mirror of
https://github.com/serghey-rodin/vesta.git
synced 2025-07-05 20:41:51 -07:00
Added mail reset in API
This commit is contained in:
parent
d386c3598c
commit
6714e1d35d
1 changed files with 168 additions and 0 deletions
168
web/api/v1/reset/mail/index.php
Normal file
168
web/api/v1/reset/mail/index.php
Normal file
|
@ -0,0 +1,168 @@
|
|||
<?php
|
||||
// Init
|
||||
define('NO_AUTH_REQUIRED',true);
|
||||
define('NO_AUTH_REQUIRED2',true);
|
||||
|
||||
error_reporting(NULL);
|
||||
|
||||
include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
|
||||
|
||||
// Checking IP of incoming connection, checking is it NAT address
|
||||
$ok=0;
|
||||
$ip=$_SERVER['REMOTE_ADDR'];
|
||||
exec (VESTA_CMD."v-list-sys-ips json", $output, $return_var);
|
||||
$output=implode('', $output);
|
||||
$arr=json_decode($output, true);
|
||||
foreach ($arr as $arr_key => $arr_val) {
|
||||
// search for NAT IPs and allow them
|
||||
if ($ip==$arr_key || $ip==$arr_val['NAT']) {
|
||||
$ok=1;
|
||||
break;
|
||||
}
|
||||
}
|
||||
if ($ip == $_SERVER['SERVER_ADDR']) $ok=1;
|
||||
if ($ip == '127.0.0.1') $ok=1;
|
||||
if ($ok==0) exit;
|
||||
if (isset($_SERVER['HTTP_X_REAL_IP']) || isset($_SERVER['HTTP_X_FORWARDED_FOR'])) exit;
|
||||
|
||||
//
|
||||
// sourceforge.net/projects/postfixadmin/
|
||||
// md5crypt
|
||||
// Action: Creates MD5 encrypted password
|
||||
// Call: md5crypt (string cleartextpassword)
|
||||
//
|
||||
|
||||
function md5crypt ($pw, $salt="", $magic="")
|
||||
{
|
||||
$MAGIC = "$1$";
|
||||
|
||||
if ($magic == "") $magic = $MAGIC;
|
||||
if ($salt == "") $salt = create_salt ();
|
||||
$slist = explode ("$", $salt);
|
||||
if ($slist[0] == "1") $salt = $slist[1];
|
||||
|
||||
$salt = substr ($salt, 0, 8);
|
||||
$ctx = $pw . $magic . $salt;
|
||||
$final = hex2bin (md5 ($pw . $salt . $pw));
|
||||
|
||||
for ($i=strlen ($pw); $i>0; $i-=16)
|
||||
{
|
||||
if ($i > 16)
|
||||
{
|
||||
$ctx .= substr ($final,0,16);
|
||||
}
|
||||
else
|
||||
{
|
||||
$ctx .= substr ($final,0,$i);
|
||||
}
|
||||
}
|
||||
$i = strlen ($pw);
|
||||
|
||||
while ($i > 0)
|
||||
{
|
||||
if ($i & 1) $ctx .= chr (0);
|
||||
else $ctx .= $pw[0];
|
||||
$i = $i >> 1;
|
||||
}
|
||||
$final = hex2bin (md5 ($ctx));
|
||||
|
||||
for ($i=0;$i<1000;$i++)
|
||||
{
|
||||
$ctx1 = "";
|
||||
if ($i & 1)
|
||||
{
|
||||
$ctx1 .= $pw;
|
||||
}
|
||||
else
|
||||
{
|
||||
$ctx1 .= substr ($final,0,16);
|
||||
}
|
||||
if ($i % 3) $ctx1 .= $salt;
|
||||
if ($i % 7) $ctx1 .= $pw;
|
||||
if ($i & 1)
|
||||
{
|
||||
$ctx1 .= substr ($final,0,16);
|
||||
}
|
||||
else
|
||||
{
|
||||
$ctx1 .= $pw;
|
||||
}
|
||||
$final = hex2bin (md5 ($ctx1));
|
||||
}
|
||||
$passwd = "";
|
||||
$passwd .= to64 (((ord ($final[0]) << 16) | (ord ($final[6]) << 8) | (ord ($final[12]))), 4);
|
||||
$passwd .= to64 (((ord ($final[1]) << 16) | (ord ($final[7]) << 8) | (ord ($final[13]))), 4);
|
||||
$passwd .= to64 (((ord ($final[2]) << 16) | (ord ($final[8]) << 8) | (ord ($final[14]))), 4);
|
||||
$passwd .= to64 (((ord ($final[3]) << 16) | (ord ($final[9]) << 8) | (ord ($final[15]))), 4);
|
||||
$passwd .= to64 (((ord ($final[4]) << 16) | (ord ($final[10]) << 8) | (ord ($final[5]))), 4);
|
||||
$passwd .= to64 (ord ($final[11]), 2);
|
||||
return "$magic$salt\$$passwd";
|
||||
}
|
||||
|
||||
|
||||
//
|
||||
// sourceforge.net/projects/postfixadmin/
|
||||
// to64
|
||||
//
|
||||
|
||||
function to64 ($v, $n)
|
||||
{
|
||||
$ITOA64 = "./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
|
||||
$ret = "";
|
||||
while (($n - 1) >= 0)
|
||||
{
|
||||
$n--;
|
||||
$ret .= $ITOA64[$v & 0x3f];
|
||||
$v = $v >> 6;
|
||||
}
|
||||
return $ret;
|
||||
}
|
||||
|
||||
|
||||
// Check arguments
|
||||
if ((!empty($_POST['email'])) && (!empty($_POST['password'])) && (!empty($_POST['new']))) {
|
||||
list($v_account, $v_domain) = explode('@', $_POST['email']);
|
||||
$v_domain = escapeshellarg($v_domain);
|
||||
$v_account = escapeshellarg($v_account);
|
||||
$v_password = $_POST['password'];
|
||||
|
||||
// Get domain owner
|
||||
exec (VESTA_CMD."v-search-domain-owner ".$v_domain." mail", $output, $return_var);
|
||||
if (($return_var == 0) && (!empty($output[0]))) {
|
||||
$v_user = escapeshellarg($output[0]);
|
||||
}
|
||||
unset($output);
|
||||
|
||||
// Get current md5 hash
|
||||
if (!empty($v_user)) {
|
||||
exec (VESTA_CMD."v-get-mail-account-value ".$v_user." ".$v_domain." ".$v_account." md5", $output, $return_var);
|
||||
if ($return_var == 0) {
|
||||
$v_hash = $output[0];
|
||||
}
|
||||
}
|
||||
unset($output);
|
||||
|
||||
// Compare hashes
|
||||
if (!empty($v_hash)) {
|
||||
$salt = explode('$', $v_hash);
|
||||
$n_hash = md5crypt($v_password, $salt[2]);
|
||||
$n_hash = '{MD5}'.$n_hash;
|
||||
|
||||
// Change password
|
||||
if ( hash_equals($v_hash, $n_hash ) ) {
|
||||
$v_new_password = tempnam("/tmp","vst");
|
||||
$fp = fopen($v_new_password, "w");
|
||||
fwrite($fp, $_POST['new']."\n");
|
||||
fclose($fp);
|
||||
exec (VESTA_CMD."v-change-mail-account-password ".$v_user." ".$v_domain." ".$v_account." ".$v_new_password, $output, $return_var);
|
||||
if ($return_var == 0) {
|
||||
echo "==ok==";
|
||||
exit;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
echo 'error';
|
||||
|
||||
exit;
|
Loading…
Add table
Add a link
Reference in a new issue