$value) { if (strpos($value, 'index.php') !== false || $flag_url) { $flag_url = 1; unset($url[$key]); } else if (strpos($value, 'enterprise') !== false || $flag_url) { $flag_url = 1; unset($url[$key]); } } $config['homeurl'] = rtrim(join('/', $url), '/'); $config['homeurl_static'] = $config['homeurl']; $login_screen = 'error_noconfig'; $ownDir = dirname(__FILE__).DIRECTORY_SEPARATOR; $config['homedir'] = $ownDir; include 'general/error_screen.php'; exit; } else { include 'install.php'; exit; } } if (filesize('include/config.php') == 0) { include 'install.php'; exit; } if (isset($_POST['rename_file']) === true) { $rename_file_install = (bool) $_POST['rename_file']; if ($rename_file_install === true) { $salida_rename = rename('install.php', 'install_old.php'); } } // Check installer presence. if (file_exists('install.php') === true) { $login_screen = 'error_install'; include 'general/error_screen.php'; exit; } // Check perms for config.php. if (strtoupper(substr(PHP_OS, 0, 3)) !== 'WIN') { if ((substr(sprintf('%o', fileperms('include/config.php')), -4) !== '0600') && (substr(sprintf('%o', fileperms('include/config.php')), -4) !== '0660') && (substr(sprintf('%o', fileperms('include/config.php')), -4) !== '0640') ) { $url = explode('/', $_SERVER['REQUEST_URI']); $flag_url = 0; foreach ($url as $key => $value) { if (strpos($value, 'index.php') !== false || $flag_url) { $flag_url = 1; unset($url[$key]); } else if (strpos($value, 'enterprise') !== false || $flag_url) { $flag_url = 1; unset($url[$key]); } } $config['homeurl'] = rtrim(join('/', $url), '/'); $config['homeurl_static'] = $config['homeurl']; $ownDir = dirname(__FILE__).DIRECTORY_SEPARATOR; $config['homedir'] = $ownDir; $login_screen = 'error_perms'; include 'general/error_screen.php'; exit; } } } if ((file_exists('include/config.php') === false) || (is_readable('include/config.php') === false) ) { $login_screen = 'error_noconfig'; include 'general/error_screen.php'; exit; } require 'vendor/autoload.php'; if (__PAN_XHPROF__ === 1) { if (function_exists('tideways_xhprof_enable') === true) { tideways_xhprof_enable(); } else { error_log('Cannot find tideways_xhprof_enable function'); } } /* * DO NOT CHANGE ORDER OF FOLLOWING REQUIRES. */ require_once 'include/config.php'; require_once 'include/functions_config.php'; if (isset($config['console_log_enabled']) === true && (int) $config['console_log_enabled'] === 1) { ini_set('log_errors', 1); ini_set('error_log', $config['homedir'].'/log/console.log'); } else { ini_set('log_errors', 0); ini_set('error_log', ''); } if (isset($config['error']) === true) { $login_screen = $config['error']; include 'general/error_screen.php'; exit; } // If metaconsole activated, redirect to it. if (is_metaconsole() === true) { header('Location: '.ui_get_full_url('index.php')); // Always exit after sending location headers. exit; } if (file_exists(ENTERPRISE_DIR.'/include/functions_login.php') === true) { include_once ENTERPRISE_DIR.'/include/functions_login.php'; } if (empty($config['https']) === false && empty($_SERVER['HTTPS']) === true) { $query = ''; if (count($_REQUEST) > 0) { // Some (old) browsers don't like the ?&key=var. $query .= '?1=1'; } // We don't clean these variables up as they're only being passed along. foreach ($_GET as $key => $value) { if ($key == 1) { continue; } $query .= '&'.$key.'='.$value; } foreach ($_POST as $key => $value) { $query .= '&'.$key.'='.$value; } $url = ui_get_full_url($query); // Prevent HTTP response splitting attacks // http://en.wikipedia.org/wiki/HTTP_response_splitting. $url = str_replace("\n", '', $url); header('Location: '.$url); // Always exit after sending location headers. exit; } // Pure mode (without menu, header and footer). $config['pure'] = (bool) get_parameter('pure'); // Auto Refresh page (can now be disabled anywhere in the script). if (get_parameter('refr') != null) { $config['refr'] = (int) get_parameter('refr'); } // Get possible errors with files. $errorFileOutput = (string) get_parameter('errorFileOutput'); $delete_file = get_parameter('del_file'); if ($delete_file === 'yes_delete') { $salida_delete = shell_exec('rm /var/www/html/pandora_console/install.php'); } ob_start(); echo ''."\n"; echo ''."\n"; echo ''."