2
0

triggers.inc.php 9.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272
  1. <?php
  2. // handle iam authentication
  3. if ($iam_provider){
  4. if (isset($_GET['iam_sso'])){
  5. // redirect for sso
  6. $redirect_uri = identity_provider('get-redirect');
  7. $redirect_uri = !empty($redirect_uri) ? $redirect_uri : '/';
  8. header('Location: ' . $redirect_uri);
  9. die();
  10. }
  11. if ($_SESSION['iam_token'] && $_SESSION['iam_refresh_token']) {
  12. // Session found, try to refresh
  13. $isRefreshed = identity_provider('refresh-token');
  14. if (!$isRefreshed){
  15. // Session could not be refreshed, redirect to provider
  16. $redirect_uri = identity_provider('get-redirect');
  17. $redirect_uri = !empty($redirect_uri) ? $redirect_uri : '/';
  18. header('Location: ' . $redirect_uri);
  19. die();
  20. }
  21. } elseif ($_GET['code'] && $_GET['state'] === $_SESSION['oauth2state']) {
  22. // Check given state against previously stored one to mitigate CSRF attack
  23. // Recieved access token in $_GET['code']
  24. // extract info and verify user
  25. identity_provider('verify-sso');
  26. }
  27. }
  28. // SSO Domain Admin
  29. if (!empty($_GET['sso_token'])) {
  30. $username = domain_admin_sso('check', $_GET['sso_token']);
  31. if ($username !== false) {
  32. session_regenerate_id(true);
  33. $_SESSION['mailcow_cc_username'] = $username;
  34. $_SESSION['mailcow_cc_role'] = 'domainadmin';
  35. header('Location: /mailbox');
  36. }
  37. }
  38. if (isset($_POST["pw_reset_request"]) && !empty($_POST['username'])) {
  39. reset_password("issue", $_POST['username']);
  40. header("Location: /");
  41. exit;
  42. }
  43. if (isset($_POST["pw_reset"])) {
  44. $username = reset_password("check", $_POST['token']);
  45. $reset_result = reset_password("reset", array(
  46. 'new_password' => $_POST['new_password'],
  47. 'new_password2' => $_POST['new_password2'],
  48. 'token' => $_POST['token'],
  49. 'username' => $username,
  50. 'check_tfa' => True
  51. ));
  52. if ($reset_result){
  53. header("Location: /");
  54. exit;
  55. }
  56. }
  57. if (isset($_POST["verify_tfa_login"])) {
  58. if (verify_tfa_login($_SESSION['pending_mailcow_cc_username'], $_POST)) {
  59. if ($_SESSION['pending_mailcow_cc_role'] == "admin") {
  60. $_SESSION['mailcow_cc_username'] = $_SESSION['pending_mailcow_cc_username'];
  61. $_SESSION['mailcow_cc_role'] = "admin";
  62. unset($_SESSION['pending_mailcow_cc_username']);
  63. unset($_SESSION['pending_mailcow_cc_role']);
  64. unset($_SESSION['pending_tfa_methods']);
  65. header("Location: /debug");
  66. die();
  67. }
  68. elseif ($_SESSION['pending_mailcow_cc_role'] == "domainadmin") {
  69. $_SESSION['mailcow_cc_username'] = $_SESSION['pending_mailcow_cc_username'];
  70. $_SESSION['mailcow_cc_role'] = "domainadmin";
  71. unset($_SESSION['pending_mailcow_cc_username']);
  72. unset($_SESSION['pending_mailcow_cc_role']);
  73. unset($_SESSION['pending_tfa_methods']);
  74. header("Location: /mailbox");
  75. die();
  76. }
  77. elseif ($_SESSION['pending_mailcow_cc_role'] == "user") {
  78. if (isset($_SESSION['pending_pw_reset_token']) && isset($_SESSION['pending_pw_new_password'])) {
  79. reset_password("reset", array(
  80. 'new_password' => $_SESSION['pending_pw_new_password'],
