_decode(implode('', $output), true);
  80. // Define session user
  81. $_SESSION['user'] = key($data);
  82. $v_user = $_SESSION['user'];
  83. // Get user favorites
  84. get_favourites();
  85. // Define language
  86. $output = '';
  87. exec (VESTA_CMD."v-list-sys-languages json", $output, $return_var);
  88. $languages = json_decode(implode('', $output), true);
  89. if (in_array($data[$v_user]['LANGUAGE'], $languages)){
  90. $_SESSION['language'] = $data[$v_user]['LANGUAGE'];
  91. } else {
  92. $_SESSION['language'] = 'en';
  93. }
  94. // Regenerate session id to prevent session fixation
  95. session_regenerate_id(true);
  96. // Redirect request to control panel interface
  97. if (!empty($_SESSION['request_uri'])) {
  98. header("Location: ".$_SESSION['request_uri']);
  99. unset($_SESSION['request_uri']);
  100. exit;
  101. } else {
  102. header("Location: /list/user/");
  103. exit;
  104. }
  105. }
  106. }
  107. }
  108. } else {
  109. $ERROR = "<a class=\"error\">".__('Invalid or missing token')."</a>";
  110. }
  111. }
  112. // Check system configuration
  113. exec (VESTA_CMD . "v-list-sys-config json", $output, $return_var);
  114. $data = json_decode(implode('', $output), true);
  115. $sys_arr = $data['config'];
  116. foreach ($sys_arr as $key => $value) {
  117. $_SESSION[$key] = $value;
  118. }
  119. // Detect language
  120. if (empty($_SESSION['language'])) {
  121. $output = '';
  122. exec (VESTA_CMD."v-list-sys-config json", $output, $return_var);
  123. $config = json_decode(implode('', $output), true);
  124. $lang = $config['config']['LANGUAGE'];
  125. $output = '';
  126. exec (VESTA_CMD."v-list-sys-languages json", $output, $return_var);
  127. $languages = json_decode(implode('', $output), true);
  128. if(in_array($lang, $languages)){
  129. $_SESSION['language'] = $lang;
  130. }
  131. else {
  132. $_SESSION['language'] = 'en';
  133. }
  134. }
  135. // Generate CSRF token
  136. $token = bin2hex(file_get_contents('/dev/urandom', false, null, 0, 16));
  137. $_SESSION['token'] = $token;
  138. require_once($_SERVER['DOCUMENT_ROOT'].'/inc/i18n/'.$_SESSION['language'].'.php');
  139. require_once('../templates/header.html');
  140. require_once('../templates/login.html');