$value) { if (strpos($value, 'index.php') !== false || $flag_url) { $flag_url = 1; unset($url[$key]); } else if (strpos($value, 'enterprise') !== false || $flag_url) { $flag_url = 1; unset($url[$key]); } } $config['homeurl'] = rtrim(join('/', $url), '/'); $config['homeurl_static'] = $config['homeurl']; $login_screen = 'error_noconfig'; $ownDir = dirname(__FILE__).DIRECTORY_SEPARATOR; $config['homedir'] = $ownDir; include 'general/error_screen.php'; exit; } else { include 'install.php'; exit; } } if (filesize('include/config.php') == 0) { include 'install.php'; exit; } if (isset($_POST['rename_file'])) { $rename_file_install = (bool) $_POST['rename_file']; if ($rename_file_install) { $salida_rename = rename('install.php', 'install_old.php'); } } // Check installer presence. if (file_exists('install.php')) { $login_screen = 'error_install'; include 'general/error_screen.php'; exit; } // Check perms for config.php. if (strtoupper(substr(PHP_OS, 0, 3)) != 'WIN') { if ((substr(sprintf('%o', fileperms('include/config.php')), -4) != '0600') && (substr(sprintf('%o', fileperms('include/config.php')), -4) != '0660') && (substr(sprintf('%o', fileperms('include/config.php')), -4) != '0640') ) { $url = explode('/', $_SERVER['REQUEST_URI']); $flag_url = 0; foreach ($url as $key => $value) { if (strpos($value, 'index.php') !== false || $flag_url) { $flag_url = 1; unset($url[$key]); } else if (strpos($value, 'enterprise') !== false || $flag_url) { $flag_url = 1; unset($url[$key]); } } $config['homeurl'] = rtrim(join('/', $url), '/'); $config['homeurl_static'] = $config['homeurl']; $ownDir = dirname(__FILE__).DIRECTORY_SEPARATOR; $config['homedir'] = $ownDir; $login_screen = 'error_perms'; include 'general/error_screen.php'; exit; } } } if ((! file_exists('include/config.php')) || (! is_readable('include/config.php')) ) { $login_screen = 'error_noconfig'; include 'general/error_screen.php'; exit; } /* * DO NOT CHANGE ORDER OF FOLLOWING REQUIRES. */ require_once 'include/config.php'; require_once 'include/functions_config.php'; if (isset($config['console_log_enabled']) && $config['console_log_enabled'] == 1) { ini_set('log_errors', 1); ini_set('error_log', $config['homedir'].'/log/console.log'); } else { ini_set('log_errors', 0); ini_set('error_log', null); } if (isset($config['error'])) { $login_screen = $config['error']; include 'general/error_screen.php'; exit; } // If metaconsole activated, redirect to it. if (is_metaconsole()) { header('Location: '.ui_get_full_url('index.php')); // Always exit after sending location headers. exit; } if (file_exists(ENTERPRISE_DIR.'/include/functions_login.php')) { include_once ENTERPRISE_DIR.'/include/functions_login.php'; } if (!empty($config['https']) && empty($_SERVER['HTTPS'])) { $query = ''; if (count($_REQUEST)) { // Some (old) browsers don't like the ?&key=var. $query .= '?1=1'; } // We don't clean these variables up as they're only being passed along. foreach ($_GET as $key => $value) { if ($key == 1) { continue; } $query .= '&'.$key.'='.$value; } foreach ($_POST as $key => $value) { $query .= '&'.$key.'='.$value; } $url = ui_get_full_url($query); // Prevent HTTP response splitting attacks // http://en.wikipedia.org/wiki/HTTP_response_splitting. $url = str_replace("\n", '', $url); header('Location: '.$url); // Always exit after sending location headers. exit; } // Pure mode (without menu, header and footer). $config['pure'] = (bool) get_parameter('pure'); // Auto Refresh page (can now be disabled anywhere in the script). if (get_parameter('refr') != null) { $config['refr'] = (int) get_parameter('refr'); } $delete_file = get_parameter('del_file'); if ($delete_file == 'yes_delete') { $salida_delete = shell_exec('rm /var/www/html/pandora_console/install.php'); } ob_start(); echo ''."\n"; echo ''."\n"; echo ''."