Skip to content

Commit

Permalink
Add a password login page
Browse files Browse the repository at this point in the history
Start with an exact copy of login_page.php so that changes are reviewable.
  • Loading branch information
vboctor committed Apr 16, 2017
1 parent 6fed9b7 commit 9734b15
Showing 1 changed file with 369 additions and 0 deletions.
369 changes: 369 additions & 0 deletions login_password_page.php
@@ -0,0 +1,369 @@
<?php
# MantisBT - A PHP based bugtracking system

# MantisBT is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 2 of the License, or
# (at your option) any later version.
#
# MantisBT is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with MantisBT. If not, see <http://www.gnu.org/licenses/>.

/**
* Login page POSTs results to login.php
* Check to see if the user is already logged in
*
* @package MantisBT
* @copyright Copyright 2000 - 2002 Kenzaburo Ito - kenito@300baud.org
* @copyright Copyright 2002 MantisBT Team - mantisbt-dev@lists.sourceforge.net
* @link http://www.mantisbt.org
*
* @uses core.php
* @uses authentication_api.php
* @uses config_api.php
* @uses constant_inc.php
* @uses current_user_api.php
* @uses database_api.php
* @uses gpc_api.php
* @uses html_api.php
* @uses lang_api.php
* @uses print_api.php
* @uses string_api.php
* @uses user_api.php
* @uses utility_api.php
*/

require_once( 'core.php' );
require_api( 'authentication_api.php' );
require_api( 'config_api.php' );
require_api( 'constant_inc.php' );
require_api( 'current_user_api.php' );
require_api( 'database_api.php' );
require_api( 'gpc_api.php' );
require_api( 'html_api.php' );
require_api( 'lang_api.php' );
require_api( 'print_api.php' );
require_api( 'string_api.php' );
require_api( 'user_api.php' );
require_api( 'utility_api.php' );
require_css( 'login.css' );

$f_error = gpc_get_bool( 'error' );
$f_cookie_error = gpc_get_bool( 'cookie_error' );
$f_return = string_sanitize_url( gpc_get_string( 'return', '' ) );
$f_username = gpc_get_string( 'username', '' );
$f_reauthenticate = gpc_get_bool( 'reauthenticate', false );
$f_perm_login = gpc_get_bool( 'perm_login', false );
$f_secure_session = gpc_get_bool( 'secure_session', false );
$f_secure_session_cookie = gpc_get_cookie( config_get_global( 'cookie_prefix' ) . '_secure_session', null );

# Set username to blank if invalid to prevent possible XSS exploits
if( !user_is_name_valid( $f_username ) ) {
$f_username = '';
}

if( config_get_global( 'email_login_enabled' ) ) {
$t_username_label = lang_get( 'username_or_email' );
} else {
$t_username_label = lang_get( 'username' );
}

$t_session_validation = !$f_reauthenticate && ( ON == config_get_global( 'session_validation' ) );

$t_show_signup = !$f_reauthenticate &&
( auth_signup_enabled() ) &&
( LDAP != config_get_global( 'login_method' ) ) &&
( ON == config_get( 'enable_email_notification' ) );

$t_show_anonymous_login = !$f_reauthenticate && auth_anonymous_enabled();

$t_show_reset_password = !$f_reauthenticate &&
( LDAP != config_get_global( 'login_method' ) ) &&
( ON == config_get( 'lost_password_feature' ) ) &&
( ON == config_get( 'send_reset_password' ) ) &&
( ON == config_get( 'enable_email_notification' ) );

$t_show_remember_me = !$f_reauthenticate && auth_allow_perm_login();

$t_show_warnings = !$f_reauthenticate;

$t_form_title = $f_reauthenticate ? lang_get( 'reauthenticate_title' ) : lang_get( 'login_title' );

# If user is already authenticated and not anonymous
if( auth_is_user_authenticated() && !current_user_is_anonymous() && !$f_reauthenticate) {
# If return URL is specified redirect to it; otherwise use default page
if( !is_blank( $f_return ) ) {
print_header_redirect( $f_return, false, false, true );
} else {
print_header_redirect( config_get( 'default_home_page' ) );
}
}

# Redirect to plugin login page if applicable.
if( !auth_can_use_standard_login( NO_USER ) ) {
if( auth_login_page() != 'login_page.php' ) {
print_header_redirect( auth_login_page() );
}
}

