2022-09-13 13:14:49 +00:00
|
|
|
<?php
|
|
|
|
namespace Misuzu;
|
|
|
|
|
2023-07-22 15:02:41 +00:00
|
|
|
use RuntimeException;
|
2022-09-13 13:14:49 +00:00
|
|
|
use Misuzu\Users\User;
|
|
|
|
|
2023-08-02 22:12:47 +00:00
|
|
|
if($msz->isLoggedIn()) {
|
2022-09-13 13:14:49 +00:00
|
|
|
url_redirect('settings-account');
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2023-08-02 22:12:47 +00:00
|
|
|
$users = $msz->getUsers();
|
|
|
|
$recoveryTokens = $msz->getRecoveryTokens();
|
|
|
|
$loginAttempts = $msz->getLoginAttempts();
|
|
|
|
|
2022-09-13 13:14:49 +00:00
|
|
|
$reset = !empty($_POST['reset']) && is_array($_POST['reset']) ? $_POST['reset'] : [];
|
|
|
|
$forgot = !empty($_POST['forgot']) && is_array($_POST['forgot']) ? $_POST['forgot'] : [];
|
|
|
|
$userId = !empty($reset['user']) ? (int)$reset['user'] : (
|
|
|
|
!empty($_GET['user']) ? (int)$_GET['user'] : 0
|
|
|
|
);
|
|
|
|
|
|
|
|
if($userId > 0)
|
|
|
|
try {
|
2023-08-02 22:12:47 +00:00
|
|
|
$userInfo = $users->getUser((string)$userId, 'id');
|
2023-07-22 15:02:41 +00:00
|
|
|
} catch(RuntimeException $ex) {
|
2022-09-13 13:14:49 +00:00
|
|
|
url_redirect('auth-forgot');
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
$notices = [];
|
2023-01-05 18:33:03 +00:00
|
|
|
$ipAddress = $_SERVER['REMOTE_ADDR'];
|
2023-07-18 21:48:44 +00:00
|
|
|
$siteIsPrivate = $cfg->getBoolean('private.enable');
|
|
|
|
$canResetPassword = $siteIsPrivate ? $cfg->getBoolean('private.allow_password_reset', true) : true;
|
2023-07-22 16:37:57 +00:00
|
|
|
|
|
|
|
$remainingAttempts = $loginAttempts->countRemainingAttempts($ipAddress);
|
2022-09-13 13:14:49 +00:00
|
|
|
|
|
|
|
while($canResetPassword) {
|
|
|
|
if(!empty($reset) && $userId > 0) {
|
|
|
|
if(!CSRF::validateRequest()) {
|
|
|
|
$notices[] = 'Was unable to verify the request, please try again!';
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2023-07-22 21:20:03 +00:00
|
|
|
$verifyCode = !empty($reset['verification']) && is_string($reset['verification']) ? $reset['verification'] : '';
|
2022-09-13 13:14:49 +00:00
|
|
|
|
|
|
|
try {
|
2023-07-22 21:20:03 +00:00
|
|
|
$tokenInfo = $recoveryTokens->getToken(verifyCode: $verifyCode);
|
2023-07-22 15:02:41 +00:00
|
|
|
} catch(RuntimeException $ex) {
|
2022-09-13 13:14:49 +00:00
|
|
|
unset($tokenInfo);
|
|
|
|
}
|
|
|
|
|
2023-07-22 21:20:03 +00:00
|
|
|
if(empty($tokenInfo) || !$tokenInfo->isValid() || $tokenInfo->getUserId() !== (string)$userInfo->getId()) {
|
2022-09-13 13:14:49 +00:00
|
|
|
$notices[] = 'Invalid verification code!';
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
$password = !empty($reset['password']) && is_array($reset['password']) ? $reset['password'] : [];
|
|
|
|
$passwordNew = !empty($password['new']) && is_string($password['new']) ? $password['new'] : '';
|
|
|
|
$passwordConfirm = !empty($password['confirm']) && is_string($password['confirm']) ? $password['confirm'] : '';
|
|
|
|
|
|
|
|
if(empty($passwordNew) || empty($passwordConfirm)
|
|
|
|
|| $passwordNew !== $passwordConfirm) {
|
|
|
|
$notices[] = "Password confirmation failed!";
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2023-08-30 23:41:44 +00:00
|
|
|
$passwordValidation = $users->validatePassword($passwordNew);
|
|
|
|
if($passwordValidation !== '') {
|
|
|
|
$notices[] = $users->validatePasswordText($passwordValidation);
|
2022-09-13 13:14:49 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
// also disables two factor auth to prevent getting locked out of account entirely
|
|
|
|
// this behaviour should really be replaced with recovery keys...