\n"; // This starts the page head. In the callback function, // $page['head'] array content will be processed into the head. ob_start('ui_process_page_head'); // Avoid clickjacking. header('X-Frame-Options: SAMEORIGIN'); // Enterprise main. enterprise_include_once('index.php'); echo ''; // This tag is included in the buffer passed to ui_process_page_head so // technically it can be stripped. echo ''."\n"; require_once 'include/functions_themes.php'; ob_start('ui_process_page_body'); $config['remote_addr'] = $_SERVER['REMOTE_ADDR']; $sec2 = get_parameter_get('sec2'); $sec2 = safe_url_extraclean($sec2); $page = $sec2; // Reference variable for old time sake. $sec = get_parameter_get('sec'); $sec = safe_url_extraclean($sec); // CSRF Validation. $validatedCSRF = validate_csrf_code(); $process_login = false; // Update user password. $change_pass = get_parameter_post('renew_password', 0); if ($change_pass == 1) { $password_old = (string) get_parameter_post('old_password', ''); $password_new = (string) get_parameter_post('new_password', ''); $password_confirm = (string) get_parameter_post('confirm_new_password', ''); $id = (string) get_parameter_post('login', ''); $changed_pass = login_update_password_check($password_old, $password_new, $password_confirm, $id); } $minor_release_message = false; $searchPage = false; $search = get_parameter_get('head_search_keywords'); if (strlen($search) > 0) { $config['search_keywords'] = io_safe_input(trim(io_safe_output(get_parameter('keywords')))); // If not search category providad, we'll use an agent search. $config['search_category'] = get_parameter('search_category', 'all'); if (($config['search_keywords'] != 'Enter keywords to search') && (strlen($config['search_keywords']) > 0)) { $searchPage = true; } } // Login process. enterprise_include_once('include/auth/saml.php'); if (! isset($config['id_user'])) { // Clear error messages. unset($_COOKIE['errormsg']); setcookie('errormsg', null, -1); if (isset($_GET['login'])) { include_once 'include/functions_db.php'; // Include it to use escape_string_sql function. $config['auth_error'] = ''; // Set this to the error message from the authorization mechanism. $nick = get_parameter_post('nick'); // This is the variable with the login. $pass = get_parameter_post('pass'); // This is the variable with the password. $nick = db_escape_string_sql($nick); $pass = db_escape_string_sql($pass); // Since now, only the $pass variable are needed. unset($_GET['pass'], $_POST['pass'], $_REQUEST['pass']); // If the auth_code exists, we assume the user has come from // double authorization page. if (isset($_POST['auth_code'])) { $double_auth_success = false; // The double authentication is activated and the user has // surpassed the first step (the login). // Now the authentication code provided will be checked. if (isset($_SESSION['prepared_login_da'])) { if (isset($_SESSION['prepared_login_da']['id_user']) && isset($_SESSION['prepared_login_da']['timestamp']) ) { // The user has a maximum of 5 minutes to introduce // the double auth code. $dauth_period = SECONDS_2MINUTES; $now = time(); $dauth_time = $_SESSION['prepared_login_da']['timestamp']; if (($now - $dauth_period) < $dauth_time) { // Nick. $nick = $_SESSION['prepared_login_da']['id_user']; // Code. $code = (string) get_parameter_post('auth_code'); if (empty($code) === false) { $result = validate_double_auth_code($nick, $code); if ($result === true) { // Double auth success. $double_auth_success = true; } else { // Screen. $login_screen = 'double_auth'; // Error message. $config['auth_error'] = __('Invalid code'); if (isset($_SESSION['prepared_login_da']['attempts']) === false) { $_SESSION['prepared_login_da']['attempts'] = 0; } $_SESSION['prepared_login_da']['attempts']++; } } else { // Screen. $login_screen = 