Version Description
- Google Authenticator - Two factor Authentication (2FA, OTP) :
- Improved Feedback Prompt
- 2fa enabled by default for all the user roles
Download this release
Release Info
Developer | mayurjogale |
Plugin | Google Authenticator – WordPress Two Factor Authentication (2FA) |
Version | 5.5.80 |
Comparing to | |
See all releases |
Code changes from version 5.5.79 to 5.5.80
- api/class-customer-onprem-setup.php +72 -72
- api/class-customer-setup.php +33 -33
- api/class-rba-attributes.php +183 -183
- api/class-two-factor-setup.php +197 -197
- changelog.txt +734 -734
- controllers/PointersManager.php +53 -53
- controllers/addons.php +4 -4
- controllers/backup/backup.php +1 -1
- controllers/backup/backup_controller.php +1 -1
- controllers/backup/backup_created_report.php +1 -1
- controllers/backup/backup_created_result.php +13 -13
- controllers/backup/backup_schdule.php +21 -21
- controllers/dashboard.php +22 -22
- controllers/licensing.php +49 -49
- controllers/login-spam.php +9 -9
- controllers/main_controller.php +82 -82
- controllers/malware_scanner/scan_malware.php +9 -9
- controllers/malware_scanner/scan_malware_report.php +4 -4
- controllers/malware_scanner/scan_malware_settings.php +47 -47
- controllers/malware_scanner/scan_malware_summary.php +4 -4
- controllers/navbar.php +95 -95
- controllers/newtork_security_features.php +23 -23
- controllers/pointers.php +581 -581
- controllers/registration-security.php +125 -125
- controllers/reports.php +24 -24
- controllers/tour-model.php +334 -334
- controllers/trial.php +88 -88
- controllers/troubleshooting.php +4 -4
- controllers/twofa/mo2fa_inline_registration.php +1551 -1551
- controllers/twofa/two_fa.php +3 -3
- controllers/twofa/two_fa_addon.php +5 -5
- controllers/twofa/two_fa_custom_form.php +8 -8
- controllers/twofa/two_fa_custom_login.php +2 -2
- controllers/twofa/two_fa_login_option.php +1 -1
- controllers/twofa/two_fa_premium_feature.php +2 -2
- controllers/twofa/two_fa_rba.php +2 -2
- controllers/twofa/two_fa_session_control.php +2 -2
- controllers/twofa/two_fa_shortcode.php +2 -2
- controllers/twofa/two_fa_unlimittedUser.php +3 -3
- controllers/twofa/two_fa_video_guide.php +3 -3
- controllers/upgrade.php +4 -4
- controllers/waf.php +48 -48
- database/database_functions_2fa.php +407 -407
- database/mo2f_db_options.php +40 -40
- handler/WAF/database/mo-waf-db-common.php +24 -24
- handler/WAF/database/mo-waf-db.php +248 -248
- handler/WAF/database/mo-waf-plugin-db.php +90 -90
- handler/WAF/mo-waf-plugin.php +211 -211
- handler/WAF/mo-waf.php +206 -206
- handler/backup.php +321 -321
- handler/feedback_form.php +11 -17
- handler/logger.php +38 -38
- handler/login.php +412 -412
- handler/malware_scanner/scanner_set_cron.php +305 -305
- handler/mo-block.html +9 -9
- handler/mo-error.html +10 -10
- handler/realtime_ip_block_free.php +51 -51
- handler/recaptcha.php +161 -161
- handler/registration.php +72 -72
- handler/security_features.php +47 -47
- handler/signature/APLFI.php +4 -4
- handler/signature/APSQLI.php +10 -10
- handler/signature/APXSS.php +6 -6
- handler/twofa/encryption.php +45 -45
- handler/twofa/gaonprem.php +250 -250
- handler/twofa/two_fa_constants.php +0 -377
api/class-customer-onprem-setup.php
CHANGED
@@ -1,73 +1,73 @@
|
|
1 |
-
<?php
|
2 |
-
/** miniOrange enables user to log in through mobile authentication as an additional layer of security over password.
|
3 |
-
* Copyright (C) 2015 miniOrange
|
4 |
-
*
|
5 |
-
* This program is free software: you can redistribute it and/or modify
|
6 |
-
* it under the terms of the GNU General Public License as published by
|
7 |
-
* the Free Software Foundation, either version 3 of the License, or
|
8 |
-
* (at your option) any later version.
|
9 |
-
*
|
10 |
-
* This program is distributed in the hope that it will be useful,
|
11 |
-
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
12 |
-
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
13 |
-
* GNU General Public License for more details.
|
14 |
-
*
|
15 |
-
* You should have received a copy of the GNU General Public License
|
16 |
-
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
17 |
-
* @package miniOrange OAuth
|
18 |
-
* @license http://www.gnu.org/copyleft/gpl.html GNU/GPL, see LICENSE.php
|
19 |
-
*/
|
20 |
-
|
21 |
-
/**
|
22 |
-
* This library is miniOrange Authentication Service.
|
23 |
-
* Contains Request Calls to Customer service.
|
24 |
-
**/
|
25 |
-
|
26 |
-
include_once dirname( __FILE__ ) . DIRECTORY_SEPARATOR.'mo2f_api.php';
|
27 |
-
|
28 |
-
class Customer_Setup extends Customer_Cloud_Setup {
|
29 |
-
|
30 |
-
|
31 |
-
|
32 |
-
function send_otp_token( $uKey, $authType, $cKey, $apiKey, $currentuser=null ) {
|
33 |
-
|
34 |
-
$cloud_methods = array('MOBILE AUTHENTICATION','PUSH NOTIFICATIONS','SMS');
|
35 |
-
if(MO2F_IS_ONPREM and !in_array($authType, $cloud_methods)){
|
36 |
-
include_once dirname(__FILE__).DIRECTORY_SEPARATOR.'Mo2f_OnPremRedirect.php';
|
37 |
-
$mo2fOnPremRedirect = new Mo2f_OnPremRedirect();
|
38 |
-
if(is_null($currentuser) or !isset($currentuser))
|
39 |
-
$currentuser = wp_get_current_user();
|
40 |
-
$content = $mo2fOnPremRedirect->OnpremSendRedirect($uKey,$authType,$currentuser);//change parameters as per your requirement but make sure other methods are not affected.
|
41 |
-
|
42 |
-
}else {
|
43 |
-
|
44 |
-
$content= parent::send_otp_token($uKey, $authType, $cKey, $apiKey, $currentuser=null);
|
45 |
-
|
46 |
-
}
|
47 |
-
|
48 |
-
return $content;
|
49 |
-
}
|
50 |
-
|
51 |
-
|
52 |
-
function validate_otp_token( $authType, $username, $transactionId, $otpToken, $cKey, $customerApiKey, $current_user =null) {
|
53 |
-
$content='';
|
54 |
-
if(MO2F_IS_ONPREM and $authType != 'SOFT TOKEN' and $authType !='OTP Over Email' and $authType != 'SMS' and $authType != 'OTP Over SMS'){
|
55 |
-
include_once dirname(__FILE__).DIRECTORY_SEPARATOR.'Mo2f_OnPremRedirect.php';
|
56 |
-
$mo2fOnPremRedirect = new Mo2f_OnPremRedirect();
|
57 |
-
if(!isset($current_user) or is_null($current_user) )
|
58 |
-
$current_user = wp_get_current_user();
|
59 |
-
$content = $mo2fOnPremRedirect->OnpremValidateRedirect($authType, $otpToken,$current_user );
|
60 |
-
//change parameters as per your requirement but make sure other methods are not affected.
|
61 |
-
|
62 |
-
}else{
|
63 |
-
|
64 |
-
$content= parent::validate_otp_token( $authType, $username, $transactionId, $otpToken, $cKey, $customerApiKey, $current_user =null);
|
65 |
-
|
66 |
-
}
|
67 |
-
return $content;
|
68 |
-
}
|
69 |
-
|
70 |
-
|
71 |
-
}
|
72 |
-
|
73 |
?>
|
1 |
+
<?php
|
2 |
+
/** miniOrange enables user to log in through mobile authentication as an additional layer of security over password.
|
3 |
+
* Copyright (C) 2015 miniOrange
|
4 |
+
*
|
5 |
+
* This program is free software: you can redistribute it and/or modify
|
6 |
+
* it under the terms of the GNU General Public License as published by
|
7 |
+
* the Free Software Foundation, either version 3 of the License, or
|
8 |
+
* (at your option) any later version.
|
9 |
+
*
|
10 |
+
* This program is distributed in the hope that it will be useful,
|
11 |
+
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
12 |
+
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
13 |
+
* GNU General Public License for more details.
|
14 |
+
*
|
15 |
+
* You should have received a copy of the GNU General Public License
|
16 |
+
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
17 |
+
* @package miniOrange OAuth
|
18 |
+
* @license http://www.gnu.org/copyleft/gpl.html GNU/GPL, see LICENSE.php
|
19 |
+
*/
|
20 |
+
|
21 |
+
/**
|
22 |
+
* This library is miniOrange Authentication Service.
|
23 |
+
* Contains Request Calls to Customer service.
|
24 |
+
**/
|
25 |
+
|
26 |
+
include_once dirname( __FILE__ ) . DIRECTORY_SEPARATOR.'mo2f_api.php';
|
27 |
+
|
28 |
+
class Customer_Setup extends Customer_Cloud_Setup {
|
29 |
+
|
30 |
+
|
31 |
+
|
32 |
+
function send_otp_token( $uKey, $authType, $cKey, $apiKey, $currentuser=null ) {
|
33 |
+
|
34 |
+
$cloud_methods = array('MOBILE AUTHENTICATION','PUSH NOTIFICATIONS','SMS');
|
35 |
+
if(MO2F_IS_ONPREM and !in_array($authType, $cloud_methods)){
|
36 |
+
include_once dirname(__FILE__).DIRECTORY_SEPARATOR.'Mo2f_OnPremRedirect.php';
|
37 |
+
$mo2fOnPremRedirect = new Mo2f_OnPremRedirect();
|
38 |
+
if(is_null($currentuser) or !isset($currentuser))
|
39 |
+
$currentuser = wp_get_current_user();
|
40 |
+
$content = $mo2fOnPremRedirect->OnpremSendRedirect($uKey,$authType,$currentuser);//change parameters as per your requirement but make sure other methods are not affected.
|
41 |
+
|
42 |
+
}else {
|
43 |
+
|
44 |
+
$content= parent::send_otp_token($uKey, $authType, $cKey, $apiKey, $currentuser=null);
|
45 |
+
|
46 |
+
}
|
47 |
+
|
48 |
+
return $content;
|
49 |
+
}
|
50 |
+
|
51 |
+
|
52 |
+
function validate_otp_token( $authType, $username, $transactionId, $otpToken, $cKey, $customerApiKey, $current_user =null) {
|
53 |
+
$content='';
|
54 |
+
if(MO2F_IS_ONPREM and $authType != 'SOFT TOKEN' and $authType !='OTP Over Email' and $authType != 'SMS' and $authType != 'OTP Over SMS'){
|
55 |
+
include_once dirname(__FILE__).DIRECTORY_SEPARATOR.'Mo2f_OnPremRedirect.php';
|
56 |
+
$mo2fOnPremRedirect = new Mo2f_OnPremRedirect();
|
57 |
+
if(!isset($current_user) or is_null($current_user) )
|
58 |
+
$current_user = wp_get_current_user();
|
59 |
+
$content = $mo2fOnPremRedirect->OnpremValidateRedirect($authType, $otpToken,$current_user );
|
60 |
+
//change parameters as per your requirement but make sure other methods are not affected.
|
61 |
+
|
62 |
+
}else{
|
63 |
+
|
64 |
+
$content= parent::validate_otp_token( $authType, $username, $transactionId, $otpToken, $cKey, $customerApiKey, $current_user =null);
|
65 |
+
|
66 |
+
}
|
67 |
+
return $content;
|
68 |
+
}
|
69 |
+
|
70 |
+
|
71 |
+
}
|
72 |
+
|
73 |
?>
|
api/class-customer-setup.php
CHANGED
@@ -1,34 +1,34 @@
|
|
1 |
-
<?php
|
2 |
-
/** miniOrange enables user to log in through mobile authentication as an additional layer of security over password.
|
3 |
-
* Copyright (C) 2015 miniOrange
|
4 |
-
*
|
5 |
-
* This program is free software: you can redistribute it and/or modify
|
6 |
-
* it under the terms of the GNU General Public License as published by
|
7 |
-
* the Free Software Foundation, either version 3 of the License, or
|
8 |
-
* (at your option) any later version.
|
9 |
-
*
|
10 |
-
* This program is distributed in the hope that it will be useful,
|
11 |
-
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
12 |
-
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
13 |
-
* GNU General Public License for more details.
|
14 |
-
*
|
15 |
-
* You should have received a copy of the GNU General Public License
|
16 |
-
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
17 |
-
* @package miniOrange OAuth
|
18 |
-
* @license http://www.gnu.org/copyleft/gpl.html GNU/GPL, see LICENSE.php
|
19 |
-
*/
|
20 |
-
|
21 |
-
/**
|
22 |
-
* This library is miniOrange Authentication Service.
|
23 |
-
* Contains Request Calls to Customer service.
|
24 |
-
**/
|
25 |
-
|
26 |
-
include_once dirname( __FILE__ ) . DIRECTORY_SEPARATOR.'mo2f_api.php';
|
27 |
-
|
28 |
-
class Customer_Setup extends Customer_Cloud_Setup {
|
29 |
-
|
30 |
-
//all parent methods
|
31 |
-
}
|
32 |
-
|
33 |
-
|
34 |
?>
|
1 |
+
<?php
|
2 |
+
/** miniOrange enables user to log in through mobile authentication as an additional layer of security over password.
|
3 |
+
* Copyright (C) 2015 miniOrange
|
4 |
+
*
|
5 |
+
* This program is free software: you can redistribute it and/or modify
|
6 |
+
* it under the terms of the GNU General Public License as published by
|
7 |
+
* the Free Software Foundation, either version 3 of the License, or
|
8 |
+
* (at your option) any later version.
|
9 |
+
*
|
10 |
+
* This program is distributed in the hope that it will be useful,
|
11 |
+
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
12 |
+
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
13 |
+
* GNU General Public License for more details.
|
14 |
+
*
|
15 |
+
* You should have received a copy of the GNU General Public License
|
16 |
+
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
17 |
+
* @package miniOrange OAuth
|
18 |
+
* @license http://www.gnu.org/copyleft/gpl.html GNU/GPL, see LICENSE.php
|
19 |
+
*/
|
20 |
+
|
21 |
+
/**
|
22 |
+
* This library is miniOrange Authentication Service.
|
23 |
+
* Contains Request Calls to Customer service.
|
24 |
+
**/
|
25 |
+
|
26 |
+
include_once dirname( __FILE__ ) . DIRECTORY_SEPARATOR.'mo2f_api.php';
|
27 |
+
|
28 |
+
class Customer_Setup extends Customer_Cloud_Setup {
|
29 |
+
|
30 |
+
//all parent methods
|
31 |
+
}
|
32 |
+
|
33 |
+
|
34 |
?>
|
api/class-rba-attributes.php
CHANGED
@@ -1,184 +1,184 @@
|
|
1 |
-
<?php
|
2 |
-
/** miniOrange enables user to log in through mobile authentication as an additional layer of security over password.
|
3 |
-
* Copyright (C) 2015 miniOrange
|
4 |
-
*
|
5 |
-
* This program is free software: you can redistribute it and/or modify
|
6 |
-
* it under the terms of the GNU General Public License as published by
|
7 |
-
* the Free Software Foundation, either version 3 of the License, or
|
8 |
-
* (at your option) any later version.
|
9 |
-
*
|
10 |
-
* This program is distributed in the hope that it will be useful,
|
11 |
-
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
12 |
-
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
13 |
-
* GNU General Public License for more details.
|
14 |
-
*
|
15 |
-
* You should have received a copy of the GNU General Public License
|
16 |
-
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
17 |
-
* @package miniOrange OAuth
|
18 |
-
* @license http://www.gnu.org/copyleft/gpl.html GNU/GPL, see LICENSE.php
|
19 |
-
*/
|
20 |
-
|
21 |
-
/**
|
22 |
-
* This library is miniOrange Authentication Service.
|
23 |
-
* Contains Request Calls to Customer service.
|
24 |
-
**/
|
25 |
-
|
26 |
-
include_once dirname( __FILE__ ) . DIRECTORY_SEPARATOR.'mo2f_api.php';
|
27 |
-
|
28 |
-
class Miniorange_Rba_Attributes {
|
29 |
-
|
30 |
-
private $auth_mode = 2; // miniorange test or not
|
31 |
-
private $https_mode = false; // website http or https
|
32 |
-
|
33 |
-
function mo2f_collect_attributes( $useremail, $rba_attributes ) {
|
34 |
-
|
35 |
-
if ( ! MO2f_Utility::is_curl_installed() ) {
|
36 |
-
return $this->get_curl_error_message();
|
37 |
-
}
|
38 |
-
|
39 |
-
$url = MO_HOST_NAME . '/moas/rest/rba/acs';
|
40 |
-
$customerKey = get_option( 'mo2f_customerKey' );
|
41 |
-
$field_string = "{\"customerKey\":\"" . $customerKey . "\",\"userKey\":\"" . $useremail . "\",\"attributes\":" . $rba_attributes . "}";
|
42 |
-
$mo2fApi= new Mo2f_Api();
|
43 |
-
$http_header_array = $mo2fApi->get_http_header_array();
|
44 |
-
|
45 |
-
return $mo2fApi->make_curl_call( $url, $field_string, $http_header_array );
|
46 |
-
}
|
47 |
-
|
48 |
-
function get_curl_error_message() {
|
49 |
-
$message = mo2f_lt( 'Please enable curl extension.' ) .
|
50 |
-
' <a href="admin.php?page=mo_2fa_troubleshooting">' .
|
51 |
-
mo2f_lt( 'Click here' ) .
|
52 |
-
' </a> ' .
|
53 |
-
mo2f_lt( 'for the steps to enable curl.' );
|
54 |
-
|
55 |
-
return json_encode( array( "status" => 'ERROR', "message" => $message ) );
|
56 |
-
}
|
57 |
-
|
58 |
-
function mo2f_evaluate_risk( $useremail, $sessionUuid ) {
|
59 |
-
|
60 |
-
if ( ! MO2f_Utility::is_curl_installed() ) {
|
61 |
-
return $this->get_curl_error_message();
|
62 |
-
}
|
63 |
-
|
64 |
-
$url = MO_HOST_NAME . '/moas/rest/rba/evaluate-risk';
|
65 |
-
$customerKey = get_option( 'mo2f_customerKey' );
|
66 |
-
$field_string = array(
|
67 |
-
'customerKey' => $customerKey,
|
68 |
-
'appSecret' => get_option( 'mo2f_app_secret' ),
|
69 |
-
'userKey' => $useremail,
|
70 |
-
'sessionUuid' => $sessionUuid
|
71 |
-
);
|
72 |
-
$mo2fApi= new Mo2f_Api();
|
73 |
-
|
74 |
-
$http_header_array = $mo2fApi->get_http_header_array();
|
75 |
-
|
76 |
-
return $mo2fApi->make_curl_call( $url, $field_string, $http_header_array );
|
77 |
-
}
|
78 |
-
|
79 |
-
function mo2f_register_rba_profile( $useremail, $sessionUuid ) {
|
80 |
-
|
81 |
-
if ( ! MO2f_Utility::is_curl_installed() ) {
|
82 |
-
return $this->get_curl_error_message();
|
83 |
-
}
|
84 |
-
|
85 |
-
$url = MO_HOST_NAME . '/moas/rest/rba/register-profile';
|
86 |
-
$customerKey = get_option( 'mo2f_customerKey' );
|
87 |
-
$field_string = array(
|
88 |
-
'customerKey' => $customerKey,
|
89 |
-
'userKey' => $useremail,
|
90 |
-
'sessionUuid' => $sessionUuid
|
91 |
-
);
|
92 |
-
$mo2fApi= new Mo2f_Api();
|
93 |
-
$http_header_array = $mo2fApi->get_http_header_array();
|
94 |
-
|
95 |
-
return $mo2fApi->make_curl_call( $url, $field_string, $http_header_array );
|
96 |
-
}
|
97 |
-
|
98 |
-
function mo2f_get_app_secret() {
|
99 |
-
|
100 |
-
if ( ! MO2f_Utility::is_curl_installed() ) {
|
101 |
-
return $this->get_curl_error_message();
|
102 |
-
}
|
103 |
-
|
104 |
-
$mo2fApi= new Mo2f_Api();
|
105 |
-
|
106 |
-
$url = MO_HOST_NAME . '/moas/rest/customer/getapp-secret';
|
107 |
-
$customerKey = get_option( 'mo2f_customerKey' );
|
108 |
-
$field_string = array(
|
109 |
-
'customerId' => $customerKey
|
110 |
-
);
|
111 |
-
|
112 |
-
$http_header_array = $mo2fApi->get_http_header_array();
|
113 |
-
|
114 |
-
return $mo2fApi->make_curl_call( $url, $field_string, $http_header_array );
|
115 |
-
}
|
116 |
-
|
117 |
-
function mo2f_google_auth_service( $useremail, $googleAuthenticatorName="" ) {
|
118 |
-
|
119 |
-
if ( ! MO2f_Utility::is_curl_installed() ) {
|
120 |
-
return $this->get_curl_error_message();
|
121 |
-
}
|
122 |
-
$mo2fApi= new Mo2f_Api();
|
123 |
-
$url = MO_HOST_NAME . '/moas/api/auth/google-auth-secret';
|
124 |
-
$customerKey = get_option( 'mo2f_customerKey' );
|
125 |
-
$field_string = array(
|
126 |
-
'customerKey' => $customerKey,
|
127 |
-
'username' => $useremail,
|
128 |
-
'googleAuthenticatorName' => $googleAuthenticatorName
|
129 |
-
);
|
130 |
-
|
131 |
-
$http_header_array = $mo2fApi->get_http_header_array();
|
132 |
-
|
133 |
-
return $mo2fApi->make_curl_call( $url, $field_string, $http_header_array );
|
134 |
-
}
|
135 |
-
|
136 |
-
function mo2f_validate_google_auth( $useremail, $otptoken, $secret ) {
|
137 |
-
if(MO2F_IS_ONPREM){
|
138 |
-
include_once dirname(dirname( __FILE__ )) . DIRECTORY_SEPARATOR. 'handler'.DIRECTORY_SEPARATOR. 'twofa' . DIRECTORY_SEPARATOR . 'gaonprem.php';
|
139 |
-
$gauth_obj= new Google_auth_onpremise();
|
140 |
-
$session_id_encrypt = isset($_POST['mo2f_session_id']) ? sanitize_text_field($_POST['mo2f_session_id']) : null;
|
141 |
-
if($session_id_encrypt){
|
142 |
-
$secret_ga = MO2f_Utility::mo2f_get_transient($session_id_encrypt, 'secret_ga');
|
143 |
-
}else{
|
144 |
-
$secret_ga = $secret;
|
145 |
-
}
|
146 |
-
$content=$gauth_obj->verifyCode($secret_ga , $otptoken );
|
147 |
-
$value = json_decode($content,true);
|
148 |
-
if($value['status'] == 'SUCCESS'){
|
149 |
-
$user = wp_get_current_user();
|
150 |
-
$user_id = $user->ID;
|
151 |
-
$gauth_obj->mo_GAuth_set_secret($user_id, $secret_ga);
|
152 |
-
update_user_meta($user_id,'mo2f_2FA_method_to_configure','Google Authenticator');
|
153 |
-
update_user_meta( $user_id, 'mo2f_external_app_type', "Google Authenticator" );
|
154 |
-
global $Mo2fdbQueries;//might not need this
|
155 |
-
$Mo2fdbQueries->update_user_details( $user_id, array('mo2f_configured_2FA_method' =>'Google Authenticator') );
|
156 |
-
}
|
157 |
-
}else{
|
158 |
-
if ( ! MO2f_Utility::is_curl_installed() ) {
|
159 |
-
return $this->get_curl_error_message();
|
160 |
-
}
|
161 |
-
|
162 |
-
|
163 |
-
$url = MO_HOST_NAME . '/moas/api/auth/validate-google-auth-secret';
|
164 |
-
$mo2fApi= new Mo2f_Api();
|
165 |
-
|
166 |
-
$customerKey = get_option( 'mo2f_customerKey' );
|
167 |
-
$field_string = array(
|
168 |
-
'customerKey' => $customerKey,
|
169 |
-
'username' => $useremail,
|
170 |
-
'secret' => $secret,
|
171 |
-
'otpToken' => $otptoken,
|
172 |
-
'authenticatorType' => 'GOOGLE AUTHENTICATOR',
|
173 |
-
);
|
174 |
-
|
175 |
-
$http_header_array = $mo2fApi->get_http_header_array();
|
176 |
-
$content = $mo2fApi->make_curl_call( $url, $field_string, $http_header_array );
|
177 |
-
}
|
178 |
-
|
179 |
-
return $content;
|
180 |
-
}
|
181 |
-
|
182 |
-
}
|
183 |
-
|
184 |
?>
|
1 |
+
<?php
|
2 |
+
/** miniOrange enables user to log in through mobile authentication as an additional layer of security over password.
|
3 |
+
* Copyright (C) 2015 miniOrange
|
4 |
+
*
|
5 |
+
* This program is free software: you can redistribute it and/or modify
|
6 |
+
* it under the terms of the GNU General Public License as published by
|
7 |
+
* the Free Software Foundation, either version 3 of the License, or
|
8 |
+
* (at your option) any later version.
|
9 |
+
*
|
10 |
+
* This program is distributed in the hope that it will be useful,
|
11 |
+
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
12 |
+
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
13 |
+
* GNU General Public License for more details.
|
14 |
+
*
|
15 |
+
* You should have received a copy of the GNU General Public License
|
16 |
+
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
17 |
+
* @package miniOrange OAuth
|
18 |
+
* @license http://www.gnu.org/copyleft/gpl.html GNU/GPL, see LICENSE.php
|
19 |
+
*/
|
20 |
+
|
21 |
+
/**
|
22 |
+
* This library is miniOrange Authentication Service.
|
23 |
+
* Contains Request Calls to Customer service.
|
24 |
+
**/
|
25 |
+
|
26 |
+
include_once dirname( __FILE__ ) . DIRECTORY_SEPARATOR.'mo2f_api.php';
|
27 |
+
|
28 |
+
class Miniorange_Rba_Attributes {
|
29 |
+
|
30 |
+
private $auth_mode = 2; // miniorange test or not
|
31 |
+
private $https_mode = false; // website http or https
|
32 |
+
|
33 |
+
function mo2f_collect_attributes( $useremail, $rba_attributes ) {
|
34 |
+
|
35 |
+
if ( ! MO2f_Utility::is_curl_installed() ) {
|
36 |
+
return $this->get_curl_error_message();
|
37 |
+
}
|
38 |
+
|
39 |
+
$url = MO_HOST_NAME . '/moas/rest/rba/acs';
|
40 |
+
$customerKey = get_option( 'mo2f_customerKey' );
|
41 |
+
$field_string = "{\"customerKey\":\"" . $customerKey . "\",\"userKey\":\"" . $useremail . "\",\"attributes\":" . $rba_attributes . "}";
|
42 |
+
$mo2fApi= new Mo2f_Api();
|
43 |
+
$http_header_array = $mo2fApi->get_http_header_array();
|
44 |
+
|
45 |
+
return $mo2fApi->make_curl_call( $url, $field_string, $http_header_array );
|
46 |
+
}
|
47 |
+
|
48 |
+
function get_curl_error_message() {
|
49 |
+
$message = mo2f_lt( 'Please enable curl extension.' ) .
|
50 |
+
' <a href="admin.php?page=mo_2fa_troubleshooting">' .
|
51 |
+
mo2f_lt( 'Click here' ) .
|
52 |
+
' </a> ' .
|
53 |
+
mo2f_lt( 'for the steps to enable curl.' );
|
54 |
+
|
55 |
+
return json_encode( array( "status" => 'ERROR', "message" => $message ) );
|
56 |
+
}
|
57 |
+
|
58 |
+
function mo2f_evaluate_risk( $useremail, $sessionUuid ) {
|
59 |
+
|
60 |
+
if ( ! MO2f_Utility::is_curl_installed() ) {
|
61 |
+
return $this->get_curl_error_message();
|
62 |
+
}
|
63 |
+
|
64 |
+
$url = MO_HOST_NAME . '/moas/rest/rba/evaluate-risk';
|
65 |
+
$customerKey = get_option( 'mo2f_customerKey' );
|
66 |
+
$field_string = array(
|
67 |
+
'customerKey' => $customerKey,
|
68 |
+
'appSecret' => get_option( 'mo2f_app_secret' ),
|
69 |
+
'userKey' => $useremail,
|
70 |
+
'sessionUuid' => $sessionUuid
|
71 |
+
);
|
72 |
+
$mo2fApi= new Mo2f_Api();
|
73 |
+
|
74 |
+
$http_header_array = $mo2fApi->get_http_header_array();
|
75 |
+
|
76 |
+
return $mo2fApi->make_curl_call( $url, $field_string, $http_header_array );
|
77 |
+
}
|
78 |
+
|
79 |
+
function mo2f_register_rba_profile( $useremail, $sessionUuid ) {
|
80 |
+
|
81 |
+
if ( ! MO2f_Utility::is_curl_installed() ) {
|
82 |
+
return $this->get_curl_error_message();
|
83 |
+
}
|
84 |
+
|
85 |
+
$url = MO_HOST_NAME . '/moas/rest/rba/register-profile';
|
86 |
+
$customerKey = get_option( 'mo2f_customerKey' );
|
87 |
+
$field_string = array(
|
88 |
+
'customerKey' => $customerKey,
|
89 |
+
'userKey' => $useremail,
|
90 |
+
'sessionUuid' => $sessionUuid
|
91 |
+
);
|
92 |
+
$mo2fApi= new Mo2f_Api();
|
93 |
+
$http_header_array = $mo2fApi->get_http_header_array();
|
94 |
+
|
95 |
+
return $mo2fApi->make_curl_call( $url, $field_string, $http_header_array );
|
96 |
+
}
|
97 |
+
|
98 |
+
function mo2f_get_app_secret() {
|
99 |
+
|
100 |
+
if ( ! MO2f_Utility::is_curl_installed() ) {
|
101 |
+
return $this->get_curl_error_message();
|
102 |
+
}
|
103 |
+
|
104 |
+
$mo2fApi= new Mo2f_Api();
|
105 |
+
|
106 |
+
$url = MO_HOST_NAME . '/moas/rest/customer/getapp-secret';
|
107 |
+
$customerKey = get_option( 'mo2f_customerKey' );
|
108 |
+
$field_string = array(
|
109 |
+
'customerId' => $customerKey
|
110 |
+
);
|
111 |
+
|
112 |
+
$http_header_array = $mo2fApi->get_http_header_array();
|
113 |
+
|
114 |
+
return $mo2fApi->make_curl_call( $url, $field_string, $http_header_array );
|
115 |
+
}
|
116 |
+
|
117 |
+
function mo2f_google_auth_service( $useremail, $googleAuthenticatorName="" ) {
|
118 |
+
|
119 |
+
if ( ! MO2f_Utility::is_curl_installed() ) {
|
120 |
+
return $this->get_curl_error_message();
|
121 |
+
}
|
122 |
+
$mo2fApi= new Mo2f_Api();
|
123 |
+
$url = MO_HOST_NAME . '/moas/api/auth/google-auth-secret';
|
124 |
+
$customerKey = get_option( 'mo2f_customerKey' );
|
125 |
+
$field_string = array(
|
126 |
+
'customerKey' => $customerKey,
|
127 |
+
'username' => $useremail,
|
128 |
+
'googleAuthenticatorName' => $googleAuthenticatorName
|
129 |
+
);
|
130 |
+
|
131 |
+
$http_header_array = $mo2fApi->get_http_header_array();
|
132 |
+
|
133 |
+
return $mo2fApi->make_curl_call( $url, $field_string, $http_header_array );
|
134 |
+
}
|
135 |
+
|
136 |
+
function mo2f_validate_google_auth( $useremail, $otptoken, $secret ) {
|
137 |
+
if(MO2F_IS_ONPREM){
|
138 |
+
include_once dirname(dirname( __FILE__ )) . DIRECTORY_SEPARATOR. 'handler'.DIRECTORY_SEPARATOR. 'twofa' . DIRECTORY_SEPARATOR . 'gaonprem.php';
|
139 |
+
$gauth_obj= new Google_auth_onpremise();
|
140 |
+
$session_id_encrypt = isset($_POST['mo2f_session_id']) ? sanitize_text_field($_POST['mo2f_session_id']) : null;
|
141 |
+
if($session_id_encrypt){
|
142 |
+
$secret_ga = MO2f_Utility::mo2f_get_transient($session_id_encrypt, 'secret_ga');
|
143 |
+
}else{
|
144 |
+
$secret_ga = $secret;
|
145 |
+
}
|
146 |
+
$content=$gauth_obj->verifyCode($secret_ga , $otptoken );
|
147 |
+
$value = json_decode($content,true);
|
148 |
+
if($value['status'] == 'SUCCESS'){
|
149 |
+
$user = wp_get_current_user();
|
150 |
+
$user_id = $user->ID;
|
151 |
+
$gauth_obj->mo_GAuth_set_secret($user_id, $secret_ga);
|
152 |
+
update_user_meta($user_id,'mo2f_2FA_method_to_configure','Google Authenticator');
|
153 |
+
update_user_meta( $user_id, 'mo2f_external_app_type', "Google Authenticator" );
|
154 |
+
global $Mo2fdbQueries;//might not need this
|
155 |
+
$Mo2fdbQueries->update_user_details( $user_id, array('mo2f_configured_2FA_method' =>'Google Authenticator') );
|
156 |
+
}
|
157 |
+
}else{
|
158 |
+
if ( ! MO2f_Utility::is_curl_installed() ) {
|
159 |
+
return $this->get_curl_error_message();
|
160 |
+
}
|
161 |
+
|
162 |
+
|
163 |
+
$url = MO_HOST_NAME . '/moas/api/auth/validate-google-auth-secret';
|
164 |
+
$mo2fApi= new Mo2f_Api();
|
165 |
+
|
166 |
+
$customerKey = get_option( 'mo2f_customerKey' );
|
167 |
+
$field_string = array(
|
168 |
+
'customerKey' => $customerKey,
|
169 |
+
'username' => $useremail,
|
170 |
+
'secret' => $secret,
|
171 |
+
'otpToken' => $otptoken,
|
172 |
+
'authenticatorType' => 'GOOGLE AUTHENTICATOR',
|
173 |
+
);
|
174 |
+
|
175 |
+
$http_header_array = $mo2fApi->get_http_header_array();
|
176 |
+
$content = $mo2fApi->make_curl_call( $url, $field_string, $http_header_array );
|
177 |
+
}
|
178 |
+
|
179 |
+
return $content;
|
180 |
+
}
|
181 |
+
|
182 |
+
}
|
183 |
+
|
184 |
?>
|
api/class-two-factor-setup.php
CHANGED
@@ -1,197 +1,197 @@
|
|
1 |
-
<?php
|
2 |
-
/** miniOrange enables user to log in through mobile authentication as an additional layer of security over password.
|
3 |
-
* Copyright (C) 2015 miniOrange
|
4 |
-
*
|
5 |
-
* This program is free software: you can redistribute it and/or modify
|
6 |
-
* it under the terms of the GNU General Public License as published by
|
7 |
-
* the Free Software Foundation, either version 3 of the License, or
|
8 |
-
* (at your option) any later version.
|
9 |
-
*
|
10 |
-
* This program is distributed in the hope that it will be useful,
|
11 |
-
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
12 |
-
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
13 |
-
* GNU General Public License for more details.
|
14 |
-
*
|
15 |
-
* You should have received a copy of the GNU General Public License
|
16 |
-
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
17 |
-
* @package miniOrange OAuth
|
18 |
-
* @license http://www.gnu.org/copyleft/gpl.html GNU/GPL, see LICENSE.php
|
19 |
-
*/
|
20 |
-
|
21 |
-
/**
|
22 |
-
* This library is miniOrange Authentication Service.
|
23 |
-
* Contains Request Calls to Customer service.
|
24 |
-
**/
|
25 |
-
|
26 |
-
include_once dirname( __FILE__ ) . DIRECTORY_SEPARATOR.'mo2f_api.php';
|
27 |
-
|
28 |
-
class Two_Factor_Setup {
|
29 |
-
|
30 |
-
public $email;
|
31 |
-
private $auth_mode = 2; // miniorange test or not
|
32 |
-
private $https_mode = false; // website http or https
|
33 |
-
function check_mobile_status( $tId ) {
|
34 |
-
|
35 |
-
if ( ! MO2f_Utility::is_curl_installed() ) {
|
36 |
-
return $this->get_curl_error_message();
|
37 |
-
}
|
38 |
-
|
39 |
-
$url = MO_HOST_NAME . '/moas/api/auth/auth-status';
|
40 |
-
$fields = array(
|
41 |
-
'txId' => $tId
|
42 |
-
);
|
43 |
-
$mo2fApi= new Mo2f_Api();
|
44 |
-
$http_header_array = $mo2fApi->get_http_header_array();
|
45 |
-
|
46 |
-
return $mo2fApi->make_curl_call( $url, $fields, $http_header_array );
|
47 |
-
}
|
48 |
-
|
49 |
-
|
50 |
-
function get_curl_error_message() {
|
51 |
-
$message = mo2f_lt( 'Please enable curl extension.' ) .
|
52 |
-
' <a href="admin.php?page=mo_2fa_troubleshooting">' .
|
53 |
-
mo2f_lt( 'Click here' ) .
|
54 |
-
' </a> ' .
|
55 |
-
mo2f_lt( 'for the steps to enable curl.' );
|
56 |
-
|
57 |
-
return json_encode( array( "status" => 'ERROR', "message" => $message ) );
|
58 |
-
}
|
59 |
-
|
60 |
-
function register_mobile( $useremail ) {
|
61 |
-
|
62 |
-
if ( ! MO2f_Utility::is_curl_installed() ) {
|
63 |
-
return $this->get_curl_error_message();
|
64 |
-
}
|
65 |
-
|
66 |
-
$url = MO_HOST_NAME . '/moas/api/auth/register-mobile';
|
67 |
-
$customerKey = get_option( 'mo2f_customerKey' );
|
68 |
-
$fields = array(
|
69 |
-
'customerId' => $customerKey,
|
70 |
-
'username' => $useremail
|
71 |
-
);
|
72 |
-
$mo2fApi= new Mo2f_Api();
|
73 |
-
|
74 |
-
$http_header_array = $mo2fApi->get_http_header_array();
|
75 |
-
|
76 |
-
return $mo2fApi->make_curl_call( $url, $fields, $http_header_array );
|
77 |
-
}
|
78 |
-
|
79 |
-
function mo_check_user_already_exist( $email ) {
|
80 |
-
|
81 |
-
if ( ! MO2f_Utility::is_curl_installed() ) {
|
82 |
-
return $this->get_curl_error_message();
|
83 |
-
}
|
84 |
-
|
85 |
-
$url = MO_HOST_NAME . '/moas/api/admin/users/search';
|
86 |
-
$customerKey = get_option( 'mo2f_customerKey' );
|
87 |
-
$fields = array(
|
88 |
-
'customerKey' => $customerKey,
|
89 |
-
'username' => $email,
|
90 |
-
);
|
91 |
-
$mo2fApi= new Mo2f_Api();
|
92 |
-
$http_header_array = $mo2fApi->get_http_header_array();
|
93 |
-
|
94 |
-
return $mo2fApi->make_curl_call( $url, $fields, $http_header_array );
|
95 |
-
}
|
96 |
-
|
97 |
-
function mo_create_user( $currentuser, $email ) {
|
98 |
-
|
99 |
-
if ( ! MO2f_Utility::is_curl_installed() ) {
|
100 |
-
return $this->get_curl_error_message();
|
101 |
-
}
|
102 |
-
|
103 |
-
$url = MO_HOST_NAME . '/moas/api/admin/users/create';
|
104 |
-
$customerKey = get_option( 'mo2f_customerKey' );
|
105 |
-
$fields = array(
|
106 |
-
'customerKey' => $customerKey,
|
107 |
-
'username' => $email,
|
108 |
-
'firstName' => $currentuser->user_firstname,
|
109 |
-
'lastName' => $currentuser->user_lastname
|
110 |
-
);
|
111 |
-
$mo2fApi= new Mo2f_Api();
|
112 |
-
$http_header_array = $mo2fApi->get_http_header_array();
|
113 |
-
|
114 |
-
return $mo2fApi->make_curl_call( $url, $fields, $http_header_array );
|
115 |
-
}
|
116 |
-
|
117 |
-
function mo2f_get_userinfo( $email ) {
|
118 |
-
|
119 |
-
if ( ! MO2f_Utility::is_curl_installed() ) {
|
120 |
-
return $this->get_curl_error_message();
|
121 |
-
}
|
122 |
-
|
123 |
-
$url = MO_HOST_NAME . '/moas/api/admin/users/get';
|
124 |
-
$customerKey = get_option( 'mo2f_customerKey' );
|
125 |
-
$fields = array(
|
126 |
-
'customerKey' => $customerKey,
|
127 |
-
'username' => $email,
|
128 |
-
);
|
129 |
-
$mo2fApi= new Mo2f_Api();
|
130 |
-
$http_header_array = $mo2fApi->get_http_header_array();
|
131 |
-
|
132 |
-
return $mo2fApi->make_curl_call( $url, $fields, $http_header_array );
|
133 |
-
}
|
134 |
-
|
135 |
-
function mo2f_update_userinfo( $email, $authType, $phone, $tname, $enableAdminSecondFactor ) {
|
136 |
-
$cloud_methods = array('MOBILE AUTHENTICATION','PUSH NOTIFICATIONS','SMS', 'SOFT TOKEN');
|
137 |
-
if(MO2F_IS_ONPREM and !in_array($authType, $cloud_methods)){
|
138 |
-
$response=json_encode(array("status"=>'SUCCESS'));
|
139 |
-
}else {
|
140 |
-
|
141 |
-
if ( ! MO2f_Utility::is_curl_installed() ) {
|
142 |
-
return $this->get_curl_error_message();
|
143 |
-
}
|
144 |
-
|
145 |
-
$url = MO_HOST_NAME . '/moas/api/admin/users/update';
|
146 |
-
$customerKey = get_option( 'mo2f_customerKey' );
|
147 |
-
|
148 |
-
|
149 |
-
$fields = array(
|
150 |
-
'customerKey' => $customerKey,
|
151 |
-
'username' => $email,
|
152 |
-
'phone' => $phone,
|
153 |
-
'authType' => $authType,
|
154 |
-
'transactionName' => $tname,
|
155 |
-
'adminLoginSecondFactor' => $enableAdminSecondFactor
|
156 |
-
);
|
157 |
-
|
158 |
-
$mo2fApi = new Mo2f_Api();
|
159 |
-
|
160 |
-
$http_header_array = $mo2fApi->get_http_header_array();
|
161 |
-
|
162 |
-
$response = $mo2fApi->make_curl_call( $url, $fields, $http_header_array );
|
163 |
-
}
|
164 |
-
return $response;
|
165 |
-
}
|
166 |
-
|
167 |
-
function register_kba_details( $email, $question1, $answer1, $question2, $answer2, $question3, $answer3, $user_id=null ) {
|
168 |
-
|
169 |
-
if(MO2F_IS_ONPREM){
|
170 |
-
$answer1 = md5($answer1);
|
171 |
-
$answer2 = md5($answer2);
|
172 |
-
$answer3 = md5($answer3);
|
173 |
-
$question_answer = array($question1 => $answer1 ,$question2 => $answer2 , $question3 => $answer3 );
|
174 |
-
update_user_meta( $user_id , 'mo2f_kba_challenge', $question_answer );
|
175 |
-
global $Mo2fdbQueries;
|
176 |
-
$Mo2fdbQueries->update_user_details( $user_id, array('mo2f_configured_2FA_method' =>'Security Questions') );
|
177 |
-
$response=json_encode(array("status"=>'SUCCESS'));
|
178 |
-
}else {
|
179 |
-
if ( ! MO2f_Utility::is_curl_installed() ) {
|
180 |
-
return $this->get_curl_error_message();
|
181 |
-
}
|
182 |
-
|
183 |
-
$url = MO_HOST_NAME . '/moas/api/auth/register';
|
184 |
-
$customerKey = get_option( 'mo2f_customerKey' );
|
185 |
-
$q_and_a_list = "[{\"question\":\"" . $question1 . "\",\"answer\":\"" . $answer1 . "\" },{\"question\":\"" . $question2 . "\",\"answer\":\"" . $answer2 . "\" },{\"question\":\"" . $question3 . "\",\"answer\":\"" . $answer3 . "\" }]";
|
186 |
-
$field_string = "{\"customerKey\":\"" . $customerKey . "\",\"username\":\"" . $email . "\",\"questionAnswerList\":" . $q_and_a_list . "}";
|
187 |
-
|
188 |
-
$mo2fApi = new Mo2f_Api();
|
189 |
-
$http_header_array = $mo2fApi->get_http_header_array();
|
190 |
-
|
191 |
-
$response= $mo2fApi->make_curl_call( $url, $field_string, $http_header_array );
|
192 |
-
}
|
193 |
-
return $response;
|
194 |
-
|
195 |
-
}
|
196 |
-
}
|
197 |
-
|
1 |
+
<?php
|
2 |
+
/** miniOrange enables user to log in through mobile authentication as an additional layer of security over password.
|
3 |
+
* Copyright (C) 2015 miniOrange
|
4 |
+
*
|
5 |
+
* This program is free software: you can redistribute it and/or modify
|
6 |
+
* it under the terms of the GNU General Public License as published by
|
7 |
+
* the Free Software Foundation, either version 3 of the License, or
|
8 |
+
* (at your option) any later version.
|
9 |
+
*
|
10 |
+
* This program is distributed in the hope that it will be useful,
|
11 |
+
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
12 |
+
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
13 |
+
* GNU General Public License for more details.
|
14 |
+
*
|
15 |
+
* You should have received a copy of the GNU General Public License
|
16 |
+
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
17 |
+
* @package miniOrange OAuth
|
18 |
+
* @license http://www.gnu.org/copyleft/gpl.html GNU/GPL, see LICENSE.php
|
19 |
+
*/
|
20 |
+
|
21 |
+
/**
|
22 |
+
* This library is miniOrange Authentication Service.
|
23 |
+
* Contains Request Calls to Customer service.
|
24 |
+
**/
|
25 |
+
|
26 |
+
include_once dirname( __FILE__ ) . DIRECTORY_SEPARATOR.'mo2f_api.php';
|
27 |
+
|
28 |
+
class Two_Factor_Setup {
|
29 |
+
|
30 |
+
public $email;
|
31 |
+
private $auth_mode = 2; // miniorange test or not
|
32 |
+
private $https_mode = false; // website http or https
|
33 |
+
function check_mobile_status( $tId ) {
|
34 |
+
|
35 |
+
if ( ! MO2f_Utility::is_curl_installed() ) {
|
36 |
+
return $this->get_curl_error_message();
|
37 |
+
}
|
38 |
+
|
39 |
+
$url = MO_HOST_NAME . '/moas/api/auth/auth-status';
|
40 |
+
$fields = array(
|
41 |
+
'txId' => $tId
|
42 |
+
);
|
43 |
+
$mo2fApi= new Mo2f_Api();
|
44 |
+
$http_header_array = $mo2fApi->get_http_header_array();
|
45 |
+
|
46 |
+
return $mo2fApi->make_curl_call( $url, $fields, $http_header_array );
|
47 |
+
}
|
48 |
+
|
49 |
+
|
50 |
+
function get_curl_error_message() {
|
51 |
+
$message = mo2f_lt( 'Please enable curl extension.' ) .
|
52 |
+
' <a href="admin.php?page=mo_2fa_troubleshooting">' .
|
53 |
+
mo2f_lt( 'Click here' ) .
|
54 |
+
' </a> ' .
|
55 |
+
mo2f_lt( 'for the steps to enable curl.' );
|
56 |
+
|
57 |
+
return json_encode( array( "status" => 'ERROR', "message" => $message ) );
|
58 |
+
}
|
59 |
+
|
60 |
+
function register_mobile( $useremail ) {
|
61 |
+
|
62 |
+
if ( ! MO2f_Utility::is_curl_installed() ) {
|
63 |
+
return $this->get_curl_error_message();
|
64 |
+
}
|
65 |
+
|
66 |
+
$url = MO_HOST_NAME . '/moas/api/auth/register-mobile';
|
67 |
+
$customerKey = get_option( 'mo2f_customerKey' );
|
68 |
+
$fields = array(
|
69 |
+
'customerId' => $customerKey,
|
70 |
+
'username' => $useremail
|
71 |
+
);
|
72 |
+
$mo2fApi= new Mo2f_Api();
|
73 |
+
|
74 |
+
$http_header_array = $mo2fApi->get_http_header_array();
|
75 |
+
|
76 |
+
return $mo2fApi->make_curl_call( $url, $fields, $http_header_array );
|
77 |
+
}
|
78 |
+
|
79 |
+
function mo_check_user_already_exist( $email ) {
|
80 |
+
|
81 |
+
if ( ! MO2f_Utility::is_curl_installed() ) {
|
82 |
+
return $this->get_curl_error_message();
|
83 |
+
}
|
84 |
+
|
85 |
+
$url = MO_HOST_NAME . '/moas/api/admin/users/search';
|
86 |
+
$customerKey = get_option( 'mo2f_customerKey' );
|
87 |
+
$fields = array(
|
88 |
+
'customerKey' => $customerKey,
|
89 |
+
'username' => $email,
|
90 |
+
);
|
91 |
+
$mo2fApi= new Mo2f_Api();
|
92 |
+
$http_header_array = $mo2fApi->get_http_header_array();
|
93 |
+
|
94 |
+
return $mo2fApi->make_curl_call( $url, $fields, $http_header_array );
|
95 |
+
}
|
96 |
+
|
97 |
+
function mo_create_user( $currentuser, $email ) {
|
98 |
+
|
99 |
+
if ( ! MO2f_Utility::is_curl_installed() ) {
|
100 |
+
return $this->get_curl_error_message();
|
101 |
+
}
|
102 |
+
|
103 |
+
$url = MO_HOST_NAME . '/moas/api/admin/users/create';
|
104 |
+
$customerKey = get_option( 'mo2f_customerKey' );
|
105 |
+
$fields = array(
|
106 |
+
'customerKey' => $customerKey,
|
107 |
+
'username' => $email,
|
108 |
+
'firstName' => $currentuser->user_firstname,
|
109 |
+
'lastName' => $currentuser->user_lastname
|
110 |
+
);
|
111 |
+
$mo2fApi= new Mo2f_Api();
|
112 |
+
$http_header_array = $mo2fApi->get_http_header_array();
|
113 |
+
|
114 |
+
return $mo2fApi->make_curl_call( $url, $fields, $http_header_array );
|
115 |
+
}
|
116 |
+
|
117 |
+
function mo2f_get_userinfo( $email ) {
|
118 |
+
|
119 |
+
if ( ! MO2f_Utility::is_curl_installed() ) {
|
120 |
+
return $this->get_curl_error_message();
|
121 |
+
}
|
122 |
+
|
123 |
+
$url = MO_HOST_NAME . '/moas/api/admin/users/get';
|
124 |
+
$customerKey = get_option( 'mo2f_customerKey' );
|
125 |
+
$fields = array(
|
126 |
+
'customerKey' => $customerKey,
|
127 |
+
'username' => $email,
|
128 |
+
);
|
129 |
+
$mo2fApi= new Mo2f_Api();
|
130 |
+
$http_header_array = $mo2fApi->get_http_header_array();
|
131 |
+
|
132 |
+
return $mo2fApi->make_curl_call( $url, $fields, $http_header_array );
|
133 |
+
}
|
134 |
+
|
135 |
+
function mo2f_update_userinfo( $email, $authType, $phone, $tname, $enableAdminSecondFactor ) {
|
136 |
+
$cloud_methods = array('MOBILE AUTHENTICATION','PUSH NOTIFICATIONS','SMS', 'SOFT TOKEN');
|
137 |
+
if(MO2F_IS_ONPREM and !in_array($authType, $cloud_methods)){
|
138 |
+
$response=json_encode(array("status"=>'SUCCESS'));
|
139 |
+
}else {
|
140 |
+
|
141 |
+
if ( ! MO2f_Utility::is_curl_installed() ) {
|
142 |
+
return $this->get_curl_error_message();
|
143 |
+
}
|
144 |
+
|
145 |
+
$url = MO_HOST_NAME . '/moas/api/admin/users/update';
|
146 |
+
$customerKey = get_option( 'mo2f_customerKey' );
|
147 |
+
|
148 |
+
|
149 |
+
$fields = array(
|
150 |
+
'customerKey' => $customerKey,
|
151 |
+
'username' => $email,
|
152 |
+
'phone' => $phone,
|
153 |
+
'authType' => $authType,
|
154 |
+
'transactionName' => $tname,
|
155 |
+
'adminLoginSecondFactor' => $enableAdminSecondFactor
|
156 |
+
);
|
157 |
+
|
158 |
+
$mo2fApi = new Mo2f_Api();
|
159 |
+
|
160 |
+
$http_header_array = $mo2fApi->get_http_header_array();
|
161 |
+
|
162 |
+
$response = $mo2fApi->make_curl_call( $url, $fields, $http_header_array );
|
163 |
+
}
|
164 |
+
return $response;
|
165 |
+
}
|
166 |
+
|
167 |
+
function register_kba_details( $email, $question1, $answer1, $question2, $answer2, $question3, $answer3, $user_id=null ) {
|
168 |
+
|
169 |
+
if(MO2F_IS_ONPREM){
|
170 |
+
$answer1 = md5($answer1);
|
171 |
+
$answer2 = md5($answer2);
|
172 |
+
$answer3 = md5($answer3);
|
173 |
+
$question_answer = array($question1 => $answer1 ,$question2 => $answer2 , $question3 => $answer3 );
|
174 |
+
update_user_meta( $user_id , 'mo2f_kba_challenge', $question_answer );
|
175 |
+
global $Mo2fdbQueries;
|
176 |
+
$Mo2fdbQueries->update_user_details( $user_id, array('mo2f_configured_2FA_method' =>'Security Questions') );
|
177 |
+
$response=json_encode(array("status"=>'SUCCESS'));
|
178 |
+
}else {
|
179 |
+
if ( ! MO2f_Utility::is_curl_installed() ) {
|
180 |
+
return $this->get_curl_error_message();
|
181 |
+
}
|
182 |
+
|
183 |
+
$url = MO_HOST_NAME . '/moas/api/auth/register';
|
184 |
+
$customerKey = get_option( 'mo2f_customerKey' );
|
185 |
+
$q_and_a_list = "[{\"question\":\"" . $question1 . "\",\"answer\":\"" . $answer1 . "\" },{\"question\":\"" . $question2 . "\",\"answer\":\"" . $answer2 . "\" },{\"question\":\"" . $question3 . "\",\"answer\":\"" . $answer3 . "\" }]";
|
186 |
+
$field_string = "{\"customerKey\":\"" . $customerKey . "\",\"username\":\"" . $email . "\",\"questionAnswerList\":" . $q_and_a_list . "}";
|
187 |
+
|
188 |
+
$mo2fApi = new Mo2f_Api();
|
189 |
+
$http_header_array = $mo2fApi->get_http_header_array();
|
190 |
+
|
191 |
+
$response= $mo2fApi->make_curl_call( $url, $field_string, $http_header_array );
|
192 |
+
}
|
193 |
+
return $response;
|
194 |
+
|
195 |
+
}
|
196 |
+
}
|
197 |
+
|
changelog.txt
CHANGED
@@ -1,735 +1,735 @@
|
|
1 |
-
=== miniOrange's Google Authenticator - WordPress Two Factor Authentication (2FA , MFA, OTP SMS and Email) | Passwordless login ===
|
2 |
-
|
3 |
-
== Archived Changelog Entries ==
|
4 |
-
|
5 |
-
This file contains older changelog entries, so we can keep the size of the standard WordPress readme.txt file reasonable.
|
6 |
-
For the latest changes, please refer to the "Changelog" section in the [readme.txt file](https://plugins.svn.wordpress.org/miniorange-2-factor-authentication/trunk/readme.txt).
|
7 |
-
|
8 |
-
= 5.5.5 =
|
9 |
-
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
10 |
-
* Compatibility with WordPress v6.0
|
11 |
-
* Added SMS transactions link
|
12 |
-
|
13 |
-
= 5.5.4 =
|
14 |
-
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
15 |
-
* Minor Bug fix
|
16 |
-
|
17 |
-
= 5.5.3 =
|
18 |
-
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
19 |
-
* UI fixes for non-admin users
|
20 |
-
|
21 |
-
= 5.5.2 =
|
22 |
-
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
23 |
-
* Updated Plugin UI
|
24 |
-
|
25 |
-
= 5.5.1 =
|
26 |
-
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
27 |
-
* Updated Pricing page UI
|
28 |
-
|
29 |
-
= 5.5 =
|
30 |
-
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
31 |
-
* Updated Network Security UI
|
32 |
-
|
33 |
-
= 5.4.52 =
|
34 |
-
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
35 |
-
* Updated Trial Request Form
|
36 |
-
|
37 |
-
= 5.4.51 =
|
38 |
-
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
39 |
-
* Trial notification visibility issue fixed
|
40 |
-
|
41 |
-
= 5.4.50 =
|
42 |
-
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
43 |
-
* Bug fix - Headers already sent
|
44 |
-
|
45 |
-
= 5.4.49 =
|
46 |
-
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
47 |
-
* Trial Notification for Premium Plugins
|
48 |
-
* CSRF Fix
|
49 |
-
|
50 |
-
= 5.4.48 =
|
51 |
-
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
52 |
-
* Close button on offer banner
|
53 |
-
|
54 |
-
= 5.4.47 =
|
55 |
-
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
56 |
-
* Christmas offer
|
57 |
-
|
58 |
-
= 5.4.46 =
|
59 |
-
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
60 |
-
* Black friday offer
|
61 |
-
* Get email notification on the plugin's new release
|
62 |
-
|
63 |
-
= 5.4.45 =
|
64 |
-
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
65 |
-
* Added login with the any configured methods
|
66 |
-
* Minor bug fix
|
67 |
-
|
68 |
-
= 5.4.44 =
|
69 |
-
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
70 |
-
* Added link to WordPress forum in support form
|
71 |
-
* Minor bug fix
|
72 |
-
|
73 |
-
= 5.4.43 =
|
74 |
-
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
75 |
-
* Special offer - Special discount for limited time
|
76 |
-
|
77 |
-
= 5.4.42 =
|
78 |
-
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
79 |
-
* Backup Code as a cloud service
|
80 |
-
|
81 |
-
= 5.4.41 =
|
82 |
-
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
83 |
-
* Minor UI Changes and Bug Fixes
|
84 |
-
|
85 |
-
= 5.4.40 =
|
86 |
-
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
87 |
-
* XSS Vulnerability fix
|
88 |
-
* Added video link for miniOrange Authenticator
|
89 |
-
|
90 |
-
= 5.4.39 =
|
91 |
-
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
92 |
-
* Added 2FA setup using user profile option
|
93 |
-
* Support Form UI
|
94 |
-
* 2FA Form support for login with ajax, Elementor Pro, UserPro login forms
|
95 |
-
* Minor bug fixes
|
96 |
-
|
97 |
-
= 5.4.38 =
|
98 |
-
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
99 |
-
* Added 2FA setup using user profile option
|
100 |
-
* Setup Wizard for configuring 2FA
|
101 |
-
* 2FA Form support for login with ajax, Elementor Pro, UserPro login forms
|
102 |
-
* Minor bug fixes
|
103 |
-
|
104 |
-
= 5.4.37 =
|
105 |
-
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
106 |
-
* Minor bug fixes
|
107 |
-
|
108 |
-
= 5.4.36 =
|
109 |
-
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
110 |
-
* Remove extra comma
|
111 |
-
|
112 |
-
= 5.4.35 =
|
113 |
-
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
114 |
-
* Minor bug fixes
|
115 |
-
|
116 |
-
= 5.4.34 =
|
117 |
-
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
118 |
-
* New User Interface for easy setup
|
119 |
-
* Added developers logs
|
120 |
-
* Minor fixes
|
121 |
-
|
122 |
-
= 5.4.33 =
|
123 |
-
* Google Authenticator – Two Factor Authentication (2FA, TFA) :
|
124 |
-
* New pricing page for two factor authentication
|
125 |
-
* Added Duo Authenticator push notification method.
|
126 |
-
* WooCommerce redirect issue fix.
|
127 |
-
|
128 |
-
= 5.4.32 =
|
129 |
-
* Google Authenticator – Two Factor Authentication (2FA, TFA) :
|
130 |
-
* Replaced sessions with transient.
|
131 |
-
|
132 |
-
= 5.4.31 =
|
133 |
-
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
134 |
-
* OTP over Email as two factor fix
|
135 |
-
* Low Email transaction alert fix
|
136 |
-
|
137 |
-
= 5.4.30 =
|
138 |
-
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
139 |
-
* Feedback changes
|
140 |
-
|
141 |
-
= 5.4.29 =
|
142 |
-
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
143 |
-
* Session independent Google Authenticator
|
144 |
-
* Session independent KBA
|
145 |
-
* Feedback improvement for two factor authentication plugin
|
146 |
-
|
147 |
-
= 5.4.28 =
|
148 |
-
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
149 |
-
* New year sale update
|
150 |
-
|
151 |
-
= 5.4.27 =
|
152 |
-
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
153 |
-
* New year sale
|
154 |
-
* WordPress 5.6 compatibility fix
|
155 |
-
* WAF fixes
|
156 |
-
* Real time IP blocking
|
157 |
-
* IP based user login
|
158 |
-
* New feature release notification
|
159 |
-
|
160 |
-
= 5.4.26 =
|
161 |
-
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
162 |
-
* Christmas Offer
|
163 |
-
|
164 |
-
= 5.4.25 =
|
165 |
-
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
166 |
-
* OTP over Telegram Fixes
|
167 |
-
|
168 |
-
= 5.4.24 =
|
169 |
-
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
170 |
-
* OTP over Whatsapp
|
171 |
-
* OTP over Telegram
|
172 |
-
* Feedback form changes
|
173 |
-
|
174 |
-
= 5.4.23 =
|
175 |
-
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
176 |
-
* Call support with technical team
|
177 |
-
* Email and SMS transaction sync
|
178 |
-
* Feedback form on network deactivate
|
179 |
-
* Enable/Disable 2FA fix
|
180 |
-
* 2FA added for super admin role
|
181 |
-
|
182 |
-
= 5.4.22 =
|
183 |
-
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
184 |
-
* Backup Codes
|
185 |
-
* Sanitization and JS improvements
|
186 |
-
* SMS and Email Sync
|
187 |
-
* Whatsapp based Two factor in Premium plugin
|
188 |
-
* Telegram based Two factor in Premium plugin
|
189 |
-
|
190 |
-
= 5.4.21 =
|
191 |
-
* Google Authenticator - Two Factor Authentication (2FA, SMS) :
|
192 |
-
* Sanitization of some input values.
|
193 |
-
|
194 |
-
= 5.4.20 =
|
195 |
-
* Google Authenticator - Two Factor Authentication (2FA, SMS) :
|
196 |
-
* Google Authenticator Qr code fix.
|
197 |
-
* My theme login Login fix.
|
198 |
-
|
199 |
-
= 5.4.19 =
|
200 |
-
* Google Authenticator - Two Factor Authentication (2FA, OTP) : Google Authenticator cloud fix.
|
201 |
-
|
202 |
-
= 5.4.18 =
|
203 |
-
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
204 |
-
* Added missing file
|
205 |
-
|
206 |
-
= 5.4.17 =
|
207 |
-
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
208 |
-
*Digimember Form Support
|
209 |
-
*Memberpress Form Support
|
210 |
-
*SMS Verification Support
|
211 |
-
*OTP Verification on WooCommerce Registration
|
212 |
-
|
213 |
-
= 5.4.16 =
|
214 |
-
* Google Authenticator - Two Factor Authentication (2FA, OTP) : Quick form fix.
|
215 |
-
|
216 |
-
= 5.4.15 =
|
217 |
-
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
218 |
-
* Theme My Login plugin Support
|
219 |
-
* Ultimate Member Registration Support
|
220 |
-
* WooCommerce Registration Support
|
221 |
-
* Ultimate Member Redirect
|
222 |
-
* Restrict Content Pro Login and Registration
|
223 |
-
|
224 |
-
= 5.4.14 =
|
225 |
-
* Google Authenticator - Two Factor Authentication (2FA, MFA) : Performance improvement with fixes in Security Questions. And User Email verification and Phone Verification issues resolved.
|
226 |
-
|
227 |
-
= 5.4.13 =
|
228 |
-
* Google Authenticator - Two Factor Authentication (2FA, TFA) : Support Form Improvement.
|
229 |
-
|
230 |
-
= 5.4.11 =
|
231 |
-
* Google Authenticator - Two Factor Authentication (2FA, MFA) : Feedback Issue fix.
|
232 |
-
|
233 |
-
= 5.4.9 =
|
234 |
-
* Google Authenticator - Two Factor Authentication (2FA, TFA) : User Experience, new support form and Security disabled by default. Added New Methods for users to choose.
|
235 |
-
|
236 |
-
= 5.4.8 =
|
237 |
-
* Google Authenticator - Two Factor Authentication (2FA, OTP Verification) : Learning Management System support, Microsoft Authenticator and Duo Authenticator support and restrict account sharing add-on.
|
238 |
-
|
239 |
-
= 5.4.7 =
|
240 |
-
* Google Authenticator - Two Factor Authentication (2FA, SMS Verification) : Fixing warnings and adding minor changes in the plans.
|
241 |
-
|
242 |
-
= 5.4.6 =
|
243 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Improving Google Authenticator and adding Payment options.
|
244 |
-
|
245 |
-
= 5.4.5 =
|
246 |
-
* Google Authenticator - Two Factor Authentication (2FA, OTP) : Security and MFA UI updates.
|
247 |
-
|
248 |
-
= 5.4.4 =
|
249 |
-
* Google Authenticator - Two Factor Authentication (2FA, TFA) : Two Factor : WooCommerce login page integration.
|
250 |
-
|
251 |
-
= 5.4.3 =
|
252 |
-
* Google Authenticator - Two Factor Authentication (2FA, MFA) : Session issue fix for customers using Two Factor.
|
253 |
-
|
254 |
-
= 5.4.2 =
|
255 |
-
* Google Authenticator - Two Factor Authentication (2FA, MFA) : Warning for cloud customer moving to on-premise Two factor
|
256 |
-
|
257 |
-
= 5.4.1 =
|
258 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Headers sent issue is security firewall.
|
259 |
-
|
260 |
-
= 5.4.0 =
|
261 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Two Factor FAQ Fix and OTP code convenience.
|
262 |
-
|
263 |
-
= 5.3.26 =
|
264 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Two Factor On-premise FAQ update.
|
265 |
-
|
266 |
-
= 5.3.25 =
|
267 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Two Factor On-premise support form.
|
268 |
-
|
269 |
-
= 5.3.24 =
|
270 |
-
* Google Authenticator - Two Factor Authentication (2FA) : On-premise two factor released with multiple user support for some authentication methods.
|
271 |
-
|
272 |
-
= 5.3.23 =
|
273 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Scanner : Timing and caching issue fix.
|
274 |
-
* Disable 2fa on WooCommerce login.
|
275 |
-
* Login with Username only fix.
|
276 |
-
|
277 |
-
= 5.3.22 =
|
278 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Antivirus : Fixing Cache issues and adding nonce.
|
279 |
-
|
280 |
-
= 5.3.21 =
|
281 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Two Factor : Choice between Two factor and Security.
|
282 |
-
|
283 |
-
= 5.3.20 =
|
284 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Anti Malware : Fixing issue faced by users during scan.
|
285 |
-
|
286 |
-
= 5.3.19 =
|
287 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Security : Giving users choice of two factor.
|
288 |
-
|
289 |
-
= 5.3.18 =
|
290 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Antivirus and Firewall : Fix Scan.
|
291 |
-
|
292 |
-
= 5.3.17 =
|
293 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Anti-Virus : Improved Stop Scan.
|
294 |
-
|
295 |
-
= 5.3.16 =
|
296 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Anti-Virus : Stop Scan.
|
297 |
-
|
298 |
-
= 5.3.15 =
|
299 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Anti-Malware : schedule scan.
|
300 |
-
|
301 |
-
= 5.3.14 =
|
302 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Anti-Malware : Adding more signatures.
|
303 |
-
|
304 |
-
= 5.3.13 =
|
305 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Security : fix UI Issue and improving 2fa.
|
306 |
-
|
307 |
-
= 5.3.12 =
|
308 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Security : backup table fix.
|
309 |
-
|
310 |
-
= 5.3.11 =
|
311 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Security : Limiting Firewall, Malware, backup and login security for users not needing it.
|
312 |
-
|
313 |
-
= 5.3.10 =
|
314 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Security : Moved to Old WAF version minor issues..
|
315 |
-
|
316 |
-
= 5.3.9 =
|
317 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Security : Web application Firewall Sql Injections report and monitoring.
|
318 |
-
|
319 |
-
= 5.3.8 =
|
320 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Security : Malware Scanner Fix.
|
321 |
-
|
322 |
-
= 5.3.7 =
|
323 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Security : Two factor login with username fix.
|
324 |
-
|
325 |
-
= 5.3.6 =
|
326 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Anti virus zip file fix.
|
327 |
-
|
328 |
-
= 5.3.5 =
|
329 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Backup URL Fix and space issue in google authenticator.
|
330 |
-
|
331 |
-
= 5.3.4 =
|
332 |
-
* Google Authenticator - Two Factor Authentication (2FA) : CSS fix for Malware Scanner, Security and firewall.
|
333 |
-
|
334 |
-
= 5.3.3 =
|
335 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Minor Malware Scanner issues fix.
|
336 |
-
|
337 |
-
= 5.3.2 =
|
338 |
-
* Google Authenticator - Two Factor Authentication (2FA) : File Changes.
|
339 |
-
|
340 |
-
= 5.3.1 =
|
341 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Bug fix.
|
342 |
-
|
343 |
-
= 5.3.0 =
|
344 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Releasing Firewall with Two Factor.
|
345 |
-
|
346 |
-
= 5.2.6 =
|
347 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Fixed conflict and filter issues.
|
348 |
-
|
349 |
-
= 5.2.5 =
|
350 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Some warnings in remote posts.
|
351 |
-
|
352 |
-
= 5.2.4 =
|
353 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Removed curl calls and unnecessary files.
|
354 |
-
|
355 |
-
= 5.2.3 =
|
356 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Fix for some users facing issues in api calls.
|
357 |
-
|
358 |
-
= 5.2.2 =
|
359 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Adding File Protection and Strong Password feature.
|
360 |
-
:
|
361 |
-
= 5.2.1 =
|
362 |
-
* Google Authenticator - Two Factor Authentication (2FA) : UI changes for description.
|
363 |
-
|
364 |
-
= 5.2.0 =
|
365 |
-
* Google Authenticator - Two Factor Authentication (2FA) : UI changes with more description.
|
366 |
-
|
367 |
-
= 5.1.22 =
|
368 |
-
* Google Authenticator - Two Factor Authentication (2FA) : UI Fixes.
|
369 |
-
|
370 |
-
= 5.1.21 =
|
371 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Login Redirect.
|
372 |
-
|
373 |
-
= 5.1.20 =
|
374 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Minor Bug fix.
|
375 |
-
|
376 |
-
= 5.1.19 =
|
377 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Adding basic Security Features Monitoring, IP blocking and login transaction report.
|
378 |
-
|
379 |
-
= 5.1.18 =
|
380 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Object access error for lower PHP versions.
|
381 |
-
|
382 |
-
= 5.1.17 =
|
383 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Minor Bug fix and Documentation changes.
|
384 |
-
|
385 |
-
= 5.1.16 =
|
386 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Login redirect fix.
|
387 |
-
|
388 |
-
= 5.1.15 =
|
389 |
-
* Google Authenticator - Two Factor Authentication (2FA) : UI Fixes.
|
390 |
-
|
391 |
-
= 5.1.14 =
|
392 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Database Error Fix and Custom Redirect.
|
393 |
-
|
394 |
-
= 5.1.12 =
|
395 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Removing redundant code.
|
396 |
-
|
397 |
-
= 5.1.11 =
|
398 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Password Pattern Fix.
|
399 |
-
|
400 |
-
= 5.1.10 =
|
401 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Javascript Error fixes.
|
402 |
-
|
403 |
-
= 5.1.9 =
|
404 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Added visual tour and security fixes.
|
405 |
-
|
406 |
-
= 5.1.8 =
|
407 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Bug fix for Validation.
|
408 |
-
|
409 |
-
= 5.1.7 =
|
410 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Bug fix for DB error after Update.
|
411 |
-
|
412 |
-
= 5.1.6 =
|
413 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Bug fix for DB error.
|
414 |
-
|
415 |
-
= 5.1.5 =
|
416 |
-
* Google Authenticator - Two Factor Authentication (2FA) : UI changes.
|
417 |
-
|
418 |
-
= 5.1.4 =
|
419 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Bug fixes for redirect to login page issues.
|
420 |
-
|
421 |
-
= 5.1.3 =
|
422 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Minor bug fixes.
|
423 |
-
|
424 |
-
= 5.1.2 =
|
425 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Changes in registration flow.
|
426 |
-
|
427 |
-
= 5.1.1 =
|
428 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Minor changes.
|
429 |
-
|
430 |
-
= 5.1.0 =
|
431 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Added new user plans
|
432 |
-
|
433 |
-
= 5.0.17 =
|
434 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Minor Bug fix.
|
435 |
-
|
436 |
-
= 5.0.16 =
|
437 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Bug fixes.
|
438 |
-
|
439 |
-
= 5.0.15 =
|
440 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Added Google Authenticator option in the WP login page itself.
|
441 |
-
|
442 |
-
= 5.0.14 =
|
443 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Bug Fixes.
|
444 |
-
|
445 |
-
= 5.0.13 =
|
446 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Bug Fix and code optimization.
|
447 |
-
|
448 |
-
= 5.0.12 =
|
449 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Added GDPR Compliance.
|
450 |
-
|
451 |
-
= 5.0.11 =
|
452 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Readme Update.
|
453 |
-
|
454 |
-
= 5.0.10 =
|
455 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Added Proxy Setup feature.
|
456 |
-
|
457 |
-
= 5.0.9 =
|
458 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Bug Fix for "The loopback request to your site failed." error.
|
459 |
-
|
460 |
-
= 5.0.8 =
|
461 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Changes for 2FA Free plugin for 1 user forever.
|
462 |
-
|
463 |
-
= 5.0.7 =
|
464 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Bug Fix for User Registration and other plugin conflicts in Dashboard.
|
465 |
-
|
466 |
-
= 5.0.6 =
|
467 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Bug Fix for existing customers who upgraded from 4.5.x version to versions between 5.0.0 and 5.0.4 and are facing issues with the Account Setup Tab.
|
468 |
-
|
469 |
-
= 5.0.5 =
|
470 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Bug fix for user entry during plugin update.
|
471 |
-
|
472 |
-
= 5.0.4 =
|
473 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Workaround for errors during sending of OTP during registration.
|
474 |
-
|
475 |
-
= 5.0.3 =
|
476 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Minor fix for removing warings.
|
477 |
-
|
478 |
-
= 5.0.2 =
|
479 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Bug fix.
|
480 |
-
|
481 |
-
= 5.0.1 =
|
482 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Bug fix.
|
483 |
-
|
484 |
-
= 5.0.0 =
|
485 |
-
* Google Authenticator - Two Factor Authentication (2FA) : New UI Interface, 2-factor authentication for Unlimited Users.
|
486 |
-
* This is a major release.
|
487 |
-
|
488 |
-
= 4.6.2 =
|
489 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Plugin registration fixes and minor warning fixes.
|
490 |
-
|
491 |
-
= 4.6.1 =
|
492 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Login error fix. Please skip version 4.5.9 and update to version 4.6.1
|
493 |
-
|
494 |
-
= 4.5.9 =
|
495 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Bug fixes for customers who were getting redirected to the login page after the two factor authentication.
|
496 |
-
|
497 |
-
= 4.5.8 =
|
498 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Tested up to 4.9.4 and Removed External links.
|
499 |
-
|
500 |
-
= 4.5.7 =
|
501 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Minor bug fixes.
|
502 |
-
|
503 |
-
= 4.5.6 =
|
504 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Tested up to Wordpress 4.9.
|
505 |
-
|
506 |
-
= 4.5.5 =
|
507 |
-
* Google Authenticator - Two Factor Authentication (2FA) : 404 bug fixes.
|
508 |
-
|
509 |
-
= 4.5.4 =
|
510 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Better UI of Login Pages, Fixed Redirection issue. Fixed the error in the last version (4.5.3) for the customers who were getting undefined action errors.
|
511 |
-
|
512 |
-
= 4.5.3 =
|
513 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Changed UI of the Login Pages, Redirect to Login Page bug fixes.
|
514 |
-
|
515 |
-
= 4.5.2 =
|
516 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Readme Update: Description Update
|
517 |
-
|
518 |
-
= 4.5.1 =
|
519 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Updated the new Google Authenticator App's link and the 'How to Setup Tab' tab.
|
520 |
-
|
521 |
-
= 4.5.0 =
|
522 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Fix Google Authenticator configuration issue.
|
523 |
-
|
524 |
-
= 4.4.9 =
|
525 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Added Alert Message for SMS Transactions only when authentication method is OTP over SMS.
|
526 |
-
|
527 |
-
= 4.4.8 =
|
528 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Added Alert Message for SMS Transactions. Fixed Remember Device flow and confliction with themes. Added support for multiple instances of wordpress.
|
529 |
-
|
530 |
-
= 4.4.7 =
|
531 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Updated the error message for 2 factor configuration.
|
532 |
-
|
533 |
-
= 4.4.6 =
|
534 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Instructions for login in case user get locked out.
|
535 |
-
|
536 |
-
= 4.4.5 =
|
537 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Fixed the issue of session variable on the login with username page.
|
538 |
-
|
539 |
-
= 4.4.4 =
|
540 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Added alert messages for OTP over SMS usages.
|
541 |
-
|
542 |
-
= 4.4.3 =
|
543 |
-
* Google Authenticator - Two Factor Authentication (2FA) : Fixed the login flow for third party Apps that supports XML-RPC.
|
544 |
-
|
545 |
-
= 4.4 =
|
546 |
-
* Google Authenticator - Two Factor Authentication (2FA):
|
547 |
-
* Note: This is a very important update having altogether a new UI and compatibility with Limit Login Attempts. After updating, please do not logout from your admin dashboard. Try to login from another browser and if you face any issue , please contact us at info@xecurify.com
|
548 |
-
* Compatibility with Limit Login Attempts.
|
549 |
-
* New User Interface for login.
|
550 |
-
|
551 |
-
= 4.3.2 =
|
552 |
-
* Google Authenticator - Two Factor Authentication (2FA, MFA): Revised licensing cost for users.
|
553 |
-
|
554 |
-
= 4.3.1 =
|
555 |
-
* Google Authenticator - Two Factor Authentication (2FA, MFA): Compatible upto 4.7
|
556 |
-
|
557 |
-
= 4.3.0 =
|
558 |
-
* Google Authenticator - Two Factor Authentication (2FA, MFA): Updated miniOrange APIs.
|
559 |
-
|
560 |
-
= 4.2.9 =
|
561 |
-
* Google Authenticator - Two Factor Authentication (2FA, MFA): Tested up to WordPress 4.6.
|
562 |
-
|
563 |
-
= 4.2.7 =
|
564 |
-
* Google Authenticator - Two Factor Authentication (2FA, MFA): Session Warning fix in the last version for some of the users.
|
565 |
-
|
566 |
-
= 4.2.6 =
|
567 |
-
* Google Authenticator - Two Factor Authentication (2FA, MFA): Compatible with wordpress caching.
|
568 |
-
|
569 |
-
= 4.2.5 =
|
570 |
-
* Google Authenticator - Two Factor Authentication (2FA, MFA): Improved the session handler.
|
571 |
-
|
572 |
-
= 4.2.4 =
|
573 |
-
* Google Authenticator - Two Factor Authentication (2FA, MFA): Updated faq for limit login attempt type of plugins.
|
574 |
-
|
575 |
-
= 4.2.3 =
|
576 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ):
|
577 |
-
* Improved Error handling during Account Creation.
|
578 |
-
|
579 |
-
= 4.2.2 =
|
580 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ):
|
581 |
-
* Registration Flow fixes
|
582 |
-
|
583 |
-
= 4.2.1 =
|
584 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ):
|
585 |
-
* Change of status during login with phone flow and tested with WP 4.5
|
586 |
-
|
587 |
-
= 4.2.0 =
|
588 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ):
|
589 |
-
* Mark as tested on Wordpress 4.5
|
590 |
-
|
591 |
-
= 4.1.8 =
|
592 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ):
|
593 |
-
* Changed the location of images used for the demo. Now being loaded from the site having SSL certificate.
|
594 |
-
|
595 |
-
= 4.1.7 =
|
596 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ):
|
597 |
-
* Improved Error Handling for Remember Device.
|
598 |
-
|
599 |
-
= 4.1.6 =
|
600 |
-
* Google Authenticator - Two Factor Authentication ( 2 Factor ):
|
601 |
-
* Licensing Plan Updated.
|
602 |
-
|
603 |
-
= 4.1.5 =
|
604 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ):
|
605 |
-
* Added Forgot Password functionality for miniOrange customer admin.
|
606 |
-
* Added warning message for the users who are using lower version of php.
|
607 |
-
* Added functionality to change the customer email.
|
608 |
-
|
609 |
-
= 4.1.4 =
|
610 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ):
|
611 |
-
* Added an option for admin to enable or disable login for XML-RPC supported applications.
|
612 |
-
|
613 |
-
= 4.1.3 =
|
614 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ):
|
615 |
-
* Fixed CSS Conflict with the plugins in the admin dashboard.
|
616 |
-
* More intuitive UI for WooCommerce login.
|
617 |
-
* Tested front-end login with themes like wordpress default theme,
|
618 |
-
customize theme,zerif-lite theme,accesspress store theme,ishop theme and many more.
|
619 |
-
|
620 |
-
= 4.1.2 =
|
621 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ): Google Authenticator for Windows phone
|
622 |
-
* Fixed CSS conflict with front-end of site if WooCommerce is not enabled.
|
623 |
-
|
624 |
-
= 4.1.1 =
|
625 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ): Adding Validation in choosing Security Questions (KBA).
|
626 |
-
|
627 |
-
= 4.1.0 =
|
628 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ): Features added.
|
629 |
-
multisite support
|
630 |
-
Custom login redirection
|
631 |
-
Authy 2-Factor Authentication as separate authentication method
|
632 |
-
|
633 |
-
= 4.0.6 = Google Authenticator - Two Factor Authentication Added multisite support and custom redirection after login feature.
|
634 |
-
|
635 |
-
= 4.0.5 = Google Authenticator - Two Factor Authentication Login into third party apps which support XML-RPC.
|
636 |
-
|
637 |
-
= 4.0.4 = Google Authenticator - Two Factor Authentication Added a check of KBA configuration from mobile login.
|
638 |
-
|
639 |
-
= 4.0.3 = Google Authenticator - Two Factor Authentication Added Support for Authy 2-Factor Authentication App.
|
640 |
-
|
641 |
-
= 4.0.2 = Google Authenticator - Two Factor Authentication Added a check for selection of unique questions during KBA setup .
|
642 |
-
|
643 |
-
= 4.0.1 = Bug Fix Google Authenticator - 2 Factor
|
644 |
-
|
645 |
-
= 4.0 =
|
646 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ): Features added.
|
647 |
-
* KBA as backup method.
|
648 |
-
* mobile browser support.
|
649 |
-
* more intuitive UI for WooCommerce login.
|
650 |
-
|
651 |
-
= 3.8 =
|
652 |
-
* Google Authenticator - Two Factor Authentication ( 2 Factor ): Bug Fix for roles.
|
653 |
-
|
654 |
-
= 3.7 =
|
655 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ): Activation of two factor role wise.
|
656 |
-
|
657 |
-
= 3.6 =
|
658 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ): email verification in inline registration flow for all users.
|
659 |
-
More descriptive setup messages and UI changes.
|
660 |
-
|
661 |
-
= 3.5 =
|
662 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ): Provided mobile login support.
|
663 |
-
|
664 |
-
= 3.4 =
|
665 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ): Features added
|
666 |
-
* Inline registration flow for users.
|
667 |
-
* Security Questions (KBA) as additional method
|
668 |
-
* Alternate way of user identification in customer creation.
|
669 |
-
* premium customizable features.
|
670 |
-
|
671 |
-
= 3.3 =
|
672 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ): Fix the issue of session for some versions of php.
|
673 |
-
|
674 |
-
= 3.2 =
|
675 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ): Fix for device-id compatibility.
|
676 |
-
|
677 |
-
= 3.1 =
|
678 |
-
* Google Authenticator - Two Factor Authentication ( 2 Factor ): Fix for 2FA ShortCode.
|
679 |
-
|
680 |
-
= 3.0 =
|
681 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ): Features added
|
682 |
-
* Google Authenticator.
|
683 |
-
* Device Id (Remember device).
|
684 |
-
* Choice given to admin to enable specific authentication methods for users.
|
685 |
-
* Two Factor support for WooCommerce theme.
|
686 |
-
* Short Code for various customized fronted login.
|
687 |
-
* More intuitive UI and descriptive instructions.
|
688 |
-
|
689 |
-
= 2.6 =
|
690 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ): Fix the compatibility issues of user session with other security plugins.
|
691 |
-
|
692 |
-
= 2.5 =
|
693 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ): Fix the compatibility issues with All In One WP Security & Firewall plugin.
|
694 |
-
|
695 |
-
= 2.4 =
|
696 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ): UI fixes for admin media library dashboard.
|
697 |
-
|
698 |
-
= 2.3 =
|
699 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ): More descriptive setup messages, more intuitive UI.
|
700 |
-
|
701 |
-
= 2.2 =
|
702 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ): Fixed css issues for existing users
|
703 |
-
|
704 |
-
= 2.1 =
|
705 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ): Added support for multiple Two Factor Choices like OTP Over SMS, Phone Call Verification, Push Notification, Soft Token (like Google Authenticator Code), Email Verification, etc.
|
706 |
-
|
707 |
-
= 2.0 =
|
708 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ): Added login with password plus second factor feature.
|
709 |
-
|
710 |
-
= 1.8 =
|
711 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ): Added feature of different login form choice,test authentication and help for configuration and setup.
|
712 |
-
|
713 |
-
= 1.7 =
|
714 |
-
* Bug Fixes Google Authenticator - Two Factor Authentication ( 2FA ): Modifying login screen adaptable to user's login form
|
715 |
-
|
716 |
-
= 1.6 =
|
717 |
-
* Bug Fixes Google Authenticator - Two Factor Authentication ( 2FA ): fetching 2 factor configuration when activating the plugin after deactivating it.
|
718 |
-
|
719 |
-
= 1.5 =
|
720 |
-
* Bug Fixes Google Authenticator - Two Factor Authentication ( 2FA ): Login issues and password save issues resolved
|
721 |
-
|
722 |
-
= 1.4 =
|
723 |
-
* Bug Fixes Google Authenticator - Two Factor Authentication ( 2FA ): Authentication was not working on some version of php.
|
724 |
-
|
725 |
-
= 1.3 =
|
726 |
-
* Google Authenticator - Two Factor Authentication Bug Fixes
|
727 |
-
|
728 |
-
= 1.2 =
|
729 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ): Added 2 factor for all users along with forgot phone functionality.
|
730 |
-
|
731 |
-
= 1.1 =
|
732 |
-
* Google Authenticator - Two Factor Authentication ( 2FA ): Added email ID verification during registration.
|
733 |
-
|
734 |
-
= 1.0.0 =
|
735 |
* First version of Google Authenticator - Two Factor Authentication ( 2FA ) plugin supported with mobile authentication for admins only.
|
1 |
+
=== miniOrange's Google Authenticator - WordPress Two Factor Authentication (2FA , MFA, OTP SMS and Email) | Passwordless login ===
|
2 |
+
|
3 |
+
== Archived Changelog Entries ==
|
4 |
+
|
5 |
+
This file contains older changelog entries, so we can keep the size of the standard WordPress readme.txt file reasonable.
|
6 |
+
For the latest changes, please refer to the "Changelog" section in the [readme.txt file](https://plugins.svn.wordpress.org/miniorange-2-factor-authentication/trunk/readme.txt).
|
7 |
+
|
8 |
+
= 5.5.5 =
|
9 |
+
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
10 |
+
* Compatibility with WordPress v6.0
|
11 |
+
* Added SMS transactions link
|
12 |
+
|
13 |
+
= 5.5.4 =
|
14 |
+
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
15 |
+
* Minor Bug fix
|
16 |
+
|
17 |
+
= 5.5.3 =
|
18 |
+
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
19 |
+
* UI fixes for non-admin users
|
20 |
+
|
21 |
+
= 5.5.2 =
|
22 |
+
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
23 |
+
* Updated Plugin UI
|
24 |
+
|
25 |
+
= 5.5.1 =
|
26 |
+
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
27 |
+
* Updated Pricing page UI
|
28 |
+
|
29 |
+
= 5.5 =
|
30 |
+
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
31 |
+
* Updated Network Security UI
|
32 |
+
|
33 |
+
= 5.4.52 =
|
34 |
+
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
35 |
+
* Updated Trial Request Form
|
36 |
+
|
37 |
+
= 5.4.51 =
|
38 |
+
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
39 |
+
* Trial notification visibility issue fixed
|
40 |
+
|
41 |
+
= 5.4.50 =
|
42 |
+
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
43 |
+
* Bug fix - Headers already sent
|
44 |
+
|
45 |
+
= 5.4.49 =
|
46 |
+
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
47 |
+
* Trial Notification for Premium Plugins
|
48 |
+
* CSRF Fix
|
49 |
+
|
50 |
+
= 5.4.48 =
|
51 |
+
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
52 |
+
* Close button on offer banner
|
53 |
+
|
54 |
+
= 5.4.47 =
|
55 |
+
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
56 |
+
* Christmas offer
|
57 |
+
|
58 |
+
= 5.4.46 =
|
59 |
+
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
60 |
+
* Black friday offer
|
61 |
+
* Get email notification on the plugin's new release
|
62 |
+
|
63 |
+
= 5.4.45 =
|
64 |
+
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
65 |
+
* Added login with the any configured methods
|
66 |
+
* Minor bug fix
|
67 |
+
|
68 |
+
= 5.4.44 =
|
69 |
+
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
70 |
+
* Added link to WordPress forum in support form
|
71 |
+
* Minor bug fix
|
72 |
+
|
73 |
+
= 5.4.43 =
|
74 |
+
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
75 |
+
* Special offer - Special discount for limited time
|
76 |
+
|
77 |
+
= 5.4.42 =
|
78 |
+
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
79 |
+
* Backup Code as a cloud service
|
80 |
+
|
81 |
+
= 5.4.41 =
|
82 |
+
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
83 |
+
* Minor UI Changes and Bug Fixes
|
84 |
+
|
85 |
+
= 5.4.40 =
|
86 |
+
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
87 |
+
* XSS Vulnerability fix
|
88 |
+
* Added video link for miniOrange Authenticator
|
89 |
+
|
90 |
+
= 5.4.39 =
|
91 |
+
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
92 |
+
* Added 2FA setup using user profile option
|
93 |
+
* Support Form UI
|
94 |
+
* 2FA Form support for login with ajax, Elementor Pro, UserPro login forms
|
95 |
+
* Minor bug fixes
|
96 |
+
|
97 |
+
= 5.4.38 =
|
98 |
+
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
99 |
+
* Added 2FA setup using user profile option
|
100 |
+
* Setup Wizard for configuring 2FA
|
101 |
+
* 2FA Form support for login with ajax, Elementor Pro, UserPro login forms
|
102 |
+
* Minor bug fixes
|
103 |
+
|
104 |
+
= 5.4.37 =
|
105 |
+
* Google Authenticator - Two factor Authentication (2FA, OTP) :
|
106 |
+
* Minor bug fixes
|
107 |
+
|
108 |
+
= 5.4.36 =
|
109 |
+
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
110 |
+
* Remove extra comma
|
111 |
+
|
112 |
+
= 5.4.35 =
|
113 |
+
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
114 |
+
* Minor bug fixes
|
115 |
+
|
116 |
+
= 5.4.34 =
|
117 |
+
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
118 |
+
* New User Interface for easy setup
|
119 |
+
* Added developers logs
|
120 |
+
* Minor fixes
|
121 |
+
|
122 |
+
= 5.4.33 =
|
123 |
+
* Google Authenticator – Two Factor Authentication (2FA, TFA) :
|
124 |
+
* New pricing page for two factor authentication
|
125 |
+
* Added Duo Authenticator push notification method.
|
126 |
+
* WooCommerce redirect issue fix.
|
127 |
+
|
128 |
+
= 5.4.32 =
|
129 |
+
* Google Authenticator – Two Factor Authentication (2FA, TFA) :
|
130 |
+
* Replaced sessions with transient.
|
131 |
+
|
132 |
+
= 5.4.31 =
|
133 |
+
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
134 |
+
* OTP over Email as two factor fix
|
135 |
+
* Low Email transaction alert fix
|
136 |
+
|
137 |
+
= 5.4.30 =
|
138 |
+
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
139 |
+
* Feedback changes
|
140 |
+
|
141 |
+
= 5.4.29 =
|
142 |
+
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
143 |
+
* Session independent Google Authenticator
|
144 |
+
* Session independent KBA
|
145 |
+
* Feedback improvement for two factor authentication plugin
|
146 |
+
|
147 |
+
= 5.4.28 =
|
148 |
+
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
149 |
+
* New year sale update
|
150 |
+
|
151 |
+
= 5.4.27 =
|
152 |
+
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
153 |
+
* New year sale
|
154 |
+
* WordPress 5.6 compatibility fix
|
155 |
+
* WAF fixes
|
156 |
+
* Real time IP blocking
|
157 |
+
* IP based user login
|
158 |
+
* New feature release notification
|
159 |
+
|
160 |
+
= 5.4.26 =
|
161 |
+
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
162 |
+
* Christmas Offer
|
163 |
+
|
164 |
+
= 5.4.25 =
|
165 |
+
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
166 |
+
* OTP over Telegram Fixes
|
167 |
+
|
168 |
+
= 5.4.24 =
|
169 |
+
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
170 |
+
* OTP over Whatsapp
|
171 |
+
* OTP over Telegram
|
172 |
+
* Feedback form changes
|
173 |
+
|
174 |
+
= 5.4.23 =
|
175 |
+
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
176 |
+
* Call support with technical team
|
177 |
+
* Email and SMS transaction sync
|
178 |
+
* Feedback form on network deactivate
|
179 |
+
* Enable/Disable 2FA fix
|
180 |
+
* 2FA added for super admin role
|
181 |
+
|
182 |
+
= 5.4.22 =
|
183 |
+
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
184 |
+
* Backup Codes
|
185 |
+
* Sanitization and JS improvements
|
186 |
+
* SMS and Email Sync
|
187 |
+
* Whatsapp based Two factor in Premium plugin
|
188 |
+
* Telegram based Two factor in Premium plugin
|
189 |
+
|
190 |
+
= 5.4.21 =
|
191 |
+
* Google Authenticator - Two Factor Authentication (2FA, SMS) :
|
192 |
+
* Sanitization of some input values.
|
193 |
+
|
194 |
+
= 5.4.20 =
|
195 |
+
* Google Authenticator - Two Factor Authentication (2FA, SMS) :
|
196 |
+
* Google Authenticator Qr code fix.
|
197 |
+
* My theme login Login fix.
|
198 |
+
|
199 |
+
= 5.4.19 =
|
200 |
+
* Google Authenticator - Two Factor Authentication (2FA, OTP) : Google Authenticator cloud fix.
|
201 |
+
|
202 |
+
= 5.4.18 =
|
203 |
+
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
204 |
+
* Added missing file
|
205 |
+
|
206 |
+
= 5.4.17 =
|
207 |
+
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
208 |
+
*Digimember Form Support
|
209 |
+
*Memberpress Form Support
|
210 |
+
*SMS Verification Support
|
211 |
+
*OTP Verification on WooCommerce Registration
|
212 |
+
|
213 |
+
= 5.4.16 =
|
214 |
+
* Google Authenticator - Two Factor Authentication (2FA, OTP) : Quick form fix.
|
215 |
+
|
216 |
+
= 5.4.15 =
|
217 |
+
* Google Authenticator - Two Factor Authentication (2FA, OTP) :
|
218 |
+
* Theme My Login plugin Support
|
219 |
+
* Ultimate Member Registration Support
|
220 |
+
* WooCommerce Registration Support
|
221 |
+
* Ultimate Member Redirect
|
222 |
+
* Restrict Content Pro Login and Registration
|
223 |
+
|
224 |
+
= 5.4.14 =
|
225 |
+
* Google Authenticator - Two Factor Authentication (2FA, MFA) : Performance improvement with fixes in Security Questions. And User Email verification and Phone Verification issues resolved.
|
226 |
+
|
227 |
+
= 5.4.13 =
|
228 |
+
* Google Authenticator - Two Factor Authentication (2FA, TFA) : Support Form Improvement.
|
229 |
+
|
230 |
+
= 5.4.11 =
|
231 |
+
* Google Authenticator - Two Factor Authentication (2FA, MFA) : Feedback Issue fix.
|
232 |
+
|
233 |
+
= 5.4.9 =
|
234 |
+
* Google Authenticator - Two Factor Authentication (2FA, TFA) : User Experience, new support form and Security disabled by default. Added New Methods for users to choose.
|
235 |
+
|
236 |
+
= 5.4.8 =
|
237 |
+
* Google Authenticator - Two Factor Authentication (2FA, OTP Verification) : Learning Management System support, Microsoft Authenticator and Duo Authenticator support and restrict account sharing add-on.
|
238 |
+
|
239 |
+
= 5.4.7 =
|
240 |
+
* Google Authenticator - Two Factor Authentication (2FA, SMS Verification) : Fixing warnings and adding minor changes in the plans.
|
241 |
+
|
242 |
+
= 5.4.6 =
|
243 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Improving Google Authenticator and adding Payment options.
|
244 |
+
|
245 |
+
= 5.4.5 =
|
246 |
+
* Google Authenticator - Two Factor Authentication (2FA, OTP) : Security and MFA UI updates.
|
247 |
+
|
248 |
+
= 5.4.4 =
|
249 |
+
* Google Authenticator - Two Factor Authentication (2FA, TFA) : Two Factor : WooCommerce login page integration.
|
250 |
+
|
251 |
+
= 5.4.3 =
|
252 |
+
* Google Authenticator - Two Factor Authentication (2FA, MFA) : Session issue fix for customers using Two Factor.
|
253 |
+
|
254 |
+
= 5.4.2 =
|
255 |
+
* Google Authenticator - Two Factor Authentication (2FA, MFA) : Warning for cloud customer moving to on-premise Two factor
|
256 |
+
|
257 |
+
= 5.4.1 =
|
258 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Headers sent issue is security firewall.
|
259 |
+
|
260 |
+
= 5.4.0 =
|
261 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Two Factor FAQ Fix and OTP code convenience.
|
262 |
+
|
263 |
+
= 5.3.26 =
|
264 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Two Factor On-premise FAQ update.
|
265 |
+
|
266 |
+
= 5.3.25 =
|
267 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Two Factor On-premise support form.
|
268 |
+
|
269 |
+
= 5.3.24 =
|
270 |
+
* Google Authenticator - Two Factor Authentication (2FA) : On-premise two factor released with multiple user support for some authentication methods.
|
271 |
+
|
272 |
+
= 5.3.23 =
|
273 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Scanner : Timing and caching issue fix.
|
274 |
+
* Disable 2fa on WooCommerce login.
|
275 |
+
* Login with Username only fix.
|
276 |
+
|
277 |
+
= 5.3.22 =
|
278 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Antivirus : Fixing Cache issues and adding nonce.
|
279 |
+
|
280 |
+
= 5.3.21 =
|
281 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Two Factor : Choice between Two factor and Security.
|
282 |
+
|
283 |
+
= 5.3.20 =
|
284 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Anti Malware : Fixing issue faced by users during scan.
|
285 |
+
|
286 |
+
= 5.3.19 =
|
287 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Security : Giving users choice of two factor.
|
288 |
+
|
289 |
+
= 5.3.18 =
|
290 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Antivirus and Firewall : Fix Scan.
|
291 |
+
|
292 |
+
= 5.3.17 =
|
293 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Anti-Virus : Improved Stop Scan.
|
294 |
+
|
295 |
+
= 5.3.16 =
|
296 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Anti-Virus : Stop Scan.
|
297 |
+
|
298 |
+
= 5.3.15 =
|
299 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Anti-Malware : schedule scan.
|
300 |
+
|
301 |
+
= 5.3.14 =
|
302 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Anti-Malware : Adding more signatures.
|
303 |
+
|
304 |
+
= 5.3.13 =
|
305 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Security : fix UI Issue and improving 2fa.
|
306 |
+
|
307 |
+
= 5.3.12 =
|
308 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Security : backup table fix.
|
309 |
+
|
310 |
+
= 5.3.11 =
|
311 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Security : Limiting Firewall, Malware, backup and login security for users not needing it.
|
312 |
+
|
313 |
+
= 5.3.10 =
|
314 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Security : Moved to Old WAF version minor issues..
|
315 |
+
|
316 |
+
= 5.3.9 =
|
317 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Security : Web application Firewall Sql Injections report and monitoring.
|
318 |
+
|
319 |
+
= 5.3.8 =
|
320 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Security : Malware Scanner Fix.
|
321 |
+
|
322 |
+
= 5.3.7 =
|
323 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Security : Two factor login with username fix.
|
324 |
+
|
325 |
+
= 5.3.6 =
|
326 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Anti virus zip file fix.
|
327 |
+
|
328 |
+
= 5.3.5 =
|
329 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Backup URL Fix and space issue in google authenticator.
|
330 |
+
|
331 |
+
= 5.3.4 =
|
332 |
+
* Google Authenticator - Two Factor Authentication (2FA) : CSS fix for Malware Scanner, Security and firewall.
|
333 |
+
|
334 |
+
= 5.3.3 =
|
335 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Minor Malware Scanner issues fix.
|
336 |
+
|
337 |
+
= 5.3.2 =
|
338 |
+
* Google Authenticator - Two Factor Authentication (2FA) : File Changes.
|
339 |
+
|
340 |
+
= 5.3.1 =
|
341 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Bug fix.
|
342 |
+
|
343 |
+
= 5.3.0 =
|
344 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Releasing Firewall with Two Factor.
|
345 |
+
|
346 |
+
= 5.2.6 =
|
347 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Fixed conflict and filter issues.
|
348 |
+
|
349 |
+
= 5.2.5 =
|
350 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Some warnings in remote posts.
|
351 |
+
|
352 |
+
= 5.2.4 =
|
353 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Removed curl calls and unnecessary files.
|
354 |
+
|
355 |
+
= 5.2.3 =
|
356 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Fix for some users facing issues in api calls.
|
357 |
+
|
358 |
+
= 5.2.2 =
|
359 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Adding File Protection and Strong Password feature.
|
360 |
+
:
|
361 |
+
= 5.2.1 =
|
362 |
+
* Google Authenticator - Two Factor Authentication (2FA) : UI changes for description.
|
363 |
+
|
364 |
+
= 5.2.0 =
|
365 |
+
* Google Authenticator - Two Factor Authentication (2FA) : UI changes with more description.
|
366 |
+
|
367 |
+
= 5.1.22 =
|
368 |
+
* Google Authenticator - Two Factor Authentication (2FA) : UI Fixes.
|
369 |
+
|
370 |
+
= 5.1.21 =
|
371 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Login Redirect.
|
372 |
+
|
373 |
+
= 5.1.20 =
|
374 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Minor Bug fix.
|
375 |
+
|
376 |
+
= 5.1.19 =
|
377 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Adding basic Security Features Monitoring, IP blocking and login transaction report.
|
378 |
+
|
379 |
+
= 5.1.18 =
|
380 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Object access error for lower PHP versions.
|
381 |
+
|
382 |
+
= 5.1.17 =
|
383 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Minor Bug fix and Documentation changes.
|
384 |
+
|
385 |
+
= 5.1.16 =
|
386 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Login redirect fix.
|
387 |
+
|
388 |
+
= 5.1.15 =
|
389 |
+
* Google Authenticator - Two Factor Authentication (2FA) : UI Fixes.
|
390 |
+
|
391 |
+
= 5.1.14 =
|
392 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Database Error Fix and Custom Redirect.
|
393 |
+
|
394 |
+
= 5.1.12 =
|
395 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Removing redundant code.
|
396 |
+
|
397 |
+
= 5.1.11 =
|
398 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Password Pattern Fix.
|
399 |
+
|
400 |
+
= 5.1.10 =
|
401 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Javascript Error fixes.
|
402 |
+
|
403 |
+
= 5.1.9 =
|
404 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Added visual tour and security fixes.
|
405 |
+
|
406 |
+
= 5.1.8 =
|
407 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Bug fix for Validation.
|
408 |
+
|
409 |
+
= 5.1.7 =
|
410 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Bug fix for DB error after Update.
|
411 |
+
|
412 |
+
= 5.1.6 =
|
413 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Bug fix for DB error.
|
414 |
+
|
415 |
+
= 5.1.5 =
|
416 |
+
* Google Authenticator - Two Factor Authentication (2FA) : UI changes.
|
417 |
+
|
418 |
+
= 5.1.4 =
|
419 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Bug fixes for redirect to login page issues.
|
420 |
+
|
421 |
+
= 5.1.3 =
|
422 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Minor bug fixes.
|
423 |
+
|
424 |
+
= 5.1.2 =
|
425 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Changes in registration flow.
|
426 |
+
|
427 |
+
= 5.1.1 =
|
428 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Minor changes.
|
429 |
+
|
430 |
+
= 5.1.0 =
|
431 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Added new user plans
|
432 |
+
|
433 |
+
= 5.0.17 =
|
434 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Minor Bug fix.
|
435 |
+
|
436 |
+
= 5.0.16 =
|
437 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Bug fixes.
|
438 |
+
|
439 |
+
= 5.0.15 =
|
440 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Added Google Authenticator option in the WP login page itself.
|
441 |
+
|
442 |
+
= 5.0.14 =
|
443 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Bug Fixes.
|
444 |
+
|
445 |
+
= 5.0.13 =
|
446 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Bug Fix and code optimization.
|
447 |
+
|
448 |
+
= 5.0.12 =
|
449 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Added GDPR Compliance.
|
450 |
+
|
451 |
+
= 5.0.11 =
|
452 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Readme Update.
|
453 |
+
|
454 |
+
= 5.0.10 =
|
455 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Added Proxy Setup feature.
|
456 |
+
|
457 |
+
= 5.0.9 =
|
458 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Bug Fix for "The loopback request to your site failed." error.
|
459 |
+
|
460 |
+
= 5.0.8 =
|
461 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Changes for 2FA Free plugin for 1 user forever.
|
462 |
+
|
463 |
+
= 5.0.7 =
|
464 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Bug Fix for User Registration and other plugin conflicts in Dashboard.
|
465 |
+
|
466 |
+
= 5.0.6 =
|
467 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Bug Fix for existing customers who upgraded from 4.5.x version to versions between 5.0.0 and 5.0.4 and are facing issues with the Account Setup Tab.
|
468 |
+
|
469 |
+
= 5.0.5 =
|
470 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Bug fix for user entry during plugin update.
|
471 |
+
|
472 |
+
= 5.0.4 =
|
473 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Workaround for errors during sending of OTP during registration.
|
474 |
+
|
475 |
+
= 5.0.3 =
|
476 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Minor fix for removing warings.
|
477 |
+
|
478 |
+
= 5.0.2 =
|
479 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Bug fix.
|
480 |
+
|
481 |
+
= 5.0.1 =
|
482 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Bug fix.
|
483 |
+
|
484 |
+
= 5.0.0 =
|
485 |
+
* Google Authenticator - Two Factor Authentication (2FA) : New UI Interface, 2-factor authentication for Unlimited Users.
|
486 |
+
* This is a major release.
|
487 |
+
|
488 |
+
= 4.6.2 =
|
489 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Plugin registration fixes and minor warning fixes.
|
490 |
+
|
491 |
+
= 4.6.1 =
|
492 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Login error fix. Please skip version 4.5.9 and update to version 4.6.1
|
493 |
+
|
494 |
+
= 4.5.9 =
|
495 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Bug fixes for customers who were getting redirected to the login page after the two factor authentication.
|
496 |
+
|
497 |
+
= 4.5.8 =
|
498 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Tested up to 4.9.4 and Removed External links.
|
499 |
+
|
500 |
+
= 4.5.7 =
|
501 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Minor bug fixes.
|
502 |
+
|
503 |
+
= 4.5.6 =
|
504 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Tested up to Wordpress 4.9.
|
505 |
+
|
506 |
+
= 4.5.5 =
|
507 |
+
* Google Authenticator - Two Factor Authentication (2FA) : 404 bug fixes.
|
508 |
+
|
509 |
+
= 4.5.4 =
|
510 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Better UI of Login Pages, Fixed Redirection issue. Fixed the error in the last version (4.5.3) for the customers who were getting undefined action errors.
|
511 |
+
|
512 |
+
= 4.5.3 =
|
513 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Changed UI of the Login Pages, Redirect to Login Page bug fixes.
|
514 |
+
|
515 |
+
= 4.5.2 =
|
516 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Readme Update: Description Update
|
517 |
+
|
518 |
+
= 4.5.1 =
|
519 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Updated the new Google Authenticator App's link and the 'How to Setup Tab' tab.
|
520 |
+
|
521 |
+
= 4.5.0 =
|
522 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Fix Google Authenticator configuration issue.
|
523 |
+
|
524 |
+
= 4.4.9 =
|
525 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Added Alert Message for SMS Transactions only when authentication method is OTP over SMS.
|
526 |
+
|
527 |
+
= 4.4.8 =
|
528 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Added Alert Message for SMS Transactions. Fixed Remember Device flow and confliction with themes. Added support for multiple instances of wordpress.
|
529 |
+
|
530 |
+
= 4.4.7 =
|
531 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Updated the error message for 2 factor configuration.
|
532 |
+
|
533 |
+
= 4.4.6 =
|
534 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Instructions for login in case user get locked out.
|
535 |
+
|
536 |
+
= 4.4.5 =
|
537 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Fixed the issue of session variable on the login with username page.
|
538 |
+
|
539 |
+
= 4.4.4 =
|
540 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Added alert messages for OTP over SMS usages.
|
541 |
+
|
542 |
+
= 4.4.3 =
|
543 |
+
* Google Authenticator - Two Factor Authentication (2FA) : Fixed the login flow for third party Apps that supports XML-RPC.
|
544 |
+
|
545 |
+
= 4.4 =
|
546 |
+
* Google Authenticator - Two Factor Authentication (2FA):
|
547 |
+
* Note: This is a very important update having altogether a new UI and compatibility with Limit Login Attempts. After updating, please do not logout from your admin dashboard. Try to login from another browser and if you face any issue , please contact us at info@xecurify.com
|
548 |
+
* Compatibility with Limit Login Attempts.
|
549 |
+
* New User Interface for login.
|
550 |
+
|
551 |
+
= 4.3.2 =
|
552 |
+
* Google Authenticator - Two Factor Authentication (2FA, MFA): Revised licensing cost for users.
|
553 |
+
|
554 |
+
= 4.3.1 =
|
555 |
+
* Google Authenticator - Two Factor Authentication (2FA, MFA): Compatible upto 4.7
|
556 |
+
|
557 |
+
= 4.3.0 =
|
558 |
+
* Google Authenticator - Two Factor Authentication (2FA, MFA): Updated miniOrange APIs.
|
559 |
+
|
560 |
+
= 4.2.9 =
|
561 |
+
* Google Authenticator - Two Factor Authentication (2FA, MFA): Tested up to WordPress 4.6.
|
562 |
+
|
563 |
+
= 4.2.7 =
|
564 |
+
* Google Authenticator - Two Factor Authentication (2FA, MFA): Session Warning fix in the last version for some of the users.
|
565 |
+
|
566 |
+
= 4.2.6 =
|
567 |
+
* Google Authenticator - Two Factor Authentication (2FA, MFA): Compatible with wordpress caching.
|
568 |
+
|
569 |
+
= 4.2.5 =
|
570 |
+
* Google Authenticator - Two Factor Authentication (2FA, MFA): Improved the session handler.
|
571 |
+
|
572 |
+
= 4.2.4 =
|
573 |
+
* Google Authenticator - Two Factor Authentication (2FA, MFA): Updated faq for limit login attempt type of plugins.
|
574 |
+
|
575 |
+
= 4.2.3 =
|
576 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ):
|
577 |
+
* Improved Error handling during Account Creation.
|
578 |
+
|
579 |
+
= 4.2.2 =
|
580 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ):
|
581 |
+
* Registration Flow fixes
|
582 |
+
|
583 |
+
= 4.2.1 =
|
584 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ):
|
585 |
+
* Change of status during login with phone flow and tested with WP 4.5
|
586 |
+
|
587 |
+
= 4.2.0 =
|
588 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ):
|
589 |
+
* Mark as tested on Wordpress 4.5
|
590 |
+
|
591 |
+
= 4.1.8 =
|
592 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ):
|
593 |
+
* Changed the location of images used for the demo. Now being loaded from the site having SSL certificate.
|
594 |
+
|
595 |
+
= 4.1.7 =
|
596 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ):
|
597 |
+
* Improved Error Handling for Remember Device.
|
598 |
+
|
599 |
+
= 4.1.6 =
|
600 |
+
* Google Authenticator - Two Factor Authentication ( 2 Factor ):
|
601 |
+
* Licensing Plan Updated.
|
602 |
+
|
603 |
+
= 4.1.5 =
|
604 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ):
|
605 |
+
* Added Forgot Password functionality for miniOrange customer admin.
|
606 |
+
* Added warning message for the users who are using lower version of php.
|
607 |
+
* Added functionality to change the customer email.
|
608 |
+
|
609 |
+
= 4.1.4 =
|
610 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ):
|
611 |
+
* Added an option for admin to enable or disable login for XML-RPC supported applications.
|
612 |
+
|
613 |
+
= 4.1.3 =
|
614 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ):
|
615 |
+
* Fixed CSS Conflict with the plugins in the admin dashboard.
|
616 |
+
* More intuitive UI for WooCommerce login.
|
617 |
+
* Tested front-end login with themes like wordpress default theme,
|
618 |
+
customize theme,zerif-lite theme,accesspress store theme,ishop theme and many more.
|
619 |
+
|
620 |
+
= 4.1.2 =
|
621 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ): Google Authenticator for Windows phone
|
622 |
+
* Fixed CSS conflict with front-end of site if WooCommerce is not enabled.
|
623 |
+
|
624 |
+
= 4.1.1 =
|
625 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ): Adding Validation in choosing Security Questions (KBA).
|
626 |
+
|
627 |
+
= 4.1.0 =
|
628 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ): Features added.
|
629 |
+
multisite support
|
630 |
+
Custom login redirection
|
631 |
+
Authy 2-Factor Authentication as separate authentication method
|
632 |
+
|
633 |
+
= 4.0.6 = Google Authenticator - Two Factor Authentication Added multisite support and custom redirection after login feature.
|
634 |
+
|
635 |
+
= 4.0.5 = Google Authenticator - Two Factor Authentication Login into third party apps which support XML-RPC.
|
636 |
+
|
637 |
+
= 4.0.4 = Google Authenticator - Two Factor Authentication Added a check of KBA configuration from mobile login.
|
638 |
+
|
639 |
+
= 4.0.3 = Google Authenticator - Two Factor Authentication Added Support for Authy 2-Factor Authentication App.
|
640 |
+
|
641 |
+
= 4.0.2 = Google Authenticator - Two Factor Authentication Added a check for selection of unique questions during KBA setup .
|
642 |
+
|
643 |
+
= 4.0.1 = Bug Fix Google Authenticator - 2 Factor
|
644 |
+
|
645 |
+
= 4.0 =
|
646 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ): Features added.
|
647 |
+
* KBA as backup method.
|
648 |
+
* mobile browser support.
|
649 |
+
* more intuitive UI for WooCommerce login.
|
650 |
+
|
651 |
+
= 3.8 =
|
652 |
+
* Google Authenticator - Two Factor Authentication ( 2 Factor ): Bug Fix for roles.
|
653 |
+
|
654 |
+
= 3.7 =
|
655 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ): Activation of two factor role wise.
|
656 |
+
|
657 |
+
= 3.6 =
|
658 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ): email verification in inline registration flow for all users.
|
659 |
+
More descriptive setup messages and UI changes.
|
660 |
+
|
661 |
+
= 3.5 =
|
662 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ): Provided mobile login support.
|
663 |
+
|
664 |
+
= 3.4 =
|
665 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ): Features added
|
666 |
+
* Inline registration flow for users.
|
667 |
+
* Security Questions (KBA) as additional method
|
668 |
+
* Alternate way of user identification in customer creation.
|
669 |
+
* premium customizable features.
|
670 |
+
|
671 |
+
= 3.3 =
|
672 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ): Fix the issue of session for some versions of php.
|
673 |
+
|
674 |
+
= 3.2 =
|
675 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ): Fix for device-id compatibility.
|
676 |
+
|
677 |
+
= 3.1 =
|
678 |
+
* Google Authenticator - Two Factor Authentication ( 2 Factor ): Fix for 2FA ShortCode.
|
679 |
+
|
680 |
+
= 3.0 =
|
681 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ): Features added
|
682 |
+
* Google Authenticator.
|
683 |
+
* Device Id (Remember device).
|
684 |
+
* Choice given to admin to enable specific authentication methods for users.
|
685 |
+
* Two Factor support for WooCommerce theme.
|
686 |
+
* Short Code for various customized fronted login.
|
687 |
+
* More intuitive UI and descriptive instructions.
|
688 |
+
|
689 |
+
= 2.6 =
|
690 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ): Fix the compatibility issues of user session with other security plugins.
|
691 |
+
|
692 |
+
= 2.5 =
|
693 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ): Fix the compatibility issues with All In One WP Security & Firewall plugin.
|
694 |
+
|
695 |
+
= 2.4 =
|
696 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ): UI fixes for admin media library dashboard.
|
697 |
+
|
698 |
+
= 2.3 =
|
699 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ): More descriptive setup messages, more intuitive UI.
|
700 |
+
|
701 |
+
= 2.2 =
|
702 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ): Fixed css issues for existing users
|
703 |
+
|
704 |
+
= 2.1 =
|
705 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ): Added support for multiple Two Factor Choices like OTP Over SMS, Phone Call Verification, Push Notification, Soft Token (like Google Authenticator Code), Email Verification, etc.
|
706 |
+
|
707 |
+
= 2.0 =
|
708 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ): Added login with password plus second factor feature.
|
709 |
+
|
710 |
+
= 1.8 =
|
711 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ): Added feature of different login form choice,test authentication and help for configuration and setup.
|
712 |
+
|
713 |
+
= 1.7 =
|
714 |
+
* Bug Fixes Google Authenticator - Two Factor Authentication ( 2FA ): Modifying login screen adaptable to user's login form
|
715 |
+
|
716 |
+
= 1.6 =
|
717 |
+
* Bug Fixes Google Authenticator - Two Factor Authentication ( 2FA ): fetching 2 factor configuration when activating the plugin after deactivating it.
|
718 |
+
|
719 |
+
= 1.5 =
|
720 |
+
* Bug Fixes Google Authenticator - Two Factor Authentication ( 2FA ): Login issues and password save issues resolved
|
721 |
+
|
722 |
+
= 1.4 =
|
723 |
+
* Bug Fixes Google Authenticator - Two Factor Authentication ( 2FA ): Authentication was not working on some version of php.
|
724 |
+
|
725 |
+
= 1.3 =
|
726 |
+
* Google Authenticator - Two Factor Authentication Bug Fixes
|
727 |
+
|
728 |
+
= 1.2 =
|
729 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ): Added 2 factor for all users along with forgot phone functionality.
|
730 |
+
|
731 |
+
= 1.1 =
|
732 |
+
* Google Authenticator - Two Factor Authentication ( 2FA ): Added email ID verification during registration.
|
733 |
+
|
734 |
+
= 1.0.0 =
|
735 |
* First version of Google Authenticator - Two Factor Authentication ( 2FA ) plugin supported with mobile authentication for admins only.
