代码拉取完成,页面将自动刷新
#!/usr/local/bin/perl
# password_change.cgi
# Actually update a user's password by directly modifying /etc/shadow
BEGIN { push(@INC, "."); };
use WebminCore;
$ENV{'MINISERV_INTERNAL'} || die "Can only be called by miniserv.pl";
&init_config();
&ReadParse();
&get_miniserv_config(\%miniserv);
$miniserv{'passwd_mode'} == 2 || die "Password changing is not enabled!";
# Validate inputs
$in{'new1'} ne '' || &pass_error($text{'password_enew1'});
$in{'new1'} eq $in{'new2'} || &pass_error($text{'password_enew2'});
# Is this a Webmin user?
if (&foreign_check("acl")) {
&foreign_require("acl", "acl-lib.pl");
($wuser) = grep { $_->{'name'} eq $in{'user'} } &acl::list_users();
if ($wuser) {
if ($wuser->{'pass'} eq 'x') {
# A Webmin user, but using Unix authentication
$wuser = undef;
}
elsif ($wuser->{'pass'} eq '*LK*' ||
$wuser->{'pass'} =~ /^\!/) {
&pass_error("Webmin users with locked accounts cannot change ".
"their passwords!");
}
}
}
if (!$in{'pam'} && !$wuser) {
$miniserv{'passwd_cindex'} ne '' && $miniserv{'passwd_mindex'} ne '' ||
die "Missing password file configuration";
}
if ($wuser) {
# Update Webmin user's password
$ok = &acl::validate_password($in{'old'}, $wuser->{'pass'});
$ok || &pass_error($text{'password_euserpass'});
$perr = &acl::check_password_restrictions($in{'user'}, $in{'new1'});
$perr && &pass_error(&text('password_enewpass', $perr));
$wuser->{'pass'} = &acl::encrypt_password($in{'new1'});
$wuser->{'temppass'} = 0;
&acl::modify_user($wuser->{'name'}, $wuser);
&reload_miniserv();
}
elsif ($gconfig{'passwd_cmd'}) {
# Use some configured command
$passwd_cmd = &has_command($gconfig{'passwd_cmd'});
$passwd_cmd || &pass_error("The password change command <tt>$gconfig{'passwd_cmd'}</tt> was not found");
&foreign_require("proc", "proc-lib.pl");
&clean_environment();
$ENV{'REMOTE_USER'} = $in{'user'}; # some programs need this
$passwd_cmd .= " ".quotemeta($in{'user'});
($fh, $fpid) = &proc::pty_process_exec($passwd_cmd, 0, 0);
&reset_environment();
while(1) {
local $rv = &wait_for($fh,
'(new|re-enter).*:',
'(old|current|login).*:',
'pick a password',
'too\s+many\s+failures',
'attributes\s+changed\s+on|successfully\s+changed',
'pick your passwords');
$out .= $wait_for_input;
sleep(1);
if ($rv == 0) {
# Prompt for the new password
syswrite($fh, $in{'new1'}."\n", length($in{'new1'})+1);
}
elsif ($rv == 1) {
# Prompt for the old password
syswrite($fh, $in{'old'}."\n", length($in{'old'})+1);
}
elsif ($rv == 2) {
# Request for a menu option (SCO?)
syswrite($fh, "1\n", 2);
}
elsif ($rv == 3) {
# Failed too many times
last;
}
elsif ($rv == 4) {
# All done
last;
}
elsif ($rv == 5) {
# Request for a menu option (HP/UX)
syswrite($fh, "p\n", 2);
}
else {
last;
}
last if (++$count > 10);
}
$crv = close($fh);
sleep(1);
waitpid($fpid, 1);
if ($? || $count > 10 ||
$out =~ /error|failed/i || $out =~ /bad\s+password/i) {
&pass_error("<tt>".&html_escape($out)."</tt>");
}
}
elsif ($in{'pam'}) {
# Use PAM to make the change..
eval "use Authen::PAM;";
if ($@) {
&pass_error(&text('password_emodpam', $@));
}
# Check if the old password is correct
$service = $miniserv{'pam'} ? $miniserv{'pam'} : "webmin";
$pamh = new Authen::PAM($service, $in{'user'}, \&pam_check_func);
$rv = $pamh->pam_authenticate();
$rv == PAM_SUCCESS() ||
&pass_error($text{'password_euserpass'});
$pamh = undef;
