64) { $hesk_error_buffer['pass'] = $hesklang['pass_len']; } if ($hesk_settings['secimg_use'] == 2 && !isset($_SESSION['img_a_verified'])) { // Using reCAPTCHA? if ($hesk_settings['recaptcha_use']) { require(HESK_PATH . 'inc/recaptcha/recaptchalib_v2.php'); $resp = null; $reCaptcha = new ReCaptcha($hesk_settings['recaptcha_private_key']); // Was there a reCAPTCHA response? if ( isset($_POST["g-recaptcha-response"]) ) { $resp = $reCaptcha->verifyResponse(hesk_getClientIP(), hesk_POST("g-recaptcha-response") ); } if ($resp != null && $resp->success) { $_SESSION['img_a_verified']=true; } else { $hesk_error_buffer['mysecnum']=$hesklang['recaptcha_error']; } } // Using PHP generated image else { $mysecnum = intval( hesk_POST('mysecnum', 0) ); if ( empty($mysecnum) ) { $hesk_error_buffer['mysecnum'] = $hesklang['sec_miss']; } else { require(HESK_PATH . 'inc/secimg.inc.php'); $sc = new PJ_SecurityImage($hesk_settings['secimg_sum']); if ( isset($_SESSION['checksum']) && $sc->checkCode($mysecnum, $_SESSION['checksum']) ) { $_SESSION['img_a_verified'] = true; } else { $hesk_error_buffer['mysecnum'] = $hesklang['sec_wrng']; } } } } /* Any missing fields? */ if (count($hesk_error_buffer)!=0) { $_SESSION['a_iserror'] = array_keys($hesk_error_buffer); $tmp = ''; foreach ($hesk_error_buffer as $error) { $tmp .= "
  • $error
  • \n"; } $hesk_error_buffer = $tmp; $hesk_error_buffer = $hesklang['pcer'].'

    '; hesk_process_messages($hesk_error_buffer,'NOREDIRECT'); print_login(); exit(); } elseif (isset($_SESSION['img_a_verified'])) { unset($_SESSION['img_a_verified']); } /* User entered all required info, now lets limit brute force attempts */ hesk_limitBfAttempts(); $result = hesk_dbQuery("SELECT * FROM `".hesk_dbEscape($hesk_settings['db_pfix'])."users` WHERE `user` = '".hesk_dbEscape($user)."' LIMIT 1"); if (hesk_dbNumRows($result) != 1) { hesk_session_stop(); $_SESSION['a_iserror'] = array('user','pass'); hesk_process_messages($hesklang['wrong_user'],'NOREDIRECT'); print_login(); exit(); } $user_row = hesk_dbFetchAssoc($result); // Verify password if (hesk_password_verify($pass, $user_row['pass'])) { if (hesk_password_needs_rehash($user_row['pass'])) { $user_row['pass'] = hesk_password_hash($pass); hesk_dbQuery("UPDATE `".$hesk_settings['db_pfix']."users` SET `pass`='".hesk_dbEscape($user_row['pass'])."' WHERE `id`=".intval($user_row['id'])); } } elseif (hesk_Pass2Hash($pass) == $user_row['pass']) { // Legacy password, update it $user_row['pass'] = hesk_password_hash($pass); hesk_dbQuery("UPDATE `".$hesk_settings['db_pfix']."users` SET `pass`='".hesk_dbEscape($user_row['pass'])."' WHERE `id`=".intval($user_row['id'])); } else { hesk_session_stop(); $_SESSION['a_iserror'] = array('pass'); hesk_process_messages($hesklang['wrong_pass'],'NOREDIRECT'); print_login(); exit(); } // User authenticated; if MFA is disabled, complete the login $mfa_enrollment = intval($user_row['mfa_enrollment']); if (empty($mfa_enrollment)) { process_successful_login($user_row); } // Handle MFA require(HESK_PATH . 'inc/mfa_functions.inc.php'); $message = $hesklang['mfa_verification_needed'] . '