\n"; // This starts the page head. In the callback function, // $page['head'] array content will be processed into the head. ob_start('ui_process_page_head'); // Enterprise main. enterprise_include_once('index.php'); // Load event.css to display the about section dialog with correct styles. echo ''; echo ''; // This tag is included in the buffer passed to ui_process_page_head so // technically it can be stripped. echo ''."\n"; require_once 'include/functions_themes.php'; ob_start('ui_process_page_body'); ui_require_javascript_file('pandora'); $config['remote_addr'] = $_SERVER['REMOTE_ADDR']; $sec2 = get_parameter_get('sec2'); $sec2 = safe_url_extraclean($sec2); $page = $sec2; // Reference variable for old time sake. $sec = get_parameter_get('sec'); $sec = safe_url_extraclean($sec); // CSRF Validation. $validatedCSRF = validate_csrf_code(); $process_login = false; // Update user password. $change_pass = (int) get_parameter_post('renew_password'); if ($change_pass === 1) { $password_old = (string) get_parameter_post('old_password', ''); $password_new = (string) get_parameter_post('new_password', ''); $password_confirm = (string) get_parameter_post('confirm_new_password', ''); $id = (string) get_parameter_post('login', ''); $changed_pass = login_update_password_check($password_old, $password_new, $password_confirm, $id); } $minor_release_message = false; $searchPage = false; $search = get_parameter_get('head_search_keywords'); if (strlen($search) > 0) { $config['search_keywords'] = io_safe_input(trim(io_safe_output(get_parameter('keywords')))); // If not search category providad, we'll use an agent search. $config['search_category'] = get_parameter('search_category', 'all'); if (($config['search_keywords'] !== 'Enter keywords to search') && (strlen($config['search_keywords']) > 0)) { $searchPage = true; } } // Login process. enterprise_include_once('include/auth/saml.php'); if (isset($config['id_user']) === false) { // Clear error messages. unset($_COOKIE['errormsg']); setcookie('errormsg', '', -1); if (isset($_GET['login']) === true) { include_once 'include/functions_db.php'; // Include it to use escape_string_sql function. $config['auth_error'] = ''; // Set this to the error message from the authorization mechanism. $nick = get_parameter_post('nick'); // This is the variable with the login. $pass = get_parameter_post('pass'); // This is the variable with the password. $nick = db_escape_string_sql($nick); $pass = db_escape_string_sql($pass); // Since now, only the $pass variable are needed. unset($_GET['pass'], $_POST['pass'], $_REQUEST['pass']); // IP allowed check. $user_info = users_get_user_by_id($nick); if ((bool) $user_info['allowed_ip_active'] === true) { $userIP = $_SERVER['REMOTE_ADDR']; $allowedIP = false; $arrayIP = explode(',', $user_info['allowed_ip_list']); // By default, if the IP definition is no correct, allows all. if (empty($arrayIP) === true) { $allowedIP = true; } else { $allowedIP = checkIPInRange($arrayIP, $userIP); } if ($allowedIP === false) { $config['auth_error'] = 'IP not allowed'; $login_failed = true; include_once 'general/login_page.php'; db_pandora_audit( AUDIT_LOG_USER_REGISTRATION, sprintf( 'IP %s not allowed for user %s', $userIP, $nick ), $nick ); while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } } // If the auth_code exists, we assume the user has come from // double authorization page. if (isset($_POST['auth_code']) === true) { $double_auth_success = false; // The double authentication is activated and the user has // surpassed the first step (the login). // Now the authentication code provided will be checked. if (isset($_SESSION['prepared_login_da']) === true) { if (isset($_SESSION['prepared_login_da']['id_user']) === true && isset($_SESSION['prepared_login_da']['timestamp']) === true ) { // The user has a maximum of 5 minutes to introduce // the double auth code. $dauth_period = SECONDS_2MINUTES; $now = time(); $dauth_time = $_SESSION['prepared_login_da']['timestamp']; if (($now - $dauth_period) < $dauth_time) { // Nick. $nick = $_SESSION['prepared_login_da']['id_user']; // Code. $code = (string) get_parameter_post('auth_code'); if (empty($code) === false) { $result = validate_double_auth_code($nick, $code); if ($result === true) { // Double auth success. $double_auth_success = true; } else { // Screen. $login_screen = 'double_auth'; // Error message. $config['auth_error'] = __('Invalid code'); if (isset($_SESSION['prepared_login_da']['attempts']) === false) { $_SESSION['prepared_login_da']['attempts'] = 0; } $_SESSION['prepared_login_da']['attempts']++; } } else { // Screen. $login_screen = 'double_auth'; // Error message. $config['auth_error'] = __("The code shouldn't be empty"); if (isset($_SESSION['prepared_login_da']['attempts']) !