|
controllers/PointersManager.php
CHANGED
@@ -1,54 +1,54 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
class Mo2FAPointersManager {
|
4 |
-
|
5 |
-
private $pfile;
|
6 |
-
private $version;
|
7 |
-
private $prefix;
|
8 |
-
private $pointers = array();
|
9 |
-
|
10 |
-
public function __construct( $file, $version, $prefix ) {
|
11 |
-
$this->pfile = file_exists( $file ) ? $file : FALSE;
|
12 |
-
$this->version = str_replace( '.', '_', $version );
|
13 |
-
$this->prefix = $prefix;
|
14 |
-
}
|
15 |
-
|
16 |
-
public function parse() {
|
17 |
-
if ( empty( $this->pfile ) ) return;
|
18 |
-
$pointers = (array) require_once $this->pfile;
|
19 |
-
if ( empty($pointers) ) return;
|
20 |
-
foreach ( $pointers as $i => $pointer ) {
|
21 |
-
if(is_array($pointer)){
|
22 |
-
$pointer['id'] = "{$this->prefix}{$this->version}_{$i}";
|
23 |
-
$this->pointers[$pointer['id']] = (object) $pointer;
|
24 |
-
}
|
25 |
-
}
|
26 |
-
}
|
27 |
-
|
28 |
-
public function filter( $page ) {
|
29 |
-
if ( empty( $this->pointers ) ) return array();
|
30 |
-
$uid = get_current_user_id();
|
31 |
-
$visited = explode( ',', (string) get_user_meta( $uid, 'mo2f_visited_pointers', TRUE ) );
|
32 |
-
|
33 |
-
$active_ids = array_diff( array_keys( $this->pointers ), $visited );
|
34 |
-
|
35 |
-
|
36 |
-
$good = array();
|
37 |
-
|
38 |
-
foreach( $this->pointers as $i => $pointer ) {
|
39 |
-
if (
|
40 |
-
in_array( $i, $active_ids, TRUE ) // is active
|
41 |
-
&& isset( $pointer->where ) // has where
|
42 |
-
&& in_array( $page, (array) $pointer->where, TRUE ) // current page is in where
|
43 |
-
) {
|
44 |
-
$good[] = $pointer;
|
45 |
-
}
|
46 |
-
}
|
47 |
-
$count = count( $good );
|
48 |
-
if ( $good === 0 ) return array();
|
49 |
-
foreach( array_values( $good ) as $i => $pointer ) {
|
50 |
-
$good[$i]->next = $i+1 < $count ? $good[$i+1]->id : '';
|
51 |
-
}
|
52 |
-
return $good;
|
53 |
-
}
|
54 |
}
|
1 |
+
<?php
|
2 |
+
|
3 |
+
class Mo2FAPointersManager {
|
4 |
+
|
5 |
+
private $pfile;
|
6 |
+
private $version;
|
7 |
+
private $prefix;
|
8 |
+
private $pointers = array();
|
9 |
+
|
10 |
+
public function __construct( $file, $version, $prefix ) {
|
11 |
+
$this->pfile = file_exists( $file ) ? $file : FALSE;
|
12 |
+
$this->version = str_replace( '.', '_', $version );
|
13 |
+
$this->prefix = $prefix;
|
14 |
+
}
|
15 |
+
|
16 |
+
public function parse() {
|
17 |
+
if ( empty( $this->pfile ) ) return;
|
18 |
+
$pointers = (array) require_once $this->pfile;
|
19 |
+
if ( empty($pointers) ) return;
|
20 |
+
foreach ( $pointers as $i => $pointer ) {
|
21 |
+
if(is_array($pointer)){
|
22 |
+
$pointer['id'] = "{$this->prefix}{$this->version}_{$i}";
|
23 |
+
$this->pointers[$pointer['id']] = (object) $pointer;
|
24 |
+
}
|
25 |
+
}
|
26 |
+
}
|
27 |
+
|
28 |
+
public function filter( $page ) {
|
29 |
+
if ( empty( $this->pointers ) ) return array();
|
30 |
+
$uid = get_current_user_id();
|
31 |
+
$visited = explode( ',', (string) get_user_meta( $uid, 'mo2f_visited_pointers', TRUE ) );
|
32 |
+
|
33 |
+
$active_ids = array_diff( array_keys( $this->pointers ), $visited );
|
34 |
+
|
35 |
+
|
36 |
+
$good = array();
|
37 |
+
|
38 |
+
foreach( $this->pointers as $i => $pointer ) {
|
39 |
+
if (
|
40 |
+
in_array( $i, $active_ids, TRUE ) // is active
|
41 |
+
&& isset( $pointer->where ) // has where
|
42 |
+
&& in_array( $page, (array) $pointer->where, TRUE ) // current page is in where
|
43 |
+
) {
|
44 |
+
$good[] = $pointer;
|
45 |
+
}
|
46 |
+
}
|
47 |
+
$count = count( $good );
|
48 |
+
if ( $good === 0 ) return array();
|
49 |
+
foreach( array_values( $good ) as $i => $pointer ) {
|
50 |
+
$good[$i]->next = $i+1 < $count ? $good[$i+1]->id : '';
|
51 |
+
}
|
52 |
+
return $good;
|
53 |
+
}
|
54 |
}
|
controllers/addons.php
CHANGED
@@ -1,5 +1,5 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
global $moWpnsUtility,$mo2f_dirName;
|
4 |
-
|
5 |
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'addons.php';
|
1 |
+
<?php
|
2 |
+
|
3 |
+
global $moWpnsUtility,$mo2f_dirName;
|
4 |
+
|
5 |
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'addons.php';
|
controllers/backup/backup.php
CHANGED
@@ -1,2 +1,2 @@
|
|
1 |
-
<?php
|
2 |
include $mo2f_dirName. 'views'.DIRECTORY_SEPARATOR.'backup'.DIRECTORY_SEPARATOR.'backup.php';
|
1 |
+
<?php
|
2 |
include $mo2f_dirName. 'views'.DIRECTORY_SEPARATOR.'backup'.DIRECTORY_SEPARATOR.'backup.php';
|
controllers/backup/backup_controller.php
CHANGED
@@ -1,2 +1,2 @@
|
|
1 |
-
<?php
|
2 |
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'backup'.DIRECTORY_SEPARATOR.'backup_setting_view.php';
|
1 |
+
<?php
|
2 |
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'backup'.DIRECTORY_SEPARATOR.'backup_setting_view.php';
|
controllers/backup/backup_created_report.php
CHANGED
@@ -1,2 +1,2 @@
|
|
1 |
-
<?php
|
2 |
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'backup'.DIRECTORY_SEPARATOR.'backup_created_report.php';
|
1 |
+
<?php
|
2 |
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'backup'.DIRECTORY_SEPARATOR.'backup_created_report.php';
|
controllers/backup/backup_created_result.php
CHANGED
@@ -1,14 +1,14 @@
|
|
1 |
-
<?php
|
2 |
-
function showBackupResults(){
|
3 |
-
global $wpnsDbQueries;
|
4 |
-
$array = $wpnsDbQueries->get_table_content();
|
5 |
-
$array_size = sizeof($array);
|
6 |
-
for($i=0; $i<(int)$array_size; $i++){
|
7 |
-
$backup_file_path = $array[$i]->plugin_path.DIRECTORY_SEPARATOR.$array[$i]->file_name;
|
8 |
-
if(file_exists($backup_file_path))
|
9 |
-
show_backup_report($array[$i]->plugin_path, $array[$i]->file_name, $array[$i]->created_timestamp,$array[$i]->id);
|
10 |
-
else
|
11 |
-
$wpnsDbQueries->delete_file($array[$i]->id);
|
12 |
-
}
|
13 |
-
}
|
14 |
?>
|
1 |
+
<?php
|
2 |
+
function showBackupResults(){
|
3 |
+
global $wpnsDbQueries;
|
4 |
+
$array = $wpnsDbQueries->get_table_content();
|
5 |
+
$array_size = sizeof($array);
|
6 |
+
for($i=0; $i<(int)$array_size; $i++){
|
7 |
+
$backup_file_path = $array[$i]->plugin_path.DIRECTORY_SEPARATOR.$array[$i]->file_name;
|
8 |
+
if(file_exists($backup_file_path))
|
9 |
+
show_backup_report($array[$i]->plugin_path, $array[$i]->file_name, $array[$i]->created_timestamp,$array[$i]->id);
|
10 |
+
else
|
11 |
+
$wpnsDbQueries->delete_file($array[$i]->id);
|
12 |
+
}
|
13 |
+
}
|
14 |
?>
|
controllers/backup/backup_schdule.php
CHANGED
@@ -1,22 +1,22 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
$file_backup_time = MoWpnsUtility::get_mo2f_db_option('file_backup_created_time', 'site_option');
|
4 |
-
$db_eb_backup_time = MoWpnsUtility::get_mo2f_db_option('db_backup_created_time', 'site_option');
|
5 |
-
$file_schedule_status = MoWpnsUtility::get_mo2f_db_option('scheduled_file_backup', 'site_option');
|
6 |
-
$db_backup_status = MoWpnsUtility::get_mo2f_db_option('scheduled_db_backup', 'site_option');
|
7 |
-
$next_file_backup_hours = MoWpnsUtility::get_mo2f_db_option('mo_wpns_backup_time', 'site_option');
|
8 |
-
$next_db_backup_hours = MoWpnsUtility::get_mo2f_db_option('mo_wpns_backup_time', 'site_option');
|
9 |
-
$img_loader_url = plugins_url('backup-wordpress'.DIRECTORY_SEPARATOR .'includes'.DIRECTORY_SEPARATOR .'images'.DIRECTORY_SEPARATOR .'loader.gif');
|
10 |
-
$page_url = "";
|
11 |
-
$file_next_backup_timestamp = wp_next_scheduled( 'mo_eb_file_cron_hook' );
|
12 |
-
$db_next_backup_timestamp = wp_next_scheduled( 'mo_eb_bl_cron_hook' );
|
13 |
-
|
14 |
-
$file_date = date('d-m-Y', $file_next_backup_timestamp);
|
15 |
-
$file_time = date('H:i', $file_next_backup_timestamp);
|
16 |
-
$file_day = date('l',$file_next_backup_timestamp);
|
17 |
-
|
18 |
-
$db_date = date('d-m-Y', $db_next_backup_timestamp);
|
19 |
-
$db_time = date('H:i', $db_next_backup_timestamp);
|
20 |
-
$db_day = date('l',$db_next_backup_timestamp);
|
21 |
-
|
22 |
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'backup'.DIRECTORY_SEPARATOR.'backup_schdule.php';
|
1 |
+
<?php
|
2 |
+
|
3 |
+
$file_backup_time = MoWpnsUtility::get_mo2f_db_option('file_backup_created_time', 'site_option');
|
4 |
+
$db_eb_backup_time = MoWpnsUtility::get_mo2f_db_option('db_backup_created_time', 'site_option');
|
5 |
+
$file_schedule_status = MoWpnsUtility::get_mo2f_db_option('scheduled_file_backup', 'site_option');
|
6 |
+
$db_backup_status = MoWpnsUtility::get_mo2f_db_option('scheduled_db_backup', 'site_option');
|
7 |
+
$next_file_backup_hours = MoWpnsUtility::get_mo2f_db_option('mo_wpns_backup_time', 'site_option');
|
8 |
+
$next_db_backup_hours = MoWpnsUtility::get_mo2f_db_option('mo_wpns_backup_time', 'site_option');
|
9 |
+
$img_loader_url = plugins_url('backup-wordpress'.DIRECTORY_SEPARATOR .'includes'.DIRECTORY_SEPARATOR .'images'.DIRECTORY_SEPARATOR .'loader.gif');
|
10 |
+
$page_url = "";
|
11 |
+
$file_next_backup_timestamp = wp_next_scheduled( 'mo_eb_file_cron_hook' );
|
12 |
+
$db_next_backup_timestamp = wp_next_scheduled( 'mo_eb_bl_cron_hook' );
|
13 |
+
|
14 |
+
$file_date = date('d-m-Y', $file_next_backup_timestamp);
|
15 |
+
$file_time = date('H:i', $file_next_backup_timestamp);
|
16 |
+
$file_day = date('l',$file_next_backup_timestamp);
|
17 |
+
|
18 |
+
$db_date = date('d-m-Y', $db_next_backup_timestamp);
|
19 |
+
$db_time = date('H:i', $db_next_backup_timestamp);
|
20 |
+
$db_day = date('l',$db_next_backup_timestamp);
|
21 |
+
|
22 |
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'backup'.DIRECTORY_SEPARATOR.'backup_schdule.php';
|
controllers/dashboard.php
CHANGED
@@ -1,23 +1,23 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
|
4 |
-
|
5 |
-
//all the variables and links
|
6 |
-
$wpns_database = new MoWpnsDB;
|
7 |
-
$wpns_count_ips_blocked = $wpns_database->get_count_of_blocked_ips();
|
8 |
-
$wpns_count_ips_whitelisted = $wpns_database->get_number_of_whitelisted_ips();
|
9 |
-
$wpns_attacks_blocked = $wpns_database->get_count_of_attacks_blocked();
|
10 |
-
|
11 |
-
$mo_wpns_handler = new MoWpnsHandler();
|
12 |
-
$sqlC = $mo_wpns_handler->get_blocked_attacks_count("SQL");
|
13 |
-
$rceC = $mo_wpns_handler->get_blocked_attacks_count("RCE");
|
14 |
-
$rfiC = $mo_wpns_handler->get_blocked_attacks_count("RFI");
|
15 |
-
$lfiC = $mo_wpns_handler->get_blocked_attacks_count("LFI");
|
16 |
-
$xssC = $mo_wpns_handler->get_blocked_attacks_count("XSS");
|
17 |
-
$totalAttacks = $sqlC+$lfiC+$rfiC+$xssC+$rceC;
|
18 |
-
$total_malicious=$wpns_database->count_malicious_files();
|
19 |
-
if($total_malicious > 999){
|
20 |
-
$total_malicious=($total_malicious/1000);
|
21 |
-
$total_malicious= round($total_malicious,1)."k";
|
22 |
-
}
|
23 |
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'dashboard.php';
|
1 |
+
<?php
|
2 |
+
|
3 |
+
|
4 |
+
|
5 |
+
//all the variables and links
|
6 |
+
$wpns_database = new MoWpnsDB;
|
7 |
+
$wpns_count_ips_blocked = $wpns_database->get_count_of_blocked_ips();
|
8 |
+
$wpns_count_ips_whitelisted = $wpns_database->get_number_of_whitelisted_ips();
|
9 |
+
$wpns_attacks_blocked = $wpns_database->get_count_of_attacks_blocked();
|
10 |
+
|
11 |
+
$mo_wpns_handler = new MoWpnsHandler();
|
12 |
+
$sqlC = $mo_wpns_handler->get_blocked_attacks_count("SQL");
|
13 |
+
$rceC = $mo_wpns_handler->get_blocked_attacks_count("RCE");
|
14 |
+
$rfiC = $mo_wpns_handler->get_blocked_attacks_count("RFI");
|
15 |
+
$lfiC = $mo_wpns_handler->get_blocked_attacks_count("LFI");
|
16 |
+
$xssC = $mo_wpns_handler->get_blocked_attacks_count("XSS");
|
17 |
+
$totalAttacks = $sqlC+$lfiC+$rfiC+$xssC+$rceC;
|
18 |
+
$total_malicious=$wpns_database->count_malicious_files();
|
19 |
+
if($total_malicious > 999){
|
20 |
+
$total_malicious=($total_malicious/1000);
|
21 |
+
$total_malicious= round($total_malicious,1)."k";
|
22 |
+
}
|
23 |
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'dashboard.php';
|
controllers/licensing.php
CHANGED
@@ -1,50 +1,50 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
global $moWpnsUtility,$mo2f_dirName;
|
4 |
-
|
5 |
-
$default_url = add_query_arg( array('page' => 'default' ), sanitize_url($_SERVER['REQUEST_URI'] ));
|
6 |
-
$form_action = MoWpnsConstants::HOST_NAME.'/moas/login';
|
7 |
-
$admin_email = get_option('mo2f_email');
|
8 |
-
$redirect_url = MoWpnsConstants::HOST_NAME .'/moas/initializepayment';
|
9 |
-
|
10 |
-
$basic_plan_price = '$9 / year';
|
11 |
-
$premium_plan_price = '$9 / year + One Time Setup Fees';
|
12 |
-
|
13 |
-
|
14 |
-
$basic_plan_features= array(
|
15 |
-
"Brute Force Protection ( Login Security and Monitoring - Limit Login Attempts and track user logins. )",
|
16 |
-
"User Registration Security - Disallow Disposable / Fake email addresses",
|
17 |
-
"IP Blocking:(manual and automatic) [Blaclisting and whitelisting included",
|
18 |
-
"Advanced Blocking based on: IP range",
|
19 |
-
"Protection for WP files",
|
20 |
-
"Security Log - Logs Blocked IPs, Spammers, Bots, HTTP 404,403 and 400 logging",
|
21 |
-
"Database Backup",
|
22 |
-
"Google reCAPTCHA",
|
23 |
-
"Password protection - Enforce Strong Password : Check Password strength for all users",
|
24 |
-
"Mobile authentication based on QR code, OTP over SMS and email, Push, Soft token (15+ methods to choose from)<br>For Unlimited Users",
|
25 |
-
"Advanced activity logs auditing and reporting",
|
26 |
-
"Risk based access - Contextual authentication based on device, location, time of access and user behavior",
|
27 |
-
"Advanced User Verification",
|
28 |
-
"Social Login Integration",
|
29 |
-
""
|
30 |
-
);
|
31 |
-
|
32 |
-
$premium_plan_features= array(
|
33 |
-
"Brute Force Protection ( Login Security and Monitoring - Limit Login Attempts and track user logins. )",
|
34 |
-
"User Registration Security - Disallow Disposable / Fake email addresses",
|
35 |
-
"IP Blocking:(manual and automatic) [Blaclisting and whitelisting included",
|
36 |
-
"Advanced Blocking based on: IP range",
|
37 |
-
"Protection for WP files",
|
38 |
-
"Security Log - Logs Blocked IPs, Spammers, Bots, HTTP 404,403 and 400 logging",
|
39 |
-
"Database Backup",
|
40 |
-
"Google reCAPTCHA",
|
41 |
-
"Password protection - Enforce Strong Password : Check Password strength for all users",
|
42 |
-
"Mobile authentication based on QR code, OTP over SMS and email, Push, Soft token (15+ methods to choose from)<br>For Unlimited Users",
|
43 |
-
"Advanced activity logs auditing and reporting",
|
44 |
-
"Risk based access - Contextual authentication based on device, location, time of access and user behavior",
|
45 |
-
"Advanced User Verification",
|
46 |
-
"Social Login Integration",
|
47 |
-
'End to End Integration Support'
|
48 |
-
);
|
49 |
-
|
50 |
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'licensing.php';
|
1 |
+
<?php
|
2 |
+
|
3 |
+
global $moWpnsUtility,$mo2f_dirName;
|
4 |
+
|
5 |
+
$default_url = add_query_arg( array('page' => 'default' ), sanitize_url($_SERVER['REQUEST_URI'] ));
|
6 |
+
$form_action = MoWpnsConstants::HOST_NAME.'/moas/login';
|
7 |
+
$admin_email = get_option('mo2f_email');
|
8 |
+
$redirect_url = MoWpnsConstants::HOST_NAME .'/moas/initializepayment';
|
9 |
+
|
10 |
+
$basic_plan_price = '$9 / year';
|
11 |
+
$premium_plan_price = '$9 / year + One Time Setup Fees';
|
12 |
+
|
13 |
+
|
14 |
+
$basic_plan_features= array(
|
15 |
+
"Brute Force Protection ( Login Security and Monitoring - Limit Login Attempts and track user logins. )",
|
16 |
+
"User Registration Security - Disallow Disposable / Fake email addresses",
|
17 |
+
"IP Blocking:(manual and automatic) [Blaclisting and whitelisting included",
|
18 |
+
"Advanced Blocking based on: IP range",
|
19 |
+
"Protection for WP files",
|
20 |
+
"Security Log - Logs Blocked IPs, Spammers, Bots, HTTP 404,403 and 400 logging",
|
21 |
+
"Database Backup",
|
22 |
+
"Google reCAPTCHA",
|
23 |
+
"Password protection - Enforce Strong Password : Check Password strength for all users",
|
24 |
+
"Mobile authentication based on QR code, OTP over SMS and email, Push, Soft token (15+ methods to choose from)<br>For Unlimited Users",
|
25 |
+
"Advanced activity logs auditing and reporting",
|
26 |
+
"Risk based access - Contextual authentication based on device, location, time of access and user behavior",
|
27 |
+
"Advanced User Verification",
|
28 |
+
"Social Login Integration",
|
29 |
+
""
|
30 |
+
);
|
31 |
+
|
32 |
+
$premium_plan_features= array(
|
33 |
+
"Brute Force Protection ( Login Security and Monitoring - Limit Login Attempts and track user logins. )",
|
34 |
+
"User Registration Security - Disallow Disposable / Fake email addresses",
|
35 |
+
"IP Blocking:(manual and automatic) [Blaclisting and whitelisting included",
|
36 |
+
"Advanced Blocking based on: IP range",
|
37 |
+
"Protection for WP files",
|
38 |
+
"Security Log - Logs Blocked IPs, Spammers, Bots, HTTP 404,403 and 400 logging",
|
39 |
+
"Database Backup",
|
40 |
+
"Google reCAPTCHA",
|
41 |
+
"Password protection - Enforce Strong Password : Check Password strength for all users",
|
42 |
+
"Mobile authentication based on QR code, OTP over SMS and email, Push, Soft token (15+ methods to choose from)<br>For Unlimited Users",
|
43 |
+
"Advanced activity logs auditing and reporting",
|
44 |
+
"Risk based access - Contextual authentication based on device, location, time of access and user behavior",
|
45 |
+
"Advanced User Verification",
|
46 |
+
"Social Login Integration",
|
47 |
+
'End to End Integration Support'
|
48 |
+
);
|
49 |
+
|
50 |
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'licensing.php';
|
controllers/login-spam.php
CHANGED
@@ -1,10 +1,10 @@
|
|
1 |
-
<?php
|
2 |
-
global $moWpnsUtility,$mo2f_dirName;
|
3 |
-
if( isset( $_GET[ 'tab' ] ) ) {
|
4 |
-
$active_tab = sanitize_text_field($_GET[ 'tab' ]);
|
5 |
-
} else {
|
6 |
-
$active_tab = 'default';
|
7 |
-
}
|
8 |
-
update_site_option('mo2f_visit_login_and_spam',true);
|
9 |
-
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'login_spam.php';
|
10 |
?>
|
1 |
+
<?php
|
2 |
+
global $moWpnsUtility,$mo2f_dirName;
|
3 |
+
if( isset( $_GET[ 'tab' ] ) ) {
|
4 |
+
$active_tab = sanitize_text_field($_GET[ 'tab' ]);
|
5 |
+
} else {
|
6 |
+
$active_tab = 'default';
|
7 |
+
}
|
8 |
+
update_site_option('mo2f_visit_login_and_spam',true);
|
9 |
+
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'login_spam.php';
|
10 |
?>
|
controllers/main_controller.php
CHANGED
@@ -1,82 +1,82 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
global $moWpnsUtility,$mo2f_dirName;
|
4 |
-
|
5 |
-
$controller = $mo2f_dirName . 'controllers'.DIRECTORY_SEPARATOR;
|
6 |
-
|
7 |
-
include_once $controller . 'navbar.php';
|
8 |
-
if(current_user_can('administrator'))
|
9 |
-
{
|
10 |
-
|
11 |
-
include_once $controller . 'newtork_security_features.php';
|
12 |
-
|
13 |
-
if( isset( $_GET[ 'page' ]))
|
14 |
-
{
|
15 |
-
switch(sanitize_text_field($_GET['page']))
|
16 |
-
{
|
17 |
-
case 'mo_2fa_dashboard':
|
18 |
-
include_once $controller . 'dashboard.php'; break;
|
19 |
-
case 'mo_2fa_login_and_spam':
|
20 |
-
include_once $controller . 'login-spam.php'; break;
|
21 |
-
case 'default':
|
22 |
-
include_once $controller . 'login-security.php'; break;
|
23 |
-
case 'mo_2fa_account':
|
24 |
-
include_once $controller . 'account.php'; break;
|
25 |
-
case 'mo_2fa_backup':
|
26 |
-
include_once $controller . 'backup'.DIRECTORY_SEPARATOR.'backup.php'; break;
|
27 |
-
case 'mo_2fa_upgrade':
|
28 |
-
include_once $controller . 'upgrade.php'; break;
|
29 |
-
case 'mo_2fa_waf':
|
30 |
-
include_once $controller . 'waf.php'; break;
|
31 |
-
case 'mo_2fa_blockedips':
|
32 |
-
include_once $controller . 'ip-blocking.php'; break;
|
33 |
-
case 'mo_2fa_advancedblocking':
|
34 |
-
include_once $controller . 'advanced-blocking.php'; break;
|
35 |
-
case 'mo_2fa_notifications':
|
36 |
-
include_once $controller . 'notification-settings.php'; break;
|
37 |
-
case 'mo_2fa_reports':
|
38 |
-
include_once $controller . 'reports.php'; break;
|
39 |
-
case 'mo_2fa_licensing':
|
40 |
-
include_once $controller . 'licensing.php'; break;
|
41 |
-
case 'mo_2fa_troubleshooting':
|
42 |
-
include_once $controller . 'troubleshooting.php'; break;
|
43 |
-
case 'mo_2fa_addons':
|
44 |
-
include_once $controller . 'addons.php'; break;
|
45 |
-
case 'mo_2fa_malwarescan':
|
46 |
-
include_once $controller . 'malware_scanner'.DIRECTORY_SEPARATOR.'scan_malware.php'; break;
|
47 |
-
case 'mo_2fa_two_fa':
|
48 |
-
include_once $controller .'twofa'.DIRECTORY_SEPARATOR. 'two_fa.php'; break;
|
49 |
-
case 'mo_2fa_request_demo':
|
50 |
-
include_once $controller . 'request_demo.php'; break;
|
51 |
-
case 'mo_2fa_request_offer':
|
52 |
-
include_once $controller . 'request_offer.php'; break;
|
53 |
-
case 'mo_2fa_trial':
|
54 |
-
include_once $controller . 'trial.php'; break;
|
55 |
-
|
56 |
-
}
|
57 |
-
}
|
58 |
-
}
|
59 |
-
else
|
60 |
-
{
|
61 |
-
if( isset( $_GET[ 'page' ]))
|
62 |
-
{
|
63 |
-
switch(sanitize_text_field($_GET['page']))
|
64 |
-
{
|
65 |
-
case 'mo_2fa_two_fa':
|
66 |
-
include_once $controller .'twofa'.DIRECTORY_SEPARATOR. 'two_fa.php'; break;
|
67 |
-
|
68 |
-
}
|
69 |
-
|
70 |
-
}
|
71 |
-
|
72 |
-
}
|
73 |
-
if (isset( $_GET[ 'page' ])) {
|
74 |
-
|
75 |
-
|
76 |
-
if (MoWpnsUtility::get_mo2f_db_option('mo_wpns_2fa_with_network_security', 'get_option') && current_user_can('administrator'))
|
77 |
-
{
|
78 |
-
include_once $controller . 'feedback_footer.php';
|
79 |
-
}
|
80 |
-
}
|
81 |
-
?>
|
82 |
-
|
1 |
+
<?php
|
2 |
+
|
3 |
+
global $moWpnsUtility,$mo2f_dirName;
|
4 |
+
|
5 |
+
$controller = $mo2f_dirName . 'controllers'.DIRECTORY_SEPARATOR;
|
6 |
+
|
7 |
+
include_once $controller . 'navbar.php';
|
8 |
+
if(current_user_can('administrator'))
|
9 |
+
{
|
10 |
+
|
11 |
+
include_once $controller . 'newtork_security_features.php';
|
12 |
+
|
13 |
+
if( isset( $_GET[ 'page' ]))
|
14 |
+
{
|
15 |
+
switch(sanitize_text_field($_GET['page']))
|
16 |
+
{
|
17 |
+
case 'mo_2fa_dashboard':
|
18 |
+
include_once $controller . 'dashboard.php'; break;
|
19 |
+
case 'mo_2fa_login_and_spam':
|
20 |
+
include_once $controller . 'login-spam.php'; break;
|
21 |
+
case 'default':
|
22 |
+
include_once $controller . 'login-security.php'; break;
|
23 |
+
case 'mo_2fa_account':
|
24 |
+
include_once $controller . 'account.php'; break;
|
25 |
+
case 'mo_2fa_backup':
|
26 |
+
include_once $controller . 'backup'.DIRECTORY_SEPARATOR.'backup.php'; break;
|
27 |
+
case 'mo_2fa_upgrade':
|
28 |
+
include_once $controller . 'upgrade.php'; break;
|
29 |
+
case 'mo_2fa_waf':
|
30 |
+
include_once $controller . 'waf.php'; break;
|
31 |
+
case 'mo_2fa_blockedips':
|
32 |
+
include_once $controller . 'ip-blocking.php'; break;
|
33 |
+
case 'mo_2fa_advancedblocking':
|
34 |
+
include_once $controller . 'advanced-blocking.php'; break;
|
35 |
+
case 'mo_2fa_notifications':
|
36 |
+
include_once $controller . 'notification-settings.php'; break;
|
37 |
+
case 'mo_2fa_reports':
|
38 |
+
include_once $controller . 'reports.php'; break;
|
39 |
+
case 'mo_2fa_licensing':
|
40 |
+
include_once $controller . 'licensing.php'; break;
|
41 |
+
case 'mo_2fa_troubleshooting':
|
42 |
+
include_once $controller . 'troubleshooting.php'; break;
|
43 |
+
case 'mo_2fa_addons':
|
44 |
+
include_once $controller . 'addons.php'; break;
|
45 |
+
case 'mo_2fa_malwarescan':
|
46 |
+
include_once $controller . 'malware_scanner'.DIRECTORY_SEPARATOR.'scan_malware.php'; break;
|
47 |
+
case 'mo_2fa_two_fa':
|
48 |
+
include_once $controller .'twofa'.DIRECTORY_SEPARATOR. 'two_fa.php'; break;
|
49 |
+
case 'mo_2fa_request_demo':
|
50 |
+
include_once $controller . 'request_demo.php'; break;
|
51 |
+
case 'mo_2fa_request_offer':
|
52 |
+
include_once $controller . 'request_offer.php'; break;
|
53 |
+
case 'mo_2fa_trial':
|
54 |
+
include_once $controller . 'trial.php'; break;
|
55 |
+
|
56 |
+
}
|
57 |
+
}
|
58 |
+
}
|
59 |
+
else
|
60 |
+
{
|
61 |
+
if( isset( $_GET[ 'page' ]))
|
62 |
+
{
|
63 |
+
switch(sanitize_text_field($_GET['page']))
|
64 |
+
{
|
65 |
+
case 'mo_2fa_two_fa':
|
66 |
+
include_once $controller .'twofa'.DIRECTORY_SEPARATOR. 'two_fa.php'; break;
|
67 |
+
|
68 |
+
}
|
69 |
+
|
70 |
+
}
|
71 |
+
|
72 |
+
}
|
73 |
+
if (isset( $_GET[ 'page' ])) {
|
74 |
+
|
75 |
+
|
76 |
+
if (MoWpnsUtility::get_mo2f_db_option('mo_wpns_2fa_with_network_security', 'get_option') && current_user_can('administrator'))
|
77 |
+
{
|
78 |
+
include_once $controller . 'feedback_footer.php';
|
79 |
+
}
|
80 |
+
}
|
81 |
+
?>
|
82 |
+
|
controllers/malware_scanner/scan_malware.php
CHANGED
@@ -1,9 +1,9 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
global $moWpnsUtility,$mo2f_dirName;
|
4 |
-
|
5 |
-
update_site_option('mo2f_visit_malware',true);
|
6 |
-
|
7 |
-
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'malware_scanner'.DIRECTORY_SEPARATOR.'malware_scan.php';
|
8 |
-
?>
|
9 |
-
|
1 |
+
<?php
|
2 |
+
|
3 |
+
global $moWpnsUtility,$mo2f_dirName;
|
4 |
+
|
5 |
+
update_site_option('mo2f_visit_malware',true);
|
6 |
+
|
7 |
+
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'malware_scanner'.DIRECTORY_SEPARATOR.'malware_scan.php';
|
8 |
+
?>
|
9 |
+
|
controllers/malware_scanner/scan_malware_report.php
CHANGED
@@ -1,5 +1,5 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'malware_scanner'.DIRECTORY_SEPARATOR.'scan_report_view.php';
|
4 |
-
|
5 |
?>
|
1 |
+
<?php
|
2 |
+
|
3 |
+
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'malware_scanner'.DIRECTORY_SEPARATOR.'scan_report_view.php';
|
4 |
+
|
5 |
?>
|
controllers/malware_scanner/scan_malware_settings.php
CHANGED
@@ -1,47 +1,47 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
|
4 |
-
|
5 |
-
$scan_configuration = json_decode(get_site_option('mo_wpns_scan_configuration'));
|
6 |
-
if(is_null($scan_configuration)){
|
7 |
-
$mo_wpns_scan_files_extensions = "";
|
8 |
-
$mo_wpns_skip_folders = "";
|
9 |
-
$mo_wpns_scan_plugins = 1;
|
10 |
-
$mo_wpns_scan_themes = 1;
|
11 |
-
$mo_wpns_core_scan = 0;
|
12 |
-
$mo_wpns_check_vulnerable = 1;
|
13 |
-
$mo_wpns_check_sql = 1;
|
14 |
-
$mo_wpns_check_extl = 0;
|
15 |
-
$mo_wpns_check_repo = 0;
|
16 |
-
}else{
|
17 |
-
$mo_wpns_scan_files_extensions = $scan_configuration->file_extension;
|
18 |
-
$mo_wpns_skip_folders = $scan_configuration->path_skip;
|
19 |
-
$mo_wpns_scan_plugins = $scan_configuration->plugin_scan;
|
20 |
-
$mo_wpns_scan_themes = $scan_configuration->theme_scan;
|
21 |
-
$mo_wpns_core_scan = $scan_configuration->core_scan;
|
22 |
-
$mo_wpns_check_vulnerable = $scan_configuration->check_vulnerable;
|
23 |
-
$mo_wpns_check_sql = $scan_configuration->check_sql;
|
24 |
-
$mo_wpns_check_extl = $scan_configuration->ext_link_check;
|
25 |
-
$mo_wpns_check_repo = $scan_configuration->check_repo;
|
26 |
-
}
|
27 |
-
$mo_wpns_check_rfi = 0;
|
28 |
-
$mo_wpns_adv_sign = 0;
|
29 |
-
$mo_wpns_check_domain = 0;
|
30 |
-
$mo_wpns_check_trojan = 0;
|
31 |
-
$mo_wpns_check_backdoor = 0;
|
32 |
-
$mo_wpns_skip_folders_array = array();
|
33 |
-
if(!empty($mo_wpns_skip_folders)){
|
34 |
-
$mo_wpns_skip_folders_array = explode(";",$mo_wpns_skip_folders);
|
35 |
-
}
|
36 |
-
$mo_wpns_white_url = "";
|
37 |
-
$mo_wpns_white_urls_array = array();
|
38 |
-
if(!empty($mo_wpns_white_url)){
|
39 |
-
$mo_wpns_white_urls_array = explode(";",$mo_wpns_white_url);
|
40 |
-
}
|
41 |
-
$mo_wpns_custom_sign = "";
|
42 |
-
$mo_wpns_custom_sign_array = array();
|
43 |
-
if(!empty($mo_wpns_custom_sign)){
|
44 |
-
$mo_wpns_custom_sign_array = explode(";",$mo_wpns_custom_sign);
|
45 |
-
}
|
46 |
-
include_once $mo2f_dirName. 'views'.DIRECTORY_SEPARATOR.'malware_scanner'.DIRECTORY_SEPARATOR.'scan_settings_view.php';
|
47 |
-
?>
|
1 |
+
<?php
|
2 |
+
|
3 |
+
|
4 |
+
|
5 |
+
$scan_configuration = json_decode(get_site_option('mo_wpns_scan_configuration'));
|
6 |
+
if(is_null($scan_configuration)){
|
7 |
+
$mo_wpns_scan_files_extensions = "";
|
8 |
+
$mo_wpns_skip_folders = "";
|
9 |
+
$mo_wpns_scan_plugins = 1;
|
10 |
+
$mo_wpns_scan_themes = 1;
|
11 |
+
$mo_wpns_core_scan = 0;
|
12 |
+
$mo_wpns_check_vulnerable = 1;
|
13 |
+
$mo_wpns_check_sql = 1;
|
14 |
+
$mo_wpns_check_extl = 0;
|
15 |
+
$mo_wpns_check_repo = 0;
|
16 |
+
}else{
|
17 |
+
$mo_wpns_scan_files_extensions = $scan_configuration->file_extension;
|
18 |
+
$mo_wpns_skip_folders = $scan_configuration->path_skip;
|
19 |
+
$mo_wpns_scan_plugins = $scan_configuration->plugin_scan;
|
20 |
+
$mo_wpns_scan_themes = $scan_configuration->theme_scan;
|
21 |
+
$mo_wpns_core_scan = $scan_configuration->core_scan;
|
22 |
+
$mo_wpns_check_vulnerable = $scan_configuration->check_vulnerable;
|
23 |
+
$mo_wpns_check_sql = $scan_configuration->check_sql;
|
24 |
+
$mo_wpns_check_extl = $scan_configuration->ext_link_check;
|
25 |
+
$mo_wpns_check_repo = $scan_configuration->check_repo;
|
26 |
+
}
|
27 |
+
$mo_wpns_check_rfi = 0;
|
28 |
+
$mo_wpns_adv_sign = 0;
|
29 |
+
$mo_wpns_check_domain = 0;
|
30 |
+
$mo_wpns_check_trojan = 0;
|
31 |
+
$mo_wpns_check_backdoor = 0;
|
32 |
+
$mo_wpns_skip_folders_array = array();
|
33 |
+
if(!empty($mo_wpns_skip_folders)){
|
34 |
+
$mo_wpns_skip_folders_array = explode(";",$mo_wpns_skip_folders);
|
35 |
+
}
|
36 |
+
$mo_wpns_white_url = "";
|
37 |
+
$mo_wpns_white_urls_array = array();
|
38 |
+
if(!empty($mo_wpns_white_url)){
|
39 |
+
$mo_wpns_white_urls_array = explode(";",$mo_wpns_white_url);
|
40 |
+
}
|
41 |
+
$mo_wpns_custom_sign = "";
|
42 |
+
$mo_wpns_custom_sign_array = array();
|
43 |
+
if(!empty($mo_wpns_custom_sign)){
|
44 |
+
$mo_wpns_custom_sign_array = explode(";",$mo_wpns_custom_sign);
|
45 |
+
}
|
46 |
+
include_once $mo2f_dirName. 'views'.DIRECTORY_SEPARATOR.'malware_scanner'.DIRECTORY_SEPARATOR.'scan_settings_view.php';
|
47 |
+
?>
|
controllers/malware_scanner/scan_malware_summary.php
CHANGED
@@ -1,5 +1,5 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'malware_scanner'.DIRECTORY_SEPARATOR.'scan_summary_view.php';
|
4 |
-
|
5 |
?>
|
1 |
+
<?php
|
2 |
+
|
3 |
+
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'malware_scanner'.DIRECTORY_SEPARATOR.'scan_summary_view.php';
|
4 |
+
|
5 |
?>
|
controllers/navbar.php
CHANGED
@@ -1,95 +1,95 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
global $moWpnsUtility,$mo2f_dirName;
|
4 |
-
if(current_user_can( 'manage_options' ) && isset($_POST['option']))
|
5 |
-
{
|
6 |
-
switch(sanitize_text_field(wp_unslash($_POST['option'])))
|
7 |
-
{
|
8 |
-
case "mo_wpns_2fa_with_network_security":
|
9 |
-
$security_features = new Mo_2fa_security_features();
|
10 |
-
$security_features->wpns_2fa_with_network_security($_POST); break;
|
11 |
-
}
|
12 |
-
}
|
13 |
-
$network_security_features= MoWpnsUtility::get_mo2f_db_option('mo_wpns_2fa_with_network_security', 'get_option') ? "checked" : "";
|
14 |
-
|
15 |
-
if( isset( $_GET[ 'page' ])){
|
16 |
-
$tab_count= get_site_option('mo2f_tab_count', 0);
|
17 |
-
if($tab_count == 5)
|
18 |
-
update_site_option('mo_2f_switch_all', 1);
|
19 |
-
else
|
20 |
-
update_site_option('mo_2f_switch_all', 0);
|
21 |
-
switch(sanitize_text_field($_GET['page']))
|
22 |
-
{
|
23 |
-
case 'mo_2fa_login_and_spam':
|
24 |
-
update_option('mo_2f_switch_loginspam', 1);
|
25 |
-
if($tab_count < 5 && !get_site_option('mo_2f_switch_loginspam'))
|
26 |
-
update_site_option('mo2f_tab_count', get_site_option('mo2f_tab_count')+1);
|
27 |
-
break;
|
28 |
-
case 'mo_2fa_backup':
|
29 |
-
update_option('mo_2f_switch_backup', 1);
|
30 |
-
if($tab_count < 5 && !get_site_option('mo_2f_switch_backup'))
|
31 |
-
update_site_option('mo2f_tab_count', get_site_option('mo2f_tab_count')+1);
|
32 |
-
break;
|
33 |
-
case 'mo_2fa_waf':
|
34 |
-
update_option('mo_2f_switch_waf', 1);
|
35 |
-
if($tab_count < 5 && !get_site_option('mo_2f_switch_waf'))
|
36 |
-
update_site_option('mo2f_tab_count', get_site_option('mo2f_tab_count')+1);
|
37 |
-
break;
|
38 |
-
case 'mo_2fa_advancedblocking':
|
39 |
-
update_option('mo_2f_switch_adv_block', 1);
|
40 |
-
if($tab_count < 5 && !get_site_option('mo_2f_switch_adv_block'))
|
41 |
-
update_site_option('mo2f_tab_count', get_site_option('mo2f_tab_count')+1);
|
42 |
-
break;
|
43 |
-
|
44 |
-
case 'mo_2fa_malwarescan':
|
45 |
-
update_option('mo_2f_switch_malware', 1);
|
46 |
-
if($tab_count < 5 && !get_site_option('mo_2f_switch_malware'))
|
47 |
-
update_site_option('mo2f_tab_count', get_site_option('mo2f_tab_count')+1);
|
48 |
-
break;
|
49 |
-
}
|
50 |
-
}
|
51 |
-
$profile_url = esc_url(add_query_arg( array('page' => 'mo_2fa_account' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
52 |
-
$login_security = esc_url(add_query_arg( array('page' => 'default' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
53 |
-
$waf = esc_url(add_query_arg( array('page' => 'mo_2fa_waf' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
54 |
-
$login_and_spam = esc_url(add_query_arg( array('page' => 'mo_2fa_login_and_spam' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
55 |
-
$register_url = esc_url(add_query_arg( array('page' => 'registration' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
56 |
-
$blocked_ips = esc_url(add_query_arg( array('page' => 'mo_2fa_blockedips' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
57 |
-
$advance_block = esc_url(add_query_arg( array('page' => 'mo_2fa_advancedblocking' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
58 |
-
$notif_url = esc_url(add_query_arg( array('page' => 'mo_2fa_notifications' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
59 |
-
$reports_url = esc_url(add_query_arg( array('page' => 'mo_2fa_reports' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
60 |
-
$license_url = esc_url(add_query_arg( array('page' => 'mo_2fa_upgrade' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
61 |
-
$help_url = esc_url(add_query_arg( array('page' => 'mo_2fa_troubleshooting' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
62 |
-
$addons_url = esc_url(add_query_arg( array('page' => 'mo_2fa_addons' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
63 |
-
$content_protect= esc_url(add_query_arg( array('page' => 'content_protect' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
64 |
-
$backup = esc_url(add_query_arg( array('page' => 'mo_2fa_backup' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
65 |
-
$scan_url = esc_url(add_query_arg( array('page' => 'mo_2fa_malwarescan' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
66 |
-
$two_fa = esc_url(add_query_arg( array('page' => 'mo_2fa_two_fa' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
67 |
-
//Added for new design
|
68 |
-
$dashboard_url = esc_url(add_query_arg(array('page' => 'mo_2fa_dashboard' ), sanitize_text_field($_SERVER['REQUEST_URI'])));
|
69 |
-
$upgrade_url = esc_url(add_query_arg(array('page' => 'mo_2fa_upgrade' ), sanitize_text_field($_SERVER['REQUEST_URI'])));
|
70 |
-
$request_demo_url = esc_url(add_query_arg(array('page' => 'mo_2fa_request_demo' ), sanitize_text_field($_SERVER['REQUEST_URI'])));
|
71 |
-
$request_offer_url = esc_url(add_query_arg(array('page' => 'mo_2fa_request_offer' ), sanitize_text_field($_SERVER['REQUEST_URI'])));
|
72 |
-
$trial_url = esc_url(add_query_arg( array('page' => 'mo_2fa_trial' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
73 |
-
|
74 |
-
//dynamic
|
75 |
-
$logo_url = plugin_dir_url(dirname(__FILE__)) . 'includes/images/miniorange_logo.png';
|
76 |
-
$login_with_usename_only_url = plugin_dir_url(dirname(__FILE__)) . 'includes/images/login-with-2fa-and-password.png';
|
77 |
-
$hide_login_form_url = plugin_dir_url(dirname(__FILE__)) . 'includes/images/hide_default_login_form.png';
|
78 |
-
$new_url = plugin_dir_url(dirname(__FILE__)) . 'includes/images/new.png';
|
79 |
-
$shw_feedback = get_option('donot_show_feedback_message') ? false: true;
|
80 |
-
|
81 |
-
$moPluginHandler= new MoWpnsHandler();
|
82 |
-
$safe = $moPluginHandler->is_whitelisted($moWpnsUtility->get_client_ip());
|
83 |
-
|
84 |
-
$active_tab = sanitize_text_field($_GET['page']);
|
85 |
-
|
86 |
-
$user_id = get_current_user_id();
|
87 |
-
$mo2f_two_fa_method = $Mo2fdbQueries->get_user_detail( 'mo2f_configured_2FA_method', $user_id );
|
88 |
-
$backup_codes_remaining = get_user_meta($user_id, 'mo2f_backup_codes', true);
|
89 |
-
if(is_array($backup_codes_remaining)){
|
90 |
-
$backup_codes_remaining = sizeof($backup_codes_remaining);
|
91 |
-
}else{
|
92 |
-
$backup_codes_remaining = 0;
|
93 |
-
}
|
94 |
-
|
95 |
-
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'navbar.php';
|
1 |
+
<?php
|
2 |
+
|
3 |
+
global $moWpnsUtility,$mo2f_dirName;
|
4 |
+
if(current_user_can( 'manage_options' ) && isset($_POST['option']))
|
5 |
+
{
|
6 |
+
switch(sanitize_text_field(wp_unslash($_POST['option'])))
|
7 |
+
{
|
8 |
+
case "mo_wpns_2fa_with_network_security":
|
9 |
+
$security_features = new Mo_2fa_security_features();
|
10 |
+
$security_features->wpns_2fa_with_network_security($_POST); break;
|
11 |
+
}
|
12 |
+
}
|
13 |
+
$network_security_features= MoWpnsUtility::get_mo2f_db_option('mo_wpns_2fa_with_network_security', 'get_option') ? "checked" : "";
|
14 |
+
|
15 |
+
if( isset( $_GET[ 'page' ])){
|
16 |
+
$tab_count= get_site_option('mo2f_tab_count', 0);
|
17 |
+
if($tab_count == 5)
|
18 |
+
update_site_option('mo_2f_switch_all', 1);
|
19 |
+
else
|
20 |
+
update_site_option('mo_2f_switch_all', 0);
|
21 |
+
switch(sanitize_text_field($_GET['page']))
|
22 |
+
{
|
23 |
+
case 'mo_2fa_login_and_spam':
|
24 |
+
update_option('mo_2f_switch_loginspam', 1);
|
25 |
+
if($tab_count < 5 && !get_site_option('mo_2f_switch_loginspam'))
|
26 |
+
update_site_option('mo2f_tab_count', get_site_option('mo2f_tab_count')+1);
|
27 |
+
break;
|
28 |
+
case 'mo_2fa_backup':
|
29 |
+
update_option('mo_2f_switch_backup', 1);
|
30 |
+
if($tab_count < 5 && !get_site_option('mo_2f_switch_backup'))
|
31 |
+
update_site_option('mo2f_tab_count', get_site_option('mo2f_tab_count')+1);
|
32 |
+
break;
|
33 |
+
case 'mo_2fa_waf':
|
34 |
+
update_option('mo_2f_switch_waf', 1);
|
35 |
+
if($tab_count < 5 && !get_site_option('mo_2f_switch_waf'))
|
36 |
+
update_site_option('mo2f_tab_count', get_site_option('mo2f_tab_count')+1);
|
37 |
+
break;
|
38 |
+
case 'mo_2fa_advancedblocking':
|
39 |
+
update_option('mo_2f_switch_adv_block', 1);
|
40 |
+
if($tab_count < 5 && !get_site_option('mo_2f_switch_adv_block'))
|
41 |
+
update_site_option('mo2f_tab_count', get_site_option('mo2f_tab_count')+1);
|
42 |
+
break;
|
43 |
+
|
44 |
+
case 'mo_2fa_malwarescan':
|
45 |
+
update_option('mo_2f_switch_malware', 1);
|
46 |
+
if($tab_count < 5 && !get_site_option('mo_2f_switch_malware'))
|
47 |
+
update_site_option('mo2f_tab_count', get_site_option('mo2f_tab_count')+1);
|
48 |
+
break;
|
49 |
+
}
|
50 |
+
}
|
51 |
+
$profile_url = esc_url(add_query_arg( array('page' => 'mo_2fa_account' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
52 |
+
$login_security = esc_url(add_query_arg( array('page' => 'default' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
53 |
+
$waf = esc_url(add_query_arg( array('page' => 'mo_2fa_waf' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
54 |
+
$login_and_spam = esc_url(add_query_arg( array('page' => 'mo_2fa_login_and_spam' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
55 |
+
$register_url = esc_url(add_query_arg( array('page' => 'registration' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
56 |
+
$blocked_ips = esc_url(add_query_arg( array('page' => 'mo_2fa_blockedips' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
57 |
+
$advance_block = esc_url(add_query_arg( array('page' => 'mo_2fa_advancedblocking' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
58 |
+
$notif_url = esc_url(add_query_arg( array('page' => 'mo_2fa_notifications' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
59 |
+
$reports_url = esc_url(add_query_arg( array('page' => 'mo_2fa_reports' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
60 |
+
$license_url = esc_url(add_query_arg( array('page' => 'mo_2fa_upgrade' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
61 |
+
$help_url = esc_url(add_query_arg( array('page' => 'mo_2fa_troubleshooting' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
62 |
+
$addons_url = esc_url(add_query_arg( array('page' => 'mo_2fa_addons' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
63 |
+
$content_protect= esc_url(add_query_arg( array('page' => 'content_protect' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
64 |
+
$backup = esc_url(add_query_arg( array('page' => 'mo_2fa_backup' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
65 |
+
$scan_url = esc_url(add_query_arg( array('page' => 'mo_2fa_malwarescan' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
66 |
+
$two_fa = esc_url(add_query_arg( array('page' => 'mo_2fa_two_fa' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
67 |
+
//Added for new design
|
68 |
+
$dashboard_url = esc_url(add_query_arg(array('page' => 'mo_2fa_dashboard' ), sanitize_text_field($_SERVER['REQUEST_URI'])));
|
69 |
+
$upgrade_url = esc_url(add_query_arg(array('page' => 'mo_2fa_upgrade' ), sanitize_text_field($_SERVER['REQUEST_URI'])));
|
70 |
+
$request_demo_url = esc_url(add_query_arg(array('page' => 'mo_2fa_request_demo' ), sanitize_text_field($_SERVER['REQUEST_URI'])));
|
71 |
+
$request_offer_url = esc_url(add_query_arg(array('page' => 'mo_2fa_request_offer' ), sanitize_text_field($_SERVER['REQUEST_URI'])));
|
72 |
+
$trial_url = esc_url(add_query_arg( array('page' => 'mo_2fa_trial' ), sanitize_text_field($_SERVER['REQUEST_URI'] )));
|
73 |
+
|
74 |
+
//dynamic
|
75 |
+
$logo_url = plugin_dir_url(dirname(__FILE__)) . 'includes/images/miniorange_logo.png';
|
76 |
+
$login_with_usename_only_url = plugin_dir_url(dirname(__FILE__)) . 'includes/images/login-with-2fa-and-password.png';
|
77 |
+
$hide_login_form_url = plugin_dir_url(dirname(__FILE__)) . 'includes/images/hide_default_login_form.png';
|
78 |
+
$new_url = plugin_dir_url(dirname(__FILE__)) . 'includes/images/new.png';
|
79 |
+
$shw_feedback = get_option('donot_show_feedback_message') ? false: true;
|
80 |
+
|
81 |
+
$moPluginHandler= new MoWpnsHandler();
|
82 |
+
$safe = $moPluginHandler->is_whitelisted($moWpnsUtility->get_client_ip());
|
83 |
+
|
84 |
+
$active_tab = sanitize_text_field($_GET['page']);
|
85 |
+
|
86 |
+
$user_id = get_current_user_id();
|
87 |
+
$mo2f_two_fa_method = $Mo2fdbQueries->get_user_detail( 'mo2f_configured_2FA_method', $user_id );
|
88 |
+
$backup_codes_remaining = get_user_meta($user_id, 'mo2f_backup_codes', true);
|
89 |
+
if(is_array($backup_codes_remaining)){
|
90 |
+
$backup_codes_remaining = sizeof($backup_codes_remaining);
|
91 |
+
}else{
|
92 |
+
$backup_codes_remaining = 0;
|
93 |
+
}
|
94 |
+
|
95 |
+
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'navbar.php';
|
controllers/newtork_security_features.php
CHANGED
@@ -1,24 +1,24 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
global $mo2f_dirName;
|
4 |
-
if(current_user_can( 'manage_options' ) && isset($_POST['mo_wpns_features']))
|
5 |
-
{
|
6 |
-
switch(sanitize_text_field(wp_unslash($_POST['mo_wpns_features'])))
|
7 |
-
{
|
8 |
-
case "mo_wpns_2fa_with_network_security":
|
9 |
-
$security_features = new Mo_2fa_security_features();
|
10 |
-
$security_features->wpns_2fa_with_network_security($_POST); break;
|
11 |
-
case "mo_wpns_2fa_features":
|
12 |
-
$security_features = new Mo_2fa_security_features();
|
13 |
-
$security_features->wpns_2fa_features_only(); break;
|
14 |
-
|
15 |
-
|
16 |
-
}
|
17 |
-
}
|
18 |
-
|
19 |
-
|
20 |
-
$network_security_features= MoWpnsUtility::get_mo2f_db_option('mo_wpns_2fa_with_network_security', 'get_option') ? "checked" : "";
|
21 |
-
|
22 |
-
|
23 |
-
|
24 |
// include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'network_security_features.php';
|
1 |
+
<?php
|
2 |
+
|
3 |
+
global $mo2f_dirName;
|
4 |
+
if(current_user_can( 'manage_options' ) && isset($_POST['mo_wpns_features']))
|
5 |
+
{
|
6 |
+
switch(sanitize_text_field(wp_unslash($_POST['mo_wpns_features'])))
|
7 |
+
{
|
8 |
+
case "mo_wpns_2fa_with_network_security":
|
9 |
+
$security_features = new Mo_2fa_security_features();
|
10 |
+
$security_features->wpns_2fa_with_network_security($_POST); break;
|
11 |
+
case "mo_wpns_2fa_features":
|
12 |
+
$security_features = new Mo_2fa_security_features();
|
13 |
+
$security_features->wpns_2fa_features_only(); break;
|
14 |
+
|
15 |
+
|
16 |
+
}
|
17 |
+
}
|
18 |
+
|
19 |
+
|
20 |
+
$network_security_features= MoWpnsUtility::get_mo2f_db_option('mo_wpns_2fa_with_network_security', 'get_option') ? "checked" : "";
|
21 |
+
|
22 |
+
|
23 |
+
|
24 |
// include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'network_security_features.php';
|
controllers/pointers.php
CHANGED
@@ -1,581 +1,581 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
$pointers = array();
|
4 |
-
$tab= 'default';
|
5 |
-
if(array_key_exists('tab',$_GET))
|
6 |
-
$tab = sanitize_text_field($_GET['tab']);
|
7 |
-
|
8 |
-
if(MoWpnsUtility::get_mo2f_db_option('mo2f_two_factor_tour', 'get_option') ==1)
|
9 |
-
|
10 |
-
{
|
11 |
-
$pointers['default-miniorange-2fa-select-authentication'] = array(
|
12 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Select Authentication Method (Step 1 out of 9)' ) ),
|
13 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'Choose your Two Factor authentication method.' ) ),
|
14 |
-
'anchor_id' => '#mo2f_save_free_plan_auth_methods_form',
|
15 |
-
'isdefault' => 'yes',
|
16 |
-
'edge' => 'bottom',
|
17 |
-
'align' => 'middle',
|
18 |
-
'index' => 'default-miniorange-2fa-select-authentication',
|
19 |
-
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
20 |
-
);
|
21 |
-
$pointers['default-miniorange-2fa-configure'] = array(
|
22 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Click on configure(Step 2 out of 9)' ) ),
|
23 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'Setup the two-factor authentication here.' ) ),
|
24 |
-
'anchor_id' => '#GoogleAuthenticator_configuration',
|
25 |
-
'isdefault' => 'yes',
|
26 |
-
'edge' => 'top',
|
27 |
-
'align' => 'left',
|
28 |
-
'index' => 'default-miniorange-2fa-configure',
|
29 |
-
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
30 |
-
);
|
31 |
-
|
32 |
-
$pointers['default-miniorange-2fa-choose_app'] = array(
|
33 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Choose the app type(Step 1 out of 6)' ) ),
|
34 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'Choose the app which you want to use as the second factor' ) ),
|
35 |
-
'anchor_id' => '#mo2f_choose_app_tour',
|
36 |
-
'isdefault' => 'yes',
|
37 |
-
'edge' => 'left',
|
38 |
-
'align' => 'left',
|
39 |
-
'index' => 'default-miniorange-2fa-choose_app1',
|
40 |
-
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
41 |
-
);
|
42 |
-
|
43 |
-
$pointers['default-miniorange-2fa-download_app'] = array(
|
44 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Download app(Step 2 out of 6)' ) ),
|
45 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'If you do not have app in your phone then you can donwload the app here.' ) ),
|
46 |
-
'anchor_id' => '#links_to_apps_tour',
|
47 |
-
'isdefault' => 'yes',
|
48 |
-
'edge' => 'left',
|
49 |
-
'align' => 'left',
|
50 |
-
'index' => 'default-miniorange-2fa-download_app1',
|
51 |
-
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
52 |
-
);
|
53 |
-
|
54 |
-
|
55 |
-
$pointers['default-miniorange-2fa-scan-qrcode'] = array(
|
56 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Scan the QR code(Step 3 out of 6)' ) ),
|
57 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'Scan the QR code with your app on your phone.' ) ),
|
58 |
-
'anchor_id' => '#displayGAQrCodeTour',
|
59 |
-
'isdefault' => 'yes',
|
60 |
-
'edge' => 'left',
|
61 |
-
'align' => 'left',
|
62 |
-
'index' => 'default-miniorange-2fa-scan-qrcode1',
|
63 |
-
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
64 |
-
);
|
65 |
-
$pointers['default-miniorange-2fa-choose_name_on_app'] = array(
|
66 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Choose app name(Step 4 out of 6)' ) ),
|
67 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can choose the app name which you want to display on your app for the code.' ) ),
|
68 |
-
'anchor_id' => '#mo2f_change_app_name',
|
69 |
-
'isdefault' => 'yes',
|
70 |
-
'edge' => 'left',
|
71 |
-
'align' => 'left',
|
72 |
-
'index' => 'default-miniorange-2fa-choose_name_on_app1',
|
73 |
-
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
74 |
-
);
|
75 |
-
|
76 |
-
$pointers['default-miniorange-2fa-enter_code_manually'] = array(
|
77 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Can\'t scan the QR code?(Step 5 out of 6)' ) ),
|
78 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'If you can not scan the QR code then you can follow these steps to configure the two-factor without scanning the code.' ) ),
|
79 |
-
'anchor_id' => '#mo2f_scanbarcode_a',
|
80 |
-
'isdefault' => 'yes',
|
81 |
-
'edge' => 'left',
|
82 |
-
'align' => 'left',
|
83 |
-
'index' => 'default-miniorange-2fa-enter_code_manually1',
|
84 |
-
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
85 |
-
);
|
86 |
-
|
87 |
-
$pointers['default-miniorange-2fa-enter-otp'] = array(
|
88 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Enter the OTP(Step 6 of 6)' ) ),
|
89 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'After Scanning the QR code please enter the OTP generated in the app on your phone.' ) ),
|
90 |
-
'anchor_id' => '#EnterOTPGATour',
|
91 |
-
'isdefault' => 'yes',
|
92 |
-
'edge' => 'right',
|
93 |
-
'align' => 'left',
|
94 |
-
'index' => 'default-miniorange-2fa-enter-otp1',
|
95 |
-
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
96 |
-
);
|
97 |
-
$pointers['default-miniorange-2fa-save-otp'] = array(
|
98 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Verify and Save(Step 7 of 7)' ) ),
|
99 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'Verify and Save the google-authentication code.' ) ),
|
100 |
-
'anchor_id' => '#SaveOTPGATour',
|
101 |
-
'isdefault' => 'yes',
|
102 |
-
'edge' => 'right',
|
103 |
-
'align' => 'left',
|
104 |
-
'index' => 'default-miniorange-2fa-save-otp1',
|
105 |
-
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
106 |
-
);
|
107 |
-
$pointers['default-miniorange-2fa-test'] = array(
|
108 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Test the method(Step 3 out of 9).' ) ),
|
109 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'After configuring the 2-factor you can test it here by clicking on Test button.' ) ),
|
110 |
-
'anchor_id' => '#test',
|
111 |
-
'isdefault' => 'yes',
|
112 |
-
'edge' => 'right',
|
113 |
-
'align' => 'left',
|
114 |
-
'index' => 'default-miniorange-2fa-test',
|
115 |
-
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
116 |
-
);
|
117 |
-
|
118 |
-
$pointers['default-miniorange-2fa-customizations'] = array(
|
119 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Temporary disable two-factor(Step 4 of 9)' ) ),
|
120 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'While testing if you need to disable the plugin. You can do it from here.' ) ),
|
121 |
-
'anchor_id' => '#disable_two_factor_tour',
|
122 |
-
'isdefault' => 'yes',
|
123 |
-
'edge' => 'top',
|
124 |
-
'align' => 'left',
|
125 |
-
'index' => 'default-miniorange-2fa-customizations',
|
126 |
-
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
127 |
-
);
|
128 |
-
$pointers['default-miniorange-2fa-inline-registration'] = array(
|
129 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'User Enrollment(Step 5 of 9)' ) ),
|
130 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can force two-factor setup of login for other user here.' ) ),
|
131 |
-
'anchor_id' => '#mo2f_inline_registration_tour',
|
132 |
-
'isdefault' => 'yes',
|
133 |
-
'edge' => 'top',
|
134 |
-
'align' => 'left',
|
135 |
-
'index' => 'default-miniorange-2fa-inline-registration',
|
136 |
-
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
137 |
-
);
|
138 |
-
$pointers['default-minorange-2fa-integration'] = array(
|
139 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Integrate 2fa with custom forms(Step 6 of 9)' ) ),
|
140 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'We support almost all worpdress forms and some popular forms are listed here. If your form is not in the list you can contact us.' ) ),
|
141 |
-
'anchor_id' => '#custom_form_2fa_div',
|
142 |
-
'isdefault' => 'yes',
|
143 |
-
'edge' => 'bottom',
|
144 |
-
'align' => 'middle',
|
145 |
-
'index' => 'default-minorange-2fa-integration',
|
146 |
-
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
147 |
-
);
|
148 |
-
$pointers['default-minorange-2fa-premium-features'] = array(
|
149 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Premium features (Step 7 of 9)' ) ),
|
150 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check what features you will get in the premium and upgrade to your preferred plan.' ) ),
|
151 |
-
'anchor_id' => '#custom_login_2fa',
|
152 |
-
'isdefault' => 'yes',
|
153 |
-
'edge' => 'left',
|
154 |
-
'align' => 'left',
|
155 |
-
'index' => 'default-minorange-2fa-premium-features',
|
156 |
-
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
157 |
-
);
|
158 |
-
|
159 |
-
$pointers['default-miniorange-2fa-upgrade'] = array(
|
160 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Upgrade your plan(step 8 out of 9)' ) ),
|
161 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check the premium features and upgrade your plan here.' ) ),
|
162 |
-
'anchor_id' => '#mo_2fa_upgrade_tour',
|
163 |
-
'isdefault' => 'yes',
|
164 |
-
'edge' => 'top',
|
165 |
-
'align' => 'left',
|
166 |
-
'index' => 'default-miniorange-2fa-upgrade',
|
167 |
-
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
168 |
-
);
|
169 |
-
$pointers['default-miniorange-2fa-support_open'] = array(
|
170 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Contact us!!(step 9 out of 9)' ) ),
|
171 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'Need Help? We are just one click away.' ) ),
|
172 |
-
'anchor_id' => '#mo_wpns_support_layout_tour',
|
173 |
-
'isdefault' => 'yes',
|
174 |
-
'edge' => 'bottom',
|
175 |
-
'align' => 'right',
|
176 |
-
'index' => 'default-miniorange-2fa-support_open',
|
177 |
-
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
178 |
-
);
|
179 |
-
|
180 |
-
|
181 |
-
}
|
182 |
-
if(get_option('mo2f_tour_firewall') == 1 ){
|
183 |
-
$pointers['default-miniorange-firewall-level'] = array(
|
184 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Choose your level of the firewall(step 1 out of 7)' ) ),
|
185 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'Choose on which level you want to enable firewall. htaccess level is the recommended one.' ) ),
|
186 |
-
'anchor_id' => '#mo_waf_options_tour',
|
187 |
-
'isfirewall'=> 'yes',
|
188 |
-
'edge' => 'top',
|
189 |
-
'align' => 'left',
|
190 |
-
'index' => 'default-miniorange-firewall-level',
|
191 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_waf' ) // <-- Please note this
|
192 |
-
);
|
193 |
-
$pointers['default-miniorange-firewall-attacks'] = array(
|
194 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Select the types of attacks you want to stop.(step 2 out of 7)' ) ),
|
195 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'Enable attack protection here for different attacks.' ) ),
|
196 |
-
'anchor_id' => '#mo2f_AttackTypes',
|
197 |
-
'isfirewall'=> 'yes',
|
198 |
-
'edge' => 'bottom',
|
199 |
-
'align' => 'left',
|
200 |
-
'index' => 'default-miniorange-firewall-attacks',
|
201 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_waf' ) // <-- Please note this
|
202 |
-
);
|
203 |
-
$pointers['default-miniorange-firewall-attack-limit'] = array(
|
204 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Choose attack limit(step 3 out of 7)' ) ),
|
205 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'Choose the number of attacks an IP can make before getting blocked. If an IP reach the limit it will be blocked on the next attack.' ) ),
|
206 |
-
'anchor_id' => '#mo2f_waf_block_after',
|
207 |
-
'isfirewall'=> 'yes',
|
208 |
-
'edge' => 'bottom',
|
209 |
-
'align' => 'left',
|
210 |
-
'index' => 'default-miniorange-firewall-attack-limit',
|
211 |
-
'align' => 'left',
|
212 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_waf' ) // <-- Please note this
|
213 |
-
);
|
214 |
-
|
215 |
-
$pointers['default-miniorange-firewall-rate-limit'] = array(
|
216 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Turn on rate limiting(step 4 out of 7)' ) ),
|
217 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'Turn on rate limiting to protect from Dos attack. Choose request limit and action for rate limiting.' ) ),
|
218 |
-
'anchor_id' => '#mo2f_ratelimiting',
|
219 |
-
'isfirewall'=> 'yes',
|
220 |
-
'edge' => 'top',
|
221 |
-
'align' => 'left',
|
222 |
-
'index' => 'default-miniorange-firewall-rate-limit',
|
223 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_waf' ) // <-- Please note this
|
224 |
-
);
|
225 |
-
$pointers['default-miniorange-firewall-check-attacks'] = array(
|
226 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Check blocked IPs and attacks.(step 5 out of 7)' ) ),
|
227 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check the Information about blocked IPs and Attacks here.' ) ),
|
228 |
-
'anchor_id' => '#mo2f_firewall_attack_dash',
|
229 |
-
'isfirewall'=> 'yes',
|
230 |
-
'edge' => 'top',
|
231 |
-
'align' => 'left',
|
232 |
-
'index' => 'default-miniorange-firewall-check-attacks',
|
233 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_waf' ) // <-- Please note this
|
234 |
-
);
|
235 |
-
$pointers['default-miniorange-2fa-upgrade'] = array(
|
236 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Upgrade your plan (step 6 out of 7)' ) ),
|
237 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check the premium features and upgrade your plan here.' ) ),
|
238 |
-
'anchor_id' => '#mo_2fa_upgrade_tour',
|
239 |
-
'isfirewall' => 'yes',
|
240 |
-
'edge' => 'top',
|
241 |
-
'align' => 'left',
|
242 |
-
'index' => 'default-miniorange-2fa-upgrade',
|
243 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_waf' ) // <-- Please note this
|
244 |
-
);
|
245 |
-
|
246 |
-
$pointers['default-miniorange-firewall-support'] = array(
|
247 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Contact us!!(step 7 out of 7)' ) ),
|
248 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'Need Help? We are just one click away.' ) ),
|
249 |
-
'anchor_id' => '#mo_wpns_support_layout_tour',
|
250 |
-
'isfirewall' => 'yes',
|
251 |
-
'edge' => 'bottom',
|
252 |
-
'align' => 'left',
|
253 |
-
'index' => 'default-miniorange-firewall-support',
|
254 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_waf' ) // <-- Please note this
|
255 |
-
);
|
256 |
-
|
257 |
-
}
|
258 |
-
|
259 |
-
if(get_option('mo2f_tour_malware_scan') ==1){
|
260 |
-
$pointers['default-miniorange-malware-scan-modes'] = array(
|
261 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Scanning Modes (Step 1 of 6)' ) ),
|
262 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'Choose the Scanning mode ' ) ),
|
263 |
-
'anchor_id' => '#scan_status_table',
|
264 |
-
'ismalware' => 'yes',
|
265 |
-
'edge' => 'bottom',
|
266 |
-
'align' => 'left',
|
267 |
-
'index' => 'default-miniorange-malware-scan-modes',
|
268 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_malwarescan' ) // <-- Please note this
|
269 |
-
);
|
270 |
-
$pointers['default-miniorange-malware-custom-scan-files'] = array(
|
271 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Select files from custom scan (Step 2 of 6)' ) ),
|
272 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can select the files you want to scan. Just select the files and start the custom scan' ) ),
|
273 |
-
'anchor_id' => '#mo2f_select_scanning_files',
|
274 |
-
'ismalware' => 'yes',
|
275 |
-
'edge' => 'bottom',
|
276 |
-
'align' => 'left',
|
277 |
-
'index' => 'default-miniorange-malware-custom-scan-files',
|
278 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_malwarescan' ) // <-- Please note this
|
279 |
-
);
|
280 |
-
$pointers['default-miniorange-malware-scan-reports'] = array(
|
281 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Scan report.(Step 3 of 6)' ) ),
|
282 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check the scan report here.' ) ),
|
283 |
-
'anchor_id' => '#scan_report_table',
|
284 |
-
'ismalware' => 'yes',
|
285 |
-
'edge' => 'top',
|
286 |
-
'align' => 'left',
|
287 |
-
'index' => 'default-miniorange-malware-scan-reports',
|
288 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_malwarescan' ) // <-- Please note this
|
289 |
-
);
|
290 |
-
|
291 |
-
$pointers['default-miniorange-malware-scan-dashboard'] = array(
|
292 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Scan dashboard (Step 4 of 6)' ) ),
|
293 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check the Information about the files being scanned currently, files scanned in last scans & Infected files' ) ),
|
294 |
-
'anchor_id' => '#mo2f_scan_dash',
|
295 |
-
'ismalware' => 'yes',
|
296 |
-
'edge' => 'top',
|
297 |
-
'align' => 'left',
|
298 |
-
'index' => 'default-miniorange-malware-scan-dashboard',
|
299 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_malwarescan' ) // <-- Please note this
|
300 |
-
);
|
301 |
-
$pointers['default-miniorange-2fa-upgrade'] = array(
|
302 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Upgrade your plan(step 5 out of 6)' ) ),
|
303 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check the premium features and upgrade your plan here.' ) ),
|
304 |
-
'anchor_id' => '#mo_2fa_upgrade_tour',
|
305 |
-
'ismalware' => 'yes',
|
306 |
-
'edge' => 'top',
|
307 |
-
'align' => 'left',
|
308 |
-
'index' => 'default-miniorange-2fa-upgrade',
|
309 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_malwarescan' ) // <-- Please note this
|
310 |
-
);
|
311 |
-
|
312 |
-
$pointers['default-miniorange-malware-support'] = array(
|
313 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Contact us!!(step 6 out of 6)' ) ),
|
314 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'Need Help? We are just one click away.' ) ),
|
315 |
-
'anchor_id' => '#mo_wpns_support_layout_tour',
|
316 |
-
'ismalware' => 'yes',
|
317 |
-
'edge' => 'bottom',
|
318 |
-
'align' => 'left',
|
319 |
-
'index' => 'default-miniorange-malware-support',
|
320 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_malwarescan' ) // <-- Please note this
|
321 |
-
);
|
322 |
-
|
323 |
-
}
|
324 |
-
|
325 |
-
if(get_option('mo2f_tour_advance_blocking') ==1){
|
326 |
-
$pointers['default-miniorange-advance-blocking-IP-blocking'] = array(
|
327 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Manual IP Blocking (Step 1 of 9)' ) ),
|
328 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can block a specific IP. Access for that IP will be blocked for your site.' ) ),
|
329 |
-
'anchor_id' => '#mo2f_manual_ip_blocking',
|
330 |
-
'advcblock' => 'yes',
|
331 |
-
'edge' => 'top',
|
332 |
-
'align' => 'left',
|
333 |
-
'index' => 'default-miniorange-advance-blocking-IP-blocking',
|
334 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_advancedblocking' ) // <-- Please note this
|
335 |
-
);
|
336 |
-
$pointers['default-miniorange-advance-blocking-IP-whitelisting'] = array(
|
337 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Whitelist IP (Step 2 of 9)' ) ),
|
338 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can Whitelist a specific IP. The IP will never get blocked on your site.' ) ),
|
339 |
-
'anchor_id' => '#mo2f_ip_whitelisting',
|
340 |
-
'advcblock' => 'yes',
|
341 |
-
'edge' => 'top',
|
342 |
-
'align' => 'left',
|
343 |
-
'index' => 'default-miniorange-advance-blocking-IP-whitelisting',
|
344 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_advancedblocking' ) // <-- Please note this
|
345 |
-
);
|
346 |
-
|
347 |
-
$pointers['default-miniorange-advance-blocking-IP-lookup'] = array(
|
348 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Lookup IP(Step 3 of 9)' ) ),
|
349 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can get details of an IP here. Example country, city, etc.' ) ),
|
350 |
-
'anchor_id' => '#mo2f_ip_lookup',
|
351 |
-
'advcblock' => 'yes',
|
352 |
-
'edge' => 'bottom',
|
353 |
-
'align' => 'left',
|
354 |
-
'index' => 'default-miniorange-advance-blocking-IP-lookup',
|
355 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_advancedblocking' ) // <-- Please note this
|
356 |
-
);
|
357 |
-
|
358 |
-
|
359 |
-
$pointers['default-miniorange-advance-blocking-IP-range'] = array(
|
360 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'IP range Blocking.(Step 4 of 9)' ) ),
|
361 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can block a specific range of IPs. Access from those IP will be blocked for your site.' ) ),
|
362 |
-
'anchor_id' => '#mo2f_ip_range_blocking',
|
363 |
-
'advcblock' => 'yes',
|
364 |
-
'edge' => 'top',
|
365 |
-
'align' => 'left',
|
366 |
-
'index' => 'default-miniorange-advance-blocking-IP-range',
|
367 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_advancedblocking' ) // <-- Please note this
|
368 |
-
);
|
369 |
-
$pointers['default-miniorange-advance-blocking-htaccess-blocking'] = array(
|
370 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Htaccess Blocking (Step 5 of 9)' ) ),
|
371 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'htaccess level blocking will block the IP before wordpress load on your site. So it will minimize server resources from illegitimate users.' ) ),
|
372 |
-
'anchor_id' => '#mo2f_htaccess_blocking',
|
373 |
-
'advcblock' => 'yes',
|
374 |
-
'edge' => 'top',
|
375 |
-
'align' => 'left',
|
376 |
-
'index' => 'default-miniorange-advance-blocking-htaccess-blocking',
|
377 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_advancedblocking' ) // <-- Please note this
|
378 |
-
);
|
379 |
-
$pointers['default-miniorange-advance-blocking-browser-blocking'] = array(
|
380 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Browser Blocking (Step 6 of 9)' ) ),
|
381 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can block specific browser from which you don\'t want users to access.' ) ),
|
382 |
-
'anchor_id' => '#mo2f_browser_blocking',
|
383 |
-
'advcblock' => 'yes',
|
384 |
-
'edge' => 'top',
|
385 |
-
'align' => 'left',
|
386 |
-
'index' => 'default-miniorange-advance-blocking-browser-blocking',
|
387 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_advancedblocking' ) // <-- Please note this
|
388 |
-
);
|
389 |
-
$pointers['default-miniorange-advance-blocking-country-blocking'] = array(
|
390 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Country Blocking (Step 7 of 9)' ) ),
|
391 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can choose the countries from where you don\'t want access to your site.' ) ),
|
392 |
-
'anchor_id' => '#mo2f_country_blocking',
|
393 |
-
'advcblock' => 'yes',
|
394 |
-
'edge' => 'bottom',
|
395 |
-
'align' => 'left',
|
396 |
-
'index' => 'default-miniorange-advance-blocking-country-blocking',
|
397 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_advancedblocking' ) // <-- Please note this
|
398 |
-
);
|
399 |
-
|
400 |
-
$pointers['default-miniorange-2fa-upgrade'] = array(
|
401 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Upgrade your plan (step 8 out of 9)' ) ),
|
402 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check the premium features and upgrade your plan here.' ) ),
|
403 |
-
'anchor_id' => '#mo_2fa_upgrade_tour',
|
404 |
-
'advcblock' => 'yes',
|
405 |
-
'edge' => 'top',
|
406 |
-
'align' => 'left',
|
407 |
-
'index' => 'default-miniorange-2fa-upgrade',
|
408 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_advancedblocking' ) // <-- Please note this
|
409 |
-
);
|
410 |
-
$pointers['default-miniorange-advance-blocking-support'] = array(
|
411 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Contact us!!(step 9 out of 9)' ) ),
|
412 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'Need Help? We are just one click away.' ) ),
|
413 |
-
'anchor_id' => '#mo_wpns_support_layout_tour',
|
414 |
-
'advcblock' => 'yes',
|
415 |
-
'edge' => 'bottom',
|
416 |
-
'align' => 'left',
|
417 |
-
'index' => 'default-miniorange-advance-blocking-support',
|
418 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_advancedblocking' ) // <-- Please note this
|
419 |
-
);
|
420 |
-
|
421 |
-
}
|
422 |
-
|
423 |
-
|
424 |
-
if(get_option('mo2f_tour_backup') == 1 ){
|
425 |
-
$pointers['default-miniorange-backup-manual-db'] = array(
|
426 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Manual database backup.(Step 1 of 6)' ) ),
|
427 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can take manual database backup here.The backup will be saved in your uploads directory.' ) ),
|
428 |
-
'anchor_id' => '#mo2f_select_files_backup',
|
429 |
-
'isBackup'=> 'yes',
|
430 |
-
'edge' => 'top',
|
431 |
-
'align' => 'left',
|
432 |
-
'index' => 'default-miniorange-backup-manual-db',
|
433 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_backup' ) // <-- Please note this
|
434 |
-
);
|
435 |
-
$pointers['default-miniorange-backup-auto-db'] = array(
|
436 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Scheduled/Automated Database backups.(Step 2 of 6)' ) ),
|
437 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'With the help of this you can specify the time duration after which an automatic backup will be taken.' ) ),
|
438 |
-
'anchor_id' => '#mo2f_auto_dbbackup',
|
439 |
-
'isBackup'=> 'yes',
|
440 |
-
'edge' => 'bottom',
|
441 |
-
'align' => 'left',
|
442 |
-
'index' => 'default-miniorange-backup-auto-db',
|
443 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_backup' ) // <-- Please note this
|
444 |
-
);
|
445 |
-
$pointers['default-miniorange-backup-file'] = array(
|
446 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Auto backup status(Step 3 of 6)' ) ),
|
447 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check the auto backup status.' ) ),
|
448 |
-
'anchor_id' => '#mo2f_schedule_backup_status',
|
449 |
-
'isBackup'=> 'yes',
|
450 |
-
'edge' => 'top',
|
451 |
-
'align' => 'left',
|
452 |
-
'index' => 'default-miniorange-backup-file',
|
453 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_backup' ) // <-- Please note this
|
454 |
-
);
|
455 |
-
$pointers['default-miniorange-backup-report'] = array(
|
456 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Report of backups.(Step 4 of 6)' ) ),
|
457 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check backup taken details.' ) ),
|
458 |
-
'anchor_id' => '#backup_report_table',
|
459 |
-
'isBackup'=> 'yes',
|
460 |
-
'edge' => 'bottom',
|
461 |
-
'align' => 'left',
|
462 |
-
'index' => 'default-miniorange-backup-report',
|
463 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_backup' ) // <-- Please note this
|
464 |
-
);
|
465 |
-
|
466 |
-
$pointers['default-miniorange-2fa-upgrade'] = array(
|
467 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Upgrade your plan (step 5 out of 6)' ) ),
|
468 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check the premium features and upgrade your plan here.' ) ),
|
469 |
-
'anchor_id' => '#mo_2fa_upgrade_tour',
|
470 |
-
'isBackup' => 'yes',
|
471 |
-
'edge' => 'top',
|
472 |
-
'align' => 'left',
|
473 |
-
'index' => 'default-miniorange-2fa-upgrade',
|
474 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_backup' ) // <-- Please note this
|
475 |
-
);
|
476 |
-
$pointers['default-miniorange-backup-support'] = array(
|
477 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Contact us!!(step 6 out of 6)' ) ),
|
478 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'Need Help? We are just one click away.' ) ),
|
479 |
-
'anchor_id' => '#mo_wpns_support_layout_tour',
|
480 |
-
'isBackup' => 'yes',
|
481 |
-
'edge' => 'bottom',
|
482 |
-
'align' => 'left',
|
483 |
-
'index' => 'default-miniorange-backup-support',
|
484 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_backup' ) // <-- Please note this
|
485 |
-
);
|
486 |
-
|
487 |
-
}
|
488 |
-
|
489 |
-
if(get_option('mo2f_tour_loginSpam') == 1){
|
490 |
-
$pointers['default-miniorange-login-spam-bruteforce'] = array(
|
491 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Enable BruteForce protection.(step 1 out of 8)' ) ),
|
492 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'Choose the number of attempts before blocking an IP on login page. It will protect you from bruteforce attack.' ) ),
|
493 |
-
'anchor_id' => '#mo2f_bruteforce',
|
494 |
-
'loginSpam' => 'yes',
|
495 |
-
'edge' => 'top',
|
496 |
-
'align' => 'left',
|
497 |
-
'index' => 'default-miniorange-login-spam-bruteforce',
|
498 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_login_and_spam' ) // <-- Please note this
|
499 |
-
);
|
500 |
-
$pointers['default-miniorange-login-spam-recaptcha'] = array(
|
501 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Enable google reCaptcha.(step 2 out of 8)' ) ),
|
502 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'Enable google reCaptcha ' ) ),
|
503 |
-
'anchor_id' => '#mo2f_google_recaptcha',
|
504 |
-
'loginSpam' => 'yes',
|
505 |
-
'edge' => 'top',
|
506 |
-
'align' => 'left',
|
507 |
-
'index' => 'default-miniorange-login-spam-recaptcha',
|
508 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_login_and_spam' ) // <-- Please note this
|
509 |
-
);
|
510 |
-
$pointers['default-miniorange-login-spam-strong-pass'] = array(
|
511 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Enforce strong password(step 3 out of 8)' ) ),
|
512 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'Enforce strong password to your users so that their account will not get hacked easily.' ) ),
|
513 |
-
'anchor_id' => '#mo2f_enforce_strong_password_div',
|
514 |
-
'loginSpam' => 'yes',
|
515 |
-
'edge' => 'bottom',
|
516 |
-
'align' => 'left',
|
517 |
-
'index' => 'default-miniorange-login-spam-strong-pass',
|
518 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_login_and_spam' ) // <-- Please note this
|
519 |
-
);
|
520 |
-
|
521 |
-
$pointers['default-miniorange-login-spam-fake-registration'] = array(
|
522 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Turn on block fake registration(step 4 out of 8)' ) ),
|
523 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'This will block fake registration on your site.' ) ),
|
524 |
-
'anchor_id' => '#mo2f_block_registration',
|
525 |
-
'loginSpam' => 'yes',
|
526 |
-
'edge' => 'top',
|
527 |
-
'align' => 'left',
|
528 |
-
'index' => 'default-miniorange-login-spam-fake-registration',
|
529 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_login_and_spam' ) // <-- Please note this
|
530 |
-
);
|
531 |
-
$pointers['default-miniorange-login-spam-content'] = array(
|
532 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Content Protection.(step 5 out of 8)' ) ),
|
533 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can protect your content which is directly accessible from path/URL by anyone.' ) ),
|
534 |
-
'anchor_id' => '#mo2f_content_protection',
|
535 |
-
'loginSpam' => 'yes',
|
536 |
-
'edge' => 'bottom',
|
537 |
-
'align' => 'left',
|
538 |
-
'index' => 'default-miniorange-login-spam-content',
|
539 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_login_and_spam' ) // <-- Please note this
|
540 |
-
);
|
541 |
-
$pointers['default-miniorange-login-spam-block-spam'] = array(
|
542 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Block Spam Comment(Step 6 out of 8)' ) ),
|
543 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'Block automated scripts and bots on comment.' ) ),
|
544 |
-
'anchor_id' => '#mo2f_comment_protection',
|
545 |
-
'loginSpam' => 'yes',
|
546 |
-
'edge' => 'bottom',
|
547 |
-
'align' => 'left',
|
548 |
-
'index' => 'default-miniorange-login-spam-block-spam',
|
549 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_login_and_spam' ) // <-- Please note this
|
550 |
-
);
|
551 |
-
$pointers['default-miniorange-2fa-upgrade'] = array(
|
552 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Upgrade your plan(step 7 out of 8)' ) ),
|
553 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check the premium features and upgrade your plan here.' ) ),
|
554 |
-
'anchor_id' => '#mo_2fa_upgrade_tour',
|
555 |
-
'loginSpam' => 'yes',
|
556 |
-
'edge' => 'top',
|
557 |
-
'align' => 'left',
|
558 |
-
'index' => 'default-miniorange-2fa-upgrade',
|
559 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_login_and_spam' ) // <-- Please note this
|
560 |
-
);
|
561 |
-
|
562 |
-
$pointers['default-miniorange-login-spam-support'] = array(
|
563 |
-
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Contact us!!(step 8 out of 8)' ) ),
|
564 |
-
'content' => sprintf( '<p>%s</p>', esc_html__( 'Need Help? We are just one click away.' ) ),
|
565 |
-
'anchor_id' => '#mo_wpns_support_layout_tour',
|
566 |
-
'loginSpam' => 'yes',
|
567 |
-
'edge' => 'bottom',
|
568 |
-
'align' => 'left',
|
569 |
-
'index' => 'default-miniorange-login-spam-support',
|
570 |
-
'where' => array( 'miniorange-2-factor_page_mo_2fa_login_and_spam' ) // <-- Please note this
|
571 |
-
);
|
572 |
-
|
573 |
-
|
574 |
-
}
|
575 |
-
|
576 |
-
|
577 |
-
|
578 |
-
|
579 |
-
|
580 |
-
|
581 |
-
return $pointers;
|
1 |
+
<?php
|
2 |
+
|
3 |
+
$pointers = array();
|
4 |
+
$tab= 'default';
|
5 |
+
if(array_key_exists('tab',$_GET))
|
6 |
+
$tab = sanitize_text_field($_GET['tab']);
|
7 |
+
|
8 |
+
if(MoWpnsUtility::get_mo2f_db_option('mo2f_two_factor_tour', 'get_option') ==1)
|
9 |
+
|
10 |
+
{
|
11 |
+
$pointers['default-miniorange-2fa-select-authentication'] = array(
|
12 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Select Authentication Method (Step 1 out of 9)' ) ),
|
13 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'Choose your Two Factor authentication method.' ) ),
|
14 |
+
'anchor_id' => '#mo2f_save_free_plan_auth_methods_form',
|
15 |
+
'isdefault' => 'yes',
|
16 |
+
'edge' => 'bottom',
|
17 |
+
'align' => 'middle',
|
18 |
+
'index' => 'default-miniorange-2fa-select-authentication',
|
19 |
+
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
20 |
+
);
|
21 |
+
$pointers['default-miniorange-2fa-configure'] = array(
|
22 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Click on configure(Step 2 out of 9)' ) ),
|
23 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'Setup the two-factor authentication here.' ) ),
|
24 |
+
'anchor_id' => '#GoogleAuthenticator_configuration',
|
25 |
+
'isdefault' => 'yes',
|
26 |
+
'edge' => 'top',
|
27 |
+
'align' => 'left',
|
28 |
+
'index' => 'default-miniorange-2fa-configure',
|
29 |
+
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
30 |
+
);
|
31 |
+
|
32 |
+
$pointers['default-miniorange-2fa-choose_app'] = array(
|
33 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Choose the app type(Step 1 out of 6)' ) ),
|
34 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'Choose the app which you want to use as the second factor' ) ),
|
35 |
+
'anchor_id' => '#mo2f_choose_app_tour',
|
36 |
+
'isdefault' => 'yes',
|
37 |
+
'edge' => 'left',
|
38 |
+
'align' => 'left',
|
39 |
+
'index' => 'default-miniorange-2fa-choose_app1',
|
40 |
+
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
41 |
+
);
|
42 |
+
|
43 |
+
$pointers['default-miniorange-2fa-download_app'] = array(
|
44 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Download app(Step 2 out of 6)' ) ),
|
45 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'If you do not have app in your phone then you can donwload the app here.' ) ),
|
46 |
+
'anchor_id' => '#links_to_apps_tour',
|
47 |
+
'isdefault' => 'yes',
|
48 |
+
'edge' => 'left',
|
49 |
+
'align' => 'left',
|
50 |
+
'index' => 'default-miniorange-2fa-download_app1',
|
51 |
+
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
52 |
+
);
|
53 |
+
|
54 |
+
|
55 |
+
$pointers['default-miniorange-2fa-scan-qrcode'] = array(
|
56 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Scan the QR code(Step 3 out of 6)' ) ),
|
57 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'Scan the QR code with your app on your phone.' ) ),
|
58 |
+
'anchor_id' => '#displayGAQrCodeTour',
|
59 |
+
'isdefault' => 'yes',
|
60 |
+
'edge' => 'left',
|
61 |
+
'align' => 'left',
|
62 |
+
'index' => 'default-miniorange-2fa-scan-qrcode1',
|
63 |
+
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
64 |
+
);
|
65 |
+
$pointers['default-miniorange-2fa-choose_name_on_app'] = array(
|
66 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Choose app name(Step 4 out of 6)' ) ),
|
67 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can choose the app name which you want to display on your app for the code.' ) ),
|
68 |
+
'anchor_id' => '#mo2f_change_app_name',
|
69 |
+
'isdefault' => 'yes',
|
70 |
+
'edge' => 'left',
|
71 |
+
'align' => 'left',
|
72 |
+
'index' => 'default-miniorange-2fa-choose_name_on_app1',
|
73 |
+
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
74 |
+
);
|
75 |
+
|
76 |
+
$pointers['default-miniorange-2fa-enter_code_manually'] = array(
|
77 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Can\'t scan the QR code?(Step 5 out of 6)' ) ),
|
78 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'If you can not scan the QR code then you can follow these steps to configure the two-factor without scanning the code.' ) ),
|
79 |
+
'anchor_id' => '#mo2f_scanbarcode_a',
|
80 |
+
'isdefault' => 'yes',
|
81 |
+
'edge' => 'left',
|
82 |
+
'align' => 'left',
|
83 |
+
'index' => 'default-miniorange-2fa-enter_code_manually1',
|
84 |
+
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
85 |
+
);
|
86 |
+
|
87 |
+
$pointers['default-miniorange-2fa-enter-otp'] = array(
|
88 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Enter the OTP(Step 6 of 6)' ) ),
|
89 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'After Scanning the QR code please enter the OTP generated in the app on your phone.' ) ),
|
90 |
+
'anchor_id' => '#EnterOTPGATour',
|
91 |
+
'isdefault' => 'yes',
|
92 |
+
'edge' => 'right',
|
93 |
+
'align' => 'left',
|
94 |
+
'index' => 'default-miniorange-2fa-enter-otp1',
|
95 |
+
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
96 |
+
);
|
97 |
+
$pointers['default-miniorange-2fa-save-otp'] = array(
|
98 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Verify and Save(Step 7 of 7)' ) ),
|
99 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'Verify and Save the google-authentication code.' ) ),
|
100 |
+
'anchor_id' => '#SaveOTPGATour',
|
101 |
+
'isdefault' => 'yes',
|
102 |
+
'edge' => 'right',
|
103 |
+
'align' => 'left',
|
104 |
+
'index' => 'default-miniorange-2fa-save-otp1',
|
105 |
+
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
106 |
+
);
|
107 |
+
$pointers['default-miniorange-2fa-test'] = array(
|
108 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Test the method(Step 3 out of 9).' ) ),
|
109 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'After configuring the 2-factor you can test it here by clicking on Test button.' ) ),
|
110 |
+
'anchor_id' => '#test',
|
111 |
+
'isdefault' => 'yes',
|
112 |
+
'edge' => 'right',
|
113 |
+
'align' => 'left',
|
114 |
+
'index' => 'default-miniorange-2fa-test',
|
115 |
+
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
116 |
+
);
|
117 |
+
|
118 |
+
$pointers['default-miniorange-2fa-customizations'] = array(
|
119 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Temporary disable two-factor(Step 4 of 9)' ) ),
|
120 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'While testing if you need to disable the plugin. You can do it from here.' ) ),
|
121 |
+
'anchor_id' => '#disable_two_factor_tour',
|
122 |
+
'isdefault' => 'yes',
|
123 |
+
'edge' => 'top',
|
124 |
+
'align' => 'left',
|
125 |
+
'index' => 'default-miniorange-2fa-customizations',
|
126 |
+
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
127 |
+
);
|
128 |
+
$pointers['default-miniorange-2fa-inline-registration'] = array(
|
129 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'User Enrollment(Step 5 of 9)' ) ),
|
130 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can force two-factor setup of login for other user here.' ) ),
|
131 |
+
'anchor_id' => '#mo2f_inline_registration_tour',
|
132 |
+
'isdefault' => 'yes',
|
133 |
+
'edge' => 'top',
|
134 |
+
'align' => 'left',
|
135 |
+
'index' => 'default-miniorange-2fa-inline-registration',
|
136 |
+
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
137 |
+
);
|
138 |
+
$pointers['default-minorange-2fa-integration'] = array(
|
139 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Integrate 2fa with custom forms(Step 6 of 9)' ) ),
|
140 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'We support almost all worpdress forms and some popular forms are listed here. If your form is not in the list you can contact us.' ) ),
|
141 |
+
'anchor_id' => '#custom_form_2fa_div',
|
142 |
+
'isdefault' => 'yes',
|
143 |
+
'edge' => 'bottom',
|
144 |
+
'align' => 'middle',
|
145 |
+
'index' => 'default-minorange-2fa-integration',
|
146 |
+
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
147 |
+
);
|
148 |
+
$pointers['default-minorange-2fa-premium-features'] = array(
|
149 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Premium features (Step 7 of 9)' ) ),
|
150 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check what features you will get in the premium and upgrade to your preferred plan.' ) ),
|
151 |
+
'anchor_id' => '#custom_login_2fa',
|
152 |
+
'isdefault' => 'yes',
|
153 |
+
'edge' => 'left',
|
154 |
+
'align' => 'left',
|
155 |
+
'index' => 'default-minorange-2fa-premium-features',
|
156 |
+
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
157 |
+
);
|
158 |
+
|
159 |
+
$pointers['default-miniorange-2fa-upgrade'] = array(
|
160 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Upgrade your plan(step 8 out of 9)' ) ),
|
161 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check the premium features and upgrade your plan here.' ) ),
|
162 |
+
'anchor_id' => '#mo_2fa_upgrade_tour',
|
163 |
+
'isdefault' => 'yes',
|
164 |
+
'edge' => 'top',
|
165 |
+
'align' => 'left',
|
166 |
+
'index' => 'default-miniorange-2fa-upgrade',
|
167 |
+
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
168 |
+
);
|
169 |
+
$pointers['default-miniorange-2fa-support_open'] = array(
|
170 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Contact us!!(step 9 out of 9)' ) ),
|
171 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'Need Help? We are just one click away.' ) ),
|
172 |
+
'anchor_id' => '#mo_wpns_support_layout_tour',
|
173 |
+
'isdefault' => 'yes',
|
174 |
+
'edge' => 'bottom',
|
175 |
+
'align' => 'right',
|
176 |
+
'index' => 'default-miniorange-2fa-support_open',
|
177 |
+
'where' => array( 'toplevel_page_mo_2fa_two_fa' ) // <-- Please note this
|
178 |
+
);
|
179 |
+
|
180 |
+
|
181 |
+
}
|
182 |
+
if(get_option('mo2f_tour_firewall') == 1 ){
|
183 |
+
$pointers['default-miniorange-firewall-level'] = array(
|
184 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Choose your level of the firewall(step 1 out of 7)' ) ),
|
185 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'Choose on which level you want to enable firewall. htaccess level is the recommended one.' ) ),
|
186 |
+
'anchor_id' => '#mo_waf_options_tour',
|
187 |
+
'isfirewall'=> 'yes',
|
188 |
+
'edge' => 'top',
|
189 |
+
'align' => 'left',
|
190 |
+
'index' => 'default-miniorange-firewall-level',
|
191 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_waf' ) // <-- Please note this
|
192 |
+
);
|
193 |
+
$pointers['default-miniorange-firewall-attacks'] = array(
|
194 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Select the types of attacks you want to stop.(step 2 out of 7)' ) ),
|
195 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'Enable attack protection here for different attacks.' ) ),
|
196 |
+
'anchor_id' => '#mo2f_AttackTypes',
|
197 |
+
'isfirewall'=> 'yes',
|
198 |
+
'edge' => 'bottom',
|
199 |
+
'align' => 'left',
|
200 |
+
'index' => 'default-miniorange-firewall-attacks',
|
201 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_waf' ) // <-- Please note this
|
202 |
+
);
|
203 |
+
$pointers['default-miniorange-firewall-attack-limit'] = array(
|
204 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Choose attack limit(step 3 out of 7)' ) ),
|
205 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'Choose the number of attacks an IP can make before getting blocked. If an IP reach the limit it will be blocked on the next attack.' ) ),
|
206 |
+
'anchor_id' => '#mo2f_waf_block_after',
|
207 |
+
'isfirewall'=> 'yes',
|
208 |
+
'edge' => 'bottom',
|
209 |
+
'align' => 'left',
|
210 |
+
'index' => 'default-miniorange-firewall-attack-limit',
|
211 |
+
'align' => 'left',
|
212 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_waf' ) // <-- Please note this
|
213 |
+
);
|
214 |
+
|
215 |
+
$pointers['default-miniorange-firewall-rate-limit'] = array(
|
216 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Turn on rate limiting(step 4 out of 7)' ) ),
|
217 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'Turn on rate limiting to protect from Dos attack. Choose request limit and action for rate limiting.' ) ),
|
218 |
+
'anchor_id' => '#mo2f_ratelimiting',
|
219 |
+
'isfirewall'=> 'yes',
|
220 |
+
'edge' => 'top',
|
221 |
+
'align' => 'left',
|
222 |
+
'index' => 'default-miniorange-firewall-rate-limit',
|
223 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_waf' ) // <-- Please note this
|
224 |
+
);
|
225 |
+
$pointers['default-miniorange-firewall-check-attacks'] = array(
|
226 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Check blocked IPs and attacks.(step 5 out of 7)' ) ),
|
227 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check the Information about blocked IPs and Attacks here.' ) ),
|
228 |
+
'anchor_id' => '#mo2f_firewall_attack_dash',
|
229 |
+
'isfirewall'=> 'yes',
|
230 |
+
'edge' => 'top',
|
231 |
+
'align' => 'left',
|
232 |
+
'index' => 'default-miniorange-firewall-check-attacks',
|
233 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_waf' ) // <-- Please note this
|
234 |
+
);
|
235 |
+
$pointers['default-miniorange-2fa-upgrade'] = array(
|
236 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Upgrade your plan (step 6 out of 7)' ) ),
|
237 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check the premium features and upgrade your plan here.' ) ),
|
238 |
+
'anchor_id' => '#mo_2fa_upgrade_tour',
|
239 |
+
'isfirewall' => 'yes',
|
240 |
+
'edge' => 'top',
|
241 |
+
'align' => 'left',
|
242 |
+
'index' => 'default-miniorange-2fa-upgrade',
|
243 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_waf' ) // <-- Please note this
|
244 |
+
);
|
245 |
+
|
246 |
+
$pointers['default-miniorange-firewall-support'] = array(
|
247 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Contact us!!(step 7 out of 7)' ) ),
|
248 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'Need Help? We are just one click away.' ) ),
|
249 |
+
'anchor_id' => '#mo_wpns_support_layout_tour',
|
250 |
+
'isfirewall' => 'yes',
|
251 |
+
'edge' => 'bottom',
|
252 |
+
'align' => 'left',
|
253 |
+
'index' => 'default-miniorange-firewall-support',
|
254 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_waf' ) // <-- Please note this
|
255 |
+
);
|
256 |
+
|
257 |
+
}
|
258 |
+
|
259 |
+
if(get_option('mo2f_tour_malware_scan') ==1){
|
260 |
+
$pointers['default-miniorange-malware-scan-modes'] = array(
|
261 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Scanning Modes (Step 1 of 6)' ) ),
|
262 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'Choose the Scanning mode ' ) ),
|
263 |
+
'anchor_id' => '#scan_status_table',
|
264 |
+
'ismalware' => 'yes',
|
265 |
+
'edge' => 'bottom',
|
266 |
+
'align' => 'left',
|
267 |
+
'index' => 'default-miniorange-malware-scan-modes',
|
268 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_malwarescan' ) // <-- Please note this
|
269 |
+
);
|
270 |
+
$pointers['default-miniorange-malware-custom-scan-files'] = array(
|
271 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Select files from custom scan (Step 2 of 6)' ) ),
|
272 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can select the files you want to scan. Just select the files and start the custom scan' ) ),
|
273 |
+
'anchor_id' => '#mo2f_select_scanning_files',
|
274 |
+
'ismalware' => 'yes',
|
275 |
+
'edge' => 'bottom',
|
276 |
+
'align' => 'left',
|
277 |
+
'index' => 'default-miniorange-malware-custom-scan-files',
|
278 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_malwarescan' ) // <-- Please note this
|
279 |
+
);
|
280 |
+
$pointers['default-miniorange-malware-scan-reports'] = array(
|
281 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Scan report.(Step 3 of 6)' ) ),
|
282 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check the scan report here.' ) ),
|
283 |
+
'anchor_id' => '#scan_report_table',
|
284 |
+
'ismalware' => 'yes',
|
285 |
+
'edge' => 'top',
|
286 |
+
'align' => 'left',
|
287 |
+
'index' => 'default-miniorange-malware-scan-reports',
|
288 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_malwarescan' ) // <-- Please note this
|
289 |
+
);
|
290 |
+
|
291 |
+
$pointers['default-miniorange-malware-scan-dashboard'] = array(
|
292 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Scan dashboard (Step 4 of 6)' ) ),
|
293 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check the Information about the files being scanned currently, files scanned in last scans & Infected files' ) ),
|
294 |
+
'anchor_id' => '#mo2f_scan_dash',
|
295 |
+
'ismalware' => 'yes',
|
296 |
+
'edge' => 'top',
|
297 |
+
'align' => 'left',
|
298 |
+
'index' => 'default-miniorange-malware-scan-dashboard',
|
299 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_malwarescan' ) // <-- Please note this
|
300 |
+
);
|
301 |
+
$pointers['default-miniorange-2fa-upgrade'] = array(
|
302 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Upgrade your plan(step 5 out of 6)' ) ),
|
303 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check the premium features and upgrade your plan here.' ) ),
|
304 |
+
'anchor_id' => '#mo_2fa_upgrade_tour',
|
305 |
+
'ismalware' => 'yes',
|
306 |
+
'edge' => 'top',
|
307 |
+
'align' => 'left',
|
308 |
+
'index' => 'default-miniorange-2fa-upgrade',
|
309 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_malwarescan' ) // <-- Please note this
|
310 |
+
);
|
311 |
+
|
312 |
+
$pointers['default-miniorange-malware-support'] = array(
|
313 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Contact us!!(step 6 out of 6)' ) ),
|
314 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'Need Help? We are just one click away.' ) ),
|
315 |
+
'anchor_id' => '#mo_wpns_support_layout_tour',
|
316 |
+
'ismalware' => 'yes',
|
317 |
+
'edge' => 'bottom',
|
318 |
+
'align' => 'left',
|
319 |
+
'index' => 'default-miniorange-malware-support',
|
320 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_malwarescan' ) // <-- Please note this
|
321 |
+
);
|
322 |
+
|
323 |
+
}
|
324 |
+
|
325 |
+
if(get_option('mo2f_tour_advance_blocking') ==1){
|
326 |
+
$pointers['default-miniorange-advance-blocking-IP-blocking'] = array(
|
327 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Manual IP Blocking (Step 1 of 9)' ) ),
|
328 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can block a specific IP. Access for that IP will be blocked for your site.' ) ),
|
329 |
+
'anchor_id' => '#mo2f_manual_ip_blocking',
|
330 |
+
'advcblock' => 'yes',
|
331 |
+
'edge' => 'top',
|
332 |
+
'align' => 'left',
|
333 |
+
'index' => 'default-miniorange-advance-blocking-IP-blocking',
|
334 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_advancedblocking' ) // <-- Please note this
|
335 |
+
);
|
336 |
+
$pointers['default-miniorange-advance-blocking-IP-whitelisting'] = array(
|
337 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Whitelist IP (Step 2 of 9)' ) ),
|
338 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can Whitelist a specific IP. The IP will never get blocked on your site.' ) ),
|
339 |
+
'anchor_id' => '#mo2f_ip_whitelisting',
|
340 |
+
'advcblock' => 'yes',
|
341 |
+
'edge' => 'top',
|
342 |
+
'align' => 'left',
|
343 |
+
'index' => 'default-miniorange-advance-blocking-IP-whitelisting',
|
344 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_advancedblocking' ) // <-- Please note this
|
345 |
+
);
|
346 |
+
|
347 |
+
$pointers['default-miniorange-advance-blocking-IP-lookup'] = array(
|
348 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Lookup IP(Step 3 of 9)' ) ),
|
349 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can get details of an IP here. Example country, city, etc.' ) ),
|
350 |
+
'anchor_id' => '#mo2f_ip_lookup',
|
351 |
+
'advcblock' => 'yes',
|
352 |
+
'edge' => 'bottom',
|
353 |
+
'align' => 'left',
|
354 |
+
'index' => 'default-miniorange-advance-blocking-IP-lookup',
|
355 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_advancedblocking' ) // <-- Please note this
|
356 |
+
);
|
357 |
+
|
358 |
+
|
359 |
+
$pointers['default-miniorange-advance-blocking-IP-range'] = array(
|
360 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'IP range Blocking.(Step 4 of 9)' ) ),
|
361 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can block a specific range of IPs. Access from those IP will be blocked for your site.' ) ),
|
362 |
+
'anchor_id' => '#mo2f_ip_range_blocking',
|
363 |
+
'advcblock' => 'yes',
|
364 |
+
'edge' => 'top',
|
365 |
+
'align' => 'left',
|
366 |
+
'index' => 'default-miniorange-advance-blocking-IP-range',
|
367 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_advancedblocking' ) // <-- Please note this
|
368 |
+
);
|
369 |
+
$pointers['default-miniorange-advance-blocking-htaccess-blocking'] = array(
|
370 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Htaccess Blocking (Step 5 of 9)' ) ),
|
371 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'htaccess level blocking will block the IP before wordpress load on your site. So it will minimize server resources from illegitimate users.' ) ),
|
372 |
+
'anchor_id' => '#mo2f_htaccess_blocking',
|
373 |
+
'advcblock' => 'yes',
|
374 |
+
'edge' => 'top',
|
375 |
+
'align' => 'left',
|
376 |
+
'index' => 'default-miniorange-advance-blocking-htaccess-blocking',
|
377 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_advancedblocking' ) // <-- Please note this
|
378 |
+
);
|
379 |
+
$pointers['default-miniorange-advance-blocking-browser-blocking'] = array(
|
380 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Browser Blocking (Step 6 of 9)' ) ),
|
381 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can block specific browser from which you don\'t want users to access.' ) ),
|
382 |
+
'anchor_id' => '#mo2f_browser_blocking',
|
383 |
+
'advcblock' => 'yes',
|
384 |
+
'edge' => 'top',
|
385 |
+
'align' => 'left',
|
386 |
+
'index' => 'default-miniorange-advance-blocking-browser-blocking',
|
387 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_advancedblocking' ) // <-- Please note this
|
388 |
+
);
|
389 |
+
$pointers['default-miniorange-advance-blocking-country-blocking'] = array(
|
390 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Country Blocking (Step 7 of 9)' ) ),
|
391 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can choose the countries from where you don\'t want access to your site.' ) ),
|
392 |
+
'anchor_id' => '#mo2f_country_blocking',
|
393 |
+
'advcblock' => 'yes',
|
394 |
+
'edge' => 'bottom',
|
395 |
+
'align' => 'left',
|
396 |
+
'index' => 'default-miniorange-advance-blocking-country-blocking',
|
397 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_advancedblocking' ) // <-- Please note this
|
398 |
+
);
|
399 |
+
|
400 |
+
$pointers['default-miniorange-2fa-upgrade'] = array(
|
401 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Upgrade your plan (step 8 out of 9)' ) ),
|
402 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check the premium features and upgrade your plan here.' ) ),
|
403 |
+
'anchor_id' => '#mo_2fa_upgrade_tour',
|
404 |
+
'advcblock' => 'yes',
|
405 |
+
'edge' => 'top',
|
406 |
+
'align' => 'left',
|
407 |
+
'index' => 'default-miniorange-2fa-upgrade',
|
408 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_advancedblocking' ) // <-- Please note this
|
409 |
+
);
|
410 |
+
$pointers['default-miniorange-advance-blocking-support'] = array(
|
411 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Contact us!!(step 9 out of 9)' ) ),
|
412 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'Need Help? We are just one click away.' ) ),
|
413 |
+
'anchor_id' => '#mo_wpns_support_layout_tour',
|
414 |
+
'advcblock' => 'yes',
|
415 |
+
'edge' => 'bottom',
|
416 |
+
'align' => 'left',
|
417 |
+
'index' => 'default-miniorange-advance-blocking-support',
|
418 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_advancedblocking' ) // <-- Please note this
|
419 |
+
);
|
420 |
+
|
421 |
+
}
|
422 |
+
|
423 |
+
|
424 |
+
if(get_option('mo2f_tour_backup') == 1 ){
|
425 |
+
$pointers['default-miniorange-backup-manual-db'] = array(
|
426 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Manual database backup.(Step 1 of 6)' ) ),
|
427 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can take manual database backup here.The backup will be saved in your uploads directory.' ) ),
|
428 |
+
'anchor_id' => '#mo2f_select_files_backup',
|
429 |
+
'isBackup'=> 'yes',
|
430 |
+
'edge' => 'top',
|
431 |
+
'align' => 'left',
|
432 |
+
'index' => 'default-miniorange-backup-manual-db',
|
433 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_backup' ) // <-- Please note this
|
434 |
+
);
|
435 |
+
$pointers['default-miniorange-backup-auto-db'] = array(
|
436 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Scheduled/Automated Database backups.(Step 2 of 6)' ) ),
|
437 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'With the help of this you can specify the time duration after which an automatic backup will be taken.' ) ),
|
438 |
+
'anchor_id' => '#mo2f_auto_dbbackup',
|
439 |
+
'isBackup'=> 'yes',
|
440 |
+
'edge' => 'bottom',
|
441 |
+
'align' => 'left',
|
442 |
+
'index' => 'default-miniorange-backup-auto-db',
|
443 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_backup' ) // <-- Please note this
|
444 |
+
);
|
445 |
+
$pointers['default-miniorange-backup-file'] = array(
|
446 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Auto backup status(Step 3 of 6)' ) ),
|
447 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check the auto backup status.' ) ),
|
448 |
+
'anchor_id' => '#mo2f_schedule_backup_status',
|
449 |
+
'isBackup'=> 'yes',
|
450 |
+
'edge' => 'top',
|
451 |
+
'align' => 'left',
|
452 |
+
'index' => 'default-miniorange-backup-file',
|
453 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_backup' ) // <-- Please note this
|
454 |
+
);
|
455 |
+
$pointers['default-miniorange-backup-report'] = array(
|
456 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Report of backups.(Step 4 of 6)' ) ),
|
457 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check backup taken details.' ) ),
|
458 |
+
'anchor_id' => '#backup_report_table',
|
459 |
+
'isBackup'=> 'yes',
|
460 |
+
'edge' => 'bottom',
|
461 |
+
'align' => 'left',
|
462 |
+
'index' => 'default-miniorange-backup-report',
|
463 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_backup' ) // <-- Please note this
|
464 |
+
);
|
465 |
+
|
466 |
+
$pointers['default-miniorange-2fa-upgrade'] = array(
|
467 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Upgrade your plan (step 5 out of 6)' ) ),
|
468 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check the premium features and upgrade your plan here.' ) ),
|
469 |
+
'anchor_id' => '#mo_2fa_upgrade_tour',
|
470 |
+
'isBackup' => 'yes',
|
471 |
+
'edge' => 'top',
|
472 |
+
'align' => 'left',
|
473 |
+
'index' => 'default-miniorange-2fa-upgrade',
|
474 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_backup' ) // <-- Please note this
|
475 |
+
);
|
476 |
+
$pointers['default-miniorange-backup-support'] = array(
|
477 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Contact us!!(step 6 out of 6)' ) ),
|
478 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'Need Help? We are just one click away.' ) ),
|
479 |
+
'anchor_id' => '#mo_wpns_support_layout_tour',
|
480 |
+
'isBackup' => 'yes',
|
481 |
+
'edge' => 'bottom',
|
482 |
+
'align' => 'left',
|
483 |
+
'index' => 'default-miniorange-backup-support',
|
484 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_backup' ) // <-- Please note this
|
485 |
+
);
|
486 |
+
|
487 |
+
}
|
488 |
+
|
489 |
+
if(get_option('mo2f_tour_loginSpam') == 1){
|
490 |
+
$pointers['default-miniorange-login-spam-bruteforce'] = array(
|
491 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Enable BruteForce protection.(step 1 out of 8)' ) ),
|
492 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'Choose the number of attempts before blocking an IP on login page. It will protect you from bruteforce attack.' ) ),
|
493 |
+
'anchor_id' => '#mo2f_bruteforce',
|
494 |
+
'loginSpam' => 'yes',
|
495 |
+
'edge' => 'top',
|
496 |
+
'align' => 'left',
|
497 |
+
'index' => 'default-miniorange-login-spam-bruteforce',
|
498 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_login_and_spam' ) // <-- Please note this
|
499 |
+
);
|
500 |
+
$pointers['default-miniorange-login-spam-recaptcha'] = array(
|
501 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Enable google reCaptcha.(step 2 out of 8)' ) ),
|
502 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'Enable google reCaptcha ' ) ),
|
503 |
+
'anchor_id' => '#mo2f_google_recaptcha',
|
504 |
+
'loginSpam' => 'yes',
|
505 |
+
'edge' => 'top',
|
506 |
+
'align' => 'left',
|
507 |
+
'index' => 'default-miniorange-login-spam-recaptcha',
|
508 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_login_and_spam' ) // <-- Please note this
|
509 |
+
);
|
510 |
+
$pointers['default-miniorange-login-spam-strong-pass'] = array(
|
511 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Enforce strong password(step 3 out of 8)' ) ),
|
512 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'Enforce strong password to your users so that their account will not get hacked easily.' ) ),
|
513 |
+
'anchor_id' => '#mo2f_enforce_strong_password_div',
|
514 |
+
'loginSpam' => 'yes',
|
515 |
+
'edge' => 'bottom',
|
516 |
+
'align' => 'left',
|
517 |
+
'index' => 'default-miniorange-login-spam-strong-pass',
|
518 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_login_and_spam' ) // <-- Please note this
|
519 |
+
);
|
520 |
+
|
521 |
+
$pointers['default-miniorange-login-spam-fake-registration'] = array(
|
522 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Turn on block fake registration(step 4 out of 8)' ) ),
|
523 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'This will block fake registration on your site.' ) ),
|
524 |
+
'anchor_id' => '#mo2f_block_registration',
|
525 |
+
'loginSpam' => 'yes',
|
526 |
+
'edge' => 'top',
|
527 |
+
'align' => 'left',
|
528 |
+
'index' => 'default-miniorange-login-spam-fake-registration',
|
529 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_login_and_spam' ) // <-- Please note this
|
530 |
+
);
|
531 |
+
$pointers['default-miniorange-login-spam-content'] = array(
|
532 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Content Protection.(step 5 out of 8)' ) ),
|
533 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can protect your content which is directly accessible from path/URL by anyone.' ) ),
|
534 |
+
'anchor_id' => '#mo2f_content_protection',
|
535 |
+
'loginSpam' => 'yes',
|
536 |
+
'edge' => 'bottom',
|
537 |
+
'align' => 'left',
|
538 |
+
'index' => 'default-miniorange-login-spam-content',
|
539 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_login_and_spam' ) // <-- Please note this
|
540 |
+
);
|
541 |
+
$pointers['default-miniorange-login-spam-block-spam'] = array(
|
542 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Block Spam Comment(Step 6 out of 8)' ) ),
|
543 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'Block automated scripts and bots on comment.' ) ),
|
544 |
+
'anchor_id' => '#mo2f_comment_protection',
|
545 |
+
'loginSpam' => 'yes',
|
546 |
+
'edge' => 'bottom',
|
547 |
+
'align' => 'left',
|
548 |
+
'index' => 'default-miniorange-login-spam-block-spam',
|
549 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_login_and_spam' ) // <-- Please note this
|
550 |
+
);
|
551 |
+
$pointers['default-miniorange-2fa-upgrade'] = array(
|
552 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Upgrade your plan(step 7 out of 8)' ) ),
|
553 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'You can check the premium features and upgrade your plan here.' ) ),
|
554 |
+
'anchor_id' => '#mo_2fa_upgrade_tour',
|
555 |
+
'loginSpam' => 'yes',
|
556 |
+
'edge' => 'top',
|
557 |
+
'align' => 'left',
|
558 |
+
'index' => 'default-miniorange-2fa-upgrade',
|
559 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_login_and_spam' ) // <-- Please note this
|
560 |
+
);
|
561 |
+
|
562 |
+
$pointers['default-miniorange-login-spam-support'] = array(
|
563 |
+
'title' => sprintf( '<h3>%s</h3>', esc_html__( 'Contact us!!(step 8 out of 8)' ) ),
|
564 |
+
'content' => sprintf( '<p>%s</p>', esc_html__( 'Need Help? We are just one click away.' ) ),
|
565 |
+
'anchor_id' => '#mo_wpns_support_layout_tour',
|
566 |
+
'loginSpam' => 'yes',
|
567 |
+
'edge' => 'bottom',
|
568 |
+
'align' => 'left',
|
569 |
+
'index' => 'default-miniorange-login-spam-support',
|
570 |
+
'where' => array( 'miniorange-2-factor_page_mo_2fa_login_and_spam' ) // <-- Please note this
|
571 |
+
);
|
572 |
+
|
573 |
+
|
574 |
+
}
|
575 |
+
|
576 |
+
|
577 |
+
|
578 |
+
|
579 |
+
|
580 |
+
|
581 |
+
return $pointers;
|
controllers/registration-security.php
CHANGED
@@ -1,126 +1,126 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
global $moWpnsUtility, $mo2f_dirName;
|
4 |
-
|
5 |
-
|
6 |
-
if(current_user_can( 'manage_options' ) && isset($_POST['option']))
|
7 |
-
{
|
8 |
-
switch(sanitize_text_field(wp_unslash($_POST['option'])))
|
9 |
-
{
|
10 |
-
case "mo_wpns_enable_fake_domain_blocking":
|
11 |
-
wpns_handle_domain_blocking($_POST); break;
|
12 |
-
case "mo_wpns_advanced_user_verification":
|
13 |
-
wpns_handle_advanced_user_verification($_POST); break;
|
14 |
-
case "mo_wpns_social_integration":
|
15 |
-
wpns_handle_enable_social_login($_POST); break;
|
16 |
-
|
17 |
-
}
|
18 |
-
}
|
19 |
-
|
20 |
-
$otpVerify_url = add_query_arg( array('page' => 'mosettings', 'tab'=>'settings'), sanitize_url($_SERVER['REQUEST_URI'] ));
|
21 |
-
$openid_url = add_query_arg( array('page' => 'mo_openid_settings' ), sanitize_url($_SERVER['REQUEST_URI'] ));
|
22 |
-
$domain_blocking= get_option('mo_wpns_enable_fake_domain_blocking') ? "checked" : "";
|
23 |
-
$user_verify = get_option('mo_wpns_enable_advanced_user_verification') ? "checked" : "";
|
24 |
-
$social_login = get_option('mo_wpns_enable_social_integration') ? "checked" : "";
|
25 |
-
|
26 |
-
function mo2f_user_verify() {
|
27 |
-
if ( $user_verify ) {
|
28 |
-
$moOTPPlugin = new OTPPlugin();
|
29 |
-
$status = $moOTPPlugin->getstatus();
|
30 |
-
switch ( $status ) {
|
31 |
-
case "ACTIVE":
|
32 |
-
echo "<br><a href='" . esc_url($otpVerify_url) . "'>Click here to configure.</a>";
|
33 |
-
$moOTPPlugin->updatePluginConfiguration();
|
34 |
-
break;
|
35 |
-
case "INSTALLED":
|
36 |
-
$path = "miniorange-otp-verification/miniorange_validation_settings.php";
|
37 |
-
$activateUrl = wp_nonce_url( admin_url( 'plugins.php?action=activate&plugin=' . $path ), 'activate-plugin_' . $path );
|
38 |
-
echo '<br><span style="color:red">For Advanced User Verification you need to have miniOrange OTP Verification plugin activated.</span><br><a href="' . esc_url($activateUrl) . '">Click here to activate OTP Verification Plugin</a>';
|
39 |
-
break;
|
40 |
-
default:
|
41 |
-
$action = 'install-plugin';
|
42 |
-
$slug = 'miniorange-otp-verification';
|
43 |
-
$install_link = wp_nonce_url(
|
44 |
-
add_query_arg( array( 'action' => $action, 'plugin' => $slug ), admin_url( 'update.php' ) ),
|
45 |
-
$action . '_' . $slug
|
46 |
-
);
|
47 |
-
echo '<br><span style="color:red">For Advanced User Verification you need to have miniOrange OTP Verification plugin installed.</span><br><a href="' . esc_url($install_link) . '">Install OTP Verification plugin</a>';
|
48 |
-
break;
|
49 |
-
}
|
50 |
-
}
|
51 |
-
}
|
52 |
-
|
53 |
-
function mo2f_social_login() {
|
54 |
-
$moSocialLogin = new SocialPlugin();
|
55 |
-
$status = $moSocialLogin->getstatus();
|
56 |
-
switch ( $status ) {
|
57 |
-
case "ACTIVE":
|
58 |
-
echo "<br><a href='" . esc_url( $openid_url ) . "'>Click here to configure.</a>";
|
59 |
-
break;
|
60 |
-
case "INSTALLED":
|
61 |
-
$path = "miniorange-login-openid/miniorange_openid_sso_settings.php";
|
62 |
-
$activateUrl = wp_nonce_url( admin_url( 'plugins.php?action=activate&plugin=' . $path ), 'activate-plugin_' . $path );
|
63 |
-
echo '<br><span style="color:red">For Social Login Integration you need to have miniOrange Social Login, Sharing plugin activated.</span><br><a href="' . esc_url( $activateUrl ) . '">Click here to activate Social Login, Sharing Plugin</a>';
|
64 |
-
break;
|
65 |
-
default:
|
66 |
-
$action = 'install-plugin';
|
67 |
-
$slug = 'miniorange-login-openid';
|
68 |
-
$install_link = wp_nonce_url(
|
69 |
-
add_query_arg( array( 'action' => $action, 'plugin' => $slug ), admin_url( 'update.php' ) ),
|
70 |
-
$action . '_' . $slug
|
71 |
-
);
|
72 |
-
echo '<br><span style="color:red">For Social Login Integration you need to have miniOrange Social Login, Sharing plugin installed.</span><br><a href="' . esc_url( $install_link ) . '">Install Social Login, Sharing plugin</a>';
|
73 |
-
break;
|
74 |
-
}
|
75 |
-
}
|
76 |
-
|
77 |
-
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'registration-security.php';
|
78 |
-
|
79 |
-
|
80 |
-
|
81 |
-
|
82 |
-
/* REGISTRATION SECURITY RELATED FUNCTIONS*/
|
83 |
-
|
84 |
-
//Function to handle enabling and disabling domain blocking
|
85 |
-
function wpns_handle_domain_blocking($postvalue)
|
86 |
-
{
|
87 |
-
$enable_fake_emails = isset($postvalue['mo_wpns_enable_fake_domain_blocking']) ? true : false;
|
88 |
-
update_option( 'mo_wpns_enable_fake_domain_blocking', $enable_fake_emails);
|
89 |
-
|
90 |
-
if($enable_fake_emails)
|
91 |
-
do_action('wpns_show_message',MoWpnsMessages::showMessage('DOMAIN_BLOCKING_ENABLED'),'SUCCESS');
|
92 |
-
else
|
93 |
-
do_action('wpns_show_message',MoWpnsMessages::showMessage('DOMAIN_BLOCKING_DISABLED'),'ERROR');
|
94 |
-
}
|
95 |
-
|
96 |
-
|
97 |
-
//Function to enable and disable User Verification for the Default Registration Page
|
98 |
-
function wpns_handle_advanced_user_verification($postvalue)
|
99 |
-
{
|
100 |
-
$enable_advanced_user_verification = isset($postvalue['mo_wpns_enable_advanced_user_verification']) ? true : false;
|
101 |
-
update_option( 'mo_wpns_enable_advanced_user_verification', $enable_advanced_user_verification);
|
102 |
-
|
103 |
-
if($enable_advanced_user_verification)
|
104 |
-
{
|
105 |
-
update_option('mo_customer_validation_wp_default_enable',1);
|
106 |
-
do_action('wpns_show_message',MoWpnsMessages::showMessage('ENABLE_ADVANCED_USER_VERIFY'),'SUCCESS');
|
107 |
-
}
|
108 |
-
else
|
109 |
-
{
|
110 |
-
update_option('mo_customer_validation_wp_default_enable',0);
|
111 |
-
do_action('wpns_show_message',MoWpnsMessages::showMessage('DISABLE_ADVANCED_USER_VERIFY'),'ERROR');
|
112 |
-
}
|
113 |
-
}
|
114 |
-
|
115 |
-
|
116 |
-
//Function to enable and disable Social Login
|
117 |
-
function wpns_handle_enable_social_login($postvalue)
|
118 |
-
{
|
119 |
-
$social_login = isset($postvalue['mo_wpns_enable_social_integration']) ? true : false;
|
120 |
-
update_option( 'mo_wpns_enable_social_integration', $social_login);
|
121 |
-
|
122 |
-
if($social_login)
|
123 |
-
do_action('wpns_show_message',MoWpnsMessages::showMessage('ENABLE_SOCIAL_LOGIN'),'SUCCESS');
|
124 |
-
else
|
125 |
-
do_action('wpns_show_message',MoWpnsMessages::showMessage('DISABLE_SOCIAL_LOGIN'),'ERROR');
|
126 |
}
|
1 |
+
<?php
|
2 |
+
|
3 |
+
global $moWpnsUtility, $mo2f_dirName;
|
4 |
+
|
5 |
+
|
6 |
+
if(current_user_can( 'manage_options' ) && isset($_POST['option']))
|
7 |
+
{
|
8 |
+
switch(sanitize_text_field(wp_unslash($_POST['option'])))
|
9 |
+
{
|
10 |
+
case "mo_wpns_enable_fake_domain_blocking":
|
11 |
+
wpns_handle_domain_blocking($_POST); break;
|
12 |
+
case "mo_wpns_advanced_user_verification":
|
13 |
+
wpns_handle_advanced_user_verification($_POST); break;
|
14 |
+
case "mo_wpns_social_integration":
|
15 |
+
wpns_handle_enable_social_login($_POST); break;
|
16 |
+
|
17 |
+
}
|
18 |
+
}
|
19 |
+
|
20 |
+
$otpVerify_url = add_query_arg( array('page' => 'mosettings', 'tab'=>'settings'), sanitize_url($_SERVER['REQUEST_URI'] ));
|
21 |
+
$openid_url = add_query_arg( array('page' => 'mo_openid_settings' ), sanitize_url($_SERVER['REQUEST_URI'] ));
|
22 |
+
$domain_blocking= get_option('mo_wpns_enable_fake_domain_blocking') ? "checked" : "";
|
23 |
+
$user_verify = get_option('mo_wpns_enable_advanced_user_verification') ? "checked" : "";
|
24 |
+
$social_login = get_option('mo_wpns_enable_social_integration') ? "checked" : "";
|
25 |
+
|
26 |
+
function mo2f_user_verify() {
|
27 |
+
if ( $user_verify ) {
|
28 |
+
$moOTPPlugin = new OTPPlugin();
|
29 |
+
$status = $moOTPPlugin->getstatus();
|
30 |
+
switch ( $status ) {
|
31 |
+
case "ACTIVE":
|
32 |
+
echo "<br><a href='" . esc_url($otpVerify_url) . "'>Click here to configure.</a>";
|
33 |
+
$moOTPPlugin->updatePluginConfiguration();
|
34 |
+
break;
|
35 |
+
case "INSTALLED":
|
36 |
+
$path = "miniorange-otp-verification/miniorange_validation_settings.php";
|
37 |
+
$activateUrl = wp_nonce_url( admin_url( 'plugins.php?action=activate&plugin=' . $path ), 'activate-plugin_' . $path );
|
38 |
+
echo '<br><span style="color:red">For Advanced User Verification you need to have miniOrange OTP Verification plugin activated.</span><br><a href="' . esc_url($activateUrl) . '">Click here to activate OTP Verification Plugin</a>';
|
39 |
+
break;
|
40 |
+
default:
|
41 |
+
$action = 'install-plugin';
|
42 |
+
$slug = 'miniorange-otp-verification';
|
43 |
+
$install_link = wp_nonce_url(
|
44 |
+
add_query_arg( array( 'action' => $action, 'plugin' => $slug ), admin_url( 'update.php' ) ),
|
45 |
+
$action . '_' . $slug
|
46 |
+
);
|
47 |
+
echo '<br><span style="color:red">For Advanced User Verification you need to have miniOrange OTP Verification plugin installed.</span><br><a href="' . esc_url($install_link) . '">Install OTP Verification plugin</a>';
|
48 |
+
break;
|
49 |
+
}
|
50 |
+
}
|
51 |
+
}
|
52 |
+
|
53 |
+
function mo2f_social_login() {
|
54 |
+
$moSocialLogin = new SocialPlugin();
|
55 |
+
$status = $moSocialLogin->getstatus();
|
56 |
+
switch ( $status ) {
|
57 |
+
case "ACTIVE":
|
58 |
+
echo "<br><a href='" . esc_url( $openid_url ) . "'>Click here to configure.</a>";
|
59 |
+
break;
|
60 |
+
case "INSTALLED":
|
61 |
+
$path = "miniorange-login-openid/miniorange_openid_sso_settings.php";
|
62 |
+
$activateUrl = wp_nonce_url( admin_url( 'plugins.php?action=activate&plugin=' . $path ), 'activate-plugin_' . $path );
|
63 |
+
echo '<br><span style="color:red">For Social Login Integration you need to have miniOrange Social Login, Sharing plugin activated.</span><br><a href="' . esc_url( $activateUrl ) . '">Click here to activate Social Login, Sharing Plugin</a>';
|
64 |
+
break;
|
65 |
+
default:
|
66 |
+
$action = 'install-plugin';
|
67 |
+
$slug = 'miniorange-login-openid';
|
68 |
+
$install_link = wp_nonce_url(
|
69 |
+
add_query_arg( array( 'action' => $action, 'plugin' => $slug ), admin_url( 'update.php' ) ),
|
70 |
+
$action . '_' . $slug
|
71 |
+
);
|
72 |
+
echo '<br><span style="color:red">For Social Login Integration you need to have miniOrange Social Login, Sharing plugin installed.</span><br><a href="' . esc_url( $install_link ) . '">Install Social Login, Sharing plugin</a>';
|
73 |
+
break;
|
74 |
+
}
|
75 |
+
}
|
76 |
+
|
77 |
+
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'registration-security.php';
|
78 |
+
|
79 |
+
|
80 |
+
|
81 |
+
|
82 |
+
/* REGISTRATION SECURITY RELATED FUNCTIONS*/
|
83 |
+
|
84 |
+
//Function to handle enabling and disabling domain blocking
|
85 |
+
function wpns_handle_domain_blocking($postvalue)
|
86 |
+
{
|
87 |
+
$enable_fake_emails = isset($postvalue['mo_wpns_enable_fake_domain_blocking']) ? true : false;
|
88 |
+
update_option( 'mo_wpns_enable_fake_domain_blocking', $enable_fake_emails);
|
89 |
+
|
90 |
+
if($enable_fake_emails)
|
91 |
+
do_action('wpns_show_message',MoWpnsMessages::showMessage('DOMAIN_BLOCKING_ENABLED'),'SUCCESS');
|
92 |
+
else
|
93 |
+
do_action('wpns_show_message',MoWpnsMessages::showMessage('DOMAIN_BLOCKING_DISABLED'),'ERROR');
|
94 |
+
}
|
95 |
+
|
96 |
+
|
97 |
+
//Function to enable and disable User Verification for the Default Registration Page
|
98 |
+
function wpns_handle_advanced_user_verification($postvalue)
|
99 |
+
{
|
100 |
+
$enable_advanced_user_verification = isset($postvalue['mo_wpns_enable_advanced_user_verification']) ? true : false;
|
101 |
+
update_option( 'mo_wpns_enable_advanced_user_verification', $enable_advanced_user_verification);
|
102 |
+
|
103 |
+
if($enable_advanced_user_verification)
|
104 |
+
{
|
105 |
+
update_option('mo_customer_validation_wp_default_enable',1);
|
106 |
+
do_action('wpns_show_message',MoWpnsMessages::showMessage('ENABLE_ADVANCED_USER_VERIFY'),'SUCCESS');
|
107 |
+
}
|
108 |
+
else
|
109 |
+
{
|
110 |
+
update_option('mo_customer_validation_wp_default_enable',0);
|
111 |
+
do_action('wpns_show_message',MoWpnsMessages::showMessage('DISABLE_ADVANCED_USER_VERIFY'),'ERROR');
|
112 |
+
}
|
113 |
+
}
|
114 |
+
|
115 |
+
|
116 |
+
//Function to enable and disable Social Login
|
117 |
+
function wpns_handle_enable_social_login($postvalue)
|
118 |
+
{
|
119 |
+
$social_login = isset($postvalue['mo_wpns_enable_social_integration']) ? true : false;
|
120 |
+
update_option( 'mo_wpns_enable_social_integration', $social_login);
|
121 |
+
|
122 |
+
if($social_login)
|
123 |
+
do_action('wpns_show_message',MoWpnsMessages::showMessage('ENABLE_SOCIAL_LOGIN'),'SUCCESS');
|
124 |
+
else
|
125 |
+
do_action('wpns_show_message',MoWpnsMessages::showMessage('DISABLE_SOCIAL_LOGIN'),'ERROR');
|
126 |
}
|
controllers/reports.php
CHANGED
@@ -1,25 +1,25 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
global $moWpnsUtility,$mo2f_dirName;
|
4 |
-
|
5 |
-
if(isset($_POST['option']) and sanitize_text_field($_POST['option'])=='mo_wpns_manual_clear'){
|
6 |
-
global $wpdb;
|
7 |
-
$wpdb->query("DELETE FROM ".$wpdb->prefix."mo2f_network_transactions WHERE Status='success' or Status= 'pastfailed' or Status='failed' ");
|
8 |
-
|
9 |
-
}
|
10 |
-
|
11 |
-
|
12 |
-
|
13 |
-
if(isset($_POST['option']) and sanitize_text_field($_POST['option'])=='mo_wpns_manual_errorclear'){
|
14 |
-
global $wpdb;
|
15 |
-
$wpdb->query("DELETE FROM ".$wpdb->prefix."mo2f_network_transactions WHERE Status='accessDenied'");
|
16 |
-
|
17 |
-
}
|
18 |
-
|
19 |
-
$mo_wpns_handler = new MoWpnsHandler();
|
20 |
-
$logintranscations = $mo_wpns_handler->get_login_transaction_report();
|
21 |
-
$errortranscations = $mo_wpns_handler->get_error_transaction_report();
|
22 |
-
|
23 |
-
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'reports.php';
|
24 |
-
|
25 |
?>
|
1 |
+
<?php
|
2 |
+
|
3 |
+
global $moWpnsUtility,$mo2f_dirName;
|
4 |
+
|
5 |
+
if(isset($_POST['option']) and sanitize_text_field($_POST['option'])=='mo_wpns_manual_clear'){
|
6 |
+
global $wpdb;
|
7 |
+
$wpdb->query("DELETE FROM ".$wpdb->prefix."mo2f_network_transactions WHERE Status='success' or Status= 'pastfailed' or Status='failed' ");
|
8 |
+
|
9 |
+
}
|
10 |
+
|
11 |
+
|
12 |
+
|
13 |
+
if(isset($_POST['option']) and sanitize_text_field($_POST['option'])=='mo_wpns_manual_errorclear'){
|
14 |
+
global $wpdb;
|
15 |
+
$wpdb->query("DELETE FROM ".$wpdb->prefix."mo2f_network_transactions WHERE Status='accessDenied'");
|
16 |
+
|
17 |
+
}
|
18 |
+
|
19 |
+
$mo_wpns_handler = new MoWpnsHandler();
|
20 |
+
$logintranscations = $mo_wpns_handler->get_login_transaction_report();
|
21 |
+
$errortranscations = $mo_wpns_handler->get_error_transaction_report();
|
22 |
+
|
23 |
+
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'reports.php';
|
24 |
+
|
25 |
?>
|
controllers/tour-model.php
CHANGED
@@ -1,334 +1,334 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
global $mo2f_dirName;
|
4 |
-
$current_user = wp_get_current_user();
|
5 |
-
$email = get_option("mo2f_email");
|
6 |
-
$phone = get_option("mo_wpns_admin_phone");
|
7 |
-
$display = get_option('mo2f_tour_started') == 2?'block':'none';
|
8 |
-
$networkSEnable = MoWpnsUtility::get_mo2f_db_option('mo_wpns_2fa_with_network_security', 'get_option');
|
9 |
-
if(empty($email))
|
10 |
-
$email = $current_user->user_email;
|
11 |
-
$counter = 0;
|
12 |
-
$enableTour = $networkSEnable == 1 ? '' : 'disabled';
|
13 |
-
$tour_body = '<p class="modal-body-para">Hey, Thank you for installing <b style="color: #E85700">miniOrange 2-Factor plugin</b>.</p>
|
14 |
-
<p class="modal-body-para">Two-factor will provide extra layer of security to your users account which will help to protect your users accounts from any outside attack.</p>';
|
15 |
-
if($networkSEnable != 1)
|
16 |
-
{
|
17 |
-
$tour_body .= '<div style="margin-left:37.5%;margin-right:37.5%;">';
|
18 |
-
}
|
19 |
-
|
20 |
-
$tour_body .= '<table style="width: 100%; text-align: center; table-layout: fixed; font-size: medium;">
|
21 |
-
<div class="mo2f_hiddenradio">
|
22 |
-
<tr>
|
23 |
-
|
24 |
-
<td style="border: 1px solid black;" id="2fa">
|
25 |
-
<label>
|
26 |
-
<input type="radio" name="mo2f_two_factor" value="2fa" checked style="display:none">
|
27 |
-
<img src="'.plugin_dir_url(dirname(__FILE__)) . 'includes/images/google-authenticator.png">
|
28 |
-
</label>
|
29 |
-
</td>';
|
30 |
-
if($networkSEnable == 1)
|
31 |
-
{
|
32 |
-
$tour_body .= '<td style="border: 1px solid black;" id="waf">
|
33 |
-
<label >
|
34 |
-
<input type="radio" name="mo2f_two_factor" value="waf" style="display:none" '.$enableTour.'>
|
35 |
-
<img src="'.plugin_dir_url(dirname(__FILE__)) . 'includes/images/mo-waf-logo.png">
|
36 |
-
</label>
|
37 |
-
</td>
|
38 |
-
|
39 |
-
<td style="border: 1px solid black;" id="login">
|
40 |
-
<label >
|
41 |
-
<input type="radio" name="mo2f_two_factor" value="login" style="display:none"'.$enableTour.'>
|
42 |
-
<img src="'.plugin_dir_url(dirname(__FILE__)) . 'includes/images/login-protection-logo.png">
|
43 |
-
</label>
|
44 |
-
</td>
|
45 |
-
|
46 |
-
<td style="border: 1px solid black;" id="backup">
|
47 |
-
<label>
|
48 |
-
<input type="radio" name="mo2f_two_factor" value="backup" style="display:none"'.$enableTour.'>
|
49 |
-
<img src="'.plugin_dir_url(dirname(__FILE__)) . 'includes/images/database-backup-logo.png">
|
50 |
-
</label>
|
51 |
-
</td>
|
52 |
-
|
53 |
-
<td style="border: 1px solid black;" id="malware">
|
54 |
-
<label >
|
55 |
-
<input type="radio" name="mo2f_two_factor" value="malware" style="display:none"'.$enableTour.'>
|
56 |
-
<img src="'.plugin_dir_url(dirname(__FILE__)) . 'includes/images/malware-scanner-logo.png">
|
57 |
-
</label>
|
58 |
-
</td>';
|
59 |
-
}
|
60 |
-
$tour_body .= '</tr>
|
61 |
-
<tr>
|
62 |
-
<th>
|
63 |
-
Two-factor authentication
|
64 |
-
</th>';
|
65 |
-
|
66 |
-
if($networkSEnable == 1)
|
67 |
-
{
|
68 |
-
|
69 |
-
$tour_body .= '<th>
|
70 |
-
Web Application Firewall(WAF)
|
71 |
-
</th>
|
72 |
-
|
73 |
-
<th>
|
74 |
-
Login Protection
|
75 |
-
</th>
|
76 |
-
|
77 |
-
<th>
|
78 |
-
Database Backup
|
79 |
-
</th>
|
80 |
-
|
81 |
-
<th>
|
82 |
-
Malware scanner
|
83 |
-
</th>';
|
84 |
-
}
|
85 |
-
|
86 |
-
$tour_body .= '</tr>
|
87 |
-
</div>
|
88 |
-
</table>';
|
89 |
-
if($networkSEnable != 1)
|
90 |
-
{
|
91 |
-
$tour_body .= '</div>';
|
92 |
-
}
|
93 |
-
|
94 |
-
$waf_arr_ecc = '<div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-1" style="width: 98%; overflow: ; height: ;line-height: 1.5;"><b><u>Data theft and manipulation</u>:</b> Data manipulation can lead to alter, delete, destroy data. The manipulated data may or may not be regained. It includes very sensitive data such as user details, credit/debit card or bank details. It is very necessary to fix the existing data vulnerability issues, data leaks, change weak passwords and provide high end security to stop data breach and manipulation.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent SQL-Injection attacks:</span> SQL-Injection is web security vulnerability through SQL queries executed to modify, delete and destroy data. </div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-1" onclick="open_hide(this);">-</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-2" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Web Scraping</u>:</b> Web scraping is a used to extract large amount of data from websites and saved on local computer. The web scraping involves fetching and extracting data from it. It can be used to web indexing, web mining, data mining, research, tracking online presence and reputation, etc. Media scraping, price scraping are also some scraping techniques which are used to degrade/destroy media files and change the price of products.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Cross-site scripting(XSS) attacks:</span> Cross site scripts used to web scraping and data extraction.</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-2" onclick="open_hide(this);">+</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-3" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>File manipualtion</u>:</b> The file manipuaiton used to alter, delete, execution of files on the sever. It leads to spoil site, spread malicious content which will harm to the business. <div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Remote File Inclusion attacks:</span> Remote file inclusion used to include local file into the server. RFI is type of vulnerability which can lead to add malicious file through a script on server.</div><div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Local File Inclusion attacks:</span> Local file inclusion used to access local file available on the server. LFI can be achieved by uploading malicious file to the server.</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-3" onclick="open_hide(this);">+</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-4" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Content modification</u>:</b> Cross-site scripting used to change or modify data shown on website. Content modification affects a lot on business due to irrelevent content, malicious links which leads to spoil the trust of clients and reputation of organizations.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent SQL-Injection attacks:</span> SQL-Injection attack can change data in database. The data used to view content such as statistical data, charts, graphs, etc. It may mislead to business.</div><div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Cross-site scripting(XSS) attacks:</span> Cross site script can add malicious links, change content of site. </div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-4" onclick="open_hide(this);">+</a></div></div>';
|
95 |
-
|
96 |
-
$waf_arr_busi = '<div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-1" style="width: 98%; overflow: ; height: ;line-height: 1.5;"><b><u>Data theft and manipulation</u>:</b> Data manipulation can lead to alter, delete, destroy data. The manipulated data may or may not be regained. It may include company privileged data, admin users data which will affect on the business. It is very necessary to fix the existing data vulnerability issues, data leaks, change weak passwords and provide high end security to stop data breach and manipulation.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent SQL-Injection attacks:</span> SQL-Injection is web security vulnerability through SQL queries executed to modify, delete and destroy data. </div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-1" onclick="open_hide(this);">-</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-2" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Web Scraping</u>:</b> Web scraping is a used to extract large amount of data from websites and saved on local computer. The web scraping involves fetching and extracting data from it. It can be used to web indexing, web mining, data mining, research, tracking online presence and reputation, etc. Price scraping is part of web scraping which is used to change prices of the products which affects a lot on business.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Cross-site scripting(XSS) attacks:</span> Cross site scripts used to web scraping and data extraction.</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-2" onclick="open_hide(this);">+</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-3" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>File manipualtion</u>:</b> The file manipuaiton used to alter, delete, execution of files on the sever. It leads to spoil site, spread malicious content which will harm to the business.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Remote File Inclusion attacks:</span> Remote file inclusion used to include local file into the server. RFI is type of vulnerability which can lead to add malicious file through a script on server.</div><div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Local File Inclusion attacks:</span> Local file inclusion used to access local file available on the server. LFI can be achieved by uploading malicious file to the server.</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-3" onclick="open_hide(this);">+</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-4" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Content modification</u>:</b> Cross-site scripting used to change or modify data shown on website. Content modification affects a lot on business due to irrelevent content, malicious links which leads to spoil the trust of clients and reputation of organizations.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent SQL-Injection attacks:</span> SQL-Injection attack can change data in database. The data used to view content such as statistical data, charts, graphs, etc. It may mislead to business.</div><div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Cross-site scripting(XSS) attacks:</span> Cross site script can add malicious links, change content of site. </div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-4" onclick="open_hide(this);">+</a></div></div>';
|
97 |
-
|
98 |
-
$waf_arr_blog = '<div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-1" style="width: 98%; overflow: ; height: ;line-height: 1.5;"><b><u>Data theft and manipulation</u>:</b> Data manipulation can lead to alter, delete, destroy data. The manipulated data may or may not be regained. It is very necessary to fix the existing data vulnerability issues, data leaks, change weak passwords and provide high end security to stop data breach and manipulation. The data may include user details, privileged data, privileged blogs, etc.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent SQL-Injection attacks:</span> SQL-Injection is web security vulnerability through SQL queries executed to modify, delete and destroy data. </div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-1" onclick="open_hide(this);">-</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-2" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Web Scraping</u>:</b> Web scraping is a used to extract large amount of data from websites and saved on local computer. The web scraping involves fetching and extracting data from it. It can be used to web indexing, web mining, data mining, research, tracking online presence and reputation, etc. Media scraping can be done in the blog/news site which alter, degrade or destroy media files.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Cross-site scripting(XSS) attacks:</span> Cross site scripts used to web scraping and data extraction.</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-2" onclick="open_hide(this);">+</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-3" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>File manipualtion</u>:</b> The file manipuaiton used to alter, delete, execution of files on the sever. It leads to spoil site, spread malicious content which will harm to the business.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Remote File Inclusion attacks:</span> Remote file inclusion used to include local file into the server. RFI is type of vulnerability which can lead to add malicious file through a script on server.</div><div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Local File Inclusion attacks:</span> Local file inclusion used to access local file available on the server. LFI can be achieved by uploading malicious file to the server.</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-3" onclick="open_hide(this);">+</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-4" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Content modification</u>:</b> Cross-site scripting used to change or modify data shown on website. Content modification affects a lot on business due to irrelevent content, malicious links which leads to spoil the trust of clients and reputation of organizations. Content modification may mislead to blog/news site subscriber. It can be used to spread fake/malicious imformation.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent SQL-Injection attacks:</span> SQL-Injection attack can change data in database. The data used to view content such as statistical data, charts, graphs, etc. It may mislead to business.</div><div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Cross-site scripting(XSS) attacks:</span> Cross site script can add malicious links, change content of site. </div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-4" onclick="open_hide(this);">+</a></div></div>';
|
99 |
-
|
100 |
-
$waf_arr_other = '<div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-1" style="width: 98%; overflow: ; height: ;line-height: 1.5;"><b><u>Data theft and manipulation</u>:</b> Data manipulation can lead to alter, delete, destroy data. The manipulated data may or may not be regained. It is very necessary to fix the existing data vulnerability issues, data leaks, change weak passwords and provide high end security to stop data breach and manipulation.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent SQL-Injection attacks:</span> SQL-Injection is web security vulnerability through SQL queries executed to modify, delete and destroy data. </div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-1" onclick="open_hide(this);">-</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-2" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Web Scraping</u>:</b> Web scraping is a used to extract large amount of data from websites and saved on local computer. The web scraping involves fetching and extracting data from it. It can be used to web indexing, web mining, data mining, research, tracking online presence and reputation, etc.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Cross-site scripting(XSS) attacks:</span> Cross site scripts used to web scraping and data extraction.</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-2" onclick="open_hide(this);">+</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-3" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>File manipualtion</u>:</b> The file manipuaiton used to alter, delete, execution of files on the sever. It leads to spoil site, spread malicious content which will harm to the business.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Remote File Inclusion attacks:</span> Remote file inclusion used to include local file into the server. RFI is type of vulnerability which can lead to add malicious file through a script on server.</div><div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Local File Inclusion attacks:</span> Local file inclusion used to access local file available on the server. LFI can be achieved by uploading malicious file to the server.</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-3" onclick="open_hide(this);">+</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-4" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Content modification</u>:</b> Cross-site scripting used to change or modify data shown on website. Content modification affects a lot on business due to irrelevent content, malicious links which leads to spoil the trust of clients and reputation of organizations.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent SQL-Injection attacks:</span> SQL-Injection attack can change data in database. The data used to view content such as statistical data, charts, graphs, etc. It may mislead to business. </div><div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Cross-site scripting(XSS) attacks:</span> Cross site script can add malicious links, change content of site. </div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-4" onclick="open_hide(this);">+</a></div></div>';
|
101 |
-
|
102 |
-
$waf_body_ecommerce = '<div class="modal-body-div">
|
103 |
-
<p class="modal-body-para" style="margin: 0;">Ecommerce sites are always under attack to spoil organizations reputaion, data theft and manipualation, file manipualation, web scraping, etc. WAF controls the access of web applications using rules designed to recognize and restrict suspicious activities.</p>';
|
104 |
-
$waf_body_business = '<div class="modal-body-div">
|
105 |
-
<p class="modal-body-para" style="margin: 0;">Business sites are always under attack to spoil organizations reputaion, data theft and manipualation, file manipualation, web scraping, etc. WAF controls the access of web applications using rules designed to recognize and restrict suspicious activities.</p>';
|
106 |
-
$waf_body_blog = '<div class="modal-body-div">
|
107 |
-
<p class="modal-body-para" style="margin: 0;">Blogs/News sites are attacked to spoil organizations reputaion, data theft and manipualation, file manipualation, web scraping, etc. WAF controls the access of web applications using rules designed to recognize and restrict suspicious activities.</p>';
|
108 |
-
$waf_body_other = '<div class="modal-body-div">
|
109 |
-
<p class="modal-body-para" style="margin: 0;">Other sites such as employment, portfolio, multilingual, etc are attacked to spoil organizations reputaion, data theft and manipualation, file manipualation, web scraping, etc. WAF controls the access of web applications using rules designed to recognize and restrict suspicious activities.</p>';
|
110 |
-
|
111 |
-
$waf_body = '<div style="width:100%; display:inline-flex; margin-left: 20px;">
|
112 |
-
<div style="width:50%;font-size: medium;">1: <b>Data theft and manipulation</b></div>
|
113 |
-
<div style="width:50%;font-size: medium;">2: <b>Web Scraping</b></div></div>
|
114 |
-
<div style="width:100%; display:inline-flex; margin-left: 20px;">
|
115 |
-
<div style="width:50%;font-size: medium;">3: <b>File manipulation</b></div>
|
116 |
-
<div style="width:50%;font-size: medium;">4: <b>Content modification</b></div></div>
|
117 |
-
</div>';
|
118 |
-
|
119 |
-
$registration_security_ecommerce = '<div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-13" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Registratoin security:</u></b> Ecommerce sites need to prevent fake registrations. It helps to keep site safe from suspicious user.';
|
120 |
-
$registration_security_business = '<div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-13" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Registratoin security:</u></b> Business sites need to prevent fake registrations. It helps to keep site safe from suspicious user.';
|
121 |
-
|
122 |
-
$registration_security_other = '<div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-13" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Registratoin security:</u></b> The sites such as employment, social networking, etc. need to prevent fake user registrations. The user will spam other users and share private data of others.';
|
123 |
-
|
124 |
-
$registration_security = '<div style="margin:1em;"><ul>
|
125 |
-
<li>
|
126 |
-
<p class="modal-body-para" style="margin: 0;">1. Temporary/Fake email ban</p>
|
127 |
-
</li>
|
128 |
-
<li>
|
129 |
-
<p class="modal-body-para" style="margin: 0;">2. OTP Verification during registrations</p>
|
130 |
-
</li>
|
131 |
-
<li>
|
132 |
-
<p class="modal-body-para" style="margin: 0;">3. Social login</p>
|
133 |
-
</li>
|
134 |
-
</ul>
|
135 |
-
</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-13" onclick="open_hide(this);">+</a></div></div>';
|
136 |
-
|
137 |
-
$login_security_ecommerce = '<div class="modal-body-div"><p class="modal-body-para">Ecommerce sites should have strong login security to prevent unauthorised access.</p></div>';
|
138 |
-
$login_security_business = '<div class="modal-body-div"><p class="modal-body-para">Business sites should have strong login security to prevent unauthorised access.</p></div>';
|
139 |
-
$login_security_blog = '<div class="modal-body-div"><p class="modal-body-para">Blogs/News sites should have strong login security to prevent unauthorised access.</p></div>';
|
140 |
-
$login_security_other = '<div class="modal-body-div"><p class="modal-body-para">Other sites such as employment, portfolio, etc. should have strong login security to prevent unauthorised access.</p></div>';
|
141 |
-
|
142 |
-
$login_security_body = '<div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-10" style="width: 98%; overflow:; height: ;line-height: 1.5;"><b><u>Limit Login:</u></b> Password guessing/Brute force attack can be controlled/prevented by limiting the login attempts. Paasword guessing can be protected by:
|
143 |
-
<div style="margin:1em;">
|
144 |
-
<ul>
|
145 |
-
<li>
|
146 |
-
<p class="modal-body-para">1. Limit Login attempts: 10 (<b>Recommended</b>)</p>
|
147 |
-
</li>
|
148 |
-
<li>
|
149 |
-
<p class="modal-body-para">2. Enforce Strong passwords</p>
|
150 |
-
</li>
|
151 |
-
</ul>
|
152 |
-
</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-10" onclick="open_hide(this);">-</a></div></div>
|
153 |
-
|
154 |
-
<div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-11" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>2-Factor:</u></b> 2-factor authentication is important to prevent unauthorised login. 2-factor authentication can be enabled on top of login credentials at the time of login. Google authenticator, Authy authenticator, Lastpass authenticator applications can be used to configure 2FA. miniOrange supports 15+ 2FA methods, it includes OTP over SMS, Email, Security Questions, QR code authentication, push notification, Hardware Token, etc. 2FA can enabled to:
|
155 |
-
<div style="margin:1em;">
|
156 |
-
<ul>
|
157 |
-
<li>
|
158 |
-
<p class="modal-body-para">1. Enable 2FA for employees (<b>Recommended</b>)</p>
|
159 |
-
</li>
|
160 |
-
<li>
|
161 |
-
<p class="modal-body-para">2. Enable 2FA for users</p>
|
162 |
-
</li>
|
163 |
-
<li>
|
164 |
-
<p class="modal-body-para">3. Backup methods in case of emergency login</p>
|
165 |
-
</li>
|
166 |
-
</ul>
|
167 |
-
</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-11" onclick="open_hide(this);">+</a></div></div>
|
168 |
-
<div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-12" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Remember device:</u></b> Remember device allows user to login from trusted devices. It keeps safe from unauthorised users who tries to gain access. It improves your login security by allowing you to login from limited and trusted deivces.