    '; $mfa_verify_option = 1; if ($mfa_enrollment === 1) { // Email $verification_code = generate_mfa_code(); hash_and_store_mfa_verification_code($user_row['id'], $verification_code); send_mfa_email($user_row['name'], $user_row['email'], $verification_code); $message .= $hesklang['mfa_verification_needed_email']; } elseif ($mfa_enrollment === 2) { // Authenticator App $message .= $hesklang['mfa_verification_needed_auth_app']; $mfa_verify_option = 2; } $user_id = $user_row['id']; $email = $user_row['email']; $name = $user_row['name']; hesk_session_stop(); hesk_session_start(); $_SESSION['HESK_USER'] = $user; $_SESSION['id'] = $user_id; $_SESSION['mfa_enrollment'] = $mfa_enrollment; $_SESSION['email'] = $email; $_SESSION['remember_user_form_val'] = hesk_POST('remember_user'); $_SESSION['mfa_verify_option'] = $mfa_verify_option; $_SESSION['name'] = $name; hesk_process_messages($message, 'NOREDIRECT', 'INFO'); print_mfa_verification(); exit(); } // End do_login() function do_mfa_verification() { global $hesk_settings, $hesklang; require(HESK_PATH . 'inc/mfa_functions.inc.php'); if (($_SESSION['mfa_verify_option'] === 1 && !is_mfa_email_code_valid($_SESSION['id'], hesk_POST('verification-code'))) || ($_SESSION['mfa_verify_option'] === 2 && !is_mfa_app_code_valid($_SESSION['id'], hesk_POST('verification-code')))) { hesk_process_messages($hesklang['mfa_invalid_verification_code'], 'NOREDIRECT'); // Invalid attempts increase the lockout limit hesk_limitBfAttempts(); $_SESSION['remember_user_form_val'] = hesk_POST('remember_user'); print_mfa_verification(); exit(); } set_session_and_process_login(); } function set_session_and_process_login() { global $hesk_settings; $result = hesk_dbQuery("SELECT * FROM `".hesk_dbEscape($hesk_settings['db_pfix'])."users` WHERE `user` = '".hesk_dbEscape($_SESSION['HESK_USER'])."' LIMIT 1"); $res = hesk_dbFetchAssoc($result); process_successful_login($res); } function do_backup_code_verification() { global $hesklang; require(HESK_PATH . 'inc/mfa_functions.inc.php'); if (!verify_mfa_backup_code($_SESSION['id'], hesk_POST('backup-code'))) { hesk_process_messages($hesklang['mfa_invalid_backup_code'], 'NOREDIRECT'); // Invalid attempts increase the lockout limit hesk_limitBfAttempts(); $_SESSION['remember_user_form_val'] = hesk_POST('remember_user'); print_mfa_verification(); exit(); } set_session_and_process_login(); } function process_successful_login($user_row) { global $hesk_settings, $hesklang; // User authenticated, let's regenerate the session ID hesk_session_regenerate_id(); // Set a tag that will be used to expire sessions after username or password change $_SESSION['session_verify'] = hesk_activeSessionCreateTag($user_row['user'], $user_row['pass']); // Set data we need for the session unset($user_row['pass']); unset($user_row['mfa_secret']); foreach ($user_row as $k => $v) { $_SESSION[$k] = $v; } // Reset repeated emails session data hesk_cleanSessionVars('mfa_emails_sent'); /* Login successful, clean brute force attempts */ hesk_cleanBfAttempts(); // Give the user some time before requiring re-authentication for sensitive pages $current_time = new DateTime(); $interval_amount = $hesk_settings['elevator_duration']; if (in_array(substr($interval_amount, -1), array('M', 'H'))) { $interval_amount = 'T'.