|
2023-08-02 22:12:47 +00:00
|
|
|
$users->updateUser($userInfo, password: $passwordNew, totpKey: '');
|
2022-09-13 13:14:49 +00:00
|
|
|
|
2023-07-17 17:43:17 +00:00
|
|
|
$msz->createAuditLog('PASSWORD_RESET', [], $userInfo);
|
2022-09-13 13:14:49 +00:00
|
|
|
|
2023-07-22 21:20:03 +00:00
|
|
|
$recoveryTokens->invalidateToken($tokenInfo);
|
2022-09-13 13:14:49 +00:00
|
|
|
|
|
|
|
url_redirect('auth-login', ['redirect' => '/']);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!empty($forgot)) {
|
|
|
|
if(!CSRF::validateRequest()) {
|
|
|
|
$notices[] = 'Was unable to verify the request, please try again!';
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(empty($forgot['email']) || !is_string($forgot['email'])) {
|
|
|
|
$notices[] = "You didn't supply an e-mail address.";
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if($remainingAttempts < 1) {
|
|
|
|
$notices[] = "There are too many failed login attempts from your IP address, please try again later.";
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
2023-08-02 22:12:47 +00:00
|
|
|
$forgotUser = $users->getUser($forgot['email'], 'email');
|
2023-07-22 15:02:41 +00:00
|
|
|
} catch(RuntimeException $ex) {
|
2022-09-13 13:14:49 +00:00
|
|
|
unset($forgotUser);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(empty($forgotUser) || $forgotUser->isDeleted()) {
|
|
|
|
$notices[] = "This e-mail address is not registered with us.";
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
2023-07-22 21:20:03 +00:00
|
|
|
$tokenInfo = $recoveryTokens->getToken(userInfo: $forgotUser, remoteAddr: $ipAddress);
|
2023-07-22 15:02:41 +00:00
|
|
|
} catch(RuntimeException $ex) {
|
2023-07-22 21:20:03 +00:00
|
|
|
$tokenInfo = $recoveryTokens->createToken($forgotUser, $ipAddress);
|
2022-09-13 13:14:49 +00:00
|
|
|
|
|
|
|
$recoveryMessage = Mailer::template('password-recovery', [
|
2023-08-02 22:12:47 +00:00
|
|
|
'username' => $forgotUser->getName(),
|
2023-07-22 21:20:03 +00:00
|
|
|
'token' => $tokenInfo->getCode(),
|
2022-09-13 13:14:49 +00:00
|
|
|
]);
|
|
|
|
|
|
|
|
$recoveryMail = Mailer::sendMessage(
|
2023-08-02 22:12:47 +00:00
|
|
|
[$forgotUser->getEMailAddress() => $forgotUser->getName()],
|
2022-09-13 13:14:49 +00:00
|
|
|
$recoveryMessage['subject'], $recoveryMessage['message']
|
|
|
|
);
|
|
|
|
|
|
|
|
if(!$recoveryMail) {
|
|
|
|
$notices[] = "Failed to send reset email, please contact the administrator.";
|
2023-07-22 21:20:03 +00:00
|
|
|
$recoveryTokens->invalidateToken($tokenInfo);
|
2022-09-13 13:14:49 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
url_redirect('auth-reset', ['user' => $forgotUser->getId()]);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
Template::render(isset($userInfo) ? 'auth.password_reset' : 'auth.password_forgot', [
|
|
|
|
'password_notices' => $notices,
|
|
|
|
'password_email' => !empty($forget['email']) && is_string($forget['email']) ? $forget['email'] : '',
|
|
|
|
'password_attempts_remaining' => $remainingAttempts,
|
|
|
|
'password_user' => $userInfo ?? null,
|
2023-07-22 21:20:03 +00:00
|
|
|
'password_verification' => $verifyCode ?? '',
|
2022-09-13 13:14:49 +00:00
|
|
|
]);
|