|
169 |
-
<div style="margin:1em;">
|
170 |
-
<ul>
|
171 |
-
<li>
|
172 |
-
<p class="modal-body-para">1. Allows multiple trusted devices</p>
|
173 |
-
</li>
|
174 |
-
<li>
|
175 |
-
<p class="modal-body-para">2. Limit no. of trusted devices</p>
|
176 |
-
</li>
|
177 |
-
<li>
|
178 |
-
<p class="modal-body-para">3. Block IP\'s of unauthorised users</p>
|
179 |
-
</li>
|
180 |
-
</ul>
|
181 |
-
</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-12" onclick="open_hide(this);">+</a></div></div>';
|
182 |
-
|
183 |
-
|
184 |
-
$media_body = '<div class="modal-body-div"><p class="modal-body-para">Ecommerce sites are often attacked to degrade and destroy media files such as images of product, audios and videos about products. You need to secure your media data. Media protection is important because the users of ecommerce site buy product by viewing the media of products. The broad word media scraping can be used for these types attacks.</p>
|
185 |
-
<div class="modal-body-div modal-body-para">Here is our <a target="_blank" href="https://wordpress.org/plugins/prevent-file-access/">Media protection</a> plugin.</div>
|
186 |
-
<div class="modal-body-div">The Media protection prevents media files listed below:</div>
|
187 |
-
</div>
|
188 |
-
<div style="margin:1em;">
|
189 |
-
<ul>
|
190 |
-
<li>
|
191 |
-
<p class="modal-body-para">1. It protects all type of image files, audio, video and gif files.</p>
|
192 |
-
</li>
|
193 |
-
<li>
|
194 |
-
<p class="modal-body-para">2. It also prevents access to documents such as pdf, doc, docx, txt, xls, xlsx, etc.</p>
|
195 |
-
</li>
|
196 |
-
</ul>
|
197 |
-
</div>';
|
198 |
-
|
199 |
-
$media_body_1 = '<div class="modal-body-div"><p class="modal-body-para">Some sites such as Photo Gallery or other site which contains media files are often attacked to degrade and destroy media files. You need to secure your media data. Media protection is important because the these sites are totally based on media files.</p>
|
200 |
-
<div class="modal-body-div modal-body-para">Here is our <a target="_blank" href="https://wordpress.org/plugins/prevent-file-access/">Media protection</a> plugin.</div>
|
201 |
-
<div class="modal-body-div">The Media protection prevents media files listed below:</div>
|
202 |
-
</div>
|
203 |
-
<div style="margin:1em;">
|
204 |
-
<ul>
|
205 |
-
<li>
|
206 |
-
<p class="modal-body-para">1. It protects all type of image files, audio, video and gif files.</p>
|
207 |
-
</li>
|
208 |
-
<li>
|
209 |
-
<p class="modal-body-para">2. It also prevents access to documents such as pdf, doc, docx, txt, xls, xlsx, etc.</p>
|
210 |
-
</li>
|
211 |
-
</ul>
|
212 |
-
</div>';
|
213 |
-
|
214 |
-
$backup_ecommerce = '<div class="modal-body-div"><p class="modal-body-para">The data is backbone of any e-commerce site. The ecommerce sites are attacked to steal data, data manipulation and files manipulation. You can take a backup of your data and files securely.</p></div>';
|
215 |
-
$backup_business = '<div class="modal-body-div"><p class="modal-body-para">The data is backbone of any Business site. The business sites are attacked to steal data, data manipulation and files manipulation. You can take a backup of your data and files securely.</p></div>';
|
216 |
-
$backup_blog = '<div class="modal-body-div"><p class="modal-body-para">The data is backbone of any Blog/News site. These sites are attacked to steal data, data manipulation and files manipulation. You can take a backup of your data and files securely.</p></div>';
|
217 |
-
$backup_blog = '<div class="modal-body-div"><p class="modal-body-para">The data is backbone of any site such as social networking, employment, etc. There are several attacks happens on these sites to steal data, data manipulation and files manipulation. You can take a backup of your data and files securely.</p></div>';
|
218 |
-
|
219 |
-
|
220 |
-
$backup_body = '<div class="modal-body-div">
|
221 |
-
<ul>
|
222 |
-
<li>
|
223 |
-
<p class="modal-body-para"><b>1. <u>Scheduled backup:</u></b> Scheduled backup used to create automatic backup after scheduled time. It allows you to relax because you know that all of your information is being backed up, and you are limiting what you may lose. Using this feature you can set a time interval to create a continuous backup. ';
|
224 |
-
$backup_body_1 = '<div class="modal-waf-dinner"><span class="modal-waf-sinner">Set scheduled backup time 1/2 hr for ecommerce site.</span></div>';
|
225 |
-
$backup_body_2 = '<div class="modal-waf-dinner"><span class="modal-waf-sinner">You can set automatic backup after 12 hrs time interval.</span></div>';
|
226 |
-
$backup_body_3 = '<div class="modal-waf-dinner"><span class="modal-waf-sinner">You can set automatic backup after 4-5 hrs time interval.</span></div>';
|
227 |
-
$backup_body_4 = '</p>
|
228 |
-
</li>
|
229 |
-
<li>
|
230 |
-
<p class="modal-body-para"><b>2. <u>Manual backup:</u></b> Manual backup can be taken manually whenever user wants. It is important when you made any crucial changes and don\'t want to loose data then you can immediately take a backup and keep it securely.</p>
|
231 |
-
</li>
|
232 |
-
<li>
|
233 |
-
<p class="modal-body-para"><b>3. <u>Password protected encrypted backup:</u></b> Password protected encrypted backup is very secure way to take a backup. If anyone gets it still no one can decode it because of its highly secure nature.</p>
|
234 |
-
</li>
|
235 |
-
<li>
|
236 |
-
<p class="modal-body-para"><b>4. <u>Easy restoring and recovering:</u></b> Simple one-click restore using installer files created for your website. During backup, we create an installer.php file. At the time of restore and recovery, you just need to upload the zip file of backup and installer.php and run the installer file and follow instructions to set up your website.</p>
|
237 |
-
</li>
|
238 |
-
</ul>
|
239 |
-
</div>';
|
240 |
-
|
241 |
-
$comment_ecommerce = '<div class="modal-body-div"><p class="modal-body-para">Ecommerce websites are attacked to spread unwanted or irrelevant content by submitting automated posts, comments, contact forms, etc. A spam message, content or comment includes backlinks or excessive links that redirect to illegal websites or websites containing inappropriate content. Automated scripts and botnets are used to spread such spam comments and posts to spoil the organizations reputation or product reputation. </p></div>';
|
242 |
-
$comment_business = '<div class="modal-body-div"><p class="modal-body-para">Business websites are used to spread unwanted or irrelevant content by submitting automated posts, comments, contact forms, etc. A spam message, content or comment includes backlinks or excessive links that redirect to illegal websites or websites containing inappropriate content. Automated scripts and botnets are used to spread such spam comments and posts to spoil the organizations reputation or product reputation. </p></div>';
|
243 |
-
$comment_blog = '<div class="modal-body-div"><p class="modal-body-para">Blog/News websites are used to spread unwanted or irrelevant content by submitting automated posts, comments, contact forms, etc. A spam message, content or comment includes backlinks or excessive links that redirect to illegal websites or websites containing inappropriate content. Automated scripts and botnets are used to spread such spam comments and posts to spoil the organizations reputation or product reputation. </p></div>';
|
244 |
-
$comment_other = '<div class="modal-body-div"><p class="modal-body-para">Other websites such as employment, multilingual, etc. are used to spread unwanted or irrelevant content by submitting automated posts, comments, contact forms, etc. A spam message, content or comment includes backlinks or excessive links that redirect to illegal websites or websites containing inappropriate content. Automated scripts and botnets are used to spread such spam comments and posts to spoil the organizations reputation or product reputation. </p></div>';
|
245 |
-
|
246 |
-
$comment_spam = '<div style="margin:1em;">
|
247 |
-
<ul>
|
248 |
-
<li>
|
249 |
-
<p class="modal-body-para"><b>1. <u>Comment protection:</u></b> Spam comments generated by automated scripts can be prevented using captcha. Honeypot is another widely used technique to catch bots and block them.</p>
|
250 |
-
</li>
|
251 |
-
<li>
|
252 |
-
<p class="modal-body-para"><b>2. <u>Post protection:</u></b> Automated scripts or botnets can prevented by using captcha. There are three forms of captcha availble text, math and google recaptcha. Honeypot is also another way to detect spam posts. Malware scanner can also used to scan the malware in the posts.</p>
|
253 |
-
</li>
|
254 |
-
</ul>
|
255 |
-
</div>';
|
256 |
-
|
257 |
-
|
258 |
-
$scanner = '<div class="modal-body-div"><p class="modal-body-para">Malware scanner detects the malicious code in the files. Compares the wordpress, plugins and theme files with Wordpress repo files. Detects changes present in any wordpress, theme and plugin files. It also checks outdated/vulnerable plugins, themes. It is also useful to detect malware in posts and comments.</p></div>
|
259 |
-
<div style="margin:1em;">
|
260 |
-
<ul>
|
261 |
-
<li>
|
262 |
-
<p class="modal-body-para"><b>1. <u>Malware scan:</u></b> Malware scan scans the wordpress core files, plugins and theme files to check malware. It detects the trojans, backdoors, viruses, worms, etc. in the files. </p>
|
263 |
-
</li>
|
264 |
-
<li>
|
265 |
-
<p class="modal-body-para"><b>2. <u>Wordpress version and file compare:</u></b> Checks WordPress, plugins and themes version with Wordpress.org repository and compare WordPress core, plugins and themes files with the repository to detect any file changes. Detect any changes in the files present in the WordPress plugins and themes folder.</p>
|
266 |
-
</li>
|
267 |
-
<li>
|
268 |
-
<p class="modal-body-para"><b>3. <u>Check vulnerable plugins and themes:</u></b> Checks vulnerable plugins and themes which contains malicious code. You can remove it to enhance your site security.</p>
|
269 |
-
</li>
|
270 |
-
</ul>
|
271 |
-
</div>';
|
272 |
-
|
273 |
-
$support_modal = '<div>
|
274 |
-
|
275 |
-
<div style="width: unset; float: unset; margin: 10px 20%;" class="mo_wpns_support_layout_model">
|
276 |
-
|
277 |
-
<img src="'.dirname(plugin_dir_url(__FILE__)).'/includes/images/support3.png">
|
278 |
-
<h1>Support</h1>
|
279 |
-
<p>Need any help? We are available any time, Just send us a query so we can help you.</p>
|
280 |
-
<form name="f" method="post" action="">
|
281 |
-
<input type="hidden" name="option" value="mo_wpns_send_query"/>
|
282 |
-
<table class="mo_wpns_settings_table">
|
283 |
-
<tr><td>
|
284 |
-
<input type="email" class="mo_wpns_table_textbox" id="query_email" name="query_email" value="'.$email.'" placeholder="Enter your email" required />
|
285 |
-
</td>
|
286 |
-
</tr>
|
287 |
-
<tr><td>
|
288 |
-
<input type="text" class="mo_wpns_table_textbox" name="query_phone" id="query_phone" value="'.$phone.'" placeholder="Enter your phone"/>
|
289 |
-
</td>
|
290 |
-
</tr>
|
291 |
-
<tr>
|
292 |
-
<td>
|
293 |
-
<textarea id="query" name="query" class="mo_wpns_settings_textarea" style="resize: vertical;width:100%" cols="52" rows="7" placeholder="Write your query here"></textarea>
|
294 |
-
</td>
|
295 |
-
</tr>
|
296 |
-
</table>
|
297 |
-
<input type="submit" name="send_query" id="send_query" value="Submit Query" class="mo_wpns_button mo2f_submit_query" />
|
298 |
-
</form>
|
299 |
-
<br />
|
300 |
-
</div>
|
301 |
-
</div>
|
302 |
-
<script>
|
303 |
-
function moSharingSizeValidate(e){
|
304 |
-
var t=parseInt(e.value.trim());t>60?e.value=60:10>t&&(e.value=10)
|
305 |
-
}
|
306 |
-
function moSharingSpaceValidate(e){
|
307 |
-
var t=parseInt(e.value.trim());t>50?e.value=50:0>t&&(e.value=0)
|
308 |
-
}
|
309 |
-
function moLoginSizeValidate(e){
|
310 |
-
var t=parseInt(e.value.trim());t>60?e.value=60:20>t&&(e.value=20)
|
311 |
-
}
|
312 |
-
function moLoginSpaceValidate(e){
|
313 |
-
var t=parseInt(e.value.trim());t>60?e.value=60:0>t&&(e.value=0)
|
314 |
-
}
|
315 |
-
function moLoginWidthValidate(e){
|
316 |
-
var t=parseInt(e.value.trim());t>1000?e.value=1000:140>t&&(e.value=140)
|
317 |
-
}
|
318 |
-
function moLoginHeightValidate(e){
|
319 |
-
var t=parseInt(e.value.trim());t>50?e.value=50:35>t&&(e.value=35)
|
320 |
-
}
|
321 |
-
</script>';
|
322 |
-
|
323 |
-
|
324 |
-
$ecommerce_site = array(array('Web Application Firewall(WAF)', $waf_body_ecommerce.$waf_body.$waf_arr_ecc), array('Login Security', $login_security_ecommerce.$login_security_body.$registration_security_ecommerce.$registration_security), array('Media Protection', $media_body), array('Encrypted Backup', $backup_ecommerce.$backup_body.$backup_body_1.$backup_body_4), array('Comment and Spam Protection', $comment_ecommerce.$comment_spam), array('Malware Scanner', $scanner), array('Support', $support_modal));
|
325 |
-
|
326 |
-
$business_site = array(array('Web Application Firewall(WAF)', $waf_body_business.$waf_body.$waf_arr_busi), array('Encrypted Backup', $backup_business.$backup_body.$backup_body_2.$backup_body_4), array('Comment and Spam Protection', $comment_business.$comment_spam), array('Login Security', $login_security_business.$login_security_body.$registration_security_business.$registration_security), array('Malware Scanner', $scanner), array('Support', $support_modal));
|
327 |
-
|
328 |
-
$blog_site = array(array('Web Application Firewall(WAF)', $waf_body_blog.$waf_body.$waf_arr_blog), array('Comment and Spam Protection', $comment_blog.$comment_spam), array('Login Security', $login_security_blog.$login_security_body), array('Encrypted Backup', $backup_blog.$backup_body.$backup_body_3.$backup_body_4), array('Malware Scanner', $scanner), array('Support', $support_modal));
|
329 |
-
|
330 |
-
$other_site = array(array('Web Application Firewall(WAF)', $waf_body_other.$waf_body.$waf_arr_other), array('Comment and Spam Protection', $comment_other.$comment_spam), array('Login Security', $login_security_other.$login_security_body), array('Encrypted Backup', $backup_blog.$backup_body.$backup_body_4), array('Media Protection', $media_body_1), array('Malware Scanner', $scanner), array('Support', $support_modal));
|
331 |
-
|
332 |
-
$main_pointer = array('Main' => array('Let\'s get Started', $tour_body), 'Ecommerce' => $ecommerce_site, 'Business' => $business_site, 'Blogs/News' => $blog_site, 'Other' => $other_site);
|
333 |
-
|
334 |
-
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'tour-model.php';
|
1 |
+
<?php
|
2 |
+
|
3 |
+
global $mo2f_dirName;
|
4 |
+
$current_user = wp_get_current_user();
|
5 |
+
$email = get_option("mo2f_email");
|
6 |
+
$phone = get_option("mo_wpns_admin_phone");
|
7 |
+
$display = get_option('mo2f_tour_started') == 2?'block':'none';
|
8 |
+
$networkSEnable = MoWpnsUtility::get_mo2f_db_option('mo_wpns_2fa_with_network_security', 'get_option');
|
9 |
+
if(empty($email))
|
10 |
+
$email = $current_user->user_email;
|
11 |
+
$counter = 0;
|
12 |
+
$enableTour = $networkSEnable == 1 ? '' : 'disabled';
|
13 |
+
$tour_body = '<p class="modal-body-para">Hey, Thank you for installing <b style="color: #E85700">miniOrange 2-Factor plugin</b>.</p>
|
14 |
+
<p class="modal-body-para">Two-factor will provide extra layer of security to your users account which will help to protect your users accounts from any outside attack.</p>';
|
15 |
+
if($networkSEnable != 1)
|
16 |
+
{
|
17 |
+
$tour_body .= '<div style="margin-left:37.5%;margin-right:37.5%;">';
|
18 |
+
}
|
19 |
+
|
20 |
+
$tour_body .= '<table style="width: 100%; text-align: center; table-layout: fixed; font-size: medium;">
|
21 |
+
<div class="mo2f_hiddenradio">
|
22 |
+
<tr>
|
23 |
+
|
24 |
+
<td style="border: 1px solid black;" id="2fa">
|
25 |
+
<label>
|
26 |
+
<input type="radio" name="mo2f_two_factor" value="2fa" checked style="display:none">
|
27 |
+
<img src="'.plugin_dir_url(dirname(__FILE__)) . 'includes/images/google-authenticator.png">
|
28 |
+
</label>
|
29 |
+
</td>';
|
30 |
+
if($networkSEnable == 1)
|
31 |
+
{
|
32 |
+
$tour_body .= '<td style="border: 1px solid black;" id="waf">
|
33 |
+
<label >
|
34 |
+
<input type="radio" name="mo2f_two_factor" value="waf" style="display:none" '.$enableTour.'>
|
35 |
+
<img src="'.plugin_dir_url(dirname(__FILE__)) . 'includes/images/mo-waf-logo.png">
|
36 |
+
</label>
|
37 |
+
</td>
|
38 |
+
|
39 |
+
<td style="border: 1px solid black;" id="login">
|
40 |
+
<label >
|
41 |
+
<input type="radio" name="mo2f_two_factor" value="login" style="display:none"'.$enableTour.'>
|
42 |
+
<img src="'.plugin_dir_url(dirname(__FILE__)) . 'includes/images/login-protection-logo.png">
|
43 |
+
</label>
|
44 |
+
</td>
|
45 |
+
|
46 |
+
<td style="border: 1px solid black;" id="backup">
|
47 |
+
<label>
|
48 |
+
<input type="radio" name="mo2f_two_factor" value="backup" style="display:none"'.$enableTour.'>
|
49 |
+
<img src="'.plugin_dir_url(dirname(__FILE__)) . 'includes/images/database-backup-logo.png">
|
50 |
+
</label>
|
51 |
+
</td>
|
52 |
+
|
53 |
+
<td style="border: 1px solid black;" id="malware">
|
54 |
+
<label >
|
55 |
+
<input type="radio" name="mo2f_two_factor" value="malware" style="display:none"'.$enableTour.'>
|
56 |
+
<img src="'.plugin_dir_url(dirname(__FILE__)) . 'includes/images/malware-scanner-logo.png">
|
57 |
+
</label>
|
58 |
+
</td>';
|
59 |
+
}
|
60 |
+
$tour_body .= '</tr>
|
61 |
+
<tr>
|
62 |
+
<th>
|
63 |
+
Two-factor authentication
|
64 |
+
</th>';
|
65 |
+
|
66 |
+
if($networkSEnable == 1)
|
67 |
+
{
|
68 |
+
|
69 |
+
$tour_body .= '<th>
|
70 |
+
Web Application Firewall(WAF)
|
71 |
+
</th>
|
72 |
+
|
73 |
+
<th>
|
74 |
+
Login Protection
|
75 |
+
</th>
|
76 |
+
|
77 |
+
<th>
|
78 |
+
Database Backup
|
79 |
+
</th>
|
80 |
+
|
81 |
+
<th>
|
82 |
+
Malware scanner
|
83 |
+
</th>';
|
84 |
+
}
|
85 |
+
|
86 |
+
$tour_body .= '</tr>
|
87 |
+
</div>
|
88 |
+
</table>';
|
89 |
+
if($networkSEnable != 1)
|
90 |
+
{
|
91 |
+
$tour_body .= '</div>';
|
92 |
+
}
|
93 |
+
|
94 |
+
$waf_arr_ecc = '<div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-1" style="width: 98%; overflow: ; height: ;line-height: 1.5;"><b><u>Data theft and manipulation</u>:</b> Data manipulation can lead to alter, delete, destroy data. The manipulated data may or may not be regained. It includes very sensitive data such as user details, credit/debit card or bank details. It is very necessary to fix the existing data vulnerability issues, data leaks, change weak passwords and provide high end security to stop data breach and manipulation.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent SQL-Injection attacks:</span> SQL-Injection is web security vulnerability through SQL queries executed to modify, delete and destroy data. </div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-1" onclick="open_hide(this);">-</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-2" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Web Scraping</u>:</b> Web scraping is a used to extract large amount of data from websites and saved on local computer. The web scraping involves fetching and extracting data from it. It can be used to web indexing, web mining, data mining, research, tracking online presence and reputation, etc. Media scraping, price scraping are also some scraping techniques which are used to degrade/destroy media files and change the price of products.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Cross-site scripting(XSS) attacks:</span> Cross site scripts used to web scraping and data extraction.</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-2" onclick="open_hide(this);">+</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-3" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>File manipualtion</u>:</b> The file manipuaiton used to alter, delete, execution of files on the sever. It leads to spoil site, spread malicious content which will harm to the business. <div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Remote File Inclusion attacks:</span> Remote file inclusion used to include local file into the server. RFI is type of vulnerability which can lead to add malicious file through a script on server.</div><div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Local File Inclusion attacks:</span> Local file inclusion used to access local file available on the server. LFI can be achieved by uploading malicious file to the server.</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-3" onclick="open_hide(this);">+</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-4" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Content modification</u>:</b> Cross-site scripting used to change or modify data shown on website. Content modification affects a lot on business due to irrelevent content, malicious links which leads to spoil the trust of clients and reputation of organizations.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent SQL-Injection attacks:</span> SQL-Injection attack can change data in database. The data used to view content such as statistical data, charts, graphs, etc. It may mislead to business.</div><div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Cross-site scripting(XSS) attacks:</span> Cross site script can add malicious links, change content of site. </div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-4" onclick="open_hide(this);">+</a></div></div>';
|
95 |
+
|
96 |
+
$waf_arr_busi = '<div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-1" style="width: 98%; overflow: ; height: ;line-height: 1.5;"><b><u>Data theft and manipulation</u>:</b> Data manipulation can lead to alter, delete, destroy data. The manipulated data may or may not be regained. It may include company privileged data, admin users data which will affect on the business. It is very necessary to fix the existing data vulnerability issues, data leaks, change weak passwords and provide high end security to stop data breach and manipulation.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent SQL-Injection attacks:</span> SQL-Injection is web security vulnerability through SQL queries executed to modify, delete and destroy data. </div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-1" onclick="open_hide(this);">-</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-2" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Web Scraping</u>:</b> Web scraping is a used to extract large amount of data from websites and saved on local computer. The web scraping involves fetching and extracting data from it. It can be used to web indexing, web mining, data mining, research, tracking online presence and reputation, etc. Price scraping is part of web scraping which is used to change prices of the products which affects a lot on business.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Cross-site scripting(XSS) attacks:</span> Cross site scripts used to web scraping and data extraction.</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-2" onclick="open_hide(this);">+</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-3" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>File manipualtion</u>:</b> The file manipuaiton used to alter, delete, execution of files on the sever. It leads to spoil site, spread malicious content which will harm to the business.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Remote File Inclusion attacks:</span> Remote file inclusion used to include local file into the server. RFI is type of vulnerability which can lead to add malicious file through a script on server.</div><div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Local File Inclusion attacks:</span> Local file inclusion used to access local file available on the server. LFI can be achieved by uploading malicious file to the server.</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-3" onclick="open_hide(this);">+</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-4" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Content modification</u>:</b> Cross-site scripting used to change or modify data shown on website. Content modification affects a lot on business due to irrelevent content, malicious links which leads to spoil the trust of clients and reputation of organizations.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent SQL-Injection attacks:</span> SQL-Injection attack can change data in database. The data used to view content such as statistical data, charts, graphs, etc. It may mislead to business.</div><div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Cross-site scripting(XSS) attacks:</span> Cross site script can add malicious links, change content of site. </div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-4" onclick="open_hide(this);">+</a></div></div>';
|
97 |
+
|
98 |
+
$waf_arr_blog = '<div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-1" style="width: 98%; overflow: ; height: ;line-height: 1.5;"><b><u>Data theft and manipulation</u>:</b> Data manipulation can lead to alter, delete, destroy data. The manipulated data may or may not be regained. It is very necessary to fix the existing data vulnerability issues, data leaks, change weak passwords and provide high end security to stop data breach and manipulation. The data may include user details, privileged data, privileged blogs, etc.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent SQL-Injection attacks:</span> SQL-Injection is web security vulnerability through SQL queries executed to modify, delete and destroy data. </div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-1" onclick="open_hide(this);">-</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-2" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Web Scraping</u>:</b> Web scraping is a used to extract large amount of data from websites and saved on local computer. The web scraping involves fetching and extracting data from it. It can be used to web indexing, web mining, data mining, research, tracking online presence and reputation, etc. Media scraping can be done in the blog/news site which alter, degrade or destroy media files.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Cross-site scripting(XSS) attacks:</span> Cross site scripts used to web scraping and data extraction.</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-2" onclick="open_hide(this);">+</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-3" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>File manipualtion</u>:</b> The file manipuaiton used to alter, delete, execution of files on the sever. It leads to spoil site, spread malicious content which will harm to the business.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Remote File Inclusion attacks:</span> Remote file inclusion used to include local file into the server. RFI is type of vulnerability which can lead to add malicious file through a script on server.</div><div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Local File Inclusion attacks:</span> Local file inclusion used to access local file available on the server. LFI can be achieved by uploading malicious file to the server.</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-3" onclick="open_hide(this);">+</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-4" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Content modification</u>:</b> Cross-site scripting used to change or modify data shown on website. Content modification affects a lot on business due to irrelevent content, malicious links which leads to spoil the trust of clients and reputation of organizations. Content modification may mislead to blog/news site subscriber. It can be used to spread fake/malicious imformation.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent SQL-Injection attacks:</span> SQL-Injection attack can change data in database. The data used to view content such as statistical data, charts, graphs, etc. It may mislead to business.</div><div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Cross-site scripting(XSS) attacks:</span> Cross site script can add malicious links, change content of site. </div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-4" onclick="open_hide(this);">+</a></div></div>';
|
99 |
+
|
100 |
+
$waf_arr_other = '<div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-1" style="width: 98%; overflow: ; height: ;line-height: 1.5;"><b><u>Data theft and manipulation</u>:</b> Data manipulation can lead to alter, delete, destroy data. The manipulated data may or may not be regained. It is very necessary to fix the existing data vulnerability issues, data leaks, change weak passwords and provide high end security to stop data breach and manipulation.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent SQL-Injection attacks:</span> SQL-Injection is web security vulnerability through SQL queries executed to modify, delete and destroy data. </div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-1" onclick="open_hide(this);">-</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-2" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Web Scraping</u>:</b> Web scraping is a used to extract large amount of data from websites and saved on local computer. The web scraping involves fetching and extracting data from it. It can be used to web indexing, web mining, data mining, research, tracking online presence and reputation, etc.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Cross-site scripting(XSS) attacks:</span> Cross site scripts used to web scraping and data extraction.</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-2" onclick="open_hide(this);">+</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-3" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>File manipualtion</u>:</b> The file manipuaiton used to alter, delete, execution of files on the sever. It leads to spoil site, spread malicious content which will harm to the business.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Remote File Inclusion attacks:</span> Remote file inclusion used to include local file into the server. RFI is type of vulnerability which can lead to add malicious file through a script on server.</div><div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Local File Inclusion attacks:</span> Local file inclusion used to access local file available on the server. LFI can be achieved by uploading malicious file to the server.</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-3" onclick="open_hide(this);">+</a></div></div><div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-4" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Content modification</u>:</b> Cross-site scripting used to change or modify data shown on website. Content modification affects a lot on business due to irrelevent content, malicious links which leads to spoil the trust of clients and reputation of organizations.<div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent SQL-Injection attacks:</span> SQL-Injection attack can change data in database. The data used to view content such as statistical data, charts, graphs, etc. It may mislead to business. </div><div class="modal-waf-dinner"><span class="modal-waf-sinner">Prevent Cross-site scripting(XSS) attacks:</span> Cross site script can add malicious links, change content of site. </div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-4" onclick="open_hide(this);">+</a></div></div>';
|
101 |
+
|
102 |
+
$waf_body_ecommerce = '<div class="modal-body-div">
|
103 |
+
<p class="modal-body-para" style="margin: 0;">Ecommerce sites are always under attack to spoil organizations reputaion, data theft and manipualation, file manipualation, web scraping, etc. WAF controls the access of web applications using rules designed to recognize and restrict suspicious activities.</p>';
|
104 |
+
$waf_body_business = '<div class="modal-body-div">
|
105 |
+
<p class="modal-body-para" style="margin: 0;">Business sites are always under attack to spoil organizations reputaion, data theft and manipualation, file manipualation, web scraping, etc. WAF controls the access of web applications using rules designed to recognize and restrict suspicious activities.</p>';
|
106 |
+
$waf_body_blog = '<div class="modal-body-div">
|
107 |
+
<p class="modal-body-para" style="margin: 0;">Blogs/News sites are attacked to spoil organizations reputaion, data theft and manipualation, file manipualation, web scraping, etc. WAF controls the access of web applications using rules designed to recognize and restrict suspicious activities.</p>';
|
108 |
+
$waf_body_other = '<div class="modal-body-div">
|
109 |
+
<p class="modal-body-para" style="margin: 0;">Other sites such as employment, portfolio, multilingual, etc are attacked to spoil organizations reputaion, data theft and manipualation, file manipualation, web scraping, etc. WAF controls the access of web applications using rules designed to recognize and restrict suspicious activities.</p>';
|
110 |
+
|
111 |
+
$waf_body = '<div style="width:100%; display:inline-flex; margin-left: 20px;">
|
112 |
+
<div style="width:50%;font-size: medium;">1: <b>Data theft and manipulation</b></div>
|
113 |
+
<div style="width:50%;font-size: medium;">2: <b>Web Scraping</b></div></div>
|
114 |
+
<div style="width:100%; display:inline-flex; margin-left: 20px;">
|
115 |
+
<div style="width:50%;font-size: medium;">3: <b>File manipulation</b></div>
|
116 |
+
<div style="width:50%;font-size: medium;">4: <b>Content modification</b></div></div>
|
117 |
+
</div>';
|
118 |
+
|
119 |
+
$registration_security_ecommerce = '<div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-13" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Registratoin security:</u></b> Ecommerce sites need to prevent fake registrations. It helps to keep site safe from suspicious user.';
|
120 |
+
$registration_security_business = '<div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-13" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Registratoin security:</u></b> Business sites need to prevent fake registrations. It helps to keep site safe from suspicious user.';
|
121 |
+
|
122 |
+
$registration_security_other = '<div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-13" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Registratoin security:</u></b> The sites such as employment, social networking, etc. need to prevent fake user registrations. The user will spam other users and share private data of others.';
|
123 |
+
|
124 |
+
$registration_security = '<div style="margin:1em;"><ul>
|
125 |
+
<li>
|
126 |
+
<p class="modal-body-para" style="margin: 0;">1. Temporary/Fake email ban</p>
|
127 |
+
</li>
|
128 |
+
<li>
|
129 |
+
<p class="modal-body-para" style="margin: 0;">2. OTP Verification during registrations</p>
|
130 |
+
</li>
|
131 |
+
<li>
|
132 |
+
<p class="modal-body-para" style="margin: 0;">3. Social login</p>
|
133 |
+
</li>
|
134 |
+
</ul>
|
135 |
+
</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-13" onclick="open_hide(this);">+</a></div></div>';
|
136 |
+
|
137 |
+
$login_security_ecommerce = '<div class="modal-body-div"><p class="modal-body-para">Ecommerce sites should have strong login security to prevent unauthorised access.</p></div>';
|
138 |
+
$login_security_business = '<div class="modal-body-div"><p class="modal-body-para">Business sites should have strong login security to prevent unauthorised access.</p></div>';
|
139 |
+
$login_security_blog = '<div class="modal-body-div"><p class="modal-body-para">Blogs/News sites should have strong login security to prevent unauthorised access.</p></div>';
|
140 |
+
$login_security_other = '<div class="modal-body-div"><p class="modal-body-para">Other sites such as employment, portfolio, etc. should have strong login security to prevent unauthorised access.</p></div>';
|
141 |
+
|
142 |
+
$login_security_body = '<div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-10" style="width: 98%; overflow:; height: ;line-height: 1.5;"><b><u>Limit Login:</u></b> Password guessing/Brute force attack can be controlled/prevented by limiting the login attempts. Paasword guessing can be protected by:
|
143 |
+
<div style="margin:1em;">
|
144 |
+
<ul>
|
145 |
+
<li>
|
146 |
+
<p class="modal-body-para">1. Limit Login attempts: 10 (<b>Recommended</b>)</p>
|
147 |
+
</li>
|
148 |
+
<li>
|
149 |
+
<p class="modal-body-para">2. Enforce Strong passwords</p>
|
150 |
+
</li>
|
151 |
+
</ul>
|
152 |
+
</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-10" onclick="open_hide(this);">-</a></div></div>
|
153 |
+
|
154 |
+
<div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-11" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>2-Factor:</u></b> 2-factor authentication is important to prevent unauthorised login. 2-factor authentication can be enabled on top of login credentials at the time of login. Google authenticator, Authy authenticator, Lastpass authenticator applications can be used to configure 2FA. miniOrange supports 15+ 2FA methods, it includes OTP over SMS, Email, Security Questions, QR code authentication, push notification, Hardware Token, etc. 2FA can enabled to:
|
155 |
+
<div style="margin:1em;">
|
156 |
+
<ul>
|
157 |
+
<li>
|
158 |
+
<p class="modal-body-para">1. Enable 2FA for employees (<b>Recommended</b>)</p>
|
159 |
+
</li>
|
160 |
+
<li>
|
161 |
+
<p class="modal-body-para">2. Enable 2FA for users</p>
|
162 |
+
</li>
|
163 |
+
<li>
|
164 |
+
<p class="modal-body-para">3. Backup methods in case of emergency login</p>
|
165 |
+
</li>
|
166 |
+
</ul>
|
167 |
+
</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-11" onclick="open_hide(this);">+</a></div></div>
|
168 |
+
<div class="modal-body-div-c modal-body-div-d"><div id="div-show-hide-12" style="width: 98%; overflow: hidden; height: 50px;line-height: 1.5;"><b><u>Remember device:</u></b> Remember device allows user to login from trusted devices. It keeps safe from unauthorised users who tries to gain access. It improves your login security by allowing you to login from limited and trusted deivces.
|
169 |
+
<div style="margin:1em;">
|
170 |
+
<ul>
|
171 |
+
<li>
|
172 |
+
<p class="modal-body-para">1. Allows multiple trusted devices</p>
|
173 |
+
</li>
|
174 |
+
<li>
|
175 |
+
<p class="modal-body-para">2. Limit no. of trusted devices</p>
|
176 |
+
</li>
|
177 |
+
<li>
|
178 |
+
<p class="modal-body-para">3. Block IP\'s of unauthorised users</p>
|
179 |
+
</li>
|
180 |
+
</ul>
|
181 |
+
</div></div><div style="width: 2%; font-size: xx-large;"><a id="show-hide-12" onclick="open_hide(this);">+</a></div></div>';
|
182 |
+
|
183 |
+
|
184 |
+
$media_body = '<div class="modal-body-div"><p class="modal-body-para">Ecommerce sites are often attacked to degrade and destroy media files such as images of product, audios and videos about products. You need to secure your media data. Media protection is important because the users of ecommerce site buy product by viewing the media of products. The broad word media scraping can be used for these types attacks.</p>
|
185 |
+
<div class="modal-body-div modal-body-para">Here is our <a target="_blank" href="https://wordpress.org/plugins/prevent-file-access/">Media protection</a> plugin.</div>
|
186 |
+
<div class="modal-body-div">The Media protection prevents media files listed below:</div>
|
187 |
+
</div>
|
188 |
+
<div style="margin:1em;">
|
189 |
+
<ul>
|
190 |
+
<li>
|
191 |
+
<p class="modal-body-para">1. It protects all type of image files, audio, video and gif files.</p>
|
192 |
+
</li>
|
193 |
+
<li>
|
194 |
+
<p class="modal-body-para">2. It also prevents access to documents such as pdf, doc, docx, txt, xls, xlsx, etc.</p>
|
195 |
+
</li>
|
196 |
+
</ul>
|
197 |
+
</div>';
|
198 |
+
|
199 |
+
$media_body_1 = '<div class="modal-body-div"><p class="modal-body-para">Some sites such as Photo Gallery or other site which contains media files are often attacked to degrade and destroy media files. You need to secure your media data. Media protection is important because the these sites are totally based on media files.</p>
|
200 |
+
<div class="modal-body-div modal-body-para">Here is our <a target="_blank" href="https://wordpress.org/plugins/prevent-file-access/">Media protection</a> plugin.</div>
|
201 |
+
<div class="modal-body-div">The Media protection prevents media files listed below:</div>
|
202 |
+
</div>
|
203 |
+
<div style="margin:1em;">
|
204 |
+
<ul>
|
205 |
+
<li>
|
206 |
+
<p class="modal-body-para">1. It protects all type of image files, audio, video and gif files.</p>
|
207 |
+
</li>
|
208 |
+
<li>
|
209 |
+
<p class="modal-body-para">2. It also prevents access to documents such as pdf, doc, docx, txt, xls, xlsx, etc.</p>
|
210 |
+
</li>
|
211 |
+
</ul>
|
212 |
+
</div>';
|
213 |
+
|
214 |
+
$backup_ecommerce = '<div class="modal-body-div"><p class="modal-body-para">The data is backbone of any e-commerce site. The ecommerce sites are attacked to steal data, data manipulation and files manipulation. You can take a backup of your data and files securely.</p></div>';
|
215 |
+
$backup_business = '<div class="modal-body-div"><p class="modal-body-para">The data is backbone of any Business site. The business sites are attacked to steal data, data manipulation and files manipulation. You can take a backup of your data and files securely.</p></div>';
|
216 |
+
$backup_blog = '<div class="modal-body-div"><p class="modal-body-para">The data is backbone of any Blog/News site. These sites are attacked to steal data, data manipulation and files manipulation. You can take a backup of your data and files securely.</p></div>';
|
217 |
+
$backup_blog = '<div class="modal-body-div"><p class="modal-body-para">The data is backbone of any site such as social networking, employment, etc. There are several attacks happens on these sites to steal data, data manipulation and files manipulation. You can take a backup of your data and files securely.</p></div>';
|
218 |
+
|
219 |
+
|
220 |
+
$backup_body = '<div class="modal-body-div">
|
221 |
+
<ul>
|
222 |
+
<li>
|
223 |
+
<p class="modal-body-para"><b>1. <u>Scheduled backup:</u></b> Scheduled backup used to create automatic backup after scheduled time. It allows you to relax because you know that all of your information is being backed up, and you are limiting what you may lose. Using this feature you can set a time interval to create a continuous backup. ';
|
224 |
+
$backup_body_1 = '<div class="modal-waf-dinner"><span class="modal-waf-sinner">Set scheduled backup time 1/2 hr for ecommerce site.</span></div>';
|
225 |
+
$backup_body_2 = '<div class="modal-waf-dinner"><span class="modal-waf-sinner">You can set automatic backup after 12 hrs time interval.</span></div>';
|
226 |
+
$backup_body_3 = '<div class="modal-waf-dinner"><span class="modal-waf-sinner">You can set automatic backup after 4-5 hrs time interval.</span></div>';
|
227 |
+
$backup_body_4 = '</p>
|
228 |
+
</li>
|
229 |
+
<li>
|
230 |
+
<p class="modal-body-para"><b>2. <u>Manual backup:</u></b> Manual backup can be taken manually whenever user wants. It is important when you made any crucial changes and don\'t want to loose data then you can immediately take a backup and keep it securely.</p>
|
231 |
+
</li>
|
232 |
+
<li>
|
233 |
+
<p class="modal-body-para"><b>3. <u>Password protected encrypted backup:</u></b> Password protected encrypted backup is very secure way to take a backup. If anyone gets it still no one can decode it because of its highly secure nature.</p>
|
234 |
+
</li>
|
235 |
+
<li>
|
236 |
+
<p class="modal-body-para"><b>4. <u>Easy restoring and recovering:</u></b> Simple one-click restore using installer files created for your website. During backup, we create an installer.php file. At the time of restore and recovery, you just need to upload the zip file of backup and installer.php and run the installer file and follow instructions to set up your website.</p>
|
237 |
+
</li>
|
238 |
+
</ul>
|
239 |
+
</div>';
|
240 |
+
|
241 |
+
$comment_ecommerce = '<div class="modal-body-div"><p class="modal-body-para">Ecommerce websites are attacked to spread unwanted or irrelevant content by submitting automated posts, comments, contact forms, etc. A spam message, content or comment includes backlinks or excessive links that redirect to illegal websites or websites containing inappropriate content. Automated scripts and botnets are used to spread such spam comments and posts to spoil the organizations reputation or product reputation. </p></div>';
|
242 |
+
$comment_business = '<div class="modal-body-div"><p class="modal-body-para">Business websites are used to spread unwanted or irrelevant content by submitting automated posts, comments, contact forms, etc. A spam message, content or comment includes backlinks or excessive links that redirect to illegal websites or websites containing inappropriate content. Automated scripts and botnets are used to spread such spam comments and posts to spoil the organizations reputation or product reputation. </p></div>';
|
243 |
+
$comment_blog = '<div class="modal-body-div"><p class="modal-body-para">Blog/News websites are used to spread unwanted or irrelevant content by submitting automated posts, comments, contact forms, etc. A spam message, content or comment includes backlinks or excessive links that redirect to illegal websites or websites containing inappropriate content. Automated scripts and botnets are used to spread such spam comments and posts to spoil the organizations reputation or product reputation. </p></div>';
|
244 |
+
$comment_other = '<div class="modal-body-div"><p class="modal-body-para">Other websites such as employment, multilingual, etc. are used to spread unwanted or irrelevant content by submitting automated posts, comments, contact forms, etc. A spam message, content or comment includes backlinks or excessive links that redirect to illegal websites or websites containing inappropriate content. Automated scripts and botnets are used to spread such spam comments and posts to spoil the organizations reputation or product reputation. </p></div>';
|
245 |
+
|
246 |
+
$comment_spam = '<div style="margin:1em;">
|
247 |
+
<ul>
|
248 |
+
<li>
|
249 |
+
<p class="modal-body-para"><b>1. <u>Comment protection:</u></b> Spam comments generated by automated scripts can be prevented using captcha. Honeypot is another widely used technique to catch bots and block them.</p>
|
250 |
+
</li>
|
251 |
+
<li>
|
252 |
+
<p class="modal-body-para"><b>2. <u>Post protection:</u></b> Automated scripts or botnets can prevented by using captcha. There are three forms of captcha availble text, math and google recaptcha. Honeypot is also another way to detect spam posts. Malware scanner can also used to scan the malware in the posts.</p>
|
253 |
+
</li>
|
254 |
+
</ul>
|
255 |
+
</div>';
|
256 |
+
|
257 |
+
|
258 |
+
$scanner = '<div class="modal-body-div"><p class="modal-body-para">Malware scanner detects the malicious code in the files. Compares the wordpress, plugins and theme files with Wordpress repo files. Detects changes present in any wordpress, theme and plugin files. It also checks outdated/vulnerable plugins, themes. It is also useful to detect malware in posts and comments.</p></div>
|
259 |
+
<div style="margin:1em;">
|
260 |
+
<ul>
|
261 |
+
<li>
|
262 |
+
<p class="modal-body-para"><b>1. <u>Malware scan:</u></b> Malware scan scans the wordpress core files, plugins and theme files to check malware. It detects the trojans, backdoors, viruses, worms, etc. in the files. </p>
|
263 |
+
</li>
|
264 |
+
<li>
|
265 |
+
<p class="modal-body-para"><b>2. <u>Wordpress version and file compare:</u></b> Checks WordPress, plugins and themes version with Wordpress.org repository and compare WordPress core, plugins and themes files with the repository to detect any file changes. Detect any changes in the files present in the WordPress plugins and themes folder.</p>
|
266 |
+
</li>
|
267 |
+
<li>
|
268 |
+
<p class="modal-body-para"><b>3. <u>Check vulnerable plugins and themes:</u></b> Checks vulnerable plugins and themes which contains malicious code. You can remove it to enhance your site security.</p>
|
269 |
+
</li>
|
270 |
+
</ul>
|
271 |
+
</div>';
|
272 |
+
|
273 |
+
$support_modal = '<div>
|
274 |
+
|
275 |
+
<div style="width: unset; float: unset; margin: 10px 20%;" class="mo_wpns_support_layout_model">
|
276 |
+
|
277 |
+
<img src="'.dirname(plugin_dir_url(__FILE__)).'/includes/images/support3.png">
|
278 |
+
<h1>Support</h1>
|
279 |
+
<p>Need any help? We are available any time, Just send us a query so we can help you.</p>
|
280 |
+
<form name="f" method="post" action="">
|
281 |
+
<input type="hidden" name="option" value="mo_wpns_send_query"/>
|
282 |
+
<table class="mo_wpns_settings_table">
|
283 |
+
<tr><td>
|
284 |
+
<input type="email" class="mo_wpns_table_textbox" id="query_email" name="query_email" value="'.$email.'" placeholder="Enter your email" required />
|
285 |
+
</td>
|
286 |
+
</tr>
|
287 |
+
<tr><td>
|
288 |
+
<input type="text" class="mo_wpns_table_textbox" name="query_phone" id="query_phone" value="'.$phone.'" placeholder="Enter your phone"/>
|
289 |
+
</td>
|
290 |
+
</tr>
|
291 |
+
<tr>
|
292 |
+
<td>
|
293 |
+
<textarea id="query" name="query" class="mo_wpns_settings_textarea" style="resize: vertical;width:100%" cols="52" rows="7" placeholder="Write your query here"></textarea>
|
294 |
+
</td>
|
295 |
+
</tr>
|
296 |
+
</table>
|
297 |
+
<input type="submit" name="send_query" id="send_query" value="Submit Query" class="mo_wpns_button mo2f_submit_query" />
|
298 |
+
</form>
|
299 |
+
<br />
|
300 |
+
</div>
|
301 |
+
</div>
|
302 |
+
<script>
|
303 |
+
function moSharingSizeValidate(e){
|
304 |
+
var t=parseInt(e.value.trim());t>60?e.value=60:10>t&&(e.value=10)
|
305 |
+
}
|
306 |
+
function moSharingSpaceValidate(e){
|
307 |
+
var t=parseInt(e.value.trim());t>50?e.value=50:0>t&&(e.value=0)
|
308 |
+
}
|
309 |
+
function moLoginSizeValidate(e){
|
310 |
+
var t=parseInt(e.value.trim());t>60?e.value=60:20>t&&(e.value=20)
|
311 |
+
}
|
312 |
+
function moLoginSpaceValidate(e){
|
313 |
+
var t=parseInt(e.value.trim());t>60?e.value=60:0>t&&(e.value=0)
|
314 |
+
}
|
315 |
+
function moLoginWidthValidate(e){
|
316 |
+
var t=parseInt(e.value.trim());t>1000?e.value=1000:140>t&&(e.value=140)
|
317 |
+
}
|
318 |
+
function moLoginHeightValidate(e){
|
319 |
+
var t=parseInt(e.value.trim());t>50?e.value=50:35>t&&(e.value=35)
|
320 |
+
}
|
321 |
+
</script>';
|
322 |
+
|
323 |
+
|
324 |
+
$ecommerce_site = array(array('Web Application Firewall(WAF)', $waf_body_ecommerce.$waf_body.$waf_arr_ecc), array('Login Security', $login_security_ecommerce.$login_security_body.$registration_security_ecommerce.$registration_security), array('Media Protection', $media_body), array('Encrypted Backup', $backup_ecommerce.$backup_body.$backup_body_1.$backup_body_4), array('Comment and Spam Protection', $comment_ecommerce.$comment_spam), array('Malware Scanner', $scanner), array('Support', $support_modal));
|
325 |
+
|
326 |
+
$business_site = array(array('Web Application Firewall(WAF)', $waf_body_business.$waf_body.$waf_arr_busi), array('Encrypted Backup', $backup_business.$backup_body.$backup_body_2.$backup_body_4), array('Comment and Spam Protection', $comment_business.$comment_spam), array('Login Security', $login_security_business.$login_security_body.$registration_security_business.$registration_security), array('Malware Scanner', $scanner), array('Support', $support_modal));
|
327 |
+
|
328 |
+
$blog_site = array(array('Web Application Firewall(WAF)', $waf_body_blog.$waf_body.$waf_arr_blog), array('Comment and Spam Protection', $comment_blog.$comment_spam), array('Login Security', $login_security_blog.$login_security_body), array('Encrypted Backup', $backup_blog.$backup_body.$backup_body_3.$backup_body_4), array('Malware Scanner', $scanner), array('Support', $support_modal));
|
329 |
+
|
330 |
+
$other_site = array(array('Web Application Firewall(WAF)', $waf_body_other.$waf_body.$waf_arr_other), array('Comment and Spam Protection', $comment_other.$comment_spam), array('Login Security', $login_security_other.$login_security_body), array('Encrypted Backup', $backup_blog.$backup_body.$backup_body_4), array('Media Protection', $media_body_1), array('Malware Scanner', $scanner), array('Support', $support_modal));
|
331 |
+
|
332 |
+
$main_pointer = array('Main' => array('Let\'s get Started', $tour_body), 'Ecommerce' => $ecommerce_site, 'Business' => $business_site, 'Blogs/News' => $blog_site, 'Other' => $other_site);
|
333 |
+
|
334 |
+
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'tour-model.php';
|
controllers/trial.php
CHANGED
@@ -1,89 +1,89 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
if(current_user_can( 'manage_options' ) && isset($_POST['option']) )
|
4 |
-
{
|
5 |
-
switch(sanitize_text_field($_POST['option']))
|
6 |
-
{
|
7 |
-
case "mo2f_trial_request_form":
|
8 |
-
mo2f_handle_trial_request_form($_POST); break;
|
9 |
-
}
|
10 |
-
}
|
11 |
-
global $mo2f_dirName;
|
12 |
-
$current_user = wp_get_current_user();
|
13 |
-
$email = isset($current_user->user_email)?$current_user->user_email:null;
|
14 |
-
$url = get_site_url();
|
15 |
-
$user_phone = $Mo2fdbQueries->get_user_detail( 'mo2f_user_phone', $current_user->ID );
|
16 |
-
|
17 |
-
|
18 |
-
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'trial.php';
|
19 |
-
|
20 |
-
function mo2f_handle_trial_request_form($post){
|
21 |
-
$nonce = isset($post['nonce'])?sanitize_text_field($post['nonce']):NULL;
|
22 |
-
if ( ! wp_verify_nonce( $nonce, 'mo2f_trial-nonce' ) ){
|
23 |
-
return;
|
24 |
-
}
|
25 |
-
|
26 |
-
$email = isset($post['mo2f_trial_email'])? sanitize_email($post['mo2f_trial_email']) : NULL;
|
27 |
-
$phone = isset($post['mo2f_trial_phone'])? sanitize_text_field($post['mo2f_trial_phone']) : ( $user_phone ? $user_phone : NULL );
|
28 |
-
$trial_plan = isset($post['mo2f_trial_plan'])? sanitize_text_field($post['mo2f_trial_plan']): NULL;
|
29 |
-
|
30 |
-
if(get_site_option('mo2f_trial_query_sent')){
|
31 |
-
do_action('wpns_show_message',MoWpnsMessages::showMessage('TRIAL_REQUEST_ALREADY_SENT'),'ERROR');
|
32 |
-
return;
|
33 |
-
}
|
34 |
-
|
35 |
-
if(empty($email) || empty($phone) || empty($trial_plan))
|
36 |
-
{
|
37 |
-
do_action('wpns_show_message',MoWpnsMessages::showMessage('REQUIRED_FIELDS'),'ERROR');
|
38 |
-
return;
|
39 |
-
}
|
40 |
-
if(!preg_match("/^[\+][0-9]{1,4}\s?[0-9]{7,12}$/", $phone)){
|
41 |
-
do_action('wpns_show_message',MoWpnsMessages::showMessage('INVALID_PHONE'),'ERROR');
|
42 |
-
return;
|
43 |
-
}
|
44 |
-
else{
|
45 |
-
$email = filter_var( $email,FILTER_VALIDATE_EMAIL );
|
46 |
-
$phone = preg_replace('/[^0-9]/', '', $phone);
|
47 |
-
$trial_plan = sanitize_text_field($trial_plan);
|
48 |
-
$query = 'REQUEST FOR TRIAL';
|
49 |
-
$query .= ' [ Plan Name => ';
|
50 |
-
$query .= $trial_plan;
|
51 |
-
$query .= ' | Email => ';
|
52 |
-
$query .= get_option('mo2f_email').' ]';
|
53 |
-
$current_user = wp_get_current_user();
|
54 |
-
|
55 |
-
|
56 |
-
$url = MoWpnsConstants::HOST_NAME . "/moas/rest/customer/contact-us";
|
57 |
-
global $mowafutility;
|
58 |
-
$query = '[WordPress 2 Factor Authentication Plugin: OV3 - '.MO2F_VERSION.']: ' . $query;
|
59 |
-
|
60 |
-
$fields = array(
|
61 |
-
'firstName' => $current_user->user_firstname,
|
62 |
-
'lastName' => $current_user->user_lastname,
|
63 |
-
'company' => sanitize_text_field($_SERVER['SERVER_NAME']),
|
64 |
-
'email' => $email,
|
65 |
-
'ccEmail' => '2fasupport@xecurify.com',
|
66 |
-
'phone' => $phone,
|
67 |
-
'query' => $query
|
68 |
-
);
|
69 |
-
$field_string = json_encode( $fields );
|
70 |
-
|
71 |
-
$mo2fApi= new Mo2f_Api();
|
72 |
-
$response = $mo2fApi->make_curl_call($url, $field_string);
|
73 |
-
|
74 |
-
$submitted = $response;
|
75 |
-
|
76 |
-
if(json_last_error() == JSON_ERROR_NONE && $submitted)
|
77 |
-
{
|
78 |
-
update_site_option('mo2f_trial_query_sent', true);
|
79 |
-
do_action('wpns_show_message',MoWpnsMessages::showMessage('TRIAL_REQUEST_SENT'),'SUCCESS');
|
80 |
-
return;
|
81 |
-
}
|
82 |
-
else{
|
83 |
-
do_action('wpns_show_message',MoWpnsMessages::showMessage('SUPPORT_FORM_ERROR'),'ERROR');
|
84 |
-
}
|
85 |
-
|
86 |
-
}
|
87 |
-
}
|
88 |
-
|
89 |
?>
|
1 |
+
<?php
|
2 |
+
|
3 |
+
if(current_user_can( 'manage_options' ) && isset($_POST['option']) )
|
4 |
+
{
|
5 |
+
switch(sanitize_text_field($_POST['option']))
|
6 |
+
{
|
7 |
+
case "mo2f_trial_request_form":
|
8 |
+
mo2f_handle_trial_request_form($_POST); break;
|
9 |
+
}
|
10 |
+
}
|
11 |
+
global $mo2f_dirName;
|
12 |
+
$current_user = wp_get_current_user();
|
13 |
+
$email = isset($current_user->user_email)?$current_user->user_email:null;
|
14 |
+
$url = get_site_url();
|
15 |
+
$user_phone = $Mo2fdbQueries->get_user_detail( 'mo2f_user_phone', $current_user->ID );
|
16 |
+
|
17 |
+
|
18 |
+
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'trial.php';
|
19 |
+
|
20 |
+
function mo2f_handle_trial_request_form($post){
|
21 |
+
$nonce = isset($post['nonce'])?sanitize_text_field($post['nonce']):NULL;
|
22 |
+
if ( ! wp_verify_nonce( $nonce, 'mo2f_trial-nonce' ) ){
|
23 |
+
return;
|
24 |
+
}
|
25 |
+
|
26 |
+
$email = isset($post['mo2f_trial_email'])? sanitize_email($post['mo2f_trial_email']) : NULL;
|
27 |
+
$phone = isset($post['mo2f_trial_phone'])? sanitize_text_field($post['mo2f_trial_phone']) : ( $user_phone ? $user_phone : NULL );
|
28 |
+
$trial_plan = isset($post['mo2f_trial_plan'])? sanitize_text_field($post['mo2f_trial_plan']): NULL;
|
29 |
+
|
30 |
+
if(get_site_option('mo2f_trial_query_sent')){
|
31 |
+
do_action('wpns_show_message',MoWpnsMessages::showMessage('TRIAL_REQUEST_ALREADY_SENT'),'ERROR');
|
32 |
+
return;
|
33 |
+
}
|
34 |
+
|
35 |
+
if(empty($email) || empty($phone) || empty($trial_plan))
|
36 |
+
{
|
37 |
+
do_action('wpns_show_message',MoWpnsMessages::showMessage('REQUIRED_FIELDS'),'ERROR');
|
38 |
+
return;
|
39 |
+
}
|
40 |
+
if(!preg_match("/^[\+][0-9]{1,4}\s?[0-9]{7,12}$/", $phone)){
|
41 |
+
do_action('wpns_show_message',MoWpnsMessages::showMessage('INVALID_PHONE'),'ERROR');
|
42 |
+
return;
|
43 |
+
}
|
44 |
+
else{
|
45 |
+
$email = filter_var( $email,FILTER_VALIDATE_EMAIL );
|
46 |
+
$phone = preg_replace('/[^0-9]/', '', $phone);
|
47 |
+
$trial_plan = sanitize_text_field($trial_plan);
|
48 |
+
$query = 'REQUEST FOR TRIAL';
|
49 |
+
$query .= ' [ Plan Name => ';
|
50 |
+
$query .= $trial_plan;
|
51 |
+
$query .= ' | Email => ';
|
52 |
+
$query .= get_option('mo2f_email').' ]';
|
53 |
+
$current_user = wp_get_current_user();
|
54 |
+
|
55 |
+
|
56 |
+
$url = MoWpnsConstants::HOST_NAME . "/moas/rest/customer/contact-us";
|
57 |
+
global $mowafutility;
|
58 |
+
$query = '[WordPress 2 Factor Authentication Plugin: OV3 - '.MO2F_VERSION.']: ' . $query;
|
59 |
+
|
60 |
+
$fields = array(
|
61 |
+
'firstName' => $current_user->user_firstname,
|
62 |
+
'lastName' => $current_user->user_lastname,
|
63 |
+
'company' => sanitize_text_field($_SERVER['SERVER_NAME']),
|
64 |
+
'email' => $email,
|
65 |
+
'ccEmail' => '2fasupport@xecurify.com',
|
66 |
+
'phone' => $phone,
|
67 |
+
'query' => $query
|
68 |
+
);
|
69 |
+
$field_string = json_encode( $fields );
|
70 |
+
|
71 |
+
$mo2fApi= new Mo2f_Api();
|
72 |
+
$response = $mo2fApi->make_curl_call($url, $field_string);
|
73 |
+
|
74 |
+
$submitted = $response;
|
75 |
+
|
76 |
+
if(json_last_error() == JSON_ERROR_NONE && $submitted)
|
77 |
+
{
|
78 |
+
update_site_option('mo2f_trial_query_sent', true);
|
79 |
+
do_action('wpns_show_message',MoWpnsMessages::showMessage('TRIAL_REQUEST_SENT'),'SUCCESS');
|
80 |
+
return;
|
81 |
+
}
|
82 |
+
else{
|
83 |
+
do_action('wpns_show_message',MoWpnsMessages::showMessage('SUPPORT_FORM_ERROR'),'ERROR');
|
84 |
+
}
|
85 |
+
|
86 |
+
}
|
87 |
+
}
|
88 |
+
|
89 |
?>
|
controllers/troubleshooting.php
CHANGED
@@ -1,5 +1,5 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
global $moWpnsUtility,$mo2f_dirName;
|
4 |
-
|
5 |
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'troubleshooting.php';
|
1 |
+
<?php
|
2 |
+
|
3 |
+
global $moWpnsUtility,$mo2f_dirName;
|
4 |
+
|
5 |
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'troubleshooting.php';
|
controllers/twofa/mo2fa_inline_registration.php
CHANGED
@@ -1,1552 +1,1552 @@
|
|
1 |
-
<?php
|
2 |
-
function fetch_methods($current_user = null){
|
3 |
-
$methods = array("SMS","SOFT TOKEN","MOBILE AUTHENTICATION","PUSH NOTIFICATIONS","GOOGLE AUTHENTICATOR","KBA","OTP_OVER_EMAIL","OTP OVER TELEGRAM");
|
4 |
-
if(!is_null($current_user) && ($current_user->roles[0] != 'administrator') && !mo2f_is_customer_registered()){
|
5 |
-
$methods = array("GOOGLE AUTHENTICATOR","KBA","OTP_OVER_EMAIL","OTP OVER TELEGRAM");
|
6 |
-
}
|
7 |
-
if(get_site_option('duo_credentials_save_successfully'))
|
8 |
-
array_push($methods,"DUO");
|
9 |
-
return $methods;
|
10 |
-
}
|
11 |
-
|
12 |
-
function prompt_user_to_select_2factor_mthod_inline($current_user_id, $login_status, $login_message,$redirect_to,$session_id,$qrCode){
|
13 |
-
|
14 |
-
global $Mo2fdbQueries;
|
15 |
-
$current_user = get_userdata($current_user_id);
|
16 |
-
$current_selected_method = $Mo2fdbQueries->get_user_detail( 'mo2f_configured_2FA_method',$current_user_id);
|
17 |
-
|
18 |
-
if($current_selected_method == 'MOBILE AUTHENTICATION' || $current_selected_method == 'SOFT TOKEN' || $current_selected_method == 'PUSH NOTIFICATIONS'){
|
19 |
-
if(get_option( 'mo_2factor_admin_registration_status' ) == 'MO_2_FACTOR_CUSTOMER_REGISTERED_SUCCESS')
|
20 |
-
prompt_user_for_miniorange_app_setup($current_user_id, $login_status, $login_message,$qrCode,$current_selected_method,$redirect_to,$session_id);
|
21 |
-
else
|
22 |
-
prompt_user_for_miniorange_register($current_user_id, $login_status, $login_message,$redirect_to,$session_id);
|
23 |
-
}else if($current_selected_method == 'SMS' || $current_selected_method == 'PHONE VERIFICATION' || $current_selected_method == 'SMS AND EMAIL'){
|
24 |
-
if(get_option( 'mo_2factor_admin_registration_status' ) == 'MO_2_FACTOR_CUSTOMER_REGISTERED_SUCCESS')
|
25 |
-
prompt_user_for_phone_setup($current_user_id, $login_status, $login_message,$current_selected_method,$redirect_to,$session_id);
|
26 |
-
else
|
27 |
-
prompt_user_for_miniorange_register($current_user_id, $login_status, $login_message,$redirect_to,$session_id);
|
28 |
-
}else if($current_selected_method == 'OTP Over Telegram' or $current_selected_method == 'OTP OVER TELEGRAM')
|
29 |
-
{
|
30 |
-
$current_selected_method = 'OTP Over Telegram';
|
31 |
-
prompt_user_for_phone_setup($current_user_id, $login_status, $login_message,$current_selected_method,$redirect_to,$session_id);
|
32 |
-
}
|
33 |
-
else if($current_selected_method == 'Duo Authenticator'){
|
34 |
-
prompt_user_for_duo_authenticator_setup($current_user_id, $login_status, $login_message,$redirect_to,$session_id);
|
35 |
-
}
|
36 |
-
else if($current_selected_method == 'GOOGLE AUTHENTICATOR' ){
|
37 |
-
prompt_user_for_google_authenticator_setup($current_user_id, $login_status, $login_message,$redirect_to,$session_id);
|
38 |
-
}else if($current_selected_method == 'AUTHY 2-FACTOR AUTHENTICATION'){
|
39 |
-
prompt_user_for_authy_authenticator_setup($current_user_id, $login_status, $login_message,$redirect_to,$session_id);
|
40 |
-
}else if($current_selected_method == 'KBA' ){
|
41 |
-
prompt_user_for_kba_setup($current_user_id, $login_status, $login_message,$redirect_to,$session_id);
|
42 |
-
}else if($current_selected_method == 'OUT OF BAND EMAIL' ){
|
43 |
-
$status = $Mo2fdbQueries->get_user_detail( 'mo_2factor_user_registration_status',$current_user_id);
|
44 |
-
if(( $status == 'MO_2_FACTOR_PLUGIN_SETTINGS' && get_site_option('mo2f_remember_device')!=1)||(get_site_option( 'mo2f_disable_kba' ) &&$login_status == 'MO_2_FACTOR_SETUP_SUCCESS')){
|
45 |
-
if(!MO2F_IS_ONPREM)
|
46 |
-
{
|
47 |
-
$current_user = get_userdata($current_user_id);
|
48 |
-
$email = $current_user->user_email;
|
49 |
-
$tempEmail = get_user_meta($current_user->ID,'mo2f_email_miniOrange',true);
|
50 |
-
if(isset($tempEmail) and $tempEmail != '')
|
51 |
-
$email = $tempEmail;
|
52 |
-
create_user_in_miniOrange($current_user_id,$email,$current_selected_method);
|
53 |
-
}
|
54 |
-
$Mo2fdbQueries->update_user_details( $current_user_id, array('mo_2factor_user_registration_status' =>'MO_2_FACTOR_PLUGIN_SETTINGS') );
|
55 |
-
$pass2fa= new Miniorange_Password_2Factor_Login();
|
56 |
-
$pass2fa->mo2fa_pass2login($redirect_to, $session_id);
|
57 |
-
}
|
58 |
-
prompt_user_for_setup_success($current_user_id, $login_status, $login_message,$redirect_to,$session_id);
|
59 |
-
}else{
|
60 |
-
$current_user = get_userdata($current_user_id);
|
61 |
-
if(isset($current_user->roles[0]))
|
62 |
-
$current_user_role=$current_user->roles[0];
|
63 |
-
$opt=fetch_methods($current_user);
|
64 |
-
?>
|
65 |
-
<html>
|
66 |
-
<head>
|
67 |
-
<meta charset="utf-8"/>
|
68 |
-
<meta http-equiv="X-UA-Compatible" content="IE=edge">
|
69 |
-
<meta name="viewport" content="width=device-width, initial-scale=1">
|
70 |
-
<?php
|
71 |
-
mo2f_inline_css_and_js();
|
72 |
-
?>
|
73 |
-
</head>
|
74 |
-
<body>
|
75 |
-
<div class="mo2f_modal1" tabindex="-1" role="dialog" id="myModal51">
|
76 |
-
<div class="mo2f-modal-backdrop"></div>
|
77 |
-
<div class="mo_customer_validation-modal-dialog mo_customer_validation-modal-md">
|
78 |
-
<div class="login mo_customer_validation-modal-content">
|
79 |
-
<div class="mo2f_modal-header">
|
80 |
-
<h3 class="mo2f_modal-title"><button type="button" class="mo2f_close" data-dismiss="modal" aria-label="Close" title="<?php echo __('Back to login','miniorange-2-factor-authentication');?>" onclick="mologinback();"><span aria-hidden="true">×</span></button>
|
81 |
-
|
82 |
-
<?php echo __('New security system has been enabled', 'miniorange-2-factor-authentication'); ?></h3>
|
83 |
-
</div>
|
84 |
-
<div class="mo2f_modal-body">
|
85 |
-
<?php echo __('<b> Configure a Two-Factor method to protect your account</b>', 'miniorange-2-factor-authentication');
|
86 |
-
if(isset($login_message) && !empty($login_message)) {
|
87 |
-
echo '<br><br>';
|
88 |
-
|
89 |
-
?>
|
90 |
-
|
91 |
-
<div id="otpMessage">
|
92 |
-
<p class="mo2fa_display_message_frontend" style="text-align: left !important;"><?php echo __($login_message, 'miniorange-2-factor-authentication'); ?></p>
|
93 |
-
</div>
|
94 |
-
<?php }else
|
95 |
-
echo '<br>';
|
96 |
-
?>
|
97 |
-
|
98 |
-
<br>
|
99 |
-
<span class="<?php if( !(in_array("GOOGLE AUTHENTICATOR", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; }?>">
|
100 |
-
<label title="<?php echo __('You have to enter 6 digits code generated by Authenticator App to login. Supported in Smartphones only.', 'miniorange-2-factor-authentication'); ?>">
|
101 |
-
<input type="radio" name="mo2f_selected_2factor_method" value="GOOGLE AUTHENTICATOR" />
|
102 |
-
<?php echo __('Google / Authy / Microsoft Authenticator<br>
|
103 |
-
(Any TOTP Based Authenticatior App)', 'miniorange-2-factor-authentication'); ?>
|
104 |
-
</label>
|
105 |
-
<br>
|
106 |
-
</span>
|
107 |
-
<span class="<?php if( !(in_array("OUT OF BAND EMAIL", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; } ?>" >
|
108 |
-
<label title="<?php echo __('You will receive an email with link. You have to click the ACCEPT or DENY link to verify your email. Supported in Desktops, Laptops, Smartphones.', 'miniorange-2-factor-authentication'); ?>">
|
109 |
-
<input type="radio" name="mo2f_selected_2factor_method" value="OUT OF BAND EMAIL" />
|
110 |
-
<?php echo __('Email Verification', 'miniorange-2-factor-authentication'); ?>
|
111 |
-
</label>
|
112 |
-
<br>
|
113 |
-
</span>
|
114 |
-
<span class="<?php if( !(in_array("SMS", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; } ?>" >
|
115 |
-
<label title="<?php echo __('You will receive a one time passcode via SMS on your phone. You have to enter the otp on your screen to login. Supported in Smartphones, Feature Phones.', 'miniorange-2-factor-authentication'); ?>">
|
116 |
-
<input type="radio" name="mo2f_selected_2factor_method" value="SMS" />
|
117 |
-
<?php echo __('OTP Over SMS', 'miniorange-2-factor-authentication'); ?>
|
118 |
-
</label>
|
119 |
-
<br>
|
120 |
-
</span>
|
121 |
-
<span class="<?php if( !(in_array("PHONE VERIFICATION", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; } ?>">
|
122 |
-
<label title="<?php echo __('You will receive a phone call telling a one time passcode. You have to enter the one time passcode to login. Supported in Landlines, Smartphones, Feature phones.', 'miniorange-2-factor-authentication'); ?>">
|
123 |
-
<input type="radio" name="mo2f_selected_2factor_method" value="PHONE VERIFICATION" />
|
124 |
-
<?php echo __('Phone Call Verification', 'miniorange-2-factor-authentication'); ?>
|
125 |
-
</label>
|
126 |
-
<br>
|
127 |
-
</span>
|
128 |
-
<span class="<?php if( !(in_array("SOFT TOKEN", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; } ?>" >
|
129 |
-
<label title="<?php echo __('You have to enter 6 digits code generated by miniOrange Authenticator App like Google Authenticator code to login. Supported in Smartphones only.', 'miniorange-2-factor-authentication'); ?>" >
|
130 |
-
<input type="radio" name="mo2f_selected_2factor_method" value="SOFT TOKEN" />
|
131 |
-
<?php echo __('Soft Token', 'miniorange-2-factor-authentication'); ?>
|
132 |
-
</label>
|
133 |
-
<br>
|
134 |
-
</span>
|
135 |
-
<span class="<?php if( !(in_array("OTP OVER TELEGRAM", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; } ?>" >
|
136 |
-
<label title="<?php echo __('You will get an OTP on your TELEGRAM app from miniOrange Bot.', 'miniorange-2-factor-authentication'); ?>" >
|
137 |
-
<input type="radio" name="mo2f_selected_2factor_method" value="OTP OVER TELEGRAM" />
|
138 |
-
<?php echo __('OTP Over TELEGRAM', 'miniorange-2-factor-authentication'); ?>
|
139 |
-
</label>
|
140 |
-
<br>
|
141 |
-
</span>
|
142 |
-
<span class="<?php if( !(in_array("OTP OVER WHATSAPP", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; } ?>" >
|
143 |
-
<label title="<?php echo __('You will get an OTP on your WHATSAPP app from miniOrange Bot.', 'miniorange-2-factor-authentication'); ?>" >
|
144 |
-
<input type="radio" name="mo2f_selected_2factor_method" value="OTP OVER WHATSAPP" />
|
145 |
-
<?php echo __('OTP Over WHATSAPP', 'miniorange-2-factor-authentication'); ?>
|
146 |
-
</label>
|
147 |
-
<br>
|
148 |
-
</span>
|
149 |
-
<span class="<?php if( !(in_array("MOBILE AUTHENTICATION", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; }?>">
|
150 |
-
<label title="<?php echo __('You have to scan the QR Code from your phone using miniOrange Authenticator App to login. Supported in Smartphones only.', 'miniorange-2-factor-authentication'); ?>">
|
151 |
-
<input type="radio" name="mo2f_selected_2factor_method" value="MOBILE AUTHENTICATION" />
|
152 |
-
<?php echo __('QR Code Authentication', 'miniorange-2-factor-authentication'); ?>
|
153 |
-
</label>
|
154 |
-
<br>
|
155 |
-
</span>
|
156 |
-
<span class="<?php if( !(in_array("PUSH NOTIFICATIONS", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; } ?>" >
|
157 |
-
<label title="<?php echo __('You will receive a push notification on your phone. You have to ACCEPT or DENY it to login. Supported in Smartphones only.', 'miniorange-2-factor-authentication'); ?>">
|
158 |
-
<input type="radio" name="mo2f_selected_2factor_method" value="PUSH NOTIFICATIONS" />
|
159 |
-
<?php echo __('Push Notification', 'miniorange-2-factor-authentication'); ?>
|
160 |
-
</label>
|
161 |
-
<br>
|
162 |
-
</span>
|
163 |
-
<span class="<?php if( !(in_array("AUTHY 2-FACTOR AUTHENTICATION", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; }?>">
|
164 |
-
<label title="<?php echo __('You have to enter 6 digits code generated by Authy 2-Factor Authentication App to login. Supported in Smartphones only.', 'miniorange-2-factor-authentication'); ?>">
|
165 |
-
<input type="radio" name="mo2f_selected_2factor_method" value="AUTHY 2-FACTOR AUTHENTICATION" />
|
166 |
-
<?php echo __('Authy 2-Factor Authentication', 'miniorange-2-factor-authentication'); ?>
|
167 |
-
</label>
|
168 |
-
<br>
|
169 |
-
</span>
|
170 |
-
<span class="<?php if( !(in_array("KBA", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; }?>">
|
171 |
-
<label title="<?php echo __('You have to answers some knowledge based security questions which are only known to you to authenticate yourself. Supported in Desktops,Laptops,Smartphones.', 'miniorange-2-factor-authentication'); ?>" >
|
172 |
-
<input type="radio" name="mo2f_selected_2factor_method" value="KBA" />
|
173 |
-
<?php echo __('Security Questions ( KBA )', 'miniorange-2-factor-authentication'); ?>
|
174 |
-
</label>
|
175 |
-
<br>
|
176 |
-
</span>
|
177 |
-
<span class="<?php if( !(in_array("SMS AND EMAIL", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; }?>">
|
178 |
-
<label title="<?php echo __('You will receive a one time passcode via SMS on your phone and your email. You have to enter the otp on your screen to login. Supported in Smartphones, Feature Phones.', 'miniorange-2-factor-authentication'); ?>" >
|
179 |
-
<input type="radio" name="mo2f_selected_2factor_method" value="SMS AND EMAIL" />
|
180 |
-
<?php echo __('OTP Over SMS and Email', 'miniorange-2-factor-authentication'); ?>
|
181 |
-
</label>
|
182 |
-
<br>
|
183 |
-
</span>
|
184 |
-
<span class="<?php if( !(in_array("OTP_OVER_EMAIL", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; }?>">
|
185 |
-
<label title="<?php echo __('You will receive a one time passcode on your email. You have to enter the otp on your screen to login. Supported in Smartphones, Feature Phones.', 'miniorange-2-factor-authentication'); ?>" >
|
186 |
-
<input type="radio" name="mo2f_selected_2factor_method" value="OTP OVER EMAIL" />
|
187 |
-
<?php echo __('OTP Over Email', 'miniorange-2-factor-authentication'); ?>
|
188 |
-
</label>
|
189 |
-
<br>
|
190 |
-
</span>
|
191 |
-
<span class="<?php if( !(in_array("DUO", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; } ?>" >
|
192 |
-
<label title="<?php echo __('You will receive a push notification on your phone. You have to ACCEPT or DENY it to login. Supported in Smartphones only.', 'miniorange-2-factor-authentication'); ?>">
|
193 |
-
<input type="radio" name="mo2f_selected_2factor_method" value=" DUO PUSH NOTIFICATIONS" />
|
194 |
-
<?php echo __('Duo Push Notification', 'miniorange-2-factor-authentication'); ?>
|
195 |
-
</label>
|
196 |
-
<br>
|
197 |
-
</span>
|
198 |
-
<br><a href="#skiptwofactor" style="color:#F4D03F ;font-weight:bold;margin-left:35%;"><?php echo __('Skip Two Factor', 'miniorange-2-factor-authentication'); ?></a>>>
|
199 |
-
<br />
|
200 |
-
<?php mo2f_customize_logo() ?>
|
201 |
-
</div>
|
202 |
-
</div>
|
203 |
-
</div>
|
204 |
-
</div>
|
205 |
-
<form name="f" id="mo2f_backto_mo_loginform" method="post" action="<?php echo esc_url(wp_login_url()); ?>" style="display:none;">
|
206 |
-
<input type="hidden" name="miniorange_mobile_validation_failed_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-mobile-validation-failed-nonce')); ?>" />
|
207 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
208 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
209 |
-
</form>
|
210 |
-
<form name="f" method="post" action="" id="mo2f_select_2fa_methods_form" style="display:none;">
|
211 |
-
<input type="hidden" name="mo2f_selected_2factor_method" />
|
212 |
-
<input type="hidden" name="miniorange_inline_save_2factor_method_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-save-2factor-method-nonce')); ?>" />
|
213 |
-
<input type="hidden" name="option" value="miniorange_inline_save_2factor_method" />
|
214 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
215 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
216 |
-
</form>
|
217 |
-
|
218 |
-
<form name="f" id="mo2f_skip_loginform" method="post" action="" style="display:none;">
|
219 |
-
<input type="hidden" name="option" value="mo2f_skip_2fa_setup" />
|
220 |
-
<input type="hidden" name="miniorange_skip_2fa_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-skip-nonce')); ?>" />
|
221 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
222 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
223 |
-
</form>
|
224 |
-
|
225 |
-
<script>
|
226 |
-
function mologinback(){
|
227 |
-
jQuery('#mo2f_backto_mo_loginform').submit();
|
228 |
-
}
|
229 |
-
jQuery('input:radio[name=mo2f_selected_2factor_method]').click(function() {
|
230 |
-
var selectedMethod = jQuery(this).val();
|
231 |
-
document.getElementById("mo2f_select_2fa_methods_form").elements[0].value = selectedMethod;
|
232 |
-
jQuery('#mo2f_select_2fa_methods_form').submit();
|
233 |
-
});
|
234 |
-
jQuery('a[href="#skiptwofactor"]').click(function(e) {
|
235 |
-
|
236 |
-
jQuery('#mo2f_skip_loginform').submit();
|
237 |
-
});
|
238 |
-
</script>
|
239 |
-
</body>
|
240 |
-
</html>
|
241 |
-
<?php
|
242 |
-
}
|
243 |
-
}
|
244 |
-
|
245 |
-
function create_user_in_miniOrange($current_user_id,$email,$currentMethod)
|
246 |
-
{
|
247 |
-
|
248 |
-
global $Mo2fdbQueries;
|
249 |
-
$mo2f_user_email = $Mo2fdbQueries->get_user_detail( 'mo2f_user_email', $current_user_id );
|
250 |
-
if(isset($mo2f_user_email) and $mo2f_user_email != '')
|
251 |
-
$email = $mo2f_user_email;
|
252 |
-
|
253 |
-
$current_user = get_userdata($current_user_id);
|
254 |
-
if($current_user_id == get_option('mo2f_miniorange_admin'))
|
255 |
-
$email = get_option('mo2f_email');
|
256 |
-
|
257 |
-
$enduser = new Two_Factor_Setup();
|
258 |
-
$check_user = json_decode( $enduser->mo_check_user_already_exist( $email ), true );
|
259 |
-
|
260 |
-
if(json_last_error() == JSON_ERROR_NONE){
|
261 |
-
|
262 |
-
if($check_user['status'] == 'ERROR'){
|
263 |
-
return Mo2fConstants:: langTranslate( $check_user['message']);
|
264 |
-
|
265 |
-
}
|
266 |
-
else if(strcasecmp($check_user['status' ], 'USER_FOUND') == 0){
|
267 |
-
|
268 |
-
$Mo2fdbQueries->update_user_details( $current_user_id, array(
|
269 |
-
'user_registration_with_miniorange' =>'SUCCESS',
|
270 |
-
'mo2f_user_email' =>$email,
|
271 |
-
'mo_2factor_user_registration_status' =>'MO_2_FACTOR_INITIALIZE_TWO_FACTOR'
|
272 |
-
) );
|
273 |
-
update_site_option(base64_encode("totalUsersCloud"),get_site_option(base64_encode("totalUsersCloud"))+1);
|
274 |
-
|
275 |
-
$mo2fa_login_status = 'MO_2_FACTOR_PROMPT_USER_FOR_2FA_METHODS';
|
276 |
-
}
|
277 |
-
else if(strcasecmp($check_user['status'], 'USER_NOT_FOUND') == 0){
|
278 |
-
|
279 |
-
$content = json_decode($enduser->mo_create_user($current_user,$email), true);
|
280 |
-
if(json_last_error() == JSON_ERROR_NONE) {
|
281 |
-
if(strcasecmp($content['status'], 'SUCCESS') == 0) {
|
282 |
-
update_site_option(base64_encode("totalUsersCloud"),get_site_option(base64_encode("totalUsersCloud"))+1);
|
283 |
-
$Mo2fdbQueries->update_user_details( $current_user_id, array(
|
284 |
-
'user_registration_with_miniorange' =>'SUCCESS',
|
285 |
-
'mo2f_user_email' =>$email,
|
286 |
-
'mo_2factor_user_registration_status' =>'MO_2_FACTOR_INITIALIZE_TWO_FACTOR'
|
287 |
-
) );
|
288 |
-
|
289 |
-
$mo2fa_login_message = '';
|
290 |
-
$mo2fa_login_status = 'MO_2_FACTOR_PROMPT_USER_FOR_2FA_METHODS';
|
291 |
-
}
|
292 |
-
}
|
293 |
-
|
294 |
-
|
295 |
-
}
|
296 |
-
else if(strcasecmp($check_user['status'], 'USER_FOUND_UNDER_DIFFERENT_CUSTOMER') == 0){
|
297 |
-
$mo2fa_login_message = __('The email associated with your account is already registered. Please contact your admin to change the email.','miniorange-2-factor-authentication');
|
298 |
-
$mo2fa_login_status = 'MO_2_FACTOR_PROMPT_FOR_RELOGIN';
|
299 |
-
mo2f_inline_email_form($email,$current_user_id);
|
300 |
-
exit;
|
301 |
-
}
|
302 |
-
|
303 |
-
}
|
304 |
-
|
305 |
-
}
|
306 |
-
|
307 |
-
function mo2f_inline_email_form($email,$current_user_id)
|
308 |
-
{
|
309 |
-
?>
|
310 |
-
<html>
|
311 |
-
<head>
|
312 |
-
<meta charset="utf-8"/>
|
313 |
-
<meta http-equiv="X-UA-Compatible" content="IE=edge">
|
314 |
-
<meta name="viewport" content="width=device-width, initial-scale=1">
|
315 |
-
<?php
|
316 |
-
mo2f_inline_css_and_js();
|
317 |
-
?>
|
318 |
-
</head>
|
319 |
-
<body>
|
320 |
-
<div class="mo2f_modal" tabindex="-1" role="dialog" id="myModal5">
|
321 |
-
<div class="mo2f-modal-backdrop"></div>
|
322 |
-
<div class="mo_customer_validation-modal-dialog mo_customer_validation-modal-md">
|
323 |
-
<div class="login mo_customer_validation-modal-content">
|
324 |
-
<div class="mo2f_modal-header">
|
325 |
-
<h3 class="mo2f_modal-title"><button type="button" class="mo2f_close" data-dismiss="modal" aria-label="Close" title="<?php echo __('Back to login','miniorange-2-factor-authentication');?>" onclick="mologinback();"><span aria-hidden="true">×</span></button>
|
326 |
-
<?php echo __('Email already registered.', 'miniorange-2-factor-authentication'); ?></h3>
|
327 |
-
</div>
|
328 |
-
<div class="mo2f_modal-body">
|
329 |
-
<form action="" method="post" name="f">
|
330 |
-
<p>The Email assoicated with your account is already registered in miniOrange. Please use a different email address or contact miniOrange.
|
331 |
-
</p><br>
|
332 |
-
<i><b>Enter your Email: </b> <input type ='email' id='emailInlineCloud' name='emailInlineCloud' size= '40' required value="<?php echo $email;?>"/></i>
|
333 |
-
<br>
|
334 |
-
<p id="emailalredyused" style="color: red;" hidden>This email is already associated with miniOrange.</p>
|
335 |
-
<br>
|
336 |
-
<input type="hidden" name="miniorange_emailChange_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-email-change-nonce')); ?>" />
|
337 |
-
<input type="text" name="current_user_id" hidden id="current_user_id" value="<?php echo $current_user_id;?>" />
|
338 |
-
<button type="submit" class="button button-primary button-large" style ="margin-left: 165px;" id="save_entered_email_inlinecloud">Save</button>
|
339 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
340 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
341 |
-
</form>
|
342 |
-
<br>
|
343 |
-
<?php mo2f_customize_logo() ?>
|
344 |
-
</div>
|
345 |
-
</div>
|
346 |
-
</div>
|
347 |
-
</div>
|
348 |
-
<form name="f" id="mo2f_backto_mo_loginform" method="post" action="<?php echo wp_login_url(); ?>" style="display:none;">
|
349 |
-
<input type="hidden" name="miniorange_mobile_validation_failed_nonce" value="<?php echo esc_html(('miniorange-2-factor-mobile-validation-failed-nonce')); ?>" />
|
350 |
-
</form>
|
351 |
-
<form name="f" method="post" action="" id="mo2f_select_2fa_methods_form" style="display:none;">
|
352 |
-
<input type="hidden" name="mo2f_selected_2factor_method" />
|
353 |
-
<input type="hidden" name="miniorange_inline_save_2factor_method_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-save-2factor-method-nonce')); ?>" />
|
354 |
-
<input type="hidden" name="option" value="miniorange_inline_save_2factor_method" />
|
355 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
356 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
357 |
-
</form>
|
358 |
-
<?php if(get_site_option('mo2f_skip_inline_option')&& !get_site_option('mo2f_enable_emailchange')){ ?>
|
359 |
-
<form name="f" id="mo2f_skip_loginform" method="post" action="" style="display:none;">
|
360 |
-
<input type="hidden" name="miniorange_skip_2fa" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-skip-nonce')); ?>" />
|
361 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
362 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
363 |
-
</form>
|
364 |
-
<?php } ?>
|
365 |
-
|
366 |
-
<script type="text/javascript">
|
367 |
-
jQuery('#save_entered_email_inlinecloud1').click(function(){
|
368 |
-
var email = jQuery('#emailInlineCloud').val();
|
369 |
-
var nonce = '<?php echo esc_html(wp_create_nonce("checkuserinminiOrangeNonce"));?>';
|
370 |
-
var data = {
|
371 |
-
'action' : 'mo_two_factor_ajax',
|
372 |
-
'mo_2f_two_factor_ajax' : 'mo2f_check_user_exist_miniOrange',
|
373 |
-
'email' : email,
|
374 |
-
'nonce' : nonce
|
375 |
-
|
376 |
-
};
|
377 |
-
|
378 |
-
var ajaxurl = '<?php echo esc_url(admin_url('')); ?>';
|
379 |
-
|
380 |
-
|
381 |
-
jQuery.post(ajaxurl, data, function(response) {
|
382 |
-
|
383 |
-
if(response == 'alreadyExist')
|
384 |
-
{
|
385 |
-
jQuery('#emailalredyused').show();
|
386 |
-
}
|
387 |
-
else if(response =='USERCANBECREATED')
|
388 |
-
{
|
389 |
-
document.getElementById("mo2f_select_2fa_methods_form").elements[0].value = selectedMethod;
|
390 |
-
jQuery('#mo2f_select_2fa_methods_form').submit();
|
391 |
-
}
|
392 |
-
});
|
393 |
-
|
394 |
-
});
|
395 |
-
|
396 |
-
|
397 |
-
</script>
|
398 |
-
</body>
|
399 |
-
|
400 |
-
<?php
|
401 |
-
}
|
402 |
-
function prompt_user_for_miniorange_app_setup($current_user_id, $login_status, $login_message,$qrCode,$currentMethod,$redirect_to,$session_id){
|
403 |
-
|
404 |
-
global $Mo2fdbQueries;
|
405 |
-
if(isset($qrCode)){
|
406 |
-
$qrCodedata = $qrCode['mo2f-login-qrCode'];
|
407 |
-
$showqrCode = $qrCode['mo2f_show_qr_code'];
|
408 |
-
}
|
409 |
-
$current_user = get_userdata($current_user_id);
|
410 |
-
$email = $current_user->user_email;
|
411 |
-
|
412 |
-
$opt=fetch_methods($current_user);
|
413 |
-
|
414 |
-
$mobile_registration_status = $Mo2fdbQueries->get_user_detail( 'mobile_registration_status',$current_user_id);
|
415 |
-
?>
|
416 |
-
<html>
|
417 |
-
<head> <meta charset="utf-8"/>
|
418 |
-
<meta http-equiv="X-UA-Compatible" content="IE=edge">
|
419 |
-
<meta name="viewport" content="width=device-width, initial-scale=1">
|
420 |
-
<?php
|
421 |
-
mo2f_inline_css_and_js();
|
422 |
-
?>
|
423 |
-
</head>
|
424 |
-
<body>
|
425 |
-
<div class="mo2f_modal" tabindex="-1" role="dialog" id="myModal5">
|
426 |
-
<div class="mo2f-modal-backdrop"></div>
|
427 |
-
<div class="mo2f_modal-dialog mo2f_modal-lg" >
|
428 |
-
<div class="login mo_customer_validation-modal-content">
|
429 |
-
<div class="mo2f_modal-header">
|
430 |
-
<h4 class="mo2f_modal-title"><button type="button" class="mo2f_close" data-dismiss="modal" aria-label="Close" title="<?php echo __('Back to login', 'miniorange-2-factor-authentication'); ?>" onclick="mologinback();"><span aria-hidden="true">×</span></button>
|
431 |
-
<?php echo __('Setup miniOrange', 'miniorange-2-factor-authentication'); ?> <b><?php echo __('Authenticator', 'miniorange-2-factor-authentication'); ?></b> <?php echo __('App', 'miniorange-2-factor-authentication'); ?></h4>
|
432 |
-
</div>
|
433 |
-
<div class="mo2f_modal-body">
|
434 |
-
<?php if(isset($login_message) && !empty($login_message)) { ?>
|
435 |
-
|
436 |
-
<div id="otpMessage">
|
437 |
-
<p class="mo2fa_display_message_frontend" style="text-align: left !important;"><?php echo __($login_message, 'miniorange-2-factor-authentication'); ?></p>
|
438 |
-
</div>
|
439 |
-
<?php } ?>
|
440 |
-
<div style="margin-right:7px;"><?php download_instruction_for_mobile_app($current_user_id,$mobile_registration_status); ?></div>
|
441 |
-
<div class="mo_margin_left">
|
442 |
-
<h3><?php echo __('Step-2 : Scan QR code', 'miniorange-2-factor-authentication'); ?></h3><hr class="mo_hr">
|
443 |
-
<div id="mo2f_configurePhone"><h4><?php echo __('Please click on \'Configure your phone\' button below to see QR Code.', 'miniorange-2-factor-authentication'); ?></h4>
|
444 |
-
<center>
|
445 |
-
<?php if (sizeof($opt) > 1) { ?>
|
446 |
-
<input type="button" name="back" id="mo2f_inline_back_btn" class="miniorange_button" value="<?php echo __('Back', 'miniorange-2-factor-authentication'); ?>" />
|
447 |
-
<?php } ?>
|
448 |
-
<input type="button" name="submit" onclick="moconfigureapp();" class="miniorange_button" value="<?php echo __('Configure your phone', 'miniorange-2-factor-authentication'); ?>" />
|
449 |
-
</center>
|
450 |
-
</div>
|
451 |
-
<?php
|
452 |
-
if(isset($showqrCode) && $showqrCode == 'MO_2_FACTOR_SHOW_QR_CODE' && isset($_POST['miniorange_inline_show_qrcode_nonce']) && wp_verify_nonce( $_POST['miniorange_inline_show_qrcode_nonce'], 'miniorange-2-factor-inline-show-qrcode-nonce' )){
|
453 |
-
initialize_inline_mobile_registration($current_user,$session_id,$qrCodedata); ?>
|
454 |
-
<?php } ?>
|
455 |
-
|
456 |
-
<?php mo2f_customize_logo() ?>
|
457 |
-
</div>
|
458 |
-
<br>
|
459 |
-
<br>
|
460 |
-
</div>
|
461 |
-
</div>
|
462 |
-
</div>
|
463 |
-
</div>
|
464 |
-
<form name="f" id="mo2f_backto_mo_loginform" method="post" action="<?php echo wp_login_url(); ?>" style="display:none;">
|
465 |
-
<input type="hidden" name="miniorange_mobile_validation_failed_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-mobile-validation-failed-nonce')); ?>" />
|
466 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
467 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
468 |
-
</form>
|
469 |
-
<form name="f" method="post" action="" id="mo2f_inline_configureapp_form" style="display:none;">
|
470 |
-
<input type="hidden" name="option" value="miniorange_inline_show_mobile_config"/>
|
471 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
472 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
473 |
-
<input type="hidden" name="miniorange_inline_show_qrcode_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-show-qrcode-nonce')); ?>" />
|
474 |
-
</form>
|
475 |
-
<form name="f" method="post" id="mo2f_inline_mobile_register_form" action="" style="display:none;">
|
476 |
-
<input type="hidden" name="option" value="miniorange_inline_complete_mobile"/>
|
477 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
478 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
479 |
-
<input type="hidden" name="mo_auth_inline_mobile_registration_complete_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-mobile-registration-complete-nonce')); ?>" />
|
480 |
-
</form>
|
481 |
-
<?php if (sizeof($opt) > 1) { ?>
|
482 |
-
<form name="f" method="post" action="" id="mo2f_goto_two_factor_form">
|
483 |
-
<input type="hidden" name="option" value="miniorange_back_inline"/>
|
484 |
-
<input type="hidden" name="miniorange_inline_two_factor_setup" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-setup-nonce')); ?>" />
|
485 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
486 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
487 |
-
</form>
|
488 |
-
<?php } ?>
|
489 |
-
<script>
|
490 |
-
function mologinback(){
|
491 |
-
jQuery('#mo2f_backto_mo_loginform').submit();
|
492 |
-
}
|
493 |
-
function moconfigureapp(){
|
494 |
-
jQuery('#mo2f_inline_configureapp_form').submit();
|
495 |
-
}
|
496 |
-
jQuery('#mo2f_inline_back_btn').click(function() {
|
497 |
-
jQuery('#mo2f_goto_two_factor_form').submit();
|
498 |
-
});
|
499 |
-
<?php
|
500 |
-
if(isset($showqrCode) && $showqrCode == 'MO_2_FACTOR_SHOW_QR_CODE' && isset($_POST['miniorange_inline_show_qrcode_nonce']) && wp_verify_nonce( sanitize_text_field($_POST['miniorange_inline_show_qrcode_nonce']), 'miniorange-2-factor-inline-show-qrcode-nonce' )){
|
501 |
-
?>
|
502 |
-
<?php } ?>
|
503 |
-
</script>
|
504 |
-
</body>
|
505 |
-
</html>
|
506 |
-
<?php
|
507 |
-
}
|
508 |
-
function prompt_user_for_duo_authenticator_setup($current_user_id, $login_status, $login_message,$redirect_to,$session_id){
|
509 |
-
global $Mo2fdbQueries;
|
510 |
-
$current_user = get_userdata($current_user_id);
|
511 |
-
$email = $current_user->user_email;
|
512 |
-
$opt=fetch_methods($current_user);
|
513 |
-
$mobile_registration_status = $Mo2fdbQueries->get_user_detail( 'mobile_registration_status',$current_user_id);
|
514 |
-
|
515 |
-
?>
|
516 |
-
<html>
|
517 |
-
<head> <meta charset="utf-8"/>
|
518 |
-
<meta http-equiv="X-UA-Compatible" content="IE=edge">
|
519 |
-
<meta name="viewport" content="width=device-width, initial-scale=1">
|
520 |
-
<?php
|
521 |
-
mo2f_inline_css_and_js();
|
522 |
-
?>
|
523 |
-
</head>
|
524 |
-
<body>
|
525 |
-
<div class="mo2f_modal" tabindex="-1" role="dialog" id="myModal5">
|
526 |
-
<div class="mo2f-modal-backdrop"></div>
|
527 |
-
<div class="mo2f_modal-dialog mo2f_modal-lg" >
|
528 |
-
<div class="login mo_customer_validation-modal-content">
|
529 |
-
<div class="mo2f_modal-header">
|
530 |
-
<h4 class="mo2f_modal-title"><button type="button" class="mo2f_close" data-dismiss="modal" aria-label="Close" title="<?php echo __('Back to login', 'miniorange-2-factor-authentication'); ?>" onclick="mologinback();"><span aria-hidden="true">×</span></button>
|
531 |
-
<?php echo __('Setup Duo', 'miniorange-2-factor-authentication'); ?> <b><?php echo __('Authenticator', 'miniorange-2-factor-authentication'); ?></b> <?php echo __('App', 'miniorange-2-factor-authentication'); ?></h4>
|
532 |
-
</div>
|
533 |
-
<div class="mo2f_modal-body">
|
534 |
-
<?php if(isset($login_message) && !empty($login_message)) { ?>
|
535 |
-
|
536 |
-
<div id="otpMessage">
|
537 |
-
<p class="mo2fa_display_message_frontend" style="text-align: left !important;"><?php echo __(esc_html($login_message), 'miniorange-2-factor-authentication'); ?></p>
|
538 |
-
</div>
|
539 |
-
<?php } ?>
|
540 |
-
<div style="margin-right:7px;"><?php mo2f_inline_download_instruction_for_duo_mobile_app($mobile_registration_status);
|
541 |
-
|
542 |
-
?></div>
|
543 |
-
<div class="mo_margin_left">
|
544 |
-
<h3><?php echo __('Step-2 : Setup Duo Push Notification', 'miniorange-2-factor-authentication'); ?></h3><hr class="mo_hr">
|
545 |
-
<div id="mo2f_configurePhone"><h4><?php echo __('Please click on \'Configure your phone\' button below to setup duo push notification.', 'miniorange-2-factor-authentication'); ?></h4>
|
546 |
-
<center>
|
547 |
-
<?php if (sizeof($opt) > 1) { ?>
|
548 |
-
<input type="button" name="back" id="mo2f_inline_back_btn" class="miniorange_button" value="<?php echo __('Back', 'miniorange-2-factor-authentication'); ?>" />
|
549 |
-
<?php } ?>
|
550 |
-
<input type="button" name="submit" onclick="moconfigureapp();" class="miniorange_button" value="<?php echo __('Configure your phone', 'miniorange-2-factor-authentication'); ?>" />
|
551 |
-
</center>
|
552 |
-
</div>
|
553 |
-
<?php
|
554 |
-
|
555 |
-
if(isset($_POST['option']) && sanitize_text_field($_POST['option']) =='miniorange_inline_duo_auth_mobile_complete'){
|
556 |
-
go_for_user_enroll_on_duo($current_user,$session_id);
|
557 |
-
?>
|
558 |
-
<?php }else if(isset($_POST['option']) && sanitize_text_field($_POST['option']) == 'duo_mobile_send_push_notification_for_inline_form') {
|
559 |
-
|
560 |
-
initialize_inline_duo_auth_registration($current_user,$session_id);
|
561 |
-
?>
|
562 |
-
|
563 |
-
<?php }?>
|
564 |
-
|
565 |
-
<?php mo2f_customize_logo() ?>
|
566 |
-
</div>
|
567 |
-
<br>
|
568 |
-
<br>
|
569 |
-
</div>
|
570 |
-
</div>
|
571 |
-
</div>
|
572 |
-
</div>
|
573 |
-
<form name="f" id="mo2f_backto_mo_loginform" method="post" action="<?php echo esc_url(wp_login_url()); ?>" style="display:none;">
|
574 |
-
<input type="hidden" name="miniorange_mobile_validation_failed_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-mobile-validation-failed-nonce')); ?>" />
|
575 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
576 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
577 |
-
</form>
|
578 |
-
<form name="f" method="post" action="" id="mo2f_inline_configureapp_form" style="display:none;">
|
579 |
-
<input type="hidden" name="option" value="miniorange_inline_show_mobile_config"/>
|
580 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
581 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
582 |
-
<input type="hidden" name="miniorange_inline_show_qrcode_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-show-qrcode-nonce')); ?>" />
|
583 |
-
</form>
|
584 |
-
<form name="f" method="post" id="mo2f_inline_duo_auth_register_form" action="" style="display:none;">
|
585 |
-
<input type="hidden" name="option" value="miniorange_inline_duo_auth_mobile_complete"/>
|
586 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
587 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
588 |
-
<input type="hidden" name="mo_auth_inline_duo_auth_mobile_registration_complete_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-duo_auth-registration-complete-nonce')); ?>" />
|
589 |
-
</form>
|
590 |
-
<?php if (sizeof($opt) > 1) { ?>
|
591 |
-
<form name="f" method="post" action="" id="mo2f_goto_two_factor_form">
|
592 |
-
<input type="hidden" name="option" value="miniorange_back_inline"/>
|
593 |
-
<input type="hidden" name="miniorange_inline_two_factor_setup" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-setup-nonce')); ?>" />
|
594 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
595 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
596 |
-
</form>
|
597 |
-
<?php } ?>
|
598 |
-
<script>
|
599 |
-
function mologinback(){
|
600 |
-
jQuery('#mo2f_backto_mo_loginform').submit();
|
601 |
-
}
|
602 |
-
function moconfigureapp(){
|
603 |
-
jQuery('#mo2f_inline_duo_auth_register_form').submit();
|
604 |
-
}
|
605 |
-
jQuery('#mo2f_inline_back_btn').click(function() {
|
606 |
-
jQuery('#mo2f_goto_two_factor_form').submit();
|
607 |
-
});
|
608 |
-
<?php
|
609 |
-
if(isset($showqrCode) && $showqrCode == 'MO_2_FACTOR_SHOW_QR_CODE' && isset($_POST['miniorange_inline_show_qrcode_nonce']) && wp_verify_nonce( sanitize_text_field($_POST['miniorange_inline_show_qrcode_nonce']), 'miniorange-2-factor-inline-show-qrcode-nonce' )){
|
610 |
-
?>
|
611 |
-
<?php } ?>
|
612 |
-
</script>
|
613 |
-
</body>
|
614 |
-
</html>
|
615 |
-
<?php
|
616 |
-
}
|
617 |
-
|
618 |
-
function prompt_user_for_google_authenticator_setup($current_user_id, $login_status, $login_message,$redirect_to,$session_id){
|
619 |
-
$ga_secret = MO2f_Utility::mo2f_get_transient($session_id, 'secret_ga');
|
620 |
-
$data = MO2f_Utility::mo2f_get_transient($session_id, 'ga_qrCode');
|
621 |
-
global $Mo2fdbQueries;
|
622 |
-
if(empty($data)){
|
623 |
-
$user = get_user_by('ID',$current_user_id);
|
624 |
-
if(!MO2F_IS_ONPREM){
|
625 |
-
if(!get_user_meta($user->ID, 'mo2f_google_auth', true)){
|
626 |
-
Miniorange_Authentication::mo2f_get_GA_parameters($user);
|
627 |
-
}
|
628 |
-
$mo2f_google_auth = get_user_meta($user->ID, 'mo2f_google_auth', true);
|
629 |
-
$data = isset($mo2f_google_auth['ga_qrCode']) ? $mo2f_google_auth['ga_qrCode'] : null;
|
630 |
-
$ga_secret = isset($mo2f_google_auth['ga_secret']) ? $mo2f_google_auth['ga_secret'] : null;
|
631 |
-
MO2f_Utility::mo2f_set_transient($session_id, 'secret_ga', $mo2f_google_auth['ga_secret']);
|
632 |
-
MO2f_Utility::mo2f_set_transient($session_id, 'ga_qrCode', $mo2f_google_auth['ga_qrCode']);
|
633 |
-
}else{
|
634 |
-
include_once dirname(dirname(dirname( __FILE__ ))) .DIRECTORY_SEPARATOR . 'handler'.DIRECTORY_SEPARATOR . 'twofa'. DIRECTORY_SEPARATOR . 'gaonprem.php';
|
635 |
-
$gauth_obj = new Google_auth_onpremise();
|
636 |
-
$email = $Mo2fdbQueries->get_user_detail('mo2f_user_email',$user->ID);
|
637 |
-
$onpremise_secret = $gauth_obj->createSecret();
|
638 |
-
$issuer = get_site_option( 'mo2f_GA_account_name', 'miniOrangeAu' );
|
639 |
-
$url = $gauth_obj->geturl( $onpremise_secret, $issuer, $email );
|
640 |
-
$data = $url;
|
641 |
-
MO2f_Utility::mo2f_set_transient($session_id, 'secret_ga', $onpremise_secret);
|
642 |
-
MO2f_Utility::mo2f_set_transient($session_id, 'ga_qrCode', $url);
|
643 |
-
|
644 |
-
}
|
645 |
-
}
|
646 |
-
wp_register_script('mo2f_qr_code_js',plugins_url( "/includes/jquery-qrcode/jquery-qrcode.js", dirname(dirname(__FILE__ ))) );
|
647 |
-
wp_register_script('mo2f_qr_code_minjs',plugins_url( "/includes/jquery-qrcode/jquery-qrcode.min.js", dirname(dirname(__FILE__ ))) );
|
648 |
-
?>
|
649 |
-
<html>
|
650 |
-
<head> <meta charset="utf-8"/>
|
651 |
-
<meta http-equiv="X-UA-Compatible" content="IE=edge">
|
652 |
-
<meta name="viewport" content="width=device-width, initial-scale=1">
|
653 |
-
<?php
|
654 |
-
mo2f_inline_css_and_js();
|
655 |
-
?>
|
656 |
-
</head>
|
657 |
-
<style>
|
658 |
-
* {
|
659 |
-
box-sizing: border-box;
|
660 |
-
}
|
661 |
-
[class*="mcol-"] {
|
662 |
-
float: left;
|
663 |
-
padding: 15px;
|
664 |
-
}
|
665 |
-
/* For desktop: */
|
666 |
-
.mcol-1 {width: 50%;}
|
667 |
-
.mcol-2 {width: 50%;}
|
668 |
-
@media only screen and (max-width: 768px) {
|
669 |
-
/* For mobile phones: */
|
670 |
-
[class*="mcol-"] {
|
671 |
-
width: 100%;
|
672 |
-
}
|
673 |
-
}
|
674 |
-
</style>
|
675 |
-
<body>
|
676 |
-
<div class="mo2f_modal" tabindex="-1" role="dialog" id="myModal5">
|
677 |
-
<div class="mo2f-modal-backdrop"></div>
|
678 |
-
<div class="mo2f_modal-dialog mo2f_modal-lg" >
|
679 |
-
<div class="login mo_customer_validation-modal-content">
|
680 |
-
<div class="mo2f_modal-header">
|
681 |
-
<h4 class="mo2f_modal-title" style="color:black;"><button type="button" class="mo2f_close" data-dismiss="modal" aria-label="Close" title="<?php echo __('Back to login','miniorange-2-factor-authentication');?>" onclick="mologinback();"><span aria-hidden="true">×</span></button>
|
682 |
-
<?php echo __('Setup Authenticator', 'miniorange-2-factor-authentication'); ?></h4>
|
683 |
-
</div>
|
684 |
-
<div class="mo2f_modal-body">
|
685 |
-
<?php
|
686 |
-
|
687 |
-
$current_user = get_userdata($current_user_id);
|
688 |
-
$opt=fetch_methods($current_user);
|
689 |
-
?>
|
690 |
-
<?php if(isset($login_message) && !empty($login_message)) { ?>
|
691 |
-
<div id="otpMessage"
|
692 |
-
<?php if(get_user_meta($current_user_id, 'mo2f_is_error', true)) { ?>style="background-color:#FADBD8; color:#E74C3C;?>"<?php update_user_meta($current_user_id, 'mo2f_is_error', false);} ?>
|
693 |
-
>
|
694 |
-
<p class="mo2fa_display_message_frontend" style="text-align: left !important;"><?php echo __(esc_html($login_message), 'miniorange-2-factor-authentication'); ?></p>
|
695 |
-
</div>
|
696 |
-
<?php if(isset($login_message)) {?> <br/> <?php } ?>
|
697 |
-
<?php } ?>
|
698 |
-
<div class="mcol-1">
|
699 |
-
<div id="mo2f_choose_app_tour">
|
700 |
-
<label for="authenticator_type"><b>Choose an Authenticator app:</b></label>
|
701 |
-
|
702 |
-
<select id="authenticator_type">
|
703 |
-
<option value="google_authenticator">Google Authenticator</option>
|
704 |
-
<option value="msft_authenticator">Microsoft Authenticator</option>
|
705 |
-
<option value="authy_authenticator">Authy Authenticator</option>
|
706 |
-
<option value="last_pass_auth">LastPass Authenticator</option>
|
707 |
-
<option value="free_otp_auth">FreeOTP Authenticator</option>
|
708 |
-
<option value="duo_auth">Duo Mobile Authenticator</option>
|
709 |
-
</select>
|
710 |
-
<div id="links_to_apps_tour" style="background-color:white;padding:5px;">
|
711 |
-
<span id="links_to_apps">
|
712 |
-
<p style="background-color:#e8e4e4;padding:5px;">Get the App - <a href="https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2" target="_blank"><b><?php echo mo2f_lt( "Android Play Store" ); ?></b></a>,
|
713 |
-
<a href="http://itunes.apple.com/us/app/google-authenticator/id388497605" target="_blank"><b><?php echo mo2f_lt( "iOS App Store" ); ?>.</b> </p></a>
|
714 |
-
|
715 |
-
</span>
|
716 |
-
</div>
|
717 |
-
</div>
|
718 |
-
<div style="font-size: 18px !important;"><?php echo __('Scan the QR code from the Authenticator App.', 'miniorange-2-factor-authentication'); ?></div>
|
719 |
-
<ol>
|
720 |
-
<li><?php echo __('In the app, tap on Menu and select "Set up account"', 'miniorange-2-factor-authentication'); ?></li>
|
721 |
-
<li><?php echo __('Select "Scan a barcode". Use your phone\'s camera to scan this barcode.', 'miniorange-2-factor-authentication'); ?></li>
|
722 |
-
<br>
|
723 |
-
<?php if(MO2F_IS_ONPREM){ ?>
|
724 |
-
<div class="mo2f_gauth" data-qrcode="<?php echo $data;?>" style="float:left;margin-left:10%;"></div>
|
725 |
-
<?php
|
726 |
-
|
727 |
-
} else{ ?>
|
728 |
-
<div style="margin-left: 14%;">
|
729 |
-
<div class="mo2f_gauth_column_cloud mo2f_gauth_left" >
|
730 |
-
<div id="displayQrCode"><?php echo '<img id="displayGAQrCodeTour" style="line-height: 0;background:white;" src="data:image/jpg;base64,' . $data . '" />'; ?></div>
|
731 |
-
</div>
|
732 |
-
</div>
|
733 |
-
<?php }
|
734 |
-
?>
|
735 |
-
<div style="margin-top: 55%"><a href="#mo2f_scanbarcode_a" aria-expanded="false" style="color:#21618C;"><b><?php echo __('Can\'t scan the barcode?', 'miniorange-2-factor-authentication'); ?></b></a></div>
|
736 |
-
|
737 |
-
</ol>
|
738 |
-
<div id="mo2f_scanbarcode_a" hidden>
|
739 |
-
<ol >
|
740 |
-
<li><?php echo __('Tap Menu and select "Set up account."', 'miniorange-2-factor-authentication'); ?></li>
|
741 |
-
<li><?php echo __('Select "Enter provided key"', 'miniorange-2-factor-authentication'); ?></li>
|
742 |
-
<li><?php echo __('In "Enter account name" type your full email address.', 'miniorange-2-factor-authentication'); ?></li>
|
743 |
-
<li class="mo2f_list"><?php echo __('In "Enter your key" type your secret key:', 'miniorange-2-factor-authentication'); ?></li>
|
744 |
-
<div style="padding: 10px; background-color: #f9edbe;width: 20em;text-align: center;" >
|
745 |
-
<div style="font-size: 14px; font-weight: bold;line-height: 1.5;" >
|
746 |
-
<?php echo esc_html($ga_secret) ?>
|
747 |
-
</div>
|
748 |
-
<div style="font-size: 80%;color: #666666;">
|
749 |
-
<?php echo __('Spaces don\'t matter.', 'miniorange-2-factor-authentication'); ?>
|
750 |
-
</div>
|
751 |
-
</div>
|
752 |
-
<li class="mo2f_list"><?php echo __('Key type: make sure "Time-based" is selected.', 'miniorange-2-factor-authentication'); ?></li>
|
753 |
-
<li class="mo2f_list"><?php echo __('Tap Add.', 'miniorange-2-factor-authentication'); ?></li>
|
754 |
-
</ol>
|
755 |
-
</div>
|
756 |
-
</div>
|
757 |
-
<div class="mcol-2">
|
758 |
-
<div style="font-size: 18px !important;"><b><?php echo __('Verify and Save', 'miniorange-2-factor-authentication'); ?> </b> </div><br />
|
759 |
-
<div style="font-size: 15px !important;"><?php echo __('Once you have scanned the barcode, enter the 6-digit verification code generated by the Authenticator app', 'miniorange-2-factor-authentication'); ?></div><br />
|
760 |
-
<form name="" method="post" id="mo2f_inline_verify_ga_code_form">
|
761 |
-
<span><b><?php echo __('Code:', 'miniorange-2-factor-authentication'); ?> </b>
|
762 |
-
<br />
|
763 |
-
<input type="hidden" name="option" value="miniorange_inline_ga_validate">
|
764 |
-
<input class="mo2f_IR_GA_token" style="margin-left:36.5%;" autofocus="true" required="true" pattern="[0-9]{4,8}" type="text" id="google_auth_code" name="google_auth_code" placeholder="<?php echo __('Enter OTP', 'miniorange-2-factor-authentication'); ?>" /></span><br/>
|
765 |
-
<div class="center">
|
766 |
-
<input type="submit" name="validate" id="validate" class="miniorange_button" value="<?php echo __('Verify and Save', 'miniorange-2-factor-authentication'); ?>" />
|
767 |
-
</div>
|
768 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
769 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
770 |
-
<input type="hidden" name="mo2f_inline_validate_ga_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-google-auth-nonce')); ?>" />
|
771 |
-
</form>
|
772 |
-
<form name="f" method="post" action="" id="mo2f_goto_two_factor_form" class="center">
|
773 |
-
<input type="submit" name="back" id="mo2f_inline_back_btn" class="miniorange_button" value="<?php echo mo2f_lt('Back');?>" />
|
774 |
-
<input type="hidden" name="option" value="miniorange_back_inline"/>
|
775 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
776 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
777 |
-
<input type="hidden" name="miniorange_inline_two_factor_setup" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-setup-nonce')); ?>" />
|
778 |
-
</form>
|
779 |
-
</div>
|
780 |
-
<br>
|
781 |
-
<br>
|
782 |
-
<?php mo2f_customize_logo() ?>
|
783 |
-
</div>
|
784 |
-
</div>
|
785 |
-
</div>
|
786 |
-
</div>
|
787 |
-
<form name="f" id="mo2f_backto_mo_loginform" method="post" action="<?php echo wp_login_url(); ?>" style="display:none;">
|
788 |
-
<input type="hidden" name="miniorange_mobile_validation_failed_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-mobile-validation-failed-nonce')); ?>" />
|
789 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
790 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
791 |
-
</form>
|
792 |
-
<form name="f" method="post" id="mo2f_inline_app_type_ga_form" action="" style="display:none;">
|
793 |
-
<input type="hidden" name="google_phone_type" />
|
794 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
795 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
796 |
-
<input type="hidden" name="mo2f_inline_ga_phone_type_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-ga-phone-type-nonce')); ?>" />
|
797 |
-
</form>
|
798 |
-
|
799 |
-
<script>
|
800 |
-
jQuery('#authenticator_type').change(function(){
|
801 |
-
var auth_type = jQuery(this).val();
|
802 |
-
if(auth_type == 'google_authenticator'){
|
803 |
-
jQuery('#links_to_apps').html('<p style="background-color:#e8e4e4;padding:5px;">' +
|
804 |
-
'Get the App - <a href="https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2" target="_blank"><b><?php echo mo2f_lt( "Android Play Store" ); ?></b></a>, ' +
|
805 |
-
'<a href="http://itunes.apple.com/us/app/google-authenticator/id388497605" target="_blank"><b><?php echo mo2f_lt( "iOS App Store" ); ?>.</b> </p>');
|
806 |
-
jQuery('#mo2f_change_app_name').show();
|
807 |
-
jQuery('#links_to_apps').show();
|
808 |
-
}else if(auth_type == 'msft_authenticator'){
|
809 |
-
jQuery('#links_to_apps').html('<p style="background-color:#e8e4e4;padding:5px;">' +
|
810 |
-
'Get the App - <a href="https://play.google.com/store/apps/details?id=com.azure.authenticator" target="_blank"><b><?php echo mo2f_lt( "Android Play Store" ); ?></b></a>, ' +
|
811 |
-
'<a href="https://apps.apple.com/us/app/microsoft-authenticator/id983156458" target="_blank"><b><?php echo mo2f_lt( "iOS App Store" ); ?>.</b> </p>');
|
812 |
-
jQuery('#links_to_apps').show();
|
813 |
-
}else if(auth_type == 'free_otp_auth'){
|
814 |
-
jQuery('#links_to_apps').html('<p style="background-color:#e8e4e4;padding:5px;">' +
|
815 |
-
'Get the App - <a href="https://play.google.com/store/apps/details?id=org.fedorahosted.freeotp" target="_blank"><b><?php echo mo2f_lt( "Android Play Store" ); ?></b></a>, ' +
|
816 |
-
'<a href="https://apps.apple.com/us/app/freeotp-authenticator/id872559395" target="_blank"><b><?php echo mo2f_lt( "iOS App Store" ); ?>.</b> </p>');
|
817 |
-
jQuery('#links_to_apps').show();
|
818 |
-
}else if(auth_type == 'duo_auth'){
|
819 |
-
jQuery('#links_to_apps').html('<p style="background-color:#e8e4e4;padding:5px;">' +
|
820 |
-
'Get the App - <a href="https://play.google.com/store/apps/details?id=com.duosecurity.duomobile" target="_blank"><b><?php echo mo2f_lt( "Android Play Store" ); ?></b></a>, ' +
|
821 |
-
'<a href="https://apps.apple.com/in/app/duo-mobile/id422663827" target="_blank"><b><?php echo mo2f_lt( "iOS App Store" ); ?>.</b> </p>');
|
822 |
-
jQuery('#links_to_apps').show();
|
823 |
-
}else if(auth_type == 'authy_authenticator'){
|
824 |
-
jQuery('#links_to_apps').html('<p style="background-color:#e8e4e4;padding:5px;">' +
|
825 |
-
'Get the App - <a href="https://play.google.com/store/apps/details?id=com.authy.authy" target="_blank"><b><?php echo mo2f_lt( "Android Play Store" ); ?></b></a>, ' +
|
826 |
-
'<a href="https://itunes.apple.com/in/app/authy/id494168017" target="_blank"><b><?php echo mo2f_lt( "iOS App Store" ); ?>.</b> </p>');
|
827 |
-
jQuery('#links_to_apps').show();
|
828 |
-
}else{
|
829 |
-
jQuery('#links_to_apps').html('<p style="background-color:#e8e4e4;padding:5px;">' +
|
830 |
-
'Get the App - <a href="https://play.google.com/store/apps/details?id=com.lastpass.authenticator" target="_blank"><b><?php echo mo2f_lt( "Android Play Store" ); ?></b></a>, ' +
|
831 |
-
'<a href="https://itunes.apple.com/in/app/lastpass-authenticator/id1079110004" target="_blank"><b><?php echo mo2f_lt( "iOS App Store" ); ?>.</b> </p>');
|
832 |
-
jQuery('#mo2f_change_app_name').show();
|
833 |
-
jQuery('#links_to_apps').show();
|
834 |
-
}
|
835 |
-
});
|
836 |
-
function mologinback(){
|
837 |
-
jQuery('#mo2f_backto_mo_loginform').submit();
|
838 |
-
}
|
839 |
-
jQuery('input:radio[name=mo2f_inline_app_type_radio]').click(function() {
|
840 |
-
var selectedPhone = jQuery(this).val();
|
841 |
-
document.getElementById("mo2f_inline_app_type_ga_form").elements[0].value = selectedPhone;
|
842 |
-
jQuery('#mo2f_inline_app_type_ga_form').submit();
|
843 |
-
});
|
844 |
-
jQuery('a[href="#mo2f_scanbarcode_a"]').click(function(){
|
845 |
-
jQuery("#mo2f_scanbarcode_a").toggle();
|
846 |
-
});
|
847 |
-
jQuery(document).ready(function() {
|
848 |
-
jQuery('.mo2f_gauth').qrcode({
|
849 |
-
'render': 'image',
|
850 |
-
size: 175,
|
851 |
-
'text': jQuery('.mo2f_gauth').data('qrcode')
|
852 |
-
});
|
853 |
-
});
|
854 |
-
</script>
|
855 |
-
</body>
|
856 |
-
<?php
|
857 |
-
echo '<head>';
|
858 |
-
wp_print_scripts( 'mo2f_qr_code_js' );
|
859 |
-
wp_print_scripts( 'mo2f_qr_code_minjs' );
|
860 |
-
echo '</head>';
|
861 |
-
}
|
862 |
-
|
863 |
-
function mo2f_inline_css_and_js(){
|
864 |
-
|
865 |
-
wp_register_style( 'mo2f_bootstrap',plugins_url('includes/css/bootstrap.min.css', dirname(dirname(__FILE__))));
|
866 |
-
wp_register_style('mo2f_front_end_login',plugins_url('includes/css/front_end_login.css',dirname(dirname( __FILE__))));
|
867 |
-
wp_register_style('mo2f_style_setting',plugins_url('includes/css/style_settings.css', dirname(dirname(__FILE__))));
|
868 |
-
wp_register_style('mo2f_hide-login',plugins_url('includes/css/hide-login.css',dirname(dirname( __FILE__))));
|
869 |
-
|
870 |
-
wp_print_styles( 'mo2f_bootstrap');
|
871 |
-
wp_print_styles( 'mo2f_front_end_login');
|
872 |
-
wp_print_styles( 'mo2f_style_setting');
|
873 |
-
wp_print_styles( 'mo2f_hide-login');
|
874 |
-
|
875 |
-
wp_register_script('mo2f_bootstrap_js',plugins_url('includes/js/bootstrap.min.js',dirname(dirname( __FILE__))));
|
876 |
-
wp_print_scripts( 'jquery');
|
877 |
-
wp_print_scripts( 'mo2f_bootstrap_js' );
|
878 |
-
}
|
879 |
-
|
880 |
-
|
881 |
-
function initialize_inline_mobile_registration($current_user,$session_id,$qrCode){
|
882 |
-
$data = $qrCode;
|
883 |
-
|
884 |
-
$mo2f_login_transaction_id = MO2f_Utility::mo2f_get_transient($session_id, 'mo2f_transactionId' );
|
885 |
-
|
886 |
-
$url = MO_HOST_NAME;
|
887 |
-
$opt=fetch_methods($current_user);
|
888 |
-
?>
|
889 |
-
<p><?php echo __('Open your miniOrange', 'miniorange-2-factor-authentication'); ?><b> <?php echo __('Authenticator', 'miniorange-2-factor-authentication'); ?></b> <?php echo __('app and click on', 'miniorange-2-factor-authentication'); ?> <b><?php echo __('Configure button', 'miniorange-2-factor-authentication'); ?> </b> <?php echo __('to scan the QR Code. Your phone should have internet connectivity to scan QR code.', 'miniorange-2-factor-authentication'); ?> </p>
|
890 |
-
<div class="red" style="color:#E74C3C;">
|
891 |
-
<p><?php echo __('I am not able to scan the QR code,', 'miniorange-2-factor-authentication'); ?> <a data-toggle="mo2f_collapse" href="#mo2f_scanqrcode" aria-expanded="false" style="color:#3498DB;"><?php echo __('click here ', 'miniorange-2-factor-authentication'); ?></a></p></div>
|
892 |
-
<div class="mo2f_collapse" id="mo2f_scanqrcode" style="margin-left:5px;">
|
893 |
-
<?php echo __('Follow these instructions below and try again.', 'miniorange-2-factor-authentication'); ?>
|
894 |
-
<ol>
|
895 |
-
<li><?php echo __('Make sure your desktop screen has enough brightness.', 'miniorange-2-factor-authentication'); ?></li>
|
896 |
-
<li><?php echo __('Open your app and click on Configure button to scan QR Code again.', 'miniorange-2-factor-authentication'); ?></li>
|
897 |
-
<li><?php echo __('If you get cross mark on QR Code then click on \'Refresh QR Code\' link.', 'miniorange-2-factor-authentication'); ?></li>
|
898 |
-
</ol>
|
899 |
-
</div>
|
900 |
-
<table class="mo2f_settings_table">
|
901 |
-
<a href="#mo2f_refreshQRCode" style="color:#3498DB;"><?php echo __('Click here to Refresh QR Code.', 'miniorange-2-factor-authentication'); ?></a>
|
902 |
-
<div id="displayInlineQrCode" style="margin-left:36%;"><?php echo '<img style="width:200px;" src="data:image/jpg;base64,' . esc_html($data) . '" />'; ?>
|
903 |
-
</div>
|
904 |
-
</table>
|
905 |
-
<center>
|
906 |
-
<?php
|
907 |
-
if (sizeof($opt) > 1) { ?>
|
908 |
-
<input type="button" name="back" id="mo2f_inline_back_btn" class="miniorange_button" value="<?php echo __('Back', 'miniorange-2-factor-authentication'); ?>" />
|
909 |
-
<?php }
|
910 |
-
?>
|
911 |
-
</center>
|
912 |
-
<script>
|
913 |
-
jQuery('a[href="#mo2f_refreshQRCode"]').click(function(e) {
|
914 |
-
jQuery('#mo2f_inline_configureapp_form').submit();
|
915 |
-
});
|
916 |
-
jQuery("#mo2f_configurePhone").empty();
|
917 |
-
jQuery("#mo2f_app_div").hide();
|
918 |
-
var timeout;
|
919 |
-
pollInlineMobileRegistration();
|
920 |
-
function pollInlineMobileRegistration()
|
921 |
-
{
|
922 |
-
var transId = "<?php echo esc_html($mo2f_login_transaction_id); ?>";
|
923 |
-
var jsonString = "{\"txId\":\""+ transId + "\"}";
|
924 |
-
var postUrl = "<?php echo esc_html($url); ?>" + "/moas/api/auth/registration-status";
|
925 |
-
jQuery.ajax({
|
926 |
-
url: postUrl,
|
927 |
-
type : "POST",
|
928 |
-
dataType : "json",
|
929 |
-
data : jsonString,
|
930 |
-
contentType : "application/json; charset=utf-8",
|
931 |
-
success : function(result) {
|
932 |
-
var status = JSON.parse(JSON.stringify(result)).status;
|
933 |
-
if (status == 'SUCCESS') {
|
934 |
-
var content = "<br/><div id='success'><img style='width:165px;margin-top:-1%;margin-left:2%;' src='" + "<?php echo plugins_url( 'includes/images/right.png' , dirname(dirname(__FILE__ )));?>" + "' /></div>";
|
935 |
-
jQuery("#displayInlineQrCode").empty();
|
936 |
-
jQuery("#displayInlineQrCode").append(content);
|
937 |
-
setTimeout(function(){jQuery("#mo2f_inline_mobile_register_form").submit();}, 1000);
|
938 |
-
} else if (status == 'ERROR' || status == 'FAILED') {
|
939 |
-
var content = "<br/><div id='error'><img style='width:165px;margin-top:-1%;margin-left:2%;' src='" + "<?php echo plugins_url( 'includes/images/wrong.png' , __FILE__ );?>" + "' /></div>";
|
940 |
-
jQuery("#displayInlineQrCode").empty();
|
941 |
-
jQuery("#displayInlineQrCode").append(content);
|
942 |
-
jQuery("#messages").empty();
|
943 |
-
jQuery("#messages").append("<div class='error mo2f_error_container'> <p class='mo2f_msgs'>An Error occured processing your request. Please try again to configure your phone.</p></div>");
|
944 |
-
} else {
|
945 |
-
timeout = setTimeout(pollInlineMobileRegistration, 3000);
|
946 |
-
}
|
947 |
-
}
|
948 |
-
});
|
949 |
-
}
|
950 |
-
</script>
|
951 |
-
<?php
|
952 |
-
}
|
953 |
-
|
954 |
-
function initialize_inline_duo_auth_registration($current_user,$session_id_encrypt){
|
955 |
-
|
956 |
-
$user_id = MO2f_Utility::mo2f_get_transient($session_id_encrypt, 'mo2f_current_user_id');
|
957 |
-
update_user_meta($user_id,'current_user_email',$current_user->user_email);
|
958 |
-
|
959 |
-
|
960 |
-
$opt=fetch_methods($current_user);
|
961 |
-
?>
|
962 |
-
<h3><?php echo mo2f_lt( 'Test Duo Authenticator' ); ?></h3>
|
963 |
-
<hr>
|
964 |
-
<div>
|
965 |
-
<br>
|
966 |
-
<br>
|
967 |
-
<center>
|
968 |
-
<h3><?php echo mo2f_lt( 'Duo push notification is sent to your mobile phone.' ); ?>
|
969 |
-
<br>
|
970 |
-
<?php echo mo2f_lt( 'We are waiting for your approval...' ); ?></h3>
|
971 |
-
<img src="<?php echo plugins_url( 'includes/images/ajax-loader-login.gif', dirname(dirname(__FILE__)) ); ?>"/>
|
972 |
-
</center>
|
973 |
-
|
974 |
-
<input type="button" name="back" id="go_back" class="button button-primary button-large"
|
975 |
-
value="<?php echo mo2f_lt( 'Back' ); ?>"
|
976 |
-
style="margin-top:100px;margin-left:10px;"/>
|
977 |
-
</div>
|
978 |
-
|
979 |
-
<form name="f" method="post" action="" id="mo2f_go_back_form">
|
980 |
-
<input type="hidden" name="option" value="mo2f_go_back"/>
|
981 |
-
<input type="hidden" name="mo2f_go_back_nonce"
|
982 |
-
value="<?php echo esc_html(wp_create_nonce( "mo2f-go-back-nonce" )) ?>"/>
|
983 |
-
</form>
|
984 |
-
<form name="f" method="post" id="mo2f_inline_duo_authenticator_success_form" action="">
|
985 |
-
<input type="hidden" name="option" value="mo2f_inline_duo_authenticator_success_form"/>
|
986 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id_encrypt); ?>"/>
|
987 |
-
<input type="hidden" name="mo2f_duo_authenticator_success_nonce"
|
988 |
-
value="<?php echo esc_html(wp_create_nonce( "mo2f-duo-authenticator-success-nonce" )) ?>"/>
|
989 |
-
</form>
|
990 |
-
<form name="f" method="post" id="mo2f_duo_authenticator_error_form" action="">
|
991 |
-
<input type="hidden" name="option" value="mo2f_inline_duo_authenticator_error"/>
|
992 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id_encrypt); ?>"/>
|
993 |
-
<input type="hidden" name="mo2f_inline_duo_authentcator_error_nonce"
|
994 |
-
value="<?php echo esc_html(wp_create_nonce( "mo2f-inline-duo-authenticator-error-nonce" )) ?>"/>
|
995 |
-
</form>
|
996 |
-
|
997 |
-
<script>
|
998 |
-
jQuery('#go_back').click(function () {
|
999 |
-
jQuery('#mo2f_go_back_form').submit();
|
1000 |
-
});
|
1001 |
-
jQuery("#mo2f_configurePhone").empty();
|
1002 |
-
jQuery("#mo2f_app_div").hide();
|
1003 |
-
var timeout;
|
1004 |
-
|
1005 |
-
|
1006 |
-
|
1007 |
-
pollMobileValidation();
|
1008 |
-
function pollMobileValidation() {
|
1009 |
-
var ajax_url = "<?php echo esc_url(admin_url('admin-ajax.php')); ?>";
|
1010 |
-
var nonce = "<?php echo esc_html(wp_create_nonce( 'miniorange-2-factor-duo-nonce' )); ?>";
|
1011 |
-
var session_id_encrypt = "<?php echo esc_html($session_id_encrypt); ?>";
|
1012 |
-
|
1013 |
-
var data={
|
1014 |
-
'action':'mo2f_duo_ajax_request',
|
1015 |
-
'call_type':'check_duo_push_auth_status',
|
1016 |
-
'session_id_encrypt': session_id_encrypt,
|
1017 |
-
'nonce': nonce,
|
1018 |
-
|
1019 |
-
};
|
1020 |
-
|
1021 |
-
jQuery.post(ajax_url, data, function(response){
|
1022 |
-
|
1023 |
-
if (response == 'SUCCESS') {
|
1024 |
-
jQuery('#mo2f_inline_duo_authenticator_success_form').submit();
|
1025 |
-
} else if (response == 'ERROR' || response == 'FAILED' || response == 'DENIED') {
|
1026 |
-
|
1027 |
-
jQuery('#mo2f_duo_authenticator_error_form').submit();
|
1028 |
-
} else {
|
1029 |
-
timeout = setTimeout(pollMobileValidation, 3000);
|
1030 |
-
}
|
1031 |
-
|
1032 |
-
});
|
1033 |
-
|
1034 |
-
}
|
1035 |
-
|
1036 |
-
</script>
|
1037 |
-
|
1038 |
-
<?php
|
1039 |
-
}
|
1040 |
-
function prompt_user_for_kba_setup($current_user_id, $login_status, $login_message,$redirect_to,$session_id){
|
1041 |
-
$current_user = get_userdata($current_user_id);
|
1042 |
-
$opt=fetch_methods($current_user);
|
1043 |
-
|
1044 |
-
?>
|
1045 |
-
<html>
|
1046 |
-
<head> <meta charset="utf-8"/>
|
1047 |
-
<meta http-equiv="X-UA-Compatible" content="IE=edge">
|
1048 |
-
<meta name="viewport" content="width=device-width, initial-scale=1">
|
1049 |
-
<?php
|
1050 |
-
mo2f_inline_css_and_js();
|
1051 |
-
?>
|
1052 |
-
<style>
|
1053 |
-
.mo2f_kba_ques, .mo2f_table_textbox{
|
1054 |
-
background: whitesmoke none repeat scroll 0% 0%;
|
1055 |
-
}
|
1056 |
-
</style>
|
1057 |
-
</head>
|
1058 |
-
<body>
|
1059 |
-
<div class="mo2f_modal" tabindex="-1" role="dialog" id="myModal5">
|
1060 |
-
<div class="mo2f-modal-backdrop"></div>
|
1061 |
-
<div class="mo2f_modal-dialog mo2f_modal-lg">
|
1062 |
-
<div class="login mo_customer_validation-modal-content">
|
1063 |
-
<div class="mo2f_modal-header">
|
1064 |
-
<h4 class="mo2f_modal-title"><button type="button" class="mo2f_close" data-dismiss="modal" aria-label="Close" title="<?php echo __('Back to login','miniorange-2-factor-authentication');?>" onclick="mologinback();"><span aria-hidden="true">×</span></button>
|
1065 |
-
<?php echo __('Setup Security Question (KBA)', 'miniorange-2-factor-authentication'); ?></h4>
|
1066 |
-
</div>
|
1067 |
-
<div class="mo2f_modal-body">
|
1068 |
-
<?php if(isset($login_message) && !empty($login_message)) { ?>
|
1069 |
-
<div id="otpMessage">
|
1070 |
-
<p class="mo2fa_display_message_frontend" style="text-align: left !important;"><?php echo esc_html($login_message); ?></p>
|
1071 |
-
</div>
|
1072 |
-
<?php } ?>
|
1073 |
-
<form name="f" method="post" action="" >
|
1074 |
-
<?php mo2f_configure_kba_questions(); ?>
|
1075 |
-
<br />
|
1076 |
-
<div class ="row">
|
1077 |
-
<div class="col-md-4" style="margin: 0 auto;width: 100px;">
|
1078 |
-
<input type="submit" name="validate" class="miniorange_button" style="width: 30%;background-color:#ff4168;" value="<?php echo __('Save', 'miniorange-2-factor-authentication'); ?>" />
|
1079 |
-
<button type="button" class="miniorange_button" style="width: 30%;background-color:#ff4168;" onclick="mobackinline();">Back</button>
|
1080 |
-
|
1081 |
-
</div>
|
1082 |
-
</div>
|
1083 |
-
<input type="hidden" name="option" value="mo2f_inline_kba_option" />
|
1084 |
-
<input type="hidden" name="mo2f_inline_save_kba_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-save-kba-nonce')); ?>" />
|
1085 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1086 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1087 |
-
</form>
|
1088 |
-
<?php if (sizeof($opt) > 1) { ?>
|
1089 |
-
<form name="f" method="post" action="" id="mo2f_goto_two_factor_form" class="mo2f_display_none_forms">
|
1090 |
-
<div class ="row">
|
1091 |
-
<div class="col-md-4" style="margin: 0 auto;width: 100px;">
|
1092 |
-
<input type="hidden" name="option" value="miniorange_back_inline"/>
|
1093 |
-
</div>
|
1094 |
-
</div>
|
1095 |
-
<input type="hidden" name="miniorange_inline_two_factor_setup" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-setup-nonce')); ?>" />
|
1096 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1097 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1098 |
-
</form>
|
1099 |
-
<?php } ?>
|
1100 |
-
|
1101 |
-
<?php mo2f_customize_logo() ?>
|
1102 |
-
</div>
|
1103 |
-
</div>
|
1104 |
-
</div>
|
1105 |
-
</div>
|
1106 |
-
<form name="f" id="mo2f_backto_mo_loginform" method="post" action="<?php echo wp_login_url(); ?>" style="display:none;">