== false) { $_SESSION['prepared_login_da']['attempts'] = 0; } $_SESSION['prepared_login_da']['attempts']++; } } else { // Expired login. unset($_SESSION['prepared_login_da']); // Error message. $config['auth_error'] = __('Expired login'); } } else { // If the code doesn't exist, remove the prepared login. unset($_SESSION['prepared_login_da']); // Error message. $config['auth_error'] = __('Login error'); } } else { // If $_SESSION['prepared_login_da'] doesn't exist, the user // must login again. // Error message. $config['auth_error'] = __('Login error'); } // Remove the authenticator code. unset($_POST['auth_code'], $code); if (!$double_auth_success) { $config['auth_error'] = __('Double auth error'); $login_failed = true; include_once 'general/login_page.php'; db_pandora_audit( AUDIT_LOG_USER_REGISTRATION, 'Invalid double auth login: '.$_SERVER['REMOTE_ADDR'], $_SERVER['REMOTE_ADDR'] ); while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } } $login_button_saml = get_parameter('login_button_saml', false); config_update_value('2Fa_auth', ''); if (isset($double_auth_success) && $double_auth_success) { // This values are true cause there are checked before complete // the 2nd auth step. $nick_in_db = $_SESSION['prepared_login_da']['id_user']; $expired_pass = false; } else if (($config['auth'] === 'saml') && ($login_button_saml)) { $saml_user_id = enterprise_hook('saml_process_user_login'); if (!$saml_user_id) { $config['auth_error'] = __('saml error'); $login_failed = true; include_once 'general/login_page.php'; while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } $nick_in_db = $saml_user_id; if (!$nick_in_db) { if ($config['auth'] === 'saml') { enterprise_hook('saml_logout'); } if (session_status() !== PHP_SESSION_NONE) { $_SESSION = []; session_destroy(); header_remove('Set-Cookie'); setcookie(session_name(), $_COOKIE[session_name()], (time() - 4800), '/'); } // Process logout. include 'general/logoff.php'; } $validatedCSRF = true; } else { // process_user_login is a virtual function which should be defined in each auth file. // It accepts username and password. The rest should be internal to the auth file. // The auth file can set $config["auth_error"] to an informative error output or reference their internal error messages to it // process_user_login should return false in case of errors or invalid login, the nickname if correct. $nick_in_db = process_user_login($nick, $pass); $expired_pass = false; if (($nick_in_db != false) && ((!is_user_admin($nick) || $config['enable_pass_policy_admin'])) && (file_exists(ENTERPRISE_DIR.'/load_enterprise.php')) && ($config['enable_pass_policy']) ) { include_once ENTERPRISE_DIR.'/include/auth/mysql.php'; $blocked = login_check_blocked($nick); if ($blocked) { include_once 'general/login_page.php'; db_pandora_audit( AUDIT_LOG_USER_MANAGEMENT, 'Password expired: '.$nick, $nick ); while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } // Checks if password has expired. $check_status = check_pass_status($nick, $pass); switch ($check_status) { case PASSSWORD_POLICIES_FIRST_CHANGE: // First change. case PASSSWORD_POLICIES_EXPIRED: // Pass expired. $expired_pass = true; login_change_password($nick, '', $check_status); break; default: // Ignore. break; } } } // CSRF Validation not pass in login. if ($validatedCSRF === false) { $process_error_message = __( '%s cannot verify the origin of the request. Try again, please.', get_product_name() ); include_once 'general/login_page.php'; // Finish the execution. exit(''); } if (($nick_in_db !== false) && $expired_pass) { // Login ok and password has expired. include_once 'general/login_page.php'; db_pandora_audit( AUDIT_LOG_USER_MANAGEMENT, 'Password expired: '.