permanentLogin())))) // str_pad - to hide original key ); } if (count($_POST) == 3 + ($_POST["permanent"] ? 1 : 0)) { // 3 - server, username, password $location = ((string) $_GET["server"] === $_POST["server"] ? remove_from_uri(session_name()) : preg_replace('~^([^?]*).*~', '\\1', ME) . (strlen($_POST["server"]) ? '?server=' . urlencode($_POST["server"]) : '')); if (SID) { $pos = strpos($location, '?'); $location = ($pos ? substr_replace($location, SID . "&", $pos + 1, 0) : "$location?" . SID); } redirect($location); } $_GET["server"] = $_POST["server"]; } elseif ($_POST["logout"]) { $token = $_SESSION["tokens"][$_GET["server"]]; if ($token && $_POST["token"] != $token) { page_header(lang('Logout'), lang('Invalid CSRF token. Send the form again.')); page_footer("db"); exit; } else { foreach (array("usernames", "passwords", "databases", "tokens", "history") as $val) { unset($_SESSION[$val][$_GET["server"]]); } if (!isset($_SESSION["passwords"])) { // don't require login to logout $_SESSION["passwords"] = array(); } cookie("adminer_permanent", ""); redirect(substr(ME, 0, -1), lang('Logout successful.')); } } elseif ($_COOKIE["adminer_permanent"] && !isset($_SESSION["usernames"][$_GET["server"]])) { list($server, $username, $cipher) = array_map('base64_decode', explode(":", $_COOKIE["adminer_permanent"])); if (!strlen($_GET["server"]) || $server == $_GET["server"]) { session_regenerate_id(); // defense against session fixation $_SESSION["usernames"][$server] = $username; $_SESSION["passwords"][$server] = decipher_password($cipher, pack("H*", sha1(str_pad($username, 1) . $adminer->permanentLogin()))); if (!$_POST && $server != $_GET["server"]) { redirect(preg_replace('~^([^?]*).*~', '\\1', ME) . '?server=' . urlencode($server)); } } } /** Cipher password * @param string plain-text password * @param string binary key, should be longer than $password * @return string binary cipher */ function cipher_password($password, $key) { $password2 = strlen($password) . ":" . str_pad($password, 17); $repeat = ceil(strlen($password2) / strlen($key)); return $password2 ^ str_repeat($key, $repeat); } /** Decipher password * @param string binary cipher * @param string binary key * @return string plain-text password */ function decipher_password($cipher, $key) { $repeat = ceil(strlen($cipher) / strlen($key)); $password2 = $cipher ^ str_repeat($key, $repeat); list($length, $password) = explode(":", $password2, 2); return substr($password, 0, $length); } function auth_error($exception = null) { global $connection, $adminer; $session_name = session_name(); $username = $_SESSION["usernames"][$_GET["server"]]; unset($_SESSION["usernames"][$_GET["server"]]); page_header(lang('Login'), (isset($username) ? h($exception ? $exception->getMessage() : (is_string($connection) ? $connection : lang('Invalid credentials.'))) : (!$_COOKIE[$session_name] && $_GET[$session_name] && ini_get("session.use_only_cookies") ? lang('Session support must be enabled.') : (($_COOKIE[$session_name] || $_GET[$session_name]) && !isset($_SESSION["passwords"]) ? lang('Session expired, please login again.') : ""))), null); echo "
\n"; $adminer->loginForm($username); echo "
"; hidden_fields($_POST, array("server", "username", "password")); // expired session echo "
\n"; echo "
\n"; page_footer("auth"); } $username = &$_SESSION["usernames"][$_GET["server"]]; if (!isset($username)) { $username = $_GET["username"]; // default username can be passed in URL } $connection = (isset($username) ? connect() : ''); if (is_string($connection) || !$adminer->login($username, $_SESSION["passwords"][$_GET["server"]])) { auth_error(); exit; } unset($username); if (!$_SESSION["tokens"][$_GET["server"]]) { $_SESSION["tokens"][$_GET["server"]] = rand(1, 1e6); // defense against cross-site request forgery }