# Check for automatic logon methods where we want the logon to just be handled by login.php
if( auth_automatic_logon_bypass_form() ) {
$t_uri = 'login.php';

if( auth_anonymous_enabled() ) {
$t_uri = 'login_anon.php';
}

if( !is_blank( $f_return ) ) {
$t_uri .= '?return=' . string_url( $f_return );
}

print_header_redirect( $t_uri );
exit;
}

# Determine if secure_session should default on or off?
# - If no errors, and no cookies set, default to on.
# - If no errors, but cookie is set, use the cookie value.
# - If errors, use the value passed in.
if( $t_session_validation ) {
if( !$f_error && !$f_cookie_error ) {
$t_default_secure_session = ( is_null( $f_secure_session_cookie ) ? true : $f_secure_session_cookie );
} else {
$t_default_secure_session = $f_secure_session;
}
}

# Determine whether the username or password field should receive automatic focus.
$t_username_field_autofocus = 'autofocus';
$t_password_field_autofocus = '';
if( $f_username ) {
$t_username_field_autofocus = '';
$t_password_field_autofocus = 'autofocus';
}

# Login page shouldn't be indexed by search engines
html_robots_noindex();

layout_login_page_begin();

?>

<div class="col-md-offset-3 col-md-6 col-sm-10 col-sm-offset-1">
<div class="login-container">
<div class="space-12 hidden-480"></div>
<a href="<?php echo config_get( 'logo_url' ) ?>">
<h1 class="center white">
<img src="<?php echo helper_mantis_url( config_get( 'logo_image' ) ); ?>">
</h1>
</a>
<div class="space-24 hidden-480"></div>
<?php
if( $f_error || $f_cookie_error || $f_reauthenticate ) {
echo '<div class="alert alert-danger">';

if( $f_reauthenticate ) {
echo '<p>' . lang_get( 'reauthenticate_message' ) . '</p>';
}

# Only echo error message if error variable is set
if( $f_error ) {
echo '<p>' . lang_get( 'login_error' ) . '</p>';
}

if( $f_cookie_error ) {
echo '<p>' . lang_get( 'login_cookies_disabled' ) . '</p>';
}

echo '</div>';
}

$t_warnings = array();
$t_upgrade_required = false;
if( config_get_global( 'admin_checks' ) == ON && file_exists( dirname( __FILE__ ) .'/admin' ) ) {
# Generate a warning if default user administrator/root is valid.
$t_admin_user_id = user_get_id_by_name( 'administrator' );
if( $t_admin_user_id !== false ) {
if( user_is_enabled( $t_admin_user_id ) && auth_does_password_match( $t_admin_user_id, 'root' ) ) {
$t_warnings[] = lang_get( 'warning_default_administrator_account_present' );
}
}

/**
* Display Warnings for enabled debugging / developer settings
* @param string $p_type Message Type.
* @param string $p_setting Setting.
* @param string $p_value Value.
* @return string
*/
function debug_setting_message ( $p_type, $p_setting, $p_value ) {
return sprintf( lang_get( 'warning_change_setting' ), $p_setting, $p_value )
. sprintf( lang_get( 'word_separator' ) )
. sprintf( lang_get( "warning_${p_type}_hazard" ) );
}

$t_config = 'show_detailed_errors';
if( config_get( $t_config ) != OFF ) {
$t_warnings[] = debug_setting_message( 'security', $t_config, 'OFF' );
}
$t_config = 'display_errors';
$t_errors = config_get_global( $t_config );
if( !(
isset( $t_errors[E_ALL] ) && $t_errors[E_ALL] == DISPLAY_ERROR_HALT
|| isset( $t_errors[E_USER_ERROR] ) && $t_errors[E_USER_ERROR] == DISPLAY_ERROR_HALT
)
) {
$t_warnings[] = debug_setting_message(
'integrity',
$t_config . '[E_USER_ERROR]',
DISPLAY_ERROR_HALT );
}

# since admin directory and db_upgrade lists are available check for missing db upgrades
# if db version is 0, we do not have a valid database.
$t_db_version = config_get( 'database_version', 0 );
if( $t_db_version == 0 ) {
$t_warnings[] = lang_get( 'error_database_no_schema_version' );
}

# Check for db upgrade for versions > 1.0.0 using new installer and schema
require_once( 'admin' . DIRECTORY_SEPARATOR . 'schema.php' );
$t_upgrades_reqd = count( $g_upgrade ) - 1;

if( ( 0 < $t_db_version ) &&
( $t_db_version != $t_upgrades_reqd ) ) {

if( $t_db_version < $t_upgrades_reqd ) {
$t_warnings[] = lang_get( 'error_database_version_out_of_date_2' );
$t_upgrade_required = true;
} else {
$t_warnings[] = lang_get( 'error_code_version_out_of_date' );
}
}
}
?>