$nick, $nick ); while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } else if (($nick_in_db !== false) && (!$expired_pass)) { // Login ok and password has not expired. // Double auth check. if ((!isset($double_auth_success) || !$double_auth_success) && is_double_auth_enabled($nick_in_db) && (bool) $config['double_auth_enabled'] === true ) { // Store this values in the session to know if the user login // was correct. $_SESSION['prepared_login_da'] = [ 'id_user' => $nick_in_db, 'timestamp' => time(), 'attempts' => 0, ]; // Load the page to introduce the double auth code. $login_screen = 'double_auth'; include_once 'general/login_page.php'; while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } // Login ok and password has not expired. $process_login = true; if (is_user_admin($nick)) { echo ""; } else { echo ""; } if (!isset($_GET['sec2']) && !isset($_GET['sec'])) { // Avoid the show homepage when the user go to // a specific section of pandora // for example when timeout the sesion. unset($_GET['sec2']); $_GET['sec'] = 'general/logon_ok'; $home_page = ''; if (isset($nick)) { $user_info = users_get_user_by_id($nick); $home_page = io_safe_output($user_info['section']); $home_url = $user_info['data_section']; if ($home_page != '') { switch ($home_page) { case 'event_list': $_GET['sec'] = 'eventos'; $_GET['sec2'] = 'operation/events/events'; break; case 'group_view': $_GET['sec'] = 'view'; $_GET['sec2'] = 'operation/agentes/group_view'; break; case 'alert_detail': $_GET['sec'] = 'view'; $_GET['sec2'] = 'operation/agentes/alerts_status'; break; case 'tactical_view': $_GET['sec'] = 'view'; $_GET['sec2'] = 'operation/agentes/tactical'; break; case 'default': default: $_GET['sec'] = 'general/logon_ok'; break; case 'dashboard': $_GET['sec'] = 'reporting'; $_GET['sec2'] = 'operation/dashboard/dashboard'; $_GET['id_dashboard_select'] = $home_url; $_GET['d_from_main_page'] = 1; break; case 'visual_console': $_GET['sec'] = 'network'; $_GET['sec2'] = 'operation/visual_console/index'; break; case 'other': $home_url = io_safe_output($home_url); $url_array = parse_url($home_url); parse_str($url_array['query'], $res); foreach ($res as $key => $param) { $_GET[$key] = $param; } break; } } else { $_GET['sec'] = 'general/logon_ok'; } } } if (is_reporting_console_node() === true) { $_GET['sec'] = 'discovery'; $_GET['sec2'] = 'godmode/servers/discovery'; $_GET['wiz'] = 'tasklist'; $home_page = ''; } db_logon($nick_in_db, $_SERVER['REMOTE_ADDR']); $_SESSION['id_usuario'] = $nick_in_db; $config['id_user'] = $nick_in_db; config_prepare_expire_time_session(true); // Check if connection goes through F5 balancer. If it does, then // don't call config_prepare_session() or user will be back to login // all the time. $prepare_session = true; foreach ($_COOKIE as $key => $value) { if (preg_match('/BIGipServer*/', $key)) { $prepare_session = false; break; } } if ($prepare_session) { config_prepare_session(); } // ========================================================== // -------- SET THE CUSTOM CONFIGS OF USER ------------------ config_user_set_custom_config(); // ========================================================== // Remove everything that might have to do with people's passwords or logins unset($pass, $login_good); $user_language = get_user_language($config['id_user']); $l10n = null; if (file_exists('./include/languages/'.$user_language.'.mo') === true) { $cacheFileReader = new CachedFileReader( './include/languages/'.$user_language.'.mo' ); $l10n = new gettext_reader($cacheFileReader); $l10n->load_tables(); } } else { // Login wrong. $blocked = false; if ((is_user_admin($nick) === false || (bool) $config['enable_pass_policy_admin'] === true) && file_exists(ENTERPRISE_DIR.'/load_enterprise.php') === true ) { $blocked = login_check_blocked($nick); } if ((bool) $blocked === false) { if (file_exists(ENTERPRISE_DIR.'/load_enterprise.php') === true) { // Checks failed attempts. login_check_failed($nick); } $login_failed = true; } include_once 'general/login_page.php'; db_pandora_audit( AUDIT_LOG_USER_REGISTRATION, 'Invalid login: '.