|
1107 |
-
<input type="hidden" name="miniorange_mobile_validation_failed_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-mobile-validation-failed-nonce')); ?>" />
|
1108 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1109 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1110 |
-
</form>
|
1111 |
-
|
1112 |
-
<script>
|
1113 |
-
function mologinback(){
|
1114 |
-
jQuery('#mo2f_backto_mo_loginform').submit();
|
1115 |
-
}
|
1116 |
-
|
1117 |
-
function mobackinline(){
|
1118 |
-
jQuery('#mo2f_goto_two_factor_form').submit();
|
1119 |
-
}
|
1120 |
-
</script>
|
1121 |
-
</body>
|
1122 |
-
</html>
|
1123 |
-
<?php
|
1124 |
-
}function prompt_user_for_miniorange_register($current_user_id, $login_status, $login_message,$redirect_to,$session_id){
|
1125 |
-
$current_user = get_userdata($current_user_id);
|
1126 |
-
$opt=fetch_methods($current_user);
|
1127 |
-
?>
|
1128 |
-
<html>
|
1129 |
-
<head> <meta charset="utf-8"/>
|
1130 |
-
<meta http-equiv="X-UA-Compatible" content="IE=edge">
|
1131 |
-
<meta name="viewport" content="width=device-width, initial-scale=1">
|
1132 |
-
<?php
|
1133 |
-
mo2f_inline_css_and_js();
|
1134 |
-
?>
|
1135 |
-
<style>
|
1136 |
-
.mo2f_kba_ques, .mo2f_table_textbox{
|
1137 |
-
background: whitesmoke none repeat scroll 0% 0%;
|
1138 |
-
}
|
1139 |
-
</style>
|
1140 |
-
</head>
|
1141 |
-
<body>
|
1142 |
-
<div class="mo2f_modal" tabindex="-1" role="dialog" id="myModal5">
|
1143 |
-
<div class="mo2f-modal-backdrop"></div>
|
1144 |
-
<div class="mo2f_modal-dialog mo2f_modal-lg">
|
1145 |
-
<div class="login mo_customer_validation-modal-content">
|
1146 |
-
<div class="mo2f_modal-header">
|
1147 |
-
<h3 class="mo2f_modal-title" style="color:black;"><button type="button" class="mo2f_close" data-dismiss="modal" aria-label="Close" title="<?php echo __('Back to login','miniorange-2-factor-authentication');?>" onclick="mologinback();"><span aria-hidden="true">×</span></button>
|
1148 |
-
<b> <?php echo __('Connect with miniOrange', 'miniorange-2-factor-authentication'); ?></b></h3>
|
1149 |
-
</div>
|
1150 |
-
<div class="mo2f_modal-body">
|
1151 |
-
<?php if(isset($login_message) && !empty($login_message)){ ?>
|
1152 |
-
<div id="otpMessage">
|
1153 |
-
<p class="mo2fa_display_message_frontend" style="text-align: left !important;" ><?php echo wp_kses($login_message, array('b'=>array())); ?></p>
|
1154 |
-
</div>
|
1155 |
-
<?php } ?>
|
1156 |
-
<form name="mo2f_inline_register_form" id="mo2f_inline_register_form" method="post" action="">
|
1157 |
-
<input type="hidden" name="option" value="miniorange_inline_register" />
|
1158 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1159 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1160 |
-
<p>This method requires you to have an account with miniOrange.</p>
|
1161 |
-
<table class="mo_wpns_settings_table">
|
1162 |
-
<tr>
|
1163 |
-
<td><b><font color="#FF0000">*</font>Email:</b></td>
|
1164 |
-
<td><input class="mo_wpns_table_textbox" type="email" name="email"
|
1165 |
-
required placeholder="person@example.com"/></td>
|
1166 |
-
</tr>
|
1167 |
-
<tr>
|
1168 |
-
<td><b><font color="#FF0000">*</font>Password:</b></td>
|
1169 |
-
<td><input class="mo_wpns_table_textbox" required type="password"
|
1170 |
-
name="password" placeholder="Choose your password (Min. length 6)" /></td>
|
1171 |
-
</tr>
|
1172 |
-
<tr>
|
1173 |
-
<td><b><font color="#FF0000">*</font>Confirm Password:</b></td>
|
1174 |
-
<td><input class="mo_wpns_table_textbox" required type="password"
|
1175 |
-
name="confirmPassword" placeholder="Confirm your password" /></td>
|
1176 |
-
</tr>
|
1177 |
-
<tr>
|
1178 |
-
<td> </td>
|
1179 |
-
<td><br><input type="submit" name="submit" value="Create Account"
|
1180 |
-
class="miniorange_button" />
|
1181 |
-
<a href="#mo2f_account_exist">Already have an account?</a>
|
1182 |
-
</tr>
|
1183 |
-
</table>
|
1184 |
-
</form>
|
1185 |
-
<form name="f" id="mo2f_inline_login_form" method="post" action="" hidden>
|
1186 |
-
<p><b>It seems you already have an account with miniOrange. Please enter your miniOrange email and password.<br></b><a target="_blank" href="https://login.xecurify.com/moas/idp/resetpassword"> Click here if you forgot your password?</a></p>
|
1187 |
-
<input type="hidden" name="option" value="miniorange_inline_login"/>
|
1188 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1189 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1190 |
-
<table class="mo_wpns_settings_table">
|
1191 |
-
<tr>
|
1192 |
-
<td><b><font color="#FF0000">*</font>Email:</b></td>
|
1193 |
-
<td><input class="mo_wpns_table_textbox" type="email" name="email"
|
1194 |
-
required placeholder="person@example.com"
|
1195 |
-
/></td>
|
1196 |
-
</tr>
|
1197 |
-
<tr>
|
1198 |
-
<td><b><font color="#FF0000">*</font>Password:</b></td>
|
1199 |
-
<td><input class="mo_wpns_table_textbox" required type="password"
|
1200 |
-
name="password" placeholder="Enter your miniOrange password" /></td>
|
1201 |
-
</tr>
|
1202 |
-
<tr>
|
1203 |
-
<td> </td>
|
1204 |
-
<td><input type="submit" class="miniorange_button" />
|
1205 |
-
<input type="button" id="cancel_link" class="miniorange_button" value="<?php echo __('Go Back to Registration', 'miniorange-2-factor-authentication'); ?>" />
|
1206 |
-
</tr>
|
1207 |
-
</table>
|
1208 |
-
</form>
|
1209 |
-
<br>
|
1210 |
-
<input type="button" name="back" id="mo2f_inline_back_btn" class="miniorange_button" value="<?php echo __('<< Back to Menu', 'miniorange-2-factor-authentication'); ?>" />
|
1211 |
-
<?php mo2f_customize_logo() ?>
|
1212 |
-
</div>
|
1213 |
-
</div>
|
1214 |
-
</div>
|
1215 |
-
</div>
|
1216 |
-
<form name="f" method="post" action="" id="mo2f_goto_two_factor_form" >
|
1217 |
-
<input type="hidden" name="option" value="miniorange_back_inline"/>
|
1218 |
-
<input type="hidden" name="miniorange_inline_two_factor_setup" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-setup-nonce')); ?>" />
|
1219 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1220 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1221 |
-
</form>
|
1222 |
-
<form name="f" id="mo2f_backto_mo_loginform" method="post" action="<?php echo esc_url(wp_login_url()); ?>" style="display:none;">
|
1223 |
-
<input type="hidden" name="miniorange_mobile_validation_failed_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-mobile-validation-failed-nonce')); ?>" />
|
1224 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1225 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1226 |
-
</form>
|
1227 |
-
|
1228 |
-
<script>
|
1229 |
-
jQuery('#mo2f_inline_back_btn').click(function() {
|
1230 |
-
jQuery('#mo2f_goto_two_factor_form').submit();
|
1231 |
-
});
|
1232 |
-
jQuery('a[href=\"#mo2f_account_exist\"]').click(function (e) {
|
1233 |
-
jQuery('#mo2f_inline_login_form').show();
|
1234 |
-
jQuery('#mo2f_inline_register_form').hide();
|
1235 |
-
});
|
1236 |
-
jQuery('#cancel_link').click(function(){
|
1237 |
-
jQuery('#mo2f_inline_register_form').show();
|
1238 |
-
jQuery('#mo2f_inline_login_form').hide();
|
1239 |
-
});
|
1240 |
-
function mologinback(){
|
1241 |
-
jQuery('#mo2f_backto_mo_loginform').submit();
|
1242 |
-
}
|
1243 |
-
</script>
|
1244 |
-
</body>
|
1245 |
-
</html>
|
1246 |
-
<?php
|
1247 |
-
}
|
1248 |
-
function prompt_user_for_setup_success($id, $login_status, $login_message,$redirect_to,$session_id){
|
1249 |
-
global $Mo2fdbQueries;
|
1250 |
-
?>
|
1251 |
-
<html>
|
1252 |
-
<head> <meta charset="utf-8"/>
|
1253 |
-
<meta http-equiv="X-UA-Compatible" content="IE=edge">
|
1254 |
-
<meta name="viewport" content="width=device-width, initial-scale=1">
|
1255 |
-
<?php
|
1256 |
-
mo2f_inline_css_and_js();
|
1257 |
-
?>
|
1258 |
-
<style>
|
1259 |
-
.mo2f_kba_ques, .mo2f_table_textbox{
|
1260 |
-
background: whitesmoke none repeat scroll 0% 0%;
|
1261 |
-
}
|
1262 |
-
</style>
|
1263 |
-
</head>
|
1264 |
-
<body>
|
1265 |
-
<div class="mo2f_modal" tabindex="-1" role="dialog" id="myModal5">
|
1266 |
-
<div class="mo2f-modal-backdrop"></div>
|
1267 |
-
<div class="mo2f_modal-dialog mo2f_modal-lg">
|
1268 |
-
<div class="login mo_customer_validation-modal-content">
|
1269 |
-
<div class="mo2f_modal-header">
|
1270 |
-
<h4 class="mo2f_modal-title"><button type="button" class="mo2f_close" data-dismiss="modal" aria-label="Close" title="<?php echo __('Back to login', 'miniorange-2-factor-authentication'); ?>" onclick="mologinback();"><span aria-hidden="true">×</span></button>
|
1271 |
-
<?php echo __('Two Factor Setup Complete', 'miniorange-2-factor-authentication'); ?></h4>
|
1272 |
-
</div>
|
1273 |
-
<div class="mo2f_modal-body center">
|
1274 |
-
<?php
|
1275 |
-
global $Mo2fdbQueries;
|
1276 |
-
$mo2f_second_factor = $Mo2fdbQueries->get_user_detail( 'mo2f_configured_2FA_method',$id);
|
1277 |
-
if($mo2f_second_factor == 'OUT OF BAND EMAIL'){
|
1278 |
-
$mo2f_second_factor = 'Email Verification';
|
1279 |
-
}else if($mo2f_second_factor == 'SMS'){
|
1280 |
-
$mo2f_second_factor = 'OTP over SMS';
|
1281 |
-
}else if($mo2f_second_factor == 'OTP_OVER_EMAIL'){
|
1282 |
-
$mo2f_second_factor = 'OTP_OVER_EMAIL';
|
1283 |
-
}else if($mo2f_second_factor == 'PHONE VERIFICATION'){
|
1284 |
-
$mo2f_second_factor = 'Phone Call Verification';
|
1285 |
-
}else if($mo2f_second_factor == 'SOFT TOKEN'){
|
1286 |
-
$mo2f_second_factor = 'Soft Token';
|
1287 |
-
}else if($mo2f_second_factor == 'MOBILE AUTHENTICATION'){
|
1288 |
-
$mo2f_second_factor = 'QR Code Authentication';
|
1289 |
-
}else if($mo2f_second_factor == 'PUSH NOTIFICATIONS'){
|
1290 |
-
$mo2f_second_factor = 'Push Notification';
|
1291 |
-
}else if($mo2f_second_factor == 'GOOGLE AUTHENTICATOR'){
|
1292 |
-
if(get_user_meta($id,'mo2f_external_app_type',true) == 'GOOGLE AUTHENTICATOR'){
|
1293 |
-
$mo2f_second_factor = 'Google Authenticator';
|
1294 |
-
}else{
|
1295 |
-
$mo2f_second_factor = 'Authy 2-Factor Authentication';
|
1296 |
-
}
|
1297 |
-
}else if($mo2f_second_factor == 'KBA'){
|
1298 |
-
$mo2f_second_factor = 'Security Questions (KBA)';
|
1299 |
-
}
|
1300 |
-
$Mo2fdbQueries->get_user_detail( 'mo2f_configured_2FA_method',$id);
|
1301 |
-
$status = $Mo2fdbQueries->get_user_detail( 'mo_2factor_user_registration_status',$id);
|
1302 |
-
|
1303 |
-
if(get_site_option( 'mo2f_disable_kba' )!=1){
|
1304 |
-
if($status != 'MO_2_FACTOR_PLUGIN_SETTINGS'){
|
1305 |
-
?><div id="validation_msg" style="color:red;text-align:left !important;"></div>
|
1306 |
-
<div id="mo2f_show_kba_reg" class="mo2f_inline_padding" style="text-align:left !important;" >
|
1307 |
-
<?php if(isset($login_message) && !empty($login_message)){ ?>
|
1308 |
-
<div id="otpMessage">
|
1309 |
-
<p class="mo2fa_display_message_frontend" style="text-align: left !important;" ><?php echo wp_kses($login_message, array('b'=>array())); ?></p>
|
1310 |
-
</div>
|
1311 |
-
<?php } ?>
|
1312 |
-
<h4> <?php echo __('Please set your security questions as an alternate login or backup method.', 'miniorange-2-factor-authentication'); ?></h4>
|
1313 |
-
<form name="f" method="post" action="" >
|
1314 |
-
<?php mo2f_configure_kba_questions(); ?>
|
1315 |
-
<br>
|
1316 |
-
<center>
|
1317 |
-
<input type="submit" name="validate" class="miniorange_button" value="<?php echo __('Save', 'miniorange-2-factor-authentication'); ?>" />
|
1318 |
-
</center>
|
1319 |
-
<input type="hidden" name="mo2f_inline_kba_option" />
|
1320 |
-
<input type="hidden" name="mo2f_inline_save_kba_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-save-kba-nonce')); ?>" />
|
1321 |
-
<input type="hidden" name="mo2f_inline_kba_status" value="<?php echo esc_html($login_status); ?>" />
|
1322 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1323 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1324 |
-
</form>
|
1325 |
-
</div>
|
1326 |
-
<?php }
|
1327 |
-
}else{
|
1328 |
-
$mo2fa_login_status = 'MO_2_FACTOR_SETUP_SUCCESS';
|
1329 |
-
$Mo2fdbQueries->update_user_details( $id, array('mo_2factor_user_registration_status' =>'MO_2_FACTOR_PLUGIN_SETTINGS') );
|
1330 |
-
$status = 'MO_2_FACTOR_PLUGIN_SETTINGS';
|
1331 |
-
}
|
1332 |
-
if($status == 'MO_2_FACTOR_PLUGIN_SETTINGS'){
|
1333 |
-
if(get_site_option('mo2f_remember_device')!=1)
|
1334 |
-
{
|
1335 |
-
$pass2fa= new Miniorange_Password_2Factor_Login();
|
1336 |
-
$pass2fa->mo2fa_pass2login(site_url(), $session_id);
|
1337 |
-
?>
|
1338 |
-
<center>
|
1339 |
-
<p style="font-size:17px;"><?php echo __('You have successfully set up ', 'miniorange-2-factor-authentication'); ?><b style="color:#28B463;"><?php echo $mo2f_second_factor; ?> </b><?php echo __('as your Two Factor method.', 'miniorange-2-factor-authentication'); ?><br><br>
|
1340 |
-
<?php echo __('From now, when you login, you will be prompted for', 'miniorange-2-factor-authentication'); ?> <span style="color:#28B463;"><?php echo __($mo2f_second_factor, 'miniorange-2-factor-authentication'); ?></span> <?php echo __('as your 2nd factor method of authentication.', 'miniorange-2-factor-authentication'); ?>
|
1341 |
-
</p>
|
1342 |
-
</center>
|
1343 |
-
<br>
|
1344 |
-
<center>
|
1345 |
-
<p style="font-size:16px;"><a href="#" onclick="mologinback();"style="color:#CB4335;"><b><?php echo __('Click Here', 'miniorange-2-factor-authentication'); ?></b></a> <?php echo __('to sign-in to your account.', 'miniorange-2-factor-authentication'); ?>
|
1346 |
-
<br>
|
1347 |
-
</center>
|
1348 |
-
<?php
|
1349 |
-
}else{
|
1350 |
-
$redirect_to = isset($_POST[ 'redirect_to' ]) ? sanitize_url($_POST[ 'redirect_to' ]) : null;
|
1351 |
-
$mo_enable_rem = new Miniorange_Password_2Factor_Login();
|
1352 |
-
mo2f_collect_device_attributes_handler($session_id,$redirect_to);
|
1353 |
-
}
|
1354 |
-
}
|
1355 |
-
mo2f_customize_logo() ?>
|
1356 |
-
</div>
|
1357 |
-
</div>
|
1358 |
-
</div>
|
1359 |
-
</div>
|
1360 |
-
<form name="f" id="mo2f_backto_mo_loginform" method="post" action="<?php echo esc_url(wp_login_url()); ?>" style="display:none;">
|
1361 |
-
<input type="hidden" name="miniorange_mobile_validation_failed_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-mobile-validation-failed-nonce')); ?>" />
|
1362 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1363 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1364 |
-
</form>
|
1365 |
-
|
1366 |
-
<script>
|
1367 |
-
function mologinback(){
|
1368 |
-
jQuery('#mo2f_backto_mo_loginform').submit();
|
1369 |
-
}
|
1370 |
-
</script>
|
1371 |
-
</body>
|
1372 |
-
</html>
|
1373 |
-
<?php
|
1374 |
-
}
|
1375 |
-
|
1376 |
-
function prompt_user_for_phone_setup($current_user_id, $login_status, $login_message,$currentMethod,$redirect_to,$session_id){
|
1377 |
-
$current_user = get_userdata($current_user_id);
|
1378 |
-
$opt=fetch_methods($current_user);
|
1379 |
-
global $Mo2fdbQueries;
|
1380 |
-
$current_selected_method = $Mo2fdbQueries->get_user_detail( 'mo2f_configured_2FA_method',$current_user_id);
|
1381 |
-
$current_user = get_userdata($current_user_id);
|
1382 |
-
$email = $current_user->user_email;
|
1383 |
-
?>
|
1384 |
-
<html>
|
1385 |
-
<head> <meta charset="utf-8"/>
|
1386 |
-
<meta http-equiv="X-UA-Compatible" content="IE=edge">
|
1387 |
-
<meta name="viewport" content="width=device-width, initial-scale=1">
|
1388 |
-
<?php
|
1389 |
-
mo2f_inline_css_and_js();
|
1390 |
-
|
1391 |
-
wp_register_script('mo2f_bootstrap_js', plugins_url('includes/js/bootstrap.min.js',dirname(dirname(__FILE__))));
|
1392 |
-
wp_register_script('mo2f_phone_js', plugins_url('includes/js/phone.js',dirname(dirname( __FILE__))));
|
1393 |
-
wp_print_scripts( 'mo2f_bootstrap_js' );
|
1394 |
-
wp_print_scripts( 'mo2f_phone_js');
|
1395 |
-
|
1396 |
-
wp_register_style('mo2f_phone',plugins_url('includes/css/phone.css', dirname(dirname(__FILE__))));
|
1397 |
-
wp_print_styles( 'mo2f_phone' );
|
1398 |
-
?>
|
1399 |
-
</head>
|
1400 |
-
<body>
|
1401 |
-
<div class="mo2f_modal" tabindex="-1" role="dialog" id="myModal5">
|
1402 |
-
<div class="mo2f-modal-backdrop"></div>
|
1403 |
-
<div class="mo_customer_validation-modal-dialog mo_customer_validation-modal-md" >
|
1404 |
-
<div class="login mo_customer_validation-modal-content">
|
1405 |
-
<div class="mo2f_modal-header">
|
1406 |
-
<h4 class="mo2f_modal-title"><button type="button" class="mo2f_close" data-dismiss="modal" aria-label="Close" title="<?php echo __('Back to login','miniorange-2-factor-authentication');?>" onclick="mologinback();"><span aria-hidden="true">×</span></button>
|
1407 |
-
<?php
|
1408 |
-
if($current_selected_method == 'SMS AND EMAIL'){?>
|
1409 |
-
<?php echo __('Verify Your Phone and Email', 'miniorange-2-factor-authentication'); ?></h4>
|
1410 |
-
<?php }
|
1411 |
-
else if($current_selected_method == 'OTP Over Telegram')
|
1412 |
-
{
|
1413 |
-
echo __('Verify Your Telegram Details', 'miniorange-2-factor-authentication');
|
1414 |
-
}
|
1415 |
-
else if($current_selected_method == 'OTP OVER EMAIL'){
|
1416 |
-
?>
|
1417 |
-
<?php echo __('Verify Your EMAIL', 'miniorange-2-factor-authentication'); ?></h4>
|
1418 |
-
<?php }
|
1419 |
-
else{
|
1420 |
-
?>
|
1421 |
-
<?php echo __('Verify Your Phone', 'miniorange-2-factor-authentication'); ?></h3>
|
1422 |
-
<?php } ?>
|
1423 |
-
</div>
|
1424 |
-
<div class="mo2f_modal-body">
|
1425 |
-
<?php if(isset($login_message) && !empty($login_message)) { ?>
|
1426 |
-
<div id="otpMessage"
|
1427 |
-
<?php if(get_user_meta($current_user_id, 'mo2f_is_error', true)) { ?>style="background-color:#FADBD8; color:#E74C3C;?>"<?php update_user_meta($current_user_id, 'mo2f_is_error', false);} ?>
|
1428 |
-
>
|
1429 |
-
<p class="mo2fa_display_message_frontend" style="text-align: left !important; "> <?php echo wp_kses($login_message, array('b'=>array())); ?></p>
|
1430 |
-
</div>
|
1431 |
-
<?php if(isset($login_message)) {?> <br/> <?php } ?>
|
1432 |
-
<?php } ?>
|
1433 |
-
<div class="mo2f_row">
|
1434 |
-
<form name="f" method="post" action="" id="mo2f_inline_verifyphone_form">
|
1435 |
-
<p>
|
1436 |
-
<?php
|
1437 |
-
if($current_selected_method == 'SMS AND EMAIL'){?>
|
1438 |
-
<?php echo __('Enter your phone number. An One Time Passcode(OTP) wll be sent to this number and your email address.', 'miniorange-2-factor-authentication'); ?></p>
|
1439 |
-
<?php
|
1440 |
-
}else if($current_selected_method == 'OTP OVER EMAIL'){
|
1441 |
-
//no message
|
1442 |
-
}else if($current_selected_method == 'OTP Over Telegram')
|
1443 |
-
{
|
1444 |
-
echo __('1. Open the telegram app and search for miniorange2fa_bot. Click on start button or send <b>/start</b> message', 'miniorange-2-factor-authentication');
|
1445 |
-
echo "<br><br><br>";
|
1446 |
-
echo __('2. Enter the recieved Chat ID here below::', 'miniorange-2-factor-authentication');
|
1447 |
-
$chat_id = get_user_meta($current_user_id,'mo2f_chat_id',true);
|
1448 |
-
|
1449 |
-
if($chat_id == '')
|
1450 |
-
$chat_id = get_user_meta($current_user_id,'mo2f_temp_chatID',true);
|
1451 |
-
|
1452 |
-
?>
|
1453 |
-
<input type="text" name="verify_chatID" id="chatID"
|
1454 |
-
value="<?php echo esc_html($chat_id); ?>" pattern="[\+]?[0-9]{1,4}\s?[0-9]{7,12}" required="true" title="<?php echo __('Enter chat ID without any space or dashes', 'miniorange-2-factor-authentication'); ?>" /><br />
|
1455 |
-
|
1456 |
-
<?php
|
1457 |
-
echo "<br>";
|
1458 |
-
|
1459 |
-
}
|
1460 |
-
else{
|
1461 |
-
?>
|
1462 |
-
<?php echo __('Enter your phone number', 'miniorange-2-factor-authentication'); ?></h4>
|
1463 |
-
<?php }
|
1464 |
-
if(!($current_selected_method == 'OTP OVER EMAIL') and $current_selected_method !='OTP Over Telegram'and $current_selected_method !='OTP Over Whatsapp'){
|
1465 |
-
?>
|
1466 |
-
<input class="mo2f_table_textbox" type="text" name="verify_phone" id="phone"
|
1467 |
-
value="<?php echo get_user_meta($current_user_id,'mo2f_user_phone',true); ?>" pattern="[\+]?[0-9]{1,4}\s?[0-9]{7,12}" required="true" title="<?php echo __('Enter phone number without any space or dashes', 'miniorange-2-factor-authentication'); ?>" /><br />
|
1468 |
-
<?php } ?>
|
1469 |
-
<?php
|
1470 |
-
$email = $Mo2fdbQueries->get_user_detail( 'mo2f_user_email',$current_user_id);
|
1471 |
-
if($current_selected_method == 'SMS AND EMAIL' ||$current_selected_method == 'OTP OVER EMAIL' ){?>
|
1472 |
-
<input class="mo2f_IR_phone" type="text" name="verify_email" id="email"
|
1473 |
-
value="<?php echo esc_html($email) ; ?>" title="<?php echo __('Enter your email', 'miniorange-2-factor-authentication'); ?>" style="width: 250px;" disabled /><br />
|
1474 |
-
<?php } ?>
|
1475 |
-
<input type="submit" name="verify" class="miniorange_button" value="<?php echo __('Send OTP', 'miniorange-2-factor-authentication'); ?>" />
|
1476 |
-
<input type="hidden" name="option" value="miniorange_inline_complete_otp_over_sms"/>
|
1477 |
-
<input type="hidden" name="miniorange_inline_verify_phone_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-verify-phone-nonce')); ?>" />
|
1478 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1479 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1480 |
-
</form>
|
1481 |
-
</div>
|
1482 |
-
<form name="f" method="post" action="" id="mo2f_inline_validateotp_form" >
|
1483 |
-
<p>
|
1484 |
-
<?php
|
1485 |
-
if($current_selected_method == 'SMS AND EMAIL'){?>
|
1486 |
-
<h4><?php echo __('Enter One Time Passcode', 'miniorange-2-factor-authentication'); ?></h4>
|
1487 |
-
<?php }
|
1488 |
-
else{
|
1489 |
-
?>
|
1490 |
-
<?php echo mo2f_lt('Please enter the One Time Passcode sent to your phone.');?></p>
|
1491 |
-
<?php } ?>
|
1492 |
-
<input class="mo2f_IR_phone_OTP" required="true" pattern="[0-9]{4,8}" autofocus="true" type="text" name="otp_token" placeholder="<?php echo __('Enter the code', 'miniorange-2-factor-authentication'); ?>" id="otp_token"/><br>
|
1493 |
-
<?php if ($current_selected_method == 'PHONE VERIFICATION'){ ?>
|
1494 |
-
<span style="color:#1F618D;"><?php echo mo2f_lt('Didn\'t get code?');?></span>
|
1495 |
-
<a href="#resendsmslink" style="color:#F4D03F ;font-weight:bold;"><?php echo __('CALL AGAIN', 'miniorange-2-factor-authentication'); ?></a>
|
1496 |
-
<?php } else if($current_selected_method != 'OTP Over Telegram'){
|
1497 |
-
?>
|
1498 |
-
<span style="color:#1F618D;"><?php echo mo2f_lt('Didn\'t get code?');?></span>
|
1499 |
-
<a href="#resendsmslink" style="color:#F4D03F ;font-weight:bold;"><?php echo __('RESEND IT', 'miniorange-2-factor-authentication'); ?></a>
|
1500 |
-
<?php } ?>
|
1501 |
-
<br /><br />
|
1502 |
-
<input type="submit" name="validate" class="miniorange_button" value="<?php echo __('Verify Code', 'miniorange-2-factor-authentication'); ?>" />
|
1503 |
-
<?php if (sizeof($opt) > 1) { ?>
|
1504 |
-
|
1505 |
-
<input type="hidden" name="option" value="miniorange_back_inline"/>
|
1506 |
-
<input type="button" name="back" id="mo2f_inline_back_btn" class="miniorange_button" value="<?php echo __('Back', 'miniorange-2-factor-authentication'); ?>" />
|
1507 |
-
<?php } ?>
|
1508 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1509 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1510 |
-
<input type="hidden" name="option" value="miniorange_inline_complete_otp"/>
|
1511 |
-
<input type="hidden" name="miniorange_inline_validate_otp_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-validate-otp-nonce')); ?>" />
|
1512 |
-
</form>
|
1513 |
-
<?php mo2f_customize_logo() ?>
|
1514 |
-
</div>
|
1515 |
-
</div>
|
1516 |
-
</div>
|
1517 |
-
</div>
|
1518 |
-
<form name="f" id="mo2f_backto_mo_loginform" method="post" action="<?php echo wp_login_url(); ?>" style="display:none;">
|
1519 |
-
<input type="hidden" name="miniorange_mobile_validation_failed_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-mobile-validation-failed-nonce')); ?>" />
|
1520 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1521 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1522 |
-
</form>
|
1523 |
-
<form name="f" method="post" action="" id="mo2fa_inline_resend_otp_form" style="display:none;">
|
1524 |
-
<input type="hidden" name="miniorange_inline_resend_otp_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-resend-otp-nonce')); ?>" />
|
1525 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1526 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1527 |
-
</form>
|
1528 |
-
<?php if (sizeof($opt) > 1) { ?>
|
1529 |
-
<form name="f" method="post" action="" id="mo2f_goto_two_factor_form" >
|
1530 |
-
<input type="hidden" name="option" value="miniorange_back_inline"/>
|
1531 |
-
<input type="hidden" name="miniorange_inline_two_factor_setup" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-setup-nonce')); ?>" />
|
1532 |
-
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1533 |
-
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1534 |
-
</form>
|
1535 |
-
<?php } ?>
|
1536 |
-
<script>
|
1537 |
-
jQuery("#phone").intlTelInput();
|
1538 |
-
function mologinback(){
|
1539 |
-
jQuery('#mo2f_backto_mo_loginform').submit();
|
1540 |
-
}
|
1541 |
-
jQuery('#mo2f_inline_back_btn').click(function() {
|
1542 |
-
jQuery('#mo2f_goto_two_factor_form').submit();
|
1543 |
-
});
|
1544 |
-
jQuery('a[href="#resendsmslink"]').click(function(e) {
|
1545 |
-
jQuery('#mo2fa_inline_resend_otp_form').submit();
|
1546 |
-
});
|
1547 |
-
</script>
|
1548 |
-
</body>
|
1549 |
-
|
1550 |
-
</html>
|
1551 |
-
<?php
|
1552 |
}
|
1 |
+
<?php
|
2 |
+
function fetch_methods($current_user = null){
|
3 |
+
$methods = array("SMS","SOFT TOKEN","MOBILE AUTHENTICATION","PUSH NOTIFICATIONS","GOOGLE AUTHENTICATOR","KBA","OTP_OVER_EMAIL","OTP OVER TELEGRAM");
|
4 |
+
if(!is_null($current_user) && ($current_user->roles[0] != 'administrator') && !mo2f_is_customer_registered()){
|
5 |
+
$methods = array("GOOGLE AUTHENTICATOR","KBA","OTP_OVER_EMAIL","OTP OVER TELEGRAM");
|
6 |
+
}
|
7 |
+
if(get_site_option('duo_credentials_save_successfully'))
|
8 |
+
array_push($methods,"DUO");
|
9 |
+
return $methods;
|
10 |
+
}
|
11 |
+
|
12 |
+
function prompt_user_to_select_2factor_mthod_inline($current_user_id, $login_status, $login_message,$redirect_to,$session_id,$qrCode){
|
13 |
+
|
14 |
+
global $Mo2fdbQueries;
|
15 |
+
$current_user = get_userdata($current_user_id);
|
16 |
+
$current_selected_method = $Mo2fdbQueries->get_user_detail( 'mo2f_configured_2FA_method',$current_user_id);
|
17 |
+
|
18 |
+
if($current_selected_method == 'MOBILE AUTHENTICATION' || $current_selected_method == 'SOFT TOKEN' || $current_selected_method == 'PUSH NOTIFICATIONS'){
|
19 |
+
if(get_option( 'mo_2factor_admin_registration_status' ) == 'MO_2_FACTOR_CUSTOMER_REGISTERED_SUCCESS')
|
20 |
+
prompt_user_for_miniorange_app_setup($current_user_id, $login_status, $login_message,$qrCode,$current_selected_method,$redirect_to,$session_id);
|
21 |
+
else
|
22 |
+
prompt_user_for_miniorange_register($current_user_id, $login_status, $login_message,$redirect_to,$session_id);
|
23 |
+
}else if($current_selected_method == 'SMS' || $current_selected_method == 'PHONE VERIFICATION' || $current_selected_method == 'SMS AND EMAIL'){
|
24 |
+
if(get_option( 'mo_2factor_admin_registration_status' ) == 'MO_2_FACTOR_CUSTOMER_REGISTERED_SUCCESS')
|
25 |
+
prompt_user_for_phone_setup($current_user_id, $login_status, $login_message,$current_selected_method,$redirect_to,$session_id);
|
26 |
+
else
|
27 |
+
prompt_user_for_miniorange_register($current_user_id, $login_status, $login_message,$redirect_to,$session_id);
|
28 |
+
}else if($current_selected_method == 'OTP Over Telegram' or $current_selected_method == 'OTP OVER TELEGRAM')
|
29 |
+
{
|
30 |
+
$current_selected_method = 'OTP Over Telegram';
|
31 |
+
prompt_user_for_phone_setup($current_user_id, $login_status, $login_message,$current_selected_method,$redirect_to,$session_id);
|
32 |
+
}
|
33 |
+
else if($current_selected_method == 'Duo Authenticator'){
|
34 |
+
prompt_user_for_duo_authenticator_setup($current_user_id, $login_status, $login_message,$redirect_to,$session_id);
|
35 |
+
}
|
36 |
+
else if($current_selected_method == 'GOOGLE AUTHENTICATOR' ){
|
37 |
+
prompt_user_for_google_authenticator_setup($current_user_id, $login_status, $login_message,$redirect_to,$session_id);
|
38 |
+
}else if($current_selected_method == 'AUTHY 2-FACTOR AUTHENTICATION'){
|
39 |
+
prompt_user_for_authy_authenticator_setup($current_user_id, $login_status, $login_message,$redirect_to,$session_id);
|
40 |
+
}else if($current_selected_method == 'KBA' ){
|
41 |
+
prompt_user_for_kba_setup($current_user_id, $login_status, $login_message,$redirect_to,$session_id);
|
42 |
+
}else if($current_selected_method == 'OUT OF BAND EMAIL' ){
|
43 |
+
$status = $Mo2fdbQueries->get_user_detail( 'mo_2factor_user_registration_status',$current_user_id);
|
44 |
+
if(( $status == 'MO_2_FACTOR_PLUGIN_SETTINGS' && get_site_option('mo2f_remember_device')!=1)||(get_site_option( 'mo2f_disable_kba' ) &&$login_status == 'MO_2_FACTOR_SETUP_SUCCESS')){
|
45 |
+
if(!MO2F_IS_ONPREM)
|
46 |
+
{
|
47 |
+
$current_user = get_userdata($current_user_id);
|
48 |
+
$email = $current_user->user_email;
|
49 |
+
$tempEmail = get_user_meta($current_user->ID,'mo2f_email_miniOrange',true);
|
50 |
+
if(isset($tempEmail) and $tempEmail != '')
|
51 |
+
$email = $tempEmail;
|
52 |
+
create_user_in_miniOrange($current_user_id,$email,$current_selected_method);
|
53 |
+
}
|
54 |
+
$Mo2fdbQueries->update_user_details( $current_user_id, array('mo_2factor_user_registration_status' =>'MO_2_FACTOR_PLUGIN_SETTINGS') );
|
55 |
+
$pass2fa= new Miniorange_Password_2Factor_Login();
|
56 |
+
$pass2fa->mo2fa_pass2login($redirect_to, $session_id);
|
57 |
+
}
|
58 |
+
prompt_user_for_setup_success($current_user_id, $login_status, $login_message,$redirect_to,$session_id);
|
59 |
+
}else{
|
60 |
+
$current_user = get_userdata($current_user_id);
|
61 |
+
if(isset($current_user->roles[0]))
|
62 |
+
$current_user_role=$current_user->roles[0];
|
63 |
+
$opt=fetch_methods($current_user);
|
64 |
+
?>
|
65 |
+
<html>
|
66 |
+
<head>
|
67 |
+
<meta charset="utf-8"/>
|
68 |
+
<meta http-equiv="X-UA-Compatible" content="IE=edge">
|
69 |
+
<meta name="viewport" content="width=device-width, initial-scale=1">
|
70 |
+
<?php
|
71 |
+
mo2f_inline_css_and_js();
|
72 |
+
?>
|
73 |
+
</head>
|
74 |
+
<body>
|
75 |
+
<div class="mo2f_modal1" tabindex="-1" role="dialog" id="myModal51">
|
76 |
+
<div class="mo2f-modal-backdrop"></div>
|
77 |
+
<div class="mo_customer_validation-modal-dialog mo_customer_validation-modal-md">
|
78 |
+
<div class="login mo_customer_validation-modal-content">
|
79 |
+
<div class="mo2f_modal-header">
|
80 |
+
<h3 class="mo2f_modal-title"><button type="button" class="mo2f_close" data-dismiss="modal" aria-label="Close" title="<?php echo __('Back to login','miniorange-2-factor-authentication');?>" onclick="mologinback();"><span aria-hidden="true">×</span></button>
|
81 |
+
|
82 |
+
<?php echo __('New security system has been enabled', 'miniorange-2-factor-authentication'); ?></h3>
|
83 |
+
</div>
|
84 |
+
<div class="mo2f_modal-body">
|
85 |
+
<?php echo __('<b> Configure a Two-Factor method to protect your account</b>', 'miniorange-2-factor-authentication');
|
86 |
+
if(isset($login_message) && !empty($login_message)) {
|
87 |
+
echo '<br><br>';
|
88 |
+
|
89 |
+
?>
|
90 |
+
|
91 |
+
<div id="otpMessage">
|
92 |
+
<p class="mo2fa_display_message_frontend" style="text-align: left !important;"><?php echo __($login_message, 'miniorange-2-factor-authentication'); ?></p>
|
93 |
+
</div>
|
94 |
+
<?php }else
|
95 |
+
echo '<br>';
|
96 |
+
?>
|
97 |
+
|
98 |
+
<br>
|
99 |
+
<span class="<?php if( !(in_array("GOOGLE AUTHENTICATOR", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; }?>">
|
100 |
+
<label title="<?php echo __('You have to enter 6 digits code generated by Authenticator App to login. Supported in Smartphones only.', 'miniorange-2-factor-authentication'); ?>">
|
101 |
+
<input type="radio" name="mo2f_selected_2factor_method" value="GOOGLE AUTHENTICATOR" />
|
102 |
+
<?php echo __('Google / Authy / Microsoft Authenticator<br>
|
103 |
+
(Any TOTP Based Authenticatior App)', 'miniorange-2-factor-authentication'); ?>
|
104 |
+
</label>
|
105 |
+
<br>
|
106 |
+
</span>
|
107 |
+
<span class="<?php if( !(in_array("OUT OF BAND EMAIL", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; } ?>" >
|
108 |
+
<label title="<?php echo __('You will receive an email with link. You have to click the ACCEPT or DENY link to verify your email. Supported in Desktops, Laptops, Smartphones.', 'miniorange-2-factor-authentication'); ?>">
|
109 |
+
<input type="radio" name="mo2f_selected_2factor_method" value="OUT OF BAND EMAIL" />
|
110 |
+
<?php echo __('Email Verification', 'miniorange-2-factor-authentication'); ?>
|
111 |
+
</label>
|
112 |
+
<br>
|
113 |
+
</span>
|
114 |
+
<span class="<?php if( !(in_array("SMS", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; } ?>" >
|
115 |
+
<label title="<?php echo __('You will receive a one time passcode via SMS on your phone. You have to enter the otp on your screen to login. Supported in Smartphones, Feature Phones.', 'miniorange-2-factor-authentication'); ?>">
|
116 |
+
<input type="radio" name="mo2f_selected_2factor_method" value="SMS" />
|
117 |
+
<?php echo __('OTP Over SMS', 'miniorange-2-factor-authentication'); ?>
|
118 |
+
</label>
|
119 |
+
<br>
|
120 |
+
</span>
|
121 |
+
<span class="<?php if( !(in_array("PHONE VERIFICATION", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; } ?>">
|
122 |
+
<label title="<?php echo __('You will receive a phone call telling a one time passcode. You have to enter the one time passcode to login. Supported in Landlines, Smartphones, Feature phones.', 'miniorange-2-factor-authentication'); ?>">
|
123 |
+
<input type="radio" name="mo2f_selected_2factor_method" value="PHONE VERIFICATION" />
|
124 |
+
<?php echo __('Phone Call Verification', 'miniorange-2-factor-authentication'); ?>
|
125 |
+
</label>
|
126 |
+
<br>
|
127 |
+
</span>
|
128 |
+
<span class="<?php if( !(in_array("SOFT TOKEN", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; } ?>" >
|
129 |
+
<label title="<?php echo __('You have to enter 6 digits code generated by miniOrange Authenticator App like Google Authenticator code to login. Supported in Smartphones only.', 'miniorange-2-factor-authentication'); ?>" >
|
130 |
+
<input type="radio" name="mo2f_selected_2factor_method" value="SOFT TOKEN" />
|
131 |
+
<?php echo __('Soft Token', 'miniorange-2-factor-authentication'); ?>
|
132 |
+
</label>
|
133 |
+
<br>
|
134 |
+
</span>
|
135 |
+
<span class="<?php if( !(in_array("OTP OVER TELEGRAM", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; } ?>" >
|
136 |
+
<label title="<?php echo __('You will get an OTP on your TELEGRAM app from miniOrange Bot.', 'miniorange-2-factor-authentication'); ?>" >
|
137 |
+
<input type="radio" name="mo2f_selected_2factor_method" value="OTP OVER TELEGRAM" />
|
138 |
+
<?php echo __('OTP Over TELEGRAM', 'miniorange-2-factor-authentication'); ?>
|
139 |
+
</label>
|
140 |
+
<br>
|
141 |
+
</span>
|
142 |
+
<span class="<?php if( !(in_array("OTP OVER WHATSAPP", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; } ?>" >
|
143 |
+
<label title="<?php echo __('You will get an OTP on your WHATSAPP app from miniOrange Bot.', 'miniorange-2-factor-authentication'); ?>" >
|
144 |
+
<input type="radio" name="mo2f_selected_2factor_method" value="OTP OVER WHATSAPP" />
|
145 |
+
<?php echo __('OTP Over WHATSAPP', 'miniorange-2-factor-authentication'); ?>
|
146 |
+
</label>
|
147 |
+
<br>
|
148 |
+
</span>
|
149 |
+
<span class="<?php if( !(in_array("MOBILE AUTHENTICATION", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; }?>">
|
150 |
+
<label title="<?php echo __('You have to scan the QR Code from your phone using miniOrange Authenticator App to login. Supported in Smartphones only.', 'miniorange-2-factor-authentication'); ?>">
|
151 |
+
<input type="radio" name="mo2f_selected_2factor_method" value="MOBILE AUTHENTICATION" />
|
152 |
+
<?php echo __('QR Code Authentication', 'miniorange-2-factor-authentication'); ?>
|
153 |
+
</label>
|
154 |
+
<br>
|
155 |
+
</span>
|
156 |
+
<span class="<?php if( !(in_array("PUSH NOTIFICATIONS", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; } ?>" >
|
157 |
+
<label title="<?php echo __('You will receive a push notification on your phone. You have to ACCEPT or DENY it to login. Supported in Smartphones only.', 'miniorange-2-factor-authentication'); ?>">
|
158 |
+
<input type="radio" name="mo2f_selected_2factor_method" value="PUSH NOTIFICATIONS" />
|
159 |
+
<?php echo __('Push Notification', 'miniorange-2-factor-authentication'); ?>
|
160 |
+
</label>
|
161 |
+
<br>
|
162 |
+
</span>
|
163 |
+
<span class="<?php if( !(in_array("AUTHY 2-FACTOR AUTHENTICATION", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; }?>">
|
164 |
+
<label title="<?php echo __('You have to enter 6 digits code generated by Authy 2-Factor Authentication App to login. Supported in Smartphones only.', 'miniorange-2-factor-authentication'); ?>">
|
165 |
+
<input type="radio" name="mo2f_selected_2factor_method" value="AUTHY 2-FACTOR AUTHENTICATION" />
|
166 |
+
<?php echo __('Authy 2-Factor Authentication', 'miniorange-2-factor-authentication'); ?>
|
167 |
+
</label>
|
168 |
+
<br>
|
169 |
+
</span>
|
170 |
+
<span class="<?php if( !(in_array("KBA", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; }?>">
|
171 |
+
<label title="<?php echo __('You have to answers some knowledge based security questions which are only known to you to authenticate yourself. Supported in Desktops,Laptops,Smartphones.', 'miniorange-2-factor-authentication'); ?>" >
|
172 |
+
<input type="radio" name="mo2f_selected_2factor_method" value="KBA" />
|
173 |
+
<?php echo __('Security Questions ( KBA )', 'miniorange-2-factor-authentication'); ?>
|
174 |
+
</label>
|
175 |
+
<br>
|
176 |
+
</span>
|
177 |
+
<span class="<?php if( !(in_array("SMS AND EMAIL", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; }?>">
|
178 |
+
<label title="<?php echo __('You will receive a one time passcode via SMS on your phone and your email. You have to enter the otp on your screen to login. Supported in Smartphones, Feature Phones.', 'miniorange-2-factor-authentication'); ?>" >
|
179 |
+
<input type="radio" name="mo2f_selected_2factor_method" value="SMS AND EMAIL" />
|
180 |
+
<?php echo __('OTP Over SMS and Email', 'miniorange-2-factor-authentication'); ?>
|
181 |
+
</label>
|
182 |
+
<br>
|
183 |
+
</span>
|
184 |
+
<span class="<?php if( !(in_array("OTP_OVER_EMAIL", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; }?>">
|
185 |
+
<label title="<?php echo __('You will receive a one time passcode on your email. You have to enter the otp on your screen to login. Supported in Smartphones, Feature Phones.', 'miniorange-2-factor-authentication'); ?>" >
|
186 |
+
<input type="radio" name="mo2f_selected_2factor_method" value="OTP OVER EMAIL" />
|
187 |
+
<?php echo __('OTP Over Email', 'miniorange-2-factor-authentication'); ?>
|
188 |
+
</label>
|
189 |
+
<br>
|
190 |
+
</span>
|
191 |
+
<span class="<?php if( !(in_array("DUO", $opt)) ){ echo "mo2f_td_hide"; }else { echo "mo2f_td_show"; } ?>" >
|
192 |
+
<label title="<?php echo __('You will receive a push notification on your phone. You have to ACCEPT or DENY it to login. Supported in Smartphones only.', 'miniorange-2-factor-authentication'); ?>">
|
193 |
+
<input type="radio" name="mo2f_selected_2factor_method" value=" DUO PUSH NOTIFICATIONS" />
|
194 |
+
<?php echo __('Duo Push Notification', 'miniorange-2-factor-authentication'); ?>
|
195 |
+
</label>
|
196 |
+
<br>
|
197 |
+
</span>
|
198 |
+
<br><a href="#skiptwofactor" style="color:#F4D03F ;font-weight:bold;margin-left:35%;"><?php echo __('Skip Two Factor', 'miniorange-2-factor-authentication'); ?></a>>>
|
199 |
+
<br />
|
200 |
+
<?php mo2f_customize_logo() ?>
|
201 |
+
</div>
|
202 |
+
</div>
|
203 |
+
</div>
|
204 |
+
</div>
|
205 |
+
<form name="f" id="mo2f_backto_mo_loginform" method="post" action="<?php echo esc_url(wp_login_url()); ?>" style="display:none;">
|
206 |
+
<input type="hidden" name="miniorange_mobile_validation_failed_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-mobile-validation-failed-nonce')); ?>" />
|
207 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
208 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
209 |
+
</form>
|
210 |
+
<form name="f" method="post" action="" id="mo2f_select_2fa_methods_form" style="display:none;">
|
211 |
+
<input type="hidden" name="mo2f_selected_2factor_method" />
|
212 |
+
<input type="hidden" name="miniorange_inline_save_2factor_method_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-save-2factor-method-nonce')); ?>" />
|
213 |
+
<input type="hidden" name="option" value="miniorange_inline_save_2factor_method" />
|
214 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
215 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
216 |
+
</form>
|
217 |
+
|
218 |
+
<form name="f" id="mo2f_skip_loginform" method="post" action="" style="display:none;">
|
219 |
+
<input type="hidden" name="option" value="mo2f_skip_2fa_setup" />
|
220 |
+
<input type="hidden" name="miniorange_skip_2fa_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-skip-nonce')); ?>" />
|
221 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
222 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
223 |
+
</form>
|
224 |
+
|
225 |
+
<script>
|
226 |
+
function mologinback(){
|
227 |
+
jQuery('#mo2f_backto_mo_loginform').submit();
|
228 |
+
}
|
229 |
+
jQuery('input:radio[name=mo2f_selected_2factor_method]').click(function() {
|
230 |
+
var selectedMethod = jQuery(this).val();
|
231 |
+
document.getElementById("mo2f_select_2fa_methods_form").elements[0].value = selectedMethod;
|
232 |
+
jQuery('#mo2f_select_2fa_methods_form').submit();
|
233 |
+
});
|
234 |
+
jQuery('a[href="#skiptwofactor"]').click(function(e) {
|
235 |
+
|
236 |
+
jQuery('#mo2f_skip_loginform').submit();
|
237 |
+
});
|
238 |
+
</script>
|
239 |
+
</body>
|
240 |
+
</html>
|
241 |
+
<?php
|
242 |
+
}
|
243 |
+
}
|
244 |
+
|
245 |
+
function create_user_in_miniOrange($current_user_id,$email,$currentMethod)
|
246 |
+
{
|
247 |
+
|
248 |
+
global $Mo2fdbQueries;
|
249 |
+
$mo2f_user_email = $Mo2fdbQueries->get_user_detail( 'mo2f_user_email', $current_user_id );
|
250 |
+
if(isset($mo2f_user_email) and $mo2f_user_email != '')
|
251 |
+
$email = $mo2f_user_email;
|
252 |
+
|
253 |
+
$current_user = get_userdata($current_user_id);
|
254 |
+
if($current_user_id == get_option('mo2f_miniorange_admin'))
|
255 |
+
$email = get_option('mo2f_email');
|
256 |
+
|
257 |
+
$enduser = new Two_Factor_Setup();
|
258 |
+
$check_user = json_decode( $enduser->mo_check_user_already_exist( $email ), true );
|
259 |
+
|
260 |
+
if(json_last_error() == JSON_ERROR_NONE){
|
261 |
+
|
262 |
+
if($check_user['status'] == 'ERROR'){
|
263 |
+
return Mo2fConstants:: langTranslate( $check_user['message']);
|
264 |
+
|
265 |
+
}
|
266 |
+
else if(strcasecmp($check_user['status' ], 'USER_FOUND') == 0){
|
267 |
+
|
268 |
+
$Mo2fdbQueries->update_user_details( $current_user_id, array(
|
269 |
+
'user_registration_with_miniorange' =>'SUCCESS',
|
270 |
+
'mo2f_user_email' =>$email,
|
271 |
+
'mo_2factor_user_registration_status' =>'MO_2_FACTOR_INITIALIZE_TWO_FACTOR'
|
272 |
+
) );
|
273 |
+
update_site_option(base64_encode("totalUsersCloud"),get_site_option(base64_encode("totalUsersCloud"))+1);
|
274 |
+
|
275 |
+
$mo2fa_login_status = 'MO_2_FACTOR_PROMPT_USER_FOR_2FA_METHODS';
|
276 |
+
}
|
277 |
+
else if(strcasecmp($check_user['status'], 'USER_NOT_FOUND') == 0){
|
278 |
+
|
279 |
+
$content = json_decode($enduser->mo_create_user($current_user,$email), true);
|
280 |
+
if(json_last_error() == JSON_ERROR_NONE) {
|
281 |
+
if(strcasecmp($content['status'], 'SUCCESS') == 0) {
|
282 |
+
update_site_option(base64_encode("totalUsersCloud"),get_site_option(base64_encode("totalUsersCloud"))+1);
|
283 |
+
$Mo2fdbQueries->update_user_details( $current_user_id, array(
|
284 |
+
'user_registration_with_miniorange' =>'SUCCESS',
|
285 |
+
'mo2f_user_email' =>$email,
|
286 |
+
'mo_2factor_user_registration_status' =>'MO_2_FACTOR_INITIALIZE_TWO_FACTOR'
|
287 |
+
) );
|
288 |
+
|
289 |
+
$mo2fa_login_message = '';
|
290 |
+
$mo2fa_login_status = 'MO_2_FACTOR_PROMPT_USER_FOR_2FA_METHODS';
|
291 |
+
}
|
292 |
+
}
|
293 |
+
|
294 |
+
|
295 |
+
}
|
296 |
+
else if(strcasecmp($check_user['status'], 'USER_FOUND_UNDER_DIFFERENT_CUSTOMER') == 0){
|
297 |
+
$mo2fa_login_message = __('The email associated with your account is already registered. Please contact your admin to change the email.','miniorange-2-factor-authentication');
|
298 |
+
$mo2fa_login_status = 'MO_2_FACTOR_PROMPT_FOR_RELOGIN';
|
299 |
+
mo2f_inline_email_form($email,$current_user_id);
|
300 |
+
exit;
|
301 |
+
}
|
302 |
+
|
303 |
+
}
|
304 |
+
|
305 |
+
}
|
306 |
+
|
307 |
+
function mo2f_inline_email_form($email,$current_user_id)
|
308 |
+
{
|
309 |
+
?>
|
310 |
+
<html>
|
311 |
+
<head>
|
312 |
+
<meta charset="utf-8"/>
|
313 |
+
<meta http-equiv="X-UA-Compatible" content="IE=edge">
|
314 |
+
<meta name="viewport" content="width=device-width, initial-scale=1">
|
315 |
+
<?php
|
316 |
+
mo2f_inline_css_and_js();
|
317 |
+
?>
|
318 |
+
</head>
|
319 |
+
<body>
|
320 |
+
<div class="mo2f_modal" tabindex="-1" role="dialog" id="myModal5">
|
321 |
+
<div class="mo2f-modal-backdrop"></div>
|
322 |
+
<div class="mo_customer_validation-modal-dialog mo_customer_validation-modal-md">
|
323 |
+
<div class="login mo_customer_validation-modal-content">
|
324 |
+
<div class="mo2f_modal-header">
|
325 |
+
<h3 class="mo2f_modal-title"><button type="button" class="mo2f_close" data-dismiss="modal" aria-label="Close" title="<?php echo __('Back to login','miniorange-2-factor-authentication');?>" onclick="mologinback();"><span aria-hidden="true">×</span></button>
|
326 |
+
<?php echo __('Email already registered.', 'miniorange-2-factor-authentication'); ?></h3>
|
327 |
+
</div>
|
328 |
+
<div class="mo2f_modal-body">
|
329 |
+
<form action="" method="post" name="f">
|
330 |
+
<p>The Email assoicated with your account is already registered in miniOrange. Please use a different email address or contact miniOrange.
|
331 |
+
</p><br>
|
332 |
+
<i><b>Enter your Email: </b> <input type ='email' id='emailInlineCloud' name='emailInlineCloud' size= '40' required value="<?php echo $email;?>"/></i>
|
333 |
+
<br>
|
334 |
+
<p id="emailalredyused" style="color: red;" hidden>This email is already associated with miniOrange.</p>
|
335 |
+
<br>
|
336 |
+
<input type="hidden" name="miniorange_emailChange_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-email-change-nonce')); ?>" />
|
337 |
+
<input type="text" name="current_user_id" hidden id="current_user_id" value="<?php echo $current_user_id;?>" />
|
338 |
+
<button type="submit" class="button button-primary button-large" style ="margin-left: 165px;" id="save_entered_email_inlinecloud">Save</button>
|
339 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
340 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
341 |
+
</form>
|
342 |
+
<br>
|
343 |
+
<?php mo2f_customize_logo() ?>
|
344 |
+
</div>
|
345 |
+
</div>
|
346 |
+
</div>
|
347 |
+
</div>
|
348 |
+
<form name="f" id="mo2f_backto_mo_loginform" method="post" action="<?php echo wp_login_url(); ?>" style="display:none;">
|
349 |
+
<input type="hidden" name="miniorange_mobile_validation_failed_nonce" value="<?php echo esc_html(('miniorange-2-factor-mobile-validation-failed-nonce')); ?>" />
|
350 |
+
</form>
|
351 |
+
<form name="f" method="post" action="" id="mo2f_select_2fa_methods_form" style="display:none;">
|
352 |
+
<input type="hidden" name="mo2f_selected_2factor_method" />
|
353 |
+
<input type="hidden" name="miniorange_inline_save_2factor_method_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-save-2factor-method-nonce')); ?>" />
|
354 |
+
<input type="hidden" name="option" value="miniorange_inline_save_2factor_method" />
|
355 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
356 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
357 |
+
</form>
|
358 |
+
<?php if(get_site_option('mo2f_skip_inline_option')&& !get_site_option('mo2f_enable_emailchange')){ ?>
|
359 |
+
<form name="f" id="mo2f_skip_loginform" method="post" action="" style="display:none;">
|
360 |
+
<input type="hidden" name="miniorange_skip_2fa" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-skip-nonce')); ?>" />
|
361 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
362 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
363 |
+
</form>
|
364 |
+
<?php } ?>
|
365 |
+
|
366 |
+
<script type="text/javascript">
|
367 |
+
jQuery('#save_entered_email_inlinecloud1').click(function(){
|
368 |
+
var email = jQuery('#emailInlineCloud').val();
|
369 |
+
var nonce = '<?php echo esc_html(wp_create_nonce("checkuserinminiOrangeNonce"));?>';
|
370 |
+
var data = {
|
371 |
+
'action' : 'mo_two_factor_ajax',
|
372 |
+
'mo_2f_two_factor_ajax' : 'mo2f_check_user_exist_miniOrange',
|
373 |
+
'email' : email,
|
374 |
+
'nonce' : nonce
|
375 |
+
|
376 |
+
};
|
377 |
+
|
378 |
+
var ajaxurl = '<?php echo esc_url(admin_url('')); ?>';
|
379 |
+
|
380 |
+
|
381 |
+
jQuery.post(ajaxurl, data, function(response) {
|
382 |
+
|
383 |
+
if(response == 'alreadyExist')
|
384 |
+
{
|
385 |
+
jQuery('#emailalredyused').show();
|
386 |
+
}
|
387 |
+
else if(response =='USERCANBECREATED')
|
388 |
+
{
|
389 |
+
document.getElementById("mo2f_select_2fa_methods_form").elements[0].value = selectedMethod;
|
390 |
+
jQuery('#mo2f_select_2fa_methods_form').submit();
|
391 |
+
}
|
392 |
+
});
|
393 |
+
|
394 |
+
});
|
395 |
+
|
396 |
+
|
397 |
+
</script>
|
398 |
+
</body>
|
399 |
+
|
400 |
+
<?php
|
401 |
+
}
|
402 |
+
function prompt_user_for_miniorange_app_setup($current_user_id, $login_status, $login_message,$qrCode,$currentMethod,$redirect_to,$session_id){
|
403 |
+
|
404 |
+
global $Mo2fdbQueries;
|
405 |
+
if(isset($qrCode)){
|
406 |
+
$qrCodedata = $qrCode['mo2f-login-qrCode'];
|
407 |
+
$showqrCode = $qrCode['mo2f_show_qr_code'];
|
408 |
+
}
|
409 |
+
$current_user = get_userdata($current_user_id);
|
410 |
+
$email = $current_user->user_email;
|
411 |
+
|
412 |
+
$opt=fetch_methods($current_user);
|
413 |
+
|
414 |
+
$mobile_registration_status = $Mo2fdbQueries->get_user_detail( 'mobile_registration_status',$current_user_id);
|
415 |
+
?>
|
416 |
+
<html>
|
417 |
+
<head> <meta charset="utf-8"/>
|
418 |
+
<meta http-equiv="X-UA-Compatible" content="IE=edge">
|
419 |
+
<meta name="viewport" content="width=device-width, initial-scale=1">
|
420 |
+
<?php
|
421 |
+
mo2f_inline_css_and_js();
|
422 |
+
?>
|
423 |
+
</head>
|
424 |
+
<body>
|
425 |
+
<div class="mo2f_modal" tabindex="-1" role="dialog" id="myModal5">
|
426 |
+
<div class="mo2f-modal-backdrop"></div>
|
427 |
+
<div class="mo2f_modal-dialog mo2f_modal-lg" >
|
428 |
+
<div class="login mo_customer_validation-modal-content">
|
429 |
+
<div class="mo2f_modal-header">
|
430 |
+
<h4 class="mo2f_modal-title"><button type="button" class="mo2f_close" data-dismiss="modal" aria-label="Close" title="<?php echo __('Back to login', 'miniorange-2-factor-authentication'); ?>" onclick="mologinback();"><span aria-hidden="true">×</span></button>
|
431 |
+
<?php echo __('Setup miniOrange', 'miniorange-2-factor-authentication'); ?> <b><?php echo __('Authenticator', 'miniorange-2-factor-authentication'); ?></b> <?php echo __('App', 'miniorange-2-factor-authentication'); ?></h4>
|
432 |
+
</div>
|
433 |
+
<div class="mo2f_modal-body">
|
434 |
+
<?php if(isset($login_message) && !empty($login_message)) { ?>
|
435 |
+
|
436 |
+
<div id="otpMessage">
|
437 |
+
<p class="mo2fa_display_message_frontend" style="text-align: left !important;"><?php echo __($login_message, 'miniorange-2-factor-authentication'); ?></p>
|
438 |
+
</div>
|
439 |
+
<?php } ?>
|
440 |
+
<div style="margin-right:7px;"><?php download_instruction_for_mobile_app($current_user_id,$mobile_registration_status); ?></div>
|
441 |
+
<div class="mo_margin_left">
|
442 |
+
<h3><?php echo __('Step-2 : Scan QR code', 'miniorange-2-factor-authentication'); ?></h3><hr class="mo_hr">
|
443 |
+
<div id="mo2f_configurePhone"><h4><?php echo __('Please click on \'Configure your phone\' button below to see QR Code.', 'miniorange-2-factor-authentication'); ?></h4>
|
444 |
+
<center>
|
445 |
+
<?php if (sizeof($opt) > 1) { ?>
|
446 |
+
<input type="button" name="back" id="mo2f_inline_back_btn" class="miniorange_button" value="<?php echo __('Back', 'miniorange-2-factor-authentication'); ?>" />
|
447 |
+
<?php } ?>
|
448 |
+
<input type="button" name="submit" onclick="moconfigureapp();" class="miniorange_button" value="<?php echo __('Configure your phone', 'miniorange-2-factor-authentication'); ?>" />
|
449 |
+
</center>
|
450 |
+
</div>
|
451 |
+
<?php
|
452 |
+
if(isset($showqrCode) && $showqrCode == 'MO_2_FACTOR_SHOW_QR_CODE' && isset($_POST['miniorange_inline_show_qrcode_nonce']) && wp_verify_nonce( $_POST['miniorange_inline_show_qrcode_nonce'], 'miniorange-2-factor-inline-show-qrcode-nonce' )){
|
453 |
+
initialize_inline_mobile_registration($current_user,$session_id,$qrCodedata); ?>
|
454 |
+
<?php } ?>
|
455 |
+
|
456 |
+
<?php mo2f_customize_logo() ?>
|
457 |
+
</div>
|
458 |
+
<br>
|
459 |
+
<br>
|
460 |
+
</div>
|
461 |
+
</div>
|
462 |
+
</div>
|
463 |
+
</div>
|
464 |
+
<form name="f" id="mo2f_backto_mo_loginform" method="post" action="<?php echo wp_login_url(); ?>" style="display:none;">
|
465 |
+
<input type="hidden" name="miniorange_mobile_validation_failed_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-mobile-validation-failed-nonce')); ?>" />
|
466 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
467 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
468 |
+
</form>
|
469 |
+
<form name="f" method="post" action="" id="mo2f_inline_configureapp_form" style="display:none;">
|
470 |
+
<input type="hidden" name="option" value="miniorange_inline_show_mobile_config"/>
|
471 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
472 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
473 |
+
<input type="hidden" name="miniorange_inline_show_qrcode_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-show-qrcode-nonce')); ?>" />
|
474 |
+
</form>
|
475 |
+
<form name="f" method="post" id="mo2f_inline_mobile_register_form" action="" style="display:none;">
|
476 |
+
<input type="hidden" name="option" value="miniorange_inline_complete_mobile"/>
|
477 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
478 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
479 |
+
<input type="hidden" name="mo_auth_inline_mobile_registration_complete_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-mobile-registration-complete-nonce')); ?>" />
|
480 |
+
</form>
|
481 |
+
<?php if (sizeof($opt) > 1) { ?>
|
482 |
+
<form name="f" method="post" action="" id="mo2f_goto_two_factor_form">
|
483 |
+
<input type="hidden" name="option" value="miniorange_back_inline"/>
|
484 |
+
<input type="hidden" name="miniorange_inline_two_factor_setup" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-setup-nonce')); ?>" />
|
485 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
486 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
487 |
+
</form>
|
488 |
+
<?php } ?>
|
489 |
+
<script>
|
490 |
+
function mologinback(){
|
491 |
+
jQuery('#mo2f_backto_mo_loginform').submit();
|
492 |
+
}
|
493 |
+
function moconfigureapp(){
|
494 |
+
jQuery('#mo2f_inline_configureapp_form').submit();
|
495 |
+
}
|
496 |
+
jQuery('#mo2f_inline_back_btn').click(function() {
|
497 |
+
jQuery('#mo2f_goto_two_factor_form').submit();
|
498 |
+
});
|
499 |
+
<?php
|
500 |
+
if(isset($showqrCode) && $showqrCode == 'MO_2_FACTOR_SHOW_QR_CODE' && isset($_POST['miniorange_inline_show_qrcode_nonce']) && wp_verify_nonce( sanitize_text_field($_POST['miniorange_inline_show_qrcode_nonce']), 'miniorange-2-factor-inline-show-qrcode-nonce' )){
|
501 |
+
?>
|
502 |
+
<?php } ?>
|
503 |
+
</script>
|
504 |
+
</body>
|
505 |
+
</html>
|
506 |
+
<?php
|
507 |
+
}
|
508 |
+
function prompt_user_for_duo_authenticator_setup($current_user_id, $login_status, $login_message,$redirect_to,$session_id){
|
509 |
+
global $Mo2fdbQueries;
|
510 |
+
$current_user = get_userdata($current_user_id);
|
511 |
+
$email = $current_user->user_email;
|
512 |
+
$opt=fetch_methods($current_user);
|
513 |
+
$mobile_registration_status = $Mo2fdbQueries->get_user_detail( 'mobile_registration_status',$current_user_id);
|
514 |
+
|
515 |
+
?>
|
516 |
+
<html>
|
517 |
+
<head> <meta charset="utf-8"/>
|
518 |
+
<meta http-equiv="X-UA-Compatible" content="IE=edge">
|
519 |
+
<meta name="viewport" content="width=device-width, initial-scale=1">
|
520 |
+
<?php
|
521 |
+
mo2f_inline_css_and_js();
|
522 |
+
?>
|
523 |
+
</head>
|
524 |
+
<body>
|
525 |
+
<div class="mo2f_modal" tabindex="-1" role="dialog" id="myModal5">
|
526 |
+
<div class="mo2f-modal-backdrop"></div>
|
527 |
+
<div class="mo2f_modal-dialog mo2f_modal-lg" >
|
528 |
+
<div class="login mo_customer_validation-modal-content">
|
529 |
+
<div class="mo2f_modal-header">
|
530 |
+
<h4 class="mo2f_modal-title"><button type="button" class="mo2f_close" data-dismiss="modal" aria-label="Close" title="<?php echo __('Back to login', 'miniorange-2-factor-authentication'); ?>" onclick="mologinback();"><span aria-hidden="true">×</span></button>
|
531 |
+
<?php echo __('Setup Duo', 'miniorange-2-factor-authentication'); ?> <b><?php echo __('Authenticator', 'miniorange-2-factor-authentication'); ?></b> <?php echo __('App', 'miniorange-2-factor-authentication'); ?></h4>
|
532 |
+
</div>
|
533 |
+
<div class="mo2f_modal-body">
|
534 |
+
<?php if(isset($login_message) && !empty($login_message)) { ?>
|
535 |
+
|
536 |
+
<div id="otpMessage">
|
537 |
+
<p class="mo2fa_display_message_frontend" style="text-align: left !important;"><?php echo __(esc_html($login_message), 'miniorange-2-factor-authentication'); ?></p>
|
538 |
+
</div>
|
539 |
+
<?php } ?>
|
540 |
+
<div style="margin-right:7px;"><?php mo2f_inline_download_instruction_for_duo_mobile_app($mobile_registration_status);
|
541 |
+
|
542 |
+
?></div>
|
543 |
+
<div class="mo_margin_left">
|
544 |
+
<h3><?php echo __('Step-2 : Setup Duo Push Notification', 'miniorange-2-factor-authentication'); ?></h3><hr class="mo_hr">
|
545 |
+
<div id="mo2f_configurePhone"><h4><?php echo __('Please click on \'Configure your phone\' button below to setup duo push notification.', 'miniorange-2-factor-authentication'); ?></h4>
|
546 |
+
<center>
|
547 |
+
<?php if (sizeof($opt) > 1) { ?>
|
548 |
+
<input type="button" name="back" id="mo2f_inline_back_btn" class="miniorange_button" value="<?php echo __('Back', 'miniorange-2-factor-authentication'); ?>" />
|
549 |
+
<?php } ?>
|
550 |
+
<input type="button" name="submit" onclick="moconfigureapp();" class="miniorange_button" value="<?php echo __('Configure your phone', 'miniorange-2-factor-authentication'); ?>" />
|
551 |
+
</center>
|
552 |
+
</div>
|
553 |
+
<?php
|
554 |
+
|
555 |
+
if(isset($_POST['option']) && sanitize_text_field($_POST['option']) =='miniorange_inline_duo_auth_mobile_complete'){
|
556 |
+
go_for_user_enroll_on_duo($current_user,$session_id);
|
557 |
+
?>
|
558 |
+
<?php }else if(isset($_POST['option']) && sanitize_text_field($_POST['option']) == 'duo_mobile_send_push_notification_for_inline_form') {
|
559 |
+
|
560 |
+
initialize_inline_duo_auth_registration($current_user,$session_id);
|
561 |
+
?>
|
562 |
+
|
563 |
+
<?php }?>
|
564 |
+
|
565 |
+
<?php mo2f_customize_logo() ?>
|
566 |
+
</div>
|
567 |
+
<br>
|
568 |
+
<br>
|
569 |
+
</div>
|
570 |
+
</div>
|
571 |
+
</div>
|
572 |
+
</div>
|
573 |
+
<form name="f" id="mo2f_backto_mo_loginform" method="post" action="<?php echo esc_url(wp_login_url()); ?>" style="display:none;">
|
574 |
+
<input type="hidden" name="miniorange_mobile_validation_failed_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-mobile-validation-failed-nonce')); ?>" />
|
575 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
576 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
577 |
+
</form>
|
578 |
+
<form name="f" method="post" action="" id="mo2f_inline_configureapp_form" style="display:none;">
|
579 |
+
<input type="hidden" name="option" value="miniorange_inline_show_mobile_config"/>
|
580 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
581 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
582 |
+
<input type="hidden" name="miniorange_inline_show_qrcode_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-show-qrcode-nonce')); ?>" />
|
583 |
+
</form>
|
584 |
+
<form name="f" method="post" id="mo2f_inline_duo_auth_register_form" action="" style="display:none;">
|
585 |
+
<input type="hidden" name="option" value="miniorange_inline_duo_auth_mobile_complete"/>
|
586 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
587 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
588 |
+
<input type="hidden" name="mo_auth_inline_duo_auth_mobile_registration_complete_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-duo_auth-registration-complete-nonce')); ?>" />
|
589 |
+
</form>
|
590 |
+
<?php if (sizeof($opt) > 1) { ?>
|
591 |
+
<form name="f" method="post" action="" id="mo2f_goto_two_factor_form">
|
592 |
+
<input type="hidden" name="option" value="miniorange_back_inline"/>
|
593 |
+
<input type="hidden" name="miniorange_inline_two_factor_setup" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-setup-nonce')); ?>" />
|
594 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
595 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
596 |
+
</form>
|
597 |
+
<?php } ?>
|
598 |
+
<script>
|
599 |
+
function mologinback(){
|
600 |
+
jQuery('#mo2f_backto_mo_loginform').submit();
|
601 |
+
}
|
602 |
+
function moconfigureapp(){
|
603 |
+
jQuery('#mo2f_inline_duo_auth_register_form').submit();
|
604 |
+
}
|
605 |
+
jQuery('#mo2f_inline_back_btn').click(function() {
|
606 |
+
jQuery('#mo2f_goto_two_factor_form').submit();
|
607 |
+
});
|
608 |
+
<?php
|
609 |
+
if(isset($showqrCode) && $showqrCode == 'MO_2_FACTOR_SHOW_QR_CODE' && isset($_POST['miniorange_inline_show_qrcode_nonce']) && wp_verify_nonce( sanitize_text_field($_POST['miniorange_inline_show_qrcode_nonce']), 'miniorange-2-factor-inline-show-qrcode-nonce' )){
|
610 |
+
?>
|
611 |
+
<?php } ?>
|
612 |
+
</script>
|
613 |
+
</body>
|
614 |
+
</html>
|
615 |
+
<?php
|
616 |
+
}
|
617 |
+
|
618 |
+
function prompt_user_for_google_authenticator_setup($current_user_id, $login_status, $login_message,$redirect_to,$session_id){
|
619 |
+
$ga_secret = MO2f_Utility::mo2f_get_transient($session_id, 'secret_ga');
|
620 |
+
$data = MO2f_Utility::mo2f_get_transient($session_id, 'ga_qrCode');
|
621 |
+
global $Mo2fdbQueries;
|
622 |
+
if(empty($data)){
|
623 |
+
$user = get_user_by('ID',$current_user_id);
|
624 |
+
if(!MO2F_IS_ONPREM){
|
625 |
+
if(!get_user_meta($user->ID, 'mo2f_google_auth', true)){
|
626 |
+
Miniorange_Authentication::mo2f_get_GA_parameters($user);
|
627 |
+
}
|
628 |
+
$mo2f_google_auth = get_user_meta($user->ID, 'mo2f_google_auth', true);
|
629 |
+
$data = isset($mo2f_google_auth['ga_qrCode']) ? $mo2f_google_auth['ga_qrCode'] : null;
|
630 |
+
$ga_secret = isset($mo2f_google_auth['ga_secret']) ? $mo2f_google_auth['ga_secret'] : null;
|
631 |
+
MO2f_Utility::mo2f_set_transient($session_id, 'secret_ga', $mo2f_google_auth['ga_secret']);
|
632 |
+
MO2f_Utility::mo2f_set_transient($session_id, 'ga_qrCode', $mo2f_google_auth['ga_qrCode']);
|
633 |
+
}else{
|
634 |
+
include_once dirname(dirname(dirname( __FILE__ ))) .DIRECTORY_SEPARATOR . 'handler'.DIRECTORY_SEPARATOR . 'twofa'. DIRECTORY_SEPARATOR . 'gaonprem.php';
|
635 |
+
$gauth_obj = new Google_auth_onpremise();
|
636 |
+
$email = $Mo2fdbQueries->get_user_detail('mo2f_user_email',$user->ID);
|
637 |
+
$onpremise_secret = $gauth_obj->createSecret();
|
638 |
+
$issuer = get_site_option( 'mo2f_GA_account_name', 'miniOrangeAu' );
|
639 |
+
$url = $gauth_obj->geturl( $onpremise_secret, $issuer, $email );
|
640 |
+
$data = $url;
|
641 |
+
MO2f_Utility::mo2f_set_transient($session_id, 'secret_ga', $onpremise_secret);
|
642 |
+
MO2f_Utility::mo2f_set_transient($session_id, 'ga_qrCode', $url);
|
643 |
+
|
644 |
+
}
|
645 |
+
}
|
646 |
+
wp_register_script('mo2f_qr_code_js',plugins_url( "/includes/jquery-qrcode/jquery-qrcode.js", dirname(dirname(__FILE__ ))) );
|
647 |
+
wp_register_script('mo2f_qr_code_minjs',plugins_url( "/includes/jquery-qrcode/jquery-qrcode.min.js", dirname(dirname(__FILE__ ))) );
|
648 |
+
?>
|
649 |
+
<html>
|
650 |
+
<head> <meta charset="utf-8"/>
|
651 |
+
<meta http-equiv="X-UA-Compatible" content="IE=edge">
|
652 |
+
<meta name="viewport" content="width=device-width, initial-scale=1">
|
653 |
+
<?php
|
654 |
+
mo2f_inline_css_and_js();
|
655 |
+
?>
|
656 |
+
</head>
|
657 |
+
<style>
|
658 |
+
* {
|
659 |
+
box-sizing: border-box;
|
660 |
+
}
|
661 |
+
[class*="mcol-"] {
|
662 |
+
float: left;
|
663 |
+
padding: 15px;
|
664 |
+
}
|
665 |
+
/* For desktop: */
|
666 |
+
.mcol-1 {width: 50%;}
|
667 |
+
.mcol-2 {width: 50%;}
|
668 |
+
@media only screen and (max-width: 768px) {
|
669 |
+
/* For mobile phones: */
|
670 |
+
[class*="mcol-"] {
|
671 |
+
width: 100%;
|
672 |
+
}
|
673 |
+
}
|
674 |
+
</style>
|
675 |
+
<body>
|
676 |
+
<div class="mo2f_modal" tabindex="-1" role="dialog" id="myModal5">
|
677 |
+
<div class="mo2f-modal-backdrop"></div>
|
678 |
+
<div class="mo2f_modal-dialog mo2f_modal-lg" >
|
679 |
+
<div class="login mo_customer_validation-modal-content">
|
680 |
+
<div class="mo2f_modal-header">
|
681 |
+
<h4 class="mo2f_modal-title" style="color:black;"><button type="button" class="mo2f_close" data-dismiss="modal" aria-label="Close" title="<?php echo __('Back to login','miniorange-2-factor-authentication');?>" onclick="mologinback();"><span aria-hidden="true">×</span></button>
|
682 |
+
<?php echo __('Setup Authenticator', 'miniorange-2-factor-authentication'); ?></h4>
|
683 |
+
</div>
|
684 |
+
<div class="mo2f_modal-body">
|
685 |
+
<?php
|
686 |
+
|
687 |
+
$current_user = get_userdata($current_user_id);
|
688 |
+
$opt=fetch_methods($current_user);
|
689 |
+
?>
|
690 |
+
<?php if(isset($login_message) && !empty($login_message)) { ?>
|
691 |
+
<div id="otpMessage"
|
692 |
+
<?php if(get_user_meta($current_user_id, 'mo2f_is_error', true)) { ?>style="background-color:#FADBD8; color:#E74C3C;?>"<?php update_user_meta($current_user_id, 'mo2f_is_error', false);} ?>
|
693 |
+
>
|
694 |
+
<p class="mo2fa_display_message_frontend" style="text-align: left !important;"><?php echo __(esc_html($login_message), 'miniorange-2-factor-authentication'); ?></p>
|
695 |
+
</div>
|
696 |
+
<?php if(isset($login_message)) {?> <br/> <?php } ?>
|
697 |
+
<?php } ?>
|
698 |
+
<div class="mcol-1">
|
699 |
+
<div id="mo2f_choose_app_tour">
|
700 |
+
<label for="authenticator_type"><b>Choose an Authenticator app:</b></label>
|
701 |
+
|
702 |
+
<select id="authenticator_type">
|
703 |
+
<option value="google_authenticator">Google Authenticator</option>
|
704 |
+
<option value="msft_authenticator">Microsoft Authenticator</option>
|
705 |
+
<option value="authy_authenticator">Authy Authenticator</option>
|
706 |
+
<option value="last_pass_auth">LastPass Authenticator</option>
|
707 |
+
<option value="free_otp_auth">FreeOTP Authenticator</option>
|
708 |
+
<option value="duo_auth">Duo Mobile Authenticator</option>
|
709 |
+
</select>
|
710 |
+
<div id="links_to_apps_tour" style="background-color:white;padding:5px;">
|
711 |
+
<span id="links_to_apps">
|
712 |
+
<p style="background-color:#e8e4e4;padding:5px;">Get the App - <a href="https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2" target="_blank"><b><?php echo mo2f_lt( "Android Play Store" ); ?></b></a>,
|
713 |
+
<a href="http://itunes.apple.com/us/app/google-authenticator/id388497605" target="_blank"><b><?php echo mo2f_lt( "iOS App Store" ); ?>.</b> </p></a>
|
714 |
+
|
715 |
+
</span>
|
716 |
+
</div>
|
717 |
+
</div>
|
718 |
+
<div style="font-size: 18px !important;"><?php echo __('Scan the QR code from the Authenticator App.', 'miniorange-2-factor-authentication'); ?></div>
|
719 |
+
<ol>
|
720 |
+
<li><?php echo __('In the app, tap on Menu and select "Set up account"', 'miniorange-2-factor-authentication'); ?></li>
|
721 |
+
<li><?php echo __('Select "Scan a barcode". Use your phone\'s camera to scan this barcode.', 'miniorange-2-factor-authentication'); ?></li>
|
722 |
+
<br>
|
723 |
+
<?php if(MO2F_IS_ONPREM){ ?>
|
724 |
+
<div class="mo2f_gauth" data-qrcode="<?php echo $data;?>" style="float:left;margin-left:10%;"></div>
|
725 |
+
<?php
|
726 |
+
|
727 |
+
} else{ ?>
|
728 |
+
<div style="margin-left: 14%;">
|
729 |
+
<div class="mo2f_gauth_column_cloud mo2f_gauth_left" >
|
730 |
+
<div id="displayQrCode"><?php echo '<img id="displayGAQrCodeTour" style="line-height: 0;background:white;" src="data:image/jpg;base64,' . $data . '" />'; ?></div>
|
731 |
+
</div>
|
732 |
+
</div>
|
733 |
+
<?php }
|
734 |
+
?>
|
735 |
+
<div style="margin-top: 55%"><a href="#mo2f_scanbarcode_a" aria-expanded="false" style="color:#21618C;"><b><?php echo __('Can\'t scan the barcode?', 'miniorange-2-factor-authentication'); ?></b></a></div>
|
736 |
+
|
737 |
+
</ol>
|
738 |
+
<div id="mo2f_scanbarcode_a" hidden>
|
739 |
+
<ol >
|
740 |
+
<li><?php echo __('Tap Menu and select "Set up account."', 'miniorange-2-factor-authentication'); ?></li>
|
741 |
+
<li><?php echo __('Select "Enter provided key"', 'miniorange-2-factor-authentication'); ?></li>
|
742 |
+
<li><?php echo __('In "Enter account name" type your full email address.', 'miniorange-2-factor-authentication'); ?></li>
|
743 |
+
<li class="mo2f_list"><?php echo __('In "Enter your key" type your secret key:', 'miniorange-2-factor-authentication'); ?></li>
|
744 |
+
<div style="padding: 10px; background-color: #f9edbe;width: 20em;text-align: center;" >
|
745 |
+
<div style="font-size: 14px; font-weight: bold;line-height: 1.5;" >
|
746 |
+
<?php echo esc_html($ga_secret) ?>
|
747 |
+
</div>
|
748 |
+
<div style="font-size: 80%;color: #666666;">
|
749 |
+
<?php echo __('Spaces don\'t matter.', 'miniorange-2-factor-authentication'); ?>
|
750 |
+
</div>
|
751 |
+
</div>
|
752 |
+
<li class="mo2f_list"><?php echo __('Key type: make sure "Time-based" is selected.', 'miniorange-2-factor-authentication'); ?></li>
|
753 |
+
<li class="mo2f_list"><?php echo __('Tap Add.', 'miniorange-2-factor-authentication'); ?></li>
|
754 |
+
</ol>
|
755 |
+
</div>
|
756 |
+
</div>
|
757 |
+
<div class="mcol-2">
|
758 |
+
<div style="font-size: 18px !important;"><b><?php echo __('Verify and Save', 'miniorange-2-factor-authentication'); ?> </b> </div><br />
|
759 |
+
<div style="font-size: 15px !important;"><?php echo __('Once you have scanned the barcode, enter the 6-digit verification code generated by the Authenticator app', 'miniorange-2-factor-authentication'); ?></div><br />
|
760 |
+
<form name="" method="post" id="mo2f_inline_verify_ga_code_form">
|
761 |
+
<span><b><?php echo __('Code:', 'miniorange-2-factor-authentication'); ?> </b>
|
762 |
+
<br />
|
763 |
+
<input type="hidden" name="option" value="miniorange_inline_ga_validate">
|
764 |
+
<input class="mo2f_IR_GA_token" style="margin-left:36.5%;" autofocus="true" required="true" pattern="[0-9]{4,8}" type="text" id="google_auth_code" name="google_auth_code" placeholder="<?php echo __('Enter OTP', 'miniorange-2-factor-authentication'); ?>" /></span><br/>
|
765 |
+
<div class="center">
|
766 |
+
<input type="submit" name="validate" id="validate" class="miniorange_button" value="<?php echo __('Verify and Save', 'miniorange-2-factor-authentication'); ?>" />
|
767 |
+
</div>
|
768 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
769 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
770 |
+
<input type="hidden" name="mo2f_inline_validate_ga_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-google-auth-nonce')); ?>" />
|
771 |
+
</form>
|
772 |
+
<form name="f" method="post" action="" id="mo2f_goto_two_factor_form" class="center">
|
773 |
+
<input type="submit" name="back" id="mo2f_inline_back_btn" class="miniorange_button" value="<?php echo mo2f_lt('Back');?>" />
|
774 |
+
<input type="hidden" name="option" value="miniorange_back_inline"/>
|
775 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
776 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
777 |
+
<input type="hidden" name="miniorange_inline_two_factor_setup" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-setup-nonce')); ?>" />
|
778 |
+
</form>
|
779 |
+
</div>
|
780 |
+
<br>
|
781 |
+
<br>
|
782 |
+
<?php mo2f_customize_logo() ?>
|
783 |
+
</div>
|
784 |
+
</div>
|
785 |
+
</div>
|
786 |
+
</div>
|
787 |
+
<form name="f" id="mo2f_backto_mo_loginform" method="post" action="<?php echo wp_login_url(); ?>" style="display:none;">
|
788 |
+
<input type="hidden" name="miniorange_mobile_validation_failed_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-mobile-validation-failed-nonce')); ?>" />
|
789 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
790 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
791 |
+
</form>
|
792 |
+
<form name="f" method="post" id="mo2f_inline_app_type_ga_form" action="" style="display:none;">
|
793 |
+
<input type="hidden" name="google_phone_type" />
|
794 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
795 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
796 |
+
<input type="hidden" name="mo2f_inline_ga_phone_type_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-ga-phone-type-nonce')); ?>" />
|
797 |
+
</form>
|
798 |
+
|
799 |
+
<script>
|
800 |
+
jQuery('#authenticator_type').change(function(){
|
801 |
+
var auth_type = jQuery(this).val();
|
802 |
+
if(auth_type == 'google_authenticator'){
|
803 |
+
jQuery('#links_to_apps').html('<p style="background-color:#e8e4e4;padding:5px;">' +
|
804 |
+
'Get the App - <a href="https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2" target="_blank"><b><?php echo mo2f_lt( "Android Play Store" ); ?></b></a>, ' +
|
805 |
+
'<a href="http://itunes.apple.com/us/app/google-authenticator/id388497605" target="_blank"><b><?php echo mo2f_lt( "iOS App Store" ); ?>.</b> </p>');
|
806 |
+
jQuery('#mo2f_change_app_name').show();
|
807 |
+
jQuery('#links_to_apps').show();
|
808 |
+
}else if(auth_type == 'msft_authenticator'){
|
809 |
+
jQuery('#links_to_apps').html('<p style="background-color:#e8e4e4;padding:5px;">' +
|
810 |
+
'Get the App - <a href="https://play.google.com/store/apps/details?id=com.azure.authenticator" target="_blank"><b><?php echo mo2f_lt( "Android Play Store" ); ?></b></a>, ' +
|
811 |
+
'<a href="https://apps.apple.com/us/app/microsoft-authenticator/id983156458" target="_blank"><b><?php echo mo2f_lt( "iOS App Store" ); ?>.</b> </p>');
|
812 |
+
jQuery('#links_to_apps').show();
|
813 |
+
}else if(auth_type == 'free_otp_auth'){
|
814 |
+
jQuery('#links_to_apps').html('<p style="background-color:#e8e4e4;padding:5px;">' +
|
815 |
+
'Get the App - <a href="https://play.google.com/store/apps/details?id=org.fedorahosted.freeotp" target="_blank"><b><?php echo mo2f_lt( "Android Play Store" ); ?></b></a>, ' +
|
816 |
+
'<a href="https://apps.apple.com/us/app/freeotp-authenticator/id872559395" target="_blank"><b><?php echo mo2f_lt( "iOS App Store" ); ?>.</b> </p>');
|
817 |
+
jQuery('#links_to_apps').show();
|
818 |
+
}else if(auth_type == 'duo_auth'){
|
819 |
+
jQuery('#links_to_apps').html('<p style="background-color:#e8e4e4;padding:5px;">' +
|
820 |
+
'Get the App - <a href="https://play.google.com/store/apps/details?id=com.duosecurity.duomobile" target="_blank"><b><?php echo mo2f_lt( "Android Play Store" ); ?></b></a>, ' +
|
821 |
+
'<a href="https://apps.apple.com/in/app/duo-mobile/id422663827" target="_blank"><b><?php echo mo2f_lt( "iOS App Store" ); ?>.</b> </p>');
|
822 |
+
jQuery('#links_to_apps').show();
|
823 |
+
}else if(auth_type == 'authy_authenticator'){
|
824 |
+
jQuery('#links_to_apps').html('<p style="background-color:#e8e4e4;padding:5px;">' +
|
825 |
+
'Get the App - <a href="https://play.google.com/store/apps/details?id=com.authy.authy" target="_blank"><b><?php echo mo2f_lt( "Android Play Store" ); ?></b></a>, ' +
|
826 |
+
'<a href="https://itunes.apple.com/in/app/authy/id494168017" target="_blank"><b><?php echo mo2f_lt( "iOS App Store" ); ?>.</b> </p>');
|
827 |
+
jQuery('#links_to_apps').show();
|
828 |
+
}else{
|
829 |
+
jQuery('#links_to_apps').html('<p style="background-color:#e8e4e4;padding:5px;">' +
|
830 |
+
'Get the App - <a href="https://play.google.com/store/apps/details?id=com.lastpass.authenticator" target="_blank"><b><?php echo mo2f_lt( "Android Play Store" ); ?></b></a>, ' +
|
831 |
+
'<a href="https://itunes.apple.com/in/app/lastpass-authenticator/id1079110004" target="_blank"><b><?php echo mo2f_lt( "iOS App Store" ); ?>.</b> </p>');
|
832 |
+
jQuery('#mo2f_change_app_name').show();
|
833 |
+
jQuery('#links_to_apps').show();
|
834 |
+
}
|
835 |
+
});
|
836 |
+
function mologinback(){
|
837 |
+
jQuery('#mo2f_backto_mo_loginform').submit();
|
838 |
+
}
|
839 |
+
jQuery('input:radio[name=mo2f_inline_app_type_radio]').click(function() {
|
840 |
+
var selectedPhone = jQuery(this).val();
|
841 |
+
document.getElementById("mo2f_inline_app_type_ga_form").elements[0].value = selectedPhone;
|
842 |
+
jQuery('#mo2f_inline_app_type_ga_form').submit();
|
843 |
+
});
|
844 |
+
jQuery('a[href="#mo2f_scanbarcode_a"]').click(function(){
|
845 |
+
jQuery("#mo2f_scanbarcode_a").toggle();
|
846 |
+
});
|
847 |
+
jQuery(document).ready(function() {
|
848 |
+
jQuery('.mo2f_gauth').qrcode({
|
849 |
+
'render': 'image',
|
850 |
+
size: 175,
|
851 |
+
'text': jQuery('.mo2f_gauth').data('qrcode')
|
852 |
+
});
|
853 |
+
});
|
854 |
+
</script>
|
855 |
+
</body>
|
856 |
+
<?php
|
857 |
+
echo '<head>';
|
858 |
+
wp_print_scripts( 'mo2f_qr_code_js' );
|
859 |
+
wp_print_scripts( 'mo2f_qr_code_minjs' );
|
860 |
+
echo '</head>';
|
861 |
+
}
|
862 |
+
|
863 |
+
function mo2f_inline_css_and_js(){
|
864 |
+
|
865 |
+
wp_register_style( 'mo2f_bootstrap',plugins_url('includes/css/bootstrap.min.css', dirname(dirname(__FILE__))));
|
866 |
+
wp_register_style('mo2f_front_end_login',plugins_url('includes/css/front_end_login.css',dirname(dirname( __FILE__))));
|
867 |
+
wp_register_style('mo2f_style_setting',plugins_url('includes/css/style_settings.css', dirname(dirname(__FILE__))));
|
868 |
+
wp_register_style('mo2f_hide-login',plugins_url('includes/css/hide-login.css',dirname(dirname( __FILE__))));
|
869 |
+
|
870 |
+
wp_print_styles( 'mo2f_bootstrap');
|
871 |
+
wp_print_styles( 'mo2f_front_end_login');
|
872 |
+
wp_print_styles( 'mo2f_style_setting');
|
873 |
+
wp_print_styles( 'mo2f_hide-login');
|
874 |
+
|
875 |
+
wp_register_script('mo2f_bootstrap_js',plugins_url('includes/js/bootstrap.min.js',dirname(dirname( __FILE__))));
|
876 |
+
wp_print_scripts( 'jquery');
|
877 |
+
wp_print_scripts( 'mo2f_bootstrap_js' );
|
878 |
+
}
|
879 |
+
|
880 |
+
|
881 |
+
function initialize_inline_mobile_registration($current_user,$session_id,$qrCode){
|
882 |
+
$data = $qrCode;
|
883 |
+
|
884 |
+
$mo2f_login_transaction_id = MO2f_Utility::mo2f_get_transient($session_id, 'mo2f_transactionId' );
|
885 |
+
|
886 |
+
$url = MO_HOST_NAME;
|
887 |
+
$opt=fetch_methods($current_user);
|
888 |
+
?>
|
889 |
+
<p><?php echo __('Open your miniOrange', 'miniorange-2-factor-authentication'); ?><b> <?php echo __('Authenticator', 'miniorange-2-factor-authentication'); ?></b> <?php echo __('app and click on', 'miniorange-2-factor-authentication'); ?> <b><?php echo __('Configure button', 'miniorange-2-factor-authentication'); ?> </b> <?php echo __('to scan the QR Code. Your phone should have internet connectivity to scan QR code.', 'miniorange-2-factor-authentication'); ?> </p>
|
890 |
+
<div class="red" style="color:#E74C3C;">
|
891 |
+
<p><?php echo __('I am not able to scan the QR code,', 'miniorange-2-factor-authentication'); ?> <a data-toggle="mo2f_collapse" href="#mo2f_scanqrcode" aria-expanded="false" style="color:#3498DB;"><?php echo __('click here ', 'miniorange-2-factor-authentication'); ?></a></p></div>
|
892 |
+
<div class="mo2f_collapse" id="mo2f_scanqrcode" style="margin-left:5px;">
|
893 |
+
<?php echo __('Follow these instructions below and try again.', 'miniorange-2-factor-authentication'); ?>
|
894 |
+
<ol>
|
895 |
+
<li><?php echo __('Make sure your desktop screen has enough brightness.', 'miniorange-2-factor-authentication'); ?></li>
|
896 |
+
<li><?php echo __('Open your app and click on Configure button to scan QR Code again.', 'miniorange-2-factor-authentication'); ?></li>
|
897 |
+
<li><?php echo __('If you get cross mark on QR Code then click on \'Refresh QR Code\' link.', 'miniorange-2-factor-authentication'); ?></li>
|
898 |
+
</ol>
|
899 |
+
</div>
|
900 |
+
<table class="mo2f_settings_table">
|
901 |
+
<a href="#mo2f_refreshQRCode" style="color:#3498DB;"><?php echo __('Click here to Refresh QR Code.', 'miniorange-2-factor-authentication'); ?></a>
|
902 |
+
<div id="displayInlineQrCode" style="margin-left:36%;"><?php echo '<img style="width:200px;" src="data:image/jpg;base64,' . esc_html($data) . '" />'; ?>
|
903 |
+
</div>
|
904 |
+
</table>
|
905 |
+
<center>
|
906 |
+
<?php
|
907 |
+
if (sizeof($opt) > 1) { ?>
|
908 |
+
<input type="button" name="back" id="mo2f_inline_back_btn" class="miniorange_button" value="<?php echo __('Back', 'miniorange-2-factor-authentication'); ?>" />
|
909 |
+
<?php }
|
910 |
+
?>
|
911 |
+
</center>
|
912 |
+
<script>
|
913 |
+
jQuery('a[href="#mo2f_refreshQRCode"]').click(function(e) {
|
914 |
+
jQuery('#mo2f_inline_configureapp_form').submit();
|
915 |
+
});
|
916 |
+
jQuery("#mo2f_configurePhone").empty();
|
917 |
+
jQuery("#mo2f_app_div").hide();
|
918 |
+
var timeout;
|
919 |
+
pollInlineMobileRegistration();
|
920 |
+
function pollInlineMobileRegistration()
|
921 |
+
{
|
922 |
+
var transId = "<?php echo esc_html($mo2f_login_transaction_id); ?>";
|
923 |
+
var jsonString = "{\"txId\":\""+ transId + "\"}";
|
924 |
+
var postUrl = "<?php echo esc_html($url); ?>" + "/moas/api/auth/registration-status";
|
925 |
+
jQuery.ajax({
|
926 |
+
url: postUrl,
|
927 |
+
type : "POST",
|
928 |
+
dataType : "json",
|
929 |
+
data : jsonString,
|
930 |
+
contentType : "application/json; charset=utf-8",
|
931 |
+
success : function(result) {
|
932 |
+
var status = JSON.parse(JSON.stringify(result)).status;
|
933 |
+
if (status == 'SUCCESS') {
|
934 |
+
var content = "<br/><div id='success'><img style='width:165px;margin-top:-1%;margin-left:2%;' src='" + "<?php echo plugins_url( 'includes/images/right.png' , dirname(dirname(__FILE__ )));?>" + "' /></div>";
|
935 |
+
jQuery("#displayInlineQrCode").empty();
|
936 |
+
jQuery("#displayInlineQrCode").append(content);
|
937 |
+
setTimeout(function(){jQuery("#mo2f_inline_mobile_register_form").submit();}, 1000);
|
938 |
+
} else if (status == 'ERROR' || status == 'FAILED') {
|
939 |
+
var content = "<br/><div id='error'><img style='width:165px;margin-top:-1%;margin-left:2%;' src='" + "<?php echo plugins_url( 'includes/images/wrong.png' , __FILE__ );?>" + "' /></div>";
|
940 |
+
jQuery("#displayInlineQrCode").empty();
|
941 |
+
jQuery("#displayInlineQrCode").append(content);
|
942 |
+
jQuery("#messages").empty();
|
943 |
+
jQuery("#messages").append("<div class='error mo2f_error_container'> <p class='mo2f_msgs'>An Error occured processing your request. Please try again to configure your phone.</p></div>");
|
944 |
+
} else {
|
945 |
+
timeout = setTimeout(pollInlineMobileRegistration, 3000);
|
946 |
+
}
|
947 |
+
}
|
948 |
+
});
|
949 |
+
}
|
950 |
+
</script>
|
951 |
+
<?php
|
952 |
+
}
|
953 |
+
|
954 |
+
function initialize_inline_duo_auth_registration($current_user,$session_id_encrypt){
|
955 |
+
|
956 |
+
$user_id = MO2f_Utility::mo2f_get_transient($session_id_encrypt, 'mo2f_current_user_id');
|
957 |
+
update_user_meta($user_id,'current_user_email',$current_user->user_email);
|
958 |
+
|
959 |
+
|
960 |
+
$opt=fetch_methods($current_user);
|
961 |
+
?>
|
962 |
+
<h3><?php echo mo2f_lt( 'Test Duo Authenticator' ); ?></h3>
|
963 |
+
<hr>
|
964 |
+
<div>
|
965 |
+
<br>
|
966 |
+
<br>
|
967 |
+
<center>
|
968 |
+
<h3><?php echo mo2f_lt( 'Duo push notification is sent to your mobile phone.' ); ?>
|
969 |
+
<br>
|
970 |
+
<?php echo mo2f_lt( 'We are waiting for your approval...' ); ?></h3>
|
971 |
+
<img src="<?php echo plugins_url( 'includes/images/ajax-loader-login.gif', dirname(dirname(__FILE__)) ); ?>"/>
|
972 |
+
</center>
|
973 |
+
|
974 |
+
<input type="button" name="back" id="go_back" class="button button-primary button-large"
|
975 |
+
value="<?php echo mo2f_lt( 'Back' ); ?>"
|
976 |
+
style="margin-top:100px;margin-left:10px;"/>
|
977 |
+
</div>
|
978 |
+
|
979 |
+
<form name="f" method="post" action="" id="mo2f_go_back_form">
|
980 |
+
<input type="hidden" name="option" value="mo2f_go_back"/>
|
981 |
+
<input type="hidden" name="mo2f_go_back_nonce"
|
982 |
+
value="<?php echo esc_html(wp_create_nonce( "mo2f-go-back-nonce" )) ?>"/>
|
983 |
+
</form>
|
984 |
+
<form name="f" method="post" id="mo2f_inline_duo_authenticator_success_form" action="">
|
985 |
+
<input type="hidden" name="option" value="mo2f_inline_duo_authenticator_success_form"/>
|
986 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id_encrypt); ?>"/>
|
987 |
+
<input type="hidden" name="mo2f_duo_authenticator_success_nonce"
|
988 |
+
value="<?php echo esc_html(wp_create_nonce( "mo2f-duo-authenticator-success-nonce" )) ?>"/>
|
989 |
+
</form>
|
990 |
+
<form name="f" method="post" id="mo2f_duo_authenticator_error_form" action="">
|
991 |
+
<input type="hidden" name="option" value="mo2f_inline_duo_authenticator_error"/>
|
992 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id_encrypt); ?>"/>
|
993 |
+
<input type="hidden" name="mo2f_inline_duo_authentcator_error_nonce"
|
994 |
+
value="<?php echo esc_html(wp_create_nonce( "mo2f-inline-duo-authenticator-error-nonce" )) ?>"/>
|
995 |
+
</form>
|
996 |
+
|
997 |
+
<script>
|
998 |
+
jQuery('#go_back').click(function () {
|
999 |
+
jQuery('#mo2f_go_back_form').submit();
|
1000 |
+
});
|
1001 |
+
jQuery("#mo2f_configurePhone").empty();
|
1002 |
+
jQuery("#mo2f_app_div").hide();
|
1003 |
+
var timeout;
|
1004 |
+
|
1005 |
+
|
1006 |
+
|
1007 |
+
pollMobileValidation();
|
1008 |
+
function pollMobileValidation() {
|
1009 |
+
var ajax_url = "<?php echo esc_url(admin_url('admin-ajax.php')); ?>";
|
1010 |
+
var nonce = "<?php echo esc_html(wp_create_nonce( 'miniorange-2-factor-duo-nonce' )); ?>";
|
1011 |
+
var session_id_encrypt = "<?php echo esc_html($session_id_encrypt); ?>";
|
1012 |
+
|
1013 |
+
var data={
|
1014 |
+
'action':'mo2f_duo_ajax_request',
|
1015 |
+
'call_type':'check_duo_push_auth_status',
|
1016 |
+
'session_id_encrypt': session_id_encrypt,
|
1017 |
+
'nonce': nonce,
|
1018 |
+
|
1019 |
+
};
|
1020 |
+
|
1021 |
+
jQuery.post(ajax_url, data, function(response){
|
1022 |
+
|
1023 |
+
if (response == 'SUCCESS') {
|
1024 |
+
jQuery('#mo2f_inline_duo_authenticator_success_form').submit();
|
1025 |
+
} else if (response == 'ERROR' || response == 'FAILED' || response == 'DENIED') {
|
1026 |
+
|
1027 |
+
jQuery('#mo2f_duo_authenticator_error_form').submit();
|
1028 |
+
} else {
|
1029 |
+
timeout = setTimeout(pollMobileValidation, 3000);
|
1030 |
+
}
|
1031 |
+
|
1032 |
+
});
|
1033 |
+
|
1034 |
+
}
|
1035 |
+
|
1036 |
+
</script>
|
1037 |
+
|
1038 |
+
<?php
|
1039 |
+
}
|
1040 |
+
function prompt_user_for_kba_setup($current_user_id, $login_status, $login_message,$redirect_to,$session_id){
|
1041 |
+
$current_user = get_userdata($current_user_id);
|
1042 |
+
$opt=fetch_methods($current_user);
|
1043 |
+
|
1044 |
+
?>
|
1045 |
+
<html>
|
1046 |
+
<head> <meta charset="utf-8"/>
|
1047 |
+
<meta http-equiv="X-UA-Compatible" content="IE=edge">
|
1048 |
+
<meta name="viewport" content="width=device-width, initial-scale=1">
|
1049 |
+
<?php
|
1050 |
+
mo2f_inline_css_and_js();
|
1051 |
+
?>
|
1052 |
+
<style>
|
1053 |
+
.mo2f_kba_ques, .mo2f_table_textbox{
|
1054 |
+
background: whitesmoke none repeat scroll 0% 0%;
|
1055 |
+
}
|
1056 |
+
</style>
|
1057 |
+
</head>
|
1058 |
+
<body>
|
1059 |
+
<div class="mo2f_modal" tabindex="-1" role="dialog" id="myModal5">
|
1060 |
+
<div class="mo2f-modal-backdrop"></div>
|
1061 |
+
<div class="mo2f_modal-dialog mo2f_modal-lg">
|
1062 |
+
<div class="login mo_customer_validation-modal-content">
|
1063 |
+
<div class="mo2f_modal-header">
|
1064 |
+
<h4 class="mo2f_modal-title"><button type="button" class="mo2f_close" data-dismiss="modal" aria-label="Close" title="<?php echo __('Back to login','miniorange-2-factor-authentication');?>" onclick="mologinback();"><span aria-hidden="true">×</span></button>
|
1065 |
+
<?php echo __('Setup Security Question (KBA)', 'miniorange-2-factor-authentication'); ?></h4>
|
1066 |
+
</div>
|
1067 |
+
<div class="mo2f_modal-body">
|
1068 |
+
<?php if(isset($login_message) && !empty($login_message)) { ?>
|
1069 |
+
<div id="otpMessage">
|
1070 |
+
<p class="mo2fa_display_message_frontend" style="text-align: left !important;"><?php echo esc_html($login_message); ?></p>
|
1071 |
+
</div>
|
1072 |
+
<?php } ?>
|
1073 |
+
<form name="f" method="post" action="" >
|
1074 |
+
<?php mo2f_configure_kba_questions(); ?>
|
1075 |
+
<br />
|
1076 |
+
<div class ="row">
|
1077 |
+
<div class="col-md-4" style="margin: 0 auto;width: 100px;">
|
1078 |
+
<input type="submit" name="validate" class="miniorange_button" style="width: 30%;background-color:#ff4168;" value="<?php echo __('Save', 'miniorange-2-factor-authentication'); ?>" />
|
1079 |
+
<button type="button" class="miniorange_button" style="width: 30%;background-color:#ff4168;" onclick="mobackinline();">Back</button>
|
1080 |
+
|
1081 |
+
</div>
|
1082 |
+
</div>
|
1083 |
+
<input type="hidden" name="option" value="mo2f_inline_kba_option" />
|
1084 |
+
<input type="hidden" name="mo2f_inline_save_kba_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-save-kba-nonce')); ?>" />
|
1085 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1086 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1087 |
+
</form>
|
1088 |
+
<?php if (sizeof($opt) > 1) { ?>
|
1089 |
+
<form name="f" method="post" action="" id="mo2f_goto_two_factor_form" class="mo2f_display_none_forms">
|
1090 |
+
<div class ="row">
|
1091 |
+
<div class="col-md-4" style="margin: 0 auto;width: 100px;">
|
1092 |
+
<input type="hidden" name="option" value="miniorange_back_inline"/>
|
1093 |
+
</div>
|
1094 |
+
</div>
|
1095 |
+
<input type="hidden" name="miniorange_inline_two_factor_setup" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-setup-nonce')); ?>" />
|
1096 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1097 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1098 |
+
</form>
|
1099 |
+
<?php } ?>
|
1100 |
+
|
1101 |
+
<?php mo2f_customize_logo() ?>
|
1102 |
+
</div>
|
1103 |
+
</div>
|
1104 |
+
</div>
|
1105 |
+
</div>
|
1106 |
+
<form name="f" id="mo2f_backto_mo_loginform" method="post" action="<?php echo wp_login_url(); ?>" style="display:none;">
|
1107 |
+
<input type="hidden" name="miniorange_mobile_validation_failed_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-mobile-validation-failed-nonce')); ?>" />
|
1108 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1109 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1110 |
+
</form>
|
1111 |
+
|
1112 |
+
<script>
|
1113 |
+
function mologinback(){
|
1114 |
+
jQuery('#mo2f_backto_mo_loginform').submit();
|
1115 |
+
}
|
1116 |
+
|
1117 |
+
function mobackinline(){
|
1118 |
+
jQuery('#mo2f_goto_two_factor_form').submit();
|
1119 |
+
}
|
1120 |
+
</script>
|
1121 |
+
</body>
|
1122 |
+
</html>
|
1123 |
+
<?php
|
1124 |
+
}function prompt_user_for_miniorange_register($current_user_id, $login_status, $login_message,$redirect_to,$session_id){
|
1125 |
+
$current_user = get_userdata($current_user_id);
|
1126 |
+
$opt=fetch_methods($current_user);
|
1127 |
+
?>
|
1128 |
+
<html>
|
1129 |
+
<head> <meta charset="utf-8"/>
|
1130 |
+
<meta http-equiv="X-UA-Compatible" content="IE=edge">
|
1131 |
+
<meta name="viewport" content="width=device-width, initial-scale=1">
|
1132 |
+
<?php
|
1133 |
+
mo2f_inline_css_and_js();
|
1134 |
+
?>
|
1135 |
+
<style>
|
1136 |
+
.mo2f_kba_ques, .mo2f_table_textbox{
|
1137 |
+
background: whitesmoke none repeat scroll 0% 0%;
|
1138 |
+
}
|
1139 |
+
</style>
|
1140 |
+
</head>
|
1141 |
+
<body>
|
1142 |
+
<div class="mo2f_modal" tabindex="-1" role="dialog" id="myModal5">
|
1143 |
+
<div class="mo2f-modal-backdrop"></div>
|
1144 |
+
<div class="mo2f_modal-dialog mo2f_modal-lg">
|
1145 |
+
<div class="login mo_customer_validation-modal-content">
|
1146 |
+
<div class="mo2f_modal-header">
|
1147 |
+
<h3 class="mo2f_modal-title" style="color:black;"><button type="button" class="mo2f_close" data-dismiss="modal" aria-label="Close" title="<?php echo __('Back to login','miniorange-2-factor-authentication');?>" onclick="mologinback();"><span aria-hidden="true">×</span></button>
|
1148 |
+
<b> <?php echo __('Connect with miniOrange', 'miniorange-2-factor-authentication'); ?></b></h3>
|
1149 |
+
</div>
|
1150 |
+
<div class="mo2f_modal-body">
|
1151 |
+
<?php if(isset($login_message) && !empty($login_message)){ ?>
|
1152 |
+
<div id="otpMessage">
|
1153 |
+
<p class="mo2fa_display_message_frontend" style="text-align: left !important;" ><?php echo wp_kses($login_message, array('b'=>array())); ?></p>
|
1154 |
+
</div>
|
1155 |
+
<?php } ?>
|
1156 |
+
<form name="mo2f_inline_register_form" id="mo2f_inline_register_form" method="post" action="">
|
1157 |
+
<input type="hidden" name="option" value="miniorange_inline_register" />
|
1158 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1159 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1160 |
+
<p>This method requires you to have an account with miniOrange.</p>
|
1161 |
+
<table class="mo_wpns_settings_table">
|
1162 |
+
<tr>
|
1163 |
+
<td><b><font color="#FF0000">*</font>Email:</b></td>
|
1164 |
+
<td><input class="mo_wpns_table_textbox" type="email" name="email"
|
1165 |
+
required placeholder="person@example.com"/></td>
|
1166 |
+
</tr>
|
1167 |
+
<tr>
|
1168 |
+
<td><b><font color="#FF0000">*</font>Password:</b></td>
|
1169 |
+
<td><input class="mo_wpns_table_textbox" required type="password"
|
1170 |
+
name="password" placeholder="Choose your password (Min. length 6)" /></td>
|
1171 |
+
</tr>
|
1172 |
+
<tr>
|
1173 |
+
<td><b><font color="#FF0000">*</font>Confirm Password:</b></td>
|
1174 |
+
<td><input class="mo_wpns_table_textbox" required type="password"
|
1175 |
+
name="confirmPassword" placeholder="Confirm your password" /></td>
|
1176 |
+
</tr>
|
1177 |
+
<tr>
|
1178 |
+
<td> </td>
|
1179 |
+
<td><br><input type="submit" name="submit" value="Create Account"
|
1180 |
+
class="miniorange_button" />
|
1181 |
+
<a href="#mo2f_account_exist">Already have an account?</a>
|
1182 |
+
</tr>
|
1183 |
+
</table>
|
1184 |
+
</form>
|
1185 |
+
<form name="f" id="mo2f_inline_login_form" method="post" action="" hidden>
|
1186 |
+
<p><b>It seems you already have an account with miniOrange. Please enter your miniOrange email and password.<br></b><a target="_blank" href="https://login.xecurify.com/moas/idp/resetpassword"> Click here if you forgot your password?</a></p>
|
1187 |
+
<input type="hidden" name="option" value="miniorange_inline_login"/>
|
1188 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1189 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1190 |
+
<table class="mo_wpns_settings_table">
|
1191 |
+
<tr>
|
1192 |
+
<td><b><font color="#FF0000">*</font>Email:</b></td>
|
1193 |
+
<td><input class="mo_wpns_table_textbox" type="email" name="email"
|
1194 |
+
required placeholder="person@example.com"
|
1195 |
+
/></td>
|
1196 |
+
</tr>
|
1197 |
+
<tr>
|
1198 |
+
<td><b><font color="#FF0000">*</font>Password:</b></td>
|
1199 |
+
<td><input class="mo_wpns_table_textbox" required type="password"
|
1200 |
+
name="password" placeholder="Enter your miniOrange password" /></td>
|
1201 |
+
</tr>
|
1202 |
+
<tr>
|
1203 |
+
<td> </td>
|
1204 |
+
<td><input type="submit" class="miniorange_button" />
|
1205 |
+
<input type="button" id="cancel_link" class="miniorange_button" value="<?php echo __('Go Back to Registration', 'miniorange-2-factor-authentication'); ?>" />
|
1206 |
+
</tr>
|
1207 |
+
</table>
|
1208 |
+
</form>
|
1209 |
+
<br>
|
1210 |
+
<input type="button" name="back" id="mo2f_inline_back_btn" class="miniorange_button" value="<?php echo __('<< Back to Menu', 'miniorange-2-factor-authentication'); ?>" />
|
1211 |
+
<?php mo2f_customize_logo() ?>
|
1212 |
+
</div>
|
1213 |
+
</div>
|
1214 |
+
</div>
|
1215 |
+
</div>
|
1216 |
+
<form name="f" method="post" action="" id="mo2f_goto_two_factor_form" >
|
1217 |
+
<input type="hidden" name="option" value="miniorange_back_inline"/>
|
1218 |
+
<input type="hidden" name="miniorange_inline_two_factor_setup" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-setup-nonce')); ?>" />
|
1219 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1220 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1221 |
+
</form>
|
1222 |
+
<form name="f" id="mo2f_backto_mo_loginform" method="post" action="<?php echo esc_url(wp_login_url()); ?>" style="display:none;">
|
1223 |
+
<input type="hidden" name="miniorange_mobile_validation_failed_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-mobile-validation-failed-nonce')); ?>" />
|
1224 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1225 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1226 |
+
</form>
|
1227 |
+
|
1228 |
+
<script>
|
1229 |
+
jQuery('#mo2f_inline_back_btn').click(function() {
|
1230 |
+
jQuery('#mo2f_goto_two_factor_form').submit();
|
1231 |
+
});
|
1232 |
+
jQuery('a[href=\"#mo2f_account_exist\"]').click(function (e) {
|
1233 |
+
jQuery('#mo2f_inline_login_form').show();
|
1234 |
+
jQuery('#mo2f_inline_register_form').hide();
|
1235 |
+
});
|
1236 |
+
jQuery('#cancel_link').click(function(){
|
1237 |
+
jQuery('#mo2f_inline_register_form').show();
|
1238 |
+
jQuery('#mo2f_inline_login_form').hide();
|
1239 |
+
});
|
1240 |
+
function mologinback(){
|
1241 |
+
jQuery('#mo2f_backto_mo_loginform').submit();
|
1242 |
+
}
|
1243 |
+
</script>
|
1244 |
+
</body>
|
1245 |
+
</html>
|
1246 |
+
<?php
|
1247 |
+
}
|
1248 |
+
function prompt_user_for_setup_success($id, $login_status, $login_message,$redirect_to,$session_id){
|
1249 |
+
global $Mo2fdbQueries;
|
1250 |
+
?>
|
1251 |
+
<html>
|
1252 |
+
<head> <meta charset="utf-8"/>
|
1253 |
+
<meta http-equiv="X-UA-Compatible" content="IE=edge">
|
1254 |
+
<meta name="viewport" content="width=device-width, initial-scale=1">
|
1255 |
+
<?php
|
1256 |
+
mo2f_inline_css_and_js();
|
1257 |
+
?>
|
1258 |
+
<style>
|
1259 |
+
.mo2f_kba_ques, .mo2f_table_textbox{
|
1260 |
+
background: whitesmoke none repeat scroll 0% 0%;
|
1261 |
+
}
|
1262 |
+
</style>
|
1263 |
+
</head>
|
1264 |
+
<body>
|
1265 |
+
<div class="mo2f_modal" tabindex="-1" role="dialog" id="myModal5">
|
1266 |
+
<div class="mo2f-modal-backdrop"></div>
|
1267 |
+
<div class="mo2f_modal-dialog mo2f_modal-lg">
|
1268 |
+
<div class="login mo_customer_validation-modal-content">
|
1269 |
+
<div class="mo2f_modal-header">
|
1270 |
+
<h4 class="mo2f_modal-title"><button type="button" class="mo2f_close" data-dismiss="modal" aria-label="Close" title="<?php echo __('Back to login', 'miniorange-2-factor-authentication'); ?>" onclick="mologinback();"><span aria-hidden="true">×</span></button>
|
1271 |
+
<?php echo __('Two Factor Setup Complete', 'miniorange-2-factor-authentication'); ?></h4>
|
1272 |
+
</div>
|
1273 |
+
<div class="mo2f_modal-body center">
|
1274 |
+
<?php
|
1275 |
+
global $Mo2fdbQueries;
|
1276 |
+
$mo2f_second_factor = $Mo2fdbQueries->get_user_detail( 'mo2f_configured_2FA_method',$id);
|
1277 |
+
if($mo2f_second_factor == 'OUT OF BAND EMAIL'){
|
1278 |
+
$mo2f_second_factor = 'Email Verification';
|
1279 |
+
}else if($mo2f_second_factor == 'SMS'){
|
1280 |
+
$mo2f_second_factor = 'OTP over SMS';
|
1281 |
+
}else if($mo2f_second_factor == 'OTP_OVER_EMAIL'){
|
1282 |
+
$mo2f_second_factor = 'OTP_OVER_EMAIL';
|
1283 |
+
}else if($mo2f_second_factor == 'PHONE VERIFICATION'){
|
1284 |
+
$mo2f_second_factor = 'Phone Call Verification';
|
1285 |
+
}else if($mo2f_second_factor == 'SOFT TOKEN'){
|
1286 |
+
$mo2f_second_factor = 'Soft Token';
|
1287 |
+
}else if($mo2f_second_factor == 'MOBILE AUTHENTICATION'){
|
1288 |
+
$mo2f_second_factor = 'QR Code Authentication';
|
1289 |
+
}else if($mo2f_second_factor == 'PUSH NOTIFICATIONS'){
|
1290 |
+
$mo2f_second_factor = 'Push Notification';
|
1291 |
+
}else if($mo2f_second_factor == 'GOOGLE AUTHENTICATOR'){
|
1292 |
+
if(get_user_meta($id,'mo2f_external_app_type',true) == 'GOOGLE AUTHENTICATOR'){
|
1293 |
+
$mo2f_second_factor = 'Google Authenticator';
|
1294 |
+
}else{
|
1295 |
+
$mo2f_second_factor = 'Authy 2-Factor Authentication';
|
1296 |
+
}
|
1297 |
+
}else if($mo2f_second_factor == 'KBA'){
|
1298 |
+
$mo2f_second_factor = 'Security Questions (KBA)';
|
1299 |
+
}
|
1300 |
+
$Mo2fdbQueries->get_user_detail( 'mo2f_configured_2FA_method',$id);
|
1301 |
+
$status = $Mo2fdbQueries->get_user_detail( 'mo_2factor_user_registration_status',$id);
|
1302 |
+
|
1303 |
+
if(get_site_option( 'mo2f_disable_kba' )!=1){
|
1304 |
+
if($status != 'MO_2_FACTOR_PLUGIN_SETTINGS'){
|
1305 |
+
?><div id="validation_msg" style="color:red;text-align:left !important;"></div>
|
1306 |
+
<div id="mo2f_show_kba_reg" class="mo2f_inline_padding" style="text-align:left !important;" >
|
1307 |
+
<?php if(isset($login_message) && !empty($login_message)){ ?>
|
1308 |
+
<div id="otpMessage">
|
1309 |
+
<p class="mo2fa_display_message_frontend" style="text-align: left !important;" ><?php echo wp_kses($login_message, array('b'=>array())); ?></p>
|
1310 |
+
</div>
|
1311 |
+
<?php } ?>
|
1312 |
+
<h4> <?php echo __('Please set your security questions as an alternate login or backup method.', 'miniorange-2-factor-authentication'); ?></h4>
|
1313 |
+
<form name="f" method="post" action="" >
|
1314 |
+
<?php mo2f_configure_kba_questions(); ?>
|
1315 |
+
<br>
|
1316 |
+
<center>
|
1317 |
+
<input type="submit" name="validate" class="miniorange_button" value="<?php echo __('Save', 'miniorange-2-factor-authentication'); ?>" />
|
1318 |
+
</center>
|
1319 |
+
<input type="hidden" name="mo2f_inline_kba_option" />
|
1320 |
+
<input type="hidden" name="mo2f_inline_save_kba_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-save-kba-nonce')); ?>" />
|
1321 |
+
<input type="hidden" name="mo2f_inline_kba_status" value="<?php echo esc_html($login_status); ?>" />
|
1322 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1323 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1324 |
+
</form>
|
1325 |
+
</div>
|
1326 |
+
<?php }
|
1327 |
+
}else{
|
1328 |
+
$mo2fa_login_status = 'MO_2_FACTOR_SETUP_SUCCESS';
|
1329 |
+
$Mo2fdbQueries->update_user_details( $id, array('mo_2factor_user_registration_status' =>'MO_2_FACTOR_PLUGIN_SETTINGS') );
|
1330 |
+
$status = 'MO_2_FACTOR_PLUGIN_SETTINGS';
|
1331 |
+
}
|
1332 |
+
if($status == 'MO_2_FACTOR_PLUGIN_SETTINGS'){
|
1333 |
+
if(get_site_option('mo2f_remember_device')!=1)
|
1334 |
+
{
|
1335 |
+
$pass2fa= new Miniorange_Password_2Factor_Login();
|
1336 |
+
$pass2fa->mo2fa_pass2login(site_url(), $session_id);
|
1337 |
+
?>
|
1338 |
+
<center>
|
1339 |
+
<p style="font-size:17px;"><?php echo __('You have successfully set up ', 'miniorange-2-factor-authentication'); ?><b style="color:#28B463;"><?php echo $mo2f_second_factor; ?> </b><?php echo __('as your Two Factor method.', 'miniorange-2-factor-authentication'); ?><br><br>
|
1340 |
+
<?php echo __('From now, when you login, you will be prompted for', 'miniorange-2-factor-authentication'); ?> <span style="color:#28B463;"><?php echo __($mo2f_second_factor, 'miniorange-2-factor-authentication'); ?></span> <?php echo __('as your 2nd factor method of authentication.', 'miniorange-2-factor-authentication'); ?>
|
1341 |
+
</p>
|
1342 |
+
</center>
|
1343 |
+
<br>
|
1344 |
+
<center>
|
1345 |
+
<p style="font-size:16px;"><a href="#" onclick="mologinback();"style="color:#CB4335;"><b><?php echo __('Click Here', 'miniorange-2-factor-authentication'); ?></b></a> <?php echo __('to sign-in to your account.', 'miniorange-2-factor-authentication'); ?>
|
1346 |
+
<br>
|
1347 |
+
</center>
|
1348 |
+
<?php
|
1349 |
+
}else{
|
1350 |
+
$redirect_to = isset($_POST[ 'redirect_to' ]) ? sanitize_url($_POST[ 'redirect_to' ]) : null;
|
1351 |
+
$mo_enable_rem = new Miniorange_Password_2Factor_Login();
|
1352 |
+
mo2f_collect_device_attributes_handler($session_id,$redirect_to);
|
1353 |
+
}
|
1354 |
+
}
|
1355 |
+
mo2f_customize_logo() ?>
|
1356 |
+
</div>
|
1357 |
+
</div>
|
1358 |
+
</div>
|
1359 |
+
</div>
|
1360 |
+
<form name="f" id="mo2f_backto_mo_loginform" method="post" action="<?php echo esc_url(wp_login_url()); ?>" style="display:none;">
|
1361 |
+
<input type="hidden" name="miniorange_mobile_validation_failed_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-mobile-validation-failed-nonce')); ?>" />
|
1362 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1363 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1364 |
+
</form>
|
1365 |
+
|
1366 |
+
<script>
|
1367 |
+
function mologinback(){
|
1368 |
+
jQuery('#mo2f_backto_mo_loginform').submit();
|
1369 |
+
}
|
1370 |
+
</script>
|
1371 |
+
</body>
|
1372 |
+
</html>
|
1373 |
+
<?php
|
1374 |
+
}
|
1375 |
+
|
1376 |
+
function prompt_user_for_phone_setup($current_user_id, $login_status, $login_message,$currentMethod,$redirect_to,$session_id){
|
1377 |
+
$current_user = get_userdata($current_user_id);
|
1378 |
+
$opt=fetch_methods($current_user);
|
1379 |
+
global $Mo2fdbQueries;
|
1380 |
+
$current_selected_method = $Mo2fdbQueries->get_user_detail( 'mo2f_configured_2FA_method',$current_user_id);
|
1381 |
+
$current_user = get_userdata($current_user_id);
|
1382 |
+
$email = $current_user->user_email;
|
1383 |
+
?>
|
1384 |
+
<html>
|
1385 |
+
<head> <meta charset="utf-8"/>
|
1386 |
+
<meta http-equiv="X-UA-Compatible" content="IE=edge">
|
1387 |
+
<meta name="viewport" content="width=device-width, initial-scale=1">
|
1388 |
+
<?php
|
1389 |
+
mo2f_inline_css_and_js();
|
1390 |
+
|
1391 |
+
wp_register_script('mo2f_bootstrap_js', plugins_url('includes/js/bootstrap.min.js',dirname(dirname(__FILE__))));
|
1392 |
+
wp_register_script('mo2f_phone_js', plugins_url('includes/js/phone.js',dirname(dirname( __FILE__))));
|
1393 |
+
wp_print_scripts( 'mo2f_bootstrap_js' );
|
1394 |
+
wp_print_scripts( 'mo2f_phone_js');
|
1395 |
+
|
1396 |
+
wp_register_style('mo2f_phone',plugins_url('includes/css/phone.css', dirname(dirname(__FILE__))));
|
1397 |
+
wp_print_styles( 'mo2f_phone' );
|
1398 |
+
?>
|
1399 |
+
</head>
|
1400 |
+
<body>
|
1401 |
+
<div class="mo2f_modal" tabindex="-1" role="dialog" id="myModal5">
|
1402 |
+
<div class="mo2f-modal-backdrop"></div>
|
1403 |
+
<div class="mo_customer_validation-modal-dialog mo_customer_validation-modal-md" >
|
1404 |
+
<div class="login mo_customer_validation-modal-content">
|
1405 |
+
<div class="mo2f_modal-header">
|
1406 |
+
<h4 class="mo2f_modal-title"><button type="button" class="mo2f_close" data-dismiss="modal" aria-label="Close" title="<?php echo __('Back to login','miniorange-2-factor-authentication');?>" onclick="mologinback();"><span aria-hidden="true">×</span></button>
|
1407 |
+
<?php
|
1408 |
+
if($current_selected_method == 'SMS AND EMAIL'){?>
|
1409 |
+
<?php echo __('Verify Your Phone and Email', 'miniorange-2-factor-authentication'); ?></h4>
|
1410 |
+
<?php }
|
1411 |
+
else if($current_selected_method == 'OTP Over Telegram')
|
1412 |
+
{
|
1413 |
+
echo __('Verify Your Telegram Details', 'miniorange-2-factor-authentication');
|
1414 |
+
}
|
1415 |
+
else if($current_selected_method == 'OTP OVER EMAIL'){
|
1416 |
+
?>
|
1417 |
+
<?php echo __('Verify Your EMAIL', 'miniorange-2-factor-authentication'); ?></h4>
|
1418 |
+
<?php }
|
1419 |
+
else{
|
1420 |
+
?>
|
1421 |
+
<?php echo __('Verify Your Phone', 'miniorange-2-factor-authentication'); ?></h3>
|
1422 |
+
<?php } ?>
|
1423 |
+
</div>
|
1424 |
+
<div class="mo2f_modal-body">
|
1425 |
+
<?php if(isset($login_message) && !empty($login_message)) { ?>
|
1426 |
+
<div id="otpMessage"
|
1427 |
+
<?php if(get_user_meta($current_user_id, 'mo2f_is_error', true)) { ?>style="background-color:#FADBD8; color:#E74C3C;?>"<?php update_user_meta($current_user_id, 'mo2f_is_error', false);} ?>
|
1428 |
+
>
|
1429 |
+
<p class="mo2fa_display_message_frontend" style="text-align: left !important; "> <?php echo wp_kses($login_message, array('b'=>array())); ?></p>
|
1430 |
+
</div>
|
1431 |
+
<?php if(isset($login_message)) {?> <br/> <?php } ?>
|
1432 |
+
<?php } ?>
|
1433 |
+
<div class="mo2f_row">
|
1434 |
+
<form name="f" method="post" action="" id="mo2f_inline_verifyphone_form">
|
1435 |
+
<p>
|
1436 |
+
<?php
|
1437 |
+
if($current_selected_method == 'SMS AND EMAIL'){?>
|
1438 |
+
<?php echo __('Enter your phone number. An One Time Passcode(OTP) wll be sent to this number and your email address.', 'miniorange-2-factor-authentication'); ?></p>
|
1439 |
+
<?php
|
1440 |
+
}else if($current_selected_method == 'OTP OVER EMAIL'){
|
1441 |
+
//no message
|
1442 |
+
}else if($current_selected_method == 'OTP Over Telegram')
|
1443 |
+
{
|
1444 |
+
echo __('1. Open the telegram app and search for miniorange2fa_bot. Click on start button or send <b>/start</b> message', 'miniorange-2-factor-authentication');
|
1445 |
+
echo "<br><br><br>";
|
1446 |
+
echo __('2. Enter the recieved Chat ID here below::', 'miniorange-2-factor-authentication');
|
1447 |
+
$chat_id = get_user_meta($current_user_id,'mo2f_chat_id',true);
|
1448 |
+
|
1449 |
+
if($chat_id == '')
|
1450 |
+
$chat_id = get_user_meta($current_user_id,'mo2f_temp_chatID',true);
|
1451 |
+
|
1452 |
+
?>
|
1453 |
+
<input type="text" name="verify_chatID" id="chatID"
|
1454 |
+
value="<?php echo esc_html($chat_id); ?>" pattern="[\+]?[0-9]{1,4}\s?[0-9]{7,12}" required="true" title="<?php echo __('Enter chat ID without any space or dashes', 'miniorange-2-factor-authentication'); ?>" /><br />
|
1455 |
+
|
1456 |
+
<?php
|
1457 |
+
echo "<br>";
|
1458 |
+
|
1459 |
+
}
|
1460 |
+
else{
|
1461 |
+
?>
|
1462 |
+
<?php echo __('Enter your phone number', 'miniorange-2-factor-authentication'); ?></h4>
|
1463 |
+
<?php }
|
1464 |
+
if(!($current_selected_method == 'OTP OVER EMAIL') and $current_selected_method !='OTP Over Telegram'and $current_selected_method !='OTP Over Whatsapp'){
|
1465 |
+
?>
|
1466 |
+
<input class="mo2f_table_textbox" type="text" name="verify_phone" id="phone"
|
1467 |
+
value="<?php echo get_user_meta($current_user_id,'mo2f_user_phone',true); ?>" pattern="[\+]?[0-9]{1,4}\s?[0-9]{7,12}" required="true" title="<?php echo __('Enter phone number without any space or dashes', 'miniorange-2-factor-authentication'); ?>" /><br />
|
1468 |
+
<?php } ?>
|
1469 |
+
<?php
|
1470 |
+
$email = $Mo2fdbQueries->get_user_detail( 'mo2f_user_email',$current_user_id);
|
1471 |
+
if($current_selected_method == 'SMS AND EMAIL' ||$current_selected_method == 'OTP OVER EMAIL' ){?>
|
1472 |
+
<input class="mo2f_IR_phone" type="text" name="verify_email" id="email"
|
1473 |
+
value="<?php echo esc_html($email) ; ?>" title="<?php echo __('Enter your email', 'miniorange-2-factor-authentication'); ?>" style="width: 250px;" disabled /><br />
|
1474 |
+
<?php } ?>
|
1475 |
+
<input type="submit" name="verify" class="miniorange_button" value="<?php echo __('Send OTP', 'miniorange-2-factor-authentication'); ?>" />
|
1476 |
+
<input type="hidden" name="option" value="miniorange_inline_complete_otp_over_sms"/>
|
1477 |
+
<input type="hidden" name="miniorange_inline_verify_phone_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-verify-phone-nonce')); ?>" />
|
1478 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1479 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1480 |
+
</form>
|
1481 |
+
</div>
|
1482 |
+
<form name="f" method="post" action="" id="mo2f_inline_validateotp_form" >
|
1483 |
+
<p>
|
1484 |
+
<?php
|
1485 |
+
if($current_selected_method == 'SMS AND EMAIL'){?>
|
1486 |
+
<h4><?php echo __('Enter One Time Passcode', 'miniorange-2-factor-authentication'); ?></h4>
|
1487 |
+
<?php }
|
1488 |
+
else{
|
1489 |
+
?>
|
1490 |
+
<?php echo mo2f_lt('Please enter the One Time Passcode sent to your phone.');?></p>
|
1491 |
+
<?php } ?>
|
1492 |
+
<input class="mo2f_IR_phone_OTP" required="true" pattern="[0-9]{4,8}" autofocus="true" type="text" name="otp_token" placeholder="<?php echo __('Enter the code', 'miniorange-2-factor-authentication'); ?>" id="otp_token"/><br>
|
1493 |
+
<?php if ($current_selected_method == 'PHONE VERIFICATION'){ ?>
|
1494 |
+
<span style="color:#1F618D;"><?php echo mo2f_lt('Didn\'t get code?');?></span>
|
1495 |
+
<a href="#resendsmslink" style="color:#F4D03F ;font-weight:bold;"><?php echo __('CALL AGAIN', 'miniorange-2-factor-authentication'); ?></a>
|
1496 |
+
<?php } else if($current_selected_method != 'OTP Over Telegram'){
|
1497 |
+
?>
|
1498 |
+
<span style="color:#1F618D;"><?php echo mo2f_lt('Didn\'t get code?');?></span>
|
1499 |
+
<a href="#resendsmslink" style="color:#F4D03F ;font-weight:bold;"><?php echo __('RESEND IT', 'miniorange-2-factor-authentication'); ?></a>
|
1500 |
+
<?php } ?>
|
1501 |
+
<br /><br />
|
1502 |
+
<input type="submit" name="validate" class="miniorange_button" value="<?php echo __('Verify Code', 'miniorange-2-factor-authentication'); ?>" />
|
1503 |
+
<?php if (sizeof($opt) > 1) { ?>
|
1504 |
+
|
1505 |
+
<input type="hidden" name="option" value="miniorange_back_inline"/>
|
1506 |
+
<input type="button" name="back" id="mo2f_inline_back_btn" class="miniorange_button" value="<?php echo __('Back', 'miniorange-2-factor-authentication'); ?>" />
|
1507 |
+
<?php } ?>
|
1508 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1509 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1510 |
+
<input type="hidden" name="option" value="miniorange_inline_complete_otp"/>
|
1511 |
+
<input type="hidden" name="miniorange_inline_validate_otp_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-validate-otp-nonce')); ?>" />
|
1512 |
+
</form>
|
1513 |
+
<?php mo2f_customize_logo() ?>
|
1514 |
+
</div>
|
1515 |
+
</div>
|
1516 |
+
</div>
|
1517 |
+
</div>
|
1518 |
+
<form name="f" id="mo2f_backto_mo_loginform" method="post" action="<?php echo wp_login_url(); ?>" style="display:none;">
|
1519 |
+
<input type="hidden" name="miniorange_mobile_validation_failed_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-mobile-validation-failed-nonce')); ?>" />
|
1520 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1521 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1522 |
+
</form>
|
1523 |
+
<form name="f" method="post" action="" id="mo2fa_inline_resend_otp_form" style="display:none;">
|
1524 |
+
<input type="hidden" name="miniorange_inline_resend_otp_nonce" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-resend-otp-nonce')); ?>" />
|
1525 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1526 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1527 |
+
</form>
|
1528 |
+
<?php if (sizeof($opt) > 1) { ?>
|
1529 |
+
<form name="f" method="post" action="" id="mo2f_goto_two_factor_form" >
|
1530 |
+
<input type="hidden" name="option" value="miniorange_back_inline"/>
|
1531 |
+
<input type="hidden" name="miniorange_inline_two_factor_setup" value="<?php echo esc_html(wp_create_nonce('miniorange-2-factor-inline-setup-nonce')); ?>" />
|
1532 |
+
<input type="hidden" name="redirect_to" value="<?php echo esc_url($redirect_to); ?>"/>
|
1533 |
+
<input type="hidden" name="session_id" value="<?php echo esc_html($session_id); ?>"/>
|
1534 |
+
</form>
|
1535 |
+
<?php } ?>
|
1536 |
+
<script>
|
1537 |
+
jQuery("#phone").intlTelInput();
|
1538 |
+
function mologinback(){
|
1539 |
+
jQuery('#mo2f_backto_mo_loginform').submit();
|
1540 |
+
}
|
1541 |
+
jQuery('#mo2f_inline_back_btn').click(function() {
|
1542 |
+
jQuery('#mo2f_goto_two_factor_form').submit();
|
1543 |
+
});
|
1544 |
+
jQuery('a[href="#resendsmslink"]').click(function(e) {
|
1545 |
+
jQuery('#mo2fa_inline_resend_otp_form').submit();
|
1546 |
+
});
|
1547 |
+
</script>
|
1548 |
+
</body>
|
1549 |
+
|
1550 |
+
</html>
|
1551 |
+
<?php
|
1552 |
}
|
controllers/twofa/two_fa.php
CHANGED
@@ -1,4 +1,4 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'twofa'.DIRECTORY_SEPARATOR.'two_fa.php';
|
4 |
update_site_option('mo2f_two_factor',true);
|
1 |
+
<?php
|
2 |
+
|
3 |
+
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'twofa'.DIRECTORY_SEPARATOR.'two_fa.php';
|
4 |
update_site_option('mo2f_two_factor',true);
|
controllers/twofa/two_fa_addon.php
CHANGED
@@ -1,5 +1,5 @@
|
|
1 |
-
<?php
|
2 |
-
global $Mo2fdbQueries;
|
3 |
-
$current_user = wp_get_current_user();
|
4 |
-
$mo2f_user_email = $Mo2fdbQueries->get_user_detail( 'mo2f_user_email', $current_user->ID );
|
5 |
-
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'twofa'.DIRECTORY_SEPARATOR.'two_fa_addon.php';
|
1 |
+
<?php
|
2 |
+
global $Mo2fdbQueries;
|
3 |
+
$current_user = wp_get_current_user();
|
4 |
+
$mo2f_user_email = $Mo2fdbQueries->get_user_detail( 'mo2f_user_email', $current_user->ID );
|
5 |
+
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'twofa'.DIRECTORY_SEPARATOR.'two_fa_addon.php';
|
controllers/twofa/two_fa_custom_form.php
CHANGED
@@ -1,9 +1,9 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
$is_woocommerce = get_site_option('mo2f_custom_reg_wocommerce');
|
4 |
-
$is_bbpress = get_site_option('mo2f_custom_reg_bbpress');
|
5 |
-
$is_any_of_woo_bb = $is_woocommerce || $is_bbpress;
|
6 |
-
$is_custom = get_site_option('mo2f_custom_reg_custom');
|
7 |
-
$is_registered = get_site_option('mo2f_customerkey');
|
8 |
-
|
9 |
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'twofa'.DIRECTORY_SEPARATOR.'two_fa_custom_form.php';
|
1 |
+
<?php
|
2 |
+
|
3 |
+
$is_woocommerce = get_site_option('mo2f_custom_reg_wocommerce');
|
4 |
+
$is_bbpress = get_site_option('mo2f_custom_reg_bbpress');
|
5 |
+
$is_any_of_woo_bb = $is_woocommerce || $is_bbpress;
|
6 |
+
$is_custom = get_site_option('mo2f_custom_reg_custom');
|
7 |
+
$is_registered = get_site_option('mo2f_customerkey');
|
8 |
+
|
9 |
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'twofa'.DIRECTORY_SEPARATOR.'two_fa_custom_form.php';
|
controllers/twofa/two_fa_custom_login.php
CHANGED
@@ -1,3 +1,3 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'twofa'.DIRECTORY_SEPARATOR.'two_fa_custom_login.php';
|
1 |
+
<?php
|
2 |
+
|
3 |
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'twofa'.DIRECTORY_SEPARATOR.'two_fa_custom_login.php';
|
controllers/twofa/two_fa_login_option.php
CHANGED
@@ -1,2 +1,2 @@
|
|
1 |
-
<?php
|
2 |
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'twofa'.DIRECTORY_SEPARATOR.'two_fa_login_option.php';
|
1 |
+
<?php
|
2 |
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'twofa'.DIRECTORY_SEPARATOR.'two_fa_login_option.php';
|
controllers/twofa/two_fa_premium_feature.php
CHANGED
@@ -1,3 +1,3 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'twofa'.DIRECTORY_SEPARATOR.'two_fa_premium_feature.php';
|
1 |
+
<?php
|
2 |
+
|
3 |
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'twofa'.DIRECTORY_SEPARATOR.'two_fa_premium_feature.php';
|
controllers/twofa/two_fa_rba.php
CHANGED
@@ -1,3 +1,3 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'twofa'.DIRECTORY_SEPARATOR.'two_fa_rba.php';
|
1 |
+
<?php
|
2 |
+
|
3 |
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'twofa'.DIRECTORY_SEPARATOR.'two_fa_rba.php';
|
controllers/twofa/two_fa_session_control.php
CHANGED
@@ -1,3 +1,3 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'twofa'.DIRECTORY_SEPARATOR.'two_fa_session_control.php';
|
1 |
+
<?php
|
2 |
+
|
3 |
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'twofa'.DIRECTORY_SEPARATOR.'two_fa_session_control.php';
|
controllers/twofa/two_fa_shortcode.php
CHANGED
@@ -1,3 +1,3 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'twofa'.DIRECTORY_SEPARATOR.'two_fa_shortcode.php';
|
1 |
+
<?php
|
2 |
+
|
3 |
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'twofa'.DIRECTORY_SEPARATOR.'two_fa_shortcode.php';
|
controllers/twofa/two_fa_unlimittedUser.php
CHANGED
@@ -1,3 +1,3 @@
|
|
1 |
-
<?php
|
2 |
-
global $moWpnsUtility, $mo2f_dirName;
|
3 |
-
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'twofa'.DIRECTORY_SEPARATOR.'two_fa_unlimittedUser.php';
|
1 |
+
<?php
|
2 |
+
global $moWpnsUtility, $mo2f_dirName;
|
3 |
+
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'twofa'.DIRECTORY_SEPARATOR.'two_fa_unlimittedUser.php';
|
controllers/twofa/two_fa_video_guide.php
CHANGED
@@ -1,4 +1,4 @@
|
|
1 |
-
<?php
|
2 |
-
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'twofa'.DIRECTORY_SEPARATOR.'two_fa_video_guide.php';
|
3 |
-
|
4 |
|
1 |
+
<?php
|
2 |
+
include_once $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'twofa'.DIRECTORY_SEPARATOR.'two_fa_video_guide.php';
|
3 |
+
|
4 |
|
controllers/upgrade.php
CHANGED
@@ -1,5 +1,5 @@
|
|
1 |
-
<?php
|
2 |
-
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'upgrade.php';
|
3 |
-
MoWpnsUtility::checkSecurity();
|
4 |
-
update_site_option("mo_2fa_pnp",time());
|
5 |
update_site_option("mo2fa_visit",intval(get_site_option("mo2fa_visit",0))+1);
|
1 |
+
<?php
|
2 |
+
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'upgrade.php';
|
3 |
+
MoWpnsUtility::checkSecurity();
|
4 |
+
update_site_option("mo_2fa_pnp",time());
|
5 |
update_site_option("mo2fa_visit",intval(get_site_option("mo2fa_visit",0))+1);
|
controllers/waf.php
CHANGED
@@ -1,48 +1,48 @@
|
|
1 |
-
<?php
|
2 |
-
global $moWpnsUtility,$mo2f_dirName;
|
3 |
-
$mo_wpns_handler = new MoWpnsHandler();
|
4 |
-
$sqlC = $mo_wpns_handler->get_blocked_attacks_count("SQL");
|
5 |
-
$rceC = $mo_wpns_handler->get_blocked_attacks_count("RCE");
|
6 |
-
$rfiC = $mo_wpns_handler->get_blocked_attacks_count("RFI");
|
7 |
-
$lfiC = $mo_wpns_handler->get_blocked_attacks_count("LFI");
|
8 |
-
$xssC = $mo_wpns_handler->get_blocked_attacks_count("XSS");
|
9 |
-
$totalAttacks = $sqlC+$lfiC+$rfiC+$xssC+$rceC;
|
10 |
-
$manualBlocks = $mo_wpns_handler->get_manual_blocked_ip_count();
|
11 |
-
$realTime = 0;
|
12 |
-
$countryBlocked = $mo_wpns_handler->get_blocked_countries();
|
13 |
-
$IPblockedByWAF = $mo_wpns_handler->get_blocked_ip_waf();
|
14 |
-
$totalIPBlocked = $manualBlocks+$realTime+$IPblockedByWAF;
|
15 |
-
$mo_waf = get_option('WAFEnabled');
|
16 |
-
if(!get_option('mo2f_tour_firewall'))
|
17 |
-
update_option('mo2f_tour_firewall',1);
|
18 |
-
if($mo_waf)
|
19 |
-
{
|
20 |
-
$mo_waf = false;
|
21 |
-
}
|
22 |
-
else
|
23 |
-
{
|
24 |
-
$mo_waf = true;
|
25 |
-
}
|
26 |
-
|
27 |
-
|
28 |
-
$path = dirname(dirname(__FILE__)).'/includes/images/loader.gif';
|
29 |
-
$path = explode('plugins', $path);
|
30 |
-
|
31 |
-
|
32 |
-
$img_loader_url = plugins_url().'/'.$path[1];
|
33 |
-
if($totalIPBlocked>999)
|
34 |
-
{
|
35 |
-
$totalIPBlocked = strval(intval($totalIPBlocked/1000)).'k+';
|
36 |
-
}
|
37 |
-
|
38 |
-
if($totalAttacks>999)
|
39 |
-
{
|
40 |
-
$totalAttacks = strval(intval($totalAttacks/1000)).'k+';
|
41 |
-
}
|
42 |
-
update_site_option('mo2f_visit_waf',true);
|
43 |
-
|
44 |
-
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'waf.php';
|
45 |
-
|
46 |
-
|
47 |
-
|
48 |
-
|
1 |
+
<?php
|
2 |
+
global $moWpnsUtility,$mo2f_dirName;
|
3 |
+
$mo_wpns_handler = new MoWpnsHandler();
|
4 |
+
$sqlC = $mo_wpns_handler->get_blocked_attacks_count("SQL");
|
5 |
+
$rceC = $mo_wpns_handler->get_blocked_attacks_count("RCE");
|
6 |
+
$rfiC = $mo_wpns_handler->get_blocked_attacks_count("RFI");
|
7 |
+
$lfiC = $mo_wpns_handler->get_blocked_attacks_count("LFI");
|
8 |
+
$xssC = $mo_wpns_handler->get_blocked_attacks_count("XSS");
|
9 |
+
$totalAttacks = $sqlC+$lfiC+$rfiC+$xssC+$rceC;
|
10 |
+
$manualBlocks = $mo_wpns_handler->get_manual_blocked_ip_count();
|
11 |
+
$realTime = 0;
|
12 |
+
$countryBlocked = $mo_wpns_handler->get_blocked_countries();
|
13 |
+
$IPblockedByWAF = $mo_wpns_handler->get_blocked_ip_waf();
|
14 |
+
$totalIPBlocked = $manualBlocks+$realTime+$IPblockedByWAF;
|
15 |
+
$mo_waf = get_option('WAFEnabled');
|
16 |
+
if(!get_option('mo2f_tour_firewall'))
|
17 |
+
update_option('mo2f_tour_firewall',1);
|
18 |
+
if($mo_waf)
|
19 |
+
{
|
20 |
+
$mo_waf = false;
|
21 |
+
}
|
22 |
+
else
|
23 |
+
{
|
24 |
+
$mo_waf = true;
|
25 |
+
}
|
26 |
+
|
27 |
+
|
28 |
+
$path = dirname(dirname(__FILE__)).'/includes/images/loader.gif';
|
29 |
+
$path = explode('plugins', $path);
|
30 |
+
|
31 |
+
|
32 |
+
$img_loader_url = plugins_url().'/'.$path[1];
|
33 |
+
if($totalIPBlocked>999)
|
34 |
+
{
|
35 |
+
$totalIPBlocked = strval(intval($totalIPBlocked/1000)).'k+';
|
36 |
+
}
|
37 |
+
|
38 |
+
if($totalAttacks>999)
|
39 |
+
{
|
40 |
+
$totalAttacks = strval(intval($totalAttacks/1000)).'k+';
|
41 |
+
}
|
42 |
+
update_site_option('mo2f_visit_waf',true);
|
43 |
+
|
44 |
+
include $mo2f_dirName . 'views'.DIRECTORY_SEPARATOR.'waf.php';
|
45 |
+
|
46 |
+
|
47 |
+
|
48 |
+
|
database/database_functions_2fa.php
CHANGED
@@ -1,407 +1,407 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
require_once( ABSPATH . 'wp-admin/includes/upgrade.php' );
|
4 |
-
|
5 |
-
class Mo2fDB {
|
6 |
-
private $userDetailsTable;
|
7 |
-
private $userLoginInfoTable;
|
8 |
-
|
9 |
-
function __construct() {
|
10 |
-
global $wpdb;
|
11 |
-
$this->userDetailsTable = $wpdb->prefix . 'mo2f_user_details';
|
12 |
-
$this->userLoginInfoTable = $wpdb->prefix . 'mo2f_user_login_info';
|
13 |
-
}
|
14 |
-
|
15 |
-
function mo_plugin_activate() {
|
16 |
-
global $wpdb;
|
17 |
-
if ( ! get_option( 'mo2f_dbversion' ) ) {
|
18 |
-
update_option( 'mo2f_dbversion', MoWpnsConstants::DB_VERSION );
|
19 |
-
$this->generate_tables();
|
20 |
-
} else {
|
21 |
-
$current_db_version = get_option( 'mo2f_dbversion' );
|
22 |
-
if ( $current_db_version < MoWpnsConstants::DB_VERSION ) {
|
23 |
-
|
24 |
-
update_option( 'mo2f_dbversion', MoWpnsConstants::DB_VERSION );
|
25 |
-
$this->generate_tables();
|
26 |
-
}
|
27 |
-
//update the tables based on DB_VERSION.