'double_auth'; // Error message. $config['auth_error'] = __("The code shouldn't be empty"); if (!isset($_SESSION['prepared_login_da']['attempts'])) { $_SESSION['prepared_login_da']['attempts'] = 0; } $_SESSION['prepared_login_da']['attempts']++; } } else { // Expired login. unset($_SESSION['prepared_login_da']); // Error message. $config['auth_error'] = __('Expired login'); } } else { // If the code doesn't exist, remove the prepared login. unset($_SESSION['prepared_login_da']); // Error message. $config['auth_error'] = __('Login error'); } } else { // If $_SESSION['prepared_login_da'] doesn't exist, the user // must login again. // Error message. $config['auth_error'] = __('Login error'); } // Remove the authenticator code. unset($_POST['auth_code'], $code); if (!$double_auth_success) { $login_failed = true; include_once 'general/login_page.php'; db_pandora_audit( 'Logon Failed', 'Invalid double auth login: '.$_SERVER['REMOTE_ADDR'], $_SERVER['REMOTE_ADDR'] ); while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } } $login_button_saml = get_parameter('login_button_saml', false); config_update_value('2Fa_auth', ''); if (isset($double_auth_success) && $double_auth_success) { // This values are true cause there are checked before complete // the 2nd auth step. $nick_in_db = $_SESSION['prepared_login_da']['id_user']; $expired_pass = false; } else if (($config['auth'] == 'saml') && ($login_button_saml)) { $saml_user_id = enterprise_hook('saml_process_user_login'); if (!$saml_user_id) { $login_failed = true; include_once 'general/login_page.php'; while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } $nick_in_db = $saml_user_id; if (!$nick_in_db) { if ($config['auth'] === 'saml') { enterprise_hook('saml_logout'); } if (session_status() !== PHP_SESSION_NONE) { $_SESSION = []; session_destroy(); header_remove('Set-Cookie'); setcookie(session_name(), $_COOKIE[session_name()], (time() - 4800), '/'); } // Process logout. include 'general/logoff.php'; } } else { // process_user_login is a virtual function which should be defined in each auth file. // It accepts username and password. The rest should be internal to the auth file. // The auth file can set $config["auth_error"] to an informative error output or reference their internal error messages to it // process_user_login should return false in case of errors or invalid login, the nickname if correct $nick_in_db = process_user_login($nick, $pass); $expired_pass = false; if (($nick_in_db != false) && ((!is_user_admin($nick) || $config['enable_pass_policy_admin'])) && (file_exists(ENTERPRISE_DIR.'/load_enterprise.php')) && ($config['enable_pass_policy']) ) { include_once ENTERPRISE_DIR.'/include/auth/mysql.php'; $blocked = login_check_blocked($nick); if ($blocked) { include_once 'general/login_page.php'; db_pandora_audit('Password expired', 'Password expired: '.$nick, $nick); while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } // Checks if password has expired. $check_status = check_pass_status($nick, $pass); switch ($check_status) { case PASSSWORD_POLICIES_FIRST_CHANGE: // First change. case PASSSWORD_POLICIES_EXPIRED: // Pass expired. $expired_pass = true; login_change_password($nick, '', $check_status); break; default: // Ignore. break; } } } // CSRF Validation not pass in login. if ($validatedCSRF === false) { $process_error_message = __( '%s cannot verify the origin of the request. Try again, please.', get_product_name() ); include_once 'general/login_page.php'; // Finish the execution. exit(''); } if (($nick_in_db !== false) && $expired_pass) { // Login ok and password has expired. include_once 'general/login_page.php'; db_pandora_audit( 'Password expired', 'Password expired: '.$nick, $nick ); while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } else if (($nick_in_db !