* Enable re-captcha to use it * Disables the mini-login box in header * Requires re-Captcha to be setup in Admin Panel Fixes #1400 once merged.
61 lines
3.1 KiB
PHP
61 lines
3.1 KiB
PHP
<?php
|
|
|
|
// Make sure we are called from index.php
|
|
if (!defined('SECURITY')) die('Hacking attempt');
|
|
|
|
|
|
// ReCaptcha handling if enabled
|
|
if ($setting->getValue('recaptcha_enabled')) {
|
|
require_once(INCLUDE_DIR . '/lib/recaptchalib.php');
|
|
if (!empty($_POST['username']) && !empty($_POST['password'])) {
|
|
// Load re-captcha specific data
|
|
$rsp = recaptcha_check_answer (
|
|
$setting->getValue('recaptcha_private_key'),
|
|
$_SERVER["REMOTE_ADDR"],
|
|
( (isset($_POST["recaptcha_challenge_field"])) ? $_POST["recaptcha_challenge_field"] : null ),
|
|
( (isset($_POST["recaptcha_response_field"])) ? $_POST["recaptcha_response_field"] : null )
|
|
);
|
|
$smarty->assign("RECAPTCHA", recaptcha_get_html($setting->getValue('recaptcha_public_key'), $rsp->error, true));
|
|
if (!$rsp->is_valid) $_SESSION['POPUP'][] = array('CONTENT' => 'Invalid Captcha, please try again.', 'TYPE' => 'errormsg');
|
|
} else {
|
|
$smarty->assign("RECAPTCHA", recaptcha_get_html($setting->getValue('recaptcha_public_key'), null, true));
|
|
}
|
|
}
|
|
|
|
if ($setting->getValue('maintenance') && !$user->isAdmin($user->getUserId($_POST['username']))) {
|
|
$_SESSION['POPUP'][] = array('CONTENT' => 'You are not allowed to login during maintenace.', 'TYPE' => 'info');
|
|
} else if (!empty($_POST['username']) && !empty($_POST['password'])) {
|
|
$nocsrf = 1;
|
|
if ($config['csrf']['enabled'] && $config['csrf']['forms']['login']) {
|
|
if ((isset($_POST['ctoken']) && $_POST['ctoken'] !== $user->getCSRFToken($_SERVER['REMOTE_ADDR'], 'login')) || (!isset($_POST['ctoken']))) {
|
|
// csrf protection is on and this token is invalid, error out -> time expired
|
|
$nocsrf = 0;
|
|
}
|
|
}
|
|
// Check if recaptcha is enabled, process form data if valid
|
|
if (($setting->getValue('recaptcha_enabled') != 1 || $rsp->is_valid) && ($nocsrf == 1 || (!$config['csrf']['enabled'] || !$config['csrf']['forms']['login']))) {
|
|
if ($user->checkLogin(@$_POST['username'], @$_POST['password']) ) {
|
|
empty($_POST['to']) ? $to = $_SERVER['SCRIPT_NAME'] : $to = $_POST['to'];
|
|
$port = ($_SERVER["SERVER_PORT"] == "80" or $_SERVER["SERVER_PORT"] == "443") ? "" : (":".$_SERVER["SERVER_PORT"]);
|
|
$location = @$_SERVER['HTTPS'] === true ? 'https://' . $_SERVER['SERVER_NAME'] . $port . $to : 'http://' . $_SERVER['SERVER_NAME'] . $port . $to;
|
|
if (!headers_sent()) header('Location: ' . $location);
|
|
exit('<meta http-equiv="refresh" content="0; url=' . htmlspecialchars($location) . '"/>');
|
|
} else {
|
|
$_SESSION['POPUP'][] = array('CONTENT' => 'Unable to login: '. $user->getError(), 'TYPE' => 'errormsg');
|
|
}
|
|
} else if ($nocsrf == 0) {
|
|
$img = "<img src='site_assets/mpos/images/questionmark.png' title='Tokens are used to help us mitigate attacks; Simply login again to continue' width='20px' height='20px'>";
|
|
$_SESSION['POPUP'][] = array('CONTENT' => "Login token expired, please try again $img", 'TYPE' => 'info');
|
|
}
|
|
}
|
|
// csrf token - update if it's enabled
|
|
$token = '';
|
|
if ($config['csrf']['enabled'] && $config['csrf']['forms']['login']) {
|
|
$token = $user->getCSRFToken($_SERVER['REMOTE_ADDR'], 'login');
|
|
}
|
|
|
|
// Load login template
|
|
$smarty->assign('CONTENT', 'default.tpl');
|
|
$smarty->assign('CTOKEN', $token);
|
|
?>
|