|
28 |
-
}
|
29 |
-
}
|
30 |
-
|
31 |
-
function generate_tables() {
|
32 |
-
global $wpdb;
|
33 |
-
|
34 |
-
$tableName = $this->userDetailsTable;
|
35 |
-
|
36 |
-
if($wpdb->get_var("show tables like '$tableName'") != $tableName) {
|
37 |
-
|
38 |
-
$sql = "CREATE TABLE IF NOT EXISTS " . $tableName . " (
|
39 |
-
`user_id` bigint NOT NULL,
|
40 |
-
`mo2f_OTPOverSMS_config_status` tinyint,
|
41 |
-
`mo2f_miniOrangePushNotification_config_status` tinyint,
|
42 |
-
`mo2f_miniOrangeQRCodeAuthentication_config_status` tinyint,
|
43 |
-
`mo2f_miniOrangeSoftToken_config_status` tinyint,
|
44 |
-
`mo2f_AuthyAuthenticator_config_status` tinyint,
|
45 |
-
`mo2f_EmailVerification_config_status` tinyint,
|
46 |
-
`mo2f_SecurityQuestions_config_status` tinyint,
|
47 |
-
`mo2f_GoogleAuthenticator_config_status` tinyint,
|
48 |
-
`mo2f_OTPOverEmail_config_status` tinyint,
|
49 |
-
`mo2f_OTPOverTelegram_config_status` tinyint,
|
50 |
-
`mo2f_OTPOverWhatsapp_config_status` tinyint,
|
51 |
-
`mo2f_DuoAuthenticator_config_status` tinyint,
|
52 |
-
`mobile_registration_status` tinyint,
|
53 |
-
`mo2f_2factor_enable_2fa_byusers` tinyint DEFAULT 1,
|
54 |
-
`mo2f_configured_2FA_method` mediumtext NOT NULL ,
|
55 |
-
`mo2f_user_phone` mediumtext NOT NULL ,
|
56 |
-
`mo2f_user_email` mediumtext NOT NULL,
|
57 |
-
`user_registration_with_miniorange` mediumtext NOT NULL,
|
58 |
-
`mo_2factor_user_registration_status` mediumtext NOT NULL,
|
59 |
-
UNIQUE KEY user_id (user_id) );";
|
60 |
-
|
61 |
-
dbDelta( $sql );
|
62 |
-
}
|
63 |
-
add_site_option( 'cmVtYWluaW5nT1RQ' ,30);
|
64 |
-
add_site_option( 'bGltaXRSZWFjaGVk' ,0);
|
65 |
-
add_site_option( base64_encode('totalUsersCloud'),0);
|
66 |
-
add_site_option(base64_encode('remainingWhatsapptransactions'),30);
|
67 |
-
|
68 |
-
|
69 |
-
|
70 |
-
|
71 |
-
$check_if_column_exists = $this->check_if_column_exists( 'mo2f_user_details', "mo2f_OTPOverEmail_config_status" );
|
72 |
-
$check_if_column_exists_tel = $this->check_if_column_exists( 'mo2f_user_details', "mo2f_OTPOverTelegram_config_status" );
|
73 |
-
$check_if_column_exists_duo = $this->check_if_column_exists( 'mo2f_user_details', "mo2f_DuoAuthenticator_config_status" );
|
74 |
-
|
75 |
-
if ( ! $check_if_column_exists ) {
|
76 |
-
$query = "ALTER TABLE `$tableName` ADD COLUMN `mo2f_OTPOverEmail_config_status` tinyint";
|
77 |
-
$this->execute_add_column( $query );
|
78 |
-
|
79 |
-
}
|
80 |
-
if(!$check_if_column_exists_tel)
|
81 |
-
{
|
82 |
-
$query = "ALTER TABLE " . $tableName . " ADD COLUMN (
|
83 |
-
`mo2f_OTPOverTelegram_config_status` tinyint,
|
84 |
-
`mo2f_OTPOverWhatsapp_config_status` tinyint);";
|
85 |
-
$this->execute_add_column( $query );
|
86 |
-
}
|
87 |
-
if(!$check_if_column_exists_duo)
|
88 |
-
{
|
89 |
-
$query = "ALTER TABLE " . $tableName . " ADD COLUMN (
|
90 |
-
`mo2f_DuoAuthenticator_config_status` tinyint);";
|
91 |
-
$this->execute_add_column( $query );
|
92 |
-
}
|
93 |
-
|
94 |
-
|
95 |
-
$tableName = $this->userLoginInfoTable;
|
96 |
-
|
97 |
-
if($wpdb->get_var("show tables like '$tableName'") != $tableName) {
|
98 |
-
|
99 |
-
$sql = "CREATE TABLE IF NOT EXISTS " . $tableName . " (
|
100 |
-
`session_id` mediumtext NOT NULL,
|
101 |
-
`mo2f_login_message` mediumtext NOT NULL ,
|
102 |
-
`mo2f_current_user_id` tinyint NOT NULL ,
|
103 |
-
`mo2f_1stfactor_status` mediumtext NOT NULL ,
|
104 |
-
`mo_2factor_login_status` mediumtext NOT NULL ,
|
105 |
-
`mo2f_transactionId` mediumtext NOT NULL ,
|
106 |
-
`mo_2_factor_kba_questions` longtext NOT NULL ,
|
107 |
-
`mo2f_rba_status` longtext NOT NULL ,
|
108 |
-
`secret_ga` mediumtext NOT NULL,
|
109 |
-
`ga_qrCode` mediumtext NOT NULL,
|
110 |
-
`ts_created` TIMESTAMP DEFAULT CURRENT_TIMESTAMP,
|
111 |
-
PRIMARY KEY (`session_id`(100)));";
|
112 |
-
|
113 |
-
dbDelta( $sql );
|
114 |
-
}
|
115 |
-
|
116 |
-
$check_if_column_exists = $this->check_if_column_exists( "user_login_info_table", "mo_2factor_login_status" );
|
117 |
-
|
118 |
-
if ( ! $check_if_column_exists ) {
|
119 |
-
$query = "ALTER TABLE `$tableName` ADD COLUMN `mo_2factor_login_status` mediumtext NOT NULL";
|
120 |
-
$this->execute_add_column( $query );
|
121 |
-
|
122 |
-
}
|
123 |
-
$check_if_column_exists = $this->check_if_column_exists( "user_login_info_table", "secret_ga" );
|
124 |
-
|
125 |
-
if ( ! $check_if_column_exists ) {
|
126 |
-
$query = "ALTER TABLE `$tableName` ADD COLUMN `secret_ga` mediumtext NOT NULL";
|
127 |
-
$this->execute_add_column( $query );
|
128 |
-
|
129 |
-
}
|
130 |
-
$check_if_column_exists = $this->check_if_column_exists( "user_login_info_table", "ga_qrCode" );
|
131 |
-
|
132 |
-
if ( ! $check_if_column_exists ) {
|
133 |
-
$query = "ALTER TABLE `$tableName` ADD COLUMN `ga_qrCode` mediumtext NOT NULL";
|
134 |
-
$this->execute_add_column( $query );
|
135 |
-
|
136 |
-
}
|
137 |
-
|
138 |
-
}
|
139 |
-
function get_current_user_email($id)
|
140 |
-
{
|
141 |
-
global $wpdb;
|
142 |
-
$sql = 'select user_email from wp_users where ID='.$id.';';
|
143 |
-
return $wpdb->get_var($sql);
|
144 |
-
}
|
145 |
-
function database_table_issue(){
|
146 |
-
|
147 |
-
global $wpdb;
|
148 |
-
$tableName = $this->userLoginInfoTable;
|
149 |
-
|
150 |
-
if($wpdb->get_var("show tables like '$tableName'") != $tableName) {
|
151 |
-
|
152 |
-
$sql = "CREATE TABLE IF NOT EXISTS " . $tableName . " (
|
153 |
-
`session_id` mediumtext NOT NULL,
|
154 |
-
`mo2f_login_message` mediumtext NOT NULL ,
|
155 |
-
`mo2f_current_user_id` tinyint NOT NULL ,
|
156 |
-
`mo2f_1stfactor_status` mediumtext NOT NULL ,
|
157 |
-
`mo_2factor_login_status` mediumtext NOT NULL ,
|
158 |
-
`mo2f_transactionId` mediumtext NOT NULL ,
|
159 |
-
`mo_2_factor_kba_questions` longtext NOT NULL ,
|
160 |
-
`mo2f_rba_status` longtext NOT NULL ,
|
161 |
-
`ts_created` TIMESTAMP DEFAULT CURRENT_TIMESTAMP,
|
162 |
-
PRIMARY KEY (`session_id`(100)));";
|
163 |
-
dbDelta( $sql );
|
164 |
-
}
|
165 |
-
|
166 |
-
$check_if_column_exists = $this->check_if_column_exists( "user_login_info_table", "mo_2factor_login_status" );
|
167 |
-
|
168 |
-
if ( ! $check_if_column_exists ) {
|
169 |
-
$query = "ALTER TABLE `$tableName` ADD COLUMN `mo_2factor_login_status` mediumtext NOT NULL";
|
170 |
-
$this->execute_add_column( $query );
|
171 |
-
|
172 |
-
}
|
173 |
-
|
174 |
-
}
|
175 |
-
|
176 |
-
|
177 |
-
function insert_user( $user_id ) {
|
178 |
-
global $wpdb;
|
179 |
-
$sql = "INSERT INTO $this->userDetailsTable (user_id) VALUES($user_id) ON DUPLICATE KEY UPDATE user_id=$user_id";
|
180 |
-
$wpdb->query( $sql );
|
181 |
-
}
|
182 |
-
|
183 |
-
function drop_table( $table_name ) {
|
184 |
-
global $wpdb;
|
185 |
-
$sql = "DROP TABLE $table_name";
|
186 |
-
$wpdb->query( $sql );
|
187 |
-
}
|
188 |
-
|
189 |
-
|
190 |
-
function get_user_detail( $column_name, $user_id ) {
|
191 |
-
global $wpdb;
|
192 |
-
$user_column_detail = $wpdb->get_results( "SELECT " . $column_name . " FROM " . $this->userDetailsTable . " WHERE user_id = " . $user_id . ";" );
|
193 |
-
$value = empty( $user_column_detail ) ? '' : get_object_vars( $user_column_detail[0] );
|
194 |
-
|
195 |
-
return $value == '' ? '' : $value[ $column_name ];
|
196 |
-
}
|
197 |
-
|
198 |
-
function delete_user_details( $user_id ) {
|
199 |
-
global $wpdb;
|
200 |
-
$wpdb->query(
|
201 |
-
"DELETE FROM " . $this->userDetailsTable . "
|
202 |
-
WHERE user_id = " . $user_id
|
203 |
-
);
|
204 |
-
|
205 |
-
return;
|
206 |
-
}
|
207 |
-
function get_no_of_2fa_users() {
|
208 |
-
global $wpdb;
|
209 |
-
$count=$wpdb->query(
|
210 |
-
"SELECT * FROM ". $this->userDetailsTable
|
211 |
-
);
|
212 |
-
return $count;
|
213 |
-
}
|
214 |
-
function get_all_user_2fa_methods() {
|
215 |
-
global $wpdb;
|
216 |
-
$all_methods = [];
|
217 |
-
$methods=$wpdb->get_results(
|
218 |
-
"SELECT `mo2f_configured_2FA_method` FROM ". $this->userDetailsTable,ARRAY_A
|
219 |
-
);
|
220 |
-
foreach($methods as $method){
|
221 |
-
array_push($all_methods,$method['mo2f_configured_2FA_method']);
|
222 |
-
}
|
223 |
-
return implode(',',$all_methods);
|
224 |
-
}
|
225 |
-
|
226 |
-
function check_if_table_exists( ) {
|
227 |
-
global $wpdb;
|
228 |
-
$does_table_exist= $wpdb->query(
|
229 |
-
"SHOW TABLES LIKE '" . $this->userDetailsTable . "';"
|
230 |
-
);
|
231 |
-
|
232 |
-
return $does_table_exist;
|
233 |
-
}
|
234 |
-
|
235 |
-
function check_if_user_column_exists($user_id){
|
236 |
-
global $wpdb;
|
237 |
-
$value = $wpdb->query(
|
238 |
-
"SELECT * FROM " . $this->userDetailsTable . "
|
239 |
-
WHERE user_id = " . $user_id
|
240 |
-
);
|
241 |
-
|
242 |
-
return $value;
|
243 |
-
|
244 |
-
}
|
245 |
-
|
246 |
-
function check_if_column_exists( $table_type, $column_name ){
|
247 |
-
|
248 |
-
if($table_type == "user_login_info_table")
|
249 |
-
$table = $this->userLoginInfoTable;
|
250 |
-
else if($table_type == "mo2f_user_details")
|
251 |
-
$table = $this->userDetailsTable;
|
252 |
-
global $wpdb;
|
253 |
-
$sql="SHOW COLUMNS FROM " . $table . "
|
254 |
-
LIKE '" . $column_name . "'";
|
255 |
-
$value = $wpdb->query($sql);
|
256 |
-
|
257 |
-
return $value;
|
258 |
-
|
259 |
-
}
|
260 |
-
|
261 |
-
function update_user_details( $user_id, $update ) {
|
262 |
-
global $wpdb;
|
263 |
-
$count = count( $update );
|
264 |
-
$sql = "UPDATE " . $this->userDetailsTable . " SET ";
|
265 |
-
$i = 1;
|
266 |
-
foreach ( $update as $key => $value ) {
|
267 |
-
|
268 |
-
$sql .= $key . "='" . $value . "'";
|
269 |
-
if ( $i < $count ) {
|
270 |
-
$sql .= ' , ';
|
271 |
-
}
|
272 |
-
$i ++;
|
273 |
-
}
|
274 |
-
$sql .= " WHERE user_id=" . $user_id . ";";
|
275 |
-
$wpdb->query( $sql );
|
276 |
-
|
277 |
-
return;
|
278 |
-
|
279 |
-
}
|
280 |
-
|
281 |
-
function insert_user_login_session( $session_id ) {
|
282 |
-
global $wpdb;
|
283 |
-
$sql = "INSERT INTO $this->userLoginInfoTable (session_id) VALUES('$session_id') ON DUPLICATE KEY UPDATE session_id='$session_id'";
|
284 |
-
|
285 |
-
$wpdb->query( $sql );
|
286 |
-
$sql = "DELETE FROM $this->userLoginInfoTable WHERE ts_created < DATE_ADD(NOW(),INTERVAL - 2 MINUTE);";
|
287 |
-
$wpdb->query( $sql );
|
288 |
-
}
|
289 |
-
|
290 |
-
function save_user_login_details( $session_id, $user_values ) {
|
291 |
-
global $wpdb;
|
292 |
-
$count = count( $user_values );
|
293 |
-
$sql = "UPDATE " . $this->userLoginInfoTable . " SET ";
|
294 |
-
$i = 1;
|
295 |
-
foreach ( $user_values as $key => $value ) {
|
296 |
-
|
297 |
-
$sql .= $key . "='" . $value . "'";
|
298 |
-
if ( $i < $count ) {
|
299 |
-
$sql .= ' , ';
|
300 |
-
}
|
301 |
-
$i ++;
|
302 |
-
}
|
303 |
-
$sql .= " WHERE session_id='" . $session_id . "';";
|
304 |
-
$wpdb->query( $sql );
|
305 |
-
|
306 |
-
return;
|
307 |
-
|
308 |
-
}
|
309 |
-
|
310 |
-
function execute_add_column ( $query ){
|
311 |
-
global $wpdb;
|
312 |
-
$wpdb->query( $query );
|
313 |
-
|
314 |
-
return;
|
315 |
-
}
|
316 |
-
|
317 |
-
function get_user_login_details( $column_name, $session_id ) {
|
318 |
-
global $wpdb;
|
319 |
-
$user_column_detail = $wpdb->get_results( "SELECT " . $column_name . " FROM " . $this->userLoginInfoTable . " WHERE session_id = '" . $session_id . "';" );
|
320 |
-
$value = empty( $user_column_detail ) ? '' : get_object_vars( $user_column_detail[0] );
|
321 |
-
|
322 |
-
return $value == '' ? '' : $value[ $column_name ];
|
323 |
-
}
|
324 |
-
function get_user_configured_methods( $user_id ) {
|
325 |
-
global $wpdb;
|
326 |
-
$user_methods_detail = $wpdb->get_results( "SELECT * FROM " . $this->userDetailsTable . " WHERE user_id = " . $user_id . ";" );
|
327 |
-
return $user_methods_detail;
|
328 |
-
}
|
329 |
-
|
330 |
-
function delete_user_login_sessions($session_id ) {
|
331 |
-
global $wpdb;
|
332 |
-
$wpdb->query(
|
333 |
-
"DELETE FROM " . $this->userLoginInfoTable . "
|
334 |
-
WHERE session_id='$session_id';"
|
335 |
-
);
|
336 |
-
|
337 |
-
return;
|
338 |
-
}
|
339 |
-
function check_user_limit_exceeded($user_id){
|
340 |
-
|
341 |
-
global $wpdb;
|
342 |
-
$value = $wpdb->query(
|
343 |
-
"SELECT meta_key FROM ".$wpdb->base_prefix ."usermeta
|
344 |
-
WHERE meta_key = 'currentMethod'"
|
345 |
-
);
|
346 |
-
|
347 |
-
$user_already_configured = $wpdb->query(
|
348 |
-
"SELECT meta_key FROM ".$wpdb->base_prefix ."usermeta
|
349 |
-
WHERE meta_key = 'currentMethod' and user_id =".$user_id);
|
350 |
-
|
351 |
-
if($value < 3 || $user_already_configured){
|
352 |
-
return false;
|
353 |
-
}
|
354 |
-
else{
|
355 |
-
return true;
|
356 |
-
}
|
357 |
-
}
|
358 |
-
function check_alluser_limit_exceeded($user_id){
|
359 |
-
|
360 |
-
global $wpdb;
|
361 |
-
$value = $wpdb->query(
|
362 |
-
"SELECT * FROM ".$this->userDetailsTable
|
363 |
-
);
|
364 |
-
$user_already_configured = $wpdb->query(
|
365 |
-
"SELECT * FROM ".$this->userDetailsTable ." WHERE user_id =".$user_id );
|
366 |
-
|
367 |
-
if($value < 3 || $user_already_configured){
|
368 |
-
return false;
|
369 |
-
}
|
370 |
-
else{
|
371 |
-
return true;
|
372 |
-
}
|
373 |
-
}
|
374 |
-
|
375 |
-
function get_all_onprem_userids(){
|
376 |
-
|
377 |
-
global $wpdb;
|
378 |
-
$value = $wpdb->get_results(
|
379 |
-
"SELECT * FROM ".$wpdb->base_prefix ."usermeta
|
380 |
-
WHERE meta_key = 'currentMethod'"
|
381 |
-
);
|
382 |
-
|
383 |
-
|
384 |
-
foreach ($value as $row){
|
385 |
-
|
386 |
-
if(isset($row->user_id)){
|
387 |
-
|
388 |
-
$this->insert_user( $row->user_id);
|
389 |
-
|
390 |
-
$this->update_user_details( $row->user_id,
|
391 |
-
array(
|
392 |
-
'mo2f_GoogleAuthenticator_config_status' => get_user_meta($row->user_id,'Google Authenticator',true),
|
393 |
-
'mo2f_SecurityQuestions_config_status' => get_user_meta($row->user_id,'Security Questions',true),
|
394 |
-
'mo2f_EmailVerification_config_status' => get_user_meta($row->user_id,'Email Verification',true),
|
395 |
-
'mo2f_AuthyAuthenticator_config_status' =>0,
|
396 |
-
'mo2f_user_email' => get_user_meta($row->user_id,'email',true),
|
397 |
-
'mo2f_user_phone' => '',
|
398 |
-
'user_registration_with_miniorange' => '',
|
399 |
-
'mobile_registration_status' => '',
|
400 |
-
'mo2f_configured_2FA_method' => get_user_meta($row->user_id,'currentMethod',true),
|
401 |
-
'mo_2factor_user_registration_status' => 'MO_2_FACTOR_PLUGIN_SETTINGS'
|
402 |
-
) );
|
403 |
-
}
|
404 |
-
}
|
405 |
-
}
|
406 |
-
|
407 |
-
}
|
1 |
+
<?php
|
2 |
+
|
3 |
+
require_once( ABSPATH . 'wp-admin/includes/upgrade.php' );
|
4 |
+
|
5 |
+
class Mo2fDB {
|
6 |
+
private $userDetailsTable;
|
7 |
+
private $userLoginInfoTable;
|
8 |
+
|
9 |
+
function __construct() {
|
10 |
+
global $wpdb;
|
11 |
+
$this->userDetailsTable = $wpdb->prefix . 'mo2f_user_details';
|
12 |
+
$this->userLoginInfoTable = $wpdb->prefix . 'mo2f_user_login_info';
|
13 |
+
}
|
14 |
+
|
15 |
+
function mo_plugin_activate() {
|
16 |
+
global $wpdb;
|
17 |
+
if ( ! get_option( 'mo2f_dbversion' ) ) {
|
18 |
+
update_option( 'mo2f_dbversion', MoWpnsConstants::DB_VERSION );
|
19 |
+
$this->generate_tables();
|
20 |
+
} else {
|
21 |
+
$current_db_version = get_option( 'mo2f_dbversion' );
|
22 |
+
if ( $current_db_version < MoWpnsConstants::DB_VERSION ) {
|
23 |
+
|
24 |
+
update_option( 'mo2f_dbversion', MoWpnsConstants::DB_VERSION );
|
25 |
+
$this->generate_tables();
|
26 |
+
}
|
27 |
+
//update the tables based on DB_VERSION.
|
28 |
+
}
|
29 |
+
}
|
30 |
+
|
31 |
+
function generate_tables() {
|
32 |
+
global $wpdb;
|
33 |
+
|
34 |
+
$tableName = $this->userDetailsTable;
|
35 |
+
|
36 |
+
if($wpdb->get_var("show tables like '$tableName'") != $tableName) {
|
37 |
+
|
38 |
+
$sql = "CREATE TABLE IF NOT EXISTS " . $tableName . " (
|
39 |
+
`user_id` bigint NOT NULL,
|
40 |
+
`mo2f_OTPOverSMS_config_status` tinyint,
|
41 |
+
`mo2f_miniOrangePushNotification_config_status` tinyint,
|
42 |
+
`mo2f_miniOrangeQRCodeAuthentication_config_status` tinyint,
|
43 |
+
`mo2f_miniOrangeSoftToken_config_status` tinyint,
|
44 |
+
`mo2f_AuthyAuthenticator_config_status` tinyint,
|
45 |
+
`mo2f_EmailVerification_config_status` tinyint,
|
46 |
+
`mo2f_SecurityQuestions_config_status` tinyint,
|
47 |
+
`mo2f_GoogleAuthenticator_config_status` tinyint,
|
48 |
+
`mo2f_OTPOverEmail_config_status` tinyint,
|
49 |
+
`mo2f_OTPOverTelegram_config_status` tinyint,
|
50 |
+
`mo2f_OTPOverWhatsapp_config_status` tinyint,
|
51 |
+
`mo2f_DuoAuthenticator_config_status` tinyint,
|
52 |
+
`mobile_registration_status` tinyint,
|
53 |
+
`mo2f_2factor_enable_2fa_byusers` tinyint DEFAULT 1,
|
54 |
+
`mo2f_configured_2FA_method` mediumtext NOT NULL ,
|
55 |
+
`mo2f_user_phone` mediumtext NOT NULL ,
|
56 |
+
`mo2f_user_email` mediumtext NOT NULL,
|
57 |
+
`user_registration_with_miniorange` mediumtext NOT NULL,
|
58 |
+
`mo_2factor_user_registration_status` mediumtext NOT NULL,
|
59 |
+
UNIQUE KEY user_id (user_id) );";
|
60 |
+
|
61 |
+
dbDelta( $sql );
|
62 |
+
}
|
63 |
+
add_site_option( 'cmVtYWluaW5nT1RQ' ,30);
|
64 |
+
add_site_option( 'bGltaXRSZWFjaGVk' ,0);
|
65 |
+
add_site_option( base64_encode('totalUsersCloud'),0);
|
66 |
+
add_site_option(base64_encode('remainingWhatsapptransactions'),30);
|
67 |
+
|
68 |
+
|
69 |
+
|
70 |
+
|
71 |
+
$check_if_column_exists = $this->check_if_column_exists( 'mo2f_user_details', "mo2f_OTPOverEmail_config_status" );
|
72 |
+
$check_if_column_exists_tel = $this->check_if_column_exists( 'mo2f_user_details', "mo2f_OTPOverTelegram_config_status" );
|
73 |
+
$check_if_column_exists_duo = $this->check_if_column_exists( 'mo2f_user_details', "mo2f_DuoAuthenticator_config_status" );
|
74 |
+
|
75 |
+
if ( ! $check_if_column_exists ) {
|
76 |
+
$query = "ALTER TABLE `$tableName` ADD COLUMN `mo2f_OTPOverEmail_config_status` tinyint";
|
77 |
+
$this->execute_add_column( $query );
|
78 |
+
|
79 |
+
}
|
80 |
+
if(!$check_if_column_exists_tel)
|
81 |
+
{
|
82 |
+
$query = "ALTER TABLE " . $tableName . " ADD COLUMN (
|
83 |
+
`mo2f_OTPOverTelegram_config_status` tinyint,
|
84 |
+
`mo2f_OTPOverWhatsapp_config_status` tinyint);";
|
85 |
+
$this->execute_add_column( $query );
|
86 |
+
}
|
87 |
+
if(!$check_if_column_exists_duo)
|
88 |
+
{
|
89 |
+
$query = "ALTER TABLE " . $tableName . " ADD COLUMN (
|
90 |
+
`mo2f_DuoAuthenticator_config_status` tinyint);";
|
91 |
+
$this->execute_add_column( $query );
|
92 |
+
}
|
93 |
+
|
94 |
+
|
95 |
+
$tableName = $this->userLoginInfoTable;
|
96 |
+
|
97 |
+
if($wpdb->get_var("show tables like '$tableName'") != $tableName) {
|
98 |
+
|
99 |
+
$sql = "CREATE TABLE IF NOT EXISTS " . $tableName . " (
|
100 |
+
`session_id` mediumtext NOT NULL,
|
101 |
+
`mo2f_login_message` mediumtext NOT NULL ,
|
102 |
+
`mo2f_current_user_id` tinyint NOT NULL ,
|
103 |
+
`mo2f_1stfactor_status` mediumtext NOT NULL ,
|
104 |
+
`mo_2factor_login_status` mediumtext NOT NULL ,
|
105 |
+
`mo2f_transactionId` mediumtext NOT NULL ,
|
106 |
+
`mo_2_factor_kba_questions` longtext NOT NULL ,
|
107 |
+
`mo2f_rba_status` longtext NOT NULL ,
|
108 |
+
`secret_ga` mediumtext NOT NULL,
|
109 |
+
`ga_qrCode` mediumtext NOT NULL,
|
110 |
+
`ts_created` TIMESTAMP DEFAULT CURRENT_TIMESTAMP,
|
111 |
+
PRIMARY KEY (`session_id`(100)));";
|
112 |
+
|
113 |
+
dbDelta( $sql );
|
114 |
+
}
|
115 |
+
|
116 |
+
$check_if_column_exists = $this->check_if_column_exists( "user_login_info_table", "mo_2factor_login_status" );
|
117 |
+
|
118 |
+
if ( ! $check_if_column_exists ) {
|
119 |
+
$query = "ALTER TABLE `$tableName` ADD COLUMN `mo_2factor_login_status` mediumtext NOT NULL";
|
120 |
+
$this->execute_add_column( $query );
|
121 |
+
|
122 |
+
}
|
123 |
+
$check_if_column_exists = $this->check_if_column_exists( "user_login_info_table", "secret_ga" );
|
124 |
+
|
125 |
+
if ( ! $check_if_column_exists ) {
|
126 |
+
$query = "ALTER TABLE `$tableName` ADD COLUMN `secret_ga` mediumtext NOT NULL";
|
127 |
+
$this->execute_add_column( $query );
|
128 |
+
|
129 |
+
}
|
130 |
+
$check_if_column_exists = $this->check_if_column_exists( "user_login_info_table", "ga_qrCode" );
|
131 |
+
|
132 |
+
if ( ! $check_if_column_exists ) {
|
133 |
+
$query = "ALTER TABLE `$tableName` ADD COLUMN `ga_qrCode` mediumtext NOT NULL";
|
134 |
+
$this->execute_add_column( $query );
|
135 |
+
|
136 |
+
}
|
137 |
+
|
138 |
+
}
|
139 |
+
function get_current_user_email($id)
|
140 |
+
{
|
141 |
+
global $wpdb;
|
142 |
+
$sql = 'select user_email from wp_users where ID='.$id.';';
|
143 |
+
return $wpdb->get_var($sql);
|
144 |
+
}
|
145 |
+
function database_table_issue(){
|
146 |
+
|
147 |
+
global $wpdb;
|
148 |
+
$tableName = $this->userLoginInfoTable;
|
149 |
+
|
150 |
+
if($wpdb->get_var("show tables like '$tableName'") != $tableName) {
|
151 |
+
|
152 |
+
$sql = "CREATE TABLE IF NOT EXISTS " . $tableName . " (
|
153 |
+
`session_id` mediumtext NOT NULL,
|
154 |
+
`mo2f_login_message` mediumtext NOT NULL ,
|
155 |
+
`mo2f_current_user_id` tinyint NOT NULL ,
|
156 |
+
`mo2f_1stfactor_status` mediumtext NOT NULL ,
|
157 |
+
`mo_2factor_login_status` mediumtext NOT NULL ,
|
158 |
+
`mo2f_transactionId` mediumtext NOT NULL ,
|
159 |
+
`mo_2_factor_kba_questions` longtext NOT NULL ,
|
160 |
+
`mo2f_rba_status` longtext NOT NULL ,
|
161 |
+
`ts_created` TIMESTAMP DEFAULT CURRENT_TIMESTAMP,
|
162 |
+
PRIMARY KEY (`session_id`(100)));";
|
163 |
+
dbDelta( $sql );
|
164 |
+
}
|
165 |
+
|
166 |
+
$check_if_column_exists = $this->check_if_column_exists( "user_login_info_table", "mo_2factor_login_status" );
|
167 |
+
|
168 |
+
if ( ! $check_if_column_exists ) {
|
169 |
+
$query = "ALTER TABLE `$tableName` ADD COLUMN `mo_2factor_login_status` mediumtext NOT NULL";
|
170 |
+
$this->execute_add_column( $query );
|
171 |
+
|
172 |
+
}
|
173 |
+
|
174 |
+
}
|
175 |
+
|
176 |
+
|
177 |
+
function insert_user( $user_id ) {
|
178 |
+
global $wpdb;
|
179 |
+
$sql = "INSERT INTO $this->userDetailsTable (user_id) VALUES($user_id) ON DUPLICATE KEY UPDATE user_id=$user_id";
|
180 |
+
$wpdb->query( $sql );
|
181 |
+
}
|
182 |
+
|
183 |
+
function drop_table( $table_name ) {
|
184 |
+
global $wpdb;
|
185 |
+
$sql = "DROP TABLE $table_name";
|
186 |
+
$wpdb->query( $sql );
|
187 |
+
}
|
188 |
+
|
189 |
+
|
190 |
+
function get_user_detail( $column_name, $user_id ) {
|
191 |
+
global $wpdb;
|
192 |
+
$user_column_detail = $wpdb->get_results( "SELECT " . $column_name . " FROM " . $this->userDetailsTable . " WHERE user_id = " . $user_id . ";" );
|
193 |
+
$value = empty( $user_column_detail ) ? '' : get_object_vars( $user_column_detail[0] );
|
194 |
+
|
195 |
+
return $value == '' ? '' : $value[ $column_name ];
|
196 |
+
}
|
197 |
+
|
198 |
+
function delete_user_details( $user_id ) {
|
199 |
+
global $wpdb;
|
200 |
+
$wpdb->query(
|
201 |
+
"DELETE FROM " . $this->userDetailsTable . "
|
202 |
+
WHERE user_id = " . $user_id
|
203 |
+
);
|
204 |
+
|
205 |
+
return;
|
206 |
+
}
|
207 |
+
function get_no_of_2fa_users() {
|
208 |
+
global $wpdb;
|
209 |
+
$count=$wpdb->query(
|
210 |
+
"SELECT * FROM ". $this->userDetailsTable
|
211 |
+
);
|
212 |
+
return $count;
|
213 |
+
}
|
214 |
+
function get_all_user_2fa_methods() {
|
215 |
+
global $wpdb;
|
216 |
+
$all_methods = [];
|
217 |
+
$methods=$wpdb->get_results(
|
218 |
+
"SELECT `mo2f_configured_2FA_method` FROM ". $this->userDetailsTable,ARRAY_A
|
219 |
+
);
|
220 |
+
foreach($methods as $method){
|
221 |
+
array_push($all_methods,$method['mo2f_configured_2FA_method']);
|
222 |
+
}
|
223 |
+
return implode(',',$all_methods);
|
224 |
+
}
|
225 |
+
|
226 |
+
function check_if_table_exists( ) {
|
227 |
+
global $wpdb;
|
228 |
+
$does_table_exist= $wpdb->query(
|
229 |
+
"SHOW TABLES LIKE '" . $this->userDetailsTable . "';"
|
230 |
+
);
|
231 |
+
|
232 |
+
return $does_table_exist;
|
233 |
+
}
|
234 |
+
|
235 |
+
function check_if_user_column_exists($user_id){
|
236 |
+
global $wpdb;
|
237 |
+
$value = $wpdb->query(
|
238 |
+
"SELECT * FROM " . $this->userDetailsTable . "
|
239 |
+
WHERE user_id = " . $user_id
|
240 |
+
);
|
241 |
+
|
242 |
+
return $value;
|
243 |
+
|
244 |
+
}
|
245 |
+
|
246 |
+
function check_if_column_exists( $table_type, $column_name ){
|
247 |
+
|
248 |
+
if($table_type == "user_login_info_table")
|
249 |
+
$table = $this->userLoginInfoTable;
|
250 |
+
else if($table_type == "mo2f_user_details")
|
251 |
+
$table = $this->userDetailsTable;
|
252 |
+
global $wpdb;
|
253 |
+
$sql="SHOW COLUMNS FROM " . $table . "
|
254 |
+
LIKE '" . $column_name . "'";
|
255 |
+
$value = $wpdb->query($sql);
|
256 |
+
|
257 |
+
return $value;
|
258 |
+
|
259 |
+
}
|
260 |
+
|
261 |
+
function update_user_details( $user_id, $update ) {
|
262 |
+
global $wpdb;
|
263 |
+
$count = count( $update );
|
264 |
+
$sql = "UPDATE " . $this->userDetailsTable . " SET ";
|
265 |
+
$i = 1;
|
266 |
+
foreach ( $update as $key => $value ) {
|
267 |
+
|
268 |
+
$sql .= $key . "='" . $value . "'";
|
269 |
+
if ( $i < $count ) {
|
270 |
+
$sql .= ' , ';
|
271 |
+
}
|
272 |
+
$i ++;
|
273 |
+
}
|
274 |
+
$sql .= " WHERE user_id=" . $user_id . ";";
|
275 |
+
$wpdb->query( $sql );
|
276 |
+
|
277 |
+
return;
|
278 |
+
|
279 |
+
}
|
280 |
+
|
281 |
+
function insert_user_login_session( $session_id ) {
|
282 |
+
global $wpdb;
|
283 |
+
$sql = "INSERT INTO $this->userLoginInfoTable (session_id) VALUES('$session_id') ON DUPLICATE KEY UPDATE session_id='$session_id'";
|
284 |
+
|
285 |
+
$wpdb->query( $sql );
|
286 |
+
$sql = "DELETE FROM $this->userLoginInfoTable WHERE ts_created < DATE_ADD(NOW(),INTERVAL - 2 MINUTE);";
|
287 |
+
$wpdb->query( $sql );
|
288 |
+
}
|
289 |
+
|
290 |
+
function save_user_login_details( $session_id, $user_values ) {
|
291 |
+
global $wpdb;
|
292 |
+
$count = count( $user_values );
|
293 |
+
$sql = "UPDATE " . $this->userLoginInfoTable . " SET ";
|
294 |
+
$i = 1;
|
295 |
+
foreach ( $user_values as $key => $value ) {
|
296 |
+
|
297 |
+
$sql .= $key . "='" . $value . "'";
|
298 |
+
if ( $i < $count ) {
|
299 |
+
$sql .= ' , ';
|
300 |
+
}
|
301 |
+
$i ++;
|
302 |
+
}
|
303 |
+
$sql .= " WHERE session_id='" . $session_id . "';";
|
304 |
+
$wpdb->query( $sql );
|
305 |
+
|
306 |
+
return;
|
307 |
+
|
308 |
+
}
|
309 |
+
|
310 |
+
function execute_add_column ( $query ){
|
311 |
+
global $wpdb;
|
312 |
+
$wpdb->query( $query );
|
313 |
+
|
314 |
+
return;
|
315 |
+
}
|
316 |
+
|
317 |
+
function get_user_login_details( $column_name, $session_id ) {
|
318 |
+
global $wpdb;
|
319 |
+
$user_column_detail = $wpdb->get_results( "SELECT " . $column_name . " FROM " . $this->userLoginInfoTable . " WHERE session_id = '" . $session_id . "';" );
|
320 |
+
$value = empty( $user_column_detail ) ? '' : get_object_vars( $user_column_detail[0] );
|
321 |
+
|
322 |
+
return $value == '' ? '' : $value[ $column_name ];
|
323 |
+
}
|
324 |
+
function get_user_configured_methods( $user_id ) {
|
325 |
+
global $wpdb;
|
326 |
+
$user_methods_detail = $wpdb->get_results( "SELECT * FROM " . $this->userDetailsTable . " WHERE user_id = " . $user_id . ";" );
|
327 |
+
return $user_methods_detail;
|
328 |
+
}
|
329 |
+
|
330 |
+
function delete_user_login_sessions($session_id ) {
|
331 |
+
global $wpdb;
|
332 |
+
$wpdb->query(
|
333 |
+
"DELETE FROM " . $this->userLoginInfoTable . "
|
334 |
+
WHERE session_id='$session_id';"
|
335 |
+
);
|
336 |
+
|
337 |
+
return;
|
338 |
+
}
|
339 |
+
function check_user_limit_exceeded($user_id){
|
340 |
+
|
341 |
+
global $wpdb;
|
342 |
+
$value = $wpdb->query(
|
343 |
+
"SELECT meta_key FROM ".$wpdb->base_prefix ."usermeta
|
344 |
+
WHERE meta_key = 'currentMethod'"
|
345 |
+
);
|
346 |
+
|
347 |
+
$user_already_configured = $wpdb->query(
|
348 |
+
"SELECT meta_key FROM ".$wpdb->base_prefix ."usermeta
|
349 |
+
WHERE meta_key = 'currentMethod' and user_id =".$user_id);
|
350 |
+
|
351 |
+
if($value < 3 || $user_already_configured){
|
352 |
+
return false;
|
353 |
+
}
|
354 |
+
else{
|
355 |
+
return true;
|
356 |
+
}
|
357 |
+
}
|
358 |
+
function check_alluser_limit_exceeded($user_id){
|
359 |
+
|
360 |
+
global $wpdb;
|
361 |
+
$value = $wpdb->query(
|
362 |
+
"SELECT * FROM ".$this->userDetailsTable
|
363 |
+
);
|
364 |
+
$user_already_configured = $wpdb->query(
|
365 |
+
"SELECT * FROM ".$this->userDetailsTable ." WHERE user_id =".$user_id );
|
366 |
+
|
367 |
+
if($value < 3 || $user_already_configured){
|
368 |
+
return false;
|
369 |
+
}
|
370 |
+
else{
|
371 |
+
return true;
|
372 |
+
}
|
373 |
+
}
|
374 |
+
|
375 |
+
function get_all_onprem_userids(){
|
376 |
+
|
377 |
+
global $wpdb;
|
378 |
+
$value = $wpdb->get_results(
|
379 |
+
"SELECT * FROM ".$wpdb->base_prefix ."usermeta
|
380 |
+
WHERE meta_key = 'currentMethod'"
|
381 |
+
);
|
382 |
+
|
383 |
+
|
384 |
+
foreach ($value as $row){
|
385 |
+
|
386 |
+
if(isset($row->user_id)){
|
387 |
+
|
388 |
+
$this->insert_user( $row->user_id);
|
389 |
+
|
390 |
+
$this->update_user_details( $row->user_id,
|
391 |
+
array(
|
392 |
+
'mo2f_GoogleAuthenticator_config_status' => get_user_meta($row->user_id,'Google Authenticator',true),
|
393 |
+
'mo2f_SecurityQuestions_config_status' => get_user_meta($row->user_id,'Security Questions',true),
|
394 |
+
'mo2f_EmailVerification_config_status' => get_user_meta($row->user_id,'Email Verification',true),
|
395 |
+
'mo2f_AuthyAuthenticator_config_status' =>0,
|
396 |
+
'mo2f_user_email' => get_user_meta($row->user_id,'email',true),
|
397 |
+
'mo2f_user_phone' => '',
|
398 |
+
'user_registration_with_miniorange' => '',
|
399 |
+
'mobile_registration_status' => '',
|
400 |
+
'mo2f_configured_2FA_method' => get_user_meta($row->user_id,'currentMethod',true),
|
401 |
+
'mo_2factor_user_registration_status' => 'MO_2_FACTOR_PLUGIN_SETTINGS'
|
402 |
+
) );
|
403 |
+
}
|
404 |
+
}
|
405 |
+
}
|
406 |
+
|
407 |
+
}
|
database/mo2f_db_options.php
CHANGED
@@ -1,40 +1,40 @@
|
|
1 |
-
<?php
|
2 |
-
$GLOBALS['mo2f_enable_brute_force'] = false;
|
3 |
-
$GLOBALS['mo2f_show_remaining_attempts'] = false;
|
4 |
-
$GLOBALS['mo_wpns_enable_ip_blocked_email_to_admin'] = false;
|
5 |
-
$GLOBALS['mo2f_activate_plugin'] = 1;
|
6 |
-
$GLOBALS['mo2f_login_option'] = 1;
|
7 |
-
$GLOBALS['mo2f_number_of_transactions'] = 1;
|
8 |
-
$GLOBALS['mo2f_set_transactions'] = 0;
|
9 |
-
$GLOBALS['mo2f_enable_forgotphone'] = 0;
|
10 |
-
$GLOBALS['mo2f_enable_2fa_for_users'] = 1;
|
11 |
-
$GLOBALS['mo2f_enable_2fa_prompt_on_login_page'] = 0;
|
12 |
-
$GLOBALS['mo2f_enable_xmlrpc'] = 0;
|
13 |
-
$GLOBALS['mo2f_custom_plugin_name'] = 'miniOrange 2-Factor';
|
14 |
-
$GLOBALS['mo2f_show_sms_transaction_message'] = 0;
|
15 |
-
$GLOBALS['mo2f_enforce_strong_passswords_for_accounts'] = 'all';
|
16 |
-
$GLOBALS['mo_file_backup_plugins'] = 1;
|
17 |
-
$GLOBALS['mo_file_backup_themes'] = 1;
|
18 |
-
$GLOBALS['mo_wpns_backup_time'] = 12;
|
19 |
-
$GLOBALS['scheduled_file_backup'] = 0;
|
20 |
-
$GLOBALS['scheduled_db_backup'] = 0;
|
21 |
-
$GLOBALS['file_backup_created_time'] = 0;
|
22 |
-
$GLOBALS['db_backup_created_time'] = 0;
|
23 |
-
$GLOBALS['mo2f_inline_registration'] = 1;
|
24 |
-
$GLOBALS['mo2f_nonce_enable_configured_methods'] = true;
|
25 |
-
$GLOBALS['mo_database_backup'] = 1;
|
26 |
-
$GLOBALS['mo_wpns_scan_initialize'] = 1;
|
27 |
-
$GLOBALS['mo_file_manual_backup_plugins'] = 1;
|
28 |
-
$GLOBALS['mo_file_manual_backup_themes'] = 1;
|
29 |
-
$GLOBALS['mo_schedule_database_backup'] = 1;
|
30 |
-
$GLOBALS['mo_wpns_2fa_with_network_security'] = 0;
|
31 |
-
$GLOBALS['mo_wpns_2fa_with_network_security_popup_visible'] = 1;
|
32 |
-
$GLOBALS['mo2f_two_factor_tour'] = -1;
|
33 |
-
$GLOBALS['mo2f_planname'] = '';
|
34 |
-
$GLOBALS['cmVtYWluaW5nT1RQ'] = 30;
|
35 |
-
$GLOBALS['bGltaXRSZWFjaGVk'] = 0;
|
36 |
-
$GLOBALS['mo2f_is_NC'] = 1;
|
37 |
-
$GLOBALS['mo2f_is_NNC'] = 1;
|
38 |
-
$GLOBALS['mo2f_enforce_strong_passswords'] = false;
|
39 |
-
$GLOBALS['mo2f_enable_debug_log'] = 0;
|
40 |
-
$GLOBALS['mo2f_trial_query_sent'] = false;
|
1 |
+
<?php
|
2 |
+
$GLOBALS['mo2f_enable_brute_force'] = false;
|
3 |
+
$GLOBALS['mo2f_show_remaining_attempts'] = false;
|
4 |
+
$GLOBALS['mo_wpns_enable_ip_blocked_email_to_admin'] = false;
|
5 |
+
$GLOBALS['mo2f_activate_plugin'] = 1;
|
6 |
+
$GLOBALS['mo2f_login_option'] = 1;
|
7 |
+
$GLOBALS['mo2f_number_of_transactions'] = 1;
|
8 |
+
$GLOBALS['mo2f_set_transactions'] = 0;
|
9 |
+
$GLOBALS['mo2f_enable_forgotphone'] = 0;
|
10 |
+
$GLOBALS['mo2f_enable_2fa_for_users'] = 1;
|
11 |
+
$GLOBALS['mo2f_enable_2fa_prompt_on_login_page'] = 0;
|
12 |
+
$GLOBALS['mo2f_enable_xmlrpc'] = 0;
|
13 |
+
$GLOBALS['mo2f_custom_plugin_name'] = 'miniOrange 2-Factor';
|
14 |
+
$GLOBALS['mo2f_show_sms_transaction_message'] = 0;
|
15 |
+
$GLOBALS['mo2f_enforce_strong_passswords_for_accounts'] = 'all';
|
16 |
+
$GLOBALS['mo_file_backup_plugins'] = 1;
|
17 |
+
$GLOBALS['mo_file_backup_themes'] = 1;
|
18 |
+
$GLOBALS['mo_wpns_backup_time'] = 12;
|
19 |
+
$GLOBALS['scheduled_file_backup'] = 0;
|
20 |
+
$GLOBALS['scheduled_db_backup'] = 0;
|
21 |
+
$GLOBALS['file_backup_created_time'] = 0;
|
22 |
+
$GLOBALS['db_backup_created_time'] = 0;
|
23 |
+
$GLOBALS['mo2f_inline_registration'] = 1;
|
24 |
+
$GLOBALS['mo2f_nonce_enable_configured_methods'] = true;
|
25 |
+
$GLOBALS['mo_database_backup'] = 1;
|
26 |
+
$GLOBALS['mo_wpns_scan_initialize'] = 1;
|
27 |
+
$GLOBALS['mo_file_manual_backup_plugins'] = 1;
|
28 |
+
$GLOBALS['mo_file_manual_backup_themes'] = 1;
|
29 |
+
$GLOBALS['mo_schedule_database_backup'] = 1;
|
30 |
+
$GLOBALS['mo_wpns_2fa_with_network_security'] = 0;
|
31 |
+
$GLOBALS['mo_wpns_2fa_with_network_security_popup_visible'] = 1;
|
32 |
+
$GLOBALS['mo2f_two_factor_tour'] = -1;
|
33 |
+
$GLOBALS['mo2f_planname'] = '';
|
34 |
+
$GLOBALS['cmVtYWluaW5nT1RQ'] = 30;
|
35 |
+
$GLOBALS['bGltaXRSZWFjaGVk'] = 0;
|
36 |
+
$GLOBALS['mo2f_is_NC'] = 1;
|
37 |
+
$GLOBALS['mo2f_is_NNC'] = 1;
|
38 |
+
$GLOBALS['mo2f_enforce_strong_passswords'] = false;
|
39 |
+
$GLOBALS['mo2f_enable_debug_log'] = 0;
|
40 |
+
$GLOBALS['mo2f_trial_query_sent'] = false;
|
handler/WAF/database/mo-waf-db-common.php
CHANGED
@@ -1,25 +1,25 @@
|
|
1 |
-
<?php
|
2 |
-
function retrivefullname($name)
|
3 |
-
{
|
4 |
-
|
5 |
-
switch ($name) {
|
6 |
-
case 'XSS':
|
7 |
-
return 'Cross-site Scripting';
|
8 |
-
case 'SQL':
|
9 |
-
return 'SQL injection';
|
10 |
-
case 'RCE':
|
11 |
-
return 'Remote Code Execution';
|
12 |
-
case 'LFI':
|
13 |
-
return 'Local File Inclusion';
|
14 |
-
case 'RFI':
|
15 |
-
return 'Remote File Inclusion';
|
16 |
-
case 'RLE':
|
17 |
-
return 'Rate limiting Exceeded';
|
18 |
-
case 'RLECrawler':
|
19 |
-
return 'Rate limit Exceeded for crawler';
|
20 |
-
default:
|
21 |
-
return $name;
|
22 |
-
|
23 |
-
}
|
24 |
-
|
25 |
}
|
1 |
+
<?php
|
2 |
+
function retrivefullname($name)
|
3 |
+
{
|
4 |
+
|
5 |
+
switch ($name) {
|
6 |
+
case 'XSS':
|
7 |
+
return 'Cross-site Scripting';
|
8 |
+
case 'SQL':
|
9 |
+
return 'SQL injection';
|
10 |
+
case 'RCE':
|
11 |
+
return 'Remote Code Execution';
|
12 |
+
case 'LFI':
|
13 |
+
return 'Local File Inclusion';
|
14 |
+
case 'RFI':
|
15 |
+
return 'Remote File Inclusion';
|
16 |
+
case 'RLE':
|
17 |
+
return 'Rate limiting Exceeded';
|
18 |
+
case 'RLECrawler':
|
19 |
+
return 'Rate limit Exceeded for crawler';
|
20 |
+
default:
|
21 |
+
return $name;
|
22 |
+
|
23 |
+
}
|
24 |
+
|
25 |
}
|
handler/WAF/database/mo-waf-db.php
CHANGED
@@ -1,249 +1,249 @@
|
|
1 |
-
<?php
|
2 |
-
global $dbcon,$prefix;
|
3 |
-
include_once('mo-waf-db-common.php');
|
4 |
-
function mo_wpns_log_attack($ipaddress,$value1,$value)
|
5 |
-
{
|
6 |
-
global $prefix,$dbcon;
|
7 |
-
$value = htmlspecialchars($value);
|
8 |
-
$query = 'insert into '.$prefix.'wpns_attack_logs values ("'.$ipaddress.'","'.$value1.'",'.time().',"'.$value.'");';
|
9 |
-
$results = mysqli_query($dbcon,$query);
|
10 |
-
$query = "select count(*) from ".$prefix."wpns_attack_logs where ip='".$ipaddress."' and input != 'RLE';";
|
11 |
-
$results = mysqli_query($dbcon,$query);
|
12 |
-
$rows = mysqli_fetch_array($results);
|
13 |
-
return $rows['count(*)'];
|
14 |
-
}
|
15 |
-
function mo_wpns_setting_file()
|
16 |
-
{
|
17 |
-
global $prefix,$dbcon;
|
18 |
-
$dir_name = dirname(__FILE__);
|
19 |
-
$dir_name1 = explode('wp-content', $dir_name);
|
20 |
-
$dir_name = $dir_name1[0];
|
21 |
-
$filepath = str_replace('\\', '/', $dir_name1[0]);
|
22 |
-
$fileName = $filepath.'/wp-includes/mo-waf-config.php';
|
23 |
-
$missingFile = 0;
|
24 |
-
if(!file_exists($fileName))
|
25 |
-
{
|
26 |
-
$missingFile = 1;
|
27 |
-
}
|
28 |
-
if($missingFile==1)
|
29 |
-
{
|
30 |
-
$file = fopen($fileName, "a+");
|
31 |
-
$string = "<?php".PHP_EOL;
|
32 |
-
|
33 |
-
$sqlInjection = mo_wpns_get_option_value("SQLInjection");
|
34 |
-
$string .= '$SQL='.$sqlInjection.';'.PHP_EOL;
|
35 |
-
|
36 |
-
$XSSAttack = mo_wpns_get_option_value("XSSAttack");
|
37 |
-
$string .= '$XSS='.$XSSAttack.';'.PHP_EOL;
|
38 |
-
|
39 |
-
$RFIAttack = mo_wpns_get_option_value("RFIAttack");
|
40 |
-
$string .= '$RFI='.$RFIAttack.';'.PHP_EOL;
|
41 |
-
|
42 |
-
$LFIAttack = mo_wpns_get_option_value("LFIAttack");
|
43 |
-
$string .= '$LFI='.$LFIAttack.';'.PHP_EOL;
|
44 |
-
|
45 |
-
$RCEAttack = mo_wpns_get_option_value("RCEAttack");
|
46 |
-
$string .= '$RCE='.$RCEAttack.';'.PHP_EOL;
|
47 |
-
|
48 |
-
$Rate_limiting = mo_wpns_get_option_value("Rate_limiting");
|
49 |
-
if($Rate_limiting!='')
|
50 |
-
$string .= '$RateLimiting='.$Rate_limiting.';'.PHP_EOL;
|
51 |
-
else
|
52 |
-
$string .= '$RateLimiting=0;'.PHP_EOL;
|
53 |
-
|
54 |
-
$Rate_request = mo_wpns_get_option_value("Rate_request");
|
55 |
-
if($Rate_request!='')
|
56 |
-
$string .= '$RequestsPMin='.$Rate_request.';'.PHP_EOL;
|
57 |
-
else
|
58 |
-
$string .= '$RequestsPMin=0;'.PHP_EOL;
|
59 |
-
|
60 |
-
$actionRateL = mo_wpns_get_option_value("actionRateL");
|
61 |
-
if($actionRateL==1)
|
62 |
-
$string .= '$actionRateL="ThrottleIP";'.PHP_EOL;
|
63 |
-
else
|
64 |
-
$string .= '$actionRateL="BlockIP";'.PHP_EOL;
|
65 |
-
|
66 |
-
$string .= '?>'.PHP_EOL;
|
67 |
-
fwrite($file, $string);
|
68 |
-
fclose($file);
|
69 |
-
|
70 |
-
return $fileName;
|
71 |
-
}
|
72 |
-
return "notMissing";
|
73 |
-
}
|
74 |
-
function mo_wpns_is_ip_whitelisted($ipaddress)
|
75 |
-
{
|
76 |
-
global $dbcon,$prefix;
|
77 |
-
$query = 'select * from '.$prefix.'mo2f_network_whitelisted_ips where ip_address="'.$ipaddress.'";';
|
78 |
-
$results = mysqli_query($dbcon,$query);
|
79 |
-
if($results)
|
80 |
-
{
|
81 |
-
$row = mysqli_fetch_array($results);
|
82 |
-
if(is_null($row))
|
83 |
-
{
|
84 |
-
return false;
|
85 |
-
}
|
86 |
-
else
|
87 |
-
{
|
88 |
-
return true;
|
89 |
-
}
|
90 |
-
}
|
91 |
-
return false;
|
92 |
-
}
|
93 |
-
function mo_wpns_is_ip_blocked($ipaddress)
|
94 |
-
{
|
95 |
-
global $dbcon,$prefix;
|
96 |
-
$query = 'select * from '.$prefix.'mo2f_network_blocked_ips where ip_address="'.$ipaddress.'";';
|
97 |
-
$results = mysqli_query($dbcon,$query);
|
98 |
-
if($results)
|
99 |
-
{
|
100 |
-
$row = mysqli_fetch_array($results);
|
101 |
-
if(is_null($row))
|
102 |
-
{
|
103 |
-
return false;
|
104 |
-
}
|
105 |
-
else
|
106 |
-
{
|
107 |
-
return true;
|
108 |
-
}
|
109 |
-
}
|
110 |
-
return false;
|
111 |
-
}
|
112 |
-
function mo_wpns_block_ip($ipaddress,$reason)
|
113 |
-
{
|
114 |
-
global $dbcon, $prefix;
|
115 |
-
$query ="insert into ".$prefix."mo2f_network_blocked_ips values(NULL,'".$ipaddress."','".$reason."',NULL,".time().");";
|
116 |
-
$results = mysqli_query($dbcon,$query);
|
117 |
-
}
|
118 |
-
function mo_wpns_dbconnection()
|
119 |
-
{
|
120 |
-
global $dbcon,$prefix;
|
121 |
-
$dir = dirname(__FILE__);
|
122 |
-
$dir = str_replace('\\', "/", $dir);
|
123 |
-
$dir_name = explode('wp-content', $dir);
|
124 |
-
$file = file_get_contents($dir_name[0].'wp-config.php');
|
125 |
-
$content = explode("\n", $file);
|
126 |
-
$len = sizeof($content);
|
127 |
-
$Ismultisite = 0;
|
128 |
-
$dbD = array('DB_NAME' =>'' ,'DB_USER' => '' ,'DB_PASSWORD' =>'','DB_HOST' =>'','DB_CHARSET' =>'','DB_COLLATE' =>'' );
|
129 |
-
|
130 |
-
$prefix = 'wp_';
|
131 |
-
|
132 |
-
for($i=0;$i<$len;$i++)
|
133 |
-
{
|
134 |
-
|
135 |
-
if(preg_match("/define/", $content[$i]))
|
136 |
-
{
|
137 |
-
$cont = explode(",", $content[$i]);
|
138 |
-
$string = str_replace(array('define(',' ','\''), '', $cont[0]);
|
139 |
-
switch ($string) {
|
140 |
-
case "DB_NAME":
|
141 |
-
$res = str_replace(array('\'',')',';',' '), '', $cont[1]);
|
142 |
-
$res = preg_replace('/\s/', '', $res);
|
143 |
-
$dbD['DB_NAME'] = $res;
|
144 |
-
break;
|
145 |
-
case 'DB_USER':
|
146 |
-
$res = str_replace(array('\'',')',';',' '), '', $cont[1]);
|
147 |
-
$res = preg_replace('/\s/', '', $res);
|
148 |
-
$dbD['DB_USER'] = $res;
|
149 |
-
break;
|
150 |
-
case "DB_PASSWORD":
|
151 |
-
$res = str_replace(array('\'',')',';',' '), '', $cont[1]);
|
152 |
-
$res = preg_replace('/\s/', '', $res);
|
153 |
-
$dbD['DB_PASSWORD'] = $res;
|
154 |
-
break;
|
155 |
-
case 'DB_HOST':
|
156 |
-
$res = str_replace(array('\'',')',';',' '), '', $cont[1]);
|
157 |
-
$res = preg_replace('/\s/', '', $res);
|
158 |
-
$dbD['DB_HOST'] = $res;
|
159 |
-
break;
|
160 |
-
case "DB_CHARSET":
|
161 |
-
$res = str_replace(array('\'',')',';',' '), '', $cont[1]);
|
162 |
-
$res = preg_replace('/\s/', '', $res);
|
163 |
-
$dbD['DB_CHARSET'] = $res;
|
164 |
-
break;
|
165 |
-
case 'DB_COLLATE':
|
166 |
-
$res = str_replace(array('\'',')',';',' '), '', $cont[1]);
|
167 |
-
$res = preg_replace('/\s/', '', $res);
|
168 |
-
$dbD['DB_COLLATE'] = $res;
|
169 |
-
break;
|
170 |
-
default:
|
171 |
-
|
172 |
-
break;
|
173 |
-
}
|
174 |
-
}
|
175 |
-
if(preg_match('/\$table_prefix/', $content[$i]))
|
176 |
-
{
|
177 |
-
$cont = explode("'", $content[$i]);
|
178 |
-
|
179 |
-
$prefix = $cont['1'];
|
180 |
-
}
|
181 |
-
}
|
182 |
-
$dbcon = new mysqli($dbD['DB_HOST'],$dbD['DB_USER'],$dbD['DB_PASSWORD']);
|
183 |
-
if(!$dbcon)
|
184 |
-
{
|
185 |
-
echo "database connection error";
|
186 |
-
exit;
|
187 |
-
}
|
188 |
-
$connection = mysqli_select_db($dbcon,$dbD['DB_NAME']);
|
189 |
-
return $connection;
|
190 |
-
}
|
191 |
-
function mo_wpns_get_option_value($option)
|
192 |
-
{
|
193 |
-
global $dbcon,$prefix;
|
194 |
-
$query = 'select option_value from '.$prefix.'options where option_name ="'.$option.'";';
|
195 |
-
$results = mysqli_query($dbcon,$query);
|
196 |
-
if($results)
|
197 |
-
{
|
198 |
-
$rows = mysqli_fetch_array($results);
|
199 |
-
if(isset($rows)&&(!is_null($rows['option_value'])))
|
200 |
-
{
|
201 |
-
$option_value = intval($rows['option_value']);
|
202 |
-
return $option_value;
|
203 |
-
}
|
204 |
-
}
|
205 |
-
return '';
|
206 |
-
}
|
207 |
-
|
208 |
-
function mo_wpns_getRLEattack($ipaddress)
|
209 |
-
{
|
210 |
-
global $dbcon,$prefix;
|
211 |
-
$query = "select time from ".$prefix."wpns_attack_logs where ip ='".$ipaddress."' and type = 'RLE' ORDER BY time DESC LIMIT 1;";
|
212 |
-
$results = mysqli_query($dbcon,$query);
|
213 |
-
if($results)
|
214 |
-
{
|
215 |
-
$results = mysqli_fetch_array($results);
|
216 |
-
return $results['time'];
|
217 |
-
}
|
218 |
-
return 0;
|
219 |
-
}
|
220 |
-
function mo_wpns_CheckRate($ipaddress)
|
221 |
-
{
|
222 |
-
global $dbcon,$prefix;
|
223 |
-
$time = 60;
|
224 |
-
mo_wpns_clearRate($time);
|
225 |
-
mo_wpns_insertRate($ipaddress);
|
226 |
-
$query = "select count(*) from ".$prefix."wpns_ip_rate_details where ip='".$ipaddress."';";
|
227 |
-
$results = mysqli_query($dbcon,$query);
|
228 |
-
|
229 |
-
if($results)
|
230 |
-
{
|
231 |
-
$row = mysqli_fetch_array($results);
|
232 |
-
return $row['count(*)'];
|
233 |
-
}
|
234 |
-
return 0;
|
235 |
-
}
|
236 |
-
function mo_wpns_clearRate($time)
|
237 |
-
{
|
238 |
-
global $dbcon,$prefix;
|
239 |
-
$query = "delete from ".$prefix."wpns_ip_rate_details where time<".(time()-$time);
|
240 |
-
$results = mysqli_query($dbcon,$query);
|
241 |
-
}
|
242 |
-
function mo_wpns_insertRate($ipaddress)
|
243 |
-
{
|
244 |
-
global $dbcon,$prefix;
|
245 |
-
$query = "insert into ".$prefix."wpns_ip_rate_details values('".$ipaddress."',".time().");";
|
246 |
-
$results = mysqli_query($dbcon,$query);
|
247 |
-
}
|
248 |
-
|
249 |
?>
|
1 |
+
<?php
|
2 |
+
global $dbcon,$prefix;
|
3 |
+
include_once('mo-waf-db-common.php');
|
4 |
+
function mo_wpns_log_attack($ipaddress,$value1,$value)
|
5 |
+
{
|
6 |
+
global $prefix,$dbcon;
|
7 |
+
$value = htmlspecialchars($value);
|
8 |
+
$query = 'insert into '.$prefix.'wpns_attack_logs values ("'.$ipaddress.'","'.$value1.'",'.time().',"'.$value.'");';
|
9 |
+
$results = mysqli_query($dbcon,$query);
|
10 |
+
$query = "select count(*) from ".$prefix."wpns_attack_logs where ip='".$ipaddress."' and input != 'RLE';";
|
11 |
+
$results = mysqli_query($dbcon,$query);
|
12 |
+
$rows = mysqli_fetch_array($results);
|
13 |
+
return $rows['count(*)'];
|
14 |
+
}
|
15 |
+
function mo_wpns_setting_file()
|
16 |
+
{
|
17 |
+
global $prefix,$dbcon;
|
18 |
+
$dir_name = dirname(__FILE__);
|
19 |
+
$dir_name1 = explode('wp-content', $dir_name);
|
20 |
+
$dir_name = $dir_name1[0];
|
21 |
+
$filepath = str_replace('\\', '/', $dir_name1[0]);
|
22 |
+
$fileName = $filepath.'/wp-includes/mo-waf-config.php';
|
23 |
+
$missingFile = 0;
|
24 |
+
if(!file_exists($fileName))
|
25 |
+
{
|
26 |
+
$missingFile = 1;
|
27 |
+
}
|
28 |
+
if($missingFile==1)
|
29 |
+
{
|
30 |
+
$file = fopen($fileName, "a+");
|
31 |
+
$string = "<?php".PHP_EOL;
|
32 |
+
|
33 |
+
$sqlInjection = mo_wpns_get_option_value("SQLInjection");
|
34 |
+
$string .= '$SQL='.$sqlInjection.';'.PHP_EOL;
|
35 |
+
|
36 |
+
$XSSAttack = mo_wpns_get_option_value("XSSAttack");
|
37 |
+
$string .= '$XSS='.$XSSAttack.';'.PHP_EOL;
|
38 |
+
|
39 |
+
$RFIAttack = mo_wpns_get_option_value("RFIAttack");
|
40 |
+
$string .= '$RFI='.$RFIAttack.';'.PHP_EOL;
|
41 |
+
|
42 |
+
$LFIAttack = mo_wpns_get_option_value("LFIAttack");
|
43 |
+
$string .= '$LFI='.$LFIAttack.';'.PHP_EOL;
|
44 |
+
|
45 |
+
$RCEAttack = mo_wpns_get_option_value("RCEAttack");
|
46 |
+
$string .= '$RCE='.$RCEAttack.';'.PHP_EOL;
|
47 |
+
|
48 |
+
$Rate_limiting = mo_wpns_get_option_value("Rate_limiting");
|
49 |
+
if($Rate_limiting!='')
|
50 |
+
$string .= '$RateLimiting='.$Rate_limiting.';'.PHP_EOL;
|
51 |
+
else
|
52 |
+
$string .= '$RateLimiting=0;'.PHP_EOL;
|
53 |
+
|
54 |
+
$Rate_request = mo_wpns_get_option_value("Rate_request");
|
55 |
+
if($Rate_request!='')
|
56 |
+
$string .= '$RequestsPMin='.$Rate_request.';'.PHP_EOL;
|
57 |
+
else
|
58 |
+
$string .= '$RequestsPMin=0;'.PHP_EOL;
|
59 |
+
|
60 |
+
$actionRateL = mo_wpns_get_option_value("actionRateL");
|
61 |
+
if($actionRateL==1)
|
62 |
+
$string .= '$actionRateL="ThrottleIP";'.PHP_EOL;
|
63 |
+
else
|
64 |
+
$string .= '$actionRateL="BlockIP";'.PHP_EOL;
|
65 |
+
|
66 |
+
$string .= '?>'.PHP_EOL;
|
67 |
+
fwrite($file, $string);
|
68 |
+
fclose($file);
|
69 |
+
|
70 |
+
return $fileName;
|
71 |
+
}
|
72 |
+
return "notMissing";
|
73 |
+
}
|
74 |
+
function mo_wpns_is_ip_whitelisted($ipaddress)
|
75 |
+
{
|
76 |
+
global $dbcon,$prefix;
|
77 |
+
$query = 'select * from '.$prefix.'mo2f_network_whitelisted_ips where ip_address="'.$ipaddress.'";';
|
78 |
+
$results = mysqli_query($dbcon,$query);
|
79 |
+
if($results)
|
80 |
+
{
|
81 |
+
$row = mysqli_fetch_array($results);
|
82 |
+
if(is_null($row))
|
83 |
+
{
|
84 |
+
return false;
|
85 |
+
}
|
86 |
+
else
|
87 |
+
{
|
88 |
+
return true;
|
89 |
+
}
|
90 |
+
}
|
91 |
+
return false;
|
92 |
+
}
|
93 |
+
function mo_wpns_is_ip_blocked($ipaddress)
|
94 |
+
{
|
95 |
+
global $dbcon,$prefix;
|
96 |
+
$query = 'select * from '.$prefix.'mo2f_network_blocked_ips where ip_address="'.$ipaddress.'";';
|
97 |
+
$results = mysqli_query($dbcon,$query);
|
98 |
+
if($results)
|
99 |
+
{
|
100 |
+
$row = mysqli_fetch_array($results);
|
101 |
+
if(is_null($row))
|
102 |
+
{
|
103 |
+
return false;
|
104 |
+
}
|
105 |
+
else
|
106 |
+
{
|
107 |
+
return true;
|
108 |
+
}
|
109 |
+
}
|
110 |
+
return false;
|
111 |
+
}
|
112 |
+
function mo_wpns_block_ip($ipaddress,$reason)
|
113 |
+
{
|
114 |
+
global $dbcon, $prefix;
|
115 |
+
$query ="insert into ".$prefix."mo2f_network_blocked_ips values(NULL,'".$ipaddress."','".$reason."',NULL,".time().");";
|
116 |
+
$results = mysqli_query($dbcon,$query);
|
117 |
+
}
|
118 |
+
function mo_wpns_dbconnection()
|
119 |
+
{
|
120 |
+
global $dbcon,$prefix;
|
121 |
+
$dir = dirname(__FILE__);
|
122 |
+
$dir = str_replace('\\', "/", $dir);
|
123 |
+
$dir_name = explode('wp-content', $dir);
|
124 |
+
$file = file_get_contents($dir_name[0].'wp-config.php');
|
125 |
+
$content = explode("\n", $file);
|
126 |
+
$len = sizeof($content);
|
127 |
+
$Ismultisite = 0;
|
128 |
+
$dbD = array('DB_NAME' =>'' ,'DB_USER' => '' ,'DB_PASSWORD' =>'','DB_HOST' =>'','DB_CHARSET' =>'','DB_COLLATE' =>'' );
|
129 |
+
|
130 |
+
$prefix = 'wp_';
|
131 |
+
|
132 |
+
for($i=0;$i<$len;$i++)
|
133 |
+
{
|
134 |
+
|
135 |
+
if(preg_match("/define/", $content[$i]))
|
136 |
+
{
|
137 |
+
$cont = explode(",", $content[$i]);
|
138 |
+
$string = str_replace(array('define(',' ','\''), '', $cont[0]);
|
139 |
+
switch ($string) {
|
140 |
+
case "DB_NAME":
|
141 |
+
$res = str_replace(array('\'',')',';',' '), '', $cont[1]);
|
142 |
+
$res = preg_replace('/\s/', '', $res);
|
143 |
+
$dbD['DB_NAME'] = $res;
|
144 |
+
break;
|
145 |
+
case 'DB_USER':
|
146 |
+
$res = str_replace(array('\'',')',';',' '), '', $cont[1]);
|
147 |
+
$res = preg_replace('/\s/', '', $res);
|
148 |
+
$dbD['DB_USER'] = $res;
|
149 |
+
break;
|
150 |
+
case "DB_PASSWORD":
|
151 |
+
$res = str_replace(array('\'',')',';',' '), '', $cont[1]);
|
152 |
+
$res = preg_replace('/\s/', '', $res);
|
153 |
+
$dbD['DB_PASSWORD'] = $res;
|
154 |
+
break;
|
155 |
+
case 'DB_HOST':
|
156 |
+
$res = str_replace(array('\'',')',';',' '), '', $cont[1]);
|
157 |
+
$res = preg_replace('/\s/', '', $res);
|
158 |
+
$dbD['DB_HOST'] = $res;
|
159 |
+
break;
|
160 |
+
case "DB_CHARSET":
|
161 |
+
$res = str_replace(array('\'',')',';',' '), '', $cont[1]);
|
162 |
+
$res = preg_replace('/\s/', '', $res);
|
163 |
+
$dbD['DB_CHARSET'] = $res;
|
164 |
+
break;
|
165 |
+
case 'DB_COLLATE':
|
166 |
+
$res = str_replace(array('\'',')',';',' '), '', $cont[1]);
|
167 |
+
$res = preg_replace('/\s/', '', $res);
|
168 |
+
$dbD['DB_COLLATE'] = $res;
|
169 |
+
break;
|
170 |
+
default:
|
171 |
+
|
172 |
+
break;
|
173 |
+
}
|
174 |
+
}
|
175 |
+
if(preg_match('/\$table_prefix/', $content[$i]))
|
176 |
+
{
|
177 |
+
$cont = explode("'", $content[$i]);
|
178 |
+
|
179 |
+
$prefix = $cont['1'];
|
180 |
+
}
|
181 |
+
}
|
182 |
+
$dbcon = new mysqli($dbD['DB_HOST'],$dbD['DB_USER'],$dbD['DB_PASSWORD']);
|
183 |
+
if(!$dbcon)
|
184 |
+
{
|
185 |
+
echo "database connection error";
|
186 |
+
exit;
|
187 |
+
}
|
188 |
+
$connection = mysqli_select_db($dbcon,$dbD['DB_NAME']);
|
189 |
+
return $connection;
|
190 |
+
}
|
191 |
+
function mo_wpns_get_option_value($option)
|
192 |
+
{
|
193 |
+
global $dbcon,$prefix;
|
194 |
+
$query = 'select option_value from '.$prefix.'options where option_name ="'.$option.'";';
|
195 |
+
$results = mysqli_query($dbcon,$query);
|
196 |
+
if($results)
|
197 |
+
{
|
198 |
+
$rows = mysqli_fetch_array($results);
|
199 |
+
if(isset($rows)&&(!is_null($rows['option_value'])))
|
200 |
+
{
|
201 |
+
$option_value = intval($rows['option_value']);
|
202 |
+
return $option_value;
|
203 |
+
}
|
204 |
+
}
|
205 |
+
return '';
|
206 |
+
}
|
207 |
+
|
208 |
+
function mo_wpns_getRLEattack($ipaddress)
|
209 |
+
{
|
210 |
+
global $dbcon,$prefix;
|
211 |
+
$query = "select time from ".$prefix."wpns_attack_logs where ip ='".$ipaddress."' and type = 'RLE' ORDER BY time DESC LIMIT 1;";
|
212 |
+
$results = mysqli_query($dbcon,$query);
|
213 |
+
if($results)
|
214 |
+
{
|
215 |
+
$results = mysqli_fetch_array($results);
|
216 |
+
return $results['time'];
|
217 |
+
}
|
218 |
+
return 0;
|
219 |
+
}
|
220 |
+
function mo_wpns_CheckRate($ipaddress)
|
221 |
+
{
|
222 |
+
global $dbcon,$prefix;
|
223 |
+
$time = 60;
|
224 |
+
mo_wpns_clearRate($time);
|
225 |
+
mo_wpns_insertRate($ipaddress);
|
226 |
+
$query = "select count(*) from ".$prefix."wpns_ip_rate_details where ip='".$ipaddress."';";
|
227 |
+
$results = mysqli_query($dbcon,$query);
|
228 |
+
|
229 |
+
if($results)
|
230 |
+
{
|
231 |
+
$row = mysqli_fetch_array($results);
|
232 |
+
return $row['count(*)'];
|
233 |
+
}
|
234 |
+
return 0;
|
235 |
+
}
|
236 |
+
function mo_wpns_clearRate($time)
|
237 |
+
{
|
238 |
+
global $dbcon,$prefix;
|
239 |
+
$query = "delete from ".$prefix."wpns_ip_rate_details where time<".(time()-$time);
|
240 |
+
$results = mysqli_query($dbcon,$query);
|
241 |
+
}
|
242 |
+
function mo_wpns_insertRate($ipaddress)
|
243 |
+
{
|
244 |
+
global $dbcon,$prefix;
|
245 |
+
$query = "insert into ".$prefix."wpns_ip_rate_details values('".$ipaddress."',".time().");";
|
246 |
+
$results = mysqli_query($dbcon,$query);
|
247 |
+
}
|
248 |
+
|
249 |
?>
|
handler/WAF/database/mo-waf-plugin-db.php
CHANGED
@@ -1,91 +1,91 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
include_once('mo-waf-db-common.php');
|
4 |
-
function mo_wpns_setting_file()
|
5 |
-
{
|
6 |
-
global $prefix,$dbcon;
|
7 |
-
$dir_name = dirname(__FILE__);
|
8 |
-
$dir_name1 = explode('wp-content', $dir_name);
|
9 |
-
$dir_name = $dir_name1[0];
|
10 |
-
$filepath = str_replace('\\', '/', $dir_name1[0]);
|
11 |
-
$fileName = $filepath.'/wp-includes/mo-waf-config.php';
|
12 |
-
$missingFile = 0;
|
13 |
-
if(!file_exists($fileName))
|
14 |
-
{
|
15 |
-
$missingFile = 1;
|
16 |
-
}
|
17 |
-
if($missingFile==1)
|
18 |
-
{
|
19 |
-
$file = fopen($fileName, "a+");
|
20 |
-
$string = "<?php".PHP_EOL;
|
21 |
-
$string .= '$SQL='.get_option("SQLInjection").';'.PHP_EOL;
|
22 |
-
$string .= '$XSS='.get_option("XSSAttack").';'.PHP_EOL;
|
23 |
-
$string .= '$RFI='.get_option("RFIAttack").';'.PHP_EOL;
|
24 |
-
$string .= '$LFI='.get_option("LFIAttack").';'.PHP_EOL;
|
25 |
-
$string .= '$RCE='.get_option("RCEAttack").';'.PHP_EOL;
|
26 |
-
$string .= '$RateLimiting='.get_option("Rate_limiting").';'.PHP_EOL;
|
27 |
-
$string .= '$RequestsPMin='.get_option("Rate_request").';'.PHP_EOL;
|
28 |
-
|
29 |
-
if(get_option('actionRateL') == 0)
|
30 |
-
$string .= '$actionRateL="ThrottleIP";'.PHP_EOL;
|
31 |
-
else
|
32 |
-
$string .= '$actionRateL="BlockIP";'.PHP_EOL;
|
33 |
-
|
34 |
-
$string .= '?>'.PHP_EOL;
|
35 |
-
fwrite($file, $string);
|
36 |
-
fclose($file);
|
37 |
-
return $fileName;
|
38 |
-
}
|
39 |
-
return "notMissing";
|
40 |
-
|
41 |
-
}
|
42 |
-
|
43 |
-
function mo_wpns_getRLEAttack($ipaddress)
|
44 |
-
{
|
45 |
-
global $wpdb;
|
46 |
-
$query = "select time from ".$wpdb->base_prefix."wpns_attack_logs where ip ='".$ipaddress."' ORDER BY time DESC LIMIT 1;";
|
47 |
-
$results = $wpdb->get_results($query);
|
48 |
-
return $results[0]->time;
|
49 |
-
}
|
50 |
-
function mo_wpns_log_attack($ipaddress,$value1,$value)
|
51 |
-
{
|
52 |
-
global $wpdb;
|
53 |
-
$value = htmlspecialchars($value);
|
54 |
-
$query = 'insert into '.$wpdb->base_prefix.'wpns_attack_logs values ("'.$ipaddress.'","'.$value1.'",'.time().',"'.$value.'");';
|
55 |
-
$results = $wpdb->get_results($query);
|
56 |
-
$query = "select count(*) as count from ".$wpdb->base_prefix."wpns_attack_logs where ip='".$ipaddress."' and input != 'RLE';";
|
57 |
-
$results = $wpdb->get_results($query);
|
58 |
-
return $results[0]->count;
|
59 |
-
}
|
60 |
-
|
61 |
-
|
62 |
-
function mo_wpns_CheckRate($ipaddress)
|
63 |
-
{
|
64 |
-
global $wpdb;
|
65 |
-
$time = 60;
|
66 |
-
mo_wpns_clearRate($time);
|
67 |
-
mo_wpns_insertRate($ipaddress);
|
68 |
-
$query = "select count(*) as count from ".$wpdb->base_prefix."wpns_ip_rate_details where ip='".$ipaddress."';";
|
69 |
-
$results = $wpdb->get_results($query);
|
70 |
-
|
71 |
-
if(isset($results[0]->count))
|
72 |
-
{
|
73 |
-
return $results[0]->count;
|
74 |
-
}
|
75 |
-
return 0;
|
76 |
-
|
77 |
-
}
|
78 |
-
function mo_wpns_clearRate($time)
|
79 |
-
{
|
80 |
-
global $wpdb;
|
81 |
-
$query = "delete from ".$wpdb->base_prefix."wpns_ip_rate_details where time<".(time()-$time);
|
82 |
-
$results = $wpdb->get_results($query);
|
83 |
-
}
|
84 |
-
function mo_wpns_insertRate($ipaddress)
|
85 |
-
{
|
86 |
-
global $wpdb;
|
87 |
-
$query = "insert into ".$wpdb->base_prefix."wpns_ip_rate_details values('".$ipaddress."',".time().");";
|
88 |
-
$results = $wpdb->get_results($query);
|
89 |
-
}
|
90 |
-
|
91 |
?>
|
1 |
+
<?php
|
2 |
+
|
3 |
+
include_once('mo-waf-db-common.php');
|
4 |
+
function mo_wpns_setting_file()
|
5 |
+
{
|
6 |
+
global $prefix,$dbcon;
|
7 |
+
$dir_name = dirname(__FILE__);
|
8 |
+
$dir_name1 = explode('wp-content', $dir_name);
|
9 |
+
$dir_name = $dir_name1[0];
|
10 |
+
$filepath = str_replace('\\', '/', $dir_name1[0]);
|
11 |
+
$fileName = $filepath.'/wp-includes/mo-waf-config.php';
|
12 |
+
$missingFile = 0;
|
13 |
+
if(!file_exists($fileName))
|
14 |
+
{
|
15 |
+
$missingFile = 1;
|
16 |
+
}
|
17 |
+
if($missingFile==1)
|
18 |
+
{
|
19 |
+
$file = fopen($fileName, "a+");
|
20 |
+
$string = "<?php".PHP_EOL;
|
21 |
+
$string .= '$SQL='.get_option("SQLInjection").';'.PHP_EOL;
|
22 |
+
$string .= '$XSS='.get_option("XSSAttack").';'.PHP_EOL;
|
23 |
+
$string .= '$RFI='.get_option("RFIAttack").';'.PHP_EOL;
|
24 |
+
$string .= '$LFI='.get_option("LFIAttack").';'.PHP_EOL;
|
25 |
+
$string .= '$RCE='.get_option("RCEAttack").';'.PHP_EOL;
|
26 |
+
$string .= '$RateLimiting='.get_option("Rate_limiting").';'.PHP_EOL;
|
27 |
+
$string .= '$RequestsPMin='.get_option("Rate_request").';'.PHP_EOL;
|
28 |
+
|
29 |
+
if(get_option('actionRateL') == 0)
|
30 |
+
$string .= '$actionRateL="ThrottleIP";'.PHP_EOL;
|
31 |
+
else
|
32 |
+
$string .= '$actionRateL="BlockIP";'.PHP_EOL;
|
33 |
+
|
34 |
+
$string .= '?>'.PHP_EOL;
|
35 |
+
fwrite($file, $string);
|
36 |
+
fclose($file);
|
37 |
+
return $fileName;
|
38 |
+
}
|
39 |
+
return "notMissing";
|
40 |
+
|
41 |
+
}
|
42 |
+
|
43 |
+
function mo_wpns_getRLEAttack($ipaddress)
|
44 |
+
{
|
45 |
+
global $wpdb;
|
46 |
+
$query = "select time from ".$wpdb->base_prefix."wpns_attack_logs where ip ='".$ipaddress."' ORDER BY time DESC LIMIT 1;";
|
47 |
+
$results = $wpdb->get_results($query);
|
48 |
+
return $results[0]->time;
|
49 |
+
}
|
50 |
+
function mo_wpns_log_attack($ipaddress,$value1,$value)
|
51 |
+
{
|
52 |
+
global $wpdb;
|
53 |
+
$value = htmlspecialchars($value);
|
54 |
+
$query = 'insert into '.$wpdb->base_prefix.'wpns_attack_logs values ("'.$ipaddress.'","'.$value1.'",'.time().',"'.$value.'");';
|
55 |
+
$results = $wpdb->get_results($query);
|
56 |
+
$query = "select count(*) as count from ".$wpdb->base_prefix."wpns_attack_logs where ip='".$ipaddress."' and input != 'RLE';";
|
57 |
+
$results = $wpdb->get_results($query);
|
58 |
+
return $results[0]->count;
|
59 |
+
}
|
60 |
+
|
61 |
+
|
62 |
+
function mo_wpns_CheckRate($ipaddress)
|
63 |
+
{
|
64 |
+
global $wpdb;
|
65 |
+
$time = 60;
|
66 |
+
mo_wpns_clearRate($time);
|
67 |
+
mo_wpns_insertRate($ipaddress);
|
68 |
+
$query = "select count(*) as count from ".$wpdb->base_prefix."wpns_ip_rate_details where ip='".$ipaddress."';";
|
69 |
+
$results = $wpdb->get_results($query);
|
70 |
+
|
71 |
+
if(isset($results[0]->count))
|
72 |
+
{
|
73 |
+
return $results[0]->count;
|
74 |
+
}
|
75 |
+
return 0;
|
76 |
+
|
77 |
+
}
|
78 |
+
function mo_wpns_clearRate($time)
|
79 |
+
{
|
80 |
+
global $wpdb;
|
81 |
+
$query = "delete from ".$wpdb->base_prefix."wpns_ip_rate_details where time<".(time()-$time);
|
82 |
+
$results = $wpdb->get_results($query);
|
83 |
+
}
|
84 |
+
function mo_wpns_insertRate($ipaddress)
|
85 |
+
{
|
86 |
+
global $wpdb;
|
87 |
+
$query = "insert into ".$wpdb->base_prefix."wpns_ip_rate_details values('".$ipaddress."',".time().");";
|
88 |
+
$results = $wpdb->get_results($query);
|
89 |
+
}
|
90 |
+
|
91 |
?>
|
handler/WAF/mo-waf-plugin.php
CHANGED
@@ -1,212 +1,212 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
$dir = dirname(__FILE__);
|
4 |
-
$dir = str_replace('\\', "/", $dir);
|
5 |
-
$dir = explode('handler', $dir);
|
6 |
-
$wafInclude = $dir[0].'/handler/WAF/waf-include.php';
|
7 |
-
$pluginU = $dir[0].'helper/pluginUtility.php';
|
8 |
-
$wafDB = $dir[0].'/handler/WAF/database/mo-waf-plugin-db.php';
|
9 |
-
$errorPage = $dir[0].'handler/mo-error.html';
|
10 |
-
$blockPage = $dir[0].'handler/mo-block.html';
|
11 |
-
|
12 |
-
include_once($wafInclude);
|
13 |
-
include_once($pluginU);
|
14 |
-
include_once($wafDB);
|
15 |
-
|
16 |
-
|
17 |
-
global $wpdb,$mowpnshandle;
|
18 |
-
$mowpnshandle = new MoWpnsHandler();
|
19 |
-
$ipaddress = get_ipaddress();
|
20 |
-
$ipaddress = sanitize_text_field($ipaddress);
|
21 |
-
if($mowpnshandle->mo_wpns_is_ip_blocked($ipaddress))
|
22 |
-
{
|
23 |
-
if(!$mowpnshandle->is_whitelisted($ipaddress))
|
24 |
-
{
|
25 |
-
header('HTTP/1.1 403 Forbidden');
|
26 |
-
include_once($blockPage);
|
27 |
-
exit;
|
28 |
-
}
|
29 |
-
}
|
30 |
-
$fileName = mo_wpns_setting_file();
|
31 |
-
if($fileName != "notMissing")
|
32 |
-
{
|
33 |
-
include_once($fileName);
|
34 |
-
}
|
35 |
-
if(isset($RateLimiting) and $RateLimiting == 1)
|
36 |
-
{
|
37 |
-
if(!is_crawler())
|
38 |
-
{
|
39 |
-
mo_wpns_apply_RateLimiting($RequestsPMin,$actionRateL,$ipaddress,$errorPage);
|
40 |
-
}
|
41 |
-
}
|
42 |
-
if(isset($RateLimitingCrawler))
|
43 |
-
{
|
44 |
-
if($RateLimitingCrawler == 1)
|
45 |
-
{
|
46 |
-
if(is_crawler())
|
47 |
-
{
|
48 |
-
if(is_fake_googlebot($ipaddress))
|
49 |
-
{
|
50 |
-
header('HTTP/1.1 403 Forbidden');
|
51 |
-
include_once($errorPage);
|
52 |
-
exit;
|
53 |
-
}
|
54 |
-
if($RateLimitingCrawler == '1')
|
55 |
-
{
|
56 |
-
mo_wpns_applyRateLimitingCrawler($ipaddress,$fileName,$errorPage);
|
57 |
-
}
|
58 |
-
|
59 |
-
}
|
60 |
-
}
|
61 |
-
}
|
62 |
-
$attack = array();
|
63 |
-
if(isset($SQL) )
|
64 |
-
{
|
65 |
-
if($SQL==1)
|
66 |
-
array_push($attack,"SQL");
|
67 |
-
}
|
68 |
-
if(isset($XSS) )
|
69 |
-
{
|
70 |
-
if( $XSS==1)
|
71 |
-
array_push($attack,"XSS");
|
72 |
-
}
|
73 |
-
if(isset($LFI))
|
74 |
-
{
|
75 |
-
if($LFI==1)
|
76 |
-
array_push($attack,"LFI");
|
77 |
-
}
|
78 |
-
|
79 |
-
$attackC = $attack;
|
80 |
-
$ParanoiaLevel = 1;
|
81 |
-
$annomalyS = 0;
|
82 |
-
$SQLScore = 0;
|
83 |
-
$XSSScore = 0;
|
84 |
-
$limitAttack = get_option('limitAttack');
|
85 |
-
|
86 |
-
|
87 |
-
foreach ($attackC as $key1 => $value1)
|
88 |
-
{
|
89 |
-
for($lev=1;$lev<=$ParanoiaLevel;$lev++)
|
90 |
-
{
|
91 |
-
if(isset($regex[$value1][$lev]))
|
92 |
-
{ $ooo = 0;
|
93 |
-
for($i=0;$i<sizeof($regex[$value1][$lev]);$i++)
|
94 |
-
{
|
95 |
-
foreach ($_REQUEST as $key => $value) {
|
96 |
-
|
97 |
-
if($regex[$value1][$lev][$i] != "")
|
98 |
-
{
|
99 |
-
if(is_string($value))
|
100 |
-
{
|
101 |
-
if(preg_match($regex[$value1][$lev][$i], $value))
|
102 |
-
{
|
103 |
-
|
104 |
-
if($value1 == "SQL")
|
105 |
-
{
|
106 |
-
$SQLScore += $score[$value1][$lev][$i];
|
107 |
-
}
|
108 |
-
elseif ($value1 == "XSS")
|
109 |
-
{
|
110 |
-
$XSSScore += $score[$value1][$lev][$i];
|
111 |
-
}
|
112 |
-
else
|
113 |
-
{
|
114 |
-
$annomalyS += $score[$value1][$lev][$i];
|
115 |
-
}
|
116 |
-
|
117 |
-
if($annomalyS>=5 || $SQLScore>=10 || $XSSScore >=10)
|
118 |
-
{
|
119 |
-
$attackCount = mo_wpns_log_attack($ipaddress,$value1,$value);
|
120 |
-
if($attackCount>$limitAttack)
|
121 |
-
{
|
122 |
-
if(!$mowpnshandle->is_whitelisted($ipaddress))
|
123 |
-
{
|
124 |
-
if(!$mowpnshandle->mo_wpns_is_ip_blocked($ipaddress))
|
125 |
-
$mowpnshandle->mo_wpns_block_ip($ipaddress,'Attack limit Exceeded',true); //Attack Limit Exceed
|
126 |
-
}
|
127 |
-
}
|
128 |
-
|
129 |
-
header('HTTP/1.1 403 Forbidden');
|
130 |
-
include_once($errorPage);
|
131 |
-
exit;
|
132 |
-
}
|
133 |
-
}
|
134 |
-
}
|
135 |
-
}
|
136 |
-
}
|
137 |
-
}
|
138 |
-
}
|
139 |
-
}
|
140 |
-
}
|
141 |
-
|
142 |
-
function mo_wpns_apply_RateLimiting($reqLimit,$action,$ipaddress,$errorPage)
|
143 |
-
{
|
144 |
-
global $wpdb,$mowpnshandle;
|
145 |
-
$rate = mo_wpns_CheckRate($ipaddress);
|
146 |
-
if($rate>=$reqLimit)
|
147 |
-
{
|
148 |
-
$lastAttack = mo_wpns_getRLEAttack($ipaddress)+60;
|
149 |
-
$current_time = time();
|
150 |
-
if($lastAttack < $current_time-60)
|
151 |
-
{
|
152 |
-
mo_wpns_log_attack($ipaddress,'RLE','RLE');
|
153 |
-
}
|
154 |
-
if($action != 'ThrottleIP')
|
155 |
-
{
|
156 |
-
if(!$mowpnshandle->is_whitelisted($ipaddress))
|
157 |
-
{
|
158 |
-
$mowpnshandle->mo_wpns_block_ip($ipaddress,'RLE',true);
|
159 |
-
}
|
160 |
-
}
|
161 |
-
header('HTTP/1.1 403 Forbidden');
|
162 |
-
include_once($errorPage);
|
163 |
-
exit;
|
164 |
-
}
|
165 |
-
}
|
166 |
-
function mo_wpns_applyRateLimitingCrawler($ipaddress,$filename,$errorPage)
|
167 |
-
{
|
168 |
-
if(file_exists($filename))
|
169 |
-
{
|
170 |
-
include($filename);
|
171 |
-
}
|
172 |
-
global $wpdb,$mowpnshandle;
|
173 |
-
$USER_AGENT = isset($_SERVER['HTTP_USER_AGENT'])?sanitize_text_field($_SERVER['HTTP_USER_AGENT']):'';
|
174 |
-
if(isset($RateLimitingCrawler))
|
175 |
-
{
|
176 |
-
if($RateLimitingCrawler=='1')
|
177 |
-
{
|
178 |
-
if(isset($RequestsPMinCrawler))
|
179 |
-
{
|
180 |
-
$reqLimit = $RequestsPMinCrawler;
|
181 |
-
$rate = mo_wpns_CheckRate($ipaddress);
|
182 |
-
if($rate>=$reqLimit)
|
183 |
-
{
|
184 |
-
$action = $actionRateLCrawler;
|
185 |
-
$lastAttack = mo_wpns_getRLEattack($ipaddress)+60;
|
186 |
-
$current_time = time();
|
187 |
-
if($current_time>$lastAttack && sanitize_text_field($_SERVER['HTTP_USER_AGENT'])!='')
|
188 |
-
{
|
189 |
-
mo_wpns_log_attack($ipaddress,'RLECrawler',$USER_AGENT);
|
190 |
-
}
|
191 |
-
if($action != 'ThrottleIP')
|
192 |
-
{
|
193 |
-
if(!$mowpnshandle->is_whitelisted($ipaddress))
|
194 |
-
{
|
195 |
-
if(!$mowpnshandle->mo_wpns_is_ip_blocked($ipaddress))
|
196 |
-
{
|
197 |
-
$mowpnshandle->mo_wpns_block_ip($ipaddress,'RLECrawler',true);
|
198 |
-
}
|
199 |
-
}
|
200 |
-
}
|
201 |
-
header('HTTP/1.1 403 Forbidden');
|
202 |
-
include_once($errorPage);
|
203 |
-
exit;
|
204 |
-
}
|
205 |
-
}
|
206 |
-
}
|
207 |
-
}
|
208 |
-
}
|
209 |
-
|
210 |
-
|
211 |
-
|
212 |
?>
|
1 |
+
<?php
|
2 |
+
|
3 |
+
$dir = dirname(__FILE__);
|
4 |
+
$dir = str_replace('\\', "/", $dir);
|
5 |
+
$dir = explode('handler', $dir);
|
6 |
+
$wafInclude = $dir[0].'/handler/WAF/waf-include.php';
|
7 |
+
$pluginU = $dir[0].'helper/pluginUtility.php';
|
8 |
+
$wafDB = $dir[0].'/handler/WAF/database/mo-waf-plugin-db.php';
|
9 |
+
$errorPage = $dir[0].'handler/mo-error.html';
|
10 |
+
$blockPage = $dir[0].'handler/mo-block.html';
|
11 |
+
|
12 |
+
include_once($wafInclude);
|
13 |
+
include_once($pluginU);
|
14 |
+
include_once($wafDB);
|
15 |
+
|
16 |
+
|
17 |
+
global $wpdb,$mowpnshandle;
|
18 |
+
$mowpnshandle = new MoWpnsHandler();
|
19 |
+
$ipaddress = get_ipaddress();
|
20 |
+
$ipaddress = sanitize_text_field($ipaddress);
|
21 |
+
if($mowpnshandle->mo_wpns_is_ip_blocked($ipaddress))
|
22 |
+
{
|
23 |
+
if(!$mowpnshandle->is_whitelisted($ipaddress))
|
24 |
+
{
|
25 |
+
header('HTTP/1.1 403 Forbidden');
|
26 |
+
include_once($blockPage);
|
27 |
+
exit;
|
28 |
+
}
|
29 |
+
}
|
30 |
+
$fileName = mo_wpns_setting_file();
|
31 |
+
if($fileName != "notMissing")
|
32 |
+
{
|
33 |
+
include_once($fileName);
|
34 |
+
}
|
35 |
+
if(isset($RateLimiting) and $RateLimiting == 1)
|
36 |
+
{
|
37 |
+
if(!is_crawler())
|
38 |
+
{
|
39 |
+
mo_wpns_apply_RateLimiting($RequestsPMin,$actionRateL,$ipaddress,$errorPage);
|
40 |
+
}
|
41 |
+
}
|
42 |
+
if(isset($RateLimitingCrawler))
|
43 |
+
{
|
44 |
+
if($RateLimitingCrawler == 1)
|
45 |
+
{
|
46 |
+
if(is_crawler())
|
47 |
+
{
|
48 |
+
if(is_fake_googlebot($ipaddress))
|
49 |
+
{
|
50 |
+
header('HTTP/1.1 403 Forbidden');
|
51 |
+
include_once($errorPage);
|
52 |
+
exit;
|
53 |
+
}
|
54 |
+
if($RateLimitingCrawler == '1')
|
55 |
+
{
|
56 |
+
mo_wpns_applyRateLimitingCrawler($ipaddress,$fileName,$errorPage);
|
57 |
+
}
|
58 |
+
|
59 |
+
}
|
60 |
+
}
|
61 |
+
}
|
62 |
+
$attack = array();
|
63 |
+
if(isset($SQL) )
|
64 |
+
{
|
65 |
+
if($SQL==1)
|
66 |
+
array_push($attack,"SQL");
|
67 |
+
}
|
68 |
+
if(isset($XSS) )
|
69 |
+
{
|
70 |
+
if( $XSS==1)
|
71 |
+
array_push($attack,"XSS");
|
72 |
+
}
|
73 |
+
if(isset($LFI))
|
74 |
+
{
|
75 |
+
if($LFI==1)
|
76 |
+
array_push($attack,"LFI");
|
77 |
+
}
|
78 |
+
|
79 |
+
$attackC = $attack;
|
80 |
+
$ParanoiaLevel = 1;
|
81 |
+
$annomalyS = 0;
|
82 |
+
$SQLScore = 0;
|
83 |
+
$XSSScore = 0;
|
84 |
+
$limitAttack = get_option('limitAttack');
|
85 |
+
|
86 |
+
|
87 |
+
foreach ($attackC as $key1 => $value1)
|
88 |
+
{
|
89 |
+
for($lev=1;$lev<=$ParanoiaLevel;$lev++)
|
90 |
+
{
|
91 |
+
if(isset($regex[$value1][$lev]))
|
92 |
+
{ $ooo = 0;
|
93 |
+
for($i=0;$i<sizeof($regex[$value1][$lev]);$i++)
|
94 |
+
{
|
95 |
+
foreach ($_REQUEST as $key => $value) {
|
96 |
+
|
97 |
+
if($regex[$value1][$lev][$i] != "")
|
98 |
+
{
|
99 |
+
if(is_string($value))
|
100 |
+
{
|
101 |
+
if(preg_match($regex[$value1][$lev][$i], $value))
|
102 |
+
{
|
103 |
+
|
104 |
+
if($value1 == "SQL")
|
105 |
+
{
|
106 |
+
$SQLScore += $score[$value1][$lev][$i];
|
107 |
+
}
|
108 |
+
elseif ($value1 == "XSS")
|
109 |
+
{
|
110 |
+
$XSSScore += $score[$value1][$lev][$i];
|
111 |
+
}
|
112 |
+
else
|
113 |
+
{
|
114 |
+
$annomalyS += $score[$value1][$lev][$i];
|
115 |
+
}
|
116 |
+
|
117 |
+
if($annomalyS>=5 || $SQLScore>=10 || $XSSScore >=10)
|
118 |
+
{
|
119 |
+
$attackCount = mo_wpns_log_attack($ipaddress,$value1,$value);
|
120 |
+
if($attackCount>$limitAttack)
|
121 |
+
{
|
122 |
+
if(!$mowpnshandle->is_whitelisted($ipaddress))
|
123 |
+
{
|
124 |
+
if(!$mowpnshandle->mo_wpns_is_ip_blocked($ipaddress))
|
125 |
+
$mowpnshandle->mo_wpns_block_ip($ipaddress,'Attack limit Exceeded',true); //Attack Limit Exceed
|
126 |
+
}
|
127 |
+
}
|
128 |
+
|
129 |
+
header('HTTP/1.1 403 Forbidden');
|
130 |
+
include_once($errorPage);
|
131 |
+
exit;
|
132 |
+
}
|
133 |
+
}
|
134 |
+
}
|
135 |
+
}
|
136 |
+
}
|
137 |
+
}
|
138 |
+
}
|
139 |
+
}
|
140 |
+
}
|
141 |
+
|
142 |
+
function mo_wpns_apply_RateLimiting($reqLimit,$action,$ipaddress,$errorPage)
|
143 |
+
{
|
144 |
+
global $wpdb,$mowpnshandle;
|
145 |
+
$rate = mo_wpns_CheckRate($ipaddress);
|
146 |
+
if($rate>=$reqLimit)
|
147 |
+
{
|
148 |
+
$lastAttack = mo_wpns_getRLEAttack($ipaddress)+60;
|
149 |
+
$current_time = time();
|
150 |
+
if($lastAttack < $current_time-60)
|
151 |
+
{
|
152 |
+
mo_wpns_log_attack($ipaddress,'RLE','RLE');
|
153 |
+
}
|
154 |
+
if($action != 'ThrottleIP')
|
155 |
+
{
|
156 |
+
if(!$mowpnshandle->is_whitelisted($ipaddress))
|
157 |
+
{
|
158 |
+
$mowpnshandle->mo_wpns_block_ip($ipaddress,'RLE',true);
|
159 |
+
}
|
160 |
+
}
|
161 |
+
header('HTTP/1.1 403 Forbidden');
|
162 |
+
include_once($errorPage);
|
163 |
+
exit;
|
164 |
+
}
|
165 |
+
}
|
166 |
+
function mo_wpns_applyRateLimitingCrawler($ipaddress,$filename,$errorPage)
|
167 |
+
{
|
168 |
+
if(file_exists($filename))
|
169 |
+
{
|
170 |
+
include($filename);
|
171 |
+
}
|
172 |
+
global $wpdb,$mowpnshandle;
|
173 |
+
$USER_AGENT = isset($_SERVER['HTTP_USER_AGENT'])?sanitize_text_field($_SERVER['HTTP_USER_AGENT']):'';
|
174 |
+
if(isset($RateLimitingCrawler))
|
175 |
+
{
|
176 |
+
if($RateLimitingCrawler=='1')
|
177 |
+
{
|
178 |
+
if(isset($RequestsPMinCrawler))
|
179 |
+
{
|
180 |
+
$reqLimit = $RequestsPMinCrawler;
|
181 |
+
$rate = mo_wpns_CheckRate($ipaddress);
|
182 |
+
if($rate>=$reqLimit)
|
183 |
+
{
|
184 |
+
$action = $actionRateLCrawler;
|
185 |
+
$lastAttack = mo_wpns_getRLEattack($ipaddress)+60;
|
186 |
+
$current_time = time();
|
187 |
+
if($current_time>$lastAttack && sanitize_text_field($_SERVER['HTTP_USER_AGENT'])!='')
|
188 |
+
{
|
189 |
+
mo_wpns_log_attack($ipaddress,'RLECrawler',$USER_AGENT);
|
190 |
+
}
|
191 |
+
if($action != 'ThrottleIP')
|
192 |
+
{
|
193 |
+
if(!$mowpnshandle->is_whitelisted($ipaddress))
|
194 |
+
{
|
195 |
+
if(!$mowpnshandle->mo_wpns_is_ip_blocked($ipaddress))
|
196 |
+
{
|
197 |
+
$mowpnshandle->mo_wpns_block_ip($ipaddress,'RLECrawler',true);
|
198 |
+
}
|
199 |
+
}
|
200 |
+
}
|
201 |
+
header('HTTP/1.1 403 Forbidden');
|
202 |
+
include_once($errorPage);
|
203 |
+
exit;
|
204 |
+
}
|
205 |
+
}
|
206 |
+
}
|
207 |
+
}
|
208 |
+
}
|
209 |
+
|
210 |
+
|
211 |
+
|
212 |
?>
|
handler/WAF/mo-waf.php
CHANGED
@@ -1,207 +1,207 @@
|
|
1 |
-
<?php
|
2 |
-
$dir = dirname(__FILE__);
|
3 |
-
$dir = str_replace('\\', "/", $dir);
|
4 |
-
$dir = explode('WAF', $dir);
|
5 |
-
$wafInclude = $dir[0].'WAF/waf-include.php';
|
6 |
-
$wafdb = $dir[0].'WAF/database/mo-waf-db.php';
|
7 |
-
$errorPage = $dir[0].'mo-error.html';
|
8 |
-
$blockPage = $dir[0].'mo-block.html';
|
9 |
-
|
10 |
-
include_once($wafInclude);
|
11 |
-
include_once($wafdb);
|
12 |
-
|
13 |
-
global $dbcon,$prefix;
|
14 |
-
$connection = mo_wpns_dbconnection();
|
15 |
-
if($connection)
|
16 |
-
{
|
17 |
-
$wafLevel = mo_wpns_get_option_value('WAF');
|
18 |
-
if($wafLevel=='HtaccessLevel')
|
19 |
-
{
|
20 |
-
$ipaddress = get_ipaddress();
|
21 |
-
if(mo_wpns_is_ip_blocked($ipaddress))
|
22 |
-
{
|
23 |
-
if(!mo_wpns_is_ip_whitelisted($ipaddress))
|
24 |
-
{
|
25 |
-
header('HTTP/1.1 403 Forbidden');
|
26 |
-
include_once($blockPage);
|
27 |
-
exit;
|
28 |
-
}
|
29 |
-
}
|
30 |
-
$fileName = mo_wpns_setting_file();
|
31 |
-
|
32 |
-
if($fileName != 'notMissing')
|
33 |
-
{
|
34 |
-
include_once($fileName);
|
35 |
-
}
|
36 |
-
if(isset($RateLimiting) && $RateLimiting == 1)
|
37 |
-
{
|
38 |
-
if(!is_crawler())
|
39 |
-
{
|
40 |
-
if(isset($RequestsPMin) && isset($actionRateL))
|
41 |
-
mo_wpns_applyRateLimiting($RequestsPMin,$actionRateL,$ipaddress,$errorPage);
|
42 |
-
}
|
43 |
-
}
|
44 |
-
if(isset($RateLimitingCrawler) && $RateLimitingCrawler == 1)
|
45 |
-
{
|
46 |
-
if(is_crawler())
|
47 |
-
{
|
48 |
-
if(is_fake_googlebot($ipaddress))
|
49 |
-
{
|
50 |
-
header('HTTP/1.1 403 Forbidden');
|
51 |
-
include_once($errorPage);
|
52 |
-
exit;
|
53 |
-
}
|
54 |
-
if($RateLimitingCrawler == '1')
|
55 |
-
{
|
56 |
-
mo_wpns_applyRateLimitingCrawler($ipaddress,$fileName,$errorPage);
|
57 |
-
}
|
58 |
-
|
59 |
-
}
|
60 |
-
}
|
61 |
-
$attack = array();
|
62 |
-
if(isset($SQL) && $SQL==1)
|
63 |
-
{
|
64 |
-
array_push($attack,"SQL");
|
65 |
-
}
|
66 |
-
if(isset($XSS) && $XSS==1)
|
67 |
-
{
|
68 |
-
array_push($attack,"XSS");
|
69 |
-
}
|
70 |
-
if(isset($LFI) && $LFI==1)
|
71 |
-
{
|
72 |
-
array_push($attack,"LFI");
|
73 |
-
}
|
74 |
-
|
75 |
-
$attackC = $attack;
|
76 |
-
$ParanoiaLevel = 1;
|
77 |
-
$annomalyS = 0;
|
78 |
-
$SQLScore = 0;
|
79 |
-
$XSSScore = 0;
|
80 |
-
$limitAttack = mo_wpns_get_option_value("limitAttack");
|
81 |
-
|
82 |
-
foreach ($attackC as $key1 => $value1)
|
83 |
-
{
|
84 |
-
for($lev=1;$lev<=$ParanoiaLevel;$lev++)
|
85 |
-
{
|
86 |
-
if(isset($regex[$value1][$lev]))
|
87 |
-
{ $ooo = 0;
|
88 |
-
for($i=0;$i<sizeof($regex[$value1][$lev]);$i++)
|
89 |
-
{
|
90 |
-
foreach ($_REQUEST as $key => $value) {
|
91 |
-
|
92 |
-
if($regex[$value1][$lev][$i] != "")
|
93 |
-
{
|
94 |
-
if(is_string($value))
|
95 |
-
{
|
96 |
-
if(preg_match($regex[$value1][$lev][$i], $value))
|
97 |
-
{
|
98 |
-
|
99 |
-
if($value1 == "SQL")
|
100 |
-
{
|
101 |
-
$SQLScore += $score[$value1][$lev][$i];
|
102 |
-
}
|
103 |
-
elseif ($value1 == "XSS")
|
104 |
-
{
|
105 |
-
$XSSScore += $score[$value1][$lev][$i];
|
106 |
-
}
|
107 |
-
else
|
108 |
-
{
|
109 |
-
$annomalyS += $score[$value1][$lev][$i];
|
110 |
-
}
|
111 |
-
|
112 |
-
if($annomalyS>=5 || $SQLScore>=10 || $XSSScore >=10)
|
113 |
-
{
|
114 |
-
$attackCount = mo_wpns_log_attack($ipaddress,$value1,$value);
|
115 |
-
if($attackCount>$limitAttack)
|
116 |
-
{
|
117 |
-
if(!mo_wpns_is_ip_whitelisted($ipaddress))
|
118 |
-
{
|
119 |
-
mo_wpns_block_ip($ipaddress,'Attack limit Exceeded'); //Attack Limit Exceed
|
120 |
-
}
|
121 |
-
}
|
122 |
-
|
123 |
-
header('HTTP/1.1 403 Forbidden');
|
124 |
-
include_once($errorPage);
|
125 |
-
exit;
|
126 |
-
}
|
127 |
-
}
|
128 |
-
}
|
129 |
-
}
|
130 |
-
}
|
131 |
-
}
|
132 |
-
}
|
133 |
-
}
|
134 |
-
}
|
135 |
-
}
|
136 |
-
}
|
137 |
-
|
138 |
-
|
139 |
-
function mo_wpns_applyRateLimiting($reqLimit,$action,$ipaddress,$errorPage)
|
140 |
-
{
|
141 |
-
global $dbcon, $prefix;
|
142 |
-
$rate = mo_wpns_CheckRate($ipaddress);
|
143 |
-
if($rate>$reqLimit)
|
144 |
-
{
|
145 |
-
$lastAttack = mo_wpns_getRLEattack($ipaddress)+60;
|
146 |
-
$current_time = time();
|
147 |
-
if($current_time > $lastAttack)
|
148 |
-
{
|
149 |
-
mo_wpns_log_attack($ipaddress,'RLE','RLE');
|
150 |
-
}
|
151 |
-
if($action != 'ThrottleIP')
|
152 |
-
{
|
153 |
-
if(!mo_wpns_is_ip_whitelisted($ipaddress))
|
154 |
-
{
|
155 |
-
mo_wpns_block_ip($ipaddress,'RLE'); //Rate Limit Exceed
|
156 |
-
}
|
157 |
-
}
|
158 |
-
header('HTTP/1.1 403 Forbidden');
|
159 |
-
include_once($errorPage);
|
160 |
-
exit;
|
161 |
-
}
|
162 |
-
}
|
163 |
-
|
164 |
-
function mo_wpns_applyRateLimitingCrawler($ipaddress,$filename,$errorPage)
|
165 |
-
{
|
166 |
-
if(file_exists($filename))
|
167 |
-
{
|
168 |
-
include($filename);
|
169 |
-
}
|
170 |
-
global $dbcon,$prefix;
|
171 |
-
$USER_AGENT = sanitize_text_field($_SERVER['HTTP_USER_AGENT']);
|
172 |
-
if(isset($RateLimitingCrawler))
|
173 |
-
{
|
174 |
-
if(isset($RateLimitingCrawler) && $RateLimitingCrawler=='1')
|
175 |
-
{
|
176 |
-
if(isset($RequestsPMinCrawler) && isset($actionRateLCrawler) )
|
177 |
-
{
|
178 |
-
$reqLimit = $RequestsPMinCrawler;
|
179 |
-
$rate = mo_wpns_CheckRate($ipaddress);
|
180 |
-
if($rate>=$reqLimit)
|
181 |
-
{
|
182 |
-
$action = $actionRateLCrawler;
|
183 |
-
$lastAttack = mo_wpns_getRLEattack($ipaddress)+60;
|
184 |
-
$current_time = time();
|
185 |
-
if($current_time>$lastAttack)
|
186 |
-
{
|
187 |
-
mo_wpns_log_attack($ipaddress,'RLECrawler',$USER_AGENT);
|
188 |
-
}
|
189 |
-
if($action != 'ThrottleIP')
|
190 |
-
{
|
191 |
-
if(!mo_wpns_is_ip_whitelisted($ipaddress))
|
192 |
-
{
|
193 |
-
mo_wpns_block_ip($ipaddress,'RLECrawler'); //Rate Limit Exceed for Crawler
|
194 |
-
}
|
195 |
-
}
|
196 |
-
header('HTTP/1.1 403 Forbidden');
|
197 |
-
include_once($errorPage);
|
198 |
-
exit;
|
199 |
-
}
|
200 |
-
}
|
201 |
-
}
|
202 |
-
}
|
203 |
-
}
|
204 |
-
|
205 |
-
|
206 |
-
$dbcon->close();
|
207 |
?>
|
1 |
+
<?php
|
2 |
+
$dir = dirname(__FILE__);
|
3 |
+
$dir = str_replace('\\', "/", $dir);
|
4 |
+
$dir = explode('WAF', $dir);
|
5 |
+
$wafInclude = $dir[0].'WAF/waf-include.php';
|
6 |
+
$wafdb = $dir[0].'WAF/database/mo-waf-db.php';
|
7 |
+
$errorPage = $dir[0].'mo-error.html';
|
8 |
+
$blockPage = $dir[0].'mo-block.html';
|
9 |
+
|
10 |
+
include_once($wafInclude);
|
11 |
+
include_once($wafdb);
|
12 |
+
|
13 |
+
global $dbcon,$prefix;
|
14 |
+
$connection = mo_wpns_dbconnection();
|
15 |
+
if($connection)
|
16 |
+
{
|
17 |
+
$wafLevel = mo_wpns_get_option_value('WAF');
|
18 |
+
if($wafLevel=='HtaccessLevel')
|
19 |
+
{
|
20 |
+
$ipaddress = get_ipaddress();
|
21 |
+
if(mo_wpns_is_ip_blocked($ipaddress))
|
22 |
+
{
|
23 |
+
if(!mo_wpns_is_ip_whitelisted($ipaddress))
|
24 |
+
{
|
25 |
+
header('HTTP/1.1 403 Forbidden');
|
26 |
+
include_once($blockPage);
|
27 |
+
exit;
|
28 |
+
}
|
29 |
+
}
|
30 |
+
$fileName = mo_wpns_setting_file();
|
31 |
+
|
32 |
+
if($fileName != 'notMissing')
|
33 |
+
{
|
34 |
+
include_once($fileName);
|
35 |
+
}
|
36 |
+
if(isset($RateLimiting) && $RateLimiting == 1)
|
37 |
+
{
|
38 |
+
if(!is_crawler())
|
39 |
+
{
|
40 |
+
if(isset($RequestsPMin) && isset($actionRateL))
|
41 |
+
mo_wpns_applyRateLimiting($RequestsPMin,$actionRateL,$ipaddress,$errorPage);
|
42 |
+
}
|
43 |
+
}
|
44 |
+
if(isset($RateLimitingCrawler) && $RateLimitingCrawler == 1)
|
45 |
+
{
|
46 |
+
if(is_crawler())
|
47 |
+
{
|
48 |
+
if(is_fake_googlebot($ipaddress))
|
49 |
+
{
|
50 |
+
header('HTTP/1.1 403 Forbidden');
|
51 |
+
include_once($errorPage);
|
52 |
+
exit;
|
53 |
+
}
|
54 |
+
if($RateLimitingCrawler == '1')
|
55 |
+
{
|
56 |
+
mo_wpns_applyRateLimitingCrawler($ipaddress,$fileName,$errorPage);
|
57 |
+
}
|
58 |
+
|
59 |
+
}
|
60 |
+
}
|
61 |
+
$attack = array();
|
62 |
+
if(isset($SQL) && $SQL==1)
|
63 |
+
{
|
64 |
+
array_push($attack,"SQL");
|
65 |
+
}
|
66 |
+
if(isset($XSS) && $XSS==1)
|
67 |
+
{
|
68 |
+
array_push($attack,"XSS");
|
69 |
+
}
|
70 |
+
if(isset($LFI) && $LFI==1)
|
71 |
+
{
|
72 |
+
array_push($attack,"LFI");
|
73 |
+
}
|
74 |
+
|
75 |
+
$attackC = $attack;
|
76 |
+
$ParanoiaLevel = 1;
|
77 |
+
$annomalyS = 0;
|
78 |
+
$SQLScore = 0;
|
79 |
+
$XSSScore = 0;
|
80 |
+
$limitAttack = mo_wpns_get_option_value("limitAttack");
|
81 |
+
|
82 |
+
foreach ($attackC as $key1 => $value1)
|
83 |
+
{
|
84 |
+
for($lev=1;$lev<=$ParanoiaLevel;$lev++)
|
85 |
+
{
|
86 |
+
if(isset($regex[$value1][$lev]))
|
87 |
+
{ $ooo = 0;
|
88 |
+
for($i=0;$i<sizeof($regex[$value1][$lev]);$i++)
|
89 |
+
{
|
90 |
+
foreach ($_REQUEST as $key => $value) {
|
91 |
+
|
92 |
+
if($regex[$value1][$lev][$i] != "")
|
93 |
+
{
|
94 |
+
if(is_string($value))
|
95 |
+
{
|
96 |
+
if(preg_match($regex[$value1][$lev][$i], $value))
|
97 |
+
{
|
98 |
+
|
99 |
+
if($value1 == "SQL")
|
100 |
+
{
|
101 |
+
$SQLScore += $score[$value1][$lev][$i];
|
102 |
+
}
|
103 |
+
elseif ($value1 == "XSS")
|
104 |
+
{
|
105 |
+
$XSSScore += $score[$value1][$lev][$i];
|
106 |
+
}
|
107 |
+
else
|
108 |
+
{
|
109 |
+
$annomalyS += $score[$value1][$lev][$i];
|
110 |
+
}
|
111 |
+
|
112 |
+
if($annomalyS>=5 || $SQLScore>=10 || $XSSScore >=10)
|
113 |
+
{
|
114 |
+
$attackCount = mo_wpns_log_attack($ipaddress,$value1,$value);
|
115 |
+
if($attackCount>$limitAttack)
|
116 |
+
{
|
117 |
+
if(!mo_wpns_is_ip_whitelisted($ipaddress))
|
118 |
+
{
|
119 |
+
mo_wpns_block_ip($ipaddress,'Attack limit Exceeded'); //Attack Limit Exceed
|
120 |
+
}
|
121 |
+
}
|
122 |
+
|
123 |
+
header('HTTP/1.1 403 Forbidden');
|
124 |
+
include_once($errorPage);
|
125 |
+
exit;
|
126 |
+
}
|
127 |
+
}
|
128 |
+
}
|
129 |
+
}
|
130 |
+
}
|
131 |
+
}
|
132 |
+
}
|
133 |
+
}
|
134 |
+
}
|
135 |
+
}
|
136 |
+
}
|
137 |
+
|
138 |
+
|
139 |
+
function mo_wpns_applyRateLimiting($reqLimit,$action,$ipaddress,$errorPage)
|
140 |
+
{
|
141 |
+
global $dbcon, $prefix;
|
142 |
+
$rate = mo_wpns_CheckRate($ipaddress);
|
143 |
+
if($rate>$reqLimit)
|
144 |
+
{
|
145 |
+
$lastAttack = mo_wpns_getRLEattack($ipaddress)+60;
|
146 |
+
$current_time = time();
|
147 |
+
if($current_time > $lastAttack)
|
148 |
+
{
|
149 |
+
mo_wpns_log_attack($ipaddress,'RLE','RLE');
|
150 |
+
}
|
151 |
+
if($action != 'ThrottleIP')
|
152 |
+
{
|
153 |
+
if(!mo_wpns_is_ip_whitelisted($ipaddress))
|
154 |
+
{
|
155 |
+
mo_wpns_block_ip($ipaddress,'RLE'); //Rate Limit Exceed
|
156 |
+
}
|
157 |
+
}
|
158 |
+
header('HTTP/1.1 403 Forbidden');
|
159 |
+
include_once($errorPage);
|
160 |
+
exit;
|
161 |
+
}
|
162 |
+
}
|
163 |
+
|
164 |
+
function mo_wpns_applyRateLimitingCrawler($ipaddress,$filename,$errorPage)
|
165 |
+
{
|
166 |
+
if(file_exists($filename))
|
167 |
+
{
|
168 |
+
include($filename);
|
169 |
+
}
|
170 |
+
global $dbcon,$prefix;
|
171 |
+
$USER_AGENT = sanitize_text_field($_SERVER['HTTP_USER_AGENT']);
|
172 |
+
if(isset($RateLimitingCrawler))
|
173 |
+
{
|
174 |
+
if(isset($RateLimitingCrawler) && $RateLimitingCrawler=='1')
|
175 |
+
{
|
176 |
+
if(isset($RequestsPMinCrawler) && isset($actionRateLCrawler) )
|
177 |
+
{
|
178 |
+
$reqLimit = $RequestsPMinCrawler;
|
179 |
+
$rate = mo_wpns_CheckRate($ipaddress);
|
180 |
+
if($rate>=$reqLimit)
|
181 |
+
{
|
182 |
+
$action = $actionRateLCrawler;
|
183 |
+
$lastAttack = mo_wpns_getRLEattack($ipaddress)+60;
|
184 |
+
$current_time = time();
|
185 |
+
if($current_time>$lastAttack)
|
186 |
+
{
|
187 |
+
mo_wpns_log_attack($ipaddress,'RLECrawler',$USER_AGENT);
|
188 |
+
}
|
189 |
+
if($action != 'ThrottleIP')
|
190 |
+
{
|
191 |
+
if(!mo_wpns_is_ip_whitelisted($ipaddress))
|
192 |
+
{
|
193 |
+
mo_wpns_block_ip($ipaddress,'RLECrawler'); //Rate Limit Exceed for Crawler
|
194 |
+
}
|
195 |
+
}
|
196 |
+
header('HTTP/1.1 403 Forbidden');
|
197 |
+
include_once($errorPage);
|
198 |
+
exit;
|
199 |
+
}
|
200 |
+
}
|
201 |
+
}
|
202 |
+
}
|
203 |
+
}
|
204 |
+
|
205 |
+
|
206 |
+
$dbcon->close();
|
207 |
?>
|
handler/backup.php
CHANGED
@@ -1,322 +1,322 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
class MoBackupSite{
|
4 |
-
|
5 |
-
function __construct()
|
6 |
-
{
|
7 |
-
add_filter( 'cron_schedules', array($this,'db_eb_backup_interval'));
|
8 |
-
add_action( 'mo_eb_bl_cron_hook', array($this,'db_cron_backup') );
|
9 |
-
add_filter( 'cron_schedules', array($this,'file_eb_backup_interval'));
|
10 |
-
add_action( 'mo_eb_file_cron_hook', array($this,'file_cron_backup') );
|
11 |
-
}
|
12 |
-
|
13 |
-
function db_cron_backup(){
|
14 |
-
|
15 |
-
$obj = new MoBackupSite;
|
16 |
-
$obj->backupDB();
|
17 |
-
|
18 |
-
}
|
19 |
-
|
20 |
-
function db_eb_backup_interval($schedules){
|
21 |
-
$mo2f_cron_hours = MoWpnsUtility::get_mo2f_db_option('mo_wpns_backup_time', 'site_option')*3600;
|
22 |
-
$schedules['db_eb_backup_time'] = array(
|
23 |
-
'interval' => $mo2f_cron_hours,
|
24 |
-
'display' => esc_html__( 'Cron Activated' ),
|
25 |
-
);
|
26 |
-
return $schedules;
|
27 |
-
}
|
28 |
-
|
29 |
-
function bl_deactivate() {
|
30 |
-
$timestamp = wp_next_scheduled( 'mo_eb_bl_cron_hook' );
|
31 |
-
wp_unschedule_event( $timestamp, 'mo_eb_bl_cron_hook' );
|
32 |
-
}
|
33 |
-
|
34 |
-
function file_cron_backup(){
|
35 |
-
$backup_store_path = wp_upload_dir();
|
36 |
-
$backup_store_path = $backup_store_path['basedir'].DIRECTORY_SEPARATOR;
|
37 |
-
$time = time();
|
38 |
-
update_site_option('backup_created_time',$time);
|
39 |
-
|
40 |
-
if(MoWpnsUtility::get_mo2f_db_option('mo_file_backup_plugins', 'site_option') =='1'){
|
41 |
-
$this->plugin_backup($backup_store_path, $time);
|
42 |
-
}
|
43 |
-
if(MoWpnsUtility::get_mo2f_db_option('mo_file_backup_themes','site_option') =='1'){