== false) && (!$expired_pass)) { // Login ok and password has not expired. // Double auth check. if ((!isset($double_auth_success) || !$double_auth_success) && is_double_auth_enabled($nick_in_db) ) { // Store this values in the session to know if the user login // was correct. $_SESSION['prepared_login_da'] = [ 'id_user' => $nick_in_db, 'timestamp' => time(), 'attempts' => 0, ]; // Load the page to introduce the double auth code. $login_screen = 'double_auth'; include_once 'general/login_page.php'; while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } // Login ok and password has not expired. $process_login = true; if (is_user_admin($nick)) { echo ""; } else { echo ""; } if (!isset($_GET['sec2']) && !isset($_GET['sec'])) { // Avoid the show homepage when the user go to // a specific section of pandora // for example when timeout the sesion. unset($_GET['sec2']); $_GET['sec'] = 'general/logon_ok'; $home_page = ''; if (isset($nick)) { $user_info = users_get_user_by_id($nick); $home_page = io_safe_output($user_info['section']); $home_url = $user_info['data_section']; if ($home_page != '') { switch ($home_page) { case 'Event list': $_GET['sec'] = 'eventos'; $_GET['sec2'] = 'operation/events/events'; break; case 'Group view': $_GET['sec'] = 'view'; $_GET['sec2'] = 'operation/agentes/group_view'; break; case 'Alert detail': $_GET['sec'] = 'view'; $_GET['sec2'] = 'operation/agentes/alerts_status'; break; case 'Tactical view': $_GET['sec'] = 'view'; $_GET['sec2'] = 'operation/agentes/tactical'; break; case 'Default': default: $_GET['sec'] = 'general/logon_ok'; break; case 'Dashboard': $_GET['sec'] = 'reporting'; $_GET['sec2'] = 'operation/dashboard/dashboard'; $_GET['id_dashboard_select'] = $home_url; $_GET['d_from_main_page'] = 1; break; case 'Visual console': $_GET['sec'] = 'network'; $_GET['sec2'] = 'operation/visual_console/index'; break; case 'Other': $home_url = io_safe_output($home_url); $url_array = parse_url($home_url); parse_str($url_array['query'], $res); foreach ($res as $key => $param) { $_GET[$key] = $param; } break; } } else { $_GET['sec'] = 'general/logon_ok'; } } } db_logon($nick_in_db, $_SERVER['REMOTE_ADDR']); $_SESSION['id_usuario'] = $nick_in_db; $config['id_user'] = $nick_in_db; // Check if connection goes through F5 balancer. If it does, then // don't call config_prepare_session() or user will be back to login // all the time. $prepare_session = true; foreach ($_COOKIE as $key => $value) { if (preg_match('/BIGipServer*/', $key)) { $prepare_session = false; break; } } if ($prepare_session) { config_prepare_session(); } // ========================================================== // -------- SET THE CUSTOM CONFIGS OF USER ------------------ config_user_set_custom_config(); // ========================================================== // Remove everything that might have to do with people's passwords or logins unset($pass, $login_good); $user_language = get_user_language($config['id_user']); $l10n = null; if (file_exists('./include/languages/'.$user_language.'.mo')) { $cacheFileReader = new CachedFileReader( './include/languages/'.$user_language.'.mo' ); $l10n = new gettext_reader($cacheFileReader); $l10n->load_tables(); } } else { // Login wrong. $blocked = false; if ((!is_user_admin($nick) || $config['enable_pass_policy_admin']) && file_exists(ENTERPRISE_DIR.'/load_enterprise.php') ) { $blocked = login_check_blocked($nick); } if (!$blocked) { if (file_exists(ENTERPRISE_DIR.'/load_enterprise.php')) { // Checks failed attempts. login_check_failed($nick); } $login_failed = true; include_once 'general/login_page.php'; db_pandora_audit( 'Logon Failed', 'Invalid login: '.$nick, $nick ); while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } else { include_once 'general/login_page.php'; db_pandora_audit( 'Logon Failed', 'Invalid login: '.