# Change the password with PAM, in a sub-process. This is needed because
# the UID must be changed to properly signal to the PAM libraries that
# the password change is not being done by the root user.
$temp = &transname();
$pid = fork();
@uinfo = getpwnam($in{'user'});
if (!$pid) {
($>, $<) = (0, $uinfo[2]);
$pamh = new Authen::PAM("passwd", $in{'user'}, \&pam_change_func);
$rv = $pamh->pam_chauthtok();
open(TEMP, ">$temp");
print TEMP "$rv\n";
print TEMP ($messages || $pamh->pam_strerror($rv)),"\n";
close(TEMP);
exit(0);
}
waitpid($pid, 0);
open(TEMP, "<$temp");
chop($rv = <TEMP>);
chop($messages = <TEMP>);
close(TEMP);
unlink($temp);
$rv == PAM_SUCCESS || &pass_error(&text('password_epam', $messages));
$pamh = undef;
}
else {
# Directly update password file
# Read shadow file and find user
&lock_file($miniserv{'passwd_file'});
$lref = &read_file_lines($miniserv{'passwd_file'});
for($i=0; $i<@$lref; $i++) {
@line = split(/:/, $lref->[$i], -1);
local $u = $line[$miniserv{'passwd_uindex'}];
if ($u eq $in{'user'}) {
$idx = $i;
last;
}
}
defined($idx) || &pass_error($text{'password_euserpass'});
# Validate old password
&unix_crypt($in{'old'}, $line[$miniserv{'passwd_pindex'}]) eq
$line[$miniserv{'passwd_pindex'}] ||
&pass_error($text{'password_euserpass'});
# Make sure new password meets restrictions
if (&foreign_check("changepass")) {
&foreign_require("changepass", "changepass-lib.pl");
$err = &changepass::check_password($in{'new1'}, $in{'user'});
&pass_error($err) if ($err);
}
elsif (&foreign_check("useradmin")) {
&foreign_require("useradmin", "user-lib.pl");
$err = &useradmin::check_password_restrictions(
$in{'new1'}, $in{'user'});
&pass_error($err) if ($err);
}
# Set new password and save file
$salt = chr(int(rand(26))+65) . chr(int(rand(26))+65);
$line[$miniserv{'passwd_pindex'}] = &unix_crypt($in{'new1'}, $salt);
$days = int(time()/(24*60*60));
$line[$miniserv{'passwd_cindex'}] = $days;
$lref->[$idx] = join(":", @line);
&flush_file_lines();
&unlock_file($miniserv{'passwd_file'});
}
# Change password in Usermin too
if (&get_product_name() eq 'usermin' &&
&foreign_check("changepass")) {
&foreign_require("changepass", "changepass-lib.pl");
&changepass::change_mailbox_passwords(
$in{'user'}, $in{'old'}, $in{'new1'});
&changepass::change_samba_password(
$in{'user'}, $in{'old'}, $in{'new1'});
}
# Show ok page
&header(undef, undef, undef, undef, 1, 1);
print &ui_alert_box(&text('password_done', "/"), "success");
&footer();
sub pass_error
{
&header(undef, undef, undef, undef, 1, 1, undef, undef);
print &ui_alert_box("$text{'password_err'}: @_.", "danger");
&footer();
exit;
}
sub pam_check_func
{
my @res;
while ( @_ ) {
my $code = shift;
my $msg = shift;
my $ans = "";
$ans = $in{'user'} if ($code == PAM_PROMPT_ECHO_ON());
$ans = $in{'old'} if ($code == PAM_PROMPT_ECHO_OFF());
push @res, PAM_SUCCESS();
push @res, $ans;
}
push @res, PAM_SUCCESS();
return @res;
}
sub pam_change_func
{
my @res;
while ( @_ ) {
my $code = shift;
my $msg = shift;
my $ans = "";
$messages = $msg;
if ($code == PAM_PROMPT_ECHO_ON()) {
# Assume asking for username
push @res, PAM_SUCCESS();
push @res, $in{'user'};
}
elsif ($code == PAM_PROMPT_ECHO_OFF()) {
# Assume asking for a password (old first, then new)
push @res, PAM_SUCCESS();
if ($msg =~ /old|current|login/i) {
push @res, $in{'old'};
}
else {
push @res, $in{'new1'};
}
}
else {
# Some message .. ignore it
push @res, PAM_SUCCESS();
push @res, undef;
}
}
push @res, PAM_SUCCESS();
return @res;
}
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。