|
44 |
-
$this->themes_backup($backup_store_path ,$time);
|
45 |
-
}
|
46 |
-
|
47 |
-
if(get_site_option('mo_file_backup_wp_files') == '1'){
|
48 |
-
$this->wpfiles_backup($backup_store_path, $time);
|
49 |
-
}
|
50 |
-
update_site_option('backup_notification_option',1);
|
51 |
-
}
|
52 |
-
|
53 |
-
function file_manual_backup(){
|
54 |
-
$backup_store_path = wp_upload_dir();
|
55 |
-
$backup_store_path = $backup_store_path['basedir'].DIRECTORY_SEPARATOR;
|
56 |
-
$time = time();
|
57 |
-
update_site_option('backup_created_time',$time);
|
58 |
-
|
59 |
-
if(MoWpnsUtility::get_mo2f_db_option('mo_file_manual_backup_plugins', 'site_option') =='1'){
|
60 |
-
// if(get_option('mo_file_manual_backup_plugins') =='1'){
|
61 |
-
$this->plugin_backup($backup_store_path, $time);
|
62 |
-
}
|
63 |
-
if(MoWpnsUtility::get_mo2f_db_option('mo_file_manual_backup_themes', 'site_option') =='1'){
|
64 |
-
// if(get_option('mo_file_manual_backup_themes') =='1'){
|
65 |
-
$this->themes_backup($backup_store_path ,$time);
|
66 |
-
}
|
67 |
-
|
68 |
-
if(get_site_option('mo_file_manual_backup_wp_files') == '1'){
|
69 |
-
$this->wpfiles_backup($backup_store_path, $time);
|
70 |
-
}
|
71 |
-
update_site_option('backup_notification_option',1);
|
72 |
-
}
|
73 |
-
|
74 |
-
function file_eb_backup_interval($schedules){
|
75 |
-
$mo2f_cron_file_backup_hours = MoWpnsUtility::get_mo2f_db_option('mo_wpns_backup_time', 'site_option')*3600;
|
76 |
-
$schedules['file_eb_backup_time'] = array(
|
77 |
-
'interval' => $mo2f_cron_file_backup_hours,
|
78 |
-
'display' => esc_html__( 'Cron Activated' ),
|
79 |
-
);
|
80 |
-
return $schedules;
|
81 |
-
}
|
82 |
-
|
83 |
-
function file_backup_deactivate(){
|
84 |
-
$timestamp = wp_next_scheduled( 'mo_eb_file_cron_hook' );
|
85 |
-
wp_unschedule_event( $timestamp, 'mo_eb_file_cron_hook' );
|
86 |
-
}
|
87 |
-
|
88 |
-
function plugin_backup($backup_store_path, $time){
|
89 |
-
global $wpnsDbQueries;
|
90 |
-
$this->mkdirectory('plugins');
|
91 |
-
$real_path= WP_PLUGIN_DIR;
|
92 |
-
$backup_path =$backup_store_path.'miniorangebackup'.DIRECTORY_SEPARATOR.'file-backups'.DIRECTORY_SEPARATOR.'plugins';
|
93 |
-
$filename = 'miniorange-plugins-backup-'.$time.'.zip';
|
94 |
-
$this->file_backup($real_path,$filename,'plugins');
|
95 |
-
$wpnsDbQueries->insert_backup_detail(MoWpnsConstants::PLUGIN,$filename,$time,$backup_path);
|
96 |
-
}
|
97 |
-
|
98 |
-
function themes_backup($backup_store_path ,$time){
|
99 |
-
global $wpnsDbQueries;
|
100 |
-
$this->mkdirectory('themes');
|
101 |
-
$real_path= get_theme_root();
|
102 |
-
$backup_path =$backup_store_path.'miniorangebackup'.DIRECTORY_SEPARATOR.'file-backups'.DIRECTORY_SEPARATOR.'themes';
|
103 |
-
$filename = 'miniorange-themes-backup-'.$time.'.zip';
|
104 |
-
$this->file_backup($real_path,$filename,'themes');
|
105 |
-
$wpnsDbQueries->insert_backup_detail(MoWpnsConstants::THEMES,$filename,$time,$backup_path);
|
106 |
-
|
107 |
-
}
|
108 |
-
|
109 |
-
function wpfiles_backup($backup_store_path, $time){
|
110 |
-
global $wpnsDbQueries;
|
111 |
-
$this->mkdirectory('wp_files');
|
112 |
-
$homepath = get_home_path();
|
113 |
-
$real_path= $homepath;
|
114 |
-
$backup_path =$backup_store_path.'miniorangebackup'.DIRECTORY_SEPARATOR.'file-backups'.DIRECTORY_SEPARATOR.'wp_files';
|
115 |
-
$filename = 'miniorange-wpfiles-backup-'.$time.'.zip';
|
116 |
-
$this->file_backup($real_path,$filename, 'wp_files');
|
117 |
-
$wpnsDbQueries->insert_backup_detail(MoWpnsConstants::WPFILES,$filename,$time,$backup_path);
|
118 |
-
}
|
119 |
-
|
120 |
-
function mkdirectory($foldername){
|
121 |
-
|
122 |
-
$homepath = wp_upload_dir();
|
123 |
-
$homepath = $homepath['basedir'].DIRECTORY_SEPARATOR;
|
124 |
-
if(!is_writable($homepath)){
|
125 |
-
wp_send_json('not_writable');
|
126 |
-
return;
|
127 |
-
}
|
128 |
-
|
129 |
-
|
130 |
-
$basepath = $homepath;
|
131 |
-
if(!file_exists($basepath."miniorangebackup")){
|
132 |
-
mkdir($basepath."miniorangebackup");
|
133 |
-
}
|
134 |
-
|
135 |
-
$basepath = $homepath.'miniorangebackup'.DIRECTORY_SEPARATOR;
|
136 |
-
$this-> create_index_file($basepath);
|
137 |
-
|
138 |
-
if(!file_exists($basepath.'file-backups')){
|
139 |
-
mkdir($basepath.'file-backups');
|
140 |
-
}
|
141 |
-
|
142 |
-
$basepath = $homepath.'miniorangebackup'.DIRECTORY_SEPARATOR.'file-backups'.DIRECTORY_SEPARATOR;
|
143 |
-
if(!file_exists($basepath.$foldername)){
|
144 |
-
mkdir($basepath.$foldername);
|
145 |
-
}
|
146 |
-
|
147 |
-
}
|
148 |
-
|
149 |
-
function create_index_file($folder_path){
|
150 |
-
|
151 |
-
$html_path=$folder_path."index.html";
|
152 |
-
$htaccess_path= $folder_path.".htaccess";
|
153 |
-
|
154 |
-
if(!file_exists($html_path)){
|
155 |
-
$f = fopen($html_path, "a");
|
156 |
-
fwrite($f, '<html><body><a href="https://security.miniorange.com/" target="_blank">WordPress backups by miniorange</a></body></html>');
|
157 |
-
fclose($f);
|
158 |
-
}
|
159 |
-
if(!file_exists($htaccess_path)){
|
160 |
-
$f = fopen($htaccess_path, "a");
|
161 |
-
fwrite($f, "deny from all");
|
162 |
-
fclose($f);
|
163 |
-
}
|
164 |
-
}
|
165 |
-
|
166 |
-
|
167 |
-
function file_backup($real_path, $filename, $foldername){
|
168 |
-
ini_set('max_execution_time', 0);
|
169 |
-
$backup_store_path = wp_upload_dir();
|
170 |
-
$backup_store_path = $backup_store_path['basedir'].DIRECTORY_SEPARATOR.'miniorangebackup'.DIRECTORY_SEPARATOR.'file-backups'.DIRECTORY_SEPARATOR;
|
171 |
-
$rootPath = realpath($real_path);
|
172 |
-
$zip = new ZipArchive();
|
173 |
-
$res = $zip->open($backup_store_path.$foldername.DIRECTORY_SEPARATOR.$filename, ZipArchive::CREATE | ZipArchive::OVERWRITE);
|
174 |
-
|
175 |
-
$files = new RecursiveIteratorIterator(
|
176 |
-
new RecursiveDirectoryIterator($rootPath),
|
177 |
-
RecursiveIteratorIterator::LEAVES_ONLY
|
178 |
-
);
|
179 |
-
foreach ($files as $name => $file)
|
180 |
-
{
|
181 |
-
if (!$file->isDir())
|
182 |
-
{
|
183 |
-
$filePath = $file->getRealPath();
|
184 |
-
$relativePath = substr($filePath, strlen($rootPath) + 1);
|
185 |
-
if(strpos($relativePath, 'miniorangebackup')!== false ){}
|
186 |
-
else{
|
187 |
-
$zip->addFile($filePath, $relativePath);
|
188 |
-
}
|
189 |
-
}
|
190 |
-
}
|
191 |
-
$zip->close();
|
192 |
-
}
|
193 |
-
|
194 |
-
|
195 |
-
function backupDB(){
|
196 |
-
|
197 |
-
if ( function_exists('memory_get_usage') && ( (int) ini_get('memory_limit') < 128 ) ){
|
198 |
-
ini_set('memory_limit', '128M' );
|
199 |
-
do_action('mo_eb_show_message',MoBackupMessages::showMessage('DB_MEMORY_LIMIT'),'SUCCESS');
|
200 |
-
}
|
201 |
-
|
202 |
-
$backup_store_path = wp_upload_dir();
|
203 |
-
$backup_store_path = $backup_store_path['basedir'].DIRECTORY_SEPARATOR;
|
204 |
-
|
205 |
-
if(!is_writable($backup_store_path)){
|
206 |
-
wp_send_json('not_writable');
|
207 |
-
return;
|
208 |
-
}
|
209 |
-
global $wpdb;
|
210 |
-
$tables = $wpdb->get_results("SHOW TABLES", ARRAY_N);
|
211 |
-
$nooftables = count($tables);
|
212 |
-
$query = "";
|
213 |
-
$tableswithfk = array();
|
214 |
-
$tableswithoutfk= array();
|
215 |
-
|
216 |
-
foreach($tables as $table)
|
217 |
-
{
|
218 |
-
if(is_array($table))
|
219 |
-
$table = $table[0];
|
220 |
-
$createtable = $wpdb->get_results("SHOW CREATE TABLE $table", ARRAY_A);
|
221 |
-
if(!empty($createtable[0]))
|
222 |
-
{
|
223 |
-
$createquery = $createtable[0]['Create Table'];
|
224 |
-
if (strpos($createquery, 'FOREIGN KEY') !== false)
|
225 |
-
array_push($tableswithfk,$table);
|
226 |
-
else
|
227 |
-
array_push($tableswithoutfk, $table);
|
228 |
-
}
|
229 |
-
}
|
230 |
-
|
231 |
-
$query .= $this->get_table_query($query,$tableswithoutfk);
|
232 |
-
|
233 |
-
$query .= $this->get_table_query($query,$tableswithfk);
|
234 |
-
|
235 |
-
$fileName = $this->create_db_backup_file($query);
|
236 |
-
wp_send_json('created_backup');
|
237 |
-
}
|
238 |
-
|
239 |
-
function get_table_query($query,$tables)
|
240 |
-
{
|
241 |
-
|
242 |
-
global $wpdb;
|
243 |
-
foreach($tables as $table)
|
244 |
-
{
|
245 |
-
$createtable = $wpdb->get_results("SHOW CREATE TABLE $table", ARRAY_A);
|
246 |
-
if(!empty($createtable[0]))
|
247 |
-
{
|
248 |
-
$createquery = $createtable[0]['Create Table'];
|
249 |
-
$query .= 'DROP TABLE IF EXISTS '.$table.";\n";
|
250 |
-
$query .= $createquery.";\n\n";
|
251 |
-
$data = $wpdb->get_results("SELECT * FROM $table", ARRAY_A);
|
252 |
-
foreach($data as $record)
|
253 |
-
{
|
254 |
-
if(count($record)>0)
|
255 |
-
{
|
256 |
-
$query.= 'INSERT INTO '.$table.' VALUES(';
|
257 |
-
$i=0;
|
258 |
-
foreach($record as $key=>$value)
|
259 |
-
{
|
260 |
-
$value = addslashes($value);
|
261 |
-
if (isset($value))
|
262 |
-
$query.= '"'.$value.'"' ;
|
263 |
-
else
|
264 |
-
$query.= '""';
|
265 |
-
if ($i < (count($record)-1)) { $query.= ','; }
|
266 |
-
$i++;
|
267 |
-
}
|
268 |
-
$query.= ");\n";
|
269 |
-
}
|
270 |
-
}
|
271 |
-
$query.="\n\n";
|
272 |
-
}
|
273 |
-
}
|
274 |
-
return $query;
|
275 |
-
}
|
276 |
-
|
277 |
-
function create_db_backup_file($data)
|
278 |
-
{
|
279 |
-
|
280 |
-
global $wpnsDbQueries;
|
281 |
-
$time = time();
|
282 |
-
$backup_store_path = wp_upload_dir();
|
283 |
-
$backup_store_path = $backup_store_path['basedir'].DIRECTORY_SEPARATOR;
|
284 |
-
if(!file_exists($backup_store_path."miniorangebackup")){
|
285 |
-
mkdir($backup_store_path."miniorangebackup");
|
286 |
-
}
|
287 |
-
$basepath = $backup_store_path.'miniorangebackup'.DIRECTORY_SEPARATOR;
|
288 |
-
$handler_obj = new MoBackupSite;
|
289 |
-
$handler_obj->create_index_file($basepath);
|
290 |
-
if(!file_exists($basepath.'db-backups')){
|
291 |
-
mkdir($basepath.'db-backups');
|
292 |
-
}
|
293 |
-
|
294 |
-
$backup_path = $basepath.'db-backups';
|
295 |
-
$filename = 'miniorange-db-backup-'.$time.'.sql';
|
296 |
-
$basepath = $basepath.'db-backups';
|
297 |
-
$handle = fopen($basepath.DIRECTORY_SEPARATOR.$filename,'w+');
|
298 |
-
fwrite($handle,$data);
|
299 |
-
fclose($handle);
|
300 |
-
$filezipname = $this->barfw_create_database_backup_zip_file($filename,$time);
|
301 |
-
$zip_path = $basepath.DIRECTORY_SEPARATOR.$filename;
|
302 |
-
unlink($zip_path);
|
303 |
-
$wpnsDbQueries->insert_backup_detail(MoWpnsConstants::DATABASE,$filezipname,$time,$backup_path);
|
304 |
-
return $filename;
|
305 |
-
}
|
306 |
-
|
307 |
-
function barfw_create_database_backup_zip_file($filename,$time){
|
308 |
-
$backup_store_path = wp_upload_dir();
|
309 |
-
$backup_store_path = $backup_store_path['basedir'].DIRECTORY_SEPARATOR.'miniorangebackup'.DIRECTORY_SEPARATOR.'db-backups'.DIRECTORY_SEPARATOR;
|
310 |
-
|
311 |
-
$filezipname = 'miniorange-db-backup-'.$time.'.zip';
|
312 |
-
$zip = new ZipArchive();
|
313 |
-
$res = $zip->open($backup_store_path.DIRECTORY_SEPARATOR.$filezipname, ZipArchive::CREATE | ZipArchive::OVERWRITE);
|
314 |
-
$filePath = $backup_store_path.$filename;
|
315 |
-
$relativePath = $filename;
|
316 |
-
$zip->addFile($filePath, $relativePath);
|
317 |
-
|
318 |
-
$zip->close();
|
319 |
-
return $filezipname;
|
320 |
-
}
|
321 |
-
|
322 |
}new MoBackupSite;
|
1 |
+
<?php
|
2 |
+
|
3 |
+
class MoBackupSite{
|
4 |
+
|
5 |
+
function __construct()
|
6 |
+
{
|
7 |
+
add_filter( 'cron_schedules', array($this,'db_eb_backup_interval'));
|
8 |
+
add_action( 'mo_eb_bl_cron_hook', array($this,'db_cron_backup') );
|
9 |
+
add_filter( 'cron_schedules', array($this,'file_eb_backup_interval'));
|
10 |
+
add_action( 'mo_eb_file_cron_hook', array($this,'file_cron_backup') );
|
11 |
+
}
|
12 |
+
|
13 |
+
function db_cron_backup(){
|
14 |
+
|
15 |
+
$obj = new MoBackupSite;
|
16 |
+
$obj->backupDB();
|
17 |
+
|
18 |
+
}
|
19 |
+
|
20 |
+
function db_eb_backup_interval($schedules){
|
21 |
+
$mo2f_cron_hours = MoWpnsUtility::get_mo2f_db_option('mo_wpns_backup_time', 'site_option')*3600;
|
22 |
+
$schedules['db_eb_backup_time'] = array(
|
23 |
+
'interval' => $mo2f_cron_hours,
|
24 |
+
'display' => esc_html__( 'Cron Activated' ),
|
25 |
+
);
|
26 |
+
return $schedules;
|
27 |
+
}
|
28 |
+
|
29 |
+
function bl_deactivate() {
|
30 |
+
$timestamp = wp_next_scheduled( 'mo_eb_bl_cron_hook' );
|
31 |
+
wp_unschedule_event( $timestamp, 'mo_eb_bl_cron_hook' );
|
32 |
+
}
|
33 |
+
|
34 |
+
function file_cron_backup(){
|
35 |
+
$backup_store_path = wp_upload_dir();
|
36 |
+
$backup_store_path = $backup_store_path['basedir'].DIRECTORY_SEPARATOR;
|
37 |
+
$time = time();
|
38 |
+
update_site_option('backup_created_time',$time);
|
39 |
+
|
40 |
+
if(MoWpnsUtility::get_mo2f_db_option('mo_file_backup_plugins', 'site_option') =='1'){
|
41 |
+
$this->plugin_backup($backup_store_path, $time);
|
42 |
+
}
|
43 |
+
if(MoWpnsUtility::get_mo2f_db_option('mo_file_backup_themes','site_option') =='1'){
|
44 |
+
$this->themes_backup($backup_store_path ,$time);
|
45 |
+
}
|
46 |
+
|
47 |
+
if(get_site_option('mo_file_backup_wp_files') == '1'){
|
48 |
+
$this->wpfiles_backup($backup_store_path, $time);
|
49 |
+
}
|
50 |
+
update_site_option('backup_notification_option',1);
|
51 |
+
}
|
52 |
+
|
53 |
+
function file_manual_backup(){
|
54 |
+
$backup_store_path = wp_upload_dir();
|
55 |
+
$backup_store_path = $backup_store_path['basedir'].DIRECTORY_SEPARATOR;
|
56 |
+
$time = time();
|
57 |
+
update_site_option('backup_created_time',$time);
|
58 |
+
|
59 |
+
if(MoWpnsUtility::get_mo2f_db_option('mo_file_manual_backup_plugins', 'site_option') =='1'){
|
60 |
+
// if(get_option('mo_file_manual_backup_plugins') =='1'){
|
61 |
+
$this->plugin_backup($backup_store_path, $time);
|
62 |
+
}
|
63 |
+
if(MoWpnsUtility::get_mo2f_db_option('mo_file_manual_backup_themes', 'site_option') =='1'){
|
64 |
+
// if(get_option('mo_file_manual_backup_themes') =='1'){
|
65 |
+
$this->themes_backup($backup_store_path ,$time);
|
66 |
+
}
|
67 |
+
|
68 |
+
if(get_site_option('mo_file_manual_backup_wp_files') == '1'){
|
69 |
+
$this->wpfiles_backup($backup_store_path, $time);
|
70 |
+
}
|
71 |
+
update_site_option('backup_notification_option',1);
|
72 |
+
}
|
73 |
+
|
74 |
+
function file_eb_backup_interval($schedules){
|
75 |
+
$mo2f_cron_file_backup_hours = MoWpnsUtility::get_mo2f_db_option('mo_wpns_backup_time', 'site_option')*3600;
|
76 |
+
$schedules['file_eb_backup_time'] = array(
|
77 |
+
'interval' => $mo2f_cron_file_backup_hours,
|
78 |
+
'display' => esc_html__( 'Cron Activated' ),
|
79 |
+
);
|
80 |
+
return $schedules;
|
81 |
+
}
|
82 |
+
|
83 |
+
function file_backup_deactivate(){
|
84 |
+
$timestamp = wp_next_scheduled( 'mo_eb_file_cron_hook' );
|
85 |
+
wp_unschedule_event( $timestamp, 'mo_eb_file_cron_hook' );
|
86 |
+
}
|
87 |
+
|
88 |
+
function plugin_backup($backup_store_path, $time){
|
89 |
+
global $wpnsDbQueries;
|
90 |
+
$this->mkdirectory('plugins');
|
91 |
+
$real_path= WP_PLUGIN_DIR;
|
92 |
+
$backup_path =$backup_store_path.'miniorangebackup'.DIRECTORY_SEPARATOR.'file-backups'.DIRECTORY_SEPARATOR.'plugins';
|
93 |
+
$filename = 'miniorange-plugins-backup-'.$time.'.zip';
|
94 |
+
$this->file_backup($real_path,$filename,'plugins');
|
95 |
+
$wpnsDbQueries->insert_backup_detail(MoWpnsConstants::PLUGIN,$filename,$time,$backup_path);
|
96 |
+
}
|
97 |
+
|
98 |
+
function themes_backup($backup_store_path ,$time){
|
99 |
+
global $wpnsDbQueries;
|
100 |
+
$this->mkdirectory('themes');
|
101 |
+
$real_path= get_theme_root();
|
102 |
+
$backup_path =$backup_store_path.'miniorangebackup'.DIRECTORY_SEPARATOR.'file-backups'.DIRECTORY_SEPARATOR.'themes';
|
103 |
+
$filename = 'miniorange-themes-backup-'.$time.'.zip';
|
104 |
+
$this->file_backup($real_path,$filename,'themes');
|
105 |
+
$wpnsDbQueries->insert_backup_detail(MoWpnsConstants::THEMES,$filename,$time,$backup_path);
|
106 |
+
|
107 |
+
}
|
108 |
+
|
109 |
+
function wpfiles_backup($backup_store_path, $time){
|
110 |
+
global $wpnsDbQueries;
|
111 |
+
$this->mkdirectory('wp_files');
|
112 |
+
$homepath = get_home_path();
|
113 |
+
$real_path= $homepath;
|
114 |
+
$backup_path =$backup_store_path.'miniorangebackup'.DIRECTORY_SEPARATOR.'file-backups'.DIRECTORY_SEPARATOR.'wp_files';
|
115 |
+
$filename = 'miniorange-wpfiles-backup-'.$time.'.zip';
|
116 |
+
$this->file_backup($real_path,$filename, 'wp_files');
|
117 |
+
$wpnsDbQueries->insert_backup_detail(MoWpnsConstants::WPFILES,$filename,$time,$backup_path);
|
118 |
+
}
|
119 |
+
|
120 |
+
function mkdirectory($foldername){
|
121 |
+
|
122 |
+
$homepath = wp_upload_dir();
|
123 |
+
$homepath = $homepath['basedir'].DIRECTORY_SEPARATOR;
|
124 |
+
if(!is_writable($homepath)){
|
125 |
+
wp_send_json('not_writable');
|
126 |
+
return;
|
127 |
+
}
|
128 |
+
|
129 |
+
|
130 |
+
$basepath = $homepath;
|
131 |
+
if(!file_exists($basepath."miniorangebackup")){
|
132 |
+
mkdir($basepath."miniorangebackup");
|
133 |
+
}
|
134 |
+
|
135 |
+
$basepath = $homepath.'miniorangebackup'.DIRECTORY_SEPARATOR;
|
136 |
+
$this-> create_index_file($basepath);
|
137 |
+
|
138 |
+
if(!file_exists($basepath.'file-backups')){
|
139 |
+
mkdir($basepath.'file-backups');
|
140 |
+
}
|
141 |
+
|
142 |
+
$basepath = $homepath.'miniorangebackup'.DIRECTORY_SEPARATOR.'file-backups'.DIRECTORY_SEPARATOR;
|
143 |
+
if(!file_exists($basepath.$foldername)){
|
144 |
+
mkdir($basepath.$foldername);
|
145 |
+
}
|
146 |
+
|
147 |
+
}
|
148 |
+
|
149 |
+
function create_index_file($folder_path){
|
150 |
+
|
151 |
+
$html_path=$folder_path."index.html";
|
152 |
+
$htaccess_path= $folder_path.".htaccess";
|
153 |
+
|
154 |
+
if(!file_exists($html_path)){
|
155 |
+
$f = fopen($html_path, "a");
|
156 |
+
fwrite($f, '<html><body><a href="https://security.miniorange.com/" target="_blank">WordPress backups by miniorange</a></body></html>');
|
157 |
+
fclose($f);
|
158 |
+
}
|
159 |
+
if(!file_exists($htaccess_path)){
|
160 |
+
$f = fopen($htaccess_path, "a");
|
161 |
+
fwrite($f, "deny from all");
|
162 |
+
fclose($f);
|
163 |
+
}
|
164 |
+
}
|
165 |
+
|
166 |
+
|
167 |
+
function file_backup($real_path, $filename, $foldername){
|
168 |
+
ini_set('max_execution_time', 0);
|
169 |
+
$backup_store_path = wp_upload_dir();
|
170 |
+
$backup_store_path = $backup_store_path['basedir'].DIRECTORY_SEPARATOR.'miniorangebackup'.DIRECTORY_SEPARATOR.'file-backups'.DIRECTORY_SEPARATOR;
|
171 |
+
$rootPath = realpath($real_path);
|
172 |
+
$zip = new ZipArchive();
|
173 |
+
$res = $zip->open($backup_store_path.$foldername.DIRECTORY_SEPARATOR.$filename, ZipArchive::CREATE | ZipArchive::OVERWRITE);
|
174 |
+
|
175 |
+
$files = new RecursiveIteratorIterator(
|
176 |
+
new RecursiveDirectoryIterator($rootPath),
|
177 |
+
RecursiveIteratorIterator::LEAVES_ONLY
|
178 |
+
);
|
179 |
+
foreach ($files as $name => $file)
|
180 |
+
{
|
181 |
+
if (!$file->isDir())
|
182 |
+
{
|
183 |
+
$filePath = $file->getRealPath();
|
184 |
+
$relativePath = substr($filePath, strlen($rootPath) + 1);
|
185 |
+
if(strpos($relativePath, 'miniorangebackup')!== false ){}
|
186 |
+
else{
|
187 |
+
$zip->addFile($filePath, $relativePath);
|
188 |
+
}
|
189 |
+
}
|
190 |
+
}
|
191 |
+
$zip->close();
|
192 |
+
}
|
193 |
+
|
194 |
+
|
195 |
+
function backupDB(){
|
196 |
+
|
197 |
+
if ( function_exists('memory_get_usage') && ( (int) ini_get('memory_limit') < 128 ) ){
|
198 |
+
ini_set('memory_limit', '128M' );
|
199 |
+
do_action('mo_eb_show_message',MoBackupMessages::showMessage('DB_MEMORY_LIMIT'),'SUCCESS');
|
200 |
+
}
|
201 |
+
|
202 |
+
$backup_store_path = wp_upload_dir();
|
203 |
+
$backup_store_path = $backup_store_path['basedir'].DIRECTORY_SEPARATOR;
|
204 |
+
|
205 |
+
if(!is_writable($backup_store_path)){
|
206 |
+
wp_send_json('not_writable');
|
207 |
+
return;
|
208 |
+
}
|
209 |
+
global $wpdb;
|
210 |
+
$tables = $wpdb->get_results("SHOW TABLES", ARRAY_N);
|
211 |
+
$nooftables = count($tables);
|
212 |
+
$query = "";
|
213 |
+
$tableswithfk = array();
|
214 |
+
$tableswithoutfk= array();
|
215 |
+
|
216 |
+
foreach($tables as $table)
|
217 |
+
{
|
218 |
+
if(is_array($table))
|
219 |
+
$table = $table[0];
|
220 |
+
$createtable = $wpdb->get_results("SHOW CREATE TABLE $table", ARRAY_A);
|
221 |
+
if(!empty($createtable[0]))
|
222 |
+
{
|
223 |
+
$createquery = $createtable[0]['Create Table'];
|
224 |
+
if (strpos($createquery, 'FOREIGN KEY') !== false)
|
225 |
+
array_push($tableswithfk,$table);
|
226 |
+
else
|
227 |
+
array_push($tableswithoutfk, $table);
|
228 |
+
}
|
229 |
+
}
|
230 |
+
|
231 |
+
$query .= $this->get_table_query($query,$tableswithoutfk);
|
232 |
+
|
233 |
+
$query .= $this->get_table_query($query,$tableswithfk);
|
234 |
+
|
235 |
+
$fileName = $this->create_db_backup_file($query);
|
236 |
+
wp_send_json('created_backup');
|
237 |
+
}
|
238 |
+
|
239 |
+
function get_table_query($query,$tables)
|
240 |
+
{
|
241 |
+
|
242 |
+
global $wpdb;
|
243 |
+
foreach($tables as $table)
|
244 |
+
{
|
245 |
+
$createtable = $wpdb->get_results("SHOW CREATE TABLE $table", ARRAY_A);
|
246 |
+
if(!empty($createtable[0]))
|
247 |
+
{
|
248 |
+
$createquery = $createtable[0]['Create Table'];
|
249 |
+
$query .= 'DROP TABLE IF EXISTS '.$table.";\n";
|
250 |
+
$query .= $createquery.";\n\n";
|
251 |
+
$data = $wpdb->get_results("SELECT * FROM $table", ARRAY_A);
|
252 |
+
foreach($data as $record)
|
253 |
+
{
|
254 |
+
if(count($record)>0)
|
255 |
+
{
|
256 |
+
$query.= 'INSERT INTO '.$table.' VALUES(';
|
257 |
+
$i=0;
|
258 |
+
foreach($record as $key=>$value)
|
259 |
+
{
|
260 |
+
$value = addslashes($value);
|
261 |
+
if (isset($value))
|
262 |
+
$query.= '"'.$value.'"' ;
|
263 |
+
else
|
264 |
+
$query.= '""';
|
265 |
+
if ($i < (count($record)-1)) { $query.= ','; }
|
266 |
+
$i++;
|
267 |
+
}
|
268 |
+
$query.= ");\n";
|
269 |
+
}
|
270 |
+
}
|
271 |
+
$query.="\n\n";
|
272 |
+
}
|
273 |
+
}
|
274 |
+
return $query;
|
275 |
+
}
|
276 |
+
|
277 |
+
function create_db_backup_file($data)
|
278 |
+
{
|
279 |
+
|
280 |
+
global $wpnsDbQueries;
|
281 |
+
$time = time();
|
282 |
+
$backup_store_path = wp_upload_dir();
|
283 |
+
$backup_store_path = $backup_store_path['basedir'].DIRECTORY_SEPARATOR;
|
284 |
+
if(!file_exists($backup_store_path."miniorangebackup")){
|
285 |
+
mkdir($backup_store_path."miniorangebackup");
|
286 |
+
}
|
287 |
+
$basepath = $backup_store_path.'miniorangebackup'.DIRECTORY_SEPARATOR;
|
288 |
+
$handler_obj = new MoBackupSite;
|
289 |
+
$handler_obj->create_index_file($basepath);
|
290 |
+
if(!file_exists($basepath.'db-backups')){
|
291 |
+
mkdir($basepath.'db-backups');
|
292 |
+
}
|
293 |
+
|
294 |
+
$backup_path = $basepath.'db-backups';
|
295 |
+
$filename = 'miniorange-db-backup-'.$time.'.sql';
|
296 |
+
$basepath = $basepath.'db-backups';
|
297 |
+
$handle = fopen($basepath.DIRECTORY_SEPARATOR.$filename,'w+');
|
298 |
+
fwrite($handle,$data);
|
299 |
+
fclose($handle);
|
300 |
+
$filezipname = $this->barfw_create_database_backup_zip_file($filename,$time);
|
301 |
+
$zip_path = $basepath.DIRECTORY_SEPARATOR.$filename;
|
302 |
+
unlink($zip_path);
|
303 |
+
$wpnsDbQueries->insert_backup_detail(MoWpnsConstants::DATABASE,$filezipname,$time,$backup_path);
|
304 |
+
return $filename;
|
305 |
+
}
|
306 |
+
|
307 |
+
function barfw_create_database_backup_zip_file($filename,$time){
|
308 |
+
$backup_store_path = wp_upload_dir();
|
309 |
+
$backup_store_path = $backup_store_path['basedir'].DIRECTORY_SEPARATOR.'miniorangebackup'.DIRECTORY_SEPARATOR.'db-backups'.DIRECTORY_SEPARATOR;
|
310 |
+
|
311 |
+
$filezipname = 'miniorange-db-backup-'.$time.'.zip';
|
312 |
+
$zip = new ZipArchive();
|
313 |
+
$res = $zip->open($backup_store_path.DIRECTORY_SEPARATOR.$filezipname, ZipArchive::CREATE | ZipArchive::OVERWRITE);
|
314 |
+
$filePath = $backup_store_path.$filename;
|
315 |
+
$relativePath = $filename;
|
316 |
+
$zip->addFile($filePath, $relativePath);
|
317 |
+
|
318 |
+
$zip->close();
|
319 |
+
return $filezipname;
|
320 |
+
}
|
321 |
+
|
322 |
}new MoBackupSite;
|
handler/feedback_form.php
CHANGED
@@ -14,7 +14,6 @@ class FeedbackHandler
|
|
14 |
if (current_user_can('manage_options') && isset($_POST['option'])) {
|
15 |
switch (sanitize_text_field(wp_unslash($_REQUEST['option']))) {
|
16 |
case "mo_wpns_skip_feedback":
|
17 |
-
case "mo_wpns_rating":
|
18 |
case "mo_wpns_feedback":
|
19 |
$this->wpns_handle_feedback($_POST); break;
|
20 |
case "mo_wpns_backup_download":
|
@@ -40,12 +39,15 @@ class FeedbackHandler
|
|
40 |
|
41 |
$user = wp_get_current_user();
|
42 |
$feedback_option = sanitize_text_field($_POST['option']);
|
43 |
-
|
44 |
-
|
45 |
-
|
46 |
-
|
|
|
|
|
|
|
|
|
47 |
|
48 |
-
|
49 |
$deactivate_reason_message = array_key_exists('wpns_query_feedback', $_POST) ? htmlspecialchars($_POST['wpns_query_feedback']) : false;
|
50 |
$activation_date = get_site_option('mo2f_activated_time');
|
51 |
$current_date = time();
|
@@ -58,24 +60,17 @@ class FeedbackHandler
|
|
58 |
}
|
59 |
update_site_option( 'No_of_days_active_work', $days , 'yes' );
|
60 |
|
61 |
-
if ($feedback_option != "mo_wpns_rating")
|
62 |
-
{
|
63 |
$reply_required = '';
|
64 |
-
if (isset($_POST['
|
65 |
-
$reply_required = htmlspecialchars($_POST['
|
66 |
|
67 |
-
if (empty($reply_required)) {
|
68 |
$reply_required = "don't reply";
|
69 |
$message .= ' [Reply:<b style="color:red";>' . $reply_required . '</b>,';
|
70 |
} else {
|
71 |
$reply_required = "yes";
|
72 |
$message .= '[Reply:' . $reply_required . ',';
|
73 |
}
|
74 |
-
}
|
75 |
-
else
|
76 |
-
{
|
77 |
-
$message ='[' ;
|
78 |
-
}
|
79 |
$message .= 'D:' . $days . ',';
|
80 |
if(MoWpnsUtility::get_mo2f_db_option('mo_wpns_2fa_with_network_security', 'get_option')){
|
81 |
$message .= '2FA+NS]';
|
@@ -115,7 +110,6 @@ class FeedbackHandler
|
|
115 |
if (json_last_error() == JSON_ERROR_NONE) {
|
116 |
if (is_array($submited) && array_key_exists('status', $submited) && $submited['status'] == 'ERROR') {
|
117 |
do_action('wpns_show_message',$submited['message'],'ERROR');
|
118 |
-
|
119 |
} else {
|
120 |
if ($submited == false) {
|
121 |
do_action('wpns_show_message','Error while submitting the query.','ERROR');
|
14 |
if (current_user_can('manage_options') && isset($_POST['option'])) {
|
15 |
switch (sanitize_text_field(wp_unslash($_REQUEST['option']))) {
|
16 |
case "mo_wpns_skip_feedback":
|
|
|
17 |
case "mo_wpns_feedback":
|
18 |
$this->wpns_handle_feedback($_POST); break;
|
19 |
case "mo_wpns_backup_download":
|
39 |
|
40 |
$user = wp_get_current_user();
|
41 |
$feedback_option = sanitize_text_field($_POST['option']);
|
42 |
+
$message = 'Plugin Deactivated : ';
|
43 |
+
$deactivate_plugin = isset($_POST['mo_wpns_deactivate_plugin'])?sanitize_text_field($_POST['mo_wpns_deactivate_plugin']):'';
|
44 |
+
$message .= $deactivate_plugin;
|
45 |
+
if($deactivate_plugin == "Conflicts with other plugins"){
|
46 |
+
$plugin_selected = isset($_POST['mo2f_plugin_selected'])?sanitize_text_field($_POST['mo2f_plugin_selected']):'';
|
47 |
+
$plugin = MO2f_Utility::get_plugin_name_by_identifier($plugin_selected);
|
48 |
+
$message .= ", Plugin selected - " . $plugin . ".";
|
49 |
+
}
|
50 |
|
|
|
51 |
$deactivate_reason_message = array_key_exists('wpns_query_feedback', $_POST) ? htmlspecialchars($_POST['wpns_query_feedback']) : false;
|
52 |
$activation_date = get_site_option('mo2f_activated_time');
|
53 |
$current_date = time();
|
60 |
}
|
61 |
update_site_option( 'No_of_days_active_work', $days , 'yes' );
|
62 |
|
|
|
|
|
63 |
$reply_required = '';
|
64 |
+
if (isset($_POST['mo2f_get_reply']))
|
65 |
+
$reply_required = htmlspecialchars($_POST['mo2f_get_reply']);
|
66 |
|
67 |
+
if (!empty($reply_required)) {
|
68 |
$reply_required = "don't reply";
|
69 |
$message .= ' [Reply:<b style="color:red";>' . $reply_required . '</b>,';
|
70 |
} else {
|
71 |
$reply_required = "yes";
|
72 |
$message .= '[Reply:' . $reply_required . ',';
|
73 |
}
|
|
|
|
|
|
|
|
|
|
|
74 |
$message .= 'D:' . $days . ',';
|
75 |
if(MoWpnsUtility::get_mo2f_db_option('mo_wpns_2fa_with_network_security', 'get_option')){
|
76 |
$message .= '2FA+NS]';
|
110 |
if (json_last_error() == JSON_ERROR_NONE) {
|
111 |
if (is_array($submited) && array_key_exists('status', $submited) && $submited['status'] == 'ERROR') {
|
112 |
do_action('wpns_show_message',$submited['message'],'ERROR');
|
|
|
113 |
} else {
|
114 |
if ($submited == false) {
|
115 |
do_action('wpns_show_message','Error while submitting the query.','ERROR');
|
handler/logger.php
CHANGED
@@ -1,39 +1,39 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
class mo2f_Logger
|
4 |
-
{
|
5 |
-
function __construct()
|
6 |
-
{
|
7 |
-
add_action( 'log_403' , array( $this, 'log_403' ) );
|
8 |
-
add_action( 'template_redirect', array( $this, 'log_404' ) );
|
9 |
-
}
|
10 |
-
|
11 |
-
|
12 |
-
function log_403()
|
13 |
-
{
|
14 |
-
global $moWpnsUtility;
|
15 |
-
$mo_wpns_config = new MoWpnsHandler();
|
16 |
-
$userIp = $moWpnsUtility->get_client_ip();
|
17 |
-
$userIp = sanitize_text_field( $userIp );
|
18 |
-
$url = $moWpnsUtility->get_current_url();
|
19 |
-
$user = wp_get_current_user();
|
20 |
-
$username = is_user_logged_in() ? $user->user_login : 'GUEST';
|
21 |
-
$mo_wpns_config->add_transactions($userIp,$username,MoWpnsConstants::ERR_403, MoWpnsConstants::ACCESS_DENIED,$url);
|
22 |
-
}
|
23 |
-
|
24 |
-
function log_404()
|
25 |
-
{
|
26 |
-
global $moWpnsUtility;
|
27 |
-
|
28 |
-
if(!is_404())
|
29 |
-
return;
|
30 |
-
$mo_wpns_config = new MoWpnsHandler();
|
31 |
-
$userIp = $moWpnsUtility->get_client_ip();
|
32 |
-
$userIp = sanitize_text_field( $userIp );
|
33 |
-
$url = $moWpnsUtility->get_current_url();
|
34 |
-
$user = wp_get_current_user();
|
35 |
-
$username = is_user_logged_in() ? $user->user_login : 'GUEST';
|
36 |
-
$mo_wpns_config->add_transactions($userIp,$username,MoWpnsConstants::ERR_404, MoWpnsConstants::ACCESS_DENIED,$url);
|
37 |
-
}
|
38 |
-
}
|
39 |
new mo2f_Logger;
|
1 |
+
<?php
|
2 |
+
|
3 |
+
class mo2f_Logger
|
4 |
+
{
|
5 |
+
function __construct()
|
6 |
+
{
|
7 |
+
add_action( 'log_403' , array( $this, 'log_403' ) );
|
8 |
+
add_action( 'template_redirect', array( $this, 'log_404' ) );
|
9 |
+
}
|
10 |
+
|
11 |
+
|
12 |
+
function log_403()
|
13 |
+
{
|
14 |
+
global $moWpnsUtility;
|
15 |
+
$mo_wpns_config = new MoWpnsHandler();
|
16 |
+
$userIp = $moWpnsUtility->get_client_ip();
|
17 |
+
$userIp = sanitize_text_field( $userIp );
|
18 |
+
$url = $moWpnsUtility->get_current_url();
|
19 |
+
$user = wp_get_current_user();
|
20 |
+
$username = is_user_logged_in() ? $user->user_login : 'GUEST';
|
21 |
+
$mo_wpns_config->add_transactions($userIp,$username,MoWpnsConstants::ERR_403, MoWpnsConstants::ACCESS_DENIED,$url);
|
22 |
+
}
|
23 |
+
|
24 |
+
function log_404()
|
25 |
+
{
|
26 |
+
global $moWpnsUtility;
|
27 |
+
|
28 |
+
if(!is_404())
|
29 |
+
return;
|
30 |
+
$mo_wpns_config = new MoWpnsHandler();
|
31 |
+
$userIp = $moWpnsUtility->get_client_ip();
|
32 |
+
$userIp = sanitize_text_field( $userIp );
|
33 |
+
$url = $moWpnsUtility->get_current_url();
|
34 |
+
$user = wp_get_current_user();
|
35 |
+
$username = is_user_logged_in() ? $user->user_login : 'GUEST';
|
36 |
+
$mo_wpns_config->add_transactions($userIp,$username,MoWpnsConstants::ERR_404, MoWpnsConstants::ACCESS_DENIED,$url);
|
37 |
+
}
|
38 |
+
}
|
39 |
new mo2f_Logger;
|
handler/login.php
CHANGED
@@ -1,412 +1,412 @@
|
|
1 |
-
<?php
|
2 |
-
class LoginHandler
|
3 |
-
{
|
4 |
-
function __construct()
|
5 |
-
{
|
6 |
-
add_action( 'init' , array( $this, 'mo_wpns_init' ) );
|
7 |
-
if(get_site_option('mo2f_restrict_restAPI')){
|
8 |
-
add_action('rest_api_init' , array($this , 'mo_block_restAPI' ) );
|
9 |
-
}
|
10 |
-
if(MoWpnsUtility::get_mo2f_db_option('mo2f_enforce_strong_passswords', 'get_option') || get_option('mo_wpns_activate_recaptcha_for_login')
|
11 |
-
|| get_option('mo_wpns_activate_recaptcha_for_woocommerce_login'))
|
12 |
-
{
|
13 |
-
|
14 |
-
remove_filter('authenticate' , 'wp_authenticate_username_password' ,20 );
|
15 |
-
add_filter ('authenticate' , array( $this, 'custom_authenticate' ) ,1, 3 );
|
16 |
-
}
|
17 |
-
|
18 |
-
add_action('wp_login' , array( $this, 'mo_wpns_login_success' ) );
|
19 |
-
add_action('wp_login_failed' , array( $this, 'mo_wpns_login_failed' ) );
|
20 |
-
//add_action('auth_cookie_bad_username', array( $this, 'mo_wpns_login_failed' ) );
|
21 |
-
//add_action('auth_cookie_bad_hash' , array( $this, 'mo_wpns_login_failed' ) );
|
22 |
-
|
23 |
-
if(get_option('mo_wpns_activate_recaptcha_for_woocommerce_registration') ){
|
24 |
-
add_action( 'woocommerce_register_post', array( $this,'wooc_validate_user_captcha_register'), 1, 3);
|
25 |
-
}
|
26 |
-
}
|
27 |
-
|
28 |
-
function mo_block_restAPI(){
|
29 |
-
global $moWpnsUtility,$mo2f_dirName;
|
30 |
-
if(strpos($_SERVER['REQUEST_URI'], '/wp-json/wp/v2/users')){
|
31 |
-
include_once("mo-block.html");
|
32 |
-
exit;
|
33 |
-
}
|
34 |
-
}
|
35 |
-
|
36 |
-
function mo_wpns_init()
|
37 |
-
{
|
38 |
-
add_action( 'show_user_profile', array($this,'twofa_on_user_profile') ,10,3);
|
39 |
-
add_action( 'edit_user_profile', array($this,'twofa_on_user_profile') ,10,3);
|
40 |
-
add_action( 'personal_options_update', array( $this, 'user_two_factor_options_update' ) ,10,3);
|
41 |
-
add_action( 'edit_user_profile_update', array( $this, 'user_two_factor_options_update' ) ,10,3);
|
42 |
-
global $moWpnsUtility,$mo2f_dirName;
|
43 |
-
$WAFEnabled = get_option('WAFEnabled');
|
44 |
-
$WAFLevel = get_option('WAF');
|
45 |
-
$pass2fa_login = new Miniorange_Password_2Factor_Login();
|
46 |
-
if(class_exists('UM_Functions') && get_site_option('mo2f_enable_2fa_prompt_on_login_page'))
|
47 |
-
add_action('um_after_login_fields',array($pass2fa_login,'mo2f_ultimate_member_custom_login'));
|
48 |
-
$mo2f_scanner_parts = new mo2f_scanner_parts();
|
49 |
-
$mo2f_scanner_parts->file_cron_scan();
|
50 |
-
|
51 |
-
if($WAFEnabled == 1)
|
52 |
-
{
|
53 |
-
if($WAFLevel == 'PluginLevel')
|
54 |
-
{
|
55 |
-
if(file_exists($mo2f_dirName .'handler'.DIRECTORY_SEPARATOR.'WAF'.DIRECTORY_SEPARATOR.'mo-waf-plugin.php'))
|
56 |
-
include_once($mo2f_dirName .'handler'.DIRECTORY_SEPARATOR.'WAF'.DIRECTORY_SEPARATOR.'mo-waf-plugin.php');
|
57 |
-
}
|
58 |
-
}
|
59 |
-
|
60 |
-
|
61 |
-
$userIp = $moWpnsUtility->get_client_ip();
|
62 |
-
$userIp = sanitize_text_field( $userIp );
|
63 |
-
$mo_wpns_config = new MoWpnsHandler();
|
64 |
-
$isWhitelisted = $mo_wpns_config->is_whitelisted($userIp);
|
65 |
-
$isIpBlocked = false;
|
66 |
-
if(!$isWhitelisted){
|
67 |
-
$isIpBlocked = $mo_wpns_config->is_ip_blocked_in_anyway($userIp);
|
68 |
-
}
|
69 |
-
if($isIpBlocked){
|
70 |
-
include_once("mo-block.html");
|
71 |
-
exit;
|
72 |
-
}
|
73 |
-
|
74 |
-
$requested_uri = sanitize_text_field($_SERVER["REQUEST_URI"]);
|
75 |
-
$option = false;
|
76 |
-
if (is_user_logged_in()) { //chr?
|
77 |
-
if (strpos($requested_uri, chr(get_option('login_page_url'))) != false) {
|
78 |
-
wp_safe_redirect(site_url());
|
79 |
-
exit;
|
80 |
-
}
|
81 |
-
} else {
|
82 |
-
$option = get_option('mo_wpns_enable_rename_login_url');
|
83 |
-
}
|
84 |
-
if ($option) {
|
85 |
-
if (strpos($requested_uri, '/wp-login.php?checkemail=confirm') !== false) {
|
86 |
-
$requested_uri = str_replace("wp-login.php","",$requested_uri);
|
87 |
-
wp_safe_redirect($requested_uri);
|
88 |
-
exit;
|
89 |
-
} elseif (strpos($requested_uri, '/wp-login.php?checkemail=registered') !== false) {
|
90 |
-
$requested_uri = str_replace("wp-login.php","",$requested_uri);
|
91 |
-
wp_safe_redirect($requested_uri);
|
92 |
-
exit;
|
93 |
-
}
|
94 |
-
|
95 |
-
if (strpos($requested_uri, '/wp-login.php') !== false) {
|
96 |
-
wp_safe_redirect(site_url());
|
97 |
-
exit;
|
98 |
-
}
|
99 |
-
elseif (strpos($requested_uri, get_option('login_page_url')) !== false ) {
|
100 |
-
@require_once ABSPATH . 'wp-login.php';
|
101 |
-
die;
|
102 |
-
}
|
103 |
-
}
|
104 |
-
|
105 |
-
if(isset($_POST['option']))
|
106 |
-
{
|
107 |
-
switch(sanitize_text_field(wp_unslash($_POST['option'])))
|
108 |
-
{
|
109 |
-
case "mo_wpns_change_password":
|
110 |
-
$this->handle_change_password(sanitize_user($_POST['username'])
|
111 |
-
,sanitize_text_field($_POST['new_password']), sanitize_text_field($_POST['confirm_password']));
|
112 |
-
break;
|
113 |
-
}
|
114 |
-
}
|
115 |
-
|
116 |
-
}
|
117 |
-
function twofa_on_user_profile( $user ) {
|
118 |
-
global $mo2f_dirName;
|
119 |
-
if(file_exists($mo2f_dirName .'handler'.DIRECTORY_SEPARATOR.'user-profile-2fa.php')){
|
120 |
-
include_once($mo2f_dirName .'handler'.DIRECTORY_SEPARATOR.'user-profile-2fa.php');
|
121 |
-
}
|
122 |
-
}
|
123 |
-
function user_two_factor_options_update( $user ) {
|
124 |
-
global $mo2f_dirName;
|
125 |
-
if(file_exists($mo2f_dirName .'handler'.DIRECTORY_SEPARATOR.'user-profile-2fa-update.php')){
|
126 |
-
include_once($mo2f_dirName .'handler'.DIRECTORY_SEPARATOR.'user-profile-2fa-update.php');
|
127 |
-
}
|
128 |
-
}
|
129 |
-
|
130 |
-
function mo2f_IP_email_send()
|
131 |
-
{
|
132 |
-
global $moWpnsUtility, $Mo2fdbQueries;
|
133 |
-
$userIp = $moWpnsUtility->get_client_ip();
|
134 |
-
$userIp = sanitize_text_field( $userIp );
|
135 |
-
$user = wp_get_current_user();
|
136 |
-
$user_id = $user->ID;
|
137 |
-
$meta_key = 'mo2f_user_IP';
|
138 |
-
add_user_meta($user->ID, $meta_key,$userIp);
|
139 |
-
$email = $Mo2fdbQueries->get_user_detail( 'mo2f_user_email', $user->ID);
|
140 |
-
if (empty($email)) {
|
141 |
-
$email = $user->user_email;
|
142 |
-
}
|
143 |
-
if(get_user_meta($user->ID,$meta_key))
|
144 |
-
{
|
145 |
-
$check_Ip = get_user_meta($user->ID,$meta_key)[0];
|
146 |
-
|
147 |
-
if ($check_Ip != $userIp)
|
148 |
-
{
|
149 |
-
$subject ="Alert: New IP Detected";
|
150 |
-
$message = mo_IP_template();
|
151 |
-
$headers=array('Content-Type: text/html; charset=UTF-8');
|
152 |
-
if(is_email($email))
|
153 |
-
{
|
154 |
-
wp_mail( $email,$subject,$message,$headers);
|
155 |
-
}
|
156 |
-
}
|
157 |
-
}
|
158 |
-
}
|
159 |
-
|
160 |
-
function wooc_validate_user_captcha_register($username, $email, $validation_errors) {
|
161 |
-
|
162 |
-
if (empty($_POST['g-recaptcha-response'])) {
|
163 |
-
$validation_errors->add( 'woocommerce_recaptcha_error', __('Please verify the captcha', 'woocommerce' ) );
|
164 |
-
}
|
165 |
-
}
|
166 |
-
|
167 |
-
//Function to Handle Change Password Form
|
168 |
-
function handle_change_password($username,$newpassword,$confirmpassword)
|
169 |
-
{
|
170 |
-
global $mo2f_dirName;
|
171 |
-
$user = get_user_by("login",$username);
|
172 |
-
$error = wp_authenticate_username_password($user,$username,$newpassword);
|
173 |
-
|
174 |
-
if(is_wp_error($error))
|
175 |
-
{
|
176 |
-
$this->mo_wpns_login_failed($username);
|
177 |
-
return $error;
|
178 |
-
}
|
179 |
-
|
180 |
-
if($this->update_strong_password($username,$newpassword,$confirmpassword)=="success")
|
181 |
-
{
|
182 |
-
wp_set_auth_cookie($user->ID,false,false);
|
183 |
-
$this->mo_wpns_login_success($username);
|
184 |
-
wp_redirect(get_site_option('siteurl'),301);
|
185 |
-
}
|
186 |
-
}
|
187 |
-
|
188 |
-
|
189 |
-
//Function to Update User password
|
190 |
-
function update_strong_password($username,$newpassword,$confirmpassword)
|
191 |
-
{
|
192 |
-
global $mo2f_dirName;
|
193 |
-
|
194 |
-
if(strlen($newpassword) > 5 && preg_match("#[0-9]+#", $newpassword) && preg_match("#[a-zA-Z]+#", $newpassword)
|
195 |
-
&& preg_match('/[^a-zA-Z\d]/', $newpassword) && $newpassword==$confirmpassword)
|
196 |
-
{
|
197 |
-
$user = get_user_by("login",$username);
|
198 |
-
wp_set_password($newpassword,$user->ID);
|
199 |
-
return "success";
|
200 |
-
}
|
201 |
-
else
|
202 |
-
include $mo2f_dirName . 'controllers'.DIRECTORY_SEPARATOR.'change-password.php';
|
203 |
-
}
|
204 |
-
|
205 |
-
|
206 |
-
//Our custom logic for user authentication
|
207 |
-
function custom_authenticate($user, $username, $password)
|
208 |
-
{
|
209 |
-
global $moWpnsUtility;
|
210 |
-
$error = new WP_Error();
|
211 |
-
|
212 |
-
if(empty($username) && empty ($password))
|
213 |
-
return $error;
|
214 |
-
|
215 |
-
if(empty($username)) {
|
216 |
-
$error->add('empty_username', __('<strong>ERROR</strong>: Invalid username or Password.'));
|
217 |
-
}
|
218 |
-
if(empty($password)) {
|
219 |
-
$error->add('empty_password', __('<strong>ERROR</strong>: Invalid username or Password.'));
|
220 |
-
}
|
221 |
-
|
222 |
-
$user = wp_authenticate_username_password( $user, $username, $password );
|
223 |
-
|
224 |
-
if ( is_wp_error( $user ) ) {
|
225 |
-
$error->add('empty_username', __('<strong>ERROR</strong>: Invalid username or Password.'));
|
226 |
-
return $user;
|
227 |
-
}
|
228 |
-
if(empty($error->errors))
|
229 |
-
{
|
230 |
-
$user = get_user_by("login",$username);
|
231 |
-
|
232 |
-
if($user)
|
233 |
-
{
|
234 |
-
$moCURL=new MocURL;
|
235 |
-
if(get_option('mo_wpns_activate_recaptcha_for_login'))
|
236 |
-
{
|
237 |
-
$captcha_version=get_option('mo_wpns_recaptcha_version');
|
238 |
-
if($captcha_version=='reCAPTCHA_v3')
|
239 |
-
$recaptchaError = $moWpnsUtility->verify_recaptcha_3(sanitize_text_field($_POST['g-recaptcha-response']));
|
240 |
-
else if($captcha_version=='reCAPTCHA_v2')
|
241 |
-
$recaptchaError = $moWpnsUtility->verify_recaptcha(sanitize_text_field($_POST['g-recaptcha-response']));
|
242 |
-
|
243 |
-
}
|
244 |
-
}
|
245 |
-
|
246 |
-
if(!empty($recaptchaError->errors))
|
247 |
-
$error = $recaptchaError;
|
248 |
-
if(empty($error->errors)){
|
249 |
-
if(!MoWpnsUtility::get_mo2f_db_option('mo2f_enable_brute_force', 'get_option'))
|
250 |
-
{
|
251 |
-
$this->mo_wpns_login_success($username);
|
252 |
-
}
|
253 |
-
return $user;
|
254 |
-
}
|
255 |
-
}
|
256 |
-
else
|
257 |
-
$error->add('empty_password', __('<strong>ERROR</strong>: Invalid Username or password.'));
|
258 |
-
return $error;
|
259 |
-
|
260 |
-
}
|
261 |
-
|
262 |
-
|
263 |
-
|
264 |
-
|
265 |
-
//Function to check user password
|
266 |
-
function check_password($user,$error,$password)
|
267 |
-
{
|
268 |
-
global $moWpnsUtility, $mo2f_dirName;
|
269 |
-
if ( wp_check_password( $password, $user->data->user_pass, $user->ID) )
|
270 |
-
{
|
271 |
-
if($moWpnsUtility->check_user_password_strength($user,$password,"")=="success")
|
272 |
-
{
|
273 |
-
if(MoWpnsUtility::get_mo2f_db_option('mo2f_enable_brute_force', 'get_option'))
|
274 |
-
$this->mo_wpns_login_success($user->data->user_login);
|
275 |
-
return $user;
|
276 |
-
}
|
277 |
-
else
|
278 |
-
include $mo2f_dirName . 'controllers'.DIRECTORY_SEPARATOR.'change-password.php';
|
279 |
-
}
|
280 |
-
else
|
281 |
-
$error->add('empty_password', __('<strong>ERROR</strong>: Wrong password.'));
|
282 |
-
|
283 |
-
return $error;
|
284 |
-
}
|
285 |
-
|
286 |
-
|
287 |
-
//Function to handle successful user login
|
288 |
-
function mo_wpns_login_success($username)
|
289 |
-
{
|
290 |
-
global $moWpnsUtility;
|
291 |
-
if(get_site_option('mo2f_mail_notify') == 'on')
|
292 |
-
{
|
293 |
-
$this->mo2f_IP_email_send();
|
294 |
-
}
|
295 |
-
|
296 |
-
$mo_wpns_config = new MoWpnsHandler();
|
297 |
-
$userIp = $moWpnsUtility->get_client_ip();
|
298 |
-
$userIp = sanitize_text_field( $userIp );
|
299 |
-
$mo_wpns_config->move_failed_transactions_to_past_failed($userIp);
|
300 |
-
|
301 |
-
if(get_option('mo_wpns_enable_unusual_activity_email_to_user'))
|
302 |
-
$moWpnsUtility->sendNotificationToUserForUnusualActivities($username, $userIp, MoWpnsConstants::LOGGED_IN_FROM_NEW_IP);
|
303 |
-
|
304 |
-
|
305 |
-
$mo_wpns_config->add_transactions($userIp, $username, MoWpnsConstants::LOGIN_TRANSACTION, MoWpnsConstants::SUCCESS);
|
306 |
-
|
307 |
-
if(isset($_POST['log']) && isset($_POST['pwd'])){
|
308 |
-
$username = sanitize_text_field($_POST['log']);
|
309 |
-
$pass = $_POST['pwd'];
|
310 |
-
$user = get_user_by('login',$username);
|
311 |
-
|
312 |
-
if(!MoWpnsUtility::get_mo2f_db_option('mo2f_enforce_strong_passswords', 'get_option')){
|
313 |
-
if(!class_miniorange_2fa_strong_password::mo2f_isStrongPasswd($pass, $username)){
|
314 |
-
if(!get_user_meta($user->ID,'password_strong?')){
|
315 |
-
update_user_meta($user->ID,'password_strong?', true);
|
316 |
-
$count = get_site_option('users_with_weak_pass');
|
317 |
-
$count = $count + 1;
|
318 |
-
update_site_option('users_with_weak_pass', $count);
|
319 |
-
}
|
320 |
-
}
|
321 |
-
else{
|
322 |
-
if(get_user_meta($user->ID,'password_strong?')){
|
323 |
-
$count = get_site_option('users_with_weak_pass');
|
324 |
-
$count = $count - 1;
|
325 |
-
update_site_option('users_with_weak_pass', $count);
|
326 |
-
}
|
327 |
-
delete_user_meta($user->ID,'password_strong?');
|
328 |
-
}
|
329 |
-
|
330 |
-
|
331 |
-
}
|
332 |
-
|
333 |
-
}
|
334 |
-
}
|
335 |
-
|
336 |
-
|
337 |
-
//Function to handle failed user login attempt
|
338 |
-
function mo_wpns_login_failed($username)
|
339 |
-
{
|
340 |
-
global $moWpnsUtility;
|
341 |
-
$userIp = $moWpnsUtility->get_client_ip();
|
342 |
-
$userIp = sanitize_text_field( $userIp );
|
343 |
-
if(empty($userIp) || empty($username) || !MoWpnsUtility::get_mo2f_db_option('mo2f_enable_brute_force', 'get_option'))
|
344 |
-
return;
|
345 |
-
|
346 |
-
$mo_wpns_config = new MoWpnsHandler();
|
347 |
-
$isWhitelisted = $mo_wpns_config->is_whitelisted($userIp);
|
348 |
-
|
349 |
-
$mo_wpns_config->add_transactions($userIp, $username, MoWpnsConstants::LOGIN_TRANSACTION, MoWpnsConstants::FAILED);
|
350 |
-
|
351 |
-
if(!$isWhitelisted)
|
352 |
-
{
|
353 |
-
|
354 |
-
|
355 |
-
if(get_option('mo_wpns_enable_unusual_activity_email_to_user'))
|
356 |
-
$moWpnsUtility->sendNotificationToUserForUnusualActivities($username, $userIp, MoWpnsConstants::FAILED_LOGIN_ATTEMPTS_FROM_NEW_IP);
|
357 |
-
|
358 |
-
$failedAttempts = $mo_wpns_config->get_failed_attempts_count($userIp);
|
359 |
-
$allowedLoginAttepts = get_option('mo2f_allwed_login_attempts') ? get_option('mo2f_allwed_login_attempts') : 10;
|
360 |
-
|
361 |
-
if($allowedLoginAttepts - $failedAttempts<=0)
|
362 |
-
$this->handle_login_attempt_exceeded($userIp);
|
363 |
-
else if(MoWpnsUtility::get_mo2f_db_option('mo2f_show_remaining_attempts', 'get_option'))
|
364 |
-
$this->show_limit_login_left($allowedLoginAttepts,$failedAttempts);
|
365 |
-
}
|
366 |
-
|
367 |
-
}
|
368 |
-
|
369 |
-
|
370 |
-
|
371 |
-
|
372 |
-
|
373 |
-
//Function to show number of attempts remaining
|
374 |
-
function show_limit_login_left($allowedLoginAttepts,$failedAttempts)
|
375 |
-
{
|
376 |
-
global $error;
|
377 |
-
$diff = $allowedLoginAttepts - $failedAttempts;
|
378 |
-
$error = "<br>You have <b>".$diff."</b> login attempts remaining.";
|
379 |
-
}
|
380 |
-
|
381 |
-
|
382 |
-
//Function to handle login limit exceeded
|
383 |
-
function handle_login_attempt_exceeded($userIp)
|
384 |
-
{
|
385 |
-
global $moWpnsUtility, $mo2f_dirName;
|
386 |
-
$mo_wpns_config = new MoWpnsHandler();
|
387 |
-
$mo_wpns_config->mo_wpns_block_ip($userIp, MoWpnsConstants::LOGIN_ATTEMPTS_EXCEEDED, false);
|
388 |
-
include_once("mo-block.html");
|
389 |
-
exit;
|
390 |
-
|
391 |
-
}
|
392 |
-
|
393 |
-
function setup_registration_closed($user){
|
394 |
-
global $Mo2fdbQueries;
|
395 |
-
if ( isset( $_POST['option'] ) and sanitize_text_field($_POST['option']) == 'mo2f_registration_closed' ) {
|
396 |
-
$nonce = sanitize_text_field($_POST['mo2f_registration_closed_nonce']);
|
397 |
-
if ( ! wp_verify_nonce( $nonce, 'mo2f-registration-closed-nonce' ) ) {
|
398 |
-
$error = new WP_Error();
|
399 |
-
$error->add( 'empty_username', '<strong>' . mo2f_lt( 'ERROR' ) . '</strong>: ' . mo2f_lt( 'Invalid Request.' ) );
|
400 |
-
return $error;
|
401 |
-
} else {
|
402 |
-
if(!$Mo2fdbQueries->get_user_detail( 'mo_2factor_user_registration_status', $user->ID) =='MO_2_FACTOR_PLUGIN_SETTINGS'){
|
403 |
-
//$Mo2fdbQueries->update_user_details( $user->ID, array( 'mo_2factor_user_registration_status' => '' ) );
|
404 |
-
delete_user_meta( $user->ID, 'register_account_popup' );
|
405 |
-
|
406 |
-
}
|
407 |
-
}
|
408 |
-
}
|
409 |
-
}
|
410 |
-
|
411 |
-
}
|
412 |
-
new LoginHandler;
|
1 |
+
<?php
|
2 |
+
class LoginHandler
|
3 |
+
{
|
4 |
+
function __construct()
|
5 |
+
{
|
6 |
+
add_action( 'init' , array( $this, 'mo_wpns_init' ) );
|
7 |
+
if(get_site_option('mo2f_restrict_restAPI')){
|
8 |
+
add_action('rest_api_init' , array($this , 'mo_block_restAPI' ) );
|
9 |
+
}
|
10 |
+
if(MoWpnsUtility::get_mo2f_db_option('mo2f_enforce_strong_passswords', 'get_option') || get_option('mo_wpns_activate_recaptcha_for_login')
|
11 |
+
|| get_option('mo_wpns_activate_recaptcha_for_woocommerce_login'))
|
12 |
+
{
|
13 |
+
|
14 |
+
remove_filter('authenticate' , 'wp_authenticate_username_password' ,20 );
|
15 |
+
add_filter ('authenticate' , array( $this, 'custom_authenticate' ) ,1, 3 );
|
16 |
+
}
|
17 |
+
|
18 |
+
add_action('wp_login' , array( $this, 'mo_wpns_login_success' ) );
|
19 |
+
add_action('wp_login_failed' , array( $this, 'mo_wpns_login_failed' ) );
|
20 |
+
//add_action('auth_cookie_bad_username', array( $this, 'mo_wpns_login_failed' ) );
|
21 |
+
//add_action('auth_cookie_bad_hash' , array( $this, 'mo_wpns_login_failed' ) );
|
22 |
+
|
23 |
+
if(get_option('mo_wpns_activate_recaptcha_for_woocommerce_registration') ){
|
24 |
+
add_action( 'woocommerce_register_post', array( $this,'wooc_validate_user_captcha_register'), 1, 3);
|
25 |
+
}
|
26 |
+
}
|
27 |
+
|
28 |
+
function mo_block_restAPI(){
|
29 |
+
global $moWpnsUtility,$mo2f_dirName;
|
30 |
+
if(strpos($_SERVER['REQUEST_URI'], '/wp-json/wp/v2/users')){
|
31 |
+
include_once("mo-block.html");
|
32 |
+
exit;
|
33 |
+
}
|
34 |
+
}
|
35 |
+
|
36 |
+
function mo_wpns_init()
|
37 |
+
{
|
38 |
+
add_action( 'show_user_profile', array($this,'twofa_on_user_profile') ,10,3);
|
39 |
+
add_action( 'edit_user_profile', array($this,'twofa_on_user_profile') ,10,3);
|
40 |
+
add_action( 'personal_options_update', array( $this, 'user_two_factor_options_update' ) ,10,3);
|
41 |
+
add_action( 'edit_user_profile_update', array( $this, 'user_two_factor_options_update' ) ,10,3);
|
42 |
+
global $moWpnsUtility,$mo2f_dirName;
|
43 |
+
$WAFEnabled = get_option('WAFEnabled');
|
44 |
+
$WAFLevel = get_option('WAF');
|
45 |
+
$pass2fa_login = new Miniorange_Password_2Factor_Login();
|
46 |
+
if(class_exists('UM_Functions') && get_site_option('mo2f_enable_2fa_prompt_on_login_page'))
|
47 |
+
add_action('um_after_login_fields',array($pass2fa_login,'mo2f_ultimate_member_custom_login'));
|
48 |
+
$mo2f_scanner_parts = new mo2f_scanner_parts();
|
49 |
+
$mo2f_scanner_parts->file_cron_scan();
|
50 |
+
|
51 |
+
if($WAFEnabled == 1)
|
52 |
+
{
|
53 |
+
if($WAFLevel == 'PluginLevel')
|
54 |
+
{
|
55 |
+
if(file_exists($mo2f_dirName .'handler'.DIRECTORY_SEPARATOR.'WAF'.DIRECTORY_SEPARATOR.'mo-waf-plugin.php'))
|
56 |
+
include_once($mo2f_dirName .'handler'.DIRECTORY_SEPARATOR.'WAF'.DIRECTORY_SEPARATOR.'mo-waf-plugin.php');
|
57 |
+
}
|
58 |
+
}
|
59 |
+
|
60 |
+
|
61 |
+
$userIp = $moWpnsUtility->get_client_ip();
|
62 |
+
$userIp = sanitize_text_field( $userIp );
|
63 |
+
$mo_wpns_config = new MoWpnsHandler();
|
64 |
+
$isWhitelisted = $mo_wpns_config->is_whitelisted($userIp);
|
65 |
+
$isIpBlocked = false;
|
66 |
+
if(!$isWhitelisted){
|
67 |
+
$isIpBlocked = $mo_wpns_config->is_ip_blocked_in_anyway($userIp);
|
68 |
+
}
|
69 |
+
if($isIpBlocked){
|
70 |
+
include_once("mo-block.html");
|
71 |
+
exit;
|
72 |
+
}
|
73 |
+
|
74 |
+
$requested_uri = sanitize_text_field($_SERVER["REQUEST_URI"]);
|
75 |
+
$option = false;
|
76 |
+
if (is_user_logged_in()) { //chr?
|
77 |
+
if (strpos($requested_uri, chr(get_option('login_page_url'))) != false) {
|
78 |
+
wp_safe_redirect(site_url());
|
79 |
+
exit;
|
80 |
+
}
|
81 |
+
} else {
|
82 |
+
$option = get_option('mo_wpns_enable_rename_login_url');
|
83 |
+
}
|
84 |
+
if ($option) {
|
85 |
+
if (strpos($requested_uri, '/wp-login.php?checkemail=confirm') !== false) {
|
86 |
+
$requested_uri = str_replace("wp-login.php","",$requested_uri);
|
87 |
+
wp_safe_redirect($requested_uri);
|
88 |
+
exit;
|
89 |
+
} elseif (strpos($requested_uri, '/wp-login.php?checkemail=registered') !== false) {
|
90 |
+
$requested_uri = str_replace("wp-login.php","",$requested_uri);
|
91 |
+
wp_safe_redirect($requested_uri);
|
92 |
+
exit;
|
93 |
+
}
|
94 |
+
|
95 |
+
if (strpos($requested_uri, '/wp-login.php') !== false) {
|
96 |
+
wp_safe_redirect(site_url());
|
97 |
+
exit;
|
98 |
+
}
|
99 |
+
elseif (strpos($requested_uri, get_option('login_page_url')) !== false ) {
|
100 |
+
@require_once ABSPATH . 'wp-login.php';
|
101 |
+
die;
|
102 |
+
}
|
103 |
+
}
|
104 |
+
|
105 |
+
if(isset($_POST['option']))
|
106 |
+
{
|
107 |
+
switch(sanitize_text_field(wp_unslash($_POST['option'])))
|
108 |
+
{
|
109 |
+
case "mo_wpns_change_password":
|
110 |
+
$this->handle_change_password(sanitize_user($_POST['username'])
|
111 |
+
,sanitize_text_field($_POST['new_password']), sanitize_text_field($_POST['confirm_password']));
|
112 |
+
break;
|
113 |
+
}
|
114 |
+
}
|
115 |
+
|
116 |
+
}
|
117 |
+
function twofa_on_user_profile( $user ) {
|
118 |
+
global $mo2f_dirName;
|
119 |
+
if(file_exists($mo2f_dirName .'handler'.DIRECTORY_SEPARATOR.'user-profile-2fa.php')){
|
120 |
+
include_once($mo2f_dirName .'handler'.DIRECTORY_SEPARATOR.'user-profile-2fa.php');
|
121 |
+
}
|
122 |
+
}
|
123 |
+
function user_two_factor_options_update( $user ) {
|
124 |
+
global $mo2f_dirName;
|
125 |
+
if(file_exists($mo2f_dirName .'handler'.DIRECTORY_SEPARATOR.'user-profile-2fa-update.php')){
|
126 |
+
include_once($mo2f_dirName .'handler'.DIRECTORY_SEPARATOR.'user-profile-2fa-update.php');
|
127 |
+
}
|
128 |
+
}
|
129 |
+
|
130 |
+
function mo2f_IP_email_send()
|
131 |
+
{
|
132 |
+
global $moWpnsUtility, $Mo2fdbQueries;
|
133 |
+
$userIp = $moWpnsUtility->get_client_ip();
|
134 |
+
$userIp = sanitize_text_field( $userIp );
|
135 |
+
$user = wp_get_current_user();
|
136 |
+
$user_id = $user->ID;
|
137 |
+
$meta_key = 'mo2f_user_IP';
|
138 |
+
add_user_meta($user->ID, $meta_key,$userIp);
|
139 |
+
$email = $Mo2fdbQueries->get_user_detail( 'mo2f_user_email', $user->ID);
|
140 |
+
if (empty($email)) {
|
141 |
+
$email = $user->user_email;
|
142 |
+
}
|
143 |
+
if(get_user_meta($user->ID,$meta_key))
|
144 |
+
{
|
145 |
+
$check_Ip = get_user_meta($user->ID,$meta_key)[0];
|
146 |
+
|
147 |
+
if ($check_Ip != $userIp)
|
148 |
+
{
|
149 |
+
$subject ="Alert: New IP Detected";
|
150 |
+
$message = mo_IP_template();
|
151 |
+
$headers=array('Content-Type: text/html; charset=UTF-8');
|
152 |
+
if(is_email($email))
|
153 |
+
{
|
154 |
+
wp_mail( $email,$subject,$message,$headers);
|
155 |
+
}
|
156 |
+
}
|
157 |
+
}
|
158 |
+
}
|
159 |
+
|
160 |
+
function wooc_validate_user_captcha_register($username, $email, $validation_errors) {
|
161 |
+
|
162 |
+
if (empty($_POST['g-recaptcha-response'])) {
|
163 |
+
$validation_errors->add( 'woocommerce_recaptcha_error', __('Please verify the captcha', 'woocommerce' ) );
|
164 |
+
}
|
165 |
+
}
|
166 |
+
|
167 |
+
//Function to Handle Change Password Form
|
168 |
+
function handle_change_password($username,$newpassword,$confirmpassword)
|
169 |
+
{
|
170 |
+
global $mo2f_dirName;
|
171 |
+
$user = get_user_by("login",$username);
|
172 |
+
$error = wp_authenticate_username_password($user,$username,$newpassword);
|
173 |
+
|
174 |
+
if(is_wp_error($error))
|
175 |
+
{
|
176 |
+
$this->mo_wpns_login_failed($username);
|
177 |
+
return $error;
|
178 |
+
}
|
179 |
+
|
180 |
+
if($this->update_strong_password($username,$newpassword,$confirmpassword)=="success")
|
181 |
+
{
|
182 |
+
wp_set_auth_cookie($user->ID,false,false);
|
183 |
+
$this->mo_wpns_login_success($username);
|
184 |
+
wp_redirect(get_site_option('siteurl'),301);
|
185 |
+
}
|
186 |
+
}
|
187 |
+
|
188 |
+
|
189 |
+
//Function to Update User password
|
190 |
+
function update_strong_password($username,$newpassword,$confirmpassword)
|
191 |
+
{
|
192 |
+
global $mo2f_dirName;
|
193 |
+
|
194 |
+
if(strlen($newpassword) > 5 && preg_match("#[0-9]+#", $newpassword) && preg_match("#[a-zA-Z]+#", $newpassword)
|
195 |
+
&& preg_match('/[^a-zA-Z\d]/', $newpassword) && $newpassword==$confirmpassword)
|
196 |
+
{
|
197 |
+
$user = get_user_by("login",$username);
|
198 |
+
wp_set_password($newpassword,$user->ID);
|
199 |
+
return "success";
|
200 |
+
}
|
201 |
+
else
|
202 |
+
include $mo2f_dirName . 'controllers'.DIRECTORY_SEPARATOR.'change-password.php';
|
203 |
+
}
|
204 |
+
|
205 |
+
|
206 |
+
//Our custom logic for user authentication
|
207 |
+
function custom_authenticate($user, $username, $password)
|
208 |
+
{
|
209 |
+
global $moWpnsUtility;
|
210 |
+
$error = new WP_Error();
|
211 |
+
|
212 |
+
if(empty($username) && empty ($password))
|
213 |
+
return $error;
|
214 |
+
|
215 |
+
if(empty($username)) {
|
216 |
+
$error->add('empty_username', __('<strong>ERROR</strong>: Invalid username or Password.'));
|
217 |
+
}
|
218 |
+
if(empty($password)) {
|
219 |
+
$error->add('empty_password', __('<strong>ERROR</strong>: Invalid username or Password.'));
|
220 |
+
}
|
221 |
+
|
222 |
+
$user = wp_authenticate_username_password( $user, $username, $password );
|
223 |
+
|
224 |
+
if ( is_wp_error( $user ) ) {
|
225 |
+
$error->add('empty_username', __('<strong>ERROR</strong>: Invalid username or Password.'));
|
226 |
+
return $user;
|
227 |
+
}
|
228 |
+
if(empty($error->errors))
|
229 |
+
{
|
230 |
+
$user = get_user_by("login",$username);
|
231 |
+
|
232 |
+
if($user)
|
233 |
+
{
|
234 |
+
$moCURL=new MocURL;
|
235 |
+
if(get_option('mo_wpns_activate_recaptcha_for_login'))
|
236 |
+
{
|
237 |
+
$captcha_version=get_option('mo_wpns_recaptcha_version');
|
238 |
+
if($captcha_version=='reCAPTCHA_v3')
|
239 |
+
$recaptchaError = $moWpnsUtility->verify_recaptcha_3(sanitize_text_field($_POST['g-recaptcha-response']));
|
240 |
+
else if($captcha_version=='reCAPTCHA_v2')
|
241 |
+
$recaptchaError = $moWpnsUtility->verify_recaptcha(sanitize_text_field($_POST['g-recaptcha-response']));
|
242 |
+
|
243 |
+
}
|
244 |
+
}
|
245 |
+
|
246 |
+
if(!empty($recaptchaError->errors))
|
247 |
+
$error = $recaptchaError;
|
248 |
+
if(empty($error->errors)){
|
249 |
+
if(!MoWpnsUtility::get_mo2f_db_option('mo2f_enable_brute_force', 'get_option'))
|
250 |
+
{
|
251 |
+
$this->mo_wpns_login_success($username);
|
252 |
+
}
|
253 |
+
return $user;
|
254 |
+
}
|
255 |
+
}
|
256 |
+
else
|
257 |
+
$error->add('empty_password', __('<strong>ERROR</strong>: Invalid Username or password.'));
|
258 |
+
return $error;
|
259 |
+
|
260 |
+
}
|
261 |
+
|
262 |
+
|
263 |
+
|
264 |
+
|
265 |
+
//Function to check user password
|
266 |
+
function check_password($user,$error,$password)
|
267 |
+
{
|
268 |
+
global $moWpnsUtility, $mo2f_dirName;
|
269 |
+
if ( wp_check_password( $password, $user->data->user_pass, $user->ID) )
|
270 |
+
{
|
271 |
+
if($moWpnsUtility->check_user_password_strength($user,$password,"")=="success")
|
272 |
+
{
|
273 |
+
if(MoWpnsUtility::get_mo2f_db_option('mo2f_enable_brute_force', 'get_option'))
|
274 |
+
$this->mo_wpns_login_success($user->data->user_login);
|
275 |
+
return $user;
|
276 |
+
}
|
277 |
+
else
|
278 |
+
include $mo2f_dirName . 'controllers'.DIRECTORY_SEPARATOR.'change-password.php';
|
279 |
+
}
|
280 |
+
else
|
281 |
+
$error->add('empty_password', __('<strong>ERROR</strong>: Wrong password.'));
|
282 |
+
|
283 |
+
return $error;
|
284 |
+
}
|
285 |
+
|
286 |
+
|
287 |
+
//Function to handle successful user login
|
288 |
+
function mo_wpns_login_success($username)
|
289 |
+
{
|
290 |
+
global $moWpnsUtility;
|
291 |
+
if(get_site_option('mo2f_mail_notify') == 'on')
|
292 |
+
{
|
293 |
+
$this->mo2f_IP_email_send();
|
294 |
+
}
|
295 |
+
|
296 |
+
$mo_wpns_config = new MoWpnsHandler();
|
297 |
+
$userIp = $moWpnsUtility->get_client_ip();
|
298 |
+
$userIp = sanitize_text_field( $userIp );
|
299 |
+
$mo_wpns_config->move_failed_transactions_to_past_failed($userIp);
|
300 |
+
|
301 |
+
if(get_option('mo_wpns_enable_unusual_activity_email_to_user'))
|
302 |
+
$moWpnsUtility->sendNotificationToUserForUnusualActivities($username, $userIp, MoWpnsConstants::LOGGED_IN_FROM_NEW_IP);
|
303 |
+
|
304 |
+
|
305 |
+
$mo_wpns_config->add_transactions($userIp, $username, MoWpnsConstants::LOGIN_TRANSACTION, MoWpnsConstants::SUCCESS);
|
306 |
+
|
307 |
+
if(isset($_POST['log']) && isset($_POST['pwd'])){
|
308 |
+
$username = sanitize_text_field($_POST['log']);
|
309 |
+
$pass = $_POST['pwd'];
|
310 |
+
$user = get_user_by('login',$username);
|
311 |
+
|
312 |
+
if(!MoWpnsUtility::get_mo2f_db_option('mo2f_enforce_strong_passswords', 'get_option')){
|
313 |
+
if(!class_miniorange_2fa_strong_password::mo2f_isStrongPasswd($pass, $username)){
|
314 |
+
if(!get_user_meta($user->ID,'password_strong?')){
|
315 |
+
update_user_meta($user->ID,'password_strong?', true);
|
316 |
+
$count = get_site_option('users_with_weak_pass');
|
317 |
+
$count = $count + 1;
|
318 |
+
update_site_option('users_with_weak_pass', $count);
|
319 |
+
}
|
320 |
+
}
|
321 |
+
else{
|
322 |
+
if(get_user_meta($user->ID,'password_strong?')){
|
323 |
+
$count = get_site_option('users_with_weak_pass');
|
324 |
+
$count = $count - 1;
|
325 |
+
update_site_option('users_with_weak_pass', $count);
|
326 |
+
}
|
327 |
+
delete_user_meta($user->ID,'password_strong?');
|
328 |
+
}
|
329 |
+
|
330 |
+
|
331 |
+
}
|
332 |
+
|
333 |
+
}
|
334 |
+
}
|
335 |
+
|
336 |
+
|
337 |
+
//Function to handle failed user login attempt
|
338 |
+
function mo_wpns_login_failed($username)
|
339 |
+
{
|
340 |
+
global $moWpnsUtility;
|
341 |
+
$userIp = $moWpnsUtility->get_client_ip();
|
342 |
+
$userIp = sanitize_text_field( $userIp );
|
343 |
+
if(empty($userIp) || empty($username) || !MoWpnsUtility::get_mo2f_db_option('mo2f_enable_brute_force', 'get_option'))
|
344 |
+
return;
|
345 |
+
|
346 |
+
$mo_wpns_config = new MoWpnsHandler();
|
347 |
+
$isWhitelisted = $mo_wpns_config->is_whitelisted($userIp);
|
348 |
+
|
349 |
+
$mo_wpns_config->add_transactions($userIp, $username, MoWpnsConstants::LOGIN_TRANSACTION, MoWpnsConstants::FAILED);
|
350 |
+
|
351 |
+
if(!$isWhitelisted)
|
352 |
+
{
|
353 |
+
|
354 |
+
|
355 |
+
if(get_option('mo_wpns_enable_unusual_activity_email_to_user'))
|
356 |
+
$moWpnsUtility->sendNotificationToUserForUnusualActivities($username, $userIp, MoWpnsConstants::FAILED_LOGIN_ATTEMPTS_FROM_NEW_IP);
|
357 |
+
|
358 |
+
$failedAttempts = $mo_wpns_config->get_failed_attempts_count($userIp);
|
359 |
+
$allowedLoginAttepts = get_option('mo2f_allwed_login_attempts') ? get_option('mo2f_allwed_login_attempts') : 10;
|
360 |
+
|
361 |
+
if($allowedLoginAttepts - $failedAttempts<=0)
|
362 |
+
$this->handle_login_attempt_exceeded($userIp);
|
363 |
+
else if(MoWpnsUtility::get_mo2f_db_option('mo2f_show_remaining_attempts', 'get_option'))
|
364 |
+
$this->show_limit_login_left($allowedLoginAttepts,$failedAttempts);
|
365 |
+
}
|
366 |
+
|
367 |
+
}
|
368 |
+
|
369 |
+
|
370 |
+
|
371 |
+
|
372 |
+
|
373 |
+
//Function to show number of attempts remaining
|
374 |
+
function show_limit_login_left($allowedLoginAttepts,$failedAttempts)
|
375 |
+
{
|
376 |
+
global $error;
|
377 |
+
$diff = $allowedLoginAttepts - $failedAttempts;
|
378 |
+
$error = "<br>You have <b>".$diff."</b> login attempts remaining.";
|
379 |
+
}
|
380 |
+
|
381 |
+
|
382 |
+
//Function to handle login limit exceeded
|
383 |
+
function handle_login_attempt_exceeded($userIp)
|
384 |
+
{
|
385 |
+
global $moWpnsUtility, $mo2f_dirName;
|
386 |
+
$mo_wpns_config = new MoWpnsHandler();
|
387 |
+
$mo_wpns_config->mo_wpns_block_ip($userIp, MoWpnsConstants::LOGIN_ATTEMPTS_EXCEEDED, false);
|
388 |
+
include_once("mo-block.html");
|
389 |
+
exit;
|
390 |
+
|
391 |
+
}
|
392 |
+
|
393 |
+
function setup_registration_closed($user){
|
394 |
+
global $Mo2fdbQueries;
|
395 |
+
if ( isset( $_POST['option'] ) and sanitize_text_field($_POST['option']) == 'mo2f_registration_closed' ) {
|
396 |
+
$nonce = sanitize_text_field($_POST['mo2f_registration_closed_nonce']);
|
397 |
+
if ( ! wp_verify_nonce( $nonce, 'mo2f-registration-closed-nonce' ) ) {
|
398 |
+
$error = new WP_Error();
|
399 |
+
$error->add( 'empty_username', '<strong>' . mo2f_lt( 'ERROR' ) . '</strong>: ' . mo2f_lt( 'Invalid Request.' ) );
|
400 |
+
return $error;
|
401 |
+
} else {
|
402 |
+
if(!$Mo2fdbQueries->get_user_detail( 'mo_2factor_user_registration_status', $user->ID) =='MO_2_FACTOR_PLUGIN_SETTINGS'){
|
403 |
+
//$Mo2fdbQueries->update_user_details( $user->ID, array( 'mo_2factor_user_registration_status' => '' ) );
|
404 |
+
delete_user_meta( $user->ID, 'register_account_popup' );
|
405 |
+
|
406 |
+
}
|
407 |
+
}
|
408 |
+
}
|
409 |
+
}
|
410 |
+
|
411 |
+
}
|
412 |
+
new LoginHandler;
|
handler/malware_scanner/scanner_set_cron.php
CHANGED
@@ -1,305 +1,305 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
class mo2f_scanner_parts
|
4 |
-
{
|
5 |
-
function __construct(){
|
6 |
-
}
|
7 |
-
|
8 |
-
|
9 |
-
function check_scan_status(){
|
10 |
-
|
11 |
-
global $wpdb;
|
12 |
-
if(is_multisite()){
|
13 |
-
$query="SELECT `meta_value` from `".$wpdb->base_prefix."sitemeta` WHERE `meta_key` = 'mo_stop_scan'";
|
14 |
-
$stop_scan= $wpdb->get_results($query);
|
15 |
-
$stop_scan_process=$stop_scan[0]->meta_value;
|
16 |
-
}else{
|
17 |
-
$query="SELECT `option_value` from `".$wpdb->base_prefix."options` WHERE `option_name` = 'mo_stop_scan'";
|
18 |
-
$stop_scan= $wpdb->get_results($query);
|
19 |
-
$stop_scan_process=$stop_scan[0]->option_value;
|
20 |
-
}
|
21 |
-
|
22 |
-
if($stop_scan_process=="1") {
|
23 |
-
$this->mo2f_end_scan();
|
24 |
-
return "1";
|
25 |
-
}
|
26 |
-
else{
|
27 |
-
return "0";
|
28 |
-
}
|
29 |
-
}
|
30 |
-
function file_cron_scan(){//main cron function
|
31 |
-
|
32 |
-
$scan_request = isset($_GET['scan_request'])? sanitize_text_field($_GET['scan_request']):false;
|
33 |
-
if($scan_request) {
|
34 |
-
$status=$this->check_scan_status();
|
35 |
-
|
36 |
-
if($status){
|
37 |
-
exit;
|
38 |
-
//abort
|
39 |
-
}
|
40 |
-
ini_set('memory_limit', '-1');
|
41 |
-
ini_set('max_execution_time', 0);
|
42 |
-
$scan_mode = isset( $_GET['scan_mode'] ) ? sanitize_text_field($_GET['scan_mode']) : false;
|
43 |
-
$scan_stage_complete = isset( $_GET['scan_stage_complete'] ) ? sanitize_text_field($_GET['scan_stage_complete']) : false;
|
44 |
-
$reportid = isset( $_GET['reportid'] ) ? sanitize_text_field($_GET['reportid']) : false;
|
45 |
-
|
46 |
-
$scanverification = isset( $_GET['scanverification'] ) ? sanitize_text_field($_GET['scanverification']) : false;
|
47 |
-
$scanverification_code = get_site_option( "mo2f_scanverification" );
|
48 |
-
if ( $scanverification != $scanverification_code ) {
|
49 |
-
error_log( "Request Does not exists" );
|
50 |
-
exit;
|
51 |
-
}
|
52 |
-
|
53 |
-
$mo2f_malware_db_handler = new MoWpnsDB();
|
54 |
-
$mo_wpns_scan_handler = new Mo_wpns_Scan_Handler_Cron();
|
55 |
-
|
56 |
-
//switch case stage wise
|
57 |
-
if ( $scan_mode == 'Quick Scan' ) {
|
58 |
-
$scan_config = MoWpnsConstants::$quick_scan_configuration;
|
59 |
-
} elseif ( $scan_mode == 'Standard Scan' ) {
|
60 |
-
$scan_config = MoWpnsConstants::$standard_scan_configuration;
|
61 |
-
} else {
|
62 |
-
$scan_config = get_site_option( 'mo2f_custom_scan_config' );
|
63 |
-
}
|
64 |
-
|
65 |
-
$repo_status_code = get_site_option('mo2f_repo_status');
|
66 |
-
if ( ($scan_config['check_repo'] == 0 || $repo_status_code < 0) && $scan_stage_complete == 3 ) {//repo check not required so scan ended
|
67 |
-
|
68 |
-
$decoded_scan_status=json_decode(get_site_option('mo_wpns_scan_status'));
|
69 |
-
$mo_wpns_files_scanned=$decoded_scan_status->total_files;
|
70 |
-
$decoded_scan_status->files_scanned=$mo_wpns_files_scanned;
|
71 |
-
$encoded_scan_status=json_encode($decoded_scan_status);
|
72 |
-
update_site_option('mo_wpns_scan_status', $encoded_scan_status);
|
73 |
-
$this->mo2f_end_scan();
|
74 |
-
exit;
|
75 |
-
}
|
76 |
-
|
77 |
-
$uploads_dir = wp_upload_dir();
|
78 |
-
$uploads_path= $uploads_dir['basedir'];
|
79 |
-
$repo_file_path = $uploads_path . DIRECTORY_SEPARATOR . "miniorangescan";
|
80 |
-
$current_time = time();
|
81 |
-
$time_limit = ini_get( 'max_execution_time' );
|
82 |
-
usleep(10000);//10miliseconds
|
83 |
-
switch ( $scan_stage_complete ) {
|
84 |
-
case 1:
|
85 |
-
$this->mo2f_scan_with_service( $scan_config, $reportid, $scanverification);
|
86 |
-
break;
|
87 |
-
case 2:
|
88 |
-
$this->mo2f_check_ext_link( $scan_config,$reportid,$scanverification);
|
89 |
-
break;
|
90 |
-
case 3:
|
91 |
-
$mo_wpns_scan_handler->mo2f_download_plugins_wp( $repo_file_path, $scan_config, $current_time, $time_limit,$reportid, $scanverification);
|
92 |
-
break;
|
93 |
-
case 4:
|
94 |
-
$mo_wpns_scan_handler->mo2f_download_themes_wp( $repo_file_path, $scan_config, $current_time, $time_limit,$reportid, $scanverification);
|
95 |
-
break;
|
96 |
-
case 5:
|
97 |
-
$mo_wpns_scan_handler->mo2f_download_core_wp( $repo_file_path, $scan_config,$reportid, $scanverification);
|
98 |
-
break;
|
99 |
-
case 6:
|
100 |
-
$this->mo2f_check_with_repo( $scan_config, $repo_file_path,$reportid,$scanverification);
|
101 |
-
break;
|
102 |
-
case 7:
|
103 |
-
$this->mo2f_end_scan();
|
104 |
-
break;
|
105 |
-
}
|
106 |
-
}
|
107 |
-
}
|
108 |
-
|
109 |
-
function mo2f_scan_with_service($scan_config, $reportid, $scanverification){
|
110 |
-
$current_time= time();
|
111 |
-
$mo2f_malware_db_handler = new MoWpnsDB();
|
112 |
-
$files_to_scan=$mo2f_malware_db_handler->get_files_in_parts();
|
113 |
-
$mo_wpns_scan_handler = new Mo_wpns_Scan_Handler_Cron();
|
114 |
-
|
115 |
-
if(empty($files_to_scan)){
|
116 |
-
|
117 |
-
$last_report = $mo2f_malware_db_handler->get_report_with_id($reportid);
|
118 |
-
$scan_malware_count=$last_report[0]->malware_count;
|
119 |
-
$last_scan=$mo2f_malware_db_handler->count_files_last_scan($reportid);
|
120 |
-
|
121 |
-
$hostname = 'scanner.api.xecurify.com';
|
122 |
-
$malware_server_status = $mo_wpns_scan_handler->mo_wpns_check_malware_server_status($hostname);
|
123 |
-
if($malware_server_status){
|
124 |
-
$host = 'http://scanner.api.xecurify.com/malwareservice/rest/file/data';
|
125 |
-
$postdata = http_build_query(array('fileCount' => $last_scan, 'maliciousCount' => $scan_malware_count));
|
126 |
-
$content_type = 'application/x-www-form-urlencoded';
|
127 |
-
$lastRequest = $mo_wpns_scan_handler->mo_wpns_malware_scan_request($host, $content_type,$postdata);
|
128 |
-
}
|
129 |
-
$Mo_wpns_Scan_Handler_Cron = new Mo_wpns_Scan_Handler_Cron();
|
130 |
-
$response=$Mo_wpns_Scan_Handler_Cron->mo2f_wp_remote_get($scan_config['type_scan'], $reportid, $scanverification, 2);
|
131 |
-
|
132 |
-
}else{//sending next 100 files
|
133 |
-
$current_time= time();
|
134 |
-
$time_limit= ini_get('max_execution_time');
|
135 |
-
$result=$mo_wpns_scan_handler->get_scan_result_parts($scan_config, $current_time, $time_limit,$mo2f_malware_db_handler, $files_to_scan);
|
136 |
-
|
137 |
-
if($result['scan']){
|
138 |
-
foreach ($result['scan'] as $key => $value) {
|
139 |
-
$value=array('scan'=>'Premium');
|
140 |
-
$mo2f_malware_db_handler->add_report_details($reportid, $key, $value);
|
141 |
-
}
|
142 |
-
}
|
143 |
-
$mo2f_malware_db_handler->update_files_scan($files_to_scan, $result['file_count']);
|
144 |
-
|
145 |
-
$last_report = $mo2f_malware_db_handler->get_report_with_id($reportid);
|
146 |
-
$result['file_count']= $last_report[0]->scanned_files + $result['file_count'];
|
147 |
-
$result['malware_count'] = $last_report[0]->malware_count + $result['malware_count'];
|
148 |
-
$result['malicious_link'] = 0;
|
149 |
-
$result['repo_issues'] = $last_report[0]->repo_issues;
|
150 |
-
|
151 |
-
$mo2f_malware_db_handler->scan_report_complete($reportid, $result['file_count'], $result['malware_count'], $result['repo_issues'], $result['malicious_link']);
|
152 |
-
|
153 |
-
$Mo_wpns_Scan_Handler_Cron = new Mo_wpns_Scan_Handler_Cron();
|
154 |
-
$response=$Mo_wpns_Scan_Handler_Cron->mo2f_wp_remote_get($scan_config['type_scan'], $reportid, $scanverification, 1);
|
155 |
-
|
156 |
-
}
|
157 |
-
}
|
158 |
-
|
159 |
-
function mo2f_check_ext_link($scan_config, $reportid, $scanverification){
|
160 |
-
$mo2f_malware_db_handler = new MoWpnsDB();
|
161 |
-
$files_to_scan=$mo2f_malware_db_handler->get_files_for_link();
|
162 |
-
$currentFileScanTime=time();
|
163 |
-
|
164 |
-
if(!empty($files_to_scan) && $scan_config['ext_link_check']){
|
165 |
-
$mo_wpns_scan_handler = new Mo_wpns_Scan_Handler_Cron();
|
166 |
-
$current_time= time();
|
167 |
-
$time_limit= ini_get('max_execution_time');
|
168 |
-
$response=$mo_wpns_scan_handler->scan_for_ext_link($files_to_scan, $scan_config, $current_time, $time_limit, $reportid);
|
169 |
-
|
170 |
-
if($response['scan']){
|
171 |
-
foreach ($response['scan'] as $key => $value) {
|
172 |
-
$mo2f_malware_db_handler->add_report_details($reportid, $key, $value);
|
173 |
-
}
|
174 |
-
}
|
175 |
-
$mo2f_malware_db_handler->update_files_scan_ext_link($files_to_scan, $response['file_count']);
|
176 |
-
|
177 |
-
$last_report = $mo2f_malware_db_handler->get_report_with_id($reportid);
|
178 |
-
$response['file_count']= $last_report[0]->scanned_files;
|
179 |
-
$response['malware_count'] = $last_report[0]->malware_count;
|
180 |
-
$response['repo_issues'] = $last_report[0]->repo_issues;
|
181 |
-
$response['malicious_link'] = $last_report[0]->malicious_links + $response['malicious_link'];
|
182 |
-
|
183 |
-
$mo2f_malware_db_handler->scan_report_complete($reportid, $response['file_count'], $response['malware_count'], $response['repo_issues'], $response['malicious_link']);
|
184 |
-
|
185 |
-
$response=$mo_wpns_scan_handler->mo2f_wp_remote_get($scan_config['type_scan'], $reportid, $scanverification, 2);
|
186 |
-
}else{
|
187 |
-
$decoded_scan_status=json_decode(get_site_option('mo_wpns_scan_status'));
|
188 |
-
$mo_wpns_files_scanned=$decoded_scan_status->total_files;
|
189 |
-
$decoded_scan_status->files_scanned=0.85*$mo_wpns_files_scanned;
|
190 |
-
$encoded_scan_status=json_encode($decoded_scan_status);
|
191 |
-
update_site_option('mo_wpns_scan_status', $encoded_scan_status);
|
192 |
-
$Mo_wpns_Scan_Handler_Cron = new Mo_wpns_Scan_Handler_Cron();
|
193 |
-
$response=$Mo_wpns_Scan_Handler_Cron->mo2f_wp_remote_get($scan_config['type_scan'], $reportid, $scanverification, 3);
|
194 |
-
|
195 |
-
}
|
196 |
-
}
|
197 |
-
|
198 |
-
function mo2f_check_with_repo($scan_config, $repo_file_path,$reportid, $scanverification){
|
199 |
-
$download_status=false;
|
200 |
-
$decoded_scan_configuration=json_decode(get_site_option('mo_wpns_scan_status'));
|
201 |
-
$decoded_scan_configuration->status_download_time=$download_status;
|
202 |
-
$encoded_scan_configuration=json_encode($decoded_scan_configuration);
|
203 |
-
update_site_option("mo_wpns_scan_status",$encoded_scan_configuration);
|
204 |
-
$mo2f_malware_db_handler = new MoWpnsDB();
|
205 |
-
$response=array();
|
206 |
-
$repo_status = get_site_option('mo2f_repo_status');
|
207 |
-
$repo_key = get_site_option('mo2f_current_repo_key');
|
208 |
-
if($repo_status != 0){
|
209 |
-
$last_report = $mo2f_malware_db_handler->get_report_with_id($reportid);
|
210 |
-
if($repo_status == -95){
|
211 |
-
if(!empty($last_report)){
|
212 |
-
$mo2f_malware_db_handler->mo2f_update_net_issue($reportid);
|
213 |
-
}
|
214 |
-
$this->mo2f_end_scan();
|
215 |
-
exit;
|
216 |
-
}else{
|
217 |
-
if(! empty($last_report)){
|
218 |
-
$issue = $last_report[0]->repo_key;
|
219 |
-
if($repo_key == 'core'){
|
220 |
-
$issue.= "WordPress Core Files;";
|
221 |
-
}else{
|
222 |
-
$issue.= $repo_key.";";
|
223 |
-
}
|
224 |
-
$mo2f_malware_db_handler->mo2f_update_repo_issue($reportid, $issue);
|
225 |
-
}
|
226 |
-
|
227 |
-
$this->mo2f_make_next_request($scan_config, $reportid, $scanverification, $repo_file_path);
|
228 |
-
}
|
229 |
-
|
230 |
-
}else{
|
231 |
-
$files_to_scan=$mo2f_malware_db_handler->get_files_for_repo($repo_key);
|
232 |
-
if(empty($files_to_scan)){
|
233 |
-
$this->mo2f_make_next_request($scan_config, $reportid, $scanverification, $repo_file_path);
|
234 |
-
}else{
|
235 |
-
$mo_wpns_scan_handler = new Mo_wpns_Scan_Handler_Cron();
|
236 |
-
$current_time= time();
|
237 |
-
$time_limit= ini_get('max_execution_time');
|
238 |
-
$response=$mo_wpns_scan_handler->scan_with_repo($files_to_scan, $scan_config, $current_time, $time_limit, $reportid, $repo_file_path);
|
239 |
-
|
240 |
-
if($response['scan']){
|
241 |
-
foreach ($response['scan'] as $key => $value) {
|
242 |
-
$mo2f_malware_db_handler->add_report_details($reportid, $key, $value);
|
243 |
-
}
|
244 |
-
}
|
245 |
-
$mo2f_malware_db_handler->update_files_scan_repo($files_to_scan, $response['file_count']);
|
246 |
-
|
247 |
-
$last_report = $mo2f_malware_db_handler->get_report_with_id($reportid);
|
248 |
-
$response['file_count']= $last_report[0]->scanned_files;
|
249 |
-
$response['malware_count'] = $last_report[0]->malware_count;
|
250 |
-
$response['repo_issues'] = $last_report[0]->repo_issues + $response['repo_issues'];
|
251 |
-
$response['malicious_link'] = $last_report[0]->malicious_links;
|
252 |
-
|
253 |
-
$mo2f_malware_db_handler->scan_report_complete($reportid, $response['file_count'], $response['malware_count'], $response['repo_issues'], $response['malicious_link']);
|
254 |
-
$Mo_wpns_Scan_Handler_Cron = new Mo_wpns_Scan_Handler_Cron();
|
255 |
-
$response=$Mo_wpns_Scan_Handler_Cron->mo2f_wp_remote_get($scan_config['type_scan'], $reportid, $scanverification, 6);
|
256 |
-
}
|
257 |
-
}
|
258 |
-
}
|
259 |
-
|
260 |
-
function mo2f_end_scan(){
|
261 |
-
$mo_wpns_scan_handler = new Mo_wpns_Scan_Handler_Cron();
|
262 |
-
$mo2f_malware_db_handler = new MoWpnsDB();
|
263 |
-
$uploads_dir = wp_upload_dir();
|
264 |
-
$uploads_path= $uploads_dir['basedir'];
|
265 |
-
$repo_file_path = $uploads_path . DIRECTORY_SEPARATOR . "miniorangescan";
|
266 |
-
if(is_dir($repo_file_path)){
|
267 |
-
$mo_wpns_scan_handler->remove_dir($repo_file_path);
|
268 |
-
}
|
269 |
-
$decoded_scan_configuration=json_decode(get_site_option('mo_wpns_scan_status'));
|
270 |
-
$decoded_scan_configuration->scan_progress="COMPLETE";
|
271 |
-
$encoded_scan_configuration=json_encode($decoded_scan_configuration);
|
272 |
-
update_site_option("mo_wpns_scan_status",$encoded_scan_configuration);
|
273 |
-
$mo2f_malware_db_handler->delete_files_parts();
|
274 |
-
exit;
|
275 |
-
}
|
276 |
-
|
277 |
-
function mo2f_make_next_request($scan_config, $reportid, $scanverification, $repo_file_path){
|
278 |
-
$download_info = get_site_option('mo2f_download_info');
|
279 |
-
$download_done = get_site_option('mo2f_download_done');
|
280 |
-
$Mo_wpns_Scan_Handler_Cron = new Mo_wpns_Scan_Handler_Cron();
|
281 |
-
if(is_dir($repo_file_path)){
|
282 |
-
$Mo_wpns_Scan_Handler_Cron->remove_dir($repo_file_path);
|
283 |
-
}
|
284 |
-
if($download_info['stage'] == 'plugins'){
|
285 |
-
if($download_done < $download_info['plugin_count']){
|
286 |
-
$next_stage = 3;
|
287 |
-
}else{
|
288 |
-
update_site_option('mo2f_download_done',0);
|
289 |
-
$next_stage = 4;
|
290 |
-
}
|
291 |
-
}else if ($download_info['stage'] == 'themes') {
|
292 |
-
if($download_done < $download_info['theme_count']){
|
293 |
-
$next_stage = 4;
|
294 |
-
}else{
|
295 |
-
update_site_option('mo2f_download_done',0);
|
296 |
-
$next_stage = 5;
|
297 |
-
}
|
298 |
-
}else{
|
299 |
-
$next_stage = 7;
|
300 |
-
}
|
301 |
-
|
302 |
-
$response=$Mo_wpns_Scan_Handler_Cron->mo2f_wp_remote_get($scan_config['type_scan'], $reportid, $scanverification, $next_stage);
|
303 |
-
}
|
304 |
-
|
305 |
-
}new mo2f_scanner_parts;
|
1 |
+
<?php
|
2 |
+
|
3 |
+
class mo2f_scanner_parts
|
4 |
+
{
|
5 |
+
function __construct(){
|
6 |
+
}
|
7 |
+
|
8 |
+
|
9 |
+
function check_scan_status(){
|
10 |
+
|
11 |
+
global $wpdb;
|
12 |
+
if(is_multisite()){
|
13 |
+
$query="SELECT `meta_value` from `".$wpdb->base_prefix."sitemeta` WHERE `meta_key` = 'mo_stop_scan'";
|
14 |
+
$stop_scan= $wpdb->get_results($query);
|
15 |
+
$stop_scan_process=$stop_scan[0]->meta_value;
|
16 |
+
}else{
|
17 |
+
$query="SELECT `option_value` from `".$wpdb->base_prefix."options` WHERE `option_name` = 'mo_stop_scan'";
|
18 |
+
$stop_scan= $wpdb->get_results($query);
|
19 |
+
$stop_scan_process=$stop_scan[0]->option_value;
|
20 |
+
}
|
21 |
+
|
22 |
+
if($stop_scan_process=="1") {
|
23 |
+
$this->mo2f_end_scan();
|
24 |
+
return "1";
|
25 |
+
}
|
26 |
+
else{
|
27 |
+
return "0";
|
28 |
+
}
|
29 |
+
}
|
30 |
+
function file_cron_scan(){//main cron function
|
31 |
+
|
32 |
+
$scan_request = isset($_GET['scan_request'])? sanitize_text_field($_GET['scan_request']):false;
|
33 |
+
if($scan_request) {
|
34 |
+
$status=$this->check_scan_status();
|
35 |
+
|
36 |
+
if($status){
|
37 |
+
exit;
|
38 |
+
//abort
|
39 |
+
}
|
40 |
+
ini_set('memory_limit', '-1');
|
41 |
+
ini_set('max_execution_time', 0);
|
42 |
+
$scan_mode = isset( $_GET['scan_mode'] ) ? sanitize_text_field($_GET['scan_mode']) : false;
|
43 |
+
$scan_stage_complete = isset( $_GET['scan_stage_complete'] ) ? sanitize_text_field($_GET['scan_stage_complete']) : false;
|
44 |
+
$reportid = isset( $_GET['reportid'] ) ? sanitize_text_field($_GET['reportid']) : false;
|
45 |
+
|
46 |
+
$scanverification = isset( $_GET['scanverification'] ) ? sanitize_text_field($_GET['scanverification']) : false;
|
47 |
+
$scanverification_code = get_site_option( "mo2f_scanverification" );
|
48 |
+
if ( $scanverification != $scanverification_code ) {
|
49 |
+
error_log( "Request Does not exists" );
|
50 |
+
exit;
|
51 |
+
}
|
52 |
+
|
53 |
+
$mo2f_malware_db_handler = new MoWpnsDB();
|
54 |
+
$mo_wpns_scan_handler = new Mo_wpns_Scan_Handler_Cron();
|
55 |
+
|
56 |
+
//switch case stage wise
|
57 |
+
if ( $scan_mode == 'Quick Scan' ) {
|
58 |
+
$scan_config = MoWpnsConstants::$quick_scan_configuration;
|
59 |
+
} elseif ( $scan_mode == 'Standard Scan' ) {
|
60 |
+
$scan_config = MoWpnsConstants::$standard_scan_configuration;
|
61 |
+
} else {
|
62 |
+
$scan_config = get_site_option( 'mo2f_custom_scan_config' );
|
63 |
+
}
|
64 |
+
|
65 |
+
$repo_status_code = get_site_option('mo2f_repo_status');
|
66 |
+
if ( ($scan_config['check_repo'] == 0 || $repo_status_code < 0) && $scan_stage_complete == 3 ) {//repo check not required so scan ended
|
67 |
+
|
68 |
+
$decoded_scan_status=json_decode(get_site_option('mo_wpns_scan_status'));
|
69 |
+
$mo_wpns_files_scanned=$decoded_scan_status->total_files;
|
70 |
+
$decoded_scan_status->files_scanned=$mo_wpns_files_scanned;
|
71 |
+
$encoded_scan_status=json_encode($decoded_scan_status);
|
72 |
+
update_site_option('mo_wpns_scan_status', $encoded_scan_status);
|
73 |
+
$this->mo2f_end_scan();
|
74 |
+
exit;
|
75 |
+
}
|
76 |
+
|
77 |
+
$uploads_dir = wp_upload_dir();
|
78 |
+
$uploads_path= $uploads_dir['basedir'];
|
79 |
+
$repo_file_path = $uploads_path . DIRECTORY_SEPARATOR . "miniorangescan";
|
80 |
+
$current_time = time();
|
81 |
+
$time_limit = ini_get( 'max_execution_time' );
|
82 |
+
usleep(10000);//10miliseconds
|
83 |
+
switch ( $scan_stage_complete ) {
|
84 |
+
case 1:
|
85 |
+
$this->mo2f_scan_with_service( $scan_config, $reportid, $scanverification);
|
86 |
+
break;
|
87 |
+
case 2:
|
88 |
+
$this->mo2f_check_ext_link( $scan_config,$reportid,$scanverification);
|
89 |
+
break;
|
90 |
+
case 3:
|
91 |
+
$mo_wpns_scan_handler->mo2f_download_plugins_wp( $repo_file_path, $scan_config, $current_time, $time_limit,$reportid, $scanverification);
|
92 |
+
break;
|
93 |
+
case 4:
|
94 |
+
$mo_wpns_scan_handler->mo2f_download_themes_wp( $repo_file_path, $scan_config, $current_time, $time_limit,$reportid, $scanverification);
|
95 |
+
break;
|
96 |
+
case 5:
|
97 |
+
$mo_wpns_scan_handler->mo2f_download_core_wp( $repo_file_path, $scan_config,$reportid, $scanverification);
|
98 |
+
break;
|
99 |
+
case 6:
|
100 |
+
$this->mo2f_check_with_repo( $scan_config, $repo_file_path,$reportid,$scanverification);
|
101 |
+
break;
|
102 |
+
case 7:
|
103 |
+
$this->mo2f_end_scan();
|
104 |
+
break;
|
105 |
+
}
|
106 |
+
}
|
107 |
+
}
|
108 |
+
|
109 |
+
function mo2f_scan_with_service($scan_config, $reportid, $scanverification){
|
110 |
+
$current_time= time();
|
111 |
+
$mo2f_malware_db_handler = new MoWpnsDB();
|
112 |
+
$files_to_scan=$mo2f_malware_db_handler->get_files_in_parts();
|
113 |
+
$mo_wpns_scan_handler = new Mo_wpns_Scan_Handler_Cron();
|
114 |
+
|
115 |
+
if(empty($files_to_scan)){
|
116 |
+
|
117 |
+
$last_report = $mo2f_malware_db_handler->get_report_with_id($reportid);
|
118 |
+
$scan_malware_count=$last_report[0]->malware_count;
|
119 |
+
$last_scan=$mo2f_malware_db_handler->count_files_last_scan($reportid);
|
120 |
+
|
121 |
+
$hostname = 'scanner.api.xecurify.com';
|
122 |
+
$malware_server_status = $mo_wpns_scan_handler->mo_wpns_check_malware_server_status($hostname);
|
123 |
+
if($malware_server_status){
|
124 |
+
$host = 'http://scanner.api.xecurify.com/malwareservice/rest/file/data';
|
125 |
+
$postdata = http_build_query(array('fileCount' => $last_scan, 'maliciousCount' => $scan_malware_count));
|
126 |
+
$content_type = 'application/x-www-form-urlencoded';
|
127 |
+
$lastRequest = $mo_wpns_scan_handler->mo_wpns_malware_scan_request($host, $content_type,$postdata);
|
128 |
+
}
|
129 |
+
$Mo_wpns_Scan_Handler_Cron = new Mo_wpns_Scan_Handler_Cron();
|
130 |
+
$response=$Mo_wpns_Scan_Handler_Cron->mo2f_wp_remote_get($scan_config['type_scan'], $reportid, $scanverification, 2);
|
131 |
+
|
132 |
+
}else{//sending next 100 files
|
133 |
+
$current_time= time();
|
134 |
+
$time_limit= ini_get('max_execution_time');
|
135 |
+
$result=$mo_wpns_scan_handler->get_scan_result_parts($scan_config, $current_time, $time_limit,$mo2f_malware_db_handler, $files_to_scan);