$nick, $nick ); while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } } // Form the url. $query_params_redirect = $_GET; // Visual console do not want sec2. if ($home_page == 'Visual console') { unset($query_params_redirect['sec2']); } // Dashboard do not want sec2. if ($home_page == 'Dashboard') { unset($query_params_redirect['sec2']); } $redirect_url = '?logged=1'; foreach ($query_params_redirect as $key => $value) { if ($key == 'login') { continue; } $redirect_url .= '&'.safe_url_extraclean($key).'='.safe_url_extraclean($value); } $double_auth_enabled = (bool) db_get_value('id', 'tuser_double_auth', 'id_user', $config['id_user']); header('Location: '.ui_get_full_url('index.php'.$redirect_url)); exit; // Always exit after sending location headers. } else if (isset($_GET['loginhash'])) { // Hash login process. $loginhash_data = get_parameter('loginhash_data', ''); $loginhash_user = str_rot13(get_parameter('loginhash_user', '')); if ($config['loginhash_pwd'] != '' && $loginhash_data == md5( $loginhash_user.io_output_password($config['loginhash_pwd']) ) ) { db_logon($loginhash_user, $_SERVER['REMOTE_ADDR']); $_SESSION['id_usuario'] = $loginhash_user; $config['id_user'] = $loginhash_user; } else { include_once 'general/login_page.php'; db_pandora_audit('Logon Failed (loginhash', '', 'system'); while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } } else if (isset($_GET['bye']) === false) { // There is no user connected. if ($config['enterprise_installed']) { enterprise_include_once('include/functions_reset_pass.php'); } // Boolean parameters. $correct_pass_change = (boolean) get_parameter('correct_pass_change', false); $reset = (boolean) get_parameter('reset', false); $first = (boolean) get_parameter('first', false); // Strings. $reset_hash = get_parameter('reset_hash'); $pass1 = get_parameter_post('pass1'); $pass2 = get_parameter_post('pass2'); $id_user = get_parameter_post('id_user'); if (empty($reset_hash) === false) { $hash_data = explode(':::', $reset_hash); $id_user = $hash_data[0]; $codified_hash = $hash_data[1]; $db_reset_pass_entry = db_get_value_filter('reset_time', 'treset_pass', ['id_user' => $id_user, 'cod_hash' => $id_user.':::'.$codified_hash]); } if ($correct_pass_change === true && empty($pass1) === false && empty($pass2) === false && empty($id_user) === false && $db_reset_pass_entry !== false ) { // The CSRF does not be validated. if ($validatedCSRF === false) { $process_error_message = __( '%s cannot verify the origin of the request. Try again, please.', get_product_name() ); include_once 'general/login_page.php'; // Finish the execution. exit(''); } else { delete_reset_pass_entry($id_user); $correct_reset_pass_process = ''; $process_error_message = ''; if ($pass1 === $pass2) { $res = update_user_password($id_user, $pass1); if ($res) { db_process_sql_insert( 'tsesion', [ 'id_sesion' => '', 'id_usuario' => $id_user, 'ip_origen' => $_SERVER['REMOTE_ADDR'], 'accion' => 'Reset change', 'descripcion' => 'Successful reset password process ', 'fecha' => date('Y-m-d H:i:s'), 'utimestamp' => time(), ] ); $correct_reset_pass_process = __('Password changed successfully'); register_pass_change_try($id_user, 1); } else { register_pass_change_try($id_user, 0); $process_error_message = __('Failed to change password'); } } else { register_pass_change_try($id_user, 0); $process_error_message = __('Passwords must be the same'); } include_once 'general/login_page.php'; } } else { if (empty($reset_hash) === false) { $process_error_message = ''; if ($db_reset_pass_entry) { if (($db_reset_pass_entry + SECONDS_2HOUR) < time()) { register_pass_change_try($id_user, 0); $process_error_message = __('Too much time since password change request'); include_once 'general/login_page.php'; } else { include_once 