mirror of
https://github.com/myvesta/vesta
synced 2025-07-05 20:41:53 -07:00
168 lines
5.8 KiB
PHP
168 lines
5.8 KiB
PHP
<?php
|
|
|
|
if ($_SERVER['REQUEST_METHOD']=='HEAD') exit; // Prevent recreation of token by shitty browser add-ons
|
|
|
|
define('NO_AUTH_REQUIRED',true);
|
|
|
|
|
|
// Main include
|
|
include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
|
|
|
|
|
|
$TAB = 'LOGIN';
|
|
|
|
// Logout
|
|
if (isset($_GET['logout'])) {
|
|
session_destroy();
|
|
}
|
|
|
|
// Login as someone else
|
|
if (isset($_SESSION['user'])) {
|
|
if ((!isset($_GET['token'])) || ($_SESSION['token'] != $_GET['token'])) {
|
|
session_destroy();
|
|
session_start();
|
|
header('Location: /login/');
|
|
exit();
|
|
}
|
|
if ($_SESSION['user'] == 'admin' && !empty($_GET['loginas'])) {
|
|
exec (VESTA_CMD . "v-list-user ".escapeshellarg($_GET['loginas'])." json", $output, $return_var);
|
|
if ( $return_var == 0 ) {
|
|
$data = json_decode(implode('', $output), true);
|
|
reset($data);
|
|
$_SESSION['look'] = key($data);
|
|
$_SESSION['look_alert'] = 'yes';
|
|
}
|
|
}
|
|
header("Location: /list/user/");
|
|
exit;
|
|
}
|
|
|
|
// Basic auth
|
|
if (isset($_POST['user']) && isset($_POST['password'])) {
|
|
if(isset($_SESSION['token']) && isset($_POST['token']) && $_POST['token'] == $_SESSION['token']) {
|
|
$v_user = escapeshellarg($_POST['user']);
|
|
$v_ip = escapeshellarg($_SERVER['REMOTE_ADDR']);
|
|
|
|
if($_POST['user'] == 'root'){
|
|
unset($_POST['password']);
|
|
unset($_POST['user']);
|
|
$ERROR = "<a class=\"error\">".__('Login with <strong>root</strong> has been disabled')."</a>";
|
|
} else {
|
|
// Get user's salt
|
|
$output = '';
|
|
exec (VESTA_CMD."v-get-user-salt ".$v_user." ".$v_ip." json" , $output, $return_var);
|
|
$pam = json_decode(implode('', $output), true);
|
|
if ( $return_var > 0 ) {
|
|
$ERROR = "<a class=\"error\">".__('Invalid username or password')."</a>";
|
|
} else {
|
|
$user = $_POST['user'];
|
|
$password = $_POST['password'];
|
|
$salt = $pam[$user]['SALT'];
|
|
$method = $pam[$user]['METHOD'];
|
|
|
|
if ($method == 'md5' ) {
|
|
$hash = crypt($password, '$1$'.$salt.'$');
|
|
}
|
|
if ($method == 'sha-512' ) {
|
|
$hash = crypt($password, '$6$rounds=5000$'.$salt.'$');
|
|
$hash = str_replace('$rounds=5000','',$hash);
|
|
}
|
|
if ($method == 'des' ) {
|
|
$hash = crypt($password, $salt);
|
|
}
|
|
|
|
// Send hash via tmp file
|
|
$v_hash = exec('mktemp -p /tmp');
|
|
$fp = fopen($v_hash, "w");
|
|
fwrite($fp, $hash."\n");
|
|
fclose($fp);
|
|
|
|
// Check user hash
|
|
exec(VESTA_CMD ."v-check-user-hash ".$v_user." ".$v_hash." ".$v_ip, $output, $return_var);
|
|
unset($output);
|
|
|
|
// Remove tmp file
|
|
unlink($v_hash);
|
|
|
|
// Check API answer
|
|
if ( $return_var > 0 ) {
|
|
$ERROR = "<a class=\"error\">".__('Invalid username or password')."</a>";
|
|
} else {
|
|
|
|
// Make root admin user
|
|
// if ($_POST['user'] == 'root') $v_user = 'admin';
|
|
|
|
// Get user speciefic parameters
|
|
exec (VESTA_CMD . "v-list-user ".$v_user." json", $output, $return_var);
|
|
$data = json_decode(implode('', $output), true);
|
|
|
|
// Define session user
|
|
$_SESSION['user'] = key($data);
|
|
$v_user = $_SESSION['user'];
|
|
|
|
// Get user favorites
|
|
get_favourites();
|
|
|
|
// Define language
|
|
$output = '';
|
|
exec (VESTA_CMD."v-list-sys-languages json", $output, $return_var);
|
|
$languages = json_decode(implode('', $output), true);
|
|
if (in_array($data[$v_user]['LANGUAGE'], $languages)){
|
|
$_SESSION['language'] = $data[$v_user]['LANGUAGE'];
|
|
} else {
|
|
$_SESSION['language'] = 'en';
|
|
}
|
|
|
|
// Regenerate session id to prevent session fixation
|
|
session_regenerate_id(true);
|
|
|
|
// Redirect request to control panel interface
|
|
if (!empty($_SESSION['request_uri'])) {
|
|
header("Location: ".$_SESSION['request_uri']);
|
|
unset($_SESSION['request_uri']);
|
|
exit;
|
|
} else {
|
|
header("Location: /list/user/");
|
|
exit;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
} else {
|
|
$ERROR = "<a class=\"error\">".__('Invalid or missing token')."</a>";
|
|
}
|
|
}
|
|
|
|
// Check system configuration
|
|
exec (VESTA_CMD . "v-list-sys-config json", $output, $return_var);
|
|
$data = json_decode(implode('', $output), true);
|
|
$sys_arr = $data['config'];
|
|
foreach ($sys_arr as $key => $value) {
|
|
$_SESSION[$key] = $value;
|
|
}
|
|
|
|
// Detect language
|
|
if (empty($_SESSION['language'])) {
|
|
$output = '';
|
|
exec (VESTA_CMD."v-list-sys-config json", $output, $return_var);
|
|
$config = json_decode(implode('', $output), true);
|
|
$lang = $config['config']['LANGUAGE'];
|
|
|
|
$output = '';
|
|
exec (VESTA_CMD."v-list-sys-languages json", $output, $return_var);
|
|
$languages = json_decode(implode('', $output), true);
|
|
if(in_array($lang, $languages)){
|
|
$_SESSION['language'] = $lang;
|
|
}
|
|
else {
|
|
$_SESSION['language'] = 'en';
|
|
}
|
|
}
|
|
|
|
// Generate CSRF token
|
|
$token = bin2hex(file_get_contents('/dev/urandom', false, null, 0, 16));
|
|
$_SESSION['token'] = $token;
|
|
|
|
require_once($_SERVER['DOCUMENT_ROOT'].'/inc/i18n/'.$_SESSION['language'].'.php');
|
|
require_once('../templates/header.html');
|
|
require_once('../templates/login.html');
|