|
136 |
+
|
137 |
+
if($result['scan']){
|
138 |
+
foreach ($result['scan'] as $key => $value) {
|
139 |
+
$value=array('scan'=>'Premium');
|
140 |
+
$mo2f_malware_db_handler->add_report_details($reportid, $key, $value);
|
141 |
+
}
|
142 |
+
}
|
143 |
+
$mo2f_malware_db_handler->update_files_scan($files_to_scan, $result['file_count']);
|
144 |
+
|
145 |
+
$last_report = $mo2f_malware_db_handler->get_report_with_id($reportid);
|
146 |
+
$result['file_count']= $last_report[0]->scanned_files + $result['file_count'];
|
147 |
+
$result['malware_count'] = $last_report[0]->malware_count + $result['malware_count'];
|
148 |
+
$result['malicious_link'] = 0;
|
149 |
+
$result['repo_issues'] = $last_report[0]->repo_issues;
|
150 |
+
|
151 |
+
$mo2f_malware_db_handler->scan_report_complete($reportid, $result['file_count'], $result['malware_count'], $result['repo_issues'], $result['malicious_link']);
|
152 |
+
|
153 |
+
$Mo_wpns_Scan_Handler_Cron = new Mo_wpns_Scan_Handler_Cron();
|
154 |
+
$response=$Mo_wpns_Scan_Handler_Cron->mo2f_wp_remote_get($scan_config['type_scan'], $reportid, $scanverification, 1);
|
155 |
+
|
156 |
+
}
|
157 |
+
}
|
158 |
+
|
159 |
+
function mo2f_check_ext_link($scan_config, $reportid, $scanverification){
|
160 |
+
$mo2f_malware_db_handler = new MoWpnsDB();
|
161 |
+
$files_to_scan=$mo2f_malware_db_handler->get_files_for_link();
|
162 |
+
$currentFileScanTime=time();
|
163 |
+
|
164 |
+
if(!empty($files_to_scan) && $scan_config['ext_link_check']){
|
165 |
+
$mo_wpns_scan_handler = new Mo_wpns_Scan_Handler_Cron();
|
166 |
+
$current_time= time();
|
167 |
+
$time_limit= ini_get('max_execution_time');
|
168 |
+
$response=$mo_wpns_scan_handler->scan_for_ext_link($files_to_scan, $scan_config, $current_time, $time_limit, $reportid);
|
169 |
+
|
170 |
+
if($response['scan']){
|
171 |
+
foreach ($response['scan'] as $key => $value) {
|
172 |
+
$mo2f_malware_db_handler->add_report_details($reportid, $key, $value);
|
173 |
+
}
|
174 |
+
}
|
175 |
+
$mo2f_malware_db_handler->update_files_scan_ext_link($files_to_scan, $response['file_count']);
|
176 |
+
|
177 |
+
$last_report = $mo2f_malware_db_handler->get_report_with_id($reportid);
|
178 |
+
$response['file_count']= $last_report[0]->scanned_files;
|
179 |
+
$response['malware_count'] = $last_report[0]->malware_count;
|
180 |
+
$response['repo_issues'] = $last_report[0]->repo_issues;
|
181 |
+
$response['malicious_link'] = $last_report[0]->malicious_links + $response['malicious_link'];
|
182 |
+
|
183 |
+
$mo2f_malware_db_handler->scan_report_complete($reportid, $response['file_count'], $response['malware_count'], $response['repo_issues'], $response['malicious_link']);
|
184 |
+
|
185 |
+
$response=$mo_wpns_scan_handler->mo2f_wp_remote_get($scan_config['type_scan'], $reportid, $scanverification, 2);
|
186 |
+
}else{
|
187 |
+
$decoded_scan_status=json_decode(get_site_option('mo_wpns_scan_status'));
|
188 |
+
$mo_wpns_files_scanned=$decoded_scan_status->total_files;
|
189 |
+
$decoded_scan_status->files_scanned=0.85*$mo_wpns_files_scanned;
|
190 |
+
$encoded_scan_status=json_encode($decoded_scan_status);
|
191 |
+
update_site_option('mo_wpns_scan_status', $encoded_scan_status);
|
192 |
+
$Mo_wpns_Scan_Handler_Cron = new Mo_wpns_Scan_Handler_Cron();
|
193 |
+
$response=$Mo_wpns_Scan_Handler_Cron->mo2f_wp_remote_get($scan_config['type_scan'], $reportid, $scanverification, 3);
|
194 |
+
|
195 |
+
}
|
196 |
+
}
|
197 |
+
|
198 |
+
function mo2f_check_with_repo($scan_config, $repo_file_path,$reportid, $scanverification){
|
199 |
+
$download_status=false;
|
200 |
+
$decoded_scan_configuration=json_decode(get_site_option('mo_wpns_scan_status'));
|
201 |
+
$decoded_scan_configuration->status_download_time=$download_status;
|
202 |
+
$encoded_scan_configuration=json_encode($decoded_scan_configuration);
|
203 |
+
update_site_option("mo_wpns_scan_status",$encoded_scan_configuration);
|
204 |
+
$mo2f_malware_db_handler = new MoWpnsDB();
|
205 |
+
$response=array();
|
206 |
+
$repo_status = get_site_option('mo2f_repo_status');
|
207 |
+
$repo_key = get_site_option('mo2f_current_repo_key');
|
208 |
+
if($repo_status != 0){
|
209 |
+
$last_report = $mo2f_malware_db_handler->get_report_with_id($reportid);
|
210 |
+
if($repo_status == -95){
|
211 |
+
if(!empty($last_report)){
|
212 |
+
$mo2f_malware_db_handler->mo2f_update_net_issue($reportid);
|
213 |
+
}
|
214 |
+
$this->mo2f_end_scan();
|
215 |
+
exit;
|
216 |
+
}else{
|
217 |
+
if(! empty($last_report)){
|
218 |
+
$issue = $last_report[0]->repo_key;
|
219 |
+
if($repo_key == 'core'){
|
220 |
+
$issue.= "WordPress Core Files;";
|
221 |
+
}else{
|
222 |
+
$issue.= $repo_key.";";
|
223 |
+
}
|
224 |
+
$mo2f_malware_db_handler->mo2f_update_repo_issue($reportid, $issue);
|
225 |
+
}
|
226 |
+
|
227 |
+
$this->mo2f_make_next_request($scan_config, $reportid, $scanverification, $repo_file_path);
|
228 |
+
}
|
229 |
+
|
230 |
+
}else{
|
231 |
+
$files_to_scan=$mo2f_malware_db_handler->get_files_for_repo($repo_key);
|
232 |
+
if(empty($files_to_scan)){
|
233 |
+
$this->mo2f_make_next_request($scan_config, $reportid, $scanverification, $repo_file_path);
|
234 |
+
}else{
|
235 |
+
$mo_wpns_scan_handler = new Mo_wpns_Scan_Handler_Cron();
|
236 |
+
$current_time= time();
|
237 |
+
$time_limit= ini_get('max_execution_time');
|
238 |
+
$response=$mo_wpns_scan_handler->scan_with_repo($files_to_scan, $scan_config, $current_time, $time_limit, $reportid, $repo_file_path);
|
239 |
+
|
240 |
+
if($response['scan']){
|
241 |
+
foreach ($response['scan'] as $key => $value) {
|
242 |
+
$mo2f_malware_db_handler->add_report_details($reportid, $key, $value);
|
243 |
+
}
|
244 |
+
}
|
245 |
+
$mo2f_malware_db_handler->update_files_scan_repo($files_to_scan, $response['file_count']);
|
246 |
+
|
247 |
+
$last_report = $mo2f_malware_db_handler->get_report_with_id($reportid);
|
248 |
+
$response['file_count']= $last_report[0]->scanned_files;
|
249 |
+
$response['malware_count'] = $last_report[0]->malware_count;
|
250 |
+
$response['repo_issues'] = $last_report[0]->repo_issues + $response['repo_issues'];
|
251 |
+
$response['malicious_link'] = $last_report[0]->malicious_links;
|
252 |
+
|
253 |
+
$mo2f_malware_db_handler->scan_report_complete($reportid, $response['file_count'], $response['malware_count'], $response['repo_issues'], $response['malicious_link']);
|
254 |
+
$Mo_wpns_Scan_Handler_Cron = new Mo_wpns_Scan_Handler_Cron();
|
255 |
+
$response=$Mo_wpns_Scan_Handler_Cron->mo2f_wp_remote_get($scan_config['type_scan'], $reportid, $scanverification, 6);
|
256 |
+
}
|
257 |
+
}
|
258 |
+
}
|
259 |
+
|
260 |
+
function mo2f_end_scan(){
|
261 |
+
$mo_wpns_scan_handler = new Mo_wpns_Scan_Handler_Cron();
|
262 |
+
$mo2f_malware_db_handler = new MoWpnsDB();
|
263 |
+
$uploads_dir = wp_upload_dir();
|
264 |
+
$uploads_path= $uploads_dir['basedir'];
|
265 |
+
$repo_file_path = $uploads_path . DIRECTORY_SEPARATOR . "miniorangescan";
|
266 |
+
if(is_dir($repo_file_path)){
|
267 |
+
$mo_wpns_scan_handler->remove_dir($repo_file_path);
|
268 |
+
}
|
269 |
+
$decoded_scan_configuration=json_decode(get_site_option('mo_wpns_scan_status'));
|
270 |
+
$decoded_scan_configuration->scan_progress="COMPLETE";
|
271 |
+
$encoded_scan_configuration=json_encode($decoded_scan_configuration);
|
272 |
+
update_site_option("mo_wpns_scan_status",$encoded_scan_configuration);
|
273 |
+
$mo2f_malware_db_handler->delete_files_parts();
|
274 |
+
exit;
|
275 |
+
}
|
276 |
+
|
277 |
+
function mo2f_make_next_request($scan_config, $reportid, $scanverification, $repo_file_path){
|
278 |
+
$download_info = get_site_option('mo2f_download_info');
|
279 |
+
$download_done = get_site_option('mo2f_download_done');
|
280 |
+
$Mo_wpns_Scan_Handler_Cron = new Mo_wpns_Scan_Handler_Cron();
|
281 |
+
if(is_dir($repo_file_path)){
|
282 |
+
$Mo_wpns_Scan_Handler_Cron->remove_dir($repo_file_path);
|
283 |
+
}
|
284 |
+
if($download_info['stage'] == 'plugins'){
|
285 |
+
if($download_done < $download_info['plugin_count']){
|
286 |
+
$next_stage = 3;
|
287 |
+
}else{
|
288 |
+
update_site_option('mo2f_download_done',0);
|
289 |
+
$next_stage = 4;
|
290 |
+
}
|
291 |
+
}else if ($download_info['stage'] == 'themes') {
|
292 |
+
if($download_done < $download_info['theme_count']){
|
293 |
+
$next_stage = 4;
|
294 |
+
}else{
|
295 |
+
update_site_option('mo2f_download_done',0);
|
296 |
+
$next_stage = 5;
|
297 |
+
}
|
298 |
+
}else{
|
299 |
+
$next_stage = 7;
|
300 |
+
}
|
301 |
+
|
302 |
+
$response=$Mo_wpns_Scan_Handler_Cron->mo2f_wp_remote_get($scan_config['type_scan'], $reportid, $scanverification, $next_stage);
|
303 |
+
}
|
304 |
+
|
305 |
+
}new mo2f_scanner_parts;
|
handler/mo-block.html
CHANGED
@@ -1,9 +1,9 @@
|
|
1 |
-
<img src="data:image/jpeg;base64,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" style="margin-left: 5em;width: 12em;margin-top: 1px;">
|
2 |
-
<div>
|
3 |
-
<img src="data:image/jpeg;base64,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" style="width: 16em;margin-left: 52em;margin-top: 63px;">
|
4 |
-
<div><h1 style="font-size: 90px;margin-top: -2em;margin-left: 401PX;">403</h1></div>
|
5 |
-
<div><h2 style="font-size: 54px;margin-left: 557px;margin-top: -140px;" >Forbidden</h2></div>
|
6 |
-
<div><h6 style="font-size: 21px;margin-left: 19em;margin-top: 7em;color: red;">Your IP has been blocked. Please Contact your Administrator.<h6></div>
|
7 |
-
<h6 style="font-size: 21px;margin-left:20em;">For more information please contact miniorange <a href="https://faq.miniorange.com/">FAQ'S</h6>
|
8 |
-
</div>
|
9 |
-
</div>
|
1 |
+
<img src="data:image/jpeg;base64,iVBORw0KGgoAAAANSUhEUgAAAVMAAACVCAMAAADSU+lbAAAA51BMVEX///9fYGJeYGL3k01cXV9ZWlz8/PxdXmFhYmTv7+/5+fnm5+eSk5Tq6upaW173kUnV1dZqa21xcnTe39+IiYrMzc2bznuPkJHDxMWfn6D2j0VrbG19fX+EhIf+9e95eny2trf4pGr5rnnAwMGqq6yioqT4oGL3mFRNmWX949NSU1X+7eP83cn7zK3++PL5s4X6wpzy+e770riv2Jb82MD5touXxKX96Nu61cLg7eRzrYQ+kln3o2aiya73m1vM4NGGuZSszrZjp2t2tHCSxYG43KLL5buKwnXW6smm04np9ONmp3vC4K/9LbbnAAARyklEQVR4nO1ci2LbthUlaYAQSYkSKal6S7QlWbEl24obN22XuXul67b+//cMuBcgAZBytCVLkxVn6WJDEEgc3sfBBRjPc3BwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBw+BSIkqSfJEn8H/UO/7f39JUjbs9mWZblxVk0RYtMIB++2Ot+ubw3hwt/+O/v8OtDp0UIYYyOonN69wiAtk91uL+5e7q6ury8uno4HipeX393ph/8XyBpMQEyOIvToc98nz+BRk7D/ePllKOLmE6v36qPvn/1ezLUpBUIns7m1A8C5jdyenO8nnYvdEyf5Ec//PiHnz7dLX/xSFq+AD2bU+hd53R5vO6ajF5cdN/d44d/evWHP37Su/6yAfGUR8iPjKdvDEa7+Mv0CiJq/N2rV6/+9Inv+0tG3M4BZ+b9AfYem83LY+n1PIxOL3a7nfj7+SA+/OnHV4LT1xy/FwkW9QXO1acd6N03G/dPFaO7h+PjgePN3dPxhnMY/lkw+pe//u39t99++/7n31P6/xgsr7qK0cvHfalM4Qeg9C9//wbx/p+/5X1+JOIoimLb00RjdLahnN17eTlFRi+uDrUPv+eU/lUy+s0v5167vPwLwQI6RC9Gkw+OcYKoBiTjTXswX7Q3Y81H42ExGSzmg0kxNIiK0Zn75nIz6okh5oN20WvuXTXdS8efPj/e12/5R43Sn+1Pw6SvYGTIsD+Wl9+se42PNeyvxWwWo804afpcH2N7YgzP6yui1v2XjSeZrFqUiuRM/bwtWY3Xg4zy1pS3ZoO1NkIHk07e1mYVF4uMpjhGthhrvXvYeTapmu6kFn331qvjB+74itJfLXNINoNVrqAvdnuj3Kcp6AuaZoNh3Yx4jxR68DmuJp2GC/faOdPGWDdwNhRd+KeiRz5q6iERbQJKuCwPuIpkPqEMrtjLKYEGoe/5ZfJeNTMf1VGlT8Nhzi/EhwhE94DQVTXhIUktLXW4ADPtPiybbodzqmLpP8xYGk0IJRUqIdEf8KfJVxaohBm/2MJKiUmbaj0IbW1sHdgf8Rn4soMfiBlbY3jJgg+iejDg5EQISEaCURwJ/mJ0noTrFhVrJfy6+JO2yseStIhYbVbrqHjDW5jWPaBsrS6Hmj+oOL1/h0q0mVIv/ldlpuasBzgjvEm/4nScUQY3WzLi06ynf7W3AgOpenBxbZrqOKes7BDIMcY6ZSHv4leXFz+Q1qbRVKMFZzQQfAr44n8+nW8zeGbYgK2kpfQo51SYb1pyuvEJXIsF5ZxJa604Dax11CPkp+5zM6We98cymhpmGi0oXiHAq5ScrjOkWrgJw3sOglTzK68v2Sh78L/pSKdjLMxEflX18MlMDy/8MsyvLo89fC2ilYjb1EcitacofFtvYLJxrDgFyy19f0wYw05M2Tb/IZM3NPQhhpSc7i+FmXZ3Nyco9V5/25jzR8qQ5L2quxm2TBOUPbizqW925lR+wKoehEwqUocZqb4aoKuJGWeVMQ+REo0q6EE39QkU0KH02+re+JdZ1QBDqEsAp1UNJVmlQTldBjcuHiVddSSn8FhLTh8x59+dotTz/vkegqlJaf8WHYnJ2TDJaTJLZUMAUTZQ86XKhOIJVT0UZ+CCpSd5yZycGKN0rk6GAVIkC5EdpMPwUWp14c489XUwhqYGfzNposg4/790o3HKpO+HGyItmVX/iVqgfIRDYJml8vZQ7Xev9qc59V7/8vOvv1haf6vFdz1HbakM+ITOFqMBFzDyDogvDbXHjZD5PjMnym1iXsautBwjM8bwWzKCiEniGGlrtCmKSU7liPVK0hq/zW2Q3t6KP4QF2ADmmvIW0crARHyySpBT0SuQdprk4NviYyp68yHkrxk41xC9ST3ymx1wapvp/u541JWVnVDDAcHEwOhtpmkpYT/o6611EnE53p9g+uY5Rrplm8rEw+QcUeLwr8joEWWqoVXgGFsZT5QV8YgsG+iix/V+GCfbW3RiRqxCRpgTNMQ0L5I4jDvrOSNoc9xOSas9jMMwHk5aYLU8+RfIqfhZ2WlBpXWng3EUxtF47sshsPcQP1WcHkWG6l6bWv/+ThSmG5RAuJQdoxXBe2i1DcW+ScGjuAgpQ1+PTwpufwXPNEp96OGnM5hjj89GNqzwC8Ut9iDzcox+nsox4GphkYLz8VmUQXjtE5gYWZnPv0/BoANS6rlOW7q6eHKlHhozfPY4ZNKC+CntFGIRbyhjfjRRzjUS30c79ZXvQ4aaHk3qHi+kvLIo3R+vHt7gfa3QTvXMIq41QPuRc0cMsb7LUE+t0aB8slBKYD2TRsfwSws1hiZIexgTGTq/ugzLK0cPt8p0TR1b3KKZasIjmhNM34xuq44bDB8k75ScSn3aIUAw9+3yclz1sKB8yENgXHG6xBWUmfRRCtTblw/T7vTiRnEq0DIn0BeOxke/XWuN4YKAoWASaqN41edYoHDxKXToZDgGKfQxRhi/sUs/k09Uv0wfndyn+vfKUEN0QTBWzzXXVHEkp0R6ntT8vtSnPexOZroevEVLhZyIml/F0xtw/Z3p+gdV97Ps9yDq1Lib0lnhxDNLquPSh7UM612j+8G0olWKeU2bY7zAjIPSYCzNOjeGhttmAd0KXxtTlBp5ElaIJykkDrPaHi/E9bge0BcdEQEhF1Ddy8JtGkCmKYBTiOlopwWFD4ghoXOMH/BYYT+qzPsg+LtXZgh6M7V3oySn2PneK32fWJwWmGPpyGhNUI+mYgaQXcTd9I2vBTgDcR8F5lg6MMboz+Bx4dJAuKn4Rt6eaJjLqDbXpx7lImkGJDPCvrwJwxW8NUoRiAdop9L3t9RIkAiuCAOxV1p4ct+0lHqQouxwelPu8JlyADRC93IpORWmZ3IabzHKWO4XCQnPglRs7nAlJXqwTH+MPI+AvgM1tcWUZql3oTK5QEDC2pgJ/SClKZV/qHAG3oNbr66mOplQTb7Z6EnJasQO7iDADFgb7PEx6ftt5NQ3ekvzSTchcMqq9T5yaimppYyn3alZqHp7DRphj5wKCcQsTtuQ1INbU3jHOWRpuEFYZglujA634GkpBPx2CjnFCMkqLXHCBKfCnxkWmRgLUAJUDTPdBRKxqhdqwIhGAyCEBYbuGoK/M3Ay1FIlp2JsazkxxpSWbmOhpWBxJTl9Ak4fTU69wzOI1gvLfjF3Pb/1St8PLE5HYHAY5iuEGP1BG6Ex2McLcOHHROkpxCTGrOcSjWAOZCYmKS5eLYGkaFDrHGLUa/pCMHNdZiqsUQqxw2Rp2IIlajoATkHFo+/LZbgRkr2hdEkR0IZ4F+lLnIaHHW/e3VkVauC0i5zmUMCwfX8kl50Wp3MwX8mp8NBSyklkKC2R0xR63JpjxKMUCZOcBkA8SbFyWYES2jI5RRFhcoq+QGxOoZpHkFNxCYarshGqYYvTFOquyClqLYPT+mL/usud3C5R7681TvH6dTv1T9gp51GUUWRWtzmFxR5Rdip+sTiNRikGcOQUDXS1aMJA932e28Si0+YUhENQs1MojFR26is7hcqExSkqL8kpVB9eylF8IQV2au9NyRwl4ym4mh1PMSHTpnjKfR84hVpmzU59xamwIdHDjqcLyPvI6ZxgDdBahjahn0FQSG1OwcxrdgqZEjnFrFnZac33URNK34fektO7Ji3FLRIWUm+sVtCt3UulpfyaloonGE+pxQckUSY5Re1u2ylkF+B0kuINmnk/wRiKnCp3OONEQx+ruTU7BUJsTmV9z5N5X9WkZZao+75gvc4pSs5n+95uGgsr+AAeRGfBaVDLUeEGyjs2Y33IsoHkNGjokZHKTjcExzA1bi/DMTIUjOilk9M7UOW1YeFb830MJPV4WnEKP1MtR5EmTn2Vo7TEu8SFvR05oajaPVonUK+q2gBoqbrmX6OSI4b6BIkuam3SToNmO/UxRynpbSnKQq7GgVN1mZX5RBUMTiGsNHHamKNEmFB2ysp4imq25vvM5LSsSb9rqqF4R+D0wcz7ezhCNT1ITrF+aHLakwX6Wz3S8aUMBnwtR9U5DRSnfezhB0XDGD5wqroYmj2ZjNpt/mdgEIXx1NZSbSSkyfeZtFOmcYpZs2anUP1Tvs+q86dY63tnqaYncQJ1emnW+u5wybpETmFIm9POHPdtyKJqDzdiYRT4Zd4XPeqcMsVpvCJyVaUtJ6WZ8vWXmGQ0JzKp6XUpXFGlpmBAO23QUuIaNqcQ9qniVEQHyanfpKXwzGnd970DrkKtdHS4Ergz7uMeN66ukLwVXNPK+2IVjFsSwaSc7RoUYlDmKFh6NmipADV/NYZWs4BvQVUVOA1FmRYWsJOw6iJ7zIwg2581corBo85poPm+KBNUnNZ8HzRyoHFaGoraOzm1a1rhDkNvVT+t533u/L4EXfWiOI6jZCK3nUstpZcbKk6rHOX1iRojhzHiZEtUE8ZTrc7fhqN3YVRQ1VIYI/ezUzmqyfd1LQVrCqWlGn1fy/uwrisndffBPT6E3F+V8YDbKXBjcxouqFwrEraYbCeDrNq30n2/ZqdVjhIrqXKMOR9jlFH1pKSdctGmSE7z7Xq83izUPp62OaBx2rSOalibwoK1stOKU79B86dYHUDNj3tB5V70NXBVWzRZCI9dvVKFOSqo2anXAz5w4SyKRQT2wowcxYK6nbIqR4lMh1tdwr6w4FSOITlFrYPnCsSBlpSURxlMaYxaKqhrfrDCllVDwV36Mp6WWgpN0vZ9VFsNvq9SD0r508Ata1xEead9v9z09FWBo9zFV5xCQ5PvB4rTsGBqxx03ANQYQcmpOMSAW5e++gSntbWktuD01Hq/vo7CWpRX1k/TF/QpIcw3ayja2Z5rtMCnl0i9kUfRVbWlk+N5ojqn0YTiBiSfMSQSbsw5lkhe0qegItSRqBjHCKox2CzHNKY49QrYLfZxO5BBTUW8z2SvAuQ2S0OOalqbwuMuOWXlOspv5PS0nXpv5FbJ8TSph2v9dH/JaZOdclJvjZMoNBtitFN532/ktIqnSKoxBmmt5cRKTuNxRlUHWfJLycRYJ0hOSUBIzfe5lfEPbN8XjchpoJ3rG4ljGQHxrXiKPYDT2jsSMlS+kPwfd+j5z2XQ5ZwCGjj14kLMA0918Vub98I55bfEqKqh1F/RyOCmK069eD2TR/FERZHkvRhKSUHFqTiuwog6VgXnn/KGM5nJKpuJ1xwXxkeTVpbxRuMAltfLM3ghEur8M3jbMYOd0naGvc1zdNghg5p0hj2001rLB3mm9/rQZKr7p6mktCpUdeY4Yt7AqTiXKg7QUp5gWqsi5mIArpiJhcAYb7ZlHhbL8Z7mWpUu2swzOca8iLCMqGrSEuGwnbdw34SS2aBoWv3HPYS1vytbDbOOtK7l18IP9RYnqaOGi+zV2fPdU+0o2vJO7Ux3H6tnHavrnKhiJMNiMhq0i2GiTUEcZS5vxejeqzpU6OAYeI46kr5vVgHC/lj0gdPYZ73J9BnxdidJ7T6brHJGL9Tm1AclrAku+D/6FRUxBj7IaIB1/nltTN7nrPP8nx376sWT6e7h8fB2v9/fvDleT9VbU92dvcHyeSFXTtphni8fe/Odsx2+c1a+2De9rL+Q8lmBJ6R8uvkSLfIU7u926qgEEHuh/zJ98SzlZwAurbhcOmO75EvC26cL661oGWO77xre8fmciIczWYKtvSjxxePw9Gy/Gd2dXlzefbho9T9E3BkOUrEZJfaGv6ZwKnF/w/O8+CcRhPPDP4rw/PTmN3D7ZIxYr4tNe+7LulRgHRz5WhAu3z4+XD5zQi92766Oh/1v4vUFbUn4qXwvDMtEX1OGshDeL5fL3zCGFtTH4/X4UhNWqQLSvGpzOAsFZUxVt3DvXBSJ8t6Hv+lwCoV6VySQfh+IFzy/upz/RaG4LSt90u3JzK42O/xnKG4J/JtZsi5JW4vCGelHYi3qm4gsW7WLnktOH43YgHN6BwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHh/Pwb5PnTnFHEM1hAAAAAElFTkSuQmCC" style="margin-left: 5em;width: 12em;margin-top: 1px;">
|
2 |
+
<div>
|
3 |
+
<img src="data:image/jpeg;base64,iVBORw0KGgoAAAANSUhEUgAAAgAAAAIACAYAAAD0eNT6AAAABHNCSVQICAgIfAhkiAAAAAlwSFlzAAAN1wAADdcBQiibeAAAABl0RVh0U29mdHdhcmUAd3d3Lmlua3NjYXBlLm9yZ5vuPBoAACAASURBVHic7N13nFTV3T/wz50+21hgl91l6b2JCGJHxS4WigUZFUuMYyTR50meTMovz5P2S35PJqaZoI5JlICOJbqoKDYUlC4KSO8odYEFtk6/9/z+mF1YYcuUe+fcc+/3/Xqt4DJ757u7M+d87ynfIzHGQAghhBBzsfAOgBBCCCG5RwkAIYQQYkKUABBCCCEmRAkAIYQQYkKUABBCCCEmRAkAIYQQYkKUABBCCCEmRAkAIYQQYkKUABBCCCEmRAkAIYQQYkKUABBCCCEmRAkAIYQQYkKUABBCCCEmRAkAIYQQYkKUABBCCCEmRAkAIYQQYkKUABBCCCEmRAkAIYQQYkKUABBCCCEmRAkAIYQQYkKUABBCCCEmRAkAIYQQYkKUABBCCCEmRAkAIYQQYkKUABBCCCEmZOPxpB6vzwJgFIARABoAnGj1cTwY8Cs84iKEEEK00NzvdQfQrdVHIYAtADbx6PckxlhOnsjj9Y0FcAuASwBcBKConYceBTAHwD+CAf/OnARHCCGEaMDj9Q0G8BCA+wH0aOdh9QBWAVgBYEEw4F+bi9g0TwCav/nfArg9gy9fAuDvAF4PBvxRNeMihBBCtODx+pwAbgPwbQBXZnCJ1wD8VOubYM0SAI/XVwbg50j+ALKdatgH4L8BvEDTA4QQQvSoeZj/HgC/BtAny8slkLwB/mUw4D+SbWxt0SQB8Hh9QwF8BKBS5UtvBPDjYMC/UOXrEkIIIRnzeH2TAPwvgHNUvvRBAFcHA/7tKl9X/QTA4/WNRLLzL1P1wt/0CYAfBQP+1Ro+ByGEENIhj9d3IYDfAbhCw6c5gmQSsFnNi6qaAHi8vnMBLAJQotpFO1aF5DyJ6pkRIYQQ0p7mke7fApiWo6esAXBNMOD/Uq0LqpYAeLy+EgDbkNzmkEsJAM8B+EUw4D+c4+cmhBBiIh6vrwLALwA8iNxvpT8OYFgw4K9R42JqBv9/kfvOH0h+Dw8DuMfj9f0ZgD8Y8NdxiIMQQohBeby+LgB8AP4DQB6nMLoj2dc+osbFVBkB8Hh9owGsBWDN+mLZOw7gNwCeoq2DhBBCstG8pe9RAP8HfG5yzyQDGBsM+DdkeyG1RgD+DH10/kDyF/RHAI97vL7fA3g+GPCHOMdEiKqmzZxlAUMpkottywD0YEApkh9dAbgAOADmBOBM/h2ONv4OAFEAseaPM/4utfx/BMBJAMck4BiSBbuOADgCCceq5s6m7bnEUDxeXx6ABwD8EEBfzuG0ZkWyz70q2wtlPQLg8fomAvg420A0dBzAUwD+Fgz4j/IOhpBUTLt3ViWAoQwYDGAQwAYCKEdygW13AMXQz1keCoBaJN9rNQCqAWk3gF0SsBPA9qp5sw/yDJCQVHm8vh4AvovkXb8e7vjbMzEY8C/J5gJqjABcqcI1tNQdySJCP/R4ffMA/IF2DRA9mHrPd0oT8fg4hbFhDqerL8AGARgAoB/4zTFmwoLTtc0HJz/FWv0XmHrvoyEAXwHYA0i7kEwOdgBYXzVv9rHchkvI2ZpX9f8AwL1IjqDp3UQkq+VmTI0RgA8BXJPVRXKLAXgbwO+DAf9S3sEQc5h276xKOZG4UFbk8YwpYxljoxhjPQHA4XTCYtHLDBoXBwBsAKS1EvAFgDU0YkByxeP1TUBymP9mABLncNKxKBjwX5vNBbJKADxenxXJecHCbILg6DMATwCoCgb8Mu9giDFMu3dWpaLIl8uyPJ4xZQxj7BxFUUpO3w+3kOBwOGGxmrrzb89RJJOCdVJygfFSSgqIWpr7rmkA/gvABZzDyVQDgK7Z9F3ZJgDnAlif8QX0Yy+APwF4LhjwN/EOhojl1hkPVyiKcj1j7CqAXcoYG8BY52vi7A4XrNT5p2MXIH0KYLEELKqaN7uad0BELB6vLx/J/fv/CaA/53DUMCabwkDZJgBTAMzP+AL6cwLA0wCeDgb8dLdB2jTZ4+2RiMevV5Id/mXNc/dpsTucsFpzXUPEcLYD0icSsBjAR7SWgLTH4/VVAvhO80c3zuGoaWow4H8j0y/ONgG4HMm6/EajAPgQwBwAbwQD/gjfcAhP02bOsiiyfHkikbhdUeSrGWNDAZbxXKHd7oTVRp2/yhiALYC0SALmQ8JS2ppobh6vzwVgCoD7AVwL/eyaUdPl2axlyzYBGAFA1cMJdKgWwMsA5tDhQ+YxbeYst5xITJJl+TbGlOsURVZlO5DN7oDNZlfjUqRjNYD0bnMy8F7V3Nlh3gGR3Gg+nOd+AHchuV3WyEYGA/4tmX5xtglADySLgZjFViRHBebRuQPGM23mrJJEPHGboiSmKIpyBWOKW83r22wO2OzU+XMQAvAxIL0pSXijau5sVeqoE/1ors9/L5Id/3C+0eRUWTb1bdTYBRCHWFsn1CADeB/JZOAtKjksrmkzH+0ejyVmKky+kynKeMYUTVblWa022B3Ozh9ItCYDWAVIr0oSXqyaO/s474BIZppL9N6KZKd/PfRTjTZXGAA7t10AAODx+g4BqMjqImI7AeAlJKcIPucdDOnc9dPutdus9qkM7H7G2DUA0/S23GKxwuEUoa6I6cQAvCdBmgMJC6rmzk7wDoh0zuP1nY9kpz8DxlrQl67DwYC/ZzYXUCMBeAHA3VldxDi2AKgC8BaAz4MBvzpnLRNV3DL9oQtlRX6IMWUactRwSJIEh9MNSTLbIJlwagDpVQl4vmrebErkdcTj9UkAzkfybn8agBF8I9KNF4MB/z3ZXECNBOAeAPOyuogxHQawAMlk4CPaScDHtHtn9YzFY99S5MQ9jClDcvvsEhxOFywWIy4+NrStgDRPAv5VNW/2Id7BmFHzCv6rkez0b4G5R5nbc28w4H8hmwuokQD0AFAN860DSEcIwAdIJgPv0KFE2pty93euTCRi31cU5UbGFC577mivv/ASAN6WIP25at5sI2531pXmvuQmJDv96yDWeRi5xgCUZ9uXZJ0AAIDH61sL4LysL2QOCoBVSCYDbwUD/q2c4zGMaTNnORPxxH2yHP+eoiijzi69mztWmx12u4Pb8xPVfQlIf5UkvFA1dzYt+lWJx+sbjmSHfyuAi2DMvfpaWBcM+MdmexG1EoDfAvhJ1hcyp11oHhkAsDIY8NN+5TRNvefRingi/p+KkniQKQr34ztp0Z+hHQOkf0jAX6vmzaatwGnyeH1uABfj9J1+2lU0CQDg/wUD/p9mexG1EoArkOWxhARAckvlWgDLmj+WBwN+Km/ajske7yUJOfF9psi3MqbtSv5USZIFDqeLFv0ZXxxAVfP0wCreweiVx+srBXApgMuaP8YC0MV7VXBXBgP+rKel1EoA7ACOQ9xTAfVsO04nBMuCAf8uzvFwd8v0hyYpTPm5oigX8BzmP5sEp9MFiRb9mc0KCdIvq+bN/oB3ILx5vL5BON3ZXwZgKN+IDKkBQPdgwB/P9kKqJAAA4PH63gAwWZWLkY4cAbAcp5OCdcGA3xT7l2+644FbFcb+G2Dn846lLVTj3/RWSZB+VTVv9ru8A8kFj9dnQ3LtV0tnfymAMq5BmcObwYB/ihoXUjMB+A6Ap1S5GElHE4A1ADYgeS7DZgBbggH/Sa5RqeiW6Q9NluXEzxmYbhea0rw/aWVN84jAO7wDUYvH6+uK5P77kc0fowGMB5DPMy6TejQY8D+txoXUTAAGANitysWIGg7jdEKwGckiRZuDAX8t16jScOuMh6ckEvH/YUzRbccPABIkOFxU7Iec5XMJ0q+r5s1+i3cgqfJ4fcVIdvCtO/uRoH34ejIwGPDvUeNCqiUAAODx+r5EMjMk+nUIrRKC5o+9AI5mU1NaTVM8j0yJJ2K/VBRltL7m+NvmcLhgsZqtDDlJwzoJ0i/0kgg0n+HSA0B/nO7gWzr8rErLEs1tCAb856p1MbUTgP8E8EfVLkhySQFwFMkE4XCrj0Nn/P2IGotP2jLl7kfGJRLxP8uyfJkIHT8AWK122B2035+k5BMJ0ver5s1eq8XFmxdjlyHZiVc0f7T+e8v/9wDttxfV94MB/5/UupjaCUAPAAcB0Eoo42IAanA6ITiKZKXDCIBw85+tP8783Jn/n0jEY+XRSPiniUTiJoAJ0zC1bPkjJA2KJElv2Wy231lt9mok20pXqw93J//f+nN5SHbmLR17Cagiq5ElAFSqWUlW1QQAADxe31tI1m4mhBBCiDoWBAP+W9W8oBZ3W3M0uCYhhBBiZnPUvqAWCcDbSBYFIoQQQkj2jiPZt6pK9QQgGPDHALyk9nUJIYQQk3qpuW9VlVYLruZodF1CCCHEbOZocVHVFwG28Hh9m5DcV0oIIYSQzGwOBvyjtLiwlluu5mh4bUIIIcQM5mh1YS0TgBcARDW8PiGEEGJkUST7Uk1olgAEA/5qAM9pdX1CCCHE4J5r7ks1oXXVtd8B0KRsLCGEEGJgcST7UM1omgAEA/6vAczV8jkIIYQQA5rb3IdqJhd11/8fAF2cMkcIIYQIQEay79SU5glAMODfDSCo9fMQQgghBhFs7js1lauT136D5HGzhBBCCGmfgmSfqbmcJADBgH87gFdz8VyEEEKIwF5t7jM1l8uz13+D5FnyhBBCCDkbQ47u/oEcJgDBgH8TgPm5ej5CCCFEMPOb+8qcyOUIAAD8AkAix89JCCGE6F0CyT4yZ3KaAAQD/o0A/pzL5ySEEEIE8OfmPjJncj0CAAA/B/AVh+clhBBC9OgrJPvGnMp5AhAM+EMAZuX6eQkhhBCdmtXcN+YUjxEABAP+haBtgYQQQsirzX1iznFJAJo9DqCO4/MTQgghPNUh2RdywS0BaD7i8Me8np8QQgjh7MdaHvfbGZ4jAAAQALCCcwyEEEJIrq1Asg/kRmKMb3E+j9c3CsBaAHaugRBCCCG5EQcwNpdFf9rCewSgpULg73jHQQghhOTI73h3/oAOEoBmvwCwiHcQhBBCiMYWIccV/9rDfQqghcfr6wZgDYABvGMhhBBCNLAHwPhgwH+CdyCAfkYA0PwDmQygkXcshBBCiMoaAUzWS+cP6CgBAE6tB5gJOjaYEEKIcTAAM/Uw79+arhIAAAgG/PMB/Ip3HIQQQohKftXct+mK7hKAZr8E8AbvIAghhJAsvYFkn6Y7ulkEeCaP11cIYCWAkbxjIYQQQjKwGcDFwYC/gXcgbdFtAgAAHq9vIJI7A7ryjoUQQghJw0kkV/zv5h1Ie/Q6BQAAaP7BTQHtDCCEECKORgBT9Nz5AzofAWjh8fouAvAugGLesRBCCCEdqAVwYzDgX8U7kM4IkQAAgMfrOxfAhwBKecdCCCGEtOEYgGuDAf+XvANJha6nAFpr/oFeDuAg71gIIYSQMxwEcLkonT8gUAIAAMGAfxuACUiWUySEEEL0YA+ACc19lDCESgAAIBjw70UyCdjKOxaiPqfDDrvNxjsMQlRlt9ngdNCJ5wa1FcnOfy/vQNIlzBqAM3m8vlIA7wM4j3cspGNulwsVZSWoKC9Fz7JSlPcoQUFBPtwuJ9wuJ1wuJ9wuF1xOByyWZE4qyzLCkSjCkSgizX+GIxHU1Tfi8JGjOFR9DNVHalB9rAbxeILzd0jMyG63oby0BOVlJehZXoqKsh7oUlQAt8vV6nWd/LBarQAARVEQicYQjkRava6jaGxsQvXRGhw6cgyHq4/h8JEahCMRzt8hScE6ANcHA/5jvAPJhLAJAAB4vL5iAAsBXMw7FpJUkJ+HEUMHYsSQgehdWY6K8lIUFxVq9nyMMdQcP4nDR2qwd99BbN6+Czt2fYVYPK7ZcxLzcdjtGDKoH0YOHYT+fSpRUVaCku5dIUmSZs9ZW9+Aw9XHsP9gNbbs2I0t23ejsSmk2fORtK0EMCkY8NfyDiRTQicAAODx+lwAfg/gu7xjMSOX04Fhgwdg5LBBGDlsIPr26qlpo5iKeCKBXXv2YdO2Xdi8bRd2f7UfsixzjYmIxWq1YmC/3qde14MH9OU+NcUYw9cHDmHztt3YvG0Xtu3cg0g0xjUmE/sbgB8GA36hh2mETwBaeLy+mwE8D6CEdyxG53Q6MH7MKFx20ViMHDrw1PCmXkWiMXzx5WYsW7UWG7fuhKIovEMiOmSxWHDO8MG47KKxGHfuSLicDt4hdUiWZWzevhvLVq3FmvWbEKVkIBdqADwQDPjf5h2IGgyTAACAx+urADAXwDW8YzEaSZIwcuhATLh4HMafd47uG8f21NY3YPnqdVi26gt8feAw73CIDvTtVYHLLhqHSy88T9PpKi1FojGsWbcRS1d+gc3bd8NI7bqOLELySF/DNByGSgAAwOP1SQD+C8BvANCy2ywVFxXi+qsuw4SLxqJb1y68w1HVvgOHsWT5GixethrRGK0ZMBOnw46Jl12IKy8djz69KniHo6oTJ+uwdNVavP/xMtTW6/IMGtHEAfwfAE8EA35DdZiGSwBaeLy+cQBeAjCYdywiKulWjJuvvxITL70Adruxt+XVNzTh3Y8+xQeLV9LKa4Nzu1y4buLFuPHqy1FUmM87HE3F4wksXv4Z3n5/CWpOCLtOjbedAGYEA/4veAeiBcMmAADg8foKADwJ4AHesYiivEcJbr1hIiZcNFb3c/tqC4XCeH/xcrz70TJabW0wBfl5uPHqy3D9xEuRl+fmHU5OybKMpavW4q33FqP6aA3vcETyPIDHggG/YQ+jM3QC0MLj9U0H8BcAZbxj0auSbsWYPvVGXHz+uaf24ptVNBrDB0tWYP47i2iVteBcTgem3nQNrrvyEjgFXbeiFkVRsPLzL/HK/HdpRKBjRwA8Hgz4X+EdiNZMkQAAgMfrywfwGAAf6FTBU6xWKyZdMwHTbr6WKpWd4URtHea9ugCrv9jAOxSSgQvHjca9d96CbsXGWruSrWgsjqq3P8TCRUtpe+w31QLwA3gyGPA38Q4mF0yTALRoLh70QwCPAzD2JGAnRgwdiAdmTEVlRQ/eoejaxq078XxwPg2fCqK8Rwke8EzFOcNp+U9HDh4+iudfmo8t23V9ZH0uNCE5Qvx7kYv6ZMJ0CUALj9dXBuCnAB4BYKqxweKiQtx9x8249AKqopyqeCKBtz/4BG8u/JiqDOqUw27H5ElX4ebrruBetEckyz9bhxf//bYZdwzEADwD4LfBgP8I72B4MG0C0MLj9fUB8HMA9wEw/Kq3saNH4JH770RBfh7vUIR08PBRPPnsC9h/qJp3KKSV3j3L8djD99BoVoYam0J4Zs6rWLthC+9QckEG8C8AvwwG/Pt4B8OT6ROAFh6vbyiAXwG4AwDfWrYasFqtmDHtRky65nLeoQgvFo9jzktvYsnyz3iHQgBceekFuH/GZDjstIYlWwsXfYqXqt416toABuDfAP4nGPBv5x2MHlACcAaP1/cWgFt4x6Gmku5d8di378ag/n14h2Ioy1evwz9ffJ12CnDicjrwrbtvw6UX0lSWmnbt3Ycn//4iao6f5B2K2hYEA/5beQehJ5QAtOLx+kYA2AjAMPvgzh8zEt777kS+yfY+58rhI8fwl2dfwD4qK5xTfXpV4PGH70FFWSnvUAypKRRG4F+v4vP1m3mHoiYFwDnBgN8U8xypMExHp5L/gYF+JlMmXY3vf+c+6vw1VFFWil/9+LsYO3oE71BMY+zoEfjVj79Lnb+G8vPc+P537sOUSVfzDkVNFiTbeNKMRgCaeby+kQA2wAAJgCRJuG/6ZFw38RLeoZiGoij4+7zX8MmKz3mHYmhXXHI+vn3v7aYvVpVLHyxegX+98qZRDhhSAIwOBvyGGtrIFL2LTjPE3b/NZsX3HvJQ559jFosF3vvuxK03TOQdimHdesNEeO+7kzr/HLtu4iX43kMe2GyG2CRFowCt0AgATt39b4Tgq/9dLie+/537MGrYIN6hmNp7Hy3DvH8vMModE3eSJOHeO27BDVdfxjsUU9u0bRf++PS/EIlEeYeSLYbkWgDTjwJQKp30PxC88y/Iz8N//+AR6vx14IarL8OjD95Fd6oqsFgsePTBu6jz14FRwwbhv3/wiBFqiEigUQAAlADA4/WNQnLvv7CcDjt833sQ/ftU8g6FNLv0gvPwoGcq7zCE96BnKlWs1JH+fSrh+96DRjg35I7mtt/UTJ8AQPC7f6vFgse999Iefx26asKFuGPy9bzDENYdk6/HVRMu5B0GOcOg/n3wuPdeWMUe4aJRAJg8AWjOAG/nHUemJEnCw/fdgTGjhvEOhbRj6qSrcd2VtCAzXdddeQmmGmsLmqGMGTUMD993ByRJ2HsnALjd7KMApk4AkDwDQNhX8IxpkzDhonG8wyCduO+uybhw3GjeYQjjwnGjcd9dk3mHQTox4aJxmDFtEu8wsiEh2QeYlmkTAI/Xdw6A23jHkakbr56Am6+7gncYJAWSJOHRB+/C8CEDeIeie8OHDMCjD94l+p2ladx83RW48eoJvMPIxm3NfYEpmTYBgMBz/0MG9oPn9pt4h0HSYLfZ8L1v340uRQW8Q9GtLkUF+N6376ajfAXjuf0mDBnYj3cYmTL1WgBTJgAer683BL37L8jPw2Pfvlv0BTimVFxUiFnf8tDdbRskScKsb3lQXFTIOxSSJqvFgse+fbfI2wNva+4TTMesvchdEPDuX5IkfOeB6ejWtQvvUEiGRg0bZLT66qqYMulqqmEhsG5du+A7D0wXNbmVAMzgHQQPZk0AhPxl33Tt5TjvnOG8wyBZuu3mazBiyEDeYejGiCEDcdvN1/AOg2TpvHOG46ZrL+cdRqaE7BOyZboEwOP1DQUgXGWRwQP6YvrUG3mHQVRgsVjw3YdmoKiQ1gMUFRbguw/NoKqJBjF96o0YPKAv7zAyMcbj9Znu7sqM7zrhMj27zYZHH7iL5v0NpLhLER6gSoF4wDMVxV2KeIdBVGK1WPDoA3eJupBTuL4hW2bsUYT7Jd96w0SU9ejOOwyisgvHnoPRI4fwDoOb0SOH4MKxpt2BZVhlPbqLeiqmcH1DtkyVAHi8vrEAhGpxy0qFfTORFDxw11RR75ayYrfZ8MBdNAJiVLfeMBFlpcLdtAzyeH0X8A4il0yVAEDADO++uybDbjdfB2EWZT2645YbruQdRs7dcsOVNKplYHa7TdRqjsL1EdkwTQLg8fokANN5x5GO8eeNojr/JjD5hqvQo6Qb7zBypkdJN0y+4SreYRCNjRk1DOPPE67U/nSP12eaftE03yiAywAIU+zB6XRg5vRbeYdBcsBut+H+GVN4h5Ez98+YQqNaJjFz+q1wOh28w0hHBYAreQeRK2ZKAIQa2rn2iovRvWsx7zBIjowZNQzDBvfnHYbmhg3uT6NaJtK9azGuveJi3mGky8M7gFwxRQLg8fpsAO7gHUeqHHY7brqWDvoxGzNUCDTD90i+6aZrr4DDbucdRjpu83h9Qg1bZMoUCQCAawCU8A4iVRMvu4AOjTGh0SOGYGA/YWap0jawX2+MHiHUJhyigi5FBZh4mVCL64sBmKLqmlkSgLt4B5Aqm82KW66/kncYhBMj3yEb+XsjHbvl+iths1l5h5EOoaaMM2WWBECYJceXX3w+HfZjYmNHD0ffXhW8w1Bd314VGDvadJVWSbNuXbvg8ovP5x1GOoTpM7Jh+ATA4/X1gCCr/60WCxX9MTlJkgx5pzxl0tWinhRHVHLrDRNFKmde6vH6+vAOQmvC/DayIEzaOfbcEabaD07adsHYc9Ct2DijQN2Ku+ACKvlrej1KumHsuSN4h5EOYfqOTJkhARjPO4BUTbhoHO8QiA5IkoRLLhjDOwzVXHrheXT3TwAI18YJ03dkygwJgBBZXEF+Hu2PJqcI1lB26PKLjfO9kOyMGTUMBfl5vMNIlRB9RzYoAdCJS8aPEW2VLNFQ78py9DHAYsD+fXuhsqKMdxhEJ2w2Ky4ZL8zoluEzV0MnAB6vrxeAct5xpGIC3SWRM1x24VjeIWRtwkXifw9EXQK1dV09Xt8g3kFoydAJAAS5+68oKzV0ARiSmUsvEHvu3Gqx4JLx5/EOg+jMwH69UVFWyjuMVAnRh2SKEgAduPQCaiTJ2boWF2HE0IG8w8jYOSOGoKgwn3cYRIcEavOE6EMyZfQEQIhVnOeMGMw7BKJTIpfOHTWcXtekbQK1eUL0IZkyegKg+8kml9OBATT8T9oh8gjASIFjJ9oa0K83XGIcEzzW4/UZtp807Dfm8fr6A+jOO47ODB3UX6TqWCTH+vepRJ7bxTuMtBXk5xliFwPRhtViwdBBQhx/XQBgKO8gtGLjHYCGhJi7EfkOT01Ha45j6fLPsH3nHuzcvRdFRYUYMqg/Rg4bgisuu1DoxXDZsFgsGD5kAL74cgvvUNIyfMgA0/7OAIAxhk+WrcbmbTuwY9de1Nc3YPDA/hg6eAAmXHoBepTo/t5EcyOGDsSXm7fzDiMV5wPYyjsILRg5ARBi7oYSAGDhB4vx1D/mIRQKf+PzGzdvw+tvvosRbw7Gj/7jEfTu1ZNThHyNHDpIuATAzK/r/QcO4Xd/fgZbtu38xue/3n8Qi5Ysw/Mv/huPPnQvJl1n7nM/BHqNjAcwj3cQWjDy2PO5vAPojNvlQv8+lbzD4Mr/5wCeePLZszr/1rZs24mHH/sJvtxkyCS8UyOHibcVWaDGXVVfbtqKhx/7yVmdf2uhUBhPPPks/H8O5DAy/enfpxJulxDTW7rvSzJl5ASgF+8AOjN4QB9YTDz//8myVXhv0ZKUHhuNxfC7Pz2NULj9RMGoevUsE2odQJ7bhV4mrP4XCofxuz89jWgsltLj31u0BJ8sW6VxVPplsVgweIAQB+4Z9i7NyL2P7n9pPct78A6Bm8amEP40+59pfU31kWP4+5yXNIpIvyRJEqlwCirKSk05///3OS+h+sixtL7mT7P/icamkEYR6Z8gbaBh5x4NmQB4vL58ALo/T7W8rIR3CNxs2rId9Q2NaX/dys/WaRCN/omUAPQsx9EekwAAIABJREFUFydWNWXy2qxvaMSmLUIshNOEIG2g2+P1FfMOQguGTAAgSMbWU6BGXW3bd+7J6OuOHqtBQwaJg+gqBOpUy034um5oaMTRYzUZfW2m7wUjEKgNNOSeVqMmALof/gfEatTVtnvv1xl/7Z6v96sYiRgEaiiFilUt2bwms3kviE6gNlCIm8p0UQLAidNhR7di3c9SaCYajWbxtaktsjISkaYARIpVLdm8JrN5L4iuW3EXOB123mGkgkYABKL7bK3cpAulSGbKy0qEeL1IkiTKvC7RgeTrRYiEUfd9SiaMmgDofsFGj5JuvEMgAnHY7ehSVMg7jE51KSqEwy7EHR3RCUHaQkMO1xo1AdD9pmm3y8k7BCIYEV4zIsRI9EWQ14zu+5RMUALAiSAVsIiOiFAMSIQYib4I0hYKEWS6jJoAuHkH0BmXGFkv0RERXjMixEj0RZDXjO77lEwYNQHQfbYmyLAX0RGXU/+vGRFiJPoiSFuo+z4lE0ZNAHSfrQmS9RIdEaGhFCFGoi+CtIW671MyYdQEQPfZmiDzXkRH3G79N5QixEj0RZC2UIgg02XUBMDBO4DOCFL8guiI06H7l7UQMRJ9EaQtNOQL26gJgO6P14rF47xDIIKJxfT/mhEhRqIvgrSFuu9TMmHUBED3p8WEw+Yt/0kyE45EeIfQKRFiJPoiSFuo+z4lE0ZNABp4B9CZiInrf5PMhCP6f82IECPRF0HaQt33KZmgBIATaihJuiICvGZEiJHoiyBtoe77lEwYNQHQ/XBNOGzuodJsDrYR4VAcLYjQUIoQoxbo9Zw5QdpC3fcpmTBqAqD7bC0sxrCXZnpWlGX8tRXlPVSMRBwidK4ixKiFbF6T2bwXjECQtlD3fUomjJoA6D5bEyTr1czQwQMz+ro8txuVJm0wRVhgJ0KMWqisKEOeO7NaMZm+F4xCkLZQ931KJoyaAOg+W6s5fpJ3CFyNGDooo68bOmSAKYdM44kEaut0/7JGbV0D4okE7zByTpIkDB0yIKOvzfS9YBSCtIX6f/NlgBIATg4fOcY7BK569+qJW268Oq2vsVqtePj+GRpFpG/VR2vAGOMdRqcYYzhy9DjvMLh4+P4ZsFqtaX3NLTdejd69emoUkRgEaQt136dkwqgJgO6HayLRGE7W1vMOg6tHvnUPystKU378jNtvNe1wafWRGt4hpEyQBl11QwcPxIzbb0358eVlpXjkW/doGJH+naytRyQa4x1GKnTfp2TCqAmAENmaWRvKFm6XC/5f/QTDOxkCtVgsuPvOKZg547YcRaY/h6rFea2IFKvaZs64DZ47JsNi6bhpHT50EPy/+okodfA1I1AbKESfki4b7wA0cpB3AKk4dOQYRgw15x1ti16VFfjr73+JV+e/g3c/XIIDBw+fGup2uZwYNmQQvA/MMO2df4vDR47yDiFlIsWqNpvNiofuuwsTLhmPwPMvYduOXadqI0iShF6VFbjx2itx59SbOk0SzOCQOAmAEH1KugyZAAQD/kMer68BQCHvWDpy2MR3Sq1ZLBbcddstuOu2WxAKhbFrz1foUlSIPr0rTbngry0CNZRCxaqVoYMH4o+//RkYY9i3/yDq6hswaEA/5OUZ8lTZjAnSBjYEA/5DvIPQgiETgGY7AIzjHURHDlWb906pPXl5boweNZx3GLojSEMJQKxYtSZJEvr26cU7DN0SpA3cwTsArRh5DGo77wA6s2vvPiFWdhO+Dh4+iqZQmHcYKWsKhUVp2AlHjDHs2ruPdxip0H1fkilKADhqCoXx9QFDjiwRFW3evot3CGnbsn037xCIzn194JAoia3u+5JMUQLAGTWUpDObt4mXAGym1zXphEBtnxB9SSYoAeCMGkrSEcYYtu7YwzuMtG3dsZumt0iHBGr7hOhLMmH0RYAMgK6XkW/fuReKotCWINKmrw8cQmNTKOvrFLgTGNYrhNLiKAqcMooLGcq7Jd8adSEr6pusqAtZUH3Cjk1fudAQSq+i3ZnqG5pw4PAR9O5ZnnXsxHgURcH2nXt5h5EKBgMvAjRsAhAM+EMer+8AgN68Y+lIKBzB3n0HMbCfrsMknGzelvldUp/SCM7p34DBFY0o7/rNE9eKCu0oyGv77c8AfF3twIa9bny+PQ9fHXFk9Pxbtu+mBIC0ae++gwiJcQjQgWDAn30GrlOGTQCabYfOEwAA2LR1FyUApE0bt6Z/8zG4ZxMmnnMCAyqa2n2M3db+iJMEoF95DP3KY7j14jps2uvGWyuLsG1/elXrNm3diesnXprW1xBz2LRVmHUthh3+B8yRAFzDO4jOrPhsHSbfOJF3GERn6hsasTmNhnJAeRg3nX8UlSWdr6y221KfGRvVP4xR/cPYecCJl5d0xc6DzpS+7svN29EUCiOfit+QM6z4bB3vEFJl6ATA6BPPn/MOIBX7D1Xjq/2GrDRJsrBizXrIitLp4yQA146pwUPXf51S52+zSrBY0l8aM7hXFD/1VOOWi+pSWliTSMhYuWZ92s9DjO2r/Qex/1A17zBS9QXvALRk9ATgY94BpGrpyrW8QyA6s2xV56+JAncC375hP64eU4NU+3RbB8P/nbFagDuuqMV/3XkUhXlyp4//dJWh20+SAcHaOmH6kEwYOgEIBvz7GGNCnKO6Ys26lO72iDkcqj6KPV8f6PAxld3C+I9b92JAeftz/W2x27N/25/TP4z/e/8h9C6Jdvi4XXv2ofqoEG9BkgOyomDFGjGG/xljNcGA/2vecWjJ0AkAACTiMSFWcNbVN2LDZkNPN5E0LFvdcSM5pLIR3hv3o8Dd+V34mdKZ/+9I10IFP7vnCIb36XjaYelKGgUgSRs2b0ddfSPvMFKiKHJ6mbWADJ0ATJs5S4rFot15x5GqpSkM+RLjY4xh2er2XwtjBtThvqsOwmHPbMTIZlXvbe92MvzXHccwfmj7beWy1WupKBABIFYbJ8uJ7tNmztJ1HZlsGToBiIZD4+PxaD7vOFL1+fpNOHGyjncYhLO1G7ai5vjJNv/tspEncNflh2G1Zt6hWq3qtml2G8N3J9fg6vPq2/z3Y8dPYu2Grao+JxHPiZN1+Hz9Jt5hpEyR5QIwnMc7Di0ZOgFQGLueKQpkOcE7lJQkEjIWvL+EdxiEszcWftTm5yedfxQ3j8/ulD2LRYKkwT2NJAH3XXcSt01oO3Fp73si5rHg/SVIJNKfsuKBKQoYY2ACbCPPhqETADA2EQDi8RjvSFK2eNlnwsyREfVt2LIDu7/a/43PWSRg+oTDuHzUiayvb81g+186Jl9Sj2/dcPysHQm7v9qPDVsMW1GVdKKuvhGLl33GO4yUyUpLosKu4hqIxgybANx42312AOMBICFQAhCLx/HOh5/wDoNwcuadssPGcP81+3HeQHWmhtQe/m/LFec24rGpR+GwfXOagkYBzOudDz9BLB7nHUbKFPnUSMUl02bOMmzBPMMmAFar7VJIKADESgAAYNEnK1U5AIaIZdvOPdjW6oCUPKeMh2/YhyGV6i1GzqQAUCbGDg7jR9OPIN91eqHitp17sW2neCcbkuw0NoWw6JOVvMNIi3JqBACFYLiIZyxaMmwCwIDrTv2dMSQS4mSfkWgM7360jHcYJMfmv3P6DrlrQQKP3vQ1eqVQ2S8duRgBaDG4VxQ/u7sa3QpPz/u2/h6JObz70TJEouLchCnN8/8tGHAtx3A0ZdwEgClXtv7/WFSIk6dOee+jZbQWwES2bN+NjVt3AgAqukXx6E1foaRI/UZT6zUAZ6osieN/7j2MypJkAr5x605sEecceJKluvpGvCfYzczZi8aZYQ9qMWQCMG3mLCeAca0/F4uJlQCEIxG88NoC3mGQHJBlGc+/NB8AMKA8BO+N+1Do1mbnSi5HAFp0K5Txs7urMbgyWTXw+ZfmQ5bFWA1OsvPCawsQjojV9spnjxZf0NynGI4hEwBFlscxpnzjEHOmKIjHOi5bqjfLV6/Dlh10t2R0CxctxcHDR3FOv0Y8eN1+uOzadY4q1gBKS75LwY/uOoLzBoVx8PBRLFy0lE8gJGe27NiN5Z1UtNQbRZbbKlrlBMNYHvFozZAJQEKW2zyEXLRpAAB4PvgG3S0ZWM2JWlS9swgXD6uF58oDsFm0rZiXq0WAbXHYGB6fdhRXjG5E1TuLUHOillssRFuyLOP54Bu8w0hbQm57rRiDMRcCGjIBYIpyQVufj8ejwpUkPXj4CN0tGdi8V9/CFSMOYfJF1SkdsZstiWMCACRrGnzrxuO4fuwxzHv1La6xEO0kR7WO8A4jPYxBTrQ79dZmnyI6YyYAUNocrmGMCTkKUPXOIhw/SXdLRrN+01b0yVuEq87NzWl5kiTlJMlIxe2X12J4yadYv4lKBBvN8ZPJUS3RdFwxlo3r4B+FZbgEYNrMWcVQWP/2/j0WVXdbVS5EozE8M+dV4UYvSPsam0LY9sVfMX5w7hI7i87e7deMbcDXm5+hmhcGwhjDM3NeRVSgbX8tEu3f/QPAoGkzZxXnKpZc0VmTkD05nriUgbV7o5NIxFsXeRDG5m27aA+1QTDG8Mbrf8ElQw7k9HklLQ4ByNKk86vxzluzKbk1iPnvfITN23bxDiNtjCmd9QsSGC7OVTy5YrwEQJE7/SWJOA0AAK+//SHtoTaADxctwPi+ua+Lznn6v02SBFw3ei0++vgd3qGQLG3Zvhuvv/0h7zAy0sHc/ykMuDAHoeSU4RIAxtpeANhaVMBpACB55/i3f76E+gYqECSqnbv3oEv8BbgduR+F0uMIAAAUuhX0db+KnbupTLCo6hsa8bd/viTsSE4nw//NmOEWAhowAWBjOnuMIsuIx8WqCdCitq4eswV+o5lZY1MICxc8g4qufEag9LYGoLX+5VF88O7faT2AgBhjmP3Pl1BbV887lIzIsgzGlM4fCOPVAtBxk5C+qfc82o8xVprKYyMh9Q5YybWNW3fitQViDrWZlaIoeOq5l9G72yFuMeh1BKDFoPIjeOq5l6EoKTXGRCdeW/DhqTLWIkrjsLiyaffO6qdhKDlnqARATsQvAVK7M04k4sKdEtja/HcW4eOlq3mHQVL0jxdexxfrN2JYb36Jpx7XALQ2bkgYX6zfiH+88DrvUEiKPl66GvMF3PLXQlHkdBeFG2odgLESAEU5J53HR8LijgIAwHPB+VizbhPvMEgnXnnjXXz0yUr0LmlAgYvfDhTeRYA6U1ygoF9ZEz76ZCVeeeNd3uGQTqxZtwnPBefzDiMr8TRvAhkwUqNQuDBUAsCYMiKdx8fjsbYOfhCGoij42z+DdMa6jr338TJULfgQsVgEw3vz3X2i8/4fADB6QByxWARVCz7Eex+LdYqcmWzbuQd/+2dQ6OkaRVGgpF1mnaXVx+idwRIANjTdrwkLPgoQjyfwxOw52HfgMO9QyBlWrlmPOS/NP3USJe9lmzpfAgDg9M8oFotgzkvzsXLNeq7xkLPtO3AYT8yeg3hcmxMrcyXDKeBhasfBk2ESgKtunm4Da78CYHvisWgnJSD1LxSO4H+f/CcOVR/lHQpptm7DVjz1/MuItjoKNRrn/XbTfwYQiZ2OMRqJ4KnnX8a6DVQuWC8OVR/F/z75T4TCYtZSacEUJdN2f9C0mbOsasfDC+8WSTVud/4QSHB0/sizib4WAEhuD/yF/yns2ruPdyim9+mKz/HHp/+FUFMTWt/3x3jPNum//8c3K8gyhJqa8Men/4VPV3zOKyTSbNfeffiF/ylht/u1Fk9kvADcCYZBasbCk2ESAEmSOt3/355YNJLBXJD+NDaF8Js/PYv1m7bxDsW0Fry/BM/861VEY9GzVhfzHgEQoP//xggAkFylHY1F8cy/XsWC95fwCYpg/aZt+M2fnjVEnQbGlJQq/3VgtFqx8GaYBIABWS3OiETEHwUAkgcH/WH2HCxdtZZ3KKbCGMML/16Al6oWgjGGeOzsQlM19TYOkYnlaO3Zo6vxWPIY75eqFuKFfy+gIlg5tnTVWvxh9hwhD/hpSyKe3VBctn2NnhgmAch2dWY0Es42K9QNWVHwzJxX8PYHn/AOxRRkWcZTz72MhYuWNv9/26+j3YccOFZHSUB7DhyzYsf+tn8+LT/ThYuW4qnnXoZsgBE7Ebz9wSd4Zs4rkAVe7d+aoihIZL3zyzg7AQyUAGBIthcINYk/t9WCMYbg6+/gmTmvIMp98tm4jp+sxa//8AyWf7bu1Oc6mk5avqUgF2G1Se+7AN5f42r331r/TJd/tg6//sMzOH4yd0cpm000Fsczc15B8PV3DDXi0tbIXAYMsxNAMsIvd9rMWVIkHAoxprTfgqQor6AITqdbjbB0o7KiBx5/+F706lnGOxRDWbdhK56e88pZ86KRcFO7jabboeDX91fDbsv9HVW3YgdcTn0uYI7GJHz7ia4IR9vOUiRJgsud/43PFeTn4Tv3T8d5o4fnIkTTOHDoCP7y7DwcPGysXUWJRFytBCAsSVJ+1dzZwneexhgBYBgAxrLu/AEg3NSY6sEQwjh4+Ch+9tsnsWT5Gt6hGIIsy3jxtbfxxFNzzur8GVM6vGMKxyxYv9tYCaYalm5wttv5A8kRrTPfl41NITzx1By8+NrbNCWgkiXL1+Bnv33ScJ0/Y0zN0u9uMAxQ62I8GSIBYEwZyFQqs8KYgnCT8Y7bjcXjeHbuv/HUcy8bZjEPDzXHT+KXTzyNdz78tO2OPoWX4cI1RYhx2BGg1xmAcFTCa5+mkBS19eNmDO98+Cl++cTTqDl+Uv3gTCIajeGp517Gs3P/jViWi+T0KB6PqT2VQQmAXsiynHYBoI5Eo2EVForo07LVa/GjX/2RtgqmSVEUfLB4BX786z9h154Oai2kMNF+ot6KhZ8XqRhdinS6CCD4UR6O16XQFHUQ/649+/DjX/8JHyxeIXR5Wh7Wb9qGH/3qj1i22pg7hxRFVr3kOwP6qnpBTgyxJFlhrI/a1ww11aOoS3e1L6sLR2tOwP/X53D+mJGYOX0ySroV8w5J13bt3YfnXpyPr/Yf7PSxqR65u2R9AcYOCqFPqblHY7bvt+H9z1KbvevsZxsKRzDn5TewZPkaPHj3VAzqr3qzYCg1J2ox95U38fn6zbxD0ZRK8/5n6q3FRXPNEAkAGFP9lyEnEohGQnC68tS+tG58vn4zNm7Zgak3XYObrr0cVqs+F4jx0tgUwsvz38XiZZ+lNXwoSVKnj2cMCH7cFT+84wishhiHS19CBp5+swCp/GhTTawA4Kv9B/Hz383GxMsuwF1Tb0RBvnHfw5mQZRnvfPgp5r+zyPA7hBKJuFYjQpQA6AVjiia/jHCoEXaHCxaLcVvoaCyOl+e/i6WrvsDdt9+MMaMMs8MlY7IsY8nyNXj1zffR0Jh+gSiLxZpSnfHDx+34eH0Rrh1rnO2n6Xj90zwcPJZa0mmxpJecMsbw8dLVWLNuE+6cfD2uvHQ8JbhIDve/+Nrbhlvk1xbGWNrH/aZxdUMkAIbYBjjpzgd2MEUZrMW17XYHCoq6anFpXerfpxJTJl2N88eMTOuuywhi8TgWL/sMb7//SVZ7zBVFRjQSTumxVivw4+nV6FGsfREqPW0D3H/Uih8+U4xUF+87Xe60k4DWunctxs3XX4GJl10Ah92e8XVExBjD5+s3442FH2Hvvs6nsYwiGg1rWeJ92/x5Twm//9QYCcAdDzQwpmhWYcWdV3DWHmSjq6wow5Qbr8LF48819AgIAESiMXy4ZAUWLvoUdfXq7ACJRsJnnQXQnoEVMTw2Vfs7sq5dHHC7+CcAjAE/+0cX7DiQ2gCkxWKF06XO1skuRQWYdM3luPbKS+ByZnR2mDAURcHKNV/ijXc/xsHDR3iHk1OJeEzDu38AQMP8eU9xWMmrLuETgGkzZ3UJh5pqtT5tvbCoK2x2YzcYbSkr7Y6brr0cF48fg/w8Y+1frzl+EktWrMEHi1eofsiJLCcQi6Z+ZOr0K2pxyUhtt58WFzmQ5+afACxc5cLz76aeUDucLlit6s5WFuTn4bqJl+DKS8ajpLuxRviaQmGsXLMe73z4KY4cO847nJxLZwQuG5IkFVfNnV2n+RNpSPgEYLLHOyYWi6zr/JHZsVgsKOrSHZLB74bbY7fZcN7o4Zhw0TiMGTVU2PnUcCSC1V9swNJVa7Ft515Ny5ymMwrgdDD8dEY1ivO1K2jTpdCO/Dy+y36O1Vrwn7OLEY2lNr2k5t1/WyRJwrDB/THhorG4cNxouF2q1BPLOVmWsX7Tdixd9QXWbdiKuEHONUkXYwzRSCgn5YslSGOq5s3+UvMn0pDwiwAVlWsAtPs8ioKmxjpTrQdoLZ5I4LO1G/HZ2o0oLMjHxePPxYSLxmFgP/2vhZEVBRu37MDSVWvxxfrNOSt04nA4EYmEkcroVDQm4d+fdMW3J9VoFo8ecv1nFxSk3PkDEhwOp6bxMMawdccebN2xB3NeehPjxozEhIvG4pwRQ2AVINnf/dV+LF31BVau+TKjBatGE4tFcnl2QV8AlADwpDDWL1fPFY/HEAk3mW49wJkaGpvwweIV+GDxChQXFWLE0IEYNXwQRg4dhNKSbrzDA2MM+w4cxubtu7B5225s3bkHkYgme4E7JFkssDscKe9D3vSVC+t352HMQG3OXOfd/3/6pRPrd6W+AM/ucOR0xC0Wj2PlmvVYuWY9XC4nhg8egJHDBmLksMHoU1mui0Wxx2pOYPP2Xdi0dRe2bN+N2voG3iHpRiIe03LR31kYIHyhCeETAMZYz1w+XzjUCJvNbsr1AG2prW/AijXrsWLNegBAafeuGDlsMEYMHYDelRUo71ECp0PbVddNoTAOHzmGr/YdxOZtu7Blxx7d3A3ZbHbIciLlhunfnxZjSGUUeS71GzKe0331TRbMeS/1xNlitcJm47daPxKJYt3GrVi3cSsAoLAgHyOGDMDIYYPQr08lKspKNV8TE43FUX20BvsPHsaW7XuwedtOHKNyx21SFFnrRX9tqcj1E6rNCAlAzm85mxrrTL0eoCPHjp/EkuWfYcnyzwAk51i7d+2C8rJS9CwrRUV5Kcp7lKAgPw95bhdcTifcLiecTsdZd1iKoiASiSIcjSb/DEdR19CAQ9XHcPjI6Y/6Bn109u1xOFyIhkNI5byKxrAFb6wsgmei+g09zymA59/LQ0MotTtoCRIcDn3NxTc0NmH12o1YvXbjqc8VFeajoqz01EfP8lJ0KSyE2+2Ey+WE25n888xdNIwxRKMxhCNRRKJRhMIRNDaFUH20Boerj+HQkWOoPnIMx0/WGeooXq0wxtJacKsi/sOdWRI+AQBynwCYfT1AOhhjqDlRi5oTtdi0dWe7j5MkCU6nA26X81THb5QqZZIkwe5wIhZLrZFavTUf44aEMbRS3UaNV2eydqcDyzakPpdvdzh1MdzemfqGJtQ3NGH7rq86fJzTYT+VCIQjUUSjqh9MY2o5nvdvJfd9j9qMcAvLpZB9PB5DU6M5K7hpgTGGSCSKk7X1qKtvNEzn38Jqs6W1le2VxV0RS6j79uTRRkZiEv6+IPWhf6vVBqvNAPclrURjcdTVN+JkbT0ikSh1/iqKxaI5nfc/g/B3gJQAZCEWDSMcMt7RwUQb6dzZHq+3YuEadeuM8Oh3XlyUh5pUTvrD6ZESQlIRj8dUP+UvTZQA8CYBXXg+fyTchGhEm1XbxFgkKb257SXrC7D/mHqLTXN957kjjZP+gORaCRGG/gl/iUQcidwv+juT8MeoCp8AQOL/Swg1NfBahEIEk87q9pYTA2WVDjNT6zqpSOekPyC5W8IiaHEpkluynNDqiN900QiADhTyDgBI7gzgsA2FCCg5FZDaW+/QcTsWr1dnKkBRcjcCUPVpHg6keNKfJFlo6J+kRJFlPd1scR19VoPQCcC0mbO6MKafnQxNDbW856SIIBzO1IfG311ThKO12b/MFYXlZB3A/qNWzF+a+h75dH4WxLwURUFUP50/ANimzZwldBIgdAIAhhLeIbTGGENDQy3PValEEBaLJeViUgkZeHmxOjuOZI1HARgDnnmzAIkU3wI2u8Pwp02S7DGmIBZNrax2TumsD0qX2O88xrrr7QXBFAUN9SdTPgSGmJfd7kj5jPvdhx1YsTn7E6+1ngZ4d7UrrWN+7VRRk3QiecAPr73+nerOO4BsCJ0AKIzpMvtSFBkNdScgy+Y8kYukLp3Dbt5c2QW1TdktlJNl7RrRY7UWvPRRXsqP1/qgHyI+RVGaT/fL4QrW9FACwA1juj2gXlEUNNSdQILWBJAOJA8MSq0jjDSfGJgNLUcAnl1QgEiKJ/3ZHU4qpU06pCgyYtGwXu/8Wwi9gEXodyBjTNc/fMYYGutP6mXLCtEpm82e8lTApq9c+HJP6nfZZ9JqDcDSDamf9Gex8D3oh+ifLCcQjei+8wcoAeBHAdP9GCJjDI0NtYhGw7xDITrmcLogIbW751c/KUY4mtlbV4sRgIaQhOffTa3crwSJVv2TDsmJuJ62+nWIAUIvYhE6AQDTfwLQItRYj0hY36fWEX7SKYPbGLZi0cbeGT2PFmsAXltegYZQak2JKAf9ED4S8RhiYo2YUgLAC2NMqB9+ONSIUFMD7zCITqVyYJDVakPPyl7Ye3IQDpxMf/2R2tUAtx/qiu1H+qFnZa+UYjfaQT9EPfFYVMRiakL1QWcSOgGAgD/8aCSEpkY655u0raM7ZJfLjV59+8Cdl1wDsGjzUCSU9HYFKCqOAMQSVsxfPQAA4M7LQ6++feBytb0ulw76IR2JxSKiLpgWrg9qTegEgAk0BdBaLBpBQ/0JyFQwiJwh2VGePUdeVFyMnr16w2Y9vXiuPuzGqt0D0rq+whgSKiUB763rg9qm029Bm9WOnr16o6j47OM57HTQD2kDY8ltfnJC2C3TlABwJOwPX04k0FB3XJjFLiR3rK0ODLJIFvQoL0dpaVlzFj3dAAAgAElEQVSbHei6r/vgWH16ZwXE49nPA+w7VoiVOyrO+rwkSSgtLUOP8nJYms87sNnssNJBP+QMciKBSDgMRdHtHv9UCNsHAYInAKKOALRgjKGpsQ6hxnqaEiDfYHc44XQ6UdmnDwoL2y83zhjw4ZbhUFjqd9fxRHYNrqxIeG3VwA7PFSgs7ILKPn3gdDpp6J+cJRaLIhaLQG+VXDMg9Itb6AQAgv/wW0SjYaocSL6hoLAQg4aNSKlaXk1DAdZ93Tfla2c7ArB4Uy8creu8FoHD4cSgYSNQUKiLAzuJDjClZchfyPn+ttAIAD9i7QLoiCwn0FB3ovnAC2JmJT16oLJ3H9jtDjhcqe2ZX7V7AGpDqe3Fjycyv+s6WpeHxZt6pfRYh8sFu92Byt59UNKjR8bPSYxBTiQQiQg/5H8mofsgsRMAHR0FrIbklEA9mmhKwJTsdjt69+2H7iWlpz7ndLpSmj+XFQkfbR2W0vMoSmYLARkDXls1ELLS+XSD1WqFs1XBn+4lpejdtx/sdqoAaD4MsVjEKEP+ZxK6DxI7AQAMM47UWiwaRn3dcRH3xJIMSJKE7iUl6DdwEPLyz76Ld+XlIZUigQdPFGPzwdTuzjOZBli5owL7jqUwnC81x3yGvPx89Bs4CN1LSmhHgEnIsoxIOCzyKv/OCN0HiZ4AGLaHVGQZjfUn0dRQS0cLG1iyUxyIkh5lsLRzOI7FYoWznf31Z/p0+0A0RTufNkg3AahtcuK9dX1SeqzT5W73bAOLxYKSHmXoN3Bgm8kOMQbGGGLRSPNhPoYa8j+T0H2Q6AmAUDUjMxGLRVFfe5zKCBuMzWZDz1690Ltvv5QW+jkczpSq6MVlG5ZsHdL549LcCTB/9QDEEp1PRVhttpS/n959+6Fnr16wUXVAQ0nEY4iEQ2ZZ1Cx0HyR6AiB09pUqxhjCoUbU1x5HgqYFBCeha7fu6D9oMAqL2t/e1xa3Oy+lofPdx0qx62hZh49JZyHgur2l2H6o82OIJUmC253eSYWFRV3Qf9BgdO3WHSnNcxDdUhQZkUioeerScHP97RG6QRY7AZDE/uGnS5YTaKg/iabGOqOtpDUFd14e+g0YkCyS085wf0ckiwVOd2pTAUu2DkEk0f6CO0VhiMY6fw01Re14+/N+KT2n0+2GlMH3ZbEkix31GzDgVJljIg7Gkov8opEwmPnaJaH7ILETAMF/+JmKRSOor61BNBKCiTJtYVmtVpT3rESffv3hTHFbX3vsdgdsKaykD8UcWL5jcIePiUQ6X1vy9uf90BTt/Plsdjvs9ux2RDldLvTp1x/lPSupcqAgEom46KV8syV0HyT05JvFYu0lq328mSAYYwg1NSASboLLnQ+H000rq3XGarWiuGtXdO1eomqH5nLnoUmuB1M6Tv42H6zA0Ipq9Op6os1/j0RldEH7nfuOQ8VYt7e03X9vIVkkuNIc+u9Il+JiFBQW4uTxGtSePElnZuhQIhFHIh4z/XZlCcjsXG6dkET8BU6bOasLY/i9LMcfisei1OshOTzscuXB6Uptnphox263o2v37uhS3DWjof5UJBJxhJs6Xxha5A5jxkVr4LS1vVupe1cnnI6zYwxFbXhy4bnfOOynPe78/FNnF6hNURTU1Z7EyePHEY8LveNKfIwlO/5E3PQdfysMkP4hSfhh1dzZdbyDSZdwCcC0e2d5GNgfAJTLcgLxmNCLMFUnSRa43HlwutyQJNFneMTicrvRrXt3FBYVIRcL2iLhEOKxzkcg+3Q/iclj10PC2aNlLpcV3bp8c+heViT8Y9FI7D3a+SFDdodD1bv/9jE01NfjxPHjiISpWmYuMcYgU8ffmWoJ0g+q5s0O8g4kHcIkANNmzipijM0DcGvL52RZRjxGp+m1RZIkOF15cLnyMlqYRVJXUFiIbt1Lcr6AjTGGUGNDSgtC+5WewHUjt8Bl/2bCLElAaXcXbNZkwtIQduCV5YOxq7rzHQoWiwV5BYU5H3EKh0I4cbwGjQ0NOX1es2Gt7vg7PPmJtPaWJEn3Vs2dXc87kFQIkQBMu3fWOQzsdQDfWNXEZAXRGN0NdESSJDic7mRJWY2Gac1IkiQUFRejW7fucDj5nUklywmEGhtTemyeM44LBnyFIWVHvpEI5LttsNjzsW5vKZZsrkQomtrSoLyCAlit/JYRxaJRnDhxHPW1tXRnqiJFUU7d8ZOOSZDAzl6IvVOCdFvVvNkbecSUDt0nAM1D/s8COKtsmKLIiEVpBCBVVqsN3Up6gDHQwqoM2Ww2dCnuiq7duqVUmCcXopEwYtHUp8IsEkNxfgiFrggkSUJ92Inapry0jhR2OJ0pVyfUmpxI4OSJE6irPYmEeVejZ8Vmt8Nus+HkyeNm3MqnhSYJ0sN6nxLQbQIwbeYsK2P4A8Aeb/dBioIInZ6XloGDh8PldiMajSIcCiEcDtPdUyccDgcKCotQUFSYdqGbXGlqbICSo6TOYrUiv0CfR/yGwyE01jegsaEesRTWR5iZxWJBYVERiroUIy8/H+FQCNu36P6mVVckdLYRW/qLJOEHVXNn6/KOS5cJwLSZs5yMsSoAkzp6HGOseS88SYXVYsWwUed+43OMMUTCYYTCYUQjNJrSwulyobCwCAVFRXByHOJPlaLIaGps0L4shATkFxS2W+tfT6LRKBrr69HQUE+v7VMk5Bfko6hLcqvlmbtUNq77nEYH1bdQkqRpVXNn627Fuu4SgGkzZ+UzxhYAmJjK46lGfuoKCrugb/+B7f67IsuIRqOnPszVEEhw57lRWFSEgsIiIY+tjUWjiEa0HRFzutxc1zxkKh6Po7GhHg319QiHwjBTAS273Y68/Pzmj4IOz17Ys3M76utqcxidaSyWJOmWqrmzddVh6SoBSO7vZ+8BuCjVr4mEqRpeqnpU9ERpaXnKj08kEslOpfnDaOWHrVYr3Hl5KCgsREFhIdcFbWoJNTVqVpXNarMhL79Ak2vnkiwn0NjQgMaGBoRDIcMlujabLdnZ5yU7fbsj9QqNR6oP4fCB/RpGZ2qrJEm6QU/1AnSTAEybOauEMfYhgDHpfF00YvjjJlXTf9AQ5OVl3oAnEolTyUBMsITAbnfA6XLB5XLB2fwh4l1+ZxRFQaixQfV1HZIkIa/g7CFjI4jH44hGIohGIog0/xkX6NAtq9UGd14e8vLzkZ+fn9UITVNjA3Zu26JidEbW+QqANqyXJOnaqrmzazQIKG26SACmzfxuEWPKCgAj0/1aSgBSI0kWDB81WtXiQIqiwGqzQZYVxGLJpCAWiyEe41ciVJIkOJ3OU528y+WG0+UUYs5aLfF4DJGQumtjXHl5Wdf6F4miyIhGoohEwqeSg2g0yvV1bXc44HA44HA64XA4T/1dzTLTjCnYsPYLalO1tVmSLJdUzf0b91oB3BOA2x943ConEu8D7OpMvj4WjUBRjDWEp4W8vAL0H9T5OfHpcuflt3E4DUMsFkc8FkUsGkMsFoOiyFAU5Zsf8um/t5dJW6xWWC0WWKxWWCwWWK1WWCxWWK0tn2v+u8UKh9MBh8NJpZABhENNSKhUOtdmt8Odd9YuXNNJnnqXfE0rigxZVpKva/n032W5+XUuy5Cb/2ybBIvFkvywWk7//dSHtbmDd8DucMLhsCNXxyXv3LYluaCUaEj6yGqzXf/a83/h2nlxn/RUZPnZTDt/ANTYpyivQJu52zaKYACQko2Xw4FUp4wVRQFrSQYkqbmjN95wc66kemBQZ9Q+6EdkydElF5zO9E50VBQluc6AMVgsFkjNnbxeFRQWUgKgOXZ1su/Dt3hGwfVVeNt93/sxY8qD2V2FEoBU5OVrdAen0gCSxWKB1WaD3eGA3W7XdQMpAklSp+N2uelwqWxZLBbY7XbYHQ5YbTbdv7b1WuPBaBhTHrztvu/9mGcM3F6Jt9//2O2KIv8m2+tQ25Qal0ZV29oeASB6YLPZ01oBfia7w6HZKX9Ev2jEJ3cURf7N7fc/djuv5+eSANx+/2NjZFmeq8rzUwbQKUmyaLeASweLSEn7nC53RnecFotFN6V+SW45HA46STR3LLIsz739/sfS2v2m2pPn+gmn3P1IviwnXgGYKq2LJJlndXemHFncBXaGun99kyQJrgxOKXTl0dC/mYlQ/ZI/td4fzC3LiVem3P1Izlfa5jwBcDjdfwWg2nJ0aqM6Z09z0VJaaARA96xWG5yu1F8DTpfLEEWRSOYcabxezEvVtm9Ic9+YUzlNADxe33Sr1fqAmteku5TOObUcAaAEQAgOpwsud+eDbi63Gw4tE0YiBBoByL3/396dR8l11Qce/973XlX1JsmLbMk7bluWzbAbG4PZwh7LgCG0lPQJMFKAPkNCFghNhsCcSTIMRDMQM6QTZBgbLCxoBI1ZZEg8YY1ZAma1kW3Z7U3WYllbr7W+O39Utd1q91Jdde+7b/l9ztGxLXfX+9XS/fu9u/yu7/ub+wcGN0V5zcgKgP6BwfOBbcrwClilFCzjGNMsSmLvdmFeLl+gs7sbb57GMZ7v09ndTS4vnxXBsrc6Zo6F+55GbtzWyJWRiKQA6B8YzAGfB1aB+bt25UkBsBibBYCMACRLEOTo7llBz8pVdHZ309ndTc/KVXT3rJAV/+Jxy5kyyiTDKWdWTlwFfL6RM62LagTgr4HnzfyH6RWmMg2wuLzNuzopABJJKUUQ5AiCnPz8iCeRUcNozcmJz6OeM62zXgD0Dwz2Au+b/XfGpwFi3ljDJaWU1R7uoRQAQqSOtNSO1jw57H2N3GlVFJnzWuCE8STP9BSA7FldUC6Xt/qDLIeGCJE+Sim7I4eJZ/Z36jw5sYN67rTKaubsHxjcALx27t+bnwIw+nCpYntFd7u95oUQ8STrABZj+rjteXPiaxs51BprBUD/wGAB+Ph8/8/0oj1pBrQwm02AZsgogBDpI+sAFhPZQvaPN3KpFTZHAN4LXDDf/5ARgOhE8UMcyiiAEKkjWwEXE8kIANRz6HuNXmwWKwVA/8DgecD7F/r/9Tlpc1lbKSULVhYQRQEgIwBCpI9MAURlyfz1/kZONc7WCMA/AIu2HTO/EFCmAeaTz0VQAMgIgBCpI4sAF2J9AeBcndRzqnHGC4D+gcFXAW9Y6utMb93zpBnQvDzf/g4JGQEQIn38eTpGCjA+/N9cLnxDI7caZTQ79A8M5oGmDjQw3g0wgkSXRPO1fTUtDKUAECJtovjdkUj2ugAu5RONHGuM6SO/3k2TJ/2ZHgHw8agYfcR08CLokSDtgO0Kw5BKuUStViMMaygUnu/j+wG5vN0+D4vRWlMpl6nVqoS1GhqN5/n4vk8uX8CTBl2JJu/f/JQ2OwawjFx4EfUc+xFT1zb2DvcPDJ4NfKDZrzfevMfzMF6aJZynvEiSg0wB2FMul5iaGKdcLlGrVdFaE+qQarVCqTTN1OQ4tWo18rhq1SpTk+OUStNUqxVCHaK1plarnhCzSC6llBQB8zB9u7PMXPiBRq41wuS7+1Ggu+kLW/hgyU6AE0XVIlkWAdpRnJ6iVJxGL/IrJwxDpqcmKJeiS7blUonpqYlFp340mlJxmuL0VGRxCfOkALBvma9xN/Vca+baJh6kf2DwZcDG5XyPja17nidzVrNFNYcXygiAcdVKhUql3NTXaqBUmo6kCCiXSpRK003fBVUqZaoVmZxLKlkHMJfp3Wst5cGNjZzbNlPlXUsViemELYcCnSiynRFa1gGYpLWmWFz+nbPtImAm+S9XsTgln4+EkhEAu9rIgUZGAdp+dxtbE57V0sVNLwSUKYAT+BGOiMg6AHNqtVrLCdNWEdBq8gcaawNqhiMSUZCtgCdShlcAtJEDn2ViW6CJDNxym0IZAbAryikRaQdsTthmsjRdBLST/Ge0+5yEGzKteiLTv+XafH3bbhHcVsbsHxh8NvCKVr/feMJWSo4GniXK3ghhKL/gTTHxWpoqAkwkf5DPR1JF0Ugsy9rMga9o5OCWtfvutlWBKAsJWxatPMGPcERE7vDMMXXX1W4RYCr5g9xJJlWU04hZo8xs024rB7ecIfoHBp/CMlf+zxuA8ZbAUrHO8CI8H0G6AZpjct611SLAZPIHmUtOKinc7DGUqzY2cnFrMbRx4b8A2v50mP6AyQf2CVEO38kIgDme7xsdGVtuEWA6+SvlychcQskUgD2GcpVPPRe3FkMr39Q/MHgK8EetXvSEAAx/wGxMKyRVlIsitday1csQpRQdHYseprlszRYBppM/QEdHpzTpSii5obLHYO77o0ZOXn4MLV7wnSyj69+iAVj4gMmHti7q6l1GAcwJcjlyOaPnfixZBNhI/rlcniCXM/qYIjoyAjDDfAFrME91U8/Jy49hud/QPzDYAbyrlYstGIThO3ZZuFKnI56Xl5XeZnV0dhEEZpPnQkWAjeQfBDk6OruMPqaIVtS/Q+LKdPq3cEjbuxq5eXlxtHChtwKnt/B9C1KG5wdVVB3wYi6sRfvDK81ezOvs6rZeBNhK/p1dRgYJhUPyM1232HkcrTCd86jn5Lcu95uWVQD0Dwx6wHuWe5ElgzA8V608DyUnA0Y+JC87AeywWQRI8heLkWk9OyztVntPI0c3H8cyL3ANsG6Z37N0EBaG7GXbEdQiHpKXKQB7bBUBkvzFYmQEwM4h85bWqa2jnqObj2OZF2i79eC8QVi4Y1d+YPTxkqgW8RSADmUngE02igCTJPmnjxQA5tv/KpTNfjXLytFNR9E/MPgi4Iplh9NsIIbv2P3Aw07tlhzawR25DBnaFdciQJJ/OsmoHsbTiOWeGFc0cnVzsSzjga3c/c/wTd+xa6tVViJEPQUA8gsjCnErAiT5p5eMAGB8CMB4rnuypnN1Uxmyf2DwfODqlsNpJhALVVHWu49FPQUAUJOFgJGISxEgyT/dpAAwL4K8dHUjZy8dS5MP+BYsj6crZf6OPesLAV0Mx8sUQHRcFwGS/NNPfp7N8jwjBwAtRVHP2UtqNuO+ufVYmucZHhqpn7aU3WkAF8Px8gsjWq6KAEn+2SAjAGaZznGLaCpnL5kd+wcGXwhc0HY4TbBxxx7hCx479f78Ee8E0FqKgIhFXQRI8s8GrcOM7+oxf6ce4aj0BY3cvahmbo+bGkowwfN849sBfVkIGPk1q7Vq5NfMuqiKAEn+2SF3/4a7/6GiPqdmydy9aHZs9BbeaCycJpheIOH55ouKJIm6HTBArSoFgAu2iwBJ/tkiBYBZDhalb1zqfIClbo9fD6wyF8/SbGyR8ILsTgO4GI6vyQiAM7aKAEn+2SNTeWZFsP1vrlXUc/iClioAln24QLtsVEm+7367lCsupgB0qKUfgEOmiwBJ/tmU7REAC8f/utmVtmgOX7AA6B8YPB14lfFwlmBjO6DnqczuBnB1QI9MA7hlqgiQ5J9d2T7cy+z8f0Tb/+bzqkYun9diWfF1gJOSxcbK/SCjuwFcrAEAKQDioN0iQJJ/tmV1BMDK4T/u8o9PPZfPa7ECYNG5A5usbAfMZbMpULVWcXRdKQDioNUiQJK/qFbd/O5wTVuoABw3pVswl89bAPQPDHYDr7AWzhJsbAdUeFFvwYiFcrHk5Lr1dQBZHkKMj+UWAZL8BUCpWHQdggPKeO9/B9v/5npFI6c/yUIjAK8CFt0+YJtvYeV+Fs8GcPlDLNMA8dHZ1U2h0LloYa1QFAqdkvwFAMXpadchOGC+8ZGNXLZMHSywnm+hAsDZ8P8M38JWJgfbMJwruiwAZBogVvKFAl09PeRy+cYoW32+0/N8crk8XT095AsF12GKmMhmAWCejVzWgnlz+pMKgP6BQR/LJ/81w/M847sB6jsMslUE1GoVZ/PxMgIQP57n09HZRXfPCnpWrKJnxSq6e1bQ0dnlephSxEi1Ws3sGgCTbOSxFl3dyO0nmC+yK4FT7cezNBv794NctgoAgFLRTSUfhqGsA4gzpep/hJijOD3lOoRUiFEPmlOp5/YTzFcAXGM/luZYWQfg+ZnrCeB0HYBMAwiROEVHNw1pE4P5/9meNA0wX3SvjiCQpiil8P3AeBLJBTnKFTer411wvRAwl8sbfcxqtUK1UqFWq6HDGkp5eL6PHwTk8+7msMMwpFIuUavVHm+j6vk+vu+TzxdQ8RgKjD0dhpQXeB1z+YLTIdVyuUStWiWs1dA6RHn1uIJczsmxzLZkbf5fYX75n+8Hrpr/LOQ1wHtm/4Wafdxj/8DgauBR7PRCaEmtVqVcMp3AFMWpSVDZOOqyu3sFT7lgnZNrK6XoWWnmOAmtNaXiNJVKecGv8Rtz3FHv+KiUS5SKRfQCv0aUqq+wz+XNFkNpUymXKZWmFzyGVqEodHSQi7jQC2s1itNTi7bWzuXyFDo64/ZLvyX33r2bifEx12FEQ9OYCjObD/KFjrgtPNfA6Tu2bX1s5i/mltIvIkbJHxpVlPGQNEEuPdX6UlzuBNBaG1lMpLVmanJi0eQP9bMPpiYnqFaiW8A0PTVJsTi9YPKHevzF4hQl48VsepRKRYrFqUXPoNdoisVppqcmI4urWqkwNTmx5LkalUqZqcmJReNPikyNAFhI/goVt+QP9dz+otl/MbcAeEl0sTTPxjxKTLZmRMLlTgDASDIul4pNHzCk0RSnpyIpAqanJpdV4FRKxcy2WF1MrVajsoziqFqtRFIEVCsVitNTixZ3s4VhzcKIZbRkB0D7Yjb3P9sJOX5uAfDiCANpmo1krRSZ2hLoch1Au4m4VqtRKS9vzUYURcBykz/U7zNKRVlhPVepOLXsezDbRcByk/+MmXUgSZWpu3/ATvOf2N5gnpDjHy8A+gcGVwHPjDycJnieh2dh5X6WtgS6LADanQaoVSst/YjaLAJaSf4zarVaKoaJTdFat5wwbRUBrSZ/qKeTWoLvoGUHQHs8FZu9//N5ZiPXAyeOALyQxQ8HcspGReV5fmaan7jqBTCjnSTc7ND/fGwUAe0k/xlJvkM0rd3XwnQR0E7yn9HOZ9Y16QHQnhjf/UM9x79w9n/MiOXw/wxbcyq5eL9Zxrg+2KO9AqC9u2WTRYCJ5A+gE5wgTDPxWpgqAkwkf2j/M+tSVqYAbK12j/H8/4zHc/3cEYDYmukJYPxx/WyMAhQdL0xqZxrAxHCaiSLAVPIHMvGZa5ap16LdIsBU8gczn1lXsjIFYKNEi+He//mcOALQPzCogGc4C6dJgeGGMo8/bgZGAWrVivOufK0mX1N7+tspAkwmf0U2T6ZciOf7xu7GWi0CTCZ/SO77W6tWI91Cmza2cpRhz2jk/MdHAM4DetzF05z6wQrmf7C8rIwCJHQdQBDkjPWCaKUIMJn8oT5HmIC7hMgopYzOmy63CDCd/BUqsTcV0zL/37L6mrJEjPz0UM/5jxcAT3MXy/KYbis7I6k/sMsxOT7h9PqtTgN4nmf0mNrlFAGmk3+9k12nscdLi0JHp9GGX80WAaaTP9SPXU5IIniSibGMdP+zwFZusuRp8EQB8HSHgSyLrbv1LIwCxKG1Z6ujAKbbajZTBJhO/gCFjo7EJgebPM+j0NFh9DGXKgJsJH/fD8gXzD6PKI2NHXcdQiJ5np+0aZ+nQwJHAABrbXzTPgowPT3ptCMgtLcboLOrG99gkbZYEVC0kPzzheh72CdJLl8wnjyr1Ur93I+5f28j+Xs+nV3dxh4vatVqlalJt6OESZXA1vInjAAkqgCor7Q0fxeVhVGAyfFxp9dvZzeAUorO7h7rRUBxapKKheRfSPCdYVQKhQ7jRUBlThFgLfl39yR6bce43P23RCkvjn3/l/I0AP+e/VMB8A9AojKfUsrKqnbf85zfJdvk+T4rV57kOoyW58uUUgS5PLVq1Wg3vVq1iuf5lMtFSf6OBY191CZ/vsMwbPQbUJL8F3Do4AGmp9K7CNDWu5N3fER1i07+8jdu/YgHrAMStXoB6s0WrPzAeV7cOzm1ZWLM7QgA1O/AwjBs+fttjQRMT09SMbwFSpJ/a6yMBFQqTE9PSvJfwPjxdI8A2Nj3X9/Bkri7f6jn/HUecK7rSFoVBBZ3BOjk/0DPp1otO28LDCz7cJ+5bBQBpknyb4+NIsCkNCX/4vTUkkdtJ5bFpoy2clBEzvWANa6jaFWQM7c/fDalFLl8ekcBxmOwG6BSLrc9hB/nIkCSvxlxLQLSlPwBxtJ892/pLVKoJC7+m21NogsAsLf60g9yePE9G6ktkzEoALTWRu444lgESPI3K25FQNqSP8D42DHXIVihbN79Jzv5QxoKgPp8vZ0fxCCf6OGdBU1OThLq1ufgTamU2psGmBGnIkCSvx1xKQLSmPzDMGTCcZMwW+zN5JrtXunIGg843XUU7aivCrfzRqR1W6DWIZMT7hcDhmForO94HIoASf52uS4C0pj8od4gTMfghiBJglwq2nmfnvgRAKgf6WvrzcjlO7C3gcSdyRjsBgAot7kYcDaXRYAk/2i4KgLSmvwhzav/7bxXSqm0HCOf/CkAABp7wy09dNJ6PDdlfCIeP/S1apVarf3z4Ge4KAIk+Ucr6iIgzckfYCyl8/+2lv8HuXw9MSRfSgoA6lv3bDVj8IMAT6VrKqBcKrW9Fc8U03FEWQRI8ncjqiIg7cm/XCpRKhZdh2GWxYV/nuelqWX8Gg9ITXPyXM7eU8kV0jcVMOG4LfCMSqVsfA4yiiJAkr9btouAtCd/SGn7X4vvl80c40DBA1LT99bzfWs9metTAamp/AAYn3C/HRAADeWy+SYkNosASf7xYKsIyELyh7QO/9sZAvD9IGkn/i2l6gHmJmBjIGdx654f5FK1K2BybIxaGI+3vz4NYP4H10YRIMk/XkwXAVlJ/rVaLcULAM2zmVscqaWuAFDKs9qeMU27AkIdcuzoYddhAKBDTaVstg//DJNFgCT/eDJVBGQl+QMcOXyorTM54sfeexYEeSsn0DqWvgIA6kP1tn6A07Yr4EBqTpQAAB6fSURBVOjhx1yH8LhSaRoMnvA3m4kiQJJ/vLVbBGQp+QMcPvSo6xAMs/e7I23Tvw3pLABsbguExq6A5J3/PK9SscjUVDy6gOlQG+0LMFc7RYAk/2RotQjIWvKfnBinOO3+ULAkSNG2v7lSWgBgd1sg1EcB0jIkdCRGowDlUtFqV7JWigBJ/smy3CIga8kf0nj3b0fKtv3NVfOAlJ4BaXfLRv3EwAJpWA8wfuwYtVo8NoNojfV9yTNFQD5fWPTd85RHZ2e3JP8EKhQ66OzsxlukSFdAPl/IXPKvVascO3rEdRiJkLJtf3OVPeBh11HYYnNbINSrwzTMDcVpMSDUjwoODXYHnI9SikJHJ53dPeRyeTzPRzX+3vcD8vkCXT0r0nDiV2YFuRxdPSvI5wv4foBS9cPDPc8nl8vT2d1DoaMzU8kf6iN+6Vr8Z0cKt/3N9XAAjLqOwqZcvkA4XUPb2hsa5KiFIWFM7qBbdeTwY5y6Oj5NIYvFabq6e6xfx/cD/M6ZIlGThhEd8YSZQu8J8h7L8P/SFDMjvKk26gH3u47CJqUUuYLdN7KQgvUA5VKJycl4dAaE+jClqZMCm5ftxJAN2X6PJ8bHKRaTv/jP9ruYKxSyMDJ0v0fKRwCgcZfn2xvK1SlZDxCnLYEApRT8ohIiTg4fOug6BCMstvvH93NWp45jZDQTBQBAPm/3Lt3zPHKFZPcHGDt+jGot6rvuhYVhaHVboBBZUq1WOXb0qOsw2mP5Hkspj3z6Ov4tJP1TAI9TirzlOR3fC6x2IbRNa82xI/FaHVwuFtGWmgMJkSVHDh+yusU2EpZ/FeTzhbTu+Z/P/d6ObVuPAfFZAm6R5/vW93QGuZzV6Qbb4jYNoLWmXErZcaVCOJDsxX/2k3IQ5NK+6n+2wzu2bT02Myb+HaehRCiXL1hfsJfL5xN7aFC5XGIiLqcENpTLJdm2JEQbJsbHrPfXsMvurb9SXhZW/c/2XYCZTPhNd3FEz+YZ4jOiKDRsidsoAFoWBArRjscSffdvXxQ5IWZugRMLgMxMtNYb+Nidq1dKkS8kc2fA+NhxKpV4NYisVipUyvGKSYgkqFTKHJfOfwuqNwJL5s1aizSNm34PYMe2rfuBX7qMKGpBzv4wvVJeo7JMVhGgtebQwf2uw3iSUnFKpgKEWKYD+x6RhbQL8Dzf6sFxMfXLRs5ndtlzi6NgnIniDt3zPAoJ7BFw7OgRSjFbfKc1FKcmXYchRGKUikWOPHbIdRjLFs1vy5lR2sx5PNdnugCIas+n8n3y+WSNBGitefTAPtdhPEmtVpP1AEI0af++vQm8+1eRzEfb7g0TY/MWAD8B7o0+Frf8IBfJcY+e75FLWIOJsePHmI7hHXe5VKJaTfbZC0LYNjU1ybEjSdzhbT/9B0EOP73H/C7mXuq5HphVAOzYtrUG/K2LiFzL5QuRbNvzvaAUBPnvAYmZyD64P36jAADF6ckE3tkIEZ39exN10GuI5jtorLf+9Dw/a1v+ZvvbRq4HThwBANgB3B1tPPGQL3TYGw7S1MIwvKlaLV/89S986qVKee8hIbsuJifHY9cXAECHmuL0lOswhIil8bExxseOuw6jWRrUu77yuX96WbVavjgMw5vQWDkP/ImF2Zl0N/Uc/zg19y6qf2DwD+Z+UVboMGyclGUsN+uwVvt6pVL+4C07b/j17P9xVd/mv9I6/LCpC9nU2dlF77qLXYcxr0Jnp/UWz0IkzT2772BqMn7Td/NT7/nK9qGPzf6bq/o2PyOXy/+d5/uvxdjiKUVHRycqW1v+ZuvfsW3r52f/xXyvxDBwZzTxxIvyzFWHWuvvVMqlK7/2+etePzf5A9yy84aPKOX9JQmYDpienmLsWDwPESkVpwlrVm4WhEikY0ePJCX5h6D+dG7yB7hl5w2//trnr3t9pVy6UmttpFNtvtCR5eR/J/XcfoInjQAA9A8MvgnYGUFQsVStVKhUWpuKUkr9FM1fj2wfurWZr7+qb/MWrcNPArFekZIvFLjwoqfG8oxsz/fo7llBknZZCGGD1pq77vx1Etr+VkBt+cr2oc8188VvfPMfvxLFh7TWl7VysVyuQJCL9a9Y2/p2bNv6pbl/OW8BANA/MPhZ4C22o4qrcqlIrdb8SnPP83/s+f7f77z+2puXe60NfVuuCXVtB9C53O+N0plnncvJp652Hca8cvk8HZ1drsMQwqnDhx7l4Qdjf8DrlEJtHNk+tGu539i35c+vCWu194Vh7Ypmv8f3gyzP+wPcuGPb1rfO9z8WGw95B/BDO/HEX77Q0cTOAFXxPP+LuXzh8i9/9hPPbyX5A+zaef3NnvKvAuK32m6WRw8eIIzpcaKVcplqpeI6DCGcCcOQA/sfcR3GUo4p1KtbSf4AO6+/9uYvf/YTz8/lC5d7nv9FUIv+0Huen/Xk/0PquXxeC44AAPQPDJ4O/BQ413xc8ae1plScetJ2M4U6ojzv00Eu93+GP/0xYz9xG/q2XBrq2i3A6aYe07Q1Z5zJ6tPWug5jfgq6unvw/cB1JEJE7tED+9m39yHXYSzmgEK9ZmT70K9MPeCmt737rGql8qc6DN+m0afM/n9KKQodXbGctozIQ8BlO7ZtXfAkqEULAID+gcFnArcB3WZjS4YwDBud5zRKqbuU8j6RL3Tc8Pnr/peVdnQb+rZcFOrwVtCxLLp8L2DdU/8TfkyPO1ZK0dXTk9jjmIVoRa1W47e//uWypi0jdr9CvXJk+9B9Nh78D97x3s5yqbhZ6/BdWuuLQVHo6MzaIT+zTQJX7ti2ddFia8kCAKB/YPD1wBeBZLWyM+N4tVL5crVauXHkxn/8XhQX3NC35YxQh1+F1ha82Lb6tLWsOeNM12EsSHmK7u4VWV7xKzJm/96HORjD1t0NP1KoN4xsHzoYxcXe+JY/eUkQ5N4S5HK/B6yK4poxUwY27ti29atLfWFTBQBA/8Dgc4EvABe0F1sihMCtwGeBm3ds2xp58/mr+jbntOYzEPZHfe2leMqjd93FFDriO7fm+R5d3SuyPPwnMqI4Pc09u++I6UmZ6jNK8Y6RG4ciX6DTPzDYCVwDvBV4JYuveUuL+4Df37Ft68+a+eKmCwCA/oHBlcB1wKbWYou93dST/vYd27bGopy+qm/zoNbhh4BYTWx3dnZx/oXrY51gfd+ns7sn1jEK0Q6tNXt238lU/M7sqIJ671e2D13rOhCA/oHBM4E3Uy8GLnEcji3DwDt2bNva9GLyZRUAM/oHBt8OfJyYb1trggZuB74GfG2p+RJXNvRt2RDq2k3EbDjrtDVncPqaM1yHsaggCOjs7nEdhhBWHNi3lwP7Yrfy/6hC/f7I9qF/dR3IfBrr2l7X+HMpyW8gMg382Y5tWz+13G9sqQAA6B8YfBrwYWADyXoBi8C/UU/634jLnf5SNvRtWR/q8Oug17mOZYZSivMvXE9nzPffS48AkUZTU5Ps2X1n3A7FukuhXjuyfSgRJ8s2Rgaupl4MvByI77zmk2lgF/Bfd2zbekcrD9ByATCjf2BwHfDn1IdW4rpT4B7g+8A3gFt3bNuayFNkNmzcsjIMwy+CfrXrWGYUOjroXXcxXszP1c4XChQ6kj5gJURdGIbcs/sOitORL09azDeUUv0jNw6Nuw6kFf0Dg13U1wpcDbwYuMhtRAuapD5Vfe2ObVv3tPNAbRcAM/oHBk+m3nDgT4CzjTxoa8rAz6hvXbwN+OGObVsPOYzHuKv6Nv+Z1uH/BGJxW3vq6jWsPfMs12EsqdDRkfWmICIlHnn4IQ4d3O86jBmTjfn+f3YdiEn9A4OnAS8Armz8eS5ud8LtBf4RuG7Htq1GDmcxVgDM6B8Y9IFnUH/BXtD4c57RizzhMLCn8ecO6l2Pfrpj21brZ0q71pgSuAn0pa5jAXjKBRfRnYC59o7OLnL5+s9wZ77Mio4SPYUSPR1FegolytWAiVKB8WIH48UCk6UCtTDeoxtifr4X0l0osaKjxIrG+5sPqkyUCkwUOxrvc4HpcrJ2N0+Mj3Pv3b91HcaMnyjUHyZlyL8d/QODBeAy6jntacC6xp9TLV3yQeo57YfUb2Z/vWPbVqMnnxkvAObTmGe5EngO9S53p876c0rjnzOr3IvABDA+55+P8USy3wPsMVUFJdVVfZs9NH+jCd+H48OEcvkCF66/GE/FswGPpzTnrxnjqWcf4eKzj3NSVxHfa27b1FQ5zyNHT+KeA2vYc/B0Jkty/HAcdRdKrFvzKBetPchZJx+jK19u6vtqocfx6U7ue/Q07jmwhocOn0Ko47msKQxr3HXnbyiXnN/jVED9nVJ8aOTGoTjuP4xMY/R73Zw/q4EeYMWcf84MQVap38Aeafxz5s+jwM+B26JYnxZJAdCM/oHBbqC0Y9vW2LayiqsNfVsuD3W4HbTTOauTT1nNmWfHp4FhPqix/qxj9aR/1lE682Y+WjPFwN0H1nJ4Iq7LXrLh1J5J1q898HjSN6FYyXFvoxi49+DpVGrxKWoffvB+Dh9asLNrVHY37vp/7jqQpOkfGAyAwo5tW2OxbzM2BYBoz4aNWzp1qD+qCQdw2PDi3PMvYMUKt7sVfU9zxUUHeNnT99JdsNt/ZPf+tXxn98UcnYzFcozMOLl7it+55C4uOeOA1etMlfP8+z0X8vMHz3U+FTR2/Bije+52GUII6hNK8VcjNw7F/rxhsTQpAFJmQ9+W14Q6/L+gnfTqDYIcF66/xMmBPAp4xlMe49XPeohTeqL7/RSGip8/dC4/uHsdUwmbT06arnyZF63fw3POfQjPi+5317GpLr5710Xc+YibFti1apW77vw1FXcnXj6sUJtHtg/9m6sAhHlSAKTQho1bVoWhvg7CjS6uv+qkkzn73PMjvWbvmjE2XHo/Z53ibmStXA340b29/Oi+Xud3i2njeyHPv2CU5184Sj5wN0t44Pgqbr3zEh46fMrSX2zQg6P3cvTI4Uiv+QT1OaX445Ebh2J9XLlYPikAUmxD35b+UNc+QX2hZaTOOfd8Vp50ciTXevFT9/G7z36AuHT8ffjIyXz5Z5cyWZLRABO6C2V+77m3c84p8Vjzq7Xi27vX8+P7eiO53rEjh3lg1Mki+8cU6p0j24d2uri4sE8KgJTb0LflzFCHN4J+eZTX9f2ACy66mFzOXhIM/JA3Pu8+ntMbvzYPY9OdfPE/LuXg2ErXoSTampVjbLz8dlZ2xqrhDQC/2XsWu371dKujPeVymXt++xuq1chHPb7VGPK3u8hCOCUFQEZc1bf5TxvNgyJbtl7o6OD8C9fje+ZXUa/orPDml9zFuavj23SsUvP52i+eyV3717oOJZEuPuMAr3v2r8j5Rrc+G/XI0ZP40k8vZcLC1tBarcaeu+6MutvfRKOpzyejvKhwQwqADNnQt+WcUOuPQLgJiGRvU0/PSs49/wKjJ/KdtnKat7/iTlZ2NbfP27V/++3FkQ0Xp8UVF4zy8qfe5TqMpowXO7jpR88zuiVUa83onrsZHztu7DGXUAO1XcEHRrYPxe50IWGHFAAZtKFvy7NCHf7vqKYFTPYH6MxX+ePX/IbVK+M3JLyYkdufze598T45MS4uOXM/b7z0F67DWJYjk93c8IMXUKyY6ccV8X7/bynU4Mj2od9EdUERD1IAZNiGvi2vDnX496Cfaftaa844i9WnrWnrMTyl2fyy3aw7w0zDlyhVaj433nYFB47H6kTn2Fm76jhvufLHsR72X8joodV84SeXodvsIvjogf3s2/uQoagWdXsj8X87iouJ+JECQLChb/PmUOv/DtpqG79zzutl5aqTWv7+q597Py+8ODYHoCzbWLGDG75/pZX54jToKZTY/OLbWNmR3B4z/zF6PrfeeUnL33/86FHuv+8egxHN636F+uDI9qGbbF9IxJtsVhbs2nnDDUqpC5Xy3g9Yu71+5KEHmJ5q7STm517waKKTP8DKjiJvuux2gibPIMiSwAt502W3Jzr5A1zeez/PPGdvS987NTnJg/db3e53BNRfKqXWS/IXICMAYo4NG7ecpEP9N42WwsZvVYMgR++69cvaHriqq8R7X/8LAj8difO2PRfy3bvietS4Gy+9+B6uXJeOA+Wqocc/f/uljE03f/R0uVxmz+47bHX6K4L6R6X4HyM3DkW2qlDEnxQAYl4b+racF2q9FcI3YXikaLnbA/uefy+XXuD8ABRjKjWff/r2S5koylQAQE9HiXe+7LuJnPdfyK8fPpuv//IZTX2txe1+IagdCt4/sn3oYdMPLpJPpgDEvHbtvP7Bb37phk2e8p8H6rsmH7tULLL3gftppvhcc9IUz+lNT/IHyPk1Xrze+jxvYrx4/T2pSv4ATz/7EU5bsXSPCq01D9y3x0byv1WhLv3K9qE3S/IXC5ECQCxq187rf/bNL33mdzzlXw3ql6Yed2JijP2PLP176Xef/WBsWvya9Kxz9nJqz4TrMJw7tWeCZ7U4Zx5nSmledsnSJ/ftfegB03v9f6ZQr/7K9n961cj2IWM/ryKdZApALMuGvi0vCXX4btC/C7S96XnNmWexevX82wN714zxjlfe0e4lYuvuA2v40k8vdR2GU2+67HbWrz3oOgxrtv/wigUPDnr04H72PWxku18F+KpCXTuyfeg2Ew8oskEKANGSDX1bztZa/5km/M/A6nYea6HtgW97xZ1cuDbda5au++6LODS+wnUYTpy2Ypx3vPQHrsOw6v5Dq9nx48uf9PfHjh7hgfv2tPvwj4L6tIKhke1D+9p9MJE90R/aLlJh187r9wLvvapv8/uBzVrr/wL6Wa081t6H7uess89j1clP3Cl1Far0rkn/6aPrzziY2QJg/RnpvfOfcd7qw3TkKid0CDx6+DEeemC0nYf9Gaghpbhp5MYhK9sGRDZIASDacsvOGyrAdcB1G/q2vCjU4V+AvpplTA9ordn78APUwhqnnHoaAJecdQRPpX906qK1B/n3ey50HYYTF6V46H+GpzQXrnmUO/aeBcBjjx5k70MPtPJQFWBEoT4+sn3oRwZDFBkmBYAwZtfO638A/GBD35YzZ00PnN7s9+9/5GGqtSqnn34GTz3niLU44+SMVcdZ2VFkrNj8nvE0WNlR5IxV6Z7emXHR2oPcsfcsDux/hAOPLHvB44FZw/xyNK8wSgoAYdyundfvA953Vd/mDwBv1Vq/E/Szm/neQwf2E6gqF52ZvH7/rVq39iC3P3Ce6zAitS4Dd/8zLjjtEAf3PcCBfct6zj9tNO/5vAzzC1ukABDWNKYHPg18ekPflitDrf8CwtexxPTAeaccIJeSrn/NuCiDBUAWhv9n5IMaa7v3sn/pWbEyqC8r+PjI9qGfRBGbyDYpAEQkdu28/jbgtg19W9Zo9B9ord8A+vnMUwxc8pT0z/3PdvbJ2RntmJG153zRORV+sWfeAqACfB/UiIKdI9uHDkUcmsgwKQBEpHbtvP4gcC1w7YaNW07TWm/UWr8R9ItoFAOnrMxWAZAPqlCbQnudqDR2PZojH9TqzzlDTllxwohWGfgOqC8rxcjIjUOHHYUlMk4KAOHMri9efwgYAoY2bNxyktZ6k9b6905dqV9OxrpUFtQYhycq5PMFcvk8SqX36fcUkn3iXytWrwpD4FugvtRI+tlYASliTRoBidgp37fpbk+RqePyrrv1aYweXPn4f/tBQC6fJwhyqRsVOPfUI7z5BT92HUakQs3u/AXDT3UdhxCzyQiAiB1PsdZ1DFFb0Vk+4b9r1Sq1ahWlIMjl63+CdPy4rujI3giApzjDdQxCzJXecUaRSNXRTd3AyiW/MGVWzikAZmgNlXKZ6ckJJsaPUypOE9aSfXJeT0fJdQgunFQd3dTlOgghZkvHLYVIk1NdB+BCV2HpRXE61JRLJcqlEp7vk8vlyeVziVsv0JWbv9jJgNWAkdN/hDBBCgARN8nKZoYst+1xWKtRqk1TKk4nbr1AAkK0JZOfbRFfUgAIkXAnrBcIcvhBDj8I8DzJN0KIhUkBIERKaA2VSoVKpd45VnmKwA/wg6BREPiOIxRCxIkUAEKklA41lfDEgsBvFASBH+D5UhAIkWVSAAiRETrUVMMK1UqFEqCUqo8O+AF+4OP78utAiCyRn3ghMkprTbVSLwigvjjP8wOCRlHg+V7idhgIIZonBYAQAqivIZhZUPg4BZ7n43nerD8+qvHvQojkkgJACLEwXd9yOG/zIcXjBcFMcaBm/bcQIt6kABAiBp59/oF//sJ3Vu5SqEuU5/UqT53ted5aT3mrleetVB5dCuUrpTyllEIpz0MpPIUi4o31ChQKTb04qFVrWqNDQq01OtRa18JQT6H1mFYcArUfzUM6rI2GWt/1tFc8+FrgndEGLYSYSwoAIWJgZVdt7FMf+++7gF3L/d7+d7ynkO/oONlT3smeUicrpVZppVYqpXrQrFSKHqVUN9CDUl2guhS6E6U6ANBMA9MaPQVMKZjQmkmNnlCosfo/OQ5qDKWOaB0eK5dKxz7ziQ+11NO3Orrppa18nxDCLCkAhEi4Hdd9tAQcaPwRQoimyESdEEIIkUFSAAghhBAZJAWAEEIIkUFSAAghhBAZJAWAEEIIkUFSAAghhBAZJAWAEEIIkUFSAAghhBAZJAWAiJt5ms5nQpaed5ae62xZfd4ipqQAEHHzmOsAHDnkOoAIZem5zpbV5y1iSgoAEStB7/A0cNR1HA7scx1AhLL0XGccDnqHi66DEGI2KQBEHO13HYADWXrOWXquMx5xHYAQc0kBIOIoi3eIWXrOWXquM6QAELEjBYCIoywmiCw95yw91xlSAIjYkQJAxFHWEsSxxtqHTGg812Ou44jYXtcBCDGXFAAijr7nOoCIfd91AA5k7Tln7fmKBJACQMTRt4Ex10FE6KuuA3AgS8/5KPAD10EIMZcUACJ2gt7hMvBN13FEJAS+4ToIB75B/blnwS1B73DVdRBCzCUFgIirm10HEJEfB73Dj7oOImqN5/xj13FEJEujHSJBpAAQcXULUHYdRASynByy8NzLwLdcByHEfKQAELEU9A6PAf/iOg7LQmDEdRAOjZD+aYB/CXqHx10HIcR8pAAQcfY3gHYdhEU3Bb3D97oOwpXGc7/JdRwWaeqfYSFiSQoAEVtB7/DtwLDrOCwpAR90HUQMfJD6a5FGw43PsBCxJAWAiLu/Biqug7BgKOgdftB1EK41XoMh13FYUKH+2RUitqQAELEW9A6PAp90HYdhx4APuQ4iRj5E+joDfrLx2RUitqQAEEnwd6SrMdCHg97hI66DiIvGa/Fh13EYNEb9MytErEkBIGIv6B0+BLyFdCwI/Ffgo66DiKGPUn9tkk4Db2l8ZoWINSkARCIEvcNfJfmL5u4GNgW9wzXXgcRN4zXZRP01SrIPNj6rQsSe0joNN1UiK6qjm75APVEkzVHgeUHv8B7XgcRZdXTTOuAnwMmuY2nBcNA7/PuugxCiWTICIJJmM5C0rVVVYKMk/6U1XqON1F+zJLmd+mdTiMSQAkAkSuMs+WuA3a5jaVIFeFvQO/z/XAeSFI3X6m0kZ/vnbuCaxmdTiMSQAkAkTtA7vBe4AtjlOpYlPAa8Mugd/qzrQJKm8Zq9kvprGGe7gCsan0khEkUKAJFIjbMCXgdsdR3LAn4DXB70Dn/PdSBJ1XjtLqf+WsbRVuB1jc+iEIkjiwBF4lVHN/0h8Cmgw3UsDTcDbw56hydcB5IG1dFNPcB26lM/cVAE3h70Dn/OdSBCtENGAETiNX4RX4b7Y1f3AW8H3ijJ35zGa/lG6q/tPsfhfAu4TJK/SAMZARCpUh3d9DvUh2afG+FlxxvX/FjQOzwV4XUzpzq6qQt4NzAIrIjw0j8DBoPe4e9EeE0hrJICQKROdXSTor6V7EPABRYvVQG2AX8rnd+iVR3ddBrw34ABIGfxUvcB7wd2Br3D8stSpIoUACK1qqObfOBK6nPH1wDnG3jYInAr8BXg60HvcNxXqadadXTTauC1wBuo7xowsQ7kfurrOG4GbpPOjSKtpAAQmVEd3fRM6oXAVcBTgNMAtcS3TQL7gR9RTwj/EvQOT1oMU7SoOrqpG3g19ff4+cAZQPcS36aBQ8ADwC3AzUHv8K8shilEbEgBIDKrOropB6ylnijObPz7OPWEvw/YJ1u8kq06umkl9ff2TOrv8wrgAPX3dz9wIOgdTkrDISGMkgJACCGEyCDZBiiEEEJkkBQAQgghRAZJASCEEEJkkBQAQgghRAZJASCEEEJkkBQAQgghRAZJASCEEEJkkBQAQgghRAZJASCEEEJkkBQAQgghRAZJASCEEEJkkBQAQgghRAZJASCEEEJkkBQAQgghRAZJASCEEEJkkBQAQgghRAZJASCEEEJkkBQAQgghRAZJASCEEEJkkBQAQgghRAZJASCEEEJkkBQAQgghRAZJASCEEEJkkBQAQgghRAZJASCEEEJk0P8HIGK4qJUDxrEAAAAASUVORK5CYII=" style="width: 16em;margin-left: 52em;margin-top: 63px;">
|
4 |
+
<div><h1 style="font-size: 90px;margin-top: -2em;margin-left: 401PX;">403</h1></div>
|
5 |
+
<div><h2 style="font-size: 54px;margin-left: 557px;margin-top: -140px;" >Forbidden</h2></div>
|
6 |
+
<div><h6 style="font-size: 21px;margin-left: 19em;margin-top: 7em;color: red;">Your IP has been blocked. Please Contact your Administrator.<h6></div>
|
7 |
+
<h6 style="font-size: 21px;margin-left:20em;">For more information please contact miniorange <a href="https://faq.miniorange.com/">FAQ'S</h6>
|
8 |
+
</div>
|
9 |
+
</div>
|
handler/mo-error.html
CHANGED
@@ -1,11 +1,11 @@
|
|
1 |
-
<img src="data:image/jpeg;base64,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" style="margin-left: 5em;width: 12em;margin-top: 1px;">
|
2 |
-
<div>
|
3 |
-
<img src="data:image/jpeg;base64,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" style="width: 16em;margin-left: 52em;margin-top: 63px;">
|
4 |
-
<div>
|
5 |
-
<div><h1 style="font-size: 90px;margin-top: -2em;margin-left: 401PX;">403</h1></div>
|
6 |
-
<div><h2 style="font-size: 54px;margin-left: 557px;margin-top: -140px;" >Forbidden</h2></div>
|
7 |
-
<div><h6 style="font-size: 21px;margin-left: 23em;margin-top: 7em;color: red;">Your request was detected as suspicious.<h6></div>
|
8 |
-
<div><h6 style="font-size: 21px;margin-left: 17em;margin-top: -2em;color: red;">Please Contact Your Site Administrator if you feel the request is legitimate.<h6></div>
|
9 |
-
<h6 style="font-size: 21px;margin-left:20em;">For more information please contact miniorange <a href="https://faq.miniorange.com/">FAQ'S</h6>
|
10 |
-
</div>
|
11 |
</div>
|
1 |
+
<img src="data:image/jpeg;base64,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" style="margin-left: 5em;width: 12em;margin-top: 1px;">
|
2 |
+
<div>
|
3 |
+
<img src="data:image/jpeg;base64,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" style="width: 16em;margin-left: 52em;margin-top: 63px;">
|
4 |
+
<div>
|
5 |
+
<div><h1 style="font-size: 90px;margin-top: -2em;margin-left: 401PX;">403</h1></div>
|
6 |
+
<div><h2 style="font-size: 54px;margin-left: 557px;margin-top: -140px;" >Forbidden</h2></div>
|
7 |
+
<div><h6 style="font-size: 21px;margin-left: 23em;margin-top: 7em;color: red;">Your request was detected as suspicious.<h6></div>
|
8 |
+
<div><h6 style="font-size: 21px;margin-left: 17em;margin-top: -2em;color: red;">Please Contact Your Site Administrator if you feel the request is legitimate.<h6></div>
|
9 |
+
<h6 style="font-size: 21px;margin-left:20em;">For more information please contact miniorange <a href="https://faq.miniorange.com/">FAQ'S</h6>
|
10 |
+
</div>
|
11 |
</div>
|
handler/realtime_ip_block_free.php
CHANGED
@@ -1,52 +1,52 @@
|
|
1 |
-
<?php
|
2 |
-
/**
|
3 |
-
*
|
4 |
-
*/
|
5 |
-
class MO2F_realtime_free
|
6 |
-
{
|
7 |
-
|
8 |
-
function __construct()
|
9 |
-
{
|
10 |
-
add_filter( 'cron_schedules', array($this,'mo_2fa_realtime_blocking_int'));
|
11 |
-
add_action( 'mo2f_realtime_ip_block_free_hook', array($this,'mo2f_realtime_ip_block_free') );
|
12 |
-
|
13 |
-
}
|
14 |
-
function mo2f_realtime_ip_block_free()
|
15 |
-
{
|
16 |
-
global $wpnsDbQueries;
|
17 |
-
$results = $wpnsDbQueries->get_blocked_ips_realtime();
|
18 |
-
|
19 |
-
$ip_addresses = array();
|
20 |
-
$mo2f_added_ips = get_site_option('mo2f_added_ips_realtime');
|
21 |
-
$sizeofResults = sizeof($results);
|
22 |
-
|
23 |
-
$mo2f_added_ips = explode(',', $mo2f_added_ips);
|
24 |
-
|
25 |
-
for($i = 0;$i<$sizeofResults;$i++)
|
26 |
-
{
|
27 |
-
if($results[$i]->ip_address != '::1' and $results[$i]->ip_address != '127.0.0.1' and rest_is_ip_address($results[$i]->ip_address))
|
28 |
-
{
|
29 |
-
if(!in_array($results[$i]->ip_address, $mo2f_added_ips))
|
30 |
-
{
|
31 |
-
array_push($ip_addresses,$results[$i]->ip_address);
|
32 |
-
}
|
33 |
-
}
|
34 |
-
}
|
35 |
-
|
36 |
-
|
37 |
-
add_to_blacklist($ip_addresses,get_site_option('siteurl'));
|
38 |
-
|
39 |
-
}
|
40 |
-
function mo_2fa_realtime_blocking_int()
|
41 |
-
{
|
42 |
-
$mo2f_cron_hours = 7200;
|
43 |
-
$schedules['mo2f_realtime_ipblock_free'] = array(
|
44 |
-
'interval' => $mo2f_cron_hours,
|
45 |
-
'display' => esc_html__( 'Cron Activated' ),
|
46 |
-
);
|
47 |
-
return $schedules;
|
48 |
-
}
|
49 |
-
}
|
50 |
-
new MO2F_realtime_free;
|
51 |
-
|
52 |
?>
|
1 |
+
<?php
|
2 |
+
/**
|
3 |
+
*
|
4 |
+
*/
|
5 |
+
class MO2F_realtime_free
|
6 |
+
{
|
7 |
+
|
8 |
+
function __construct()
|
9 |
+
{
|
10 |
+
add_filter( 'cron_schedules', array($this,'mo_2fa_realtime_blocking_int'));
|
11 |
+
add_action( 'mo2f_realtime_ip_block_free_hook', array($this,'mo2f_realtime_ip_block_free') );
|
12 |
+
|
13 |
+
}
|
14 |
+
function mo2f_realtime_ip_block_free()
|
15 |
+
{
|
16 |
+
global $wpnsDbQueries;
|
17 |
+
$results = $wpnsDbQueries->get_blocked_ips_realtime();
|
18 |
+
|
19 |
+
$ip_addresses = array();
|
20 |
+
$mo2f_added_ips = get_site_option('mo2f_added_ips_realtime');
|
21 |
+
$sizeofResults = sizeof($results);
|
22 |
+
|
23 |
+
$mo2f_added_ips = explode(',', $mo2f_added_ips);
|
24 |
+
|
25 |
+
for($i = 0;$i<$sizeofResults;$i++)
|
26 |
+
{
|
27 |
+
if($results[$i]->ip_address != '::1' and $results[$i]->ip_address != '127.0.0.1' and rest_is_ip_address($results[$i]->ip_address))
|
28 |
+
{
|
29 |
+
if(!in_array($results[$i]->ip_address, $mo2f_added_ips))
|
30 |
+
{
|
31 |
+
array_push($ip_addresses,$results[$i]->ip_address);
|
32 |
+
}
|
33 |
+
}
|
34 |
+
}
|
35 |
+
|
36 |
+
|
37 |
+
add_to_blacklist($ip_addresses,get_site_option('siteurl'));
|
38 |
+
|
39 |
+
}
|
40 |
+
function mo_2fa_realtime_blocking_int()
|
41 |
+
{
|
42 |
+
$mo2f_cron_hours = 7200;
|
43 |
+
$schedules['mo2f_realtime_ipblock_free'] = array(
|
44 |
+
'interval' => $mo2f_cron_hours,
|
45 |
+
'display' => esc_html__( 'Cron Activated' ),
|
46 |
+
);
|
47 |
+
return $schedules;
|
48 |
+
}
|
49 |
+
}
|
50 |
+
new MO2F_realtime_free;
|
51 |
+
|
52 |
?>
|
handler/recaptcha.php
CHANGED
@@ -1,161 +1,161 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
class mo2f_ReCaptcha
|
4 |
-
{
|
5 |
-
function __construct()
|
6 |
-
{
|
7 |
-
add_filter( 'admin_init' , array($this, 'handle_recaptcha' ), 11, 3 );
|
8 |
-
add_action( 'login_form' , array($this, 'custom_login_fields' ) );
|
9 |
-
add_action( 'register_form' , array($this, 'register_with_captcha') );
|
10 |
-
add_action( 'woocommerce_register_form' , array($this, 'woocommerce_register_with_captcha'));
|
11 |
-
add_action( 'woocommerce_login_form', array($this, 'woocommerce_login_with_captcha'));
|
12 |
-
add_action( 'woocommerce_review_order_before_submit', array($this, 'woocommerce_register_with_captcha_checkout'));
|
13 |
-
}
|
14 |
-
|
15 |
-
|
16 |
-
//Function to handle Testing reCaptcha
|
17 |
-
function handle_recaptcha()
|
18 |
-
{
|
19 |
-
global $moWpnsUtility,$mo2f_dirName;
|
20 |
-
if (current_user_can( 'manage_options' ))
|
21 |
-
{
|
22 |
-
if(isset($_REQUEST['option']) && sanitize_text_field($_REQUEST['option'])=='testrecaptchaconfig')
|
23 |
-
{
|
24 |
-
if(array_key_exists('g-recaptcha-response',$_POST))
|
25 |
-
{
|
26 |
-
$userIp = $moWpnsUtility->get_client_ip();
|
27 |
-
$userIp = sanitize_text_field( $userIp );
|
28 |
-
$mocURL = new MocURL;
|
29 |
-
$response = $mocURL->validate_recaptcha($userIp,sanitize_text_field($_POST['g-recaptcha-response']));
|
30 |
-
$content = json_decode($response, true);
|
31 |
-
if(isset($content['error-codes']) && in_array("invalid-input-secret", $content['error-codes']))
|
32 |
-
echo "<br><br><h2 style=color:red;text-align:center>Invalid Secret Key.</h2>";
|
33 |
-
else if(isset($content['success']) && $content['success']==1)
|
34 |
-
echo "<br><br><h2 style=color:green;text-align:center>Test was successful and captcha verified.</h2>";
|
35 |
-
else
|
36 |
-
echo "<br><br><h2 style=color:red;text-align:center>Invalid captcha. Please try again.</h2>";
|
37 |
-
}
|
38 |
-
show_google_recaptcha_form_v2();
|
39 |
-
}
|
40 |
-
|
41 |
-
if(isset($_REQUEST['option']) && sanitize_text_field($_REQUEST['option'])=='testrecaptchaconfig3')
|
42 |
-
{
|
43 |
-
if(array_key_exists('g-recaptcha-response',$_REQUEST))
|
44 |
-
{
|
45 |
-
|
46 |
-
$mocURL = new MocURL;
|
47 |
-
$response = $mocURL->get_Captcha_v3($_REQUEST['g-recaptcha-response']);
|
48 |
-
$content = json_decode($response, true);
|
49 |
-
if(isset($content['error-codes']) && in_array("invalid-input-secret", $content['error-codes']))
|
50 |
-
echo "<br><br><h2 style=color:red;text-align:center>Invalid Secret Key.</h2>";
|
51 |
-
else if(isset($content['success']) && $content['success']==1)
|
52 |
-
{
|
53 |
-
if($content['success'] == 1)
|
54 |
-
{
|
55 |
-
if($content['score']>=0.9)
|
56 |
-
{
|
57 |
-
echo "<br><br><h2 style=color:green;text-align:center>Welcome!</h2>";
|
58 |
-
echo "<h2 style=color:green;text-align:center>Test was successful and captcha verified.</h2>";
|
59 |
-
}
|
60 |
-
else echo "<br><br><h2 style=color:red;text-align:center>Captcha verification failed! Permission denied.</h2>";
|
61 |
-
}
|
62 |
-
}
|
63 |
-
else
|
64 |
-
echo "<br><br><h2 style=color:red;text-align:center>Invalid captcha. Please try again.</h2>";
|
65 |
-
}
|
66 |
-
show_google_recaptcha_form_v3();
|
67 |
-
}
|
68 |
-
}
|
69 |
-
}
|
70 |
-
|
71 |
-
|
72 |
-
function custom_login_fields()
|
73 |
-
{
|
74 |
-
global $moWpnsUtility,$mo2f_dirName;
|
75 |
-
if(get_option('mo_wpns_activate_recaptcha_for_login') && MoWpnsUtility::get_mo2f_db_option('mo2f_login_option', 'get_option'))
|
76 |
-
{
|
77 |
-
if(get_option('mo_wpns_recaptcha_version')=='reCAPTCHA_v3')
|
78 |
-
show_google_recaptcha_form_v3_login();
|
79 |
-
else if(get_option('mo_wpns_recaptcha_version')=='reCAPTCHA_v2')
|
80 |
-
{
|
81 |
-
wp_register_script( 'mo2f_catpcha_js',esc_url(MoWpnsConstants::RECAPTCHA_URL));
|
82 |
-
wp_enqueue_script( 'mo2f_catpcha_js' );
|
83 |
-
|
84 |
-
echo '<div class="g-recaptcha" data-sitekey="'.esc_html(get_option("mo_wpns_recaptcha_site_key")).'"></div>';
|
85 |
-
echo '<style>#login{ width:349px;padding:2% 0 0; }.g-recaptcha{margin-bottom:5%;}#loginform{padding-bottom:20px;}</style>';
|
86 |
-
}
|
87 |
-
}
|
88 |
-
}
|
89 |
-
|
90 |
-
|
91 |
-
function register_with_captcha(){
|
92 |
-
global $moWpnsUtility,$mo2f_dirName;
|
93 |
-
if(get_option('mo_wpns_activate_recaptcha_for_registration'))
|
94 |
-
{
|
95 |
-
if(get_option('mo_wpns_recaptcha_version')=='reCAPTCHA_v3')
|
96 |
-
show_google_recaptcha_form_v3_login();
|
97 |
-
else if(get_option('mo_wpns_recaptcha_version')=='reCAPTCHA_v2')
|
98 |
-
show_google_recaptcha_form_v2_login();
|
99 |
-
}
|
100 |
-
}
|
101 |
-
|
102 |
-
function woocommerce_register_with_captcha(){
|
103 |
-
if(get_option('mo_wpns_activate_recaptcha_for_woocommerce_registration'))
|
104 |
-
{
|
105 |
-
wp_register_script( 'mo2f_catpcha_js',esc_url(MoWpnsConstants::RECAPTCHA_URL));
|
106 |
-
wp_enqueue_script( 'mo2f_catpcha_js' );
|
107 |
-
echo '<div class="g-recaptcha" data-sitekey="'.esc_html(get_option("mo_wpns_recaptcha_site_key")).'"></div>';
|
108 |
-
echo '<style>#login{ width:349px;padding:2% 0 0; }.g-recaptcha{margin-bottom:5%;}#registerform{padding-bottom:20px;}</style>';
|
109 |
-
}
|
110 |
-
}
|
111 |
-
|
112 |
-
function woocommerce_login_with_captcha(){
|
113 |
-
if(get_option('mo_wpns_activate_recaptcha_for_woocommerce_login'))
|
114 |
-
{
|
115 |
-
|
116 |
-
wp_register_script( 'mo2f_catpcha_js',esc_url(MoWpnsConstants::RECAPTCHA_URL));
|
117 |
-
wp_enqueue_script( 'mo2f_catpcha_js' );
|
118 |
-
echo '<div class="g-recaptcha" data-sitekey="'.esc_html(get_option("mo_wpns_recaptcha_site_key")).'"></div>';
|
119 |
-
echo '<style>#login{ width:349px;padding:2% 0 0; }.g-recaptcha{margin-bottom:5%;}#loginform{padding-bottom:20px;}</style>';
|
120 |
-
}
|
121 |
-
}
|
122 |
-
|
123 |
-
function woocommerce_register_with_captcha_checkout(){
|
124 |
-
|
125 |
-
if (!is_user_logged_in()){
|
126 |
-
if(get_option('mo_wpns_activate_recaptcha_for_woocommerce_registration'))
|
127 |
-
{
|
128 |
-
wp_register_script( 'mo2f_catpcha_js',esc_url(MoWpnsConstants::RECAPTCHA_URL));
|
129 |
-
wp_enqueue_script( 'mo2f_catpcha_js' );
|
130 |
-
echo '<div class="g-recaptcha" data-sitekey="'.esc_html(get_option("mo_wpns_recaptcha_site_key")).'"></div>';
|
131 |
-
echo '<style>#login{ width:349px;padding:2% 0 0; }.g-recaptcha{margin-bottom:5%;}#registerform{padding-bottom:20px;}</style>';
|
132 |
-
}
|
133 |
-
}
|
134 |
-
}
|
135 |
-
|
136 |
-
public static function recaptcha_verify($response)
|
137 |
-
{
|
138 |
-
global $moWpnsUtility;
|
139 |
-
$userIp = $moWpnsUtility->get_client_ip();
|
140 |
-
$userIp = sanitize_text_field( $userIp );
|
141 |
-
$mocURL = new MocURL;
|
142 |
-
$response = $mocURL->validate_recaptcha($userIp,$response);
|
143 |
-
$content = json_decode($response, true);
|
144 |
-
$isvalid = isset($content['success']) && $content['success']==1 ? true : false;
|
145 |
-
return $isvalid;
|
146 |
-
}
|
147 |
-
|
148 |
-
public static function recaptcha_verify_3($response)
|
149 |
-
{
|
150 |
-
global $moWpnsUtility;
|
151 |
-
$userIp = $moWpnsUtility->get_client_ip();
|
152 |
-
$userIp = sanitize_text_field( $userIp );
|
153 |
-
$mocURL = new MocURL;
|
154 |
-
$response = $mocURL->get_Captcha_v3($response);
|
155 |
-
$content = json_decode($response, true);
|
156 |
-
$isvalid = isset($content['success']) && $content['success']==1 && $content['score']>=0.9? true : false;
|
157 |
-
return $isvalid;
|
158 |
-
}
|
159 |
-
|
160 |
-
}
|
161 |
-
new mo2f_ReCaptcha;
|
1 |
+
<?php
|
2 |
+
|
3 |
+
class mo2f_ReCaptcha
|
4 |
+
{
|
5 |
+
function __construct()
|
6 |
+
{
|
7 |
+
add_filter( 'admin_init' , array($this, 'handle_recaptcha' ), 11, 3 );
|
8 |
+
add_action( 'login_form' , array($this, 'custom_login_fields' ) );
|
9 |
+
add_action( 'register_form' , array($this, 'register_with_captcha') );
|
10 |
+
add_action( 'woocommerce_register_form' , array($this, 'woocommerce_register_with_captcha'));
|
11 |
+
add_action( 'woocommerce_login_form', array($this, 'woocommerce_login_with_captcha'));
|
12 |
+
add_action( 'woocommerce_review_order_before_submit', array($this, 'woocommerce_register_with_captcha_checkout'));
|
13 |
+
}
|
14 |
+
|
15 |
+
|
16 |
+
//Function to handle Testing reCaptcha
|
17 |
+
function handle_recaptcha()
|
18 |
+
{
|
19 |
+
global $moWpnsUtility,$mo2f_dirName;
|
20 |
+
if (current_user_can( 'manage_options' ))
|
21 |
+
{
|
22 |
+
if(isset($_REQUEST['option']) && sanitize_text_field($_REQUEST['option'])=='testrecaptchaconfig')
|
23 |
+
{
|
24 |
+
if(array_key_exists('g-recaptcha-response',$_POST))
|
25 |
+
{
|
26 |
+
$userIp = $moWpnsUtility->get_client_ip();
|
27 |
+
$userIp = sanitize_text_field( $userIp );
|
28 |
+
$mocURL = new MocURL;
|
29 |
+
$response = $mocURL->validate_recaptcha($userIp,sanitize_text_field($_POST['g-recaptcha-response']));
|
30 |
+
$content = json_decode($response, true);
|
31 |
+
if(isset($content['error-codes']) && in_array("invalid-input-secret", $content['error-codes']))
|
32 |
+
echo "<br><br><h2 style=color:red;text-align:center>Invalid Secret Key.</h2>";
|
33 |
+
else if(isset($content['success']) && $content['success']==1)
|
34 |
+
echo "<br><br><h2 style=color:green;text-align:center>Test was successful and captcha verified.</h2>";
|
35 |
+
else
|
36 |
+
echo "<br><br><h2 style=color:red;text-align:center>Invalid captcha. Please try again.</h2>";
|
37 |
+
}
|
38 |
+
show_google_recaptcha_form_v2();
|
39 |
+
}
|
40 |
+
|
41 |
+
if(isset($_REQUEST['option']) && sanitize_text_field($_REQUEST['option'])=='testrecaptchaconfig3')
|
42 |
+
{
|
43 |
+
if(array_key_exists('g-recaptcha-response',$_REQUEST))
|
44 |
+
{
|
45 |
+
|
46 |
+
$mocURL = new MocURL;
|
47 |
+
$response = $mocURL->get_Captcha_v3($_REQUEST['g-recaptcha-response']);
|
48 |
+
$content = json_decode($response, true);
|
49 |
+
if(isset($content['error-codes']) && in_array("invalid-input-secret", $content['error-codes']))
|
50 |
+
echo "<br><br><h2 style=color:red;text-align:center>Invalid Secret Key.</h2>";
|
51 |
+
else if(isset($content['success']) && $content['success']==1)
|
52 |
+
{
|
53 |
+
if($content['success'] == 1)
|
54 |
+
{
|
55 |
+
if($content['score']>=0.9)
|
56 |
+
{
|
57 |
+
echo "<br><br><h2 style=color:green;text-align:center>Welcome!</h2>";
|
58 |
+
echo "<h2 style=color:green;text-align:center>Test was successful and captcha verified.</h2>";
|
59 |
+
}
|
60 |
+
else echo "<br><br><h2 style=color:red;text-align:center>Captcha verification failed! Permission denied.</h2>";
|
61 |
+
}
|
62 |
+
}
|
63 |
+
else
|
64 |
+
echo "<br><br><h2 style=color:red;text-align:center>Invalid captcha. Please try again.</h2>";
|
65 |
+
}
|
66 |
+
show_google_recaptcha_form_v3();
|
67 |
+
}
|
68 |
+
}
|
69 |
+
}
|
70 |
+
|
71 |
+
|
72 |
+
function custom_login_fields()
|
73 |
+
{
|
74 |
+
global $moWpnsUtility,$mo2f_dirName;
|
75 |
+
if(get_option('mo_wpns_activate_recaptcha_for_login') && MoWpnsUtility::get_mo2f_db_option('mo2f_login_option', 'get_option'))
|
76 |
+
{
|
77 |
+
if(get_option('mo_wpns_recaptcha_version')=='reCAPTCHA_v3')
|
78 |
+
show_google_recaptcha_form_v3_login();
|
79 |
+
else if(get_option('mo_wpns_recaptcha_version')=='reCAPTCHA_v2')
|
80 |
+
{
|
81 |
+
wp_register_script( 'mo2f_catpcha_js',esc_url(MoWpnsConstants::RECAPTCHA_URL));
|
82 |
+
wp_enqueue_script( 'mo2f_catpcha_js' );
|
83 |
+
|
84 |
+
echo '<div class="g-recaptcha" data-sitekey="'.esc_html(get_option("mo_wpns_recaptcha_site_key")).'"></div>';
|
85 |
+
echo '<style>#login{ width:349px;padding:2% 0 0; }.g-recaptcha{margin-bottom:5%;}#loginform{padding-bottom:20px;}</style>';
|
86 |
+
}
|
87 |
+
}
|
88 |
+
}
|
89 |
+
|
90 |
+
|
91 |
+
function register_with_captcha(){
|
92 |
+
global $moWpnsUtility,$mo2f_dirName;
|
93 |
+
if(get_option('mo_wpns_activate_recaptcha_for_registration'))
|
94 |
+
{
|
95 |
+
if(get_option('mo_wpns_recaptcha_version')=='reCAPTCHA_v3')
|
96 |
+
show_google_recaptcha_form_v3_login();
|
97 |
+
else if(get_option('mo_wpns_recaptcha_version')=='reCAPTCHA_v2')
|
98 |
+
show_google_recaptcha_form_v2_login();
|
99 |
+
}
|
100 |
+
}
|
101 |
+
|
102 |
+
function woocommerce_register_with_captcha(){
|
103 |
+
if(get_option('mo_wpns_activate_recaptcha_for_woocommerce_registration'))
|
104 |
+
{
|
105 |
+
wp_register_script( 'mo2f_catpcha_js',esc_url(MoWpnsConstants::RECAPTCHA_URL));
|
106 |
+
wp_enqueue_script( 'mo2f_catpcha_js' );
|
107 |
+
echo '<div class="g-recaptcha" data-sitekey="'.esc_html(get_option("mo_wpns_recaptcha_site_key")).'"></div>';
|
108 |
+
echo '<style>#login{ width:349px;padding:2% 0 0; }.g-recaptcha{margin-bottom:5%;}#registerform{padding-bottom:20px;}</style>';
|
109 |
+
}
|
110 |
+
}
|
111 |
+
|
112 |
+
function woocommerce_login_with_captcha(){
|
113 |
+
if(get_option('mo_wpns_activate_recaptcha_for_woocommerce_login'))
|
114 |
+
{
|
115 |
+
|
116 |
+
wp_register_script( 'mo2f_catpcha_js',esc_url(MoWpnsConstants::RECAPTCHA_URL));
|
117 |
+
wp_enqueue_script( 'mo2f_catpcha_js' );
|
118 |
+
echo '<div class="g-recaptcha" data-sitekey="'.esc_html(get_option("mo_wpns_recaptcha_site_key")).'"></div>';
|
119 |
+
echo '<style>#login{ width:349px;padding:2% 0 0; }.g-recaptcha{margin-bottom:5%;}#loginform{padding-bottom:20px;}</style>';
|
120 |
+
}
|
121 |
+
}
|
122 |
+
|
123 |
+
function woocommerce_register_with_captcha_checkout(){
|
124 |
+
|
125 |
+
if (!is_user_logged_in()){
|
126 |
+
if(get_option('mo_wpns_activate_recaptcha_for_woocommerce_registration'))
|
127 |
+
{
|
128 |
+
wp_register_script( 'mo2f_catpcha_js',esc_url(MoWpnsConstants::RECAPTCHA_URL));
|
129 |
+
wp_enqueue_script( 'mo2f_catpcha_js' );
|
130 |
+
echo '<div class="g-recaptcha" data-sitekey="'.esc_html(get_option("mo_wpns_recaptcha_site_key")).'"></div>';
|
131 |
+
echo '<style>#login{ width:349px;padding:2% 0 0; }.g-recaptcha{margin-bottom:5%;}#registerform{padding-bottom:20px;}</style>';
|
132 |
+
}
|
133 |
+
}
|
134 |
+
}
|
135 |
+
|
136 |
+
public static function recaptcha_verify($response)
|
137 |
+
{
|
138 |
+
global $moWpnsUtility;
|
139 |
+
$userIp = $moWpnsUtility->get_client_ip();
|
140 |
+
$userIp = sanitize_text_field( $userIp );
|
141 |
+
$mocURL = new MocURL;
|
142 |
+
$response = $mocURL->validate_recaptcha($userIp,$response);
|
143 |
+
$content = json_decode($response, true);
|
144 |
+
$isvalid = isset($content['success']) && $content['success']==1 ? true : false;
|
145 |
+
return $isvalid;
|
146 |
+
}
|
147 |
+
|
148 |
+
public static function recaptcha_verify_3($response)
|
149 |
+
{
|
150 |
+
global $moWpnsUtility;
|
151 |
+
$userIp = $moWpnsUtility->get_client_ip();
|
152 |
+
$userIp = sanitize_text_field( $userIp );
|
153 |
+
$mocURL = new MocURL;
|
154 |
+
$response = $mocURL->get_Captcha_v3($response);
|
155 |
+
$content = json_decode($response, true);
|
156 |
+
$isvalid = isset($content['success']) && $content['success']==1 && $content['score']>=0.9? true : false;
|
157 |
+
return $isvalid;
|
158 |
+
}
|
159 |
+
|
160 |
+
}
|
161 |
+
new mo2f_ReCaptcha;
|
handler/registration.php
CHANGED
@@ -1,73 +1,73 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
|
4 |
-
class RegistrationHandler
|
5 |
-
{
|
6 |
-
function __construct()
|
7 |
-
{
|
8 |
-
add_filter( 'registration_errors' , array($this, 'mo_wpns_registration_validations' ), 10, 3 );
|
9 |
-
if(get_site_option('mo2f_custom_form_name')=='#wordpress-register')
|
10 |
-
add_action( 'register_form', array($this, 'mo2f_wp_verification' ) );
|
11 |
-
}
|
12 |
-
|
13 |
-
function mo2f_wp_verification()
|
14 |
-
{
|
15 |
-
global $mainDir;
|
16 |
-
$submitSelector = '#wp-submit';
|
17 |
-
$formName = '#registerform';
|
18 |
-
$emailField = '#user_email';
|
19 |
-
$authType = get_site_option('mo2f_custom_auth_type');
|
20 |
-
$phoneSelector = get_site_option('mo2f_custom_phone_selector');
|
21 |
-
if(get_site_option('mo2f_customerkey') > 0)
|
22 |
-
$isRegistered = get_site_option('mo2f_customerkey');
|
23 |
-
else $isRegistered = 'false';
|
24 |
-
$javaScript = 'includes/js/custom-form.js';
|
25 |
-
wp_enqueue_style( 'mo2f_intl_tel_style', $mainDir.'includes/css/phone.css');
|
26 |
-
wp_enqueue_script( 'mo2f_intl_tel_script',$mainDir.'includes/js/phone.js');
|
27 |
-
wp_register_script('mo2f_otpVerification',$mainDir.$javaScript);
|
28 |
-
wp_localize_script('mo2f_otpVerification', 'otpverificationObj',
|
29 |
-
array('siteURL'=> admin_url( 'admin-ajax.php'),
|
30 |
-
'nonce'=>wp_create_nonce('ajax-nonce'),
|
31 |
-
'authType'=>$authType,
|
32 |
-
'submitSelector'=>$submitSelector,
|
33 |
-
'formname'=>$formName,
|
34 |
-
'emailselector'=>$emailField,
|
35 |
-
'isRegistered' => $isRegistered,
|
36 |
-
'phoneSelector' => $phoneSelector,
|
37 |
-
'loaderUrl' => plugin_dir_url(__FILE__).'includes/images/loader.gif',
|
38 |
-
'isEnabledShortcode' => get_site_option('enable_form_shortcode')));
|
39 |
-
wp_enqueue_script('mo2f_otpVerification');
|
40 |
-
}
|
41 |
-
|
42 |
-
function mo_wpns_registration_validations( $errors, $sanitized_user_login, $user_email )
|
43 |
-
{
|
44 |
-
|
45 |
-
global $moWpnsUtility;
|
46 |
-
if(get_option('mo_wpns_activate_recaptcha_for_registration')){
|
47 |
-
if(get_option('mo_wpns_recaptcha_version')=='reCAPTCHA_v3')
|
48 |
-
$recaptchaError = $moWpnsUtility->verify_recaptcha_3(sanitize_text_field($_POST['g-recaptcha-response']));
|
49 |
-
else if(get_option('mo_wpns_recaptcha_version')=='reCAPTCHA_v2')
|
50 |
-
$recaptchaError = $moWpnsUtility->verify_recaptcha(sanitize_text_field($_POST['g-recaptcha-response']));
|
51 |
-
if(!empty($recaptchaError->errors))
|
52 |
-
$errors = $recaptchaError;
|
53 |
-
}
|
54 |
-
if(get_site_option('mo_wpns_enable_fake_domain_blocking')){
|
55 |
-
if($moWpnsUtility->check_if_valid_email($user_email) && empty($recaptchaError->errors))
|
56 |
-
$errors->add( 'blocked_email_error', __( '<strong>ERROR</strong>: Your email address is not allowed to register. Please select different email address.') );
|
57 |
-
else if(!empty($recaptchaError->errors))
|
58 |
-
$errors = $recaptchaError;
|
59 |
-
|
60 |
-
}
|
61 |
-
else{
|
62 |
-
$count= get_site_option('number_of_fake_reg');
|
63 |
-
if($moWpnsUtility->check_if_valid_email($user_email) && empty($recaptchaError->errors))
|
64 |
-
{
|
65 |
-
$count = $count + 1;
|
66 |
-
update_site_option('number_of_fake_reg' ,$count );
|
67 |
-
}
|
68 |
-
}
|
69 |
-
return $errors;
|
70 |
-
}
|
71 |
-
|
72 |
-
}
|
73 |
new RegistrationHandler;
|
1 |
+
<?php
|
2 |
+
|
3 |
+
|
4 |
+
class RegistrationHandler
|
5 |
+
{
|
6 |
+
function __construct()
|
7 |
+
{
|
8 |
+
add_filter( 'registration_errors' , array($this, 'mo_wpns_registration_validations' ), 10, 3 );
|
9 |
+
if(get_site_option('mo2f_custom_form_name')=='#wordpress-register')
|
10 |
+
add_action( 'register_form', array($this, 'mo2f_wp_verification' ) );
|
11 |
+
}
|
12 |
+
|
13 |
+
function mo2f_wp_verification()
|
14 |
+
{
|
15 |
+
global $mainDir;
|
16 |
+
$submitSelector = '#wp-submit';
|
17 |
+
$formName = '#registerform';
|
18 |
+
$emailField = '#user_email';
|
19 |
+
$authType = get_site_option('mo2f_custom_auth_type');
|
20 |
+
$phoneSelector = get_site_option('mo2f_custom_phone_selector');
|
21 |
+
if(get_site_option('mo2f_customerkey') > 0)
|
22 |
+
$isRegistered = get_site_option('mo2f_customerkey');
|
23 |
+
else $isRegistered = 'false';
|
24 |
+
$javaScript = 'includes/js/custom-form.js';
|
25 |
+
wp_enqueue_style( 'mo2f_intl_tel_style', $mainDir.'includes/css/phone.css');
|
26 |
+