'enterprise/include/process_reset_pass.php'; } } else { register_pass_change_try($id_user, 0); $process_error_message = __('This user has not requested a password change'); include_once 'general/login_page.php'; } } else { if ($reset === false) { include_once 'general/login_page.php'; } else { $user_reset_pass = get_parameter('user_reset_pass'); $error = ''; $mail = ''; $show_error = false; if ($first === false) { // The CSRF does not be validated. if ($validatedCSRF === false) { $process_error_message = __( '%s cannot verify the origin of the request. Try again, please.', get_product_name() ); include_once 'general/login_page.php'; // Finish the execution. exit(''); } if (empty($user_reset_pass) === true) { $reset = false; $error = __('Id user cannot be empty'); $show_error = true; } else { $check_user = check_user_id($user_reset_pass); if ($check_user === false) { $reset = false; register_pass_change_try($user_reset_pass, 0); $error = __('Error in reset password request'); $show_error = true; } else { $check_mail = check_user_have_mail($user_reset_pass); if (!$check_mail) { $reset = false; register_pass_change_try($user_reset_pass, 0); $error = __('This user doesn\'t have a valid email address'); $show_error = true; } else { $mail = $check_mail; } } } $cod_hash = $user_reset_pass.'::::'.md5(rand(10, 1000000).rand(10, 1000000).rand(10, 1000000)); $subject = '['.io_safe_output(get_product_name()).'] '.__('Reset password'); $body = __('This is an automatically sent message for user '); $body .= ' "'.$user_reset_pass.'"'; $body .= '

'; $body .= __('Please click the link below to reset your password'); $body .= '

'; $body .= ''.__('Reset your password').''; $body .= '

'; $body .= get_product_name(); $body .= '

'; $body .= ''.__('Please do not reply to this email.').''; $result = (bool) send_email_to_user($mail, $body, $subject); if ($result === false) { $process_error_message = __('Error at sending the email'); } else { send_token_to_db($user_reset_pass, $cod_hash); } include_once 'general/login_page.php'; } else { include_once 'enterprise/include/reset_pass.php'; } } } } while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } } else { if (isset($_GET['loginhash_data'])) { $loginhash_data = get_parameter('loginhash_data', ''); $loginhash_user = str_rot13(get_parameter('loginhash_user', '')); $iduser = $_SESSION['id_usuario']; unset($_SESSION['id_usuario']); unset($iduser); if ($config['loginhash_pwd'] != '' && $loginhash_data == md5( $loginhash_user.io_output_password($config['loginhash_pwd']) ) ) { db_logon($loginhash_user, $_SERVER['REMOTE_ADDR']); $_SESSION['id_usuario'] = $loginhash_user; $config['id_user'] = $loginhash_user; } else { include_once 'general/login_page.php'; db_pandora_audit('Logon Failed (loginhash', '', 'system'); while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } } $user_in_db = db_get_row_filter( 'tusuario', ['id_user' => $config['id_user']], '*' ); if ($user_in_db == false) { // Logout. $_REQUEST = []; $_GET = []; $_POST = []; $config['auth_error'] = __("User doesn\'t exist."); $iduser = $_SESSION['id_usuario']; unset($_SESSION['id_usuario']); unset($iduser); include_once 'general/login_page.php'; while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } else { if (((bool) $user_in_db['is_admin'] === false) && ( (bool) $user_in_db['not_login'] === true || (is_metaconsole() === false && has_metaconsole() === true && is_management_allowed() === false && (bool) $user_in_db['metaconsole_access_node'] === false)) ) { // Logout. $_REQUEST = []; $_GET = []; $_POST = []; $config['auth_error'] = __('User only can use the API.'); $iduser = $_SESSION['id_usuario']; unset($_SESSION['id_usuario']); unset($iduser); $login_screen = 'disabled_access_node'; include_once 'general/login_page.php'; while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } else { if ($config['auth'] === 'saml') { enterprise_hook('saml_login_status_verifier'); } } } } // Enterprise support. if (file_exists(ENTERPRISE_DIR.'