$nick, $nick ); while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } // Form the url. $query_params_redirect = $_GET; // Visual console do not want sec2. if ($home_page === 'visual_console') { unset($query_params_redirect['sec2']); } // Dashboard do not want sec2. if ($home_page === 'dashboard') { unset($query_params_redirect['sec2']); } $redirect_url = '?logged=1'; foreach ($query_params_redirect as $key => $value) { if ($key === 'login') { continue; } $redirect_url .= '&'.safe_url_extraclean($key).'='.safe_url_extraclean($value); } $double_auth_enabled = (bool) db_get_value('id', 'tuser_double_auth', 'id_user', $config['id_user']); header('Location: '.ui_get_full_url('index.php'.$redirect_url)); exit; // Always exit after sending location headers. } else if (isset($_GET['loginhash']) === true || isset($_POST['loginhash']) === true) { // Hash login process. $loginhash_data = get_parameter('loginhash_data', ''); $loginhash_user = str_rot13(get_parameter('loginhash_user', '')); if ($config['loginhash_pwd'] != '' && $loginhash_data == md5( $loginhash_user.io_output_password($config['loginhash_pwd']) ) ) { db_logon($loginhash_user, $_SERVER['REMOTE_ADDR']); $_SESSION['id_usuario'] = $loginhash_user; $config['id_user'] = $loginhash_user; } else { include_once 'general/login_page.php'; db_pandora_audit( AUDIT_LOG_USER_REGISTRATION, 'Loginhash failed', 'system' ); while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } } else if (isset($_GET['bye']) === false) { // There is no user connected. if ($config['enterprise_installed']) { enterprise_include_once('include/functions_reset_pass.php'); } // Boolean parameters. $correct_pass_change = (bool) get_parameter('correct_pass_change', false); $reset = (bool) get_parameter('reset', false); $first = (bool) get_parameter('first', false); // Strings. $reset_hash = get_parameter('reset_hash'); $pass1 = get_parameter_post('pass1'); $pass2 = get_parameter_post('pass2'); $id_user = get_parameter_post('id_user'); $db_reset_pass_entry = false; if (empty($reset_hash) === false) { $hash_data = explode(':::', $reset_hash); $id_user = $hash_data[0]; $codified_hash = $hash_data[1]; $db_reset_pass_entry = db_get_value_filter('reset_time', 'treset_pass', ['id_user' => $id_user, 'cod_hash' => $id_user.':::'.$codified_hash]); } if ($correct_pass_change === true && empty($pass1) === false && empty($pass2) === false && empty($id_user) === false && $db_reset_pass_entry !== false ) { // The CSRF does not be validated. if ($validatedCSRF === false) { $process_error_message = __( '%s cannot verify the origin of the request. Try again, please.', get_product_name() ); include_once 'general/login_page.php'; // Finish the execution. exit(''); } else { delete_reset_pass_entry($id_user); $correct_reset_pass_process = ''; $process_error_message = ''; if ($pass1 === $pass2) { $res = update_user_password($id_user, $pass1); if ($res) { db_process_sql_insert( 'tsesion', [ 'id_sesion' => '', 'id_usuario' => $id_user, 'ip_origen' => $_SERVER['REMOTE_ADDR'], 'accion' => 'Reset change', 'descripcion' => 'Successful reset password process ', 'fecha' => date('Y-m-d H:i:s'), 'utimestamp' => time(), ] ); $correct_reset_pass_process = __('Password changed successfully'); register_pass_change_try($id_user, 1); } else { register_pass_change_try($id_user, 0); $process_error_message = __('Failed to change password'); } } else { register_pass_change_try($id_user, 0); $process_error_message = __('Passwords must be the same'); } include_once 'general/login_page.php'; } } else { if (empty($reset_hash) === false) { $process_error_message = ''; if ($db_reset_pass_entry) { if (($db_reset_pass_entry + SECONDS_2HOUR) < time()) { register_pass_change_try($id_user, 0); $process_error_message = __('Too much time since password change request'); include_once 'general/login_page.php'; } else { include_once 'enterprise/include/process_reset_pass.php'; } } else { register_pass_change_try($id_user, 0); $process_error_message = __('This user has not requested a password change'); include_once 'general/login_page.php'; } } else { if ($reset === false) { include_once 'general/login_page.php'; } else { $user_reset_pass = get_parameter('user_reset_pass'); $error = ''; $mail = ''; $show_error = false; if ($first === false) { // The CSRF does not be validated. if ($validatedCSRF === false) { $process_error_message = __( '%s cannot verify the origin of the request. Try again, please.', get_product_name() ); include_once 'general/login_page.php'; // Finish the execution. exit(''); } if (empty($user_reset_pass) === true) { $reset = false; $error = __('Id user cannot be empty'); $show_error = true; } else { $check_user = check_user_id($user_reset_pass); if ($check_user === false) { $reset = false; register_pass_change_try($user_reset_pass, 0); $error = __('Error in reset password request'); $show_error = true; } else { $check_mail = check_user_have_mail($user_reset_pass); if (!