  81. 'new_password2' => $_SESSION['pending_pw_new_password'],
  82. 'token' => $_SESSION['pending_pw_reset_token'],
  83. 'username' => $_SESSION['pending_mailcow_cc_username']
  84. ));
  85. unset($_SESSION['pending_pw_reset_token']);
  86. unset($_SESSION['pending_pw_new_password']);
  87. unset($_SESSION['pending_mailcow_cc_username']);
  88. unset($_SESSION['pending_tfa_methods']);
  89. header("Location: /");
  90. die();
  91. } else {
  92. set_user_loggedin_session($_SESSION['pending_mailcow_cc_username']);
  93. $user_details = mailbox("get", "mailbox_details", $_SESSION['mailcow_cc_username']);
  94. $is_dual = (!empty($_SESSION["dual-login"]["username"])) ? true : false;
  95. if (intval($user_details['attributes']['sogo_access']) == 1 && !$is_dual) {
  96. header("Location: /SOGo/so/{$_SESSION['mailcow_cc_username']}");
  97. die();
  98. } else {
  99. header("Location: /user");
  100. die();
  101. }
  102. }
  103. }
  104. }
  105. unset($_SESSION['pending_mailcow_cc_username']);
  106. unset($_SESSION['pending_mailcow_cc_role']);
  107. unset($_SESSION['pending_tfa_methods']);
  108. }
  109. if (isset($_GET["cancel_tfa_login"])) {
  110. unset($_SESSION['pending_pw_reset_token']);
  111. unset($_SESSION['pending_pw_new_password']);
  112. unset($_SESSION['pending_mailcow_cc_username']);
  113. unset($_SESSION['pending_mailcow_cc_role']);
  114. unset($_SESSION['pending_tfa_methods']);
  115. header("Location: /");
  116. }
  117. if (isset($_POST["quick_release"])) {
  118. quarantine('quick_release', $_POST["quick_release"]);
  119. }
  120. if (isset($_POST["quick_delete"])) {
  121. quarantine('quick_delete', $_POST["quick_delete"]);
  122. }
  123. if (isset($_POST["login_user"]) && isset($_POST["pass_user"])) {
  124. $login_user = strtolower(trim($_POST["login_user"]));
  125. $as = check_login($login_user, $_POST["pass_user"]);
  126. if ($as == "admin") {
  127. session_regenerate_id(true);
  128. $_SESSION['mailcow_cc_username'] = $login_user;
  129. $_SESSION['mailcow_cc_role'] = "admin";
  130. header("Location: /debug");
  131. die();
  132. }
  133. elseif ($as == "domainadmin") {
  134. session_regenerate_id(true);
  135. $_SESSION['mailcow_cc_username'] = $login_user;
  136. $_SESSION['mailcow_cc_role'] = "domainadmin";
  137. header("Location: /mailbox");
  138. die();
  139. }
  140. elseif ($as == "user") {
  141. set_user_loggedin_session($login_user);
  142. $http_parameters = explode('&', $_SESSION['index_query_string']);
  143. unset($_SESSION['index_query_string']);
  144. if (in_array('mobileconfig', $http_parameters)) {
  145. if (in_array('only_email', $http_parameters)) {
  146. header("Location: /mobileconfig.php?only_email");
  147. die();
  148. }
  149. header("Location: /mobileconfig.php");
  150. die();
  151. }
  152. $user_details = mailbox("get", "mailbox_details", $login_user);
  153. $is_dual = (!empty($_SESSION["dual-login"]["username"])) ? true : false;
  154. if (intval($user_details['attributes']['sogo_access']) == 1 && !$is_dual) {
  155. header("Location: /SOGo/so/{$login_user}");
  156. die();
  157. } else {
  158. header("Location: /user");
  159. die();
  160. }
  161. if (!isset($_SESSION['oauth2_request'])) {
  162. header("Location: /user");
  163. die();
  164. }
  165. }
