From 9ab66a5be301e5087e0086bc4740179b18750fd7 Mon Sep 17 00:00:00 2001
From: Marius Burkard <m.burkard@pixcept.de>
Date: Wed, 17 Feb 2016 05:03:00 -0500
Subject: [PATCH] - Added password request activation link (Closes #2933)

---
 interface/web/login/password_reset.php |   62 +++++++++++++++++++++++++++++--
 1 files changed, 58 insertions(+), 4 deletions(-)

diff --git a/interface/web/login/password_reset.php b/interface/web/login/password_reset.php
index a92ff85..dbb545d 100644
--- a/interface/web/login/password_reset.php
+++ b/interface/web/login/password_reset.php
@@ -48,12 +48,11 @@
 $continue = true;
 
 if(isset($_POST['username']) && $_POST['username'] != '' && $_POST['email'] != '' && $_POST['username'] != 'admin') {
-
 	if(!preg_match("/^[\w\.\-\_]{1,64}$/", $_POST['username'])) {
 		$app->tpl->setVar("error", $wb['user_regex_error']);
 		$continue = false;
 	}
-	if(!preg_match("/^\w+[\w.-]*\w+@\w+[\w.-]*\w+\.[a-z]{2,10}$/i", $_POST['email'])) {
+	if(!filter_var($_POST['email'], FILTER_VALIDATE_EMAIL)) {
 		$app->tpl->setVar("error", $wb['email_error']);
 		$continue = false;
 	}
@@ -61,10 +60,65 @@
 	$username = $_POST['username'];
 	$email = $_POST['email'];
 
-	$client = $app->db->queryOneRecord("SELECT client.*, sys_user.lost_password_function FROM client,sys_user WHERE client.username = ? AND client.email = ? AND client.client_id = sys_user.client_id", $username, $email);
+	$client = $app->db->queryOneRecord("SELECT client.*, sys_user.lost_password_function, sys_user.lost_password_hash, IF(sys_user.lost_password_reqtime IS NOT NULL AND DATE_SUB(NOW(), INTERVAL 15 MINUTE) < sys_user.lost_password_reqtime, 1, 0) as `lost_password_wait` FROM client,sys_user WHERE client.username = ? AND client.email = ? AND client.client_id = sys_user.client_id", $username, $email);
 
 	if($client['lost_password_function'] == 0) {
 		$app->tpl->setVar("error", $wb['lost_password_function_disabled_txt']);
+	} elseif($client['lost_password_wait'] == 1) {
+		$app->tpl->setVar("error", $wb['lost_password_function_wait_txt']);
+	} elseif ($continue) {
+		if($client['client_id'] > 0) {
+			$username = $client['username'];
+			$password_hash = sha1(uniqid('ispc_pw'));
+			$app->db->query("UPDATE sys_user SET lost_password_reqtime = NOW(), lost_password_hash = ? WHERE username = ?", $password_hash, $username);
+			$app->tpl->setVar("message", $wb['pw_reset_act']);
+			
+			$server_domain = (isset($_SERVER['SERVER_NAME']) ? $_SERVER['SERVER_NAME'] : $_SERVER['HTTP_HOST']);
+			if($server_domain == '_') {
+				$tmp = explode(':',$_SERVER["HTTP_HOST"]);
+				$server_domain = $tmp[0];
+				unset($tmp);
+			}
+			if(!isset($_SERVER['HTTPS']) || $_SERVER['HTTPS'] != 'on') $server_domain = 'http://' . $server_domain;
+			else $server_domain = 'https://' . $server_domain;
+			
+			if(isset($_SERVER['SERVER_PORT']) && $_SERVER['SERVER_PORT'] != '443') $server_domain .= ':' . $_SERVER['SERVER_PORT'];
+			
+			$app->uses('getconf,ispcmail');
+			$mail_config = $server_config_array['mail'];
+			if($mail_config['smtp_enabled'] == 'y') {
+				$mail_config['use_smtp'] = true;
+				$app->ispcmail->setOptions($mail_config);
+			}
+			$app->ispcmail->setSender($mail_config['admin_mail'], $mail_config['admin_name']);
+			$app->ispcmail->setSubject($wb['pw_reset_act_mail_title']);
+			$app->ispcmail->setMailText($wb['pw_reset_act_mail_msg'].$server_domain . '/login/password_reset.php?username=' . urlencode($username) . '&hash=' . urlencode($password_hash));
+			$app->ispcmail->send(array($client['contact_name'] => $client['email']));
+			$app->ispcmail->finish();
+
+			$app->tpl->setVar("msg", $wb['pw_reset_act']);
+		} else {
+			$app->tpl->setVar("error", $wb['pw_error']);
+		}
+	}
+} elseif(isset($_GET['username']) && $_GET['username'] != '' && $_GET['hash'] != '') {
+
+	if(!preg_match("/^[\w\.\-\_]{1,64}$/", $_GET['username'])) {
+		$app->tpl->setVar("error", $wb['user_regex_error']);
+		$continue = false;
+	}
+	
+	$username = $_GET['username'];
+	$hash = $_GET['hash'];
+
+	$client = $app->db->queryOneRecord("SELECT client.*, sys_user.lost_password_function, sys_user.lost_password_hash, IF(sys_user.lost_password_reqtime IS NULL OR DATE_SUB(NOW(), INTERVAL 1 DAY) > sys_user.lost_password_reqtime, 1, 0) as `lost_password_expired` FROM client,sys_user WHERE client.username = ? AND client.client_id = sys_user.client_id", $username);
+
+	if($client['lost_password_function'] == 0) {
+		$app->tpl->setVar("error", $wb['lost_password_function_disabled_txt']);
+	} elseif($client['lost_password_expired'] == 1) {
+		$app->tpl->setVar("error", $wb['lost_password_function_expired_txt']);
+	} elseif($client['lost_password_hash'] != $hash) {
+		$app->tpl->setVar("error", $wb['lost_password_function_denied_txt']);
 	} elseif ($continue) {
 		if($client['client_id'] > 0) {
 			$server_config_array = $app->getconf->get_global_config();
@@ -75,7 +129,7 @@
 			$new_password_encrypted = $app->auth->crypt_password($new_password);
 
 			$username = $client['username'];
-			$app->db->query("UPDATE sys_user SET passwort = ? WHERE username = ?", $new_password_encrypted, $username);
+			$app->db->query("UPDATE sys_user SET passwort = ?, lost_password_hash = '', lost_password_reqtime = NULL WHERE username = ?", $new_password_encrypted, $username);
 			$app->db->query("UPDATE client SET password = ? WHERE username = ?", $new_password_encrypted, $username);
 			$app->tpl->setVar("message", $wb['pw_reset']);
 

--
Gitblit v1.9.1