$interval_amount; } $elevation_expiration = $current_time->add(new DateInterval("P{$interval_amount}")); $_SESSION['elevated'] = $elevation_expiration; /* Remember username? */ if ($hesk_settings['autologin'] && hesk_POST('remember_user') == 'AUTOLOGIN') { $selector = base64_encode(random_bytes(9)); $authenticator = random_bytes(33); hesk_dbQuery("INSERT INTO `".hesk_dbEscape($hesk_settings['db_pfix'])."auth_tokens` (`selector`,`token`,`user_id`,`expires`) VALUES ('".hesk_dbEscape($selector)."','".hesk_dbEscape(hash('sha256', $authenticator))."','".intval($_SESSION['id'])."', NOW() + INTERVAL 1 YEAR)"); hesk_setcookie('hesk_username', ''); hesk_setcookie('hesk_remember', $selector.':'.base64_encode($authenticator), strtotime('+1 year')); } elseif ( hesk_POST('remember_user') == 'JUSTUSER') { hesk_setcookie('hesk_username', $user_row['user'], strtotime('+1 year')); hesk_setcookie('hesk_remember', ''); } else { // Expire cookie if set otherwise hesk_setcookie('hesk_username', ''); hesk_setcookie('hesk_remember', ''); } /* Close any old tickets here so Cron jobs aren't necessary */ if ($hesk_settings['autoclose']) { $revision = sprintf($hesklang['thist3'],hesk_date(),$hesklang['auto']); $dt = date('Y-m-d H:i:s',time() - $hesk_settings['autoclose']*86400); // Notify customer of closed ticket? if ($hesk_settings['notify_closed']) { // Get list of tickets $result = hesk_dbQuery("SELECT * FROM `".$hesk_settings['db_pfix']."tickets` WHERE `status` = '2' AND `lastchange` <= '".hesk_dbEscape($dt)."' "); if (hesk_dbNumRows($result) > 0) { global $ticket; // Load required functions? if ( ! function_exists('hesk_notifyCustomer') ) { require(HESK_PATH . 'inc/email_functions.inc.php'); } while ($ticket = hesk_dbFetchAssoc($result)) { $ticket['dt'] = hesk_date($ticket['dt'], true); $ticket['lastchange'] = hesk_date($ticket['lastchange'], true); $ticket = hesk_ticketToPlain($ticket, 1, 0); hesk_notifyCustomer('ticket_closed'); } } } // Update ticket statuses and history in database hesk_dbQuery("UPDATE `".$hesk_settings['db_pfix']."tickets` SET `status`='3', `closedat`=NOW(), `closedby`='-1', `history`=CONCAT(`history`,'".hesk_dbEscape($revision)."') WHERE `status` = '2' AND `lastchange` <= '".hesk_dbEscape($dt)."' "); } /* Redirect to the destination page */ header('Location: ' . hesk_verifyGoto() ); exit(); } function do_backup_email_verification() { global $hesklang; // Let's limit the "Send another email" to max 3 if (isset($_SESSION['mfa_emails_sent'])) { if ($_SESSION['mfa_emails_sent'] >= 3) { hesk_forceLogout($hesklang['bf_int']); } $_SESSION['mfa_emails_sent']++; } else { $_SESSION['mfa_emails_sent'] = 1; } require_once(HESK_PATH . 'inc/mfa_functions.inc.php'); $verification_code = generate_mfa_code(); hash_and_store_mfa_verification_code($_SESSION['id'], $verification_code); send_mfa_email($_SESSION['name'], $_SESSION['email'], $verification_code); $_SESSION['mfa_verify_option'] = 1; $_SESSION['remember_user_form_val'] = hesk_GET('remember_user'); hesk_process_messages($hesklang['mfa_verification_needed_email'], 'NOREDIRECT', 'INFO'); print_mfa_verification(); exit(); } function print_login() { global $hesk_settings, $hesklang; // Tell header to load reCaptcha API if needed if ($hesk_settings['recaptcha_use']) { define('RECAPTCHA',1); } $hesk_settings['tmp_title'] = $hesk_settings['hesk_title'] . ' - ' .$hesklang['admin_login']; require_once(HESK_PATH . 'inc/header.inc.php'); if ( hesk_isREQUEST('notice') ) { hesk_process_messages($hesklang['session_expired'],'NOREDIRECT'); } if (!isset($_SESSION['a_iserror'])) { $_SESSION['a_iserror'] = array(); } $login_wrapper = true; ?>
    Hesk

    '; $res = hesk_dbQuery('SELECT `user` FROM `'.hesk_dbEscape($hesk_settings['db_pfix']).'users` ORDER BY `user` ASC'); while ($row=hesk_dbFetchAssoc($res)) { $sel = (hesk_mb_strtolower($savedUser) == hesk_mb_strtolower($row['user'])) ? 'selected="selected"' : ''; echo ''; } echo ''; } else { echo ''; } ?>
    >
    '.$hesklang['sec_img'].' '. ' '. '

    '; } ?>
    >
    >
    >
    />
    '; } ?>
    Hesk

    '; } ?>