  166. elseif ($as != "pending") {
  167. unset($_SESSION['pending_mailcow_cc_username']);
  168. unset($_SESSION['pending_mailcow_cc_role']);
  169. unset($_SESSION['pending_tfa_methods']);
  170. unset($_SESSION['mailcow_cc_username']);
  171. unset($_SESSION['mailcow_cc_role']);
  172. } else {
  173. session_regenerate_id(true);
  174. }
  175. }
  176. if (isset($_SESSION['mailcow_cc_role']) && (isset($_SESSION['acl']['login_as']) && $_SESSION['acl']['login_as'] == "1")) {
  177. if (isset($_GET["duallogin"])) {
  178. $is_dual = (!empty($_SESSION["dual-login"]["username"])) ? true : false;
  179. if (!$is_dual) {
  180. $duallogin = html_entity_decode(rawurldecode($_GET["duallogin"]));
  181. if (filter_var($duallogin, FILTER_VALIDATE_EMAIL)) {
  182. if (!empty(mailbox('get', 'mailbox_details', $duallogin))) {
  183. $_SESSION["dual-login"]["username"] = $_SESSION['mailcow_cc_username'];
  184. $_SESSION["dual-login"]["role"] = $_SESSION['mailcow_cc_role'];
  185. $_SESSION['mailcow_cc_username'] = $duallogin;
  186. $_SESSION['mailcow_cc_role'] = "user";
  187. header("Location: /user");
  188. }
  189. }
  190. else {
  191. if (!empty(domain_admin('details', $duallogin))) {
  192. $_SESSION["dual-login"]["username"] = $_SESSION['mailcow_cc_username'];
  193. $_SESSION["dual-login"]["role"] = $_SESSION['mailcow_cc_role'];
  194. $_SESSION['mailcow_cc_username'] = $duallogin;
  195. $_SESSION['mailcow_cc_role'] = "domainadmin";
  196. header("Location: /user");
  197. }
  198. }
  199. }
  200. }
  201. }
  202. if (isset($_SESSION['mailcow_cc_role'])) {
  203. if (isset($_POST["set_tfa"])) {
  204. set_tfa($_POST);
  205. }
  206. if (isset($_POST["unset_tfa_key"])) {
  207. unset_tfa_key($_POST);
  208. }
  209. if (isset($_POST["unset_fido2_key"])) {
  210. fido2(array("action" => "unset_fido2_key", "post_data" => $_POST));
  211. }
  212. }
  213. if (isset($_SESSION['mailcow_cc_role']) && $_SESSION['mailcow_cc_role'] == "admin" && !isset($_SESSION['mailcow_cc_api'])) {
  214. // TODO: Move file upload to API?
  215. if (isset($_POST["submit_main_logo"])) {
  216. if ($_FILES['main_logo']['error'] == 0) {
  217. customize('add', 'main_logo', $_FILES);
  218. }
  219. if ($_FILES['main_logo_dark']['error'] == 0) {
  220. customize('add', 'main_logo_dark', $_FILES);
  221. }
  222. }
  223. if (isset($_POST["reset_main_logo"])) {
  224. customize('delete', 'main_logo');
  225. customize('delete', 'main_logo_dark');
  226. }
  227. // Some actions will not be available via API
  228. if (isset($_POST["license_validate_now"])) {
  229. license('verify');
  230. }
  231. if (isset($_POST["admin_api"])) {
  232. if (isset($_POST["admin_api"]["ro"])) {
  233. admin_api('ro', 'edit', $_POST);
  234. }
  235. elseif (isset($_POST["admin_api"]["rw"])) {
  236. admin_api('rw', 'edit', $_POST);
  237. }
  238. }
  239. if (isset($_POST["admin_api_regen_key"])) {
  240. if (isset($_POST["admin_api_regen_key"]["ro"])) {
  241. admin_api('ro', 'regen_key', $_POST);
  242. }
  243. elseif (isset($_POST["admin_api_regen_key"]["rw"])) {
  244. admin_api('rw', 'regen_key', $_POST);
  245. }
  246. }
  247. if (isset($_POST["rspamd_ui"])) {
  248. rspamd_ui('edit', $_POST);
  249. }
  250. if (isset($_POST["mass_send"])) {
  251. sys_mail($_POST);
  252. }
  253. }
  254. ?>