$check_mail) { $reset = false; register_pass_change_try($user_reset_pass, 0); $error = __('This user doesn\'t have a valid email address'); $show_error = true; } else { $mail = $check_mail; } } } $cod_hash = $user_reset_pass.'::::'.md5(rand(10, 1000000).rand(10, 1000000).rand(10, 1000000)); $subject = '['.io_safe_output(get_product_name()).'] '.__('Reset password'); $body = __('This is an automatically sent message for user '); $body .= ' "'.$user_reset_pass.'"'; $body .= '

'; $body .= __('Please click the link below to reset your password'); $body .= '

'; $body .= ''.__('Reset your password').''; $body .= '

'; $body .= get_product_name(); $body .= '

'; $body .= ''.__('Please do not reply to this email.').''; $result = (bool) send_email_to_user($mail, $body, $subject); if ($result === false) { $process_error_message = __('Error at sending the email'); } else { send_token_to_db($user_reset_pass, $cod_hash); } include_once 'general/login_page.php'; } else { include_once 'enterprise/include/reset_pass.php'; } } } } while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } } else { if (isset($_GET['loginhash_data'])) { $loginhash_data = get_parameter('loginhash_data', ''); $loginhash_user = str_rot13(get_parameter('loginhash_user', '')); $iduser = $_SESSION['id_usuario']; unset($_SESSION['id_usuario']); unset($iduser); if ($config['loginhash_pwd'] != '' && $loginhash_data == md5( $loginhash_user.io_output_password($config['loginhash_pwd']) ) ) { db_logon($loginhash_user, $_SERVER['REMOTE_ADDR']); $_SESSION['id_usuario'] = $loginhash_user; $config['id_user'] = $loginhash_user; } else { include_once 'general/login_page.php'; db_pandora_audit( AUDIT_LOG_USER_REGISTRATION, 'Loginhash failed', 'system' ); while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } } $user_in_db = db_get_row_filter( 'tusuario', ['id_user' => $config['id_user']], '*' ); if ($user_in_db == false) { // Logout. $_REQUEST = []; $_GET = []; $_POST = []; $config['auth_error'] = __("User doesn\'t exist."); $iduser = $_SESSION['id_usuario']; unset($_SESSION['id_usuario']); unset($iduser); include_once 'general/login_page.php'; while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } else { if (((bool) $user_in_db['is_admin'] === false) && ((bool) $user_in_db['not_login'] === true || (is_metaconsole() === false && has_metaconsole() === true && is_management_allowed() === false && (bool) $user_in_db['metaconsole_access_node'] === false)) ) { // Logout. $_REQUEST = []; $_GET = []; $_POST = []; $config['auth_error'] = __('User only can use the API.'); $iduser = $_SESSION['id_usuario']; unset($_SESSION['id_usuario']); unset($iduser); $login_screen = 'disabled_access_node'; include_once 'general/login_page.php'; while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } else { if ($config['auth'] === 'saml') { enterprise_hook('saml_login_status_verifier'); } } } } if ((bool) ($config['maintenance_mode'] ?? false) === true && is_user_admin($config['id_user']) === false ) { // Show maintenance web-page. For non-admin users only. include $config['homedir'].'/general/maintenance.php'; while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } if ((bool) ($config['maintenance_mode'] ?? false) === true && $page !== 'advanced/command_center' && $page !== 'godmode/update_manager/update_manager' && is_user_admin($config['id_user']) === true ) { // Prevent access to metaconsole if not merged. include 'general/admin_maintenance_mode.php'; while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } // Enterprise support. if (file_exists(ENTERPRISE_DIR.'/load_enterprise.php')) { include_once ENTERPRISE_DIR.'