<div class="position-relative">
<div class="signup-box visible widget-box no-border" id="login-box">
<div class="widget-body">
<div class="widget-main">
<h4 class="header lighter bigger">
<i class="ace-icon fa fa-sign-in"></i>
<?php echo $t_form_title ?>
</h4>
<div class="space-10"></div>
<!-- Login Form BEGIN -->
<form id="login-form" method="post" action="login.php">
<fieldset>

<?php
if( !is_blank( $f_return ) ) {
echo '<input type="hidden" name="return" value="', string_html_specialchars( $f_return ), '" />';
}

if( $t_upgrade_required ) {
echo '<input type="hidden" name="install" value="true" />';
}

# CSRF protection not required here - form does not result in modifications
?>

<label for="username" class="block clearfix">
<span class="block input-icon input-icon-right">
<input id="username" name="username" type="text" placeholder="<?php echo $t_username_label ?>"
size="32" maxlength="<?php echo DB_FIELD_SIZE_USERNAME;?>" value="<?php echo string_attribute( $f_username ); ?>"
class="form-control <?php echo $t_username_field_autofocus ?>">
<i class="ace-icon fa fa-user"></i>
</span>
</label>
<label for="password" class="block clearfix">
<span class="block input-icon input-icon-right">
<input id="password" name="password" type="password" placeholder="<?php echo lang_get( 'password' ) ?>"
size="32" maxlength="<?php echo auth_get_password_max_size(); ?>"
class="form-control <?php echo $t_password_field_autofocus ?>">
<i class="ace-icon fa fa-lock"></i>
</span>
</label>

<?php if( $t_show_remember_me ) { ?>
<div class="clearfix">
<label for="remember-login" class="inline">
<input id="remember-login" type="checkbox" name="perm_login" class="ace" <?php echo ( $f_perm_login ? 'checked="checked" ' : '' ) ?> />
<span class="lbl"> <?php echo lang_get( 'save_login' ) ?></span>
</label>
</div>
<?php } ?>
<?php if( $t_session_validation ) { ?>
<div class="clearfix">
<label for="secure-session" class="inline">
<input id="secure-session" type="checkbox" name="secure_session" class="ace" <?php echo ( $t_default_secure_session ? 'checked="checked" ' : '' ) ?> />
<span class="lbl"> <?php echo lang_get( 'secure_session_long' ) ?></span>
</label>
</div>
<?php } ?>

<?php if( $f_reauthenticate ) {
echo '<input id="reauthenticate" type="hidden" name="reauthenticate" value="1" />';
} ?>

<div class="space-10"></div>

<input type="submit" class="width-40 pull-right btn btn-success btn-inverse bigger-110" value="<?php echo lang_get( 'login_button' ) ?>" />
<div class="clearfix"></div>
<?php
# lost password feature disabled or reset password via email disabled -> stop here!
if( $t_show_reset_password ) {
echo '<a class="pull-right" href="lost_pwd_page.php">', lang_get( 'lost_password_link' ), '</a>';
}
?>
</fieldset>
</form>

<!-- Login Form END -->

<?php
#
# Do some checks to warn administrators of possible security holes.
#

if( $t_show_warnings && count( $t_warnings ) > 0 ) {
echo '<div class="space-10"></div>';
echo '<div class="alert alert-warning">';
foreach( $t_warnings AS $t_warning ) {
echo '<p>' . $t_warning . '</p>';
}
echo '</div>';
}
?>
</div>

<?php
if( $t_show_anonymous_login || $t_show_signup ) {
echo '<div class="toolbar center">';

if( $t_show_anonymous_login ) {
echo '<a class="back-to-login-link pull-right" href="login_anon.php?return=' . string_url( $f_return ) . '">' . lang_get( 'login_anonymously' ) . '</a>';
}

if( $t_show_signup ) {
echo '<a class="back-to-login-link pull-left" href="signup_page.php">', lang_get( 'signup_link' ), '</a>';
}

echo '<div class="clearfix"></div>';
echo '</div>';
}
?>

</div>
</div>
</div>
</div>
</div>

<?php
layout_login_page_end();

0 comments on commit 9734b15

Please sign in to comment.