/load_enterprise.php')) { include_once ENTERPRISE_DIR.'/load_enterprise.php'; } // Log off. if (isset($_GET['bye'])) { $iduser = $_SESSION['id_usuario']; if ($config['auth'] === 'saml') { enterprise_hook('saml_logout'); } $_SESSION = []; session_destroy(); header_remove('Set-Cookie'); setcookie(session_name(), $_COOKIE[session_name()], (time() - 4800), '/'); // Process logout. include 'general/logoff.php'; while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } clear_pandora_error_for_header(); if ((bool) $config['node_deactivated'] === true) { // Prevent access node if not merged. include 'general/node_deactivated.php'; while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } if ((bool) $config['maintenance_mode'] === true && (bool) users_is_admin() === false ) { // Show maintenance web-page. For non-admin users only. include 'general/maintenance.php'; while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } /* * ---------------------------------------------------------------------- * EXTENSIONS * ---------------------------------------------------------------------- * * Load the basic configurations of extension and add extensions into menu. * Load here, because if not, some extensions not load well, I don't why. */ $config['logged'] = false; extensions_load_extensions($process_login); if ($process_login) { // Call all extensions login function. extensions_call_login_function(); unset($_SESSION['new_update']); include_once 'include/functions_update_manager.php'; if ($config['autoupdate'] == 1) { $result = update_manager_check_updates_available(); if ($result) { $_SESSION['new_update'] = 'new'; } } $config['logged'] = true; } require_once 'general/register.php'; if (get_parameter('login', 0) !== 0) { if ((!isset($config['skip_login_help_dialog']) || $config['skip_login_help_dialog'] == 0) && $display_previous_popup === false && $config['initial_wizard'] == 1 ) { include_once 'general/login_help_dialog.php'; } $php_version = phpversion(); $php_version_array = explode('.', $php_version); if ($php_version_array[0] < 7) { include_once 'general/php7_message.php'; } } if ((bool) $config['maintenance_mode'] === true && (bool) users_is_admin() === false ) { // Show maintenance web-page. For non-admin users only. include 'general/maintenance.php'; while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } // Pure. if ($config['pure'] == 0) { // Menu container prepared to autohide menu. $menuCollapsed = (isset($_SESSION['menu_type']) === true && $_SESSION['menu_type'] !== 'classic'); $menuTypeClass = ($menuCollapsed === true) ? 'collapsed' : 'classic'; // Container. echo '

'; // Header. echo ''; // Main menu. echo sprintf('
', $menuTypeClass); echo ''; echo ''; } else { echo '
'; // Require menu only to build structure to use it in ACLs. include 'operation/menu.php'; include 'godmode/menu.php'; } /* * Session locking concurrency speedup! * http://es2.php.net/manual/en/ref.session.php#64525 */ session_write_close(); // Main block of content. if ($config['pure'] == 0) { echo '
'; } // Page loader / selector. if ($searchPage) { include 'operation/search_results.php'; } else { if ($page != '') { $main_sec = get_sec($sec); if ($main_sec == false) { if ($sec == 'extensions') { $main_sec = get_parameter('extension_in_menu'); if (empty($main_sec) === true) { $main_sec = $sec; } } else if ($sec == 'gextensions') { $main_sec = get_parameter('extension_in_menu'); if (empty($main_sec) === true) { $main_sec = $sec; } } else { $main_sec = $sec; } $sec = $sec2; $sec2 = ''; } $page .