/load_enterprise.php'; } // Log off. if (isset($_GET['bye'])) { $iduser = $_SESSION['id_usuario']; if ($config['auth'] === 'saml') { enterprise_hook('saml_logout'); } $_SESSION = []; session_destroy(); header_remove('Set-Cookie'); setcookie(session_name(), $_COOKIE[session_name()], (time() - 4800), '/'); generate_csrf_code(); // Process logout. include 'general/logoff.php'; while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } clear_pandora_error_for_header(); if ((bool) ($config['node_deactivated'] ?? false) === true) { // Prevent access node if not merged. include 'general/node_deactivated.php'; while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } if ((bool) ($config['maintenance_mode'] ?? false) === true && (bool) users_is_admin() === false ) { // Show maintenance web-page. For non-admin users only. include 'general/maintenance.php'; while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } if (is_reporting_console_node() === true && (bool) users_is_admin() === false ) { include 'general/reporting_console_node.php'; exit; } /* * ---------------------------------------------------------------------- * EXTENSIONS * ---------------------------------------------------------------------- * * Load the basic configurations of extension and add extensions into menu. * Load here, because if not, some extensions not load well, I don't why. */ $config['logged'] = false; extensions_load_extensions($process_login); if ($process_login) { // Call all extensions login function. extensions_call_login_function(); unset($_SESSION['new_update']); include_once 'include/functions_update_manager.php'; if ($config['autoupdate'] == 1) { $result = update_manager_check_updates_available(); if ($result) { $_SESSION['new_update'] = 'new'; } } $config['logged'] = true; } require_once 'general/register.php'; if (get_parameter('login', 0) !== 0) { if ((!isset($config['skip_login_help_dialog']) || $config['skip_login_help_dialog'] == 0) && $display_previous_popup === false && $config['initial_wizard'] == 1 ) { include_once 'general/login_help_dialog.php'; } $php_version = phpversion(); $php_version_array = explode('.', $php_version); if ($php_version_array[0] < 7) { include_once 'general/php_message.php'; } } if ((bool) ($config['maintenance_mode'] ?? false) === true && (bool) users_is_admin() === false ) { // Show maintenance web-page. For non-admin users only. include 'general/maintenance.php'; while (ob_get_length() > 0) { ob_end_flush(); } exit(''); } // Pure. if ($config['pure'] == 0) { // Menu container prepared to autohide menu. $menuCollapsed = (isset($_SESSION['menu_type']) === true && $_SESSION['menu_type'] !== 'classic'); $menuTypeClass = ($menuCollapsed === true) ? 'collapsed' : 'classic'; // Snow. $string = '

'; // Container. echo '
'.$string; // Notifications content wrapper echo ''; // Header. echo ''; // Main menu. echo sprintf('
', $menuTypeClass); echo ''; // Main pure. } echo html_print_div( ['id' => 'wiz_container'], true ); echo html_print_div( ['id' => 'um_msg_receiver'], true ); echo html_print_input_hidden( 'flagEasternEgg', $config['eastern_eggs_disabled'], false, '', '', 'flagEasternEgg' ); // Connection lost alert. set_js_value('check_conexion_interval', $config['check_conexion_interval']); set_js_value('title_conexion_interval', __('Connection with console has been lost')); set_js_value('status_conexion_interval', __('Connection status: ')); ui_require_javascript_file('connection_check'); set_js_value('absolute_homeurl', ui_get_full_url(false, false, false, false)); $conn_title = __('Connection with console has been lost'); $conn_text = __('Connection to the console has been lost. Please check your internet connection.'); ui_print_message_dialog($conn_title, $conn_text, 'connection', '/images/fail@svg.svg'); if ($config['pure'] == 0) { echo '
'; // Container div. echo '
'; // echo '
'; echo ''; } // Clippy function. require_once 'include/functions_clippy.php'; clippy_start($sec2); while (ob_get_length() > 0) { ob_end_flush(); } db_print_database_debug(); echo ''; $run_time = format_numeric((microtime(true) - $config['start_time']), 3); echo "\n\n"; if (isset($_GET['logged']) === false) { $_GET['logged'] = ''; } // Values from PHP to be recovered from JAVASCRIPT. require 'include/php_to_js_values.php'; ?>