| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164 | <?php// handle iam authenticationif ($iam_provider){  if (isset($_GET['iam_sso'])){    // redirect for sso    $redirect_uri = identity_provider('get-redirect');    $redirect_uri = !empty($redirect_uri) ? $redirect_uri : '/';    header('Location: ' . $redirect_uri);    die();  }  if ($_SESSION['iam_token'] && $_SESSION['iam_refresh_token']) {    // Session found, try to refresh    $isRefreshed = identity_provider('refresh-token');    if (!$isRefreshed){      // Session could not be refreshed, redirect to provider      $redirect_uri = identity_provider('get-redirect');      $redirect_uri = !empty($redirect_uri) ? $redirect_uri : '/';      header('Location: ' . $redirect_uri);      die();    }  } elseif ($_GET['code'] && $_GET['state'] === $_SESSION['oauth2state']) {    // Check given state against previously stored one to mitigate CSRF attack    // Received access token in $_GET['code']    // extract info and verify user    identity_provider('verify-sso');  }}if (isset($_POST["pw_reset_request"]) && !empty($_POST['username'])) {  reset_password("issue", $_POST['username']);  header("Location: /");  exit;}if (isset($_POST["pw_reset"])) {  $username = reset_password("check", $_POST['token']);  $reset_result = reset_password("reset", array(    'new_password' => $_POST['new_password'],    'new_password2' => $_POST['new_password2'],    'token' => $_POST['token'],    'username' => $username,    'check_tfa' => True  ));  if ($reset_result){    header("Location: /");    exit;  }}if (isset($_POST["verify_tfa_login"])) {  if (verify_tfa_login($_SESSION['pending_mailcow_cc_username'], $_POST)) {    if ($_SESSION['pending_mailcow_cc_role'] == "user") {      if (isset($_SESSION['pending_pw_reset_token']) && isset($_SESSION['pending_pw_new_password'])) {        reset_password("reset", array(          'new_password' => $_SESSION['pending_pw_new_password'],          'new_password2' => $_SESSION['pending_pw_new_password'],          'token' => $_SESSION['pending_pw_reset_token'],          'username' => $_SESSION['pending_mailcow_cc_username']        ));        unset($_SESSION['pending_pw_reset_token']);        unset($_SESSION['pending_pw_new_password']);        unset($_SESSION['pending_mailcow_cc_username']);        unset($_SESSION['pending_tfa_methods']);        header("Location: /");        die();      } else {        set_user_loggedin_session($_SESSION['pending_mailcow_cc_username']);        if (isset($_SESSION['oauth2_request'])) {          $oauth2_request = $_SESSION['oauth2_request'];          unset($_SESSION['oauth2_request']);          header('Location: ' . $oauth2_request);          die();        }        $user_details = mailbox("get", "mailbox_details", $_SESSION['mailcow_cc_username']);        $is_dual = (!empty($_SESSION["dual-login"]["username"])) ? true : false;        if (intval($user_details['attributes']['sogo_access']) == 1 &&            intval($user_details['attributes']['force_pw_update']) != 1 &&            getenv('SKIP_SOGO') != "y" &&            !$is_dual) {          header("Location: /SOGo/so/");          die();        } else {          header("Location: /user");          die();        }      }    }  }  unset($_SESSION['pending_mailcow_cc_username']);  unset($_SESSION['pending_mailcow_cc_role']);  unset($_SESSION['pending_tfa_methods']);}if (isset($_POST["verify_fido2_login"])) {  $res = fido2(array(    "action" => "verify",    "token" => $_POST["token"],    "user" => "user"  ));  if (is_array($res) && $res['role'] == "user" && !empty($res['username'])){    set_user_loggedin_session($res['username']);    $_SESSION["fido2_cid"] = $res['cid'];  }  exit;}if (isset($_GET["cancel_tfa_login"])) {  unset($_SESSION['pending_pw_reset_token']);  unset($_SESSION['pending_pw_new_password']);  unset($_SESSION['pending_mailcow_cc_username']);  unset($_SESSION['pending_mailcow_cc_role']);  unset($_SESSION['pending_tfa_methods']);  header("Location: /");}if (isset($_POST["login_user"]) && isset($_POST["pass_user"])) {  $login_user = strtolower(trim($_POST["login_user"]));  $as = check_login($login_user, $_POST["pass_user"], false, array("role" => "user"));  if ($as == "user") {    set_user_loggedin_session($login_user);    $http_parameters = explode('&', $_SESSION['index_query_string']);    unset($_SESSION['index_query_string']);    if (in_array('mobileconfig', $http_parameters)) {        if (in_array('only_email', $http_parameters)) {            header("Location: /mobileconfig.php?only_email");            die();        }        header("Location: /mobileconfig.php");        die();    }    if (isset($_SESSION['oauth2_request'])) {      $oauth2_request = $_SESSION['oauth2_request'];      unset($_SESSION['oauth2_request']);      header('Location: ' . $oauth2_request);      die();    }    $user_details = mailbox("get", "mailbox_details", $login_user);    $is_dual = (!empty($_SESSION["dual-login"]["username"])) ? true : false;    if (intval($user_details['attributes']['sogo_access']) == 1 &&        intval($user_details['attributes']['force_pw_update']) != 1 &&        getenv('SKIP_SOGO') != "y" &&        !$is_dual) {      header("Location: /SOGo/so/");      die();    } else {      header("Location: /user");      die();    }	}	elseif ($as != "pending") {    unset($_SESSION['pending_mailcow_cc_username']);    unset($_SESSION['pending_mailcow_cc_role']);    unset($_SESSION['pending_tfa_methods']);		unset($_SESSION['mailcow_cc_username']);		unset($_SESSION['mailcow_cc_role']);	}}?>
 |