= '.php'; // Enterprise ACL check. if (enterprise_hook( 'enterprise_acl', [ $config['id_user'], $main_sec, $sec, true, $sec2, ] ) == false ) { include 'general/noaccess.php'; } else { $sec = $main_sec; if (file_exists($page) === true) { if ((bool) extensions_is_extension($page) === false) { try { include_once $page; } catch (Exception $e) { ui_print_error_message( $e->getMessage().' in '.$e->getFile().':'.$e->getLine() ); } } else { if ($sec[0] == 'g') { extensions_call_godmode_function(basename($page)); } else { extensions_call_main_function(basename($page)); } } } else { ui_print_error_message(__('Sorry! I can\'t find the page!')); } } } else { // Home screen chosen by the user. $home_page = ''; if (isset($config['id_user']) === true) { $user_info = users_get_user_by_id($config['id_user']); $home_page = io_safe_output($user_info['section']); $home_url = $user_info['data_section']; } if ($home_page != '') { switch ($home_page) { case 'Event list': $_GET['sec'] = 'eventos'; $_GET['sec2'] = 'operation/events/events'; break; case 'Group view': $_GET['sec'] = 'view'; $_GET['sec2'] = 'operation/agentes/group_view'; break; case 'Alert detail': $_GET['sec'] = 'view'; $_GET['sec2'] = 'operation/agentes/alerts_status'; break; case 'Tactical view': $_GET['sec'] = 'view'; $_GET['sec2'] = 'operation/agentes/tactical'; break; case 'Default': default: $_GET['sec2'] = 'general/logon_ok'; break; case 'Dashboard': $_GET['specialSec2'] = sprintf('operation/dashboard/dashboard&dashboardId=%s', $home_url); $str = sprintf('sec=reporting&sec2=%s&d_from_main_page=1', $_GET['specialSec2']); parse_str($str, $res); foreach ($res as $key => $param) { $_GET[$key] = $param; } break; case 'Visual console': $id_visualc = db_get_value('id', 'tlayout', 'name', $home_url); if (($home_url == '') || ($id_visualc == false)) { $str = 'sec=network&sec2=operation/visual_console/index&refr=60'; } else { $str = 'sec=network&sec2=operation/visual_console/render_view&id='.$id_visualc; } parse_str($str, $res); foreach ($res as $key => $param) { $_GET[$key] = $param; } break; case 'Other': $home_url = io_safe_output($home_url); $url_array = parse_url($home_url); parse_str($url_array['query'], $res); foreach ($res as $key => $param) { $_GET[$key] = $param; } break; case 'External link': $home_url = io_safe_output($home_url); echo ''; break; } if (isset($_GET['sec2']) === true) { $file = $_GET['sec2'].'.php'; // Make file path absolute to prevent accessing remote files. $file = __DIR__.'/'.$file; // Translate some secs. $main_sec = get_sec($_GET['sec']); $_GET['sec'] = ($main_sec == false) ? $_GET['sec'] : $main_sec; // Third condition is aimed to prevent from traversal attack. if (file_exists($file) === false || ($_GET['sec2'] != 'general/logon_ok' && enterprise_hook( 'enterprise_acl', [ $config['id_user'], $_GET['sec'], $_GET['sec2'], true, isset($_GET['sec3']) ? $_GET['sec3'] : '', ] ) == false || strpos(realpath($file), __DIR__) === false) ) { unset($_GET['sec2']); include 'general/noaccess.php'; } else { include $file; } } else { include 'general/noaccess.php'; } } else { include 'general/logon_ok.php'; } } } if ($config['pure'] == 0) { echo '
'; echo '
'; // Main. echo '
 
'; echo '
'; // Page (id = page). } else { echo '
'; // Main pure. } html_print_div( ['id' => 'wiz_container'], true ); html_print_div( ['id' => 'um_msg_receiver'], true ); // Connection lost alert. ui_require_javascript_file('connection_check'); set_js_value('absolute_homeurl', ui_get_full_url(false, false, false, false)); $conn_title = __('Connection with server has been lost'); $conn_text = __('Connection to the server has been lost. Please check your internet connection or contact with administrator.'); ui_print_message_dialog($conn_title, $conn_text, 'connection', '/images/error_1.png'); if ($config['pure'] == 0) { echo '
'; // Container div. echo ''; echo '
'; echo ''; echo '