wp_enqueue_script( 'mo2f_intl_tel_script',$mainDir.'includes/js/phone.js');
|
27 |
+
wp_register_script('mo2f_otpVerification',$mainDir.$javaScript);
|
28 |
+
wp_localize_script('mo2f_otpVerification', 'otpverificationObj',
|
29 |
+
array('siteURL'=> admin_url( 'admin-ajax.php'),
|
30 |
+
'nonce'=>wp_create_nonce('ajax-nonce'),
|
31 |
+
'authType'=>$authType,
|
32 |
+
'submitSelector'=>$submitSelector,
|
33 |
+
'formname'=>$formName,
|
34 |
+
'emailselector'=>$emailField,
|
35 |
+
'isRegistered' => $isRegistered,
|
36 |
+
'phoneSelector' => $phoneSelector,
|
37 |
+
'loaderUrl' => plugin_dir_url(__FILE__).'includes/images/loader.gif',
|
38 |
+
'isEnabledShortcode' => get_site_option('enable_form_shortcode')));
|
39 |
+
wp_enqueue_script('mo2f_otpVerification');
|
40 |
+
}
|
41 |
+
|
42 |
+
function mo_wpns_registration_validations( $errors, $sanitized_user_login, $user_email )
|
43 |
+
{
|
44 |
+
|
45 |
+
global $moWpnsUtility;
|
46 |
+
if(get_option('mo_wpns_activate_recaptcha_for_registration')){
|
47 |
+
if(get_option('mo_wpns_recaptcha_version')=='reCAPTCHA_v3')
|
48 |
+
$recaptchaError = $moWpnsUtility->verify_recaptcha_3(sanitize_text_field($_POST['g-recaptcha-response']));
|
49 |
+
else if(get_option('mo_wpns_recaptcha_version')=='reCAPTCHA_v2')
|
50 |
+
$recaptchaError = $moWpnsUtility->verify_recaptcha(sanitize_text_field($_POST['g-recaptcha-response']));
|
51 |
+
if(!empty($recaptchaError->errors))
|
52 |
+
$errors = $recaptchaError;
|
53 |
+
}
|
54 |
+
if(get_site_option('mo_wpns_enable_fake_domain_blocking')){
|
55 |
+
if($moWpnsUtility->check_if_valid_email($user_email) && empty($recaptchaError->errors))
|
56 |
+
$errors->add( 'blocked_email_error', __( '<strong>ERROR</strong>: Your email address is not allowed to register. Please select different email address.') );
|
57 |
+
else if(!empty($recaptchaError->errors))
|
58 |
+
$errors = $recaptchaError;
|
59 |
+
|
60 |
+
}
|
61 |
+
else{
|
62 |
+
$count= get_site_option('number_of_fake_reg');
|
63 |
+
if($moWpnsUtility->check_if_valid_email($user_email) && empty($recaptchaError->errors))
|
64 |
+
{
|
65 |
+
$count = $count + 1;
|
66 |
+
update_site_option('number_of_fake_reg' ,$count );
|
67 |
+
}
|
68 |
+
}
|
69 |
+
return $errors;
|
70 |
+
}
|
71 |
+
|
72 |
+
}
|
73 |
new RegistrationHandler;
|
handler/security_features.php
CHANGED
@@ -1,47 +1,47 @@
|
|
1 |
-
<?php
|
2 |
-
class Mo_2fa_security_features
|
3 |
-
{
|
4 |
-
function wpns_2fa_features_only()
|
5 |
-
{
|
6 |
-
update_option( 'mo_wpns_2fa_with_network_security', 0);
|
7 |
-
update_option( 'mo_wpns_2fa_with_network_security_popup_visible', 0);
|
8 |
-
?><script>window.location.href="admin.php?page=mo_2fa_two_fa";</script><?php
|
9 |
-
|
10 |
-
}
|
11 |
-
|
12 |
-
function wpns_2fa_with_network_security($postvalue)
|
13 |
-
{
|
14 |
-
$nonce= sanitize_text_field(wp_unslash($_POST['mo_security_features_nonce']));
|
15 |
-
|
16 |
-
if ( wp_verify_nonce( $nonce, 'mo_2fa_security_features_nonce' ) )
|
17 |
-
{
|
18 |
-
$enable_newtwork_security_features = isset($postvalue['mo_wpns_2fa_with_network_security']) ? true : false;
|
19 |
-
|
20 |
-
update_option( 'mo_wpns_2fa_with_network_security', $enable_newtwork_security_features);
|
21 |
-
|
22 |
-
if ($enable_newtwork_security_features)
|
23 |
-
{
|
24 |
-
$mo2f_enable_all_enable = new Mo2f_ajax_dashboard();
|
25 |
-
$mo2f_enable_all_enable -> mo2f_handle_all_enable(1);
|
26 |
-
}
|
27 |
-
|
28 |
-
|
29 |
-
|
30 |
-
update_option( 'mo_wpns_2fa_with_network_security_popup_visible', 0);
|
31 |
-
if(MoWpnsUtility::get_mo2f_db_option('mo_wpns_2fa_with_network_security', 'get_option'))
|
32 |
-
{
|
33 |
-
?><script>window.location.href="admin.php?page=mo_2fa_dashboard";</script><?php
|
34 |
-
}
|
35 |
-
else
|
36 |
-
{
|
37 |
-
?><script>window.location.href="admin.php?page=mo_2fa_two_fa";</script><?php
|
38 |
-
}
|
39 |
-
|
40 |
-
|
41 |
-
}
|
42 |
-
else
|
43 |
-
do_action('wpns_show_message',MoWpnsMessages::showMessage('NONCE_ERROR'),'ERROR');
|
44 |
-
|
45 |
-
}
|
46 |
-
}new Mo_2fa_security_features;
|
47 |
-
?>
|
1 |
+
<?php
|
2 |
+
class Mo_2fa_security_features
|
3 |
+
{
|
4 |
+
function wpns_2fa_features_only()
|
5 |
+
{
|
6 |
+
update_option( 'mo_wpns_2fa_with_network_security', 0);
|
7 |
+
update_option( 'mo_wpns_2fa_with_network_security_popup_visible', 0);
|
8 |
+
?><script>window.location.href="admin.php?page=mo_2fa_two_fa";</script><?php
|
9 |
+
|
10 |
+
}
|
11 |
+
|
12 |
+
function wpns_2fa_with_network_security($postvalue)
|
13 |
+
{
|
14 |
+
$nonce= sanitize_text_field(wp_unslash($_POST['mo_security_features_nonce']));
|
15 |
+
|
16 |
+
if ( wp_verify_nonce( $nonce, 'mo_2fa_security_features_nonce' ) )
|
17 |
+
{
|
18 |
+
$enable_newtwork_security_features = isset($postvalue['mo_wpns_2fa_with_network_security']) ? true : false;
|
19 |
+
|
20 |
+
update_option( 'mo_wpns_2fa_with_network_security', $enable_newtwork_security_features);
|
21 |
+
|
22 |
+
if ($enable_newtwork_security_features)
|
23 |
+
{
|
24 |
+
$mo2f_enable_all_enable = new Mo2f_ajax_dashboard();
|
25 |
+
$mo2f_enable_all_enable -> mo2f_handle_all_enable(1);
|
26 |
+
}
|
27 |
+
|
28 |
+
|
29 |
+
|
30 |
+
update_option( 'mo_wpns_2fa_with_network_security_popup_visible', 0);
|
31 |
+
if(MoWpnsUtility::get_mo2f_db_option('mo_wpns_2fa_with_network_security', 'get_option'))
|
32 |
+
{
|
33 |
+
?><script>window.location.href="admin.php?page=mo_2fa_dashboard";</script><?php
|
34 |
+
}
|
35 |
+
else
|
36 |
+
{
|
37 |
+
?><script>window.location.href="admin.php?page=mo_2fa_two_fa";</script><?php
|
38 |
+
}
|
39 |
+
|
40 |
+
|
41 |
+
}
|
42 |
+
else
|
43 |
+
do_action('wpns_show_message',MoWpnsMessages::showMessage('NONCE_ERROR'),'ERROR');
|
44 |
+
|
45 |
+
}
|
46 |
+
}new Mo_2fa_security_features;
|
47 |
+
?>
|
handler/signature/APLFI.php
CHANGED
@@ -1,5 +1,5 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
$regex['LFI'][1] = array( "#(?i)(?:\x5c|(?:%(?:c(?:0%(?:[2aq]f|5c|9v)|1%(?:[19p]c|8s|af))|2(?:5(?:c(?:0%25af|1%259c)|2f|5c)|%46|f)|(?:(?:f(?:8%8)?0%8|e)0%80%a|bg%q)f|%3(?:2(?:%(?:%6|4)6|F)|5%%63)|u(?:221[56]|002f|EFC8|F025)|1u|5c)|0x(?:2f|5c)|\/))(?:%(?:(?:f(?:(?:c%80|8)%8)?0%8|e)0%80%ae|2(?:(?:5(?:c0%25a|2))?e|%45)|u(?:(?:002|ff0)e|2024)|%32(?:%(?:%6|4)5|E)|c0(?:%[256aef]e|\.))|\.(?:%0[01]|\?)?|\?\.?|0x2e){2}(?:\x5c|(?:%(?:c(?:0%(?:[2aq]f|5c|9v)|1%(?:[19p]c|8s|af))|2(?:5(?:c(?:0%25af|1%259c)|2f|5c)|%46|f)|(?:(?:f(?:8%8)?0%8|e)0%80%a|bg%q)f|%3(?:2(?:%(?:%6|4)6|F)|5%%63)|u(?:221[56]|002f|EFC8|F025)|1u|5c)|0x(?:2f|5c)|\/))#" , "# (?:^|[\\/])\.\.(?:[\\/]|$)#","#(?:etc/(?:s(?:e(?:curity/(?:(?:(?:namespac|tim)e|sepermit|access).conf|l(?:imits(?:.conf)?|astlog)|(?:failedlogi|enviro)n|pa(?:m_env.conf|sswd)|group(?:.conf)?|opasswd|user)|nsors3?.conf)|ys(?:c(?:tl(?:.d/(?:10-(?:(?:network|process)-security|console-messages)|wine.sysctl))?.conf|onfig/network-scripts/ifcfg-eth0)|log.conf)|quirrelmail/(?:(?:config(?:_(?:default|local)|/config)?|sqspell_config|filters_setup|index).php|(?:default_pre|apache.con)f)|amba/(?:s(?:mb(?:.conf(?:.user)?|passwd|users)|amba.conf)|private/smbpasswd|dhcp.conf|netlogon)|(?:w-cp-server/applications.d/(?:00-sso-cpserver|plesk)|tunnel/stunnel).conf|u(?:bversion/config|se-release|doers)|s(?:o/sso_config.ini|h/sshd_config)|m(?:b(?:passwd|.conf)|i.conf)|lackware-release|hadow[-~]?)|a(?:p(?:ache(?:2(?:/(?:(?:mods-(?:available/(?:m(?:em_cach|im)e|s(?:etenvif|sl)|d(?:eflate|ir)|autoindex|proxy)|enabled/(?:(?:statu|alia)s|d(?:eflate|ir)|negotiation|mime|php5))|(?:apache|httpd)2?|default-server|ports).conf|s(?:ites-(?:available/default(?:-ssl)?|enabled/(?:000-)?default)|sl-global.conf)|conf(?:.d/(?:phpmyadmin.conf|security|charset)|/httpd.conf)|vhosts.d/(?:00_default_vhost.conf|default_vhost.include)|envvars)|2(?:/conf)?/httpd.conf)|/(?:a(?:ccess|pache)|(?:conf/)?httpd|default-server).conf)|t/apt.conf)|(?:vahi/avahi-daemon|dduser).conf|lias)|p(?:hp(?:(?:(?:(?:4(?:/(?:apache2?|cgi)|.4/fcgi)|5/(?:apache2?|cgi))/|/(?:(?:apache2?|cgi)/|(?:php4/)?))php)?.ini|myadmin/config.inc.php)|u(?:re(?:-ftpd(?:/pure(?:-ftpd.(?:conf|pdb)|ftpd.pdb)|.conf)|ftpd.p(?:asswd|db))|lse/client.conf)|ro(?:f(?:tp(?:d/modules)?.conf|ile)|tpd/proftpd.conf)|a(?:ssw(?:ord.master|d[-~]?)|m.(?:d/proftpd|conf))|ostgresql/p(?:ostgresql|g_hba).conf)|m(?:o(?:no/(?:(?:2.0/(?:machine|web)|1.0/machine).)?config|d(?:probe.d/vmware-tools.conf|ules)|td)|(?:y(?:sql/(?:conf.d/old_passwords|my))?.c|iredo(?:/miredo)?(?:-server)?.co)nf|uddleftpd(?:/(?:mud(?:dleftpd.(?:passwd|conf)|log(?:d.conf)?)|passwd)|.com)|a(?:n(?:drake-release|path.config)|il/sendmail.conf)|t(?:ools.conf|ab))|h(?:ttp(?:d(?:/(?:conf(?:.d(?:/(?:squirrelmail|php).conf)?|/(?:apache2?|httpd).conf)?|(?:extra/httpd-ssl|apache2?|mod_php|httpd).conf|logs/(?:access.)log|php.ini)|.conf)|(?:/conf)?/httpd.conf)|ost(?:s(?:.(?:allow|deny))?|.conf|name)|dparm.conf)|c(?:ups/(?:(?:p(?:rinter|dftop)s|acroread).conf|cupsd.conf(?:.default)?)|(?:lamav/(?:freshclam|clamd)|vs-(?:pserver|cron)).conf|a(?:-certificates.conf(?:.dpkg-old)?|sper.conf)|h(?:krootkit.conf|rootusers)|r(?:ypt|on)tab)|w(?:icd/(?:(?:wire(?:less|d)|manager)-settings.conf|dhclient.conf.template.default)|u-ftpd/ftp(?:acces|host|user)s|ebmin/miniserv.(?:users|conf))|v(?:mware-tools/(?:(?:vmware-tools-libraries|tpvmlp).conf|config)|sftpd(?:.c(?:hroot_list|onf)|/vsftpd.conf)|hcs2/proftpd/proftpd.conf)|l(?:og(?:rotate.(?:d/(?:vsftpd.log|proftpd|ftp)|conf)|in.defs)|(?:ighttpd/lighthttpd|d(?:ap/ldap|.so)|trace).conf)|r(?:e(?:solv(?:conf/update-libc.d/sendmail|.conf)|d(?:is(?:-sentinel)?.conf|hat-release))|c.(?:d/rc.httpd|conf))|d(?:e(?:b(?:ian_version|conf.conf)|fault/grub|luser.conf)|(?:hcp(?:3/dhc(?:lient|pd)|/dhclient)|ns2tcpd).conf)|f(?:tp(?:(?:host|user)s|chroot)|(?:oremost|use).conf|edora-release|irewall.rules|stab)|b(?:luetooth/(?:network|rfcomm|input|main).conf|ash(?:_completion.d/debconf|.bashrc))|x11/xorg.conf(?:.(?:beforevmwaretoolsinstall|orig)|-v(?:mware|esa))?|i(?:n(?:it(?:tab|.d|/)|etd.conf)|pfw.(?:rules|conf)|ssue(?:.net)?)|t(?:i(?:nyproxy/tinyproxy.conf|mezone)|(?:or/tor-t)?socks.conf)|o(?:s(?:xhttpd/osxhttpd.conf|-release)|penldap/ldap.conf)|u(?:pdatedb.conf(?:.beforevmwaretoolsinstall)?|tmp)|n(?:e(?:wsyslog.conf|twork[/s])|ginx/nginx.conf)|e(?:(?:sound/esd|2fsck|tter).conf|xports)|k(?:ernel-(?:im|pk)g.conf|bd/config)|group-?)|usr(?:/(?:l(?:ocal/(?:p(?:hp(?:4/(?:apache(?:2.conf(?:.php)?|.conf(?:.php)?)|httpd.conf(?:.php)?|lib/php.ini)|5/(?:apache(?:2.conf(?:.php)?|.conf(?:.php)?)|httpd.conf(?:.php)?|lib/php.ini)|/(?:apache(?:2.conf(?:.php)?|.conf(?:.php)?)|httpd.conf(?:.php)?|lib/php.ini))|sa/admin/(?:htdocs/domains/databases/phpmyadmin/libraries/config.default.php|conf/(?:site_isolation_settings|php).ini|logs/(?:httpsd_access_|panel.)log)|gsql/(?:data/p(?:ostgresql.(?:conf|log)|g_(?:hba.conf|log)|asswd)|bin/pg_passwd)|ureftpd/(?:etc/pure(?:-ftpd.conf|ftpd.pdb)|sbin/pure-config.pl))|ap(?:ache(?:2(?:/(?:(?:conf/(?:(?:extra/httpd-)?ssl|vhosts(?:-custom)?|apache2?|modsec|httpd)|apache2?|httpd).conf|logs/(?:a(?:ccess.|udit_))?log)|2(?:/conf)?/httpd.conf)|/(?:conf/(?:(?:a(?:pache2?|ccess)|vhosts(?:-custom)?|modsec).conf|httpd.conf(?:.default)?|php.ini)|logs/(?:a(?:ccess.|udit_))?log|(?:apache2?|httpd).conf)|1.3/conf/httpd.conf)|ps/apache(?:2?2)?/conf/httpd.conf)|jakarta/(?:tomcat/(?:conf/(?:(?:logging|workers).properties|(?:context|server).xml|jakarta.conf)|logs/(?:catalina.(?:err|out)|mod_jk.log))|dist/tomcat/(?:conf/(?:(?:logging|workers).properties|(?:context|server).xml|jakarta.conf)|logs/mod_jk.log))|etc/(?:(?:(?:apache(?:2(?:/(?:(?:conf/)?httpd|vhosts)|2(?:/conf)?/httpd)|/(?:(?:conf/)?httpd|vhosts))|nginx/nginx|smb).|httpd/(?:conf/httpd.)?)conf|p(?:ure(?:-ftpd.conf|ftpd.pdb)|hp.ini)|webmin/miniserv.(?:users|conf)|lighttpd.conf(?:.new)?)|l(?:i(?:ghttpd/(?:log/(?:lighttpd.error|access).log|conf/lighttpd.conf)|b/php.ini)|sws/(?:conf/httpd_conf.xml|logs/error.log)|ogs/(?:access|samba).log)|mysql/data/mysql(?:-(?:bin.(?:index|log)|slow.log)|.(?:err|log)|derror.log)|s(?:amba/lib/(?:smb.conf|log).user|quirrelmail/www/readme|b/config)|cpanel/logs/(?:l(?:icense|ogin)|(?:acces|stat)s|error)_log|ze(?:us/web/(?:global.cfg|log/errors)|nd/etc/php.ini)|(?:httpd/conf/httpd|nginx/conf/nginx).conf)|ib/(?:security/mkuser.default|(?:php/)?php.ini|cron/log))|s(?:hare/(?:tomcat(?:6/(?:conf/(?:(?:logging|workers).properties|(?:context|server).xml)|logs/catalina.(?:err|out))|/logs/catalina.(?:err|out))|squirrelmail/(?:plugins/squirrel_logger/setup|config/config).php|logs/catalina.(?:err|out)|adduser/adduser.conf)|bin/(?:mud(?:passw|log)d|pure-config.pl)|pool/(?:mqueue/sys|lp/)log)|p(?:orts/(?:contrib/pure-ftpd/pure(?:ftpd.p(?:asswd|db)|-ftpd.conf)|ftp/pure-ftpd/pure(?:ftpd.p(?:asswd|db)|-ftpd.conf)|net/pure-ftpd/pure(?:ftpd.p(?:asswd|db)|-ftpd.conf))|kg(?:src/net/pureftpd/pure(?:ftpd.p(?:asswd|db)|-ftpd.conf)|/etc/httpd/httpd(?:-(?:default|vhosts))?.conf))|home/user/(?:var/log/(?:lighttpd.error|apache).log|lighttpd/lighttpd.conf)|internet/pgsql/data/p(?:ostmaster.log|g_hba.conf)|(?:apache2?/conf/ht|etc/pure-f)tpd.conf)|\/local\/(?:[jboss]\/server\/default\/(?:conf\/(?:s(?:tandardj(?:bos|aw)s.xml|erver.log.properties)|j(?:boss-(?:minimal|service).xml|ndi.properties)|log(?:in-config|4j).xml)|deploy\/jboss-logging.xml|log\/(?:server|boot).log)|mysql\/data\/\{host\}.err))|v(?:ar(?:/(?:l(?:o(?:g(?:/(?:p(?:(?:o(?:stgres(?:ql(?:/(?:postgres(?:ql(?:-(?:8.[134]|9.[01])-main)?)?|main))?|/p(?:g_backup|ostgres)).|p)|(?:ure(?:-ftpd/pure-)?ftpd|m-powersave).|gsql(?:(?:/pgsql|8).|_))log|roftpd(?:.(?:access_|xfer)log|/xferlog.legacy)?)|(?:(?:v(?:mware/hostd(?:-1)?|sftpd)|cron/var/log/postgres|webmin/miniserv|boot).|a(?:pache(?:2/(?:(?:access|error).)|/(?:access.))|ccess.|uth.?)|e(?:xim[/_](?:reject|panic|main)|rror.)|httpd/(?:access.)|x(?:org.0.|fer))log|m(?:ysql(?:/(?:mysql(?:-(?:bin.(?:index|log)|slow.log)|.log)|data/mysql-bin.index)|.(?:err|log)|-bin.index|derror.log)|ail(?:.(?:info|warn|err|log)|log)|uddleftpd(?:.conf)?|essages(?:.1)?)|n(?:ews(?:/(?:news.(?:notice|crit|all|err)|suck.(?:notice|err))|.all)|ginx(?:.(?:access|error)_|/(?:access.))log)|s(?:(?:(?:quirrelmail|so/sso).|w-cp-server/error_)log|amba(?:/log.[ns]mbd|.log[12]?)|yslog(?:.1)?)|l(?:ighttpd(?:/(?:(?:access|error)(?:.www)?.log)?|.(?:access|error).log)|og.smb)|da(?:ta/mysql-bin.index|emon.log(?:.1)?)|ftp(?:-proxy(?:/ftp-proxy.log)?|log)|ipfw(?:.(?:today|log)|/ipfw.log)?|u(?:ser.log(?:.1)?|fw.log)|tomcat6/catalina.out|kern.log(?:.1)?)|s/access.log)|cal/www/conf/php.ini)|i(?:b/(?:(?:pgsql/data/postgresql.co|mysql/my.c)nf|squirrelmail/prefs/squirrelmail.log)|ghttpd.log)|p/logs/(?:lp(?:sched|net)|requests))|a(?:dm/(?:l(?:og(?:/(?:asppp.|xfer)|in)log|astlog/username|p/lpd-errs)|(?:ras/(?:boot|err)|s(?:ys|u)|vold.)log|cr(?:ash/(?:vmcore|unix)|on/log)|ac(?:ct/sum/loginlog|ulogs?)|(?:message|x0msg)s|[pq]acct|utmpx?|wtmpx?|dtmp)|pache/conf/httpd.conf)|www/(?:(?:html/squirrelmail(?:-1.2.9)?|squirrelmail)/config/config.php|(?:conf/httpd.)?conf|logs/(?:access.)log|.lighttpdpassword)|postgresql/(?:db/postgresql.conf|log/postgresql.log)|c(?:panel/(?:tomcat.options|cpanel.config)|ron/log)|m(?:ysql(?:-bin.index|.log)|ail/www-data)|data/mysql-bin.index|nm2/postgresql.conf|saf/(?:port/|_)log)|\/log\/lighttpd\/\{domain\}\/(?:access|error).log)|olumes/(?:macintosh_hd1/(?:usr/local/php(?:/(?:httpd.conf.php|lib/php.ini)|[45]/httpd.conf.php)|opt/(?:apache2?|httpd)/conf/httpd.conf)|webbackup/(?:private/etc/httpd/httpd.conf(?:.default)?|opt/apache2/conf/httpd.conf)))|p(?:r(?:o(?:gram files(?:/(?:apache (?:group/apache(?:/(?:(?:conf/(?:apache2?|httpd)|apache2?).conf|logs/(?:access|error).log)|2/conf/(?:apache2?|httpd).conf)|software foundation/apache2.2/(?:logs/(?:access|error).log|conf/httpd.conf))|mysql/(?:my(?:sql server 5.0/(?:data/mysql(?:-bin.(?:index|log)|.(?:err|log))|my.(?:cnf|ini))|.(?:cnf|ini))|data/mysql(?:-bin.(?:index|log)|.(?:err|log)))|(?:postgresql/(?:8.[34]|9.[01])/data/p(?:g_(?:ident|hba)|ostgresql)|xampp/apache/conf/(?:apache2?|httpd)|vidalia bundle/polipo/polipo).conf)|\/(?:[jboss]\/server\/default\/(?:conf\/(?:s(?:tandardj(?:bos|aw)s.xml|erver.log.properties)|j(?:boss-(?:minimal|service).xml|ndi.properties)|log(?:in-config|4j).xml)|deploy\/jboss-logging.xml|log\/(?:server|boot).log)|mysql(?:\/mysql server 5.0)?\/data\/\{host\}.err))|c/(?:self/(?:fd/(?:[023456789]|1[012345]?)|stat(?:us)?|cmdline|environ|mounts)|(?:cpu|mem)info|net/(?:tc|ud)p|devices|version))|ivate(?:\/tmp\/[jboss]\/server\/default\/(?:conf\/(?:s(?:tandardj(?:bos|aw)s.xml|erver.log.properties)|j(?:boss-(?:minimal|service).xml|ndi.properties)|log(?:in-config|4j).xml)|deploy\/jboss-logging.xml|log\/(?:server|boot).log)|/etc/(?:httpd/(?:httpd.conf(?:.default)?|apache2?.conf)|squirrelmail/config/config.php)))|a(?:ckage(?:-lock)?.json|rameters.yml)|ostgresql/log/pgadmin.log|hp[45]?/php.ini)|w(?:in(?:dows/(?:s(?:ystem32/(?:logfiles/(?:firewall/pfirewall.log(?:.old)?|w3svc[123]?/inetsvn1.log|smtpsvc[12345]?|msftpsvc[12]?)|drivers/etc/(?:(?:network|service|host)s|lmhosts.sam|protocol)|macromed/flash/(?:flash)?install.log)|etup(?:a(?:ct|pi)|err).log)|(?:(?:debug/net|repair/|com)setup|w(?:indowsupdate|msetup)|updspapi).log|(?:odbc|php).ini)|nt/(?:system32/logfiles/(?:firewall/pfirewall.log(?:.old)?|w3svc[123]?/inetsvn1.log|smtpsvc[12345]?|msftpsvc[12]?)|repair/sam._|php.ini))|amp/(?:bin/(?:apache/apache2.2.2(?:2/(?:(?:conf/(?:wampserver|httpd)|wampserver).conf|logs/(?:access|error).log)|1/(?:(?:conf/httpd|wampserver).conf|logs/(?:access|error).log))|mysql/mysql5.5.(?:16/(?:data/mysql-bin.index|wampserver.conf|my.ini)|24/(?:data/mysql-bin.index|wampserver.conf|my.ini))|php/php5.(?:3.8|4.3)/php.ini)|logs/(?:a(?:pache_error|ccess)|(?:slow|gen)query|mysql).log)|ww/(?:logs/(?:freebsddiary-(?:access_|error.)|proftpd.system.)log|(?:apache/)?conf/httpd.conf)|p-config.(?:t(?:e?mp|xt)|bak|old|php)|eb(?:pack.config.js|/conf/php.ini))|\.(?:s(?:sh/(?:id(?:_(?:dsa(?:.pub)?|rsa(?:.pub)?)|entity(?:.pub)?)|(?:authorized_key|known_host)s|config)|ubversion/(?:servers|config|auth)|(?:qlite|h)_history)|c(?:onfig/odesk/odesk team.conf|ache/notify-osd.log|shrc)|l(?:(?:ocal/share/mc|ftp)/|(?:ldb-)?history|esshst)|h(?:t(?:access|digest|passwd)|plip/hplip.conf)|p(?:(?:ython|sql|hp)_history|rofile|earrc|ki/)|bash(?:_(?:history|profile|config|logout)|rc)|(?:(?:(?:rediscli|ksh)_|R)histor|xauthorit)y|vi(?:dalia/vidalia.conf|m(?:info|rc))|n(?:(?:ode_repl|ano)_history|sr)|z(?:sh(?:_history|rc)|history)|tc(?:onn/tconn.conf|shrc)|my(?:sql_history|.cnf)|g(?:itconfig|nupg/)|aptitude/config|drush/)|o(?:pt(?:/(?:(?:apache(?:2(?:/(?:conf/(?:apache2?|httpd)|apache2?)|2/conf/httpd)|/(?:conf/(?:apache2?|httpd)|apache2?))|httpd/(?:conf/)?apache2?).conf|l(?:sws/(?:logs/(?:access|error).log|conf/httpd_conf.xml)|ampp/(?:logs/(?:access.)log|etc/httpd.conf))|xampp/(?:logs/(?:access.)log|etc/php.ini)|tomcat/logs/catalina.(?:err|out))|\/[jboss]\/server\/default\/(?:conf\/(?:s(?:tandardj(?:bos|aw)s.xml|erver.log.properties)|j(?:boss-(?:minimal|service).xml|ndi.properties)|log(?:in-config|4j).xml)|deploy\/jboss-logging.xml|log\/(?:server|boot).log))|rmconfig.json)|xampp(?:/(?:apache/(?:logs/(?:access|error).log|conf/httpd.conf|bin/php.ini)|m(?:ysql/data/mysql(?:-bin.index|.err)|ercurymail/mercury.ini)|htdocs/(?:a(?:dmin.php|ca.txt)|leer.txt)|php(?:myadmin/config.inc.php|/php.ini)|filezillaftp/filezilla server.xml|sendmail/sendmail.(?:ini|log)|webalizer/webalizer.conf)|\/mysql\/data\/\{host\}.err)|s(?:ystem(?:32/(?:inetsrv/config/(?:a(?:pplicationhost|dministration)|redirection).config|config/(?:s(?:(?:yste|a)m|oftware)|default))|/library/webobjects/adaptors/apache2.2/apache.conf)|(?:ites/default/(?:settings(?:.local)?|default.settings)|rv/www/htdos/squirrelmail/config/config).php|e(?:curity|rvices).yml|ftp-config.json)|t(?:mp(?:\/[jboss]\/server\/default\/(?:conf\/(?:s(?:tandardj(?:bos|aw)s.xml|erver.log.properties)|j(?:boss-(?:minimal|service).xml|ndi.properties)|log(?:in-config|4j).xml)|deploy\/jboss-logging.xml|log\/(?:server|boot).log)|/access.log)|ypo3conf/localconf.php|sconfig.json)|[jboss]\/server\/default\/(?:conf\/(?:s(?:tandardj(?:bos|aw)s.xml|erver.log.properties)|j(?:boss-(?:minimal|service).xml|ndi.properties)|log(?:in-config|4j).xml)|deploy\/jboss-logging.xml|log\/(?:server|boot).log)|h(?:ome(?:/(?:postgres/data/p(?:g_(?:(?:ident|hba).conf|version)|ostgresql.conf)|user/lighttpd/lighttpd.conf|bin/stable/apache/php.ini)|2/bin/stable/apache/php.ini)|ttp/httpd.conf)|ap(?:ache(?:/(?:logs/(?:access|error).log|conf/httpd.conf|php/php.ini)|2/logs/(?:access|error).log)|p/etc/local.xml)|l(?:ibrary/webserver/documents/(?:default.(?:html?|php)|index.(?:html?|php))|ogs/(?:security(?:_debug)?_)?log)|mysql(?:/(?:data/mysql(?:-bin.(?:index|log)|.(?:err|log))|my.(?:cnf|ini)|bin/my.ini)|\/data\/\{host\}.err)|ro(?:ot/.(?:bash(?:_(?:history|config|logout)|rc)|(?:ksh_histor|xauthorit)y)|uting.yml)|config(?:/(?:database|custom|app).php|_(?:prod|test|dev).yml|.(?:inc.php|yml))|in(?:c(?:ludes/config(?:ure)?|/config).php|etpub/wwwroot/global.asa)|n(?:etserver/bin/stable/apache/php.ini|pm-debug.log)|b(?:oot/grub/(?:grub.cfg|menu.lst)|in/php.ini)|/(?:config(?:uration)?.php|boot.ini|etc/)|LocalSettings.php|gruntfile.js|Web.config|yarn.lock)#" );
|
4 |
-
$score['LFI'][1] = array( 5 , 5, 5, 5 );
|
5 |
?>
|
1 |
+
<?php
|
2 |
+
|
3 |
+
$regex['LFI'][1] = array( "#(?i)(?:\x5c|(?:%(?:c(?:0%(?:[2aq]f|5c|9v)|1%(?:[19p]c|8s|af))|2(?:5(?:c(?:0%25af|1%259c)|2f|5c)|%46|f)|(?:(?:f(?:8%8)?0%8|e)0%80%a|bg%q)f|%3(?:2(?:%(?:%6|4)6|F)|5%%63)|u(?:221[56]|002f|EFC8|F025)|1u|5c)|0x(?:2f|5c)|\/))(?:%(?:(?:f(?:(?:c%80|8)%8)?0%8|e)0%80%ae|2(?:(?:5(?:c0%25a|2))?e|%45)|u(?:(?:002|ff0)e|2024)|%32(?:%(?:%6|4)5|E)|c0(?:%[256aef]e|\.))|\.(?:%0[01]|\?)?|\?\.?|0x2e){2}(?:\x5c|(?:%(?:c(?:0%(?:[2aq]f|5c|9v)|1%(?:[19p]c|8s|af))|2(?:5(?:c(?:0%25af|1%259c)|2f|5c)|%46|f)|(?:(?:f(?:8%8)?0%8|e)0%80%a|bg%q)f|%3(?:2(?:%(?:%6|4)6|F)|5%%63)|u(?:221[56]|002f|EFC8|F025)|1u|5c)|0x(?:2f|5c)|\/))#" , "# (?:^|[\\/])\.\.(?:[\\/]|$)#","#(?:etc/(?:s(?:e(?:curity/(?:(?:(?:namespac|tim)e|sepermit|access).conf|l(?:imits(?:.conf)?|astlog)|(?:failedlogi|enviro)n|pa(?:m_env.conf|sswd)|group(?:.conf)?|opasswd|user)|nsors3?.conf)|ys(?:c(?:tl(?:.d/(?:10-(?:(?:network|process)-security|console-messages)|wine.sysctl))?.conf|onfig/network-scripts/ifcfg-eth0)|log.conf)|quirrelmail/(?:(?:config(?:_(?:default|local)|/config)?|sqspell_config|filters_setup|index).php|(?:default_pre|apache.con)f)|amba/(?:s(?:mb(?:.conf(?:.user)?|passwd|users)|amba.conf)|private/smbpasswd|dhcp.conf|netlogon)|(?:w-cp-server/applications.d/(?:00-sso-cpserver|plesk)|tunnel/stunnel).conf|u(?:bversion/config|se-release|doers)|s(?:o/sso_config.ini|h/sshd_config)|m(?:b(?:passwd|.conf)|i.conf)|lackware-release|hadow[-~]?)|a(?:p(?:ache(?:2(?:/(?:(?:mods-(?:available/(?:m(?:em_cach|im)e|s(?:etenvif|sl)|d(?:eflate|ir)|autoindex|proxy)|enabled/(?:(?:statu|alia)s|d(?:eflate|ir)|negotiation|mime|php5))|(?:apache|httpd)2?|default-server|ports).conf|s(?:ites-(?:available/default(?:-ssl)?|enabled/(?:000-)?default)|sl-global.conf)|conf(?:.d/(?:phpmyadmin.conf|security|charset)|/httpd.conf)|vhosts.d/(?:00_default_vhost.conf|default_vhost.include)|envvars)|2(?:/conf)?/httpd.conf)|/(?:a(?:ccess|pache)|(?:conf/)?httpd|default-server).conf)|t/apt.conf)|(?:vahi/avahi-daemon|dduser).conf|lias)|p(?:hp(?:(?:(?:(?:4(?:/(?:apache2?|cgi)|.4/fcgi)|5/(?:apache2?|cgi))/|/(?:(?:apache2?|cgi)/|(?:php4/)?))php)?.ini|myadmin/config.inc.php)|u(?:re(?:-ftpd(?:/pure(?:-ftpd.(?:conf|pdb)|ftpd.pdb)|.conf)|ftpd.p(?:asswd|db))|lse/client.conf)|ro(?:f(?:tp(?:d/modules)?.conf|ile)|tpd/proftpd.conf)|a(?:ssw(?:ord.master|d[-~]?)|m.(?:d/proftpd|conf))|ostgresql/p(?:ostgresql|g_hba).conf)|m(?:o(?:no/(?:(?:2.0/(?:machine|web)|1.0/machine).)?config|d(?:probe.d/vmware-tools.conf|ules)|td)|(?:y(?:sql/(?:conf.d/old_passwords|my))?.c|iredo(?:/miredo)?(?:-server)?.co)nf|uddleftpd(?:/(?:mud(?:dleftpd.(?:passwd|conf)|log(?:d.conf)?)|passwd)|.com)|a(?:n(?:drake-release|path.config)|il/sendmail.conf)|t(?:ools.conf|ab))|h(?:ttp(?:d(?:/(?:conf(?:.d(?:/(?:squirrelmail|php).conf)?|/(?:apache2?|httpd).conf)?|(?:extra/httpd-ssl|apache2?|mod_php|httpd).conf|logs/(?:access.)log|php.ini)|.conf)|(?:/conf)?/httpd.conf)|ost(?:s(?:.(?:allow|deny))?|.conf|name)|dparm.conf)|c(?:ups/(?:(?:p(?:rinter|dftop)s|acroread).conf|cupsd.conf(?:.default)?)|(?:lamav/(?:freshclam|clamd)|vs-(?:pserver|cron)).conf|a(?:-certificates.conf(?:.dpkg-old)?|sper.conf)|h(?:krootkit.conf|rootusers)|r(?:ypt|on)tab)|w(?:icd/(?:(?:wire(?:less|d)|manager)-settings.conf|dhclient.conf.template.default)|u-ftpd/ftp(?:acces|host|user)s|ebmin/miniserv.(?:users|conf))|v(?:mware-tools/(?:(?:vmware-tools-libraries|tpvmlp).conf|config)|sftpd(?:.c(?:hroot_list|onf)|/vsftpd.conf)|hcs2/proftpd/proftpd.conf)|l(?:og(?:rotate.(?:d/(?:vsftpd.log|proftpd|ftp)|conf)|in.defs)|(?:ighttpd/lighthttpd|d(?:ap/ldap|.so)|trace).conf)|r(?:e(?:solv(?:conf/update-libc.d/sendmail|.conf)|d(?:is(?:-sentinel)?.conf|hat-release))|c.(?:d/rc.httpd|conf))|d(?:e(?:b(?:ian_version|conf.conf)|fault/grub|luser.conf)|(?:hcp(?:3/dhc(?:lient|pd)|/dhclient)|ns2tcpd).conf)|f(?:tp(?:(?:host|user)s|chroot)|(?:oremost|use).conf|edora-release|irewall.rules|stab)|b(?:luetooth/(?:network|rfcomm|input|main).conf|ash(?:_completion.d/debconf|.bashrc))|x11/xorg.conf(?:.(?:beforevmwaretoolsinstall|orig)|-v(?:mware|esa))?|i(?:n(?:it(?:tab|.d|/)|etd.conf)|pfw.(?:rules|conf)|ssue(?:.net)?)|t(?:i(?:nyproxy/tinyproxy.conf|mezone)|(?:or/tor-t)?socks.conf)|o(?:s(?:xhttpd/osxhttpd.conf|-release)|penldap/ldap.conf)|u(?:pdatedb.conf(?:.beforevmwaretoolsinstall)?|tmp)|n(?:e(?:wsyslog.conf|twork[/s])|ginx/nginx.conf)|e(?:(?:sound/esd|2fsck|tter).conf|xports)|k(?:ernel-(?:im|pk)g.conf|bd/config)|group-?)|usr(?:/(?:l(?:ocal/(?:p(?:hp(?:4/(?:apache(?:2.conf(?:.php)?|.conf(?:.php)?)|httpd.conf(?:.php)?|lib/php.ini)|5/(?:apache(?:2.conf(?:.php)?|.conf(?:.php)?)|httpd.conf(?:.php)?|lib/php.ini)|/(?:apache(?:2.conf(?:.php)?|.conf(?:.php)?)|httpd.conf(?:.php)?|lib/php.ini))|sa/admin/(?:htdocs/domains/databases/phpmyadmin/libraries/config.default.php|conf/(?:site_isolation_settings|php).ini|logs/(?:httpsd_access_|panel.)log)|gsql/(?:data/p(?:ostgresql.(?:conf|log)|g_(?:hba.conf|log)|asswd)|bin/pg_passwd)|ureftpd/(?:etc/pure(?:-ftpd.conf|ftpd.pdb)|sbin/pure-config.pl))|ap(?:ache(?:2(?:/(?:(?:conf/(?:(?:extra/httpd-)?ssl|vhosts(?:-custom)?|apache2?|modsec|httpd)|apache2?|httpd).conf|logs/(?:a(?:ccess.|udit_))?log)|2(?:/conf)?/httpd.conf)|/(?:conf/(?:(?:a(?:pache2?|ccess)|vhosts(?:-custom)?|modsec).conf|httpd.conf(?:.default)?|php.ini)|logs/(?:a(?:ccess.|udit_))?log|(?:apache2?|httpd).conf)|1.3/conf/httpd.conf)|ps/apache(?:2?2)?/conf/httpd.conf)|jakarta/(?:tomcat/(?:conf/(?:(?:logging|workers).properties|(?:context|server).xml|jakarta.conf)|logs/(?:catalina.(?:err|out)|mod_jk.log))|dist/tomcat/(?:conf/(?:(?:logging|workers).properties|(?:context|server).xml|jakarta.conf)|logs/mod_jk.log))|etc/(?:(?:(?:apache(?:2(?:/(?:(?:conf/)?httpd|vhosts)|2(?:/conf)?/httpd)|/(?:(?:conf/)?httpd|vhosts))|nginx/nginx|smb).|httpd/(?:conf/httpd.)?)conf|p(?:ure(?:-ftpd.conf|ftpd.pdb)|hp.ini)|webmin/miniserv.(?:users|conf)|lighttpd.conf(?:.new)?)|l(?:i(?:ghttpd/(?:log/(?:lighttpd.error|access).log|conf/lighttpd.conf)|b/php.ini)|sws/(?:conf/httpd_conf.xml|logs/error.log)|ogs/(?:access|samba).log)|mysql/data/mysql(?:-(?:bin.(?:index|log)|slow.log)|.(?:err|log)|derror.log)|s(?:amba/lib/(?:smb.conf|log).user|quirrelmail/www/readme|b/config)|cpanel/logs/(?:l(?:icense|ogin)|(?:acces|stat)s|error)_log|ze(?:us/web/(?:global.cfg|log/errors)|nd/etc/php.ini)|(?:httpd/conf/httpd|nginx/conf/nginx).conf)|ib/(?:security/mkuser.default|(?:php/)?php.ini|cron/log))|s(?:hare/(?:tomcat(?:6/(?:conf/(?:(?:logging|workers).properties|(?:context|server).xml)|logs/catalina.(?:err|out))|/logs/catalina.(?:err|out))|squirrelmail/(?:plugins/squirrel_logger/setup|config/config).php|logs/catalina.(?:err|out)|adduser/adduser.conf)|bin/(?:mud(?:passw|log)d|pure-config.pl)|pool/(?:mqueue/sys|lp/)log)|p(?:orts/(?:contrib/pure-ftpd/pure(?:ftpd.p(?:asswd|db)|-ftpd.conf)|ftp/pure-ftpd/pure(?:ftpd.p(?:asswd|db)|-ftpd.conf)|net/pure-ftpd/pure(?:ftpd.p(?:asswd|db)|-ftpd.conf))|kg(?:src/net/pureftpd/pure(?:ftpd.p(?:asswd|db)|-ftpd.conf)|/etc/httpd/httpd(?:-(?:default|vhosts))?.conf))|home/user/(?:var/log/(?:lighttpd.error|apache).log|lighttpd/lighttpd.conf)|internet/pgsql/data/p(?:ostmaster.log|g_hba.conf)|(?:apache2?/conf/ht|etc/pure-f)tpd.conf)|\/local\/(?:[jboss]\/server\/default\/(?:conf\/(?:s(?:tandardj(?:bos|aw)s.xml|erver.log.properties)|j(?:boss-(?:minimal|service).xml|ndi.properties)|log(?:in-config|4j).xml)|deploy\/jboss-logging.xml|log\/(?:server|boot).log)|mysql\/data\/\{host\}.err))|v(?:ar(?:/(?:l(?:o(?:g(?:/(?:p(?:(?:o(?:stgres(?:ql(?:/(?:postgres(?:ql(?:-(?:8.[134]|9.[01])-main)?)?|main))?|/p(?:g_backup|ostgres)).|p)|(?:ure(?:-ftpd/pure-)?ftpd|m-powersave).|gsql(?:(?:/pgsql|8).|_))log|roftpd(?:.(?:access_|xfer)log|/xferlog.legacy)?)|(?:(?:v(?:mware/hostd(?:-1)?|sftpd)|cron/var/log/postgres|webmin/miniserv|boot).|a(?:pache(?:2/(?:(?:access|error).)|/(?:access.))|ccess.|uth.?)|e(?:xim[/_](?:reject|panic|main)|rror.)|httpd/(?:access.)|x(?:org.0.|fer))log|m(?:ysql(?:/(?:mysql(?:-(?:bin.(?:index|log)|slow.log)|.log)|data/mysql-bin.index)|.(?:err|log)|-bin.index|derror.log)|ail(?:.(?:info|warn|err|log)|log)|uddleftpd(?:.conf)?|essages(?:.1)?)|n(?:ews(?:/(?:news.(?:notice|crit|all|err)|suck.(?:notice|err))|.all)|ginx(?:.(?:access|error)_|/(?:access.))log)|s(?:(?:(?:quirrelmail|so/sso).|w-cp-server/error_)log|amba(?:/log.[ns]mbd|.log[12]?)|yslog(?:.1)?)|l(?:ighttpd(?:/(?:(?:access|error)(?:.www)?.log)?|.(?:access|error).log)|og.smb)|da(?:ta/mysql-bin.index|emon.log(?:.1)?)|ftp(?:-proxy(?:/ftp-proxy.log)?|log)|ipfw(?:.(?:today|log)|/ipfw.log)?|u(?:ser.log(?:.1)?|fw.log)|tomcat6/catalina.out|kern.log(?:.1)?)|s/access.log)|cal/www/conf/php.ini)|i(?:b/(?:(?:pgsql/data/postgresql.co|mysql/my.c)nf|squirrelmail/prefs/squirrelmail.log)|ghttpd.log)|p/logs/(?:lp(?:sched|net)|requests))|a(?:dm/(?:l(?:og(?:/(?:asppp.|xfer)|in)log|astlog/username|p/lpd-errs)|(?:ras/(?:boot|err)|s(?:ys|u)|vold.)log|cr(?:ash/(?:vmcore|unix)|on/log)|ac(?:ct/sum/loginlog|ulogs?)|(?:message|x0msg)s|[pq]acct|utmpx?|wtmpx?|dtmp)|pache/conf/httpd.conf)|www/(?:(?:html/squirrelmail(?:-1.2.9)?|squirrelmail)/config/config.php|(?:conf/httpd.)?conf|logs/(?:access.)log|.lighttpdpassword)|postgresql/(?:db/postgresql.conf|log/postgresql.log)|c(?:panel/(?:tomcat.options|cpanel.config)|ron/log)|m(?:ysql(?:-bin.index|.log)|ail/www-data)|data/mysql-bin.index|nm2/postgresql.conf|saf/(?:port/|_)log)|\/log\/lighttpd\/\{domain\}\/(?:access|error).log)|olumes/(?:macintosh_hd1/(?:usr/local/php(?:/(?:httpd.conf.php|lib/php.ini)|[45]/httpd.conf.php)|opt/(?:apache2?|httpd)/conf/httpd.conf)|webbackup/(?:private/etc/httpd/httpd.conf(?:.default)?|opt/apache2/conf/httpd.conf)))|p(?:r(?:o(?:gram files(?:/(?:apache (?:group/apache(?:/(?:(?:conf/(?:apache2?|httpd)|apache2?).conf|logs/(?:access|error).log)|2/conf/(?:apache2?|httpd).conf)|software foundation/apache2.2/(?:logs/(?:access|error).log|conf/httpd.conf))|mysql/(?:my(?:sql server 5.0/(?:data/mysql(?:-bin.(?:index|log)|.(?:err|log))|my.(?:cnf|ini))|.(?:cnf|ini))|data/mysql(?:-bin.(?:index|log)|.(?:err|log)))|(?:postgresql/(?:8.[34]|9.[01])/data/p(?:g_(?:ident|hba)|ostgresql)|xampp/apache/conf/(?:apache2?|httpd)|vidalia bundle/polipo/polipo).conf)|\/(?:[jboss]\/server\/default\/(?:conf\/(?:s(?:tandardj(?:bos|aw)s.xml|erver.log.properties)|j(?:boss-(?:minimal|service).xml|ndi.properties)|log(?:in-config|4j).xml)|deploy\/jboss-logging.xml|log\/(?:server|boot).log)|mysql(?:\/mysql server 5.0)?\/data\/\{host\}.err))|c/(?:self/(?:fd/(?:[023456789]|1[012345]?)|stat(?:us)?|cmdline|environ|mounts)|(?:cpu|mem)info|net/(?:tc|ud)p|devices|version))|ivate(?:\/tmp\/[jboss]\/server\/default\/(?:conf\/(?:s(?:tandardj(?:bos|aw)s.xml|erver.log.properties)|j(?:boss-(?:minimal|service).xml|ndi.properties)|log(?:in-config|4j).xml)|deploy\/jboss-logging.xml|log\/(?:server|boot).log)|/etc/(?:httpd/(?:httpd.conf(?:.default)?|apache2?.conf)|squirrelmail/config/config.php)))|a(?:ckage(?:-lock)?.json|rameters.yml)|ostgresql/log/pgadmin.log|hp[45]?/php.ini)|w(?:in(?:dows/(?:s(?:ystem32/(?:logfiles/(?:firewall/pfirewall.log(?:.old)?|w3svc[123]?/inetsvn1.log|smtpsvc[12345]?|msftpsvc[12]?)|drivers/etc/(?:(?:network|service|host)s|lmhosts.sam|protocol)|macromed/flash/(?:flash)?install.log)|etup(?:a(?:ct|pi)|err).log)|(?:(?:debug/net|repair/|com)setup|w(?:indowsupdate|msetup)|updspapi).log|(?:odbc|php).ini)|nt/(?:system32/logfiles/(?:firewall/pfirewall.log(?:.old)?|w3svc[123]?/inetsvn1.log|smtpsvc[12345]?|msftpsvc[12]?)|repair/sam._|php.ini))|amp/(?:bin/(?:apache/apache2.2.2(?:2/(?:(?:conf/(?:wampserver|httpd)|wampserver).conf|logs/(?:access|error).log)|1/(?:(?:conf/httpd|wampserver).conf|logs/(?:access|error).log))|mysql/mysql5.5.(?:16/(?:data/mysql-bin.index|wampserver.conf|my.ini)|24/(?:data/mysql-bin.index|wampserver.conf|my.ini))|php/php5.(?:3.8|4.3)/php.ini)|logs/(?:a(?:pache_error|ccess)|(?:slow|gen)query|mysql).log)|ww/(?:logs/(?:freebsddiary-(?:access_|error.)|proftpd.system.)log|(?:apache/)?conf/httpd.conf)|p-config.(?:t(?:e?mp|xt)|bak|old|php)|eb(?:pack.config.js|/conf/php.ini))|\.(?:s(?:sh/(?:id(?:_(?:dsa(?:.pub)?|rsa(?:.pub)?)|entity(?:.pub)?)|(?:authorized_key|known_host)s|config)|ubversion/(?:servers|config|auth)|(?:qlite|h)_history)|c(?:onfig/odesk/odesk team.conf|ache/notify-osd.log|shrc)|l(?:(?:ocal/share/mc|ftp)/|(?:ldb-)?history|esshst)|h(?:t(?:access|digest|passwd)|plip/hplip.conf)|p(?:(?:ython|sql|hp)_history|rofile|earrc|ki/)|bash(?:_(?:history|profile|config|logout)|rc)|(?:(?:(?:rediscli|ksh)_|R)histor|xauthorit)y|vi(?:dalia/vidalia.conf|m(?:info|rc))|n(?:(?:ode_repl|ano)_history|sr)|z(?:sh(?:_history|rc)|history)|tc(?:onn/tconn.conf|shrc)|my(?:sql_history|.cnf)|g(?:itconfig|nupg/)|aptitude/config|drush/)|o(?:pt(?:/(?:(?:apache(?:2(?:/(?:conf/(?:apache2?|httpd)|apache2?)|2/conf/httpd)|/(?:conf/(?:apache2?|httpd)|apache2?))|httpd/(?:conf/)?apache2?).conf|l(?:sws/(?:logs/(?:access|error).log|conf/httpd_conf.xml)|ampp/(?:logs/(?:access.)log|etc/httpd.conf))|xampp/(?:logs/(?:access.)log|etc/php.ini)|tomcat/logs/catalina.(?:err|out))|\/[jboss]\/server\/default\/(?:conf\/(?:s(?:tandardj(?:bos|aw)s.xml|erver.log.properties)|j(?:boss-(?:minimal|service).xml|ndi.properties)|log(?:in-config|4j).xml)|deploy\/jboss-logging.xml|log\/(?:server|boot).log))|rmconfig.json)|xampp(?:/(?:apache/(?:logs/(?:access|error).log|conf/httpd.conf|bin/php.ini)|m(?:ysql/data/mysql(?:-bin.index|.err)|ercurymail/mercury.ini)|htdocs/(?:a(?:dmin.php|ca.txt)|leer.txt)|php(?:myadmin/config.inc.php|/php.ini)|filezillaftp/filezilla server.xml|sendmail/sendmail.(?:ini|log)|webalizer/webalizer.conf)|\/mysql\/data\/\{host\}.err)|s(?:ystem(?:32/(?:inetsrv/config/(?:a(?:pplicationhost|dministration)|redirection).config|config/(?:s(?:(?:yste|a)m|oftware)|default))|/library/webobjects/adaptors/apache2.2/apache.conf)|(?:ites/default/(?:settings(?:.local)?|default.settings)|rv/www/htdos/squirrelmail/config/config).php|e(?:curity|rvices).yml|ftp-config.json)|t(?:mp(?:\/[jboss]\/server\/default\/(?:conf\/(?:s(?:tandardj(?:bos|aw)s.xml|erver.log.properties)|j(?:boss-(?:minimal|service).xml|ndi.properties)|log(?:in-config|4j).xml)|deploy\/jboss-logging.xml|log\/(?:server|boot).log)|/access.log)|ypo3conf/localconf.php|sconfig.json)|[jboss]\/server\/default\/(?:conf\/(?:s(?:tandardj(?:bos|aw)s.xml|erver.log.properties)|j(?:boss-(?:minimal|service).xml|ndi.properties)|log(?:in-config|4j).xml)|deploy\/jboss-logging.xml|log\/(?:server|boot).log)|h(?:ome(?:/(?:postgres/data/p(?:g_(?:(?:ident|hba).conf|version)|ostgresql.conf)|user/lighttpd/lighttpd.conf|bin/stable/apache/php.ini)|2/bin/stable/apache/php.ini)|ttp/httpd.conf)|ap(?:ache(?:/(?:logs/(?:access|error).log|conf/httpd.conf|php/php.ini)|2/logs/(?:access|error).log)|p/etc/local.xml)|l(?:ibrary/webserver/documents/(?:default.(?:html?|php)|index.(?:html?|php))|ogs/(?:security(?:_debug)?_)?log)|mysql(?:/(?:data/mysql(?:-bin.(?:index|log)|.(?:err|log))|my.(?:cnf|ini)|bin/my.ini)|\/data\/\{host\}.err)|ro(?:ot/.(?:bash(?:_(?:history|config|logout)|rc)|(?:ksh_histor|xauthorit)y)|uting.yml)|config(?:/(?:database|custom|app).php|_(?:prod|test|dev).yml|.(?:inc.php|yml))|in(?:c(?:ludes/config(?:ure)?|/config).php|etpub/wwwroot/global.asa)|n(?:etserver/bin/stable/apache/php.ini|pm-debug.log)|b(?:oot/grub/(?:grub.cfg|menu.lst)|in/php.ini)|/(?:config(?:uration)?.php|boot.ini|etc/)|LocalSettings.php|gruntfile.js|Web.config|yarn.lock)#" );
|
4 |
+
$score['LFI'][1] = array( 5 , 5, 5, 5 );
|
5 |
?>
|
handler/signature/APSQLI.php
CHANGED
@@ -1,11 +1,11 @@
|
|
1 |
-
<?php
|
2 |
-
$regex['SQL'][1] = array( "#(?i:\b(?:(?:m(?:s(?:ys(?:ac(?:cess(?:objects|storage|xml)|es)|(?:relationship|object|querie)s|modules2?)|db)|aster\.\.sysdatabases|ysql\.db)|pg_(?:catalog|toast)|information_schema|northwind|tempdb)\b|s(?:(?:ys(?:\.database_name|aux)|qlite(?:_temp)?_master)\b|chema(?:_name\b|\W*\())|d(?:atabas|b_nam)e\W*\())#" , "#(?i:sleep\(\s*?\d*?\s*?\)|benchmark\(.*?\,.*?\))#" , "#(?i:(?:select|;)\s+(?:benchmark|sleep|if)\s*?\(\s*?\(?\s*?\w+)#" , "#(?i:(?:[\'`](?:;?\s*?(?:having|select|union)\b\s*?[^\s]|\s*?!\s*?[\'`\w])|(?:c(?:onnection_id|urrent_user)|database)\s*?\([^\)]*?|u(?:nion(?:[\w(\s]*?select|select@)|ser\s*?\([^\)]*?)|s(?:chema\s*?\([^\)]*?|elect.*?\w?user\()|into[\s+]+(?:dump|out)file\s*?[\'`]|\s*?exec(?:ute)?.*?\Wxp_cmdshell|from\W+information_schema\W|exec(?:ute)?\s+master\.|\wiif\s*?\())#" , "#^(?i:-0000023456|4294967295|4294967296|2147483648|2147483647|0000012345|-2147483648|-2147483649|0000023456|3.0.00738585072007e-308|1e309)$#" , "#(?i:[\s()]case\s*?\(|\)\s*?like\s*?\(|having\s*?[^\s]+\s*?[^\w\s]|if\s?\([\d\w]\s*?[=<>~])#" , "#(?i:(?:[\'`](?:;*?\s*?waitfor\s+(?:delay|time)\s+[\'`]|;.*?:\s*?goto)|alter\s*?\w+.*?cha(?:racte)?r\s+set\s+\w+))#" , "#(?i:merge.*?using\s*?\(|execute\s*?immediate\s*?[\'`]|match\s*?[\w(),+-]+\s*?against\s*?\()#" , "#(?i)union.*?select.*?from#" , "@(?i:(?:;\s*?shutdown\s*?(?:[#;]|\/\*|--|\{)|waitfor\s*?delay\s?[\'`]+\s?\d|select\s*?pg_sleep))@" , "#(?i:(?:\[\$(?:ne|eq|lte?|gte?|n?in|mod|all|size|exists|type|slice|x?or|div|like|between|and)\]))#" , "%(?i:(?:create\s+(?:procedure|function)\s*?\w+\s*?\(\s*?\)\s*?-|;\s*?(?:declare|open)\s+[\w-]+|procedure\s+analyse\s*?\(|declare[^\w]+[@#]\s*?\w+|exec\s*?\(\s*?\@))%" , "#(?i:(?:;\s*?(?:(?:(?:trunc|cre|upd)at|renam)e|(?:inser|selec)t|de(?:lete|sc)|alter|load)\s*?[\[(]?\w{2,}|create\s+function\s+.+\s+returns))#" , "#(?i:(?:^[\W\d]+\s*?(?:alter\s*(?:a(?:(?:pplication\s*rol|ggregat)e|s(?:ymmetric\s*ke|sembl)y|u(?:thorization|dit)|vailability\s*group)|c(?:r(?:yptographic\s*provider|edential)|o(?:l(?:latio|um)|nversio)n|ertificate|luster)|s(?:e(?:rv(?:ice|er)|curity|quence|ssion|arch)|y(?:mmetric\s*key|nonym)|togroup|chema)|m(?:a(?:s(?:ter\s*key|k)|terialized)|e(?:ssage\s*type|thod)|odule)|l(?:o(?:g(?:file\s*group|in)|ckdown)|a(?:ngua|r)ge|ibrary)|t(?:(?:abl(?:espac)?|yp)e|r(?:igger|usted)|hreshold|ext)|p(?:a(?:rtition|ckage)|ro(?:cedur|fil)e|ermission)|d(?:i(?:mension|skgroup)|atabase|efault|omain)|r(?:o(?:l(?:lback|e)|ute)|e(?:sourc|mot)e)|f(?:u(?:lltext|nction)|lashback|oreign)|e(?:xte(?:nsion|rnal)|(?:ndpoi|ve)nt)|in(?:dex(?:type)?|memory|stance)|b(?:roker\s*priority|ufferpool)|x(?:ml\s*schema|srobject)|w(?:ork(?:load)?|rapper)|hi(?:erarchy|stogram)|o(?:perator|utline)|(?:nicknam|queu)e|us(?:age|er)|group|java|view)|u(?:nion\s*(?:(?:distin|sele)ct|all)|pdate)|(?:(?:trunc|cre)at|renam)e|(?:inser|selec)t|de(?:lete|sc)|load)\b|(?:(?:(?:trunc|cre|upd)at|renam)e|(?:inser|selec)t|de(?:lete|sc)|alter|load)\s+(?:group_concat|load_file|char)\s?\(?|[\d\W]\s+as\s*?[\'`\w]+\s*?from|[\s(]load_file\s*?\(|[\'`]\s+regexp\W|end\s*?\);))#" , "#(?i:/\*[!+](?:[\w\s=_\-()]+)?\*/)#" );
|
3 |
-
$score['SQL'][1] = array( 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 );
|
4 |
-
$regex['SQL'][2] = array( "#(?:^\s*[\'`;]+|[\'`]+\s*$)#" , "#(?i:(?:(?:^|\W)in[+\s]*\([\s\d\]+[^()]*\)|\b(?:r(?:egexp|like)|isnull|xor)\b|<(?:>(?:\s+binary)?|=>?|<)|r(?:egexp|like)\s+binary|not\s+between\s+0\s+and|(?:like|is)\s+null|>[=>]|\|\||!=|&&))#" , "#(?i:[\s'\`()]*?([\d\w]++)[\s'\`()]*?(?:<(?:=(?:[\s'\`()]*?(?!\1)[\d\w]+|>[\s'\`()]*?(?:\1))|>?[\s'\`()]*?(?!\1)[\d\w]+)|(?:not\s+(?:regexp|like)|is\s+not|>=?|!=|\^)[\s'\`()]*?(?!\1)[\d\w]+|(?:(?:sounds\s+)?like|r(?:egexp|like)|=)[\s'\`()]*?(?:\1)))#" , "#(?i)\b(?:c(?:o(?:n(?:v(?:ert(?:_tz)?)?|cat(?:_ws)?|nection_id)|(?:mpres)?s|ercibility|(?:un)?t|llation|alesce)|ur(?:rent_(?:time(?:stamp)?|date|user)|(?:dat|tim)e)|h(?:ar(?:(?:acter)?_length|set)?|r)|iel(?:ing)?|ast|r32)|s(?:u(?:b(?:str(?:ing(?:_index)?)?|(?:dat|tim)e)|m)|t(?:d(?:dev_(?:sam|po)p)?|r(?:_to_date|cmp))|e(?:c(?:_to_time|ond)|ssion_user)|ys(?:tem_user|date)|ha[12]?|oundex|chema|ig?n|leep|pace|qrt)|i(?:s(?:_(?:ipv(?:4(?:_(?:compat|mapped))?|6)|n(?:ot(?:_null)?|ull)|(?:free|used)_lock)|null)|n(?:et(?:6_(?:aton|ntoa)|_(?:aton|ntoa))|s(?:ert|tr)|terval)?|f(?:null)?)|d(?:a(?:t(?:e(?:_(?:format|add|sub)|diff)?|abase)|y(?:of(?:month|week|year)|name)?)|e(?:(?:s_(?:de|en)cryp|faul)t|grees|code)|count|ump)|l(?:o(?:ca(?:l(?:timestamp)?|te)|g(?:10|2)?|ad_file|wer)|ast(?:_(?:inser_id|day))?|e(?:(?:as|f)t|ngth)|case|trim|pad|n)|u(?:n(?:compress(?:ed_length)?|ix_timestamp|hex)|tc_(?:time(?:stamp)?|date)|p(?:datexml|per)|uid(?:_short)?|case|ser)|t(?:ime(?:_(?:format|to_sec)|stamp(?:diff|add)?|diff)?|o(?:(?:second|day)s|_base64|n?char)|r(?:uncate|im)|an)|m(?:a(?:ke(?:_set|date)|ster_pos_wait|x)|i(?:(?:crosecon)?d|n(?:ute)?)|o(?:nth(?:name)?|d)|d5)|r(?:e(?:p(?:lace|eat)|lease_lock|verse)|a(?:wtohex|dians|nd)|o(?:w_count|und)|ight|trim|pad)|f(?:i(?:eld(?:_in_set)?|nd_in_set)|rom_(?:unixtime|base64|days)|o(?:und_rows|rmat)|loor)|p(?:o(?:w(?:er)?|sition)|eriod_(?:diff|add)|rocedure_analyse|assword|g_sleep|i)|a(?:s(?:cii(?:str)?|in)|es_(?:de|en)crypt|dd(?:dat|tim)e|(?:co|b)s|tan2?|vg)|b(?:i(?:t_(?:length|count|x?or|and)|n(?:_to_num)?)|enchmark)|e(?:x(?:tract(?:value)?|p(?:ort_set)?)|nc(?:rypt|ode)|lt)|g(?:r(?:oup_conca|eates)t|et_(?:format|lock))|v(?:a(?:r(?:_(?:sam|po)p|iance)|lues)|ersion)|o(?:(?:ld_passwo)?rd|ct(?:et_length)?)|we(?:ek(?:ofyear|day)?|ight_string)|n(?:o(?:t_in|w)|ame_const|ullif)|h(?:ex(?:toraw)?|our)|qu(?:arter|ote)|year(?:week)?|xmltype)\W*\(#" , "@(?i:[\'`](?:\s*?(?:(?:between|x?or|and|div)[\w\s-]+\s*?[+<>=(),-]\s*?[\d\'`]|like(?:[\w\s-]+\s*?[+<>=(),-]\s*?[\d\'`]|\W+[\w\'`(])|[!=|](?:[\d\s!=+-]+.*?[\'`(].*?|[\d\s!=]+.*?\d+)$|[^\w\s]?=\s*?[\'`])|(?:\W*?[+=]+\W*?|[<>~]+)[\'`])|(?:/\*)+[\'`]+\s?(?:\/\*|--|\{|#)?|\d[\'`]\s+[\'`]\s+\d|where\s[\s\w\.,-]+\s=|^admin\s*?[\'`]|\sis\s*?0\W)@" , "#(?i:(?:(?:(?:(?:trunc|cre|upd)at|renam)e|(?:inser|selec)t|de(?:lete|sc)|alter|load)\s*?\(\s*?space\s*?\(|,.*?[)\da-f\'`][\'`](?:[\'`].*?[\'`]|(?:\r?\n)?\z|[^\'`]+)|\Wselect.+\W*?from))#" , "%(?i:(?:(?:n(?:and|ot)|(?:x?x)?or|between|\|\||like|and|div|&&)[\s(]+\w+[\s)]*?[!=+]+[\s\d]*?[\'`=()]|\/\w+;?\s+(?:between|having|select|like|x?or|and|div)\W|\d+\s*?(?:between|like|x?or|and|div)\s*?\d+\s*?[\-+]|--\s*?(?:(?:insert|update)\s*?\w{2,}|alter|drop)|#\s*?(?:(?:insert|update)\s*?\w{2,}|alter|drop)|;\s*?(?:(?:insert|update)\s*?\w{2,}|alter|drop)|\@.+=\s*?\(\s*?select|\d\s+group\s+by.+\(|[^\w]SET\s*?\@\w+))%" , "#(?i:[\'`]\s*?(?:(?:n(?:and|ot)|(?:x?x)?or|between|\|\||and|div|&&)\s+[\s\w]+=\s*?\w+\s*?having\s+|like(?:\s+[\s\w]+=\s*?\w+\s*?having\s+|\W*?[\'`\d])|[^?\w\s=.,;)(]++\s*?[(@\'`]*?\s*?\w+\W+\w|\*\s*?\w+\W+[\'`])|(?:union\s*?(?:distinct|[(!@]*?|all)?\s*?[([]*?\s*?select|select\s+?[\[\]()\s\w\.,\'`-]+from)\s+|\w+\s+like\s+[\'`]|find_in_set\s*?\(|like\s*?[\'`]%)#" , "@(?i:(?:(?:n(?:and|ot)|(?:x?x)?or|between|\|\||like|and|div|&&)\s+\s*?\w+\(|\)\s*?when\s*?\d+\s*?then|[\'`]\s*?(?:--|\{|#)|cha?r\s*?\(\s*?\d|\/\*!\s?\d+))@" , "#(?i:(?:[\'`](?:;\s*?(?:begin|while|if)|[\s\d]+=\s*?\d|\s+and\s*?=\W)|(?:\(\s*?select\s*?\w+|order\s+by\s+if\w*?|coalesce)\s*?\(|\w[\'`]\s*?(?:(?:[-+=|@]+\s+?)+|[-+=|@]+)[\d(]|[\s(]+case\d*?\W.+[tw]hen[\s(]|\+\s*?\d+\s*?\+\s*?\@|\@\@\w+\s*?[^\w\s]|\W!+[\'`]\w|\*\/from))#" , "#(?i:(?:(?:(?:^[\'`\\\\]*?[^\'`]+[\'`])+|(?:^[\'`\\\\]*?[\d\'`]+)+)\s*?(?:n(?:and|ot)|(?:x?x)?or|between|\|\||like|and|div|&&)\s*?[\w\'`][+&!@(),.-]|\@(?:[\w-]+\s(?:between|like|x?or|and|div)\s*?[^\w\s]|\w+\s+(?:between|like|x?or|and|div)\s*?[\'`\d]+)|[\'`]\s*?(?:between|like|x?or|and|div)\s*?[\'`]?\d|[^\w\s:]\s*?\d\W+[^\w\s]\s*?[\'`].|[^\w\s]\w+\s*?[|-]\s*?[\'`]\s*?\w|\Winformation_schema|\\\\x(?:23|27|3d)|table_name\W|^.?[\'`]$))#" , "@(?i:(?:[\'`](?:\s*?(?:is\s*?(?:[\d.]+\s*?\W.*?[\'`]|\d.+[\'`]?\w)|\d\s*?(?:--|#))|(?:\W+[\w+-]+\s*?=\s*?\d\W+|\|?[\w-]{3,}[^\w\s.,]+)[\'`]|[\%&<>^=]+\d\s*?(?:between|like|x?or|and|div|=))|(?i:n?and|x?x?or|div|like|between|not|\|\||\&\&)\s+[\s\w+]+(?:sounds\s+like\s*?[\'`]|regexp\s*?\(|[=\d]+x)|in\s*?\(+\s*?select))@" , "#(?i:^[\W\d]+\s*?(?:alter|union)\b)#" , "@(?i:[\'`](?:\s*?(?:(?:\*.+(?:(?:an|i)d|between|like|x?or|div)\W*?[\'`]|(?:between|like|x?or|and|div)\s[^\d]+[\w-]+.*?)\d|[^\w\s?]+\s*?[^\w\s]+\s*?[\'`]|[^\w\s]+\s*?[\W\d].*?(?:--|#))|.*?\*\s*?\d)|[()\*<>%+-][\w-]+[^\w\s]+[\'`][^,]|\^[\'`])@" , "#(?:\b(?:having\b?(?:[\'\][^=]{1,10}[\'\?[=<>]+|\d{1,10}?[=<>]+)|(?i:having)\b\s+(?:'[^=]{1,10}'|\d{1,10})\s*?[=<>])|exists\s(?:s(?:elect\S(?:if(?:null)?\s\(|concat|top)|ystem\s\()|\b(?i:having)\b\s+\d{1,10}|'[^=]{1,10}'|\sselect)|(?i:\bexecute\s{1,5}[\w\.$]{1,5}\s{0,3})|(?i:\bcreate\s+?table.{0,20}?\()|(?i:\blike\W*?char\W*?\()|(?i:select.*?case)|(?i:from.*?limit)|(?i:\bexecute\()|(?i:order\sby))#" , "#(?:\b(?:(?i:xor)\b\s+(?:'[^=]{1,10}'(?:\s*?[=<>])?|\d{1,10}(?:\s*?[=<>])?)|(?i:or)\b\s+(?:'[^=]{1,10}'(?:\s*?[=<>])?|\d{1,10}(?:\s*?[=<>])?))|(?i:\bor\b?[\'\][^=]{1,10}[\'\]?[=<>]+)|(?i:'\s+xor\s+.{1,20}[+\-!<>=])|(?i:'\s+or\s+.{1,20}[+\-!<>=])|(?i:\bor\b?\d{1,10}?[=<>]+))#" , "#(?i:\band\b(?:\s+(?:'[^=]{1,10}'(?:\s*?[=<>])?|\d{1,10}(?:\s*?[=<>])?)|?(?:[\'\][^=]{1,10}[\'\]|\d{1,10})?[=<>]+))#" , "#(?i:\b(?:c(?:o(?:n(?:v(?:ert(?:_tz)?)?|cat(?:_ws)?|nection_id)|(?:mpres)?s|ercibility|(?:un)?t|alesce)|ur(?:rent_(?:time(?:stamp)?|date|user)|(?:dat|tim)e)|h(?:ar(?:(?:acter)?_length|set)?|r)|iel(?:ing)?|ast|r32)|s(?:t(?:d(?:dev(?:_(?:sam|po)p)?)?|r(?:_to_date|cmp))|u(?:b(?:str(?:ing(?:_index)?)?|(?:dat|tim)e)|m)|e(?:c(?:_to_time|ond)|ssion_user)|ys(?:tem_user|date)|ha[12]?|oundex|chema|ig?n|leep|pace|qrt)|i(?:s(?:_(?:ipv(?:4(?:_(?:compat|mapped))?|6)|n(?:ot(?:_null)?|ull)|(?:free|used)_lock)|null)?|n(?:et(?:6_(?:aton|ntoa)|_(?:aton|ntoa))|s(?:ert|tr)|terval)?|f(?:null)?)|d(?:a(?:t(?:e(?:_(?:format|add|sub)|diff)?|abase)|y(?:of(?:month|week|year)|name)?)|e(?:(?:s_(?:de|en)cryp|faul)t|grees|code)|count|ump)|l(?:o(?:ca(?:l(?:timestamp)?|te)|g(?:10|2)?|ad_file|wer)|ast(?:_(?:insert_id|day))?|e(?:(?:as|f)t|ngth)|case|trim|pad|n)|u(?:n(?:compress(?:ed_length)?|ix_timestamp|hex)|tc_(?:time(?:stamp)?|date)|p(?:datexml|per)|uid(?:_short)?|case|ser)|r(?:a(?:wto(?:nhex(?:toraw)?|hex)|dians|nd)|e(?:p(?:lace|eat)|lease_lock|verse)|o(?:w_count|und)|ight|trim|pad)|t(?:ime(?:_(?:format|to_sec)|stamp(?:diff|add)?|diff)?|o_(?:(?:second|day)s|base64|n?char)|r(?:uncate|im)|an)|m(?:a(?:ke(?:_set|date)|ster_pos_wait|x)|i(?:(?:crosecon)?d|n(?:ute)?)|o(?:nth(?:name)?|d)|d5)|f(?:i(?:eld(?:_in_set)?|nd_in_set)|rom_(?:unixtime|base64|days)|o(?:und_rows|rmat)|loor)|p(?:o(?:w(?:er)?|sition)|eriod_(?:diff|add)|rocedure_analyse|assword|g_sleep|i)|a(?:s(?:cii(?:str)?|in)|es_(?:de|en)crypt|dd(?:dat|tim)e|(?:co|b)s|tan2?|vg)|b(?:i(?:t_(?:length|count|x?or|and)|n(?:_to_num)?)|enchmark)|e(?:x(?:tract(?:value)?|p(?:ort_set)?)|nc(?:rypt|ode)|lt)|g(?:r(?:oup_conca|eates)t|et_(?:format|lock))|v(?:a(?:r(?:_(?:sam|po)p|iance)|lues)|ersion)|o(?:(?:ld_passwo)?rd|ct(?:et_length)?)|we(?:ek(?:ofyear|day)?|ight_string)|n(?:o(?:t_in|w)|ame_const|ullif)|h(?:ex(?:toraw)?|our)|qu(?:arter|ote)|year(?:week)?|xmltype)\W*?\()#" , "#(?i:(?:xp_(?:reg(?:re(?:movemultistring|ad)|delete(?:value|key)|enum(?:value|key)s|addmultistring|write)|(?:servicecontro|cmdshel)l|e(?:xecresultset|numdsn)|ntsec(?:_enumdomains)?|terminate(?:_process)?|availablemedia|loginconfig|filelist|dirtree|makecab)|s(?:p_(?:(?:addextendedpro|sqlexe)c|p(?:assword|repare)|replwritetovarbin|is_srvrolemember|execute(?:sql)?|makewebtask|oacreate|help)|ql_(?:longvarchar|variant))|open(?:owa_util|rowset|query)|(?:n?varcha|tbcreato)r|autonomous_transaction|db(?:a_users|ms_java)|utl_(?:file|http)))#" , "#(?i:(?:\b(?:(?:s(?:elect\b.{1,100}?\b(?:(?:(?:length|count)\b.{1,100}?|.*?\bdump\b.*)\bfrom|to(?:p\b.{1,100}?\bfrom|_(?:numbe|cha)r)|(?:from\b.{1,100}?\bwher|data_typ)e|instr)|ys_context)|in(?:to\b\W*?\b(?:dump|out)file|sert\b\W*?\binto|ner\b\W*?\bjoin)|u(?:nion\b.{1,100}?\bselect|tl_inaddr)|group\b.*?\bby\b.{1,100}?\bhaving|d(?:elete\b\W*?\bfrom|bms_\w+\.)|load\b\W*?\bdata\b.*?\binfile)\b|print\b\W*?\@\@)|(?:;\W*?\b(?:shutdown|drop)|collation\W*?\(a|\@\@version)\b|'(?:s(?:qloledb|a)|msdasql|dbo)'))#" , "/((?:[~!@#\$%\^&\*\(\)\-\+=\{\}\[\]\|:;\'´’‘`<>][^~!@#\$%\^&\*\(\)\-\+=\{\}\[\]\|:;\'´’‘`<>]*?){12})/ " , "@(?:/\*!?|\*/|[';]--|--[\s\r\n\v\f]|--[^-]*?-|[^&-]#.*?[\s\r\n\v\f]|;?\\x00)@" , "#(?i:(?:\A|[^\d])0x[a-f\d]{3,})#" , " (?:`((?:[\w\s=_\-+{}()<@]){2,29}|(?:[A-Za-z0-9+\/]{4})+(?:[A-Za-z0-9+\/]{2}==|[A-Za-z0-9+\/]{3}=)?)`)" );
|
5 |
-
$score['SQL'][2] = array( 3 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 3 , 5 , 5 , 5 );
|
6 |
-
$regex['SQL'][3] = array( "#(?i)\W+\d*?\s*?having\s*?[^\s\-]#" , "#[\'`][\s\d]*?[^\w\s]\W*?\d\W*?.*?[\'`\d]#" , "/((?:[~!@#\$%\^&\*\(\)\-\+=\{\}\[\]\|:;\'´’‘`<>][^~!@#\$%\^&\*\(\)\-\+=\{\}\[\]\|:;\'´’‘`<>]*?){8})/ " , "/((?:[~!@#\$%\^&\*\(\)\-\+=\{\}\[\]\|:;\'´’‘`<>][^~!@#\$%\^&\*\(\)\-\+=\{\}\[\]\|:;\'´’‘`<>]*?){6})/ " , " /(?:'((?:[\w\s=_\-+{}()<@]){2,29}|(?:[A-Za-z0-9+\/]{4})+(?:[A-Za-z0-9+\/]{2}==|[A-Za-z0-9+\/]{3}=)?)')/ " );
|
7 |
-
$score['SQL'][3] = array( 5 , 5 , 3 , 3 , 3 , 5 );
|
8 |
-
$regex['SQL'][4] = array( "/((?:[~!@#\$%\^&\*\(\)\-\+=\{\}\[\]\|:;\'´’‘`<>][^~!@#\$%\^&\*\(\)\-\+=\{\}\[\]\|:;\'´’‘`<>]*?){3})/ " , " /((?:[~!@#\$%\^&\*\(\)\-\+=\{\}\[\]\|:;\"'´’‘`<>][^~!@#\$%\^&\*\(\)\-\+=\{\}\[\]\|:;\"'´’‘`<>]*?){2})/" );
|
9 |
-
$score['SQL'][4] = array( 3 , 3 );
|
10 |
-
|
11 |
?>
|
1 |
+
<?php
|
2 |
+
$regex['SQL'][1] = array( "#(?i:\b(?:(?:m(?:s(?:ys(?:ac(?:cess(?:objects|storage|xml)|es)|(?:relationship|object|querie)s|modules2?)|db)|aster\.\.sysdatabases|ysql\.db)|pg_(?:catalog|toast)|information_schema|northwind|tempdb)\b|s(?:(?:ys(?:\.database_name|aux)|qlite(?:_temp)?_master)\b|chema(?:_name\b|\W*\())|d(?:atabas|b_nam)e\W*\())#" , "#(?i:sleep\(\s*?\d*?\s*?\)|benchmark\(.*?\,.*?\))#" , "#(?i:(?:select|;)\s+(?:benchmark|sleep|if)\s*?\(\s*?\(?\s*?\w+)#" , "#(?i:(?:[\'`](?:;?\s*?(?:having|select|union)\b\s*?[^\s]|\s*?!\s*?[\'`\w])|(?:c(?:onnection_id|urrent_user)|database)\s*?\([^\)]*?|u(?:nion(?:[\w(\s]*?select|select@)|ser\s*?\([^\)]*?)|s(?:chema\s*?\([^\)]*?|elect.*?\w?user\()|into[\s+]+(?:dump|out)file\s*?[\'`]|\s*?exec(?:ute)?.*?\Wxp_cmdshell|from\W+information_schema\W|exec(?:ute)?\s+master\.|\wiif\s*?\())#" , "#^(?i:-0000023456|4294967295|4294967296|2147483648|2147483647|0000012345|-2147483648|-2147483649|0000023456|3.0.00738585072007e-308|1e309)$#" , "#(?i:[\s()]case\s*?\(|\)\s*?like\s*?\(|having\s*?[^\s]+\s*?[^\w\s]|if\s?\([\d\w]\s*?[=<>~])#" , "#(?i:(?:[\'`](?:;*?\s*?waitfor\s+(?:delay|time)\s+[\'`]|;.*?:\s*?goto)|alter\s*?\w+.*?cha(?:racte)?r\s+set\s+\w+))#" , "#(?i:merge.*?using\s*?\(|execute\s*?immediate\s*?[\'`]|match\s*?[\w(),+-]+\s*?against\s*?\()#" , "#(?i)union.*?select.*?from#" , "@(?i:(?:;\s*?shutdown\s*?(?:[#;]|\/\*|--|\{)|waitfor\s*?delay\s?[\'`]+\s?\d|select\s*?pg_sleep))@" , "#(?i:(?:\[\$(?:ne|eq|lte?|gte?|n?in|mod|all|size|exists|type|slice|x?or|div|like|between|and)\]))#" , "%(?i:(?:create\s+(?:procedure|function)\s*?\w+\s*?\(\s*?\)\s*?-|;\s*?(?:declare|open)\s+[\w-]+|procedure\s+analyse\s*?\(|declare[^\w]+[@#]\s*?\w+|exec\s*?\(\s*?\@))%" , "#(?i:(?:;\s*?(?:(?:(?:trunc|cre|upd)at|renam)e|(?:inser|selec)t|de(?:lete|sc)|alter|load)\s*?[\[(]?\w{2,}|create\s+function\s+.+\s+returns))#" , "#(?i:(?:^[\W\d]+\s*?(?:alter\s*(?:a(?:(?:pplication\s*rol|ggregat)e|s(?:ymmetric\s*ke|sembl)y|u(?:thorization|dit)|vailability\s*group)|c(?:r(?:yptographic\s*provider|edential)|o(?:l(?:latio|um)|nversio)n|ertificate|luster)|s(?:e(?:rv(?:ice|er)|curity|quence|ssion|arch)|y(?:mmetric\s*key|nonym)|togroup|chema)|m(?:a(?:s(?:ter\s*key|k)|terialized)|e(?:ssage\s*type|thod)|odule)|l(?:o(?:g(?:file\s*group|in)|ckdown)|a(?:ngua|r)ge|ibrary)|t(?:(?:abl(?:espac)?|yp)e|r(?:igger|usted)|hreshold|ext)|p(?:a(?:rtition|ckage)|ro(?:cedur|fil)e|ermission)|d(?:i(?:mension|skgroup)|atabase|efault|omain)|r(?:o(?:l(?:lback|e)|ute)|e(?:sourc|mot)e)|f(?:u(?:lltext|nction)|lashback|oreign)|e(?:xte(?:nsion|rnal)|(?:ndpoi|ve)nt)|in(?:dex(?:type)?|memory|stance)|b(?:roker\s*priority|ufferpool)|x(?:ml\s*schema|srobject)|w(?:ork(?:load)?|rapper)|hi(?:erarchy|stogram)|o(?:perator|utline)|(?:nicknam|queu)e|us(?:age|er)|group|java|view)|u(?:nion\s*(?:(?:distin|sele)ct|all)|pdate)|(?:(?:trunc|cre)at|renam)e|(?:inser|selec)t|de(?:lete|sc)|load)\b|(?:(?:(?:trunc|cre|upd)at|renam)e|(?:inser|selec)t|de(?:lete|sc)|alter|load)\s+(?:group_concat|load_file|char)\s?\(?|[\d\W]\s+as\s*?[\'`\w]+\s*?from|[\s(]load_file\s*?\(|[\'`]\s+regexp\W|end\s*?\);))#" , "#(?i:/\*[!+](?:[\w\s=_\-()]+)?\*/)#" );
|
3 |
+
$score['SQL'][1] = array( 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 );
|
4 |
+
$regex['SQL'][2] = array( "#(?:^\s*[\'`;]+|[\'`]+\s*$)#" , "#(?i:(?:(?:^|\W)in[+\s]*\([\s\d\]+[^()]*\)|\b(?:r(?:egexp|like)|isnull|xor)\b|<(?:>(?:\s+binary)?|=>?|<)|r(?:egexp|like)\s+binary|not\s+between\s+0\s+and|(?:like|is)\s+null|>[=>]|\|\||!=|&&))#" , "#(?i:[\s'\`()]*?([\d\w]++)[\s'\`()]*?(?:<(?:=(?:[\s'\`()]*?(?!\1)[\d\w]+|>[\s'\`()]*?(?:\1))|>?[\s'\`()]*?(?!\1)[\d\w]+)|(?:not\s+(?:regexp|like)|is\s+not|>=?|!=|\^)[\s'\`()]*?(?!\1)[\d\w]+|(?:(?:sounds\s+)?like|r(?:egexp|like)|=)[\s'\`()]*?(?:\1)))#" , "#(?i)\b(?:c(?:o(?:n(?:v(?:ert(?:_tz)?)?|cat(?:_ws)?|nection_id)|(?:mpres)?s|ercibility|(?:un)?t|llation|alesce)|ur(?:rent_(?:time(?:stamp)?|date|user)|(?:dat|tim)e)|h(?:ar(?:(?:acter)?_length|set)?|r)|iel(?:ing)?|ast|r32)|s(?:u(?:b(?:str(?:ing(?:_index)?)?|(?:dat|tim)e)|m)|t(?:d(?:dev_(?:sam|po)p)?|r(?:_to_date|cmp))|e(?:c(?:_to_time|ond)|ssion_user)|ys(?:tem_user|date)|ha[12]?|oundex|chema|ig?n|leep|pace|qrt)|i(?:s(?:_(?:ipv(?:4(?:_(?:compat|mapped))?|6)|n(?:ot(?:_null)?|ull)|(?:free|used)_lock)|null)|n(?:et(?:6_(?:aton|ntoa)|_(?:aton|ntoa))|s(?:ert|tr)|terval)?|f(?:null)?)|d(?:a(?:t(?:e(?:_(?:format|add|sub)|diff)?|abase)|y(?:of(?:month|week|year)|name)?)|e(?:(?:s_(?:de|en)cryp|faul)t|grees|code)|count|ump)|l(?:o(?:ca(?:l(?:timestamp)?|te)|g(?:10|2)?|ad_file|wer)|ast(?:_(?:inser_id|day))?|e(?:(?:as|f)t|ngth)|case|trim|pad|n)|u(?:n(?:compress(?:ed_length)?|ix_timestamp|hex)|tc_(?:time(?:stamp)?|date)|p(?:datexml|per)|uid(?:_short)?|case|ser)|t(?:ime(?:_(?:format|to_sec)|stamp(?:diff|add)?|diff)?|o(?:(?:second|day)s|_base64|n?char)|r(?:uncate|im)|an)|m(?:a(?:ke(?:_set|date)|ster_pos_wait|x)|i(?:(?:crosecon)?d|n(?:ute)?)|o(?:nth(?:name)?|d)|d5)|r(?:e(?:p(?:lace|eat)|lease_lock|verse)|a(?:wtohex|dians|nd)|o(?:w_count|und)|ight|trim|pad)|f(?:i(?:eld(?:_in_set)?|nd_in_set)|rom_(?:unixtime|base64|days)|o(?:und_rows|rmat)|loor)|p(?:o(?:w(?:er)?|sition)|eriod_(?:diff|add)|rocedure_analyse|assword|g_sleep|i)|a(?:s(?:cii(?:str)?|in)|es_(?:de|en)crypt|dd(?:dat|tim)e|(?:co|b)s|tan2?|vg)|b(?:i(?:t_(?:length|count|x?or|and)|n(?:_to_num)?)|enchmark)|e(?:x(?:tract(?:value)?|p(?:ort_set)?)|nc(?:rypt|ode)|lt)|g(?:r(?:oup_conca|eates)t|et_(?:format|lock))|v(?:a(?:r(?:_(?:sam|po)p|iance)|lues)|ersion)|o(?:(?:ld_passwo)?rd|ct(?:et_length)?)|we(?:ek(?:ofyear|day)?|ight_string)|n(?:o(?:t_in|w)|ame_const|ullif)|h(?:ex(?:toraw)?|our)|qu(?:arter|ote)|year(?:week)?|xmltype)\W*\(#" , "@(?i:[\'`](?:\s*?(?:(?:between|x?or|and|div)[\w\s-]+\s*?[+<>=(),-]\s*?[\d\'`]|like(?:[\w\s-]+\s*?[+<>=(),-]\s*?[\d\'`]|\W+[\w\'`(])|[!=|](?:[\d\s!=+-]+.*?[\'`(].*?|[\d\s!=]+.*?\d+)$|[^\w\s]?=\s*?[\'`])|(?:\W*?[+=]+\W*?|[<>~]+)[\'`])|(?:/\*)+[\'`]+\s?(?:\/\*|--|\{|#)?|\d[\'`]\s+[\'`]\s+\d|where\s[\s\w\.,-]+\s=|^admin\s*?[\'`]|\sis\s*?0\W)@" , "#(?i:(?:(?:(?:(?:trunc|cre|upd)at|renam)e|(?:inser|selec)t|de(?:lete|sc)|alter|load)\s*?\(\s*?space\s*?\(|,.*?[)\da-f\'`][\'`](?:[\'`].*?[\'`]|(?:\r?\n)?\z|[^\'`]+)|\Wselect.+\W*?from))#" , "%(?i:(?:(?:n(?:and|ot)|(?:x?x)?or|between|\|\||like|and|div|&&)[\s(]+\w+[\s)]*?[!=+]+[\s\d]*?[\'`=()]|\/\w+;?\s+(?:between|having|select|like|x?or|and|div)\W|\d+\s*?(?:between|like|x?or|and|div)\s*?\d+\s*?[\-+]|--\s*?(?:(?:insert|update)\s*?\w{2,}|alter|drop)|#\s*?(?:(?:insert|update)\s*?\w{2,}|alter|drop)|;\s*?(?:(?:insert|update)\s*?\w{2,}|alter|drop)|\@.+=\s*?\(\s*?select|\d\s+group\s+by.+\(|[^\w]SET\s*?\@\w+))%" , "#(?i:[\'`]\s*?(?:(?:n(?:and|ot)|(?:x?x)?or|between|\|\||and|div|&&)\s+[\s\w]+=\s*?\w+\s*?having\s+|like(?:\s+[\s\w]+=\s*?\w+\s*?having\s+|\W*?[\'`\d])|[^?\w\s=.,;)(]++\s*?[(@\'`]*?\s*?\w+\W+\w|\*\s*?\w+\W+[\'`])|(?:union\s*?(?:distinct|[(!@]*?|all)?\s*?[([]*?\s*?select|select\s+?[\[\]()\s\w\.,\'`-]+from)\s+|\w+\s+like\s+[\'`]|find_in_set\s*?\(|like\s*?[\'`]%)#" , "@(?i:(?:(?:n(?:and|ot)|(?:x?x)?or|between|\|\||like|and|div|&&)\s+\s*?\w+\(|\)\s*?when\s*?\d+\s*?then|[\'`]\s*?(?:--|\{|#)|cha?r\s*?\(\s*?\d|\/\*!\s?\d+))@" , "#(?i:(?:[\'`](?:;\s*?(?:begin|while|if)|[\s\d]+=\s*?\d|\s+and\s*?=\W)|(?:\(\s*?select\s*?\w+|order\s+by\s+if\w*?|coalesce)\s*?\(|\w[\'`]\s*?(?:(?:[-+=|@]+\s+?)+|[-+=|@]+)[\d(]|[\s(]+case\d*?\W.+[tw]hen[\s(]|\+\s*?\d+\s*?\+\s*?\@|\@\@\w+\s*?[^\w\s]|\W!+[\'`]\w|\*\/from))#" , "#(?i:(?:(?:(?:^[\'`\\\\]*?[^\'`]+[\'`])+|(?:^[\'`\\\\]*?[\d\'`]+)+)\s*?(?:n(?:and|ot)|(?:x?x)?or|between|\|\||like|and|div|&&)\s*?[\w\'`][+&!@(),.-]|\@(?:[\w-]+\s(?:between|like|x?or|and|div)\s*?[^\w\s]|\w+\s+(?:between|like|x?or|and|div)\s*?[\'`\d]+)|[\'`]\s*?(?:between|like|x?or|and|div)\s*?[\'`]?\d|[^\w\s:]\s*?\d\W+[^\w\s]\s*?[\'`].|[^\w\s]\w+\s*?[|-]\s*?[\'`]\s*?\w|\Winformation_schema|\\\\x(?:23|27|3d)|table_name\W|^.?[\'`]$))#" , "@(?i:(?:[\'`](?:\s*?(?:is\s*?(?:[\d.]+\s*?\W.*?[\'`]|\d.+[\'`]?\w)|\d\s*?(?:--|#))|(?:\W+[\w+-]+\s*?=\s*?\d\W+|\|?[\w-]{3,}[^\w\s.,]+)[\'`]|[\%&<>^=]+\d\s*?(?:between|like|x?or|and|div|=))|(?i:n?and|x?x?or|div|like|between|not|\|\||\&\&)\s+[\s\w+]+(?:sounds\s+like\s*?[\'`]|regexp\s*?\(|[=\d]+x)|in\s*?\(+\s*?select))@" , "#(?i:^[\W\d]+\s*?(?:alter|union)\b)#" , "@(?i:[\'`](?:\s*?(?:(?:\*.+(?:(?:an|i)d|between|like|x?or|div)\W*?[\'`]|(?:between|like|x?or|and|div)\s[^\d]+[\w-]+.*?)\d|[^\w\s?]+\s*?[^\w\s]+\s*?[\'`]|[^\w\s]+\s*?[\W\d].*?(?:--|#))|.*?\*\s*?\d)|[()\*<>%+-][\w-]+[^\w\s]+[\'`][^,]|\^[\'`])@" , "#(?:\b(?:having\b?(?:[\'\][^=]{1,10}[\'\?[=<>]+|\d{1,10}?[=<>]+)|(?i:having)\b\s+(?:'[^=]{1,10}'|\d{1,10})\s*?[=<>])|exists\s(?:s(?:elect\S(?:if(?:null)?\s\(|concat|top)|ystem\s\()|\b(?i:having)\b\s+\d{1,10}|'[^=]{1,10}'|\sselect)|(?i:\bexecute\s{1,5}[\w\.$]{1,5}\s{0,3})|(?i:\bcreate\s+?table.{0,20}?\()|(?i:\blike\W*?char\W*?\()|(?i:select.*?case)|(?i:from.*?limit)|(?i:\bexecute\()|(?i:order\sby))#" , "#(?:\b(?:(?i:xor)\b\s+(?:'[^=]{1,10}'(?:\s*?[=<>])?|\d{1,10}(?:\s*?[=<>])?)|(?i:or)\b\s+(?:'[^=]{1,10}'(?:\s*?[=<>])?|\d{1,10}(?:\s*?[=<>])?))|(?i:\bor\b?[\'\][^=]{1,10}[\'\]?[=<>]+)|(?i:'\s+xor\s+.{1,20}[+\-!<>=])|(?i:'\s+or\s+.{1,20}[+\-!<>=])|(?i:\bor\b?\d{1,10}?[=<>]+))#" , "#(?i:\band\b(?:\s+(?:'[^=]{1,10}'(?:\s*?[=<>])?|\d{1,10}(?:\s*?[=<>])?)|?(?:[\'\][^=]{1,10}[\'\]|\d{1,10})?[=<>]+))#" , "#(?i:\b(?:c(?:o(?:n(?:v(?:ert(?:_tz)?)?|cat(?:_ws)?|nection_id)|(?:mpres)?s|ercibility|(?:un)?t|alesce)|ur(?:rent_(?:time(?:stamp)?|date|user)|(?:dat|tim)e)|h(?:ar(?:(?:acter)?_length|set)?|r)|iel(?:ing)?|ast|r32)|s(?:t(?:d(?:dev(?:_(?:sam|po)p)?)?|r(?:_to_date|cmp))|u(?:b(?:str(?:ing(?:_index)?)?|(?:dat|tim)e)|m)|e(?:c(?:_to_time|ond)|ssion_user)|ys(?:tem_user|date)|ha[12]?|oundex|chema|ig?n|leep|pace|qrt)|i(?:s(?:_(?:ipv(?:4(?:_(?:compat|mapped))?|6)|n(?:ot(?:_null)?|ull)|(?:free|used)_lock)|null)?|n(?:et(?:6_(?:aton|ntoa)|_(?:aton|ntoa))|s(?:ert|tr)|terval)?|f(?:null)?)|d(?:a(?:t(?:e(?:_(?:format|add|sub)|diff)?|abase)|y(?:of(?:month|week|year)|name)?)|e(?:(?:s_(?:de|en)cryp|faul)t|grees|code)|count|ump)|l(?:o(?:ca(?:l(?:timestamp)?|te)|g(?:10|2)?|ad_file|wer)|ast(?:_(?:insert_id|day))?|e(?:(?:as|f)t|ngth)|case|trim|pad|n)|u(?:n(?:compress(?:ed_length)?|ix_timestamp|hex)|tc_(?:time(?:stamp)?|date)|p(?:datexml|per)|uid(?:_short)?|case|ser)|r(?:a(?:wto(?:nhex(?:toraw)?|hex)|dians|nd)|e(?:p(?:lace|eat)|lease_lock|verse)|o(?:w_count|und)|ight|trim|pad)|t(?:ime(?:_(?:format|to_sec)|stamp(?:diff|add)?|diff)?|o_(?:(?:second|day)s|base64|n?char)|r(?:uncate|im)|an)|m(?:a(?:ke(?:_set|date)|ster_pos_wait|x)|i(?:(?:crosecon)?d|n(?:ute)?)|o(?:nth(?:name)?|d)|d5)|f(?:i(?:eld(?:_in_set)?|nd_in_set)|rom_(?:unixtime|base64|days)|o(?:und_rows|rmat)|loor)|p(?:o(?:w(?:er)?|sition)|eriod_(?:diff|add)|rocedure_analyse|assword|g_sleep|i)|a(?:s(?:cii(?:str)?|in)|es_(?:de|en)crypt|dd(?:dat|tim)e|(?:co|b)s|tan2?|vg)|b(?:i(?:t_(?:length|count|x?or|and)|n(?:_to_num)?)|enchmark)|e(?:x(?:tract(?:value)?|p(?:ort_set)?)|nc(?:rypt|ode)|lt)|g(?:r(?:oup_conca|eates)t|et_(?:format|lock))|v(?:a(?:r(?:_(?:sam|po)p|iance)|lues)|ersion)|o(?:(?:ld_passwo)?rd|ct(?:et_length)?)|we(?:ek(?:ofyear|day)?|ight_string)|n(?:o(?:t_in|w)|ame_const|ullif)|h(?:ex(?:toraw)?|our)|qu(?:arter|ote)|year(?:week)?|xmltype)\W*?\()#" , "#(?i:(?:xp_(?:reg(?:re(?:movemultistring|ad)|delete(?:value|key)|enum(?:value|key)s|addmultistring|write)|(?:servicecontro|cmdshel)l|e(?:xecresultset|numdsn)|ntsec(?:_enumdomains)?|terminate(?:_process)?|availablemedia|loginconfig|filelist|dirtree|makecab)|s(?:p_(?:(?:addextendedpro|sqlexe)c|p(?:assword|repare)|replwritetovarbin|is_srvrolemember|execute(?:sql)?|makewebtask|oacreate|help)|ql_(?:longvarchar|variant))|open(?:owa_util|rowset|query)|(?:n?varcha|tbcreato)r|autonomous_transaction|db(?:a_users|ms_java)|utl_(?:file|http)))#" , "#(?i:(?:\b(?:(?:s(?:elect\b.{1,100}?\b(?:(?:(?:length|count)\b.{1,100}?|.*?\bdump\b.*)\bfrom|to(?:p\b.{1,100}?\bfrom|_(?:numbe|cha)r)|(?:from\b.{1,100}?\bwher|data_typ)e|instr)|ys_context)|in(?:to\b\W*?\b(?:dump|out)file|sert\b\W*?\binto|ner\b\W*?\bjoin)|u(?:nion\b.{1,100}?\bselect|tl_inaddr)|group\b.*?\bby\b.{1,100}?\bhaving|d(?:elete\b\W*?\bfrom|bms_\w+\.)|load\b\W*?\bdata\b.*?\binfile)\b|print\b\W*?\@\@)|(?:;\W*?\b(?:shutdown|drop)|collation\W*?\(a|\@\@version)\b|'(?:s(?:qloledb|a)|msdasql|dbo)'))#" , "/((?:[~!@#\$%\^&\*\(\)\-\+=\{\}\[\]\|:;\'´’‘`<>][^~!@#\$%\^&\*\(\)\-\+=\{\}\[\]\|:;\'´’‘`<>]*?){12})/ " , "@(?:/\*!?|\*/|[';]--|--[\s\r\n\v\f]|--[^-]*?-|[^&-]#.*?[\s\r\n\v\f]|;?\\x00)@" , "#(?i:(?:\A|[^\d])0x[a-f\d]{3,})#" , " (?:`((?:[\w\s=_\-+{}()<@]){2,29}|(?:[A-Za-z0-9+\/]{4})+(?:[A-Za-z0-9+\/]{2}==|[A-Za-z0-9+\/]{3}=)?)`)" );
|
5 |
+
$score['SQL'][2] = array( 3 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 3 , 5 , 5 , 5 );
|
6 |
+
$regex['SQL'][3] = array( "#(?i)\W+\d*?\s*?having\s*?[^\s\-]#" , "#[\'`][\s\d]*?[^\w\s]\W*?\d\W*?.*?[\'`\d]#" , "/((?:[~!@#\$%\^&\*\(\)\-\+=\{\}\[\]\|:;\'´’‘`<>][^~!@#\$%\^&\*\(\)\-\+=\{\}\[\]\|:;\'´’‘`<>]*?){8})/ " , "/((?:[~!@#\$%\^&\*\(\)\-\+=\{\}\[\]\|:;\'´’‘`<>][^~!@#\$%\^&\*\(\)\-\+=\{\}\[\]\|:;\'´’‘`<>]*?){6})/ " , " /(?:'((?:[\w\s=_\-+{}()<@]){2,29}|(?:[A-Za-z0-9+\/]{4})+(?:[A-Za-z0-9+\/]{2}==|[A-Za-z0-9+\/]{3}=)?)')/ " );
|
7 |
+
$score['SQL'][3] = array( 5 , 5 , 3 , 3 , 3 , 5 );
|
8 |
+
$regex['SQL'][4] = array( "/((?:[~!@#\$%\^&\*\(\)\-\+=\{\}\[\]\|:;\'´’‘`<>][^~!@#\$%\^&\*\(\)\-\+=\{\}\[\]\|:;\'´’‘`<>]*?){3})/ " , " /((?:[~!@#\$%\^&\*\(\)\-\+=\{\}\[\]\|:;\"'´’‘`<>][^~!@#\$%\^&\*\(\)\-\+=\{\}\[\]\|:;\"'´’‘`<>]*?){2})/" );
|
9 |
+
$score['SQL'][4] = array( 3 , 3 );
|
10 |
+
|
11 |
?>
|
handler/signature/APXSS.php
CHANGED
@@ -1,7 +1,7 @@
|
|
1 |
-
<?php
|
2 |
-
|
3 |
-
$regex['XSS'][1] = array( "#(?i)<script[^>]*>[\s\S]*?#" , "#(?i)[\s\'`;\/0-9=\x0B\x09\x0C\x3B\x2C\x28\x3B]+on[a-zA-Z]+[\s\x0B\x09\x0C\x3B\x2C\x28\x3B]*?=#" , "#(?i)[\s\S]((?:x(?:link:href|html|mlns)|!ENTITY.*?(?:SYSTEM|PUBLIC)|data:text\/html|formaction|\@import|base64)\b|pattern\b.*?=)#" , "#(?i)(?:<(?:(?:apple|objec)t|isindex|embed|style|form|meta)\b[^>]*?>[\s\S]*?|(?:=|U\s*?R\s*?L\s*?\()\s*?[^>]*?\s*?S\s*?C\s*?R\s*?I\s*?P\s*?T\s*?:)#" , "#(?i:(?:<\w[\s\S]*[\s\/]|['\](?:[\s\S]*[\s\/])?)(?:on(?:d(?:e(?:vice(?:(?:orienta|mo)tion|proximity|found|light)|livery(?:success|error)|activate)|r(?:ag(?:e(?:n(?:ter|d)|xit)|(?:gestur|leav)e|start|drop|over)|op)|i(?:s(?:c(?:hargingtimechange|onnect(?:ing|ed))|abled)|aling)|ata(?:setc(?:omplete|hanged)|(?:availabl|chang)e|error)|urationchange|ownloading|blclick)|Moz(?:M(?:agnifyGesture(?:Update|Start)?|ouse(?:PixelScroll|Hittest))|S(?:wipeGesture(?:Update|Start|End)?|crolledAreaChanged)|(?:(?:Press)?TapGestur|BeforeResiz)e|EdgeUI(?:C(?:omplet|ancel)|Start)ed|RotateGesture(?:Update|Start)?|A(?:udioAvailable|fterPaint))|c(?:o(?:m(?:p(?:osition(?:update|start|end)|lete)|mand(?:update)?)|n(?:t(?:rolselect|extmenu)|nect(?:ing|ed))|py)|a(?:(?:llschang|ch)ed|nplay(?:through)?|rdstatechange)|h(?:(?:arging(?:time)?ch)?ange|ecking)|(?:fstate|ell)change|u(?:echange|t)|l(?:ick|ose))|s(?:t(?:a(?:t(?:uschanged|echange)|lled|rt)|k(?:sessione|comma)nd|op)|e(?:ek(?:complete|ing|ed)|(?:lec(?:tstar)?)?t|n(?:ding|t))|(?:peech|ound)(?:start|end)|u(?:ccess|spend|bmit)|croll|how)|m(?:o(?:z(?:(?:pointerlock|fullscreen)(?:change|error)|(?:orientation|time)change|network(?:down|up)load)|use(?:(?:lea|mo)ve|o(?:ver|ut)|enter|wheel|down|up)|ve(?:start|end)?)|essage|ark)|a(?:n(?:imation(?:iteration|start|end)|tennastatechange)|fter(?:(?:scriptexecu|upda)te|print)|udio(?:process|start|end)|d(?:apteradded|dtrack)|ctivate|lerting|bort)|b(?:e(?:fore(?:(?:(?:de)?activa|scriptexecu)te|u(?:nload|pdate)|p(?:aste|rint)|c(?:opy|ut)|editfocus)|gin(?:Event)?)|oun(?:dary|ce)|l(?:ocked|ur)|roadcast|usy)|DOM(?:Node(?:Inserted(?:IntoDocument)?|Removed(?:FromDocument)?)|(?:CharacterData|Subtree)Modified|A(?:ttrModified|ctivate)|Focus(?:Out|In)|MouseScroll)|r(?:e(?:s(?:u(?:m(?:ing|e)|lt)|ize|et)|adystatechange|pea(?:tEven)?t|movetrack|trieving|ceived)|ow(?:s(?:inserted|delete)|e(?:nter|xit))|atechange)|p(?:op(?:up(?:hid(?:den|ing)|show(?:ing|n))|state)|a(?:ge(?:hide|show)|(?:st|us)e|int)|ro(?:pertychange|gress)|lay(?:ing)?)|t(?:ouch(?:(?:lea|mo)ve|en(?:ter|d)|cancel|start)|ransition(?:cancel|end|run)|ime(?:update|out)|ext)|u(?:s(?:erproximity|sdreceived)|p(?:gradeneeded|dateready)|n(?:derflow|load))|f(?:o(?:rm(?:change|input)|cus(?:out|in)?)|i(?:lterchange|nish)|ailed)|l(?:o(?:ad(?:e(?:d(?:meta)?data|nd)|start)|secapture)|evelchange|y)|g(?:amepad(?:(?:dis)?connected|button(?:down|up)|axismove)|et)|e(?:n(?:d(?:Event|ed)?|abled|ter)|rror(?:update)?|mptied|xit)|i(?:cc(?:cardlockerror|infochange)|n(?:coming|valid|put))|o(?:(?:(?:ff|n)lin|bsolet)e|verflow(?:changed)?|pen)|SVG(?:(?:Unl|L)oad|Resize|Scroll|Abort|Error|Zoom)|h(?:e(?:adphoneschange|l[dp])|ashchange|olding)|v(?:o(?:lum|ic)e|ersion)change|w(?:a(?:it|rn)ing|heel)|key(?:press|down|up)|(?:AppComman|Loa)d|no(?:update|match)|Request|zoom)|s(?:tyle|rc)|background|formaction|lowsrc|ping)[\s\x08]*?=|<[^\w<>]*(?:[^<>\'\s]*:)?[^\w<>]*\W*?(?:(?:a\W*?(?:n\W*?i\W*?m\W*?a\W*?t\W*?e|p\W*?p\W*?l\W*?e\W*?t|u\W*?d\W*?i\W*?o)|b\W*?(?:i\W*?n\W*?d\W*?i\W*?n\W*?g\W*?s|a\W*?s\W*?e|o\W*?d\W*?y)|i?\W*?f\W*?r\W*?a\W*?m\W*?e|o\W*?b\W*?j\W*?e\W*?c\W*?t|i\W*?m\W*?a?\W*?g\W*?e?|e\W*?m\W*?b\W*?e\W*?d|p\W*?a\W*?r\W*?a\W*?m|v\W*?i\W*?d\W*?e\W*?o|l\W*?i\W*?n\W*?k)[^>\w]|s\W*?(?:c\W*?r\W*?i\W*?p\W*?t|t\W*?y\W*?l\W*?e|e\W*?t[^>\w]|v\W*?g)|m\W*?(?:a\W*?r\W*?q\W*?u\W*?e\W*?e|e\W*?t\W*?a[^>\w])|f\W*?o\W*?r\W*?m)#" , "%(?i:<style.*?>.*?(?:@[i\\\\]|(?:[:=]|&#x?0*(?:58|3A|61|3D);?).*?(?:[(\\\\]|&#x?0*(?:40|28|92|5C);?)))%" , "#(?i:<.*[:]?vmlframe.*?[\s/+]*?src[\s/+]*=)#" , "@(?i:(?:j|&#x?0*(?:74|4A|106|6A);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:a|&#x?0*(?:65|41|97|61);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:v|&#x?0*(?:86|56|118|76);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:a|&#x?0*(?:65|41|97|61);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:s|&#x?0*(?:83|53|115|73);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:c|&#x?0*(?:67|43|99|63);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:r|&#x?0*(?:82|52|114|72);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:i|&#x?0*(?:73|49|105|69);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:p|&#x?0*(?:80|50|112|70);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:t|&#x?0*(?:84|54|116|74);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?::|&(?:#x?0*(?:58|3A);?|colon;)).)@" , "@(?i:(?:v|&#x?0*(?:86|56|118|76);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:b|&#x?0*(?:66|42|98|62);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:s|&#x?0*(?:83|53|115|73);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:c|&#x?0*(?:67|43|99|63);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:r|&#x?0*(?:82|52|114|72);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:i|&#x?0*(?:73|49|105|69);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:p|&#x?0*(?:80|50|112|70);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:t|&#x?0*(?:84|54|116|74);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?::|&(?:#x?0*(?:58|3A);?|colon;)).)@" , "#(?i)<EMBED[\s/+].*?(?:src|type).*?=#" , "#<[?]?import[\s\/+\S]*?implementation[\s\/+]*?=#" , "@(?i:<META[\s/+].*?http-equiv[\s/+]*=[\s/+]*[\'`]?(?:(?:c|&#x?0*(?:67|43|99|63);?)|(?:r|&#x?0*(?:82|52|114|72);?)|(?:s|&#x?0*(?:83|53|115|73);?)))@" , "#(?i:<META[\s/+].*?charset[\s/+]*=)#" , "#(?i)<LINK[\s/+].*?href[\s/+]*=#" , "#(?i)<BASE[\s/+].*?href[\s/+]*=#" , "#(?i)<APPLET[\s/+>]#" , "#(?i)<OBJECT[\s/+].*?(?:type|codetype|classid|code|data)[\s/+]*=#" , "#(?:¾|¼).*(?:¾|¼|>)|(?:¾|¼|<).*(?:¾|¼)#" , "#(?:\+ADw\-|\+AD4\-).*(?:\+ADw\-|\+AD4\-|>)|(?:\+ADw\-|\+AD4\-|<).*(?:\+ADw\-|\+AD4\-)#" , "#![!+]\[\]#" , " #(?:self|document|this|top|window)\s*\)*(?:\[[^\]]+\]|\.\s*document|\.\s*cookie)#" );
|
4 |
-
$score['XSS'][1] = array( 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 );
|
5 |
-
$regex['XSS'][2] = array( "#(?i)\b(?:s(?:tyle|rc)|href)\b[\s\S]*?=#" , "#<(?:a|abbr|acronym|address|applet|area|audioscope|b|base|basefront|bdo|bgsound|big|blackface|blink|blockquote|body|bq|br|button|caption|center|cite|code|col|colgroup|comment|dd|del|dfn|dir|div|dl|dt|em|embed|fieldset|fn|font|form|frame|frameset|h1|head|hr|html|i|iframe|ilayer|img|input|ins|isindex|kdb|keygen|label|layer|legend|li|limittext|link|listing|map|marquee|menu|meta|multicol|nobr|noembed|noframes|noscript|nosmartquotes|object|ol|optgroup|option|p|param|plaintext|pre|q|rt|ruby|s|samp|script|select|server|shadow|sidebar|small|spacer|span|strike|strong|style|sub|sup|table|tbody|td|textarea|tfoot|th|thead|title|tr|tt|u|ul|var|wbr|xml|xmp)\W#" , "#(?i:[\'][]*(?:[^a-z0-9~_:']|in).*?(?:(?:l|\\\\u006C)(?:o|\\\\u006F)(?:c|\\\\u0063)(?:a|\\\\u0061)(?:t|\\\\u0074)(?:i|\\\\u0069)(?:o|\\\\u006F)(?:n|\\\\u006E)|(?:n|\\\\u006E)(?:a|\\\\u0061)(?:m|\\\\u006D)(?:e|\\\\u0065)|(?:o|\\\\u006F)(?:n|\\\\u006E)(?:e|\\\\u0065)(?:r|\\\\u0072)(?:r|\\\\u0072)(?:o|\\\\u006F)(?:r|\\\\u0072)|(?:v|\\\\u0076)(?:a|\\\\u0061)(?:l|\\\\u006C)(?:u|\\\\u0075)(?:e|\\\\u0065)(?:O|\\\\u004F)(?:f|\\\\u0066)).*?=)#" , "#(?i)[\\'][]*(?:[^a-z0-9~_:\']|in).+?[.].+?=#" , " {{.*?}}" );
|
6 |
-
$score['XSS'][2] = array( 5 , 5 , 5 , 5 , 5 );
|
7 |
?>
|
1 |
+
<?php
|
2 |
+
|
3 |
+
$regex['XSS'][1] = array( "#(?i)<script[^>]*>[\s\S]*?#" , "#(?i)[\s\'`;\/0-9=\x0B\x09\x0C\x3B\x2C\x28\x3B]+on[a-zA-Z]+[\s\x0B\x09\x0C\x3B\x2C\x28\x3B]*?=#" , "#(?i)[\s\S]((?:x(?:link:href|html|mlns)|!ENTITY.*?(?:SYSTEM|PUBLIC)|data:text\/html|formaction|\@import|base64)\b|pattern\b.*?=)#" , "#(?i)(?:<(?:(?:apple|objec)t|isindex|embed|style|form|meta)\b[^>]*?>[\s\S]*?|(?:=|U\s*?R\s*?L\s*?\()\s*?[^>]*?\s*?S\s*?C\s*?R\s*?I\s*?P\s*?T\s*?:)#" , "#(?i:(?:<\w[\s\S]*[\s\/]|['\](?:[\s\S]*[\s\/])?)(?:on(?:d(?:e(?:vice(?:(?:orienta|mo)tion|proximity|found|light)|livery(?:success|error)|activate)|r(?:ag(?:e(?:n(?:ter|d)|xit)|(?:gestur|leav)e|start|drop|over)|op)|i(?:s(?:c(?:hargingtimechange|onnect(?:ing|ed))|abled)|aling)|ata(?:setc(?:omplete|hanged)|(?:availabl|chang)e|error)|urationchange|ownloading|blclick)|Moz(?:M(?:agnifyGesture(?:Update|Start)?|ouse(?:PixelScroll|Hittest))|S(?:wipeGesture(?:Update|Start|End)?|crolledAreaChanged)|(?:(?:Press)?TapGestur|BeforeResiz)e|EdgeUI(?:C(?:omplet|ancel)|Start)ed|RotateGesture(?:Update|Start)?|A(?:udioAvailable|fterPaint))|c(?:o(?:m(?:p(?:osition(?:update|start|end)|lete)|mand(?:update)?)|n(?:t(?:rolselect|extmenu)|nect(?:ing|ed))|py)|a(?:(?:llschang|ch)ed|nplay(?:through)?|rdstatechange)|h(?:(?:arging(?:time)?ch)?ange|ecking)|(?:fstate|ell)change|u(?:echange|t)|l(?:ick|ose))|s(?:t(?:a(?:t(?:uschanged|echange)|lled|rt)|k(?:sessione|comma)nd|op)|e(?:ek(?:complete|ing|ed)|(?:lec(?:tstar)?)?t|n(?:ding|t))|(?:peech|ound)(?:start|end)|u(?:ccess|spend|bmit)|croll|how)|m(?:o(?:z(?:(?:pointerlock|fullscreen)(?:change|error)|(?:orientation|time)change|network(?:down|up)load)|use(?:(?:lea|mo)ve|o(?:ver|ut)|enter|wheel|down|up)|ve(?:start|end)?)|essage|ark)|a(?:n(?:imation(?:iteration|start|end)|tennastatechange)|fter(?:(?:scriptexecu|upda)te|print)|udio(?:process|start|end)|d(?:apteradded|dtrack)|ctivate|lerting|bort)|b(?:e(?:fore(?:(?:(?:de)?activa|scriptexecu)te|u(?:nload|pdate)|p(?:aste|rint)|c(?:opy|ut)|editfocus)|gin(?:Event)?)|oun(?:dary|ce)|l(?:ocked|ur)|roadcast|usy)|DOM(?:Node(?:Inserted(?:IntoDocument)?|Removed(?:FromDocument)?)|(?:CharacterData|Subtree)Modified|A(?:ttrModified|ctivate)|Focus(?:Out|In)|MouseScroll)|r(?:e(?:s(?:u(?:m(?:ing|e)|lt)|ize|et)|adystatechange|pea(?:tEven)?t|movetrack|trieving|ceived)|ow(?:s(?:inserted|delete)|e(?:nter|xit))|atechange)|p(?:op(?:up(?:hid(?:den|ing)|show(?:ing|n))|state)|a(?:ge(?:hide|show)|(?:st|us)e|int)|ro(?:pertychange|gress)|lay(?:ing)?)|t(?:ouch(?:(?:lea|mo)ve|en(?:ter|d)|cancel|start)|ransition(?:cancel|end|run)|ime(?:update|out)|ext)|u(?:s(?:erproximity|sdreceived)|p(?:gradeneeded|dateready)|n(?:derflow|load))|f(?:o(?:rm(?:change|input)|cus(?:out|in)?)|i(?:lterchange|nish)|ailed)|l(?:o(?:ad(?:e(?:d(?:meta)?data|nd)|start)|secapture)|evelchange|y)|g(?:amepad(?:(?:dis)?connected|button(?:down|up)|axismove)|et)|e(?:n(?:d(?:Event|ed)?|abled|ter)|rror(?:update)?|mptied|xit)|i(?:cc(?:cardlockerror|infochange)|n(?:coming|valid|put))|o(?:(?:(?:ff|n)lin|bsolet)e|verflow(?:changed)?|pen)|SVG(?:(?:Unl|L)oad|Resize|Scroll|Abort|Error|Zoom)|h(?:e(?:adphoneschange|l[dp])|ashchange|olding)|v(?:o(?:lum|ic)e|ersion)change|w(?:a(?:it|rn)ing|heel)|key(?:press|down|up)|(?:AppComman|Loa)d|no(?:update|match)|Request|zoom)|s(?:tyle|rc)|background|formaction|lowsrc|ping)[\s\x08]*?=|<[^\w<>]*(?:[^<>\'\s]*:)?[^\w<>]*\W*?(?:(?:a\W*?(?:n\W*?i\W*?m\W*?a\W*?t\W*?e|p\W*?p\W*?l\W*?e\W*?t|u\W*?d\W*?i\W*?o)|b\W*?(?:i\W*?n\W*?d\W*?i\W*?n\W*?g\W*?s|a\W*?s\W*?e|o\W*?d\W*?y)|i?\W*?f\W*?r\W*?a\W*?m\W*?e|o\W*?b\W*?j\W*?e\W*?c\W*?t|i\W*?m\W*?a?\W*?g\W*?e?|e\W*?m\W*?b\W*?e\W*?d|p\W*?a\W*?r\W*?a\W*?m|v\W*?i\W*?d\W*?e\W*?o|l\W*?i\W*?n\W*?k)[^>\w]|s\W*?(?:c\W*?r\W*?i\W*?p\W*?t|t\W*?y\W*?l\W*?e|e\W*?t[^>\w]|v\W*?g)|m\W*?(?:a\W*?r\W*?q\W*?u\W*?e\W*?e|e\W*?t\W*?a[^>\w])|f\W*?o\W*?r\W*?m)#" , "%(?i:<style.*?>.*?(?:@[i\\\\]|(?:[:=]|&#x?0*(?:58|3A|61|3D);?).*?(?:[(\\\\]|&#x?0*(?:40|28|92|5C);?)))%" , "#(?i:<.*[:]?vmlframe.*?[\s/+]*?src[\s/+]*=)#" , "@(?i:(?:j|&#x?0*(?:74|4A|106|6A);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:a|&#x?0*(?:65|41|97|61);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:v|&#x?0*(?:86|56|118|76);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:a|&#x?0*(?:65|41|97|61);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:s|&#x?0*(?:83|53|115|73);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:c|&#x?0*(?:67|43|99|63);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:r|&#x?0*(?:82|52|114|72);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:i|&#x?0*(?:73|49|105|69);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:p|&#x?0*(?:80|50|112|70);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:t|&#x?0*(?:84|54|116|74);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?::|&(?:#x?0*(?:58|3A);?|colon;)).)@" , "@(?i:(?:v|&#x?0*(?:86|56|118|76);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:b|&#x?0*(?:66|42|98|62);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:s|&#x?0*(?:83|53|115|73);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:c|&#x?0*(?:67|43|99|63);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:r|&#x?0*(?:82|52|114|72);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:i|&#x?0*(?:73|49|105|69);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:p|&#x?0*(?:80|50|112|70);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?:t|&#x?0*(?:84|54|116|74);?)(?:\t|&(?:#x?0*(?:9|13|10|A|D);?|tab;|newline;))*(?::|&(?:#x?0*(?:58|3A);?|colon;)).)@" , "#(?i)<EMBED[\s/+].*?(?:src|type).*?=#" , "#<[?]?import[\s\/+\S]*?implementation[\s\/+]*?=#" , "@(?i:<META[\s/+].*?http-equiv[\s/+]*=[\s/+]*[\'`]?(?:(?:c|&#x?0*(?:67|43|99|63);?)|(?:r|&#x?0*(?:82|52|114|72);?)|(?:s|&#x?0*(?:83|53|115|73);?)))@" , "#(?i:<META[\s/+].*?charset[\s/+]*=)#" , "#(?i)<LINK[\s/+].*?href[\s/+]*=#" , "#(?i)<BASE[\s/+].*?href[\s/+]*=#" , "#(?i)<APPLET[\s/+>]#" , "#(?i)<OBJECT[\s/+].*?(?:type|codetype|classid|code|data)[\s/+]*=#" , "#(?:¾|¼).*(?:¾|¼|>)|(?:¾|¼|<).*(?:¾|¼)#" , "#(?:\+ADw\-|\+AD4\-).*(?:\+ADw\-|\+AD4\-|>)|(?:\+ADw\-|\+AD4\-|<).*(?:\+ADw\-|\+AD4\-)#" , "#![!+]\[\]#" , " #(?:self|document|this|top|window)\s*\)*(?:\[[^\]]+\]|\.\s*document|\.\s*cookie)#" );
|
4 |
+
$score['XSS'][1] = array( 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 , 5 );
|
5 |
+
$regex['XSS'][2] = array( "#(?i)\b(?:s(?:tyle|rc)|href)\b[\s\S]*?=#" , "#<(?:a|abbr|acronym|address|applet|area|audioscope|b|base|basefront|bdo|bgsound|big|blackface|blink|blockquote|body|bq|br|button|caption|center|cite|code|col|colgroup|comment|dd|del|dfn|dir|div|dl|dt|em|embed|fieldset|fn|font|form|frame|frameset|h1|head|hr|html|i|iframe|ilayer|img|input|ins|isindex|kdb|keygen|label|layer|legend|li|limittext|link|listing|map|marquee|menu|meta|multicol|nobr|noembed|noframes|noscript|nosmartquotes|object|ol|optgroup|option|p|param|plaintext|pre|q|rt|ruby|s|samp|script|select|server|shadow|sidebar|small|spacer|span|strike|strong|style|sub|sup|table|tbody|td|textarea|tfoot|th|thead|title|tr|tt|u|ul|var|wbr|xml|xmp)\W#" , "#(?i:[\'][]*(?:[^a-z0-9~_:']|in).*?(?:(?:l|\\\\u006C)(?:o|\\\\u006F)(?:c|\\\\u0063)(?:a|\\\\u0061)(?:t|\\\\u0074)(?:i|\\\\u0069)(?:o|\\\\u006F)(?:n|\\\\u006E)|(?:n|\\\\u006E)(?:a|\\\\u0061)(?:m|\\\\u006D)(?:e|\\\\u0065)|(?:o|\\\\u006F)(?:n|\\\\u006E)(?:e|\\\\u0065)(?:r|\\\\u0072)(?:r|\\\\u0072)(?:o|\\\\u006F)(?:r|\\\\u0072)|(?:v|\\\\u0076)(?:a|\\\\u0061)(?:l|\\\\u006C)(?:u|\\\\u0075)(?:e|\\\\u0065)(?:O|\\\\u004F)(?:f|\\\\u0066)).*?=)#" , "#(?i)[\\'][]*(?:[^a-z0-9~_:\']|in).+?[.].+?=#" , " {{.*?}}" );
|
6 |
+
$score['XSS'][2] = array( 5 , 5 , 5 , 5 , 5 );
|
7 |
?>
|
handler/twofa/encryption.php
CHANGED
@@ -1,46 +1,46 @@
|
|
1 |
-
<?php
|
2 |
-
/**
|
3 |
-
* @package miniOrange
|
4 |
-
* @author miniOrange Security Software Pvt. Ltd.
|
5 |
-
* @license GNU/GPLv3
|
6 |
-
* @copyright Copyright 2015 miniOrange. All Rights Reserved.
|
7 |
-
*
|
8 |
-
*
|
9 |
-
* This file is part of miniOrange Gauth plugin.
|
10 |
-
*/
|
11 |
-
|
12 |
-
class mo2f_GAuth_AESEncryption {
|
13 |
-
/**
|
14 |
-
* @param string $data - the key=value pairs separated with &
|
15 |
-
* @return string
|
16 |
-
*/
|
17 |
-
public static function encrypt_data_ga($data, $key) {
|
18 |
-
$plaintext = $data;
|
19 |
-
$ivlen = openssl_cipher_iv_length($cipher="AES-128-CBC");
|
20 |
-
$iv = openssl_random_pseudo_bytes($ivlen);
|
21 |
-
$ciphertext_raw = openssl_encrypt($plaintext, $cipher, $key, $options=OPENSSL_RAW_DATA, $iv);
|
22 |
-
$hmac = hash_hmac('sha256', $ciphertext_raw, $key, $as_binary=true);
|
23 |
-
$ciphertext = base64_encode( $iv.$hmac.$ciphertext_raw );
|
24 |
-
return $ciphertext;
|
25 |
-
}
|
26 |
-
|
27 |
-
|
28 |
-
/**
|
29 |
-
* @param string $data - crypt response from Sagepay
|
30 |
-
* @return string
|
31 |
-
*/
|
32 |
-
public static function decrypt_data($data, $key) {
|
33 |
-
$c = base64_decode($data);
|
34 |
-
$ivlen = openssl_cipher_iv_length($cipher="AES-128-CBC");
|
35 |
-
$iv = substr($c, 0, $ivlen);
|
36 |
-
$hmac = substr($c, $ivlen, $sha2len=32);
|
37 |
-
$ciphertext_raw = substr($c, $ivlen+$sha2len);
|
38 |
-
$original_plaintext = openssl_decrypt($ciphertext_raw, $cipher, $key, $options=OPENSSL_RAW_DATA, $iv);
|
39 |
-
$calcmac = hash_hmac('sha256', $ciphertext_raw, $key, $as_binary=true);
|
40 |
-
|
41 |
-
|
42 |
-
return $original_plaintext;
|
43 |
-
}
|
44 |
-
|
45 |
-
}
|
46 |
?>
|
1 |
+
<?php
|
2 |
+
/**
|
3 |
+
* @package miniOrange
|
4 |
+
* @author miniOrange Security Software Pvt. Ltd.
|
5 |
+
* @license GNU/GPLv3
|
6 |
+
* @copyright Copyright 2015 miniOrange. All Rights Reserved.
|
7 |
+
*
|
8 |
+
*
|
9 |
+
* This file is part of miniOrange Gauth plugin.
|
10 |
+
*/
|
11 |
+
|
12 |
+
class mo2f_GAuth_AESEncryption {
|
13 |
+
/**
|
14 |
+
* @param string $data - the key=value pairs separated with &
|
15 |
+
* @return string
|
16 |
+
*/
|
17 |
+
public static function encrypt_data_ga($data, $key) {
|
18 |
+
$plaintext = $data;
|
19 |
+
$ivlen = openssl_cipher_iv_length($cipher="AES-128-CBC");
|
20 |
+
$iv = openssl_random_pseudo_bytes($ivlen);
|
21 |
+
$ciphertext_raw = openssl_encrypt($plaintext, $cipher, $key, $options=OPENSSL_RAW_DATA, $iv);
|
22 |
+
$hmac = hash_hmac('sha256', $ciphertext_raw, $key, $as_binary=true);
|
23 |
+
$ciphertext = base64_encode( $iv.$hmac.$ciphertext_raw );
|
24 |
+
return $ciphertext;
|
25 |
+
}
|
26 |
+
|
27 |
+
|
28 |
+
/**
|
29 |
+
* @param string $data - crypt response from Sagepay
|
30 |
+
* @return string
|
31 |
+
*/
|
32 |
+
public static function decrypt_data($data, $key) {
|
33 |
+
$c = base64_decode($data);
|
34 |
+
$ivlen = openssl_cipher_iv_length($cipher="AES-128-CBC");
|
35 |
+
$iv = substr($c, 0, $ivlen);
|
36 |
+
$hmac = substr($c, $ivlen, $sha2len=32);
|
37 |
+
$ciphertext_raw = substr($c, $ivlen+$sha2len);
|
38 |
+
$original_plaintext = openssl_decrypt($ciphertext_raw, $cipher, $key, $options=OPENSSL_RAW_DATA, $iv);
|
39 |
+
$calcmac = hash_hmac('sha256', $ciphertext_raw, $key, $as_binary=true);
|
40 |
+
|
41 |
+
|
42 |
+
return $original_plaintext;
|
43 |
+
}
|
44 |
+
|
45 |
+
}
|
46 |
?>
|
handler/twofa/gaonprem.php
CHANGED
@@ -1,251 +1,251 @@
|
|
1 |
-
<?php
|
2 |
-
include_once dirname( __FILE__ ) . DIRECTORY_SEPARATOR.'encryption.php';
|
3 |
-
class Google_auth_onpremise{
|
4 |
-
protected $_codeLength = 6;
|
5 |
-
function __construct(){
|
6 |
-
|
7 |
-
}
|
8 |
-
|
9 |
-
function mo_GAuth_get_details($setupWizard = false)
|
10 |
-
{
|
11 |
-
|
12 |
-
$user=wp_get_current_user();
|
13 |
-
$user_id=$user->ID;
|
14 |
-
|
15 |
-
if(isset($_POST) && isset($_POST['mo2f_session_id'])){
|
16 |
-
$session_id_encrypt = sanitize_text_field($_POST['mo2f_session_id']);
|
17 |
-
}else{
|
18 |
-
$session_id_encrypt = MO2f_Utility::random_str(20);
|
19 |
-
}
|
20 |
-
$secret_ga = MO2f_Utility::mo2f_get_transient($session_id_encrypt, 'secret_ga');
|
21 |
-
if(!$secret_ga){
|
22 |
-
$secret_ga = $this->createSecret();
|
23 |
-
MO2f_Utility::mo2f_set_transient($session_id_encrypt, 'secret_ga', $secret_ga);
|
24 |
-
}
|
25 |
-
|
26 |
-
|
27 |
-
$issuer=get_option('mo2f_google_appname', 'miniOrangeAu');
|
28 |
-
$email=$user->user_email;
|
29 |
-
$otpcode=$this->getCode($secret_ga);
|
30 |
-
$url=$this->geturl($secret_ga ,$issuer,$email);
|
31 |
-
if(!$setupWizard)
|
32 |
-
{
|
33 |
-
echo '<div class="mo2f_table_layout mo2f_table_layout1">';
|
34 |
-
mo2f_configure_google_authenticator_onprem( $secret_ga ,$url,$otpcode, $session_id_encrypt );
|
35 |
-
echo '</div>';
|
36 |
-
}
|
37 |
-
else
|
38 |
-
{
|
39 |
-
mo2f_configure_google_authenticator_setupWizard($secret_ga ,$url,$otpcode, $session_id_encrypt);
|
40 |
-
}
|
41 |
-
}
|
42 |
-
|
43 |
-
function mo_GAuth_set_secret($user_id,$secret){
|
44 |
-
global $Mo2fdbQueries;
|
45 |
-
$key=$this->random_str(8);
|
46 |
-
update_user_meta( $user_id, 'mo2f_get_auth_rnd_string', $key);
|
47 |
-
$secret=mo2f_GAuth_AESEncryption::encrypt_data_ga($secret,$key);
|
48 |
-
update_user_meta( $user_id, 'mo2f_gauth_key', $secret);
|
49 |
-
}
|
50 |
-
|
51 |
-
function mo_GAuth_get_secret($user_id){
|
52 |
-
global $Mo2fdbQueries;
|
53 |
-
$key=get_user_meta( $user_id, 'mo2f_get_auth_rnd_string', true);
|
54 |
-
$secret=get_user_meta( $user_id, 'mo2f_gauth_key', true);
|
55 |
-
$secret=mo2f_GAuth_AESEncryption::decrypt_data($secret,$key);
|
56 |
-
|
57 |
-
return $secret;
|
58 |
-
}
|
59 |
-
|
60 |
-
function random_str($length, $keyspace = '0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ')
|
61 |
-
{
|
62 |
-
$randomString = '';
|
63 |
-
$charactersLength = strlen($keyspace);
|
64 |
-
for ($i = 0; $i < $length; $i++) {
|
65 |
-
$randomString .= $keyspace[rand(0, $charactersLength - 1)];
|
66 |
-
}
|
67 |
-
return $randomString;
|
68 |
-
|
69 |
-
}
|
70 |
-
|
71 |
-
|
72 |
-
|
73 |
-
|
74 |
-
function createSecret($secretLength = 16)
|
75 |
-
{
|
76 |
-
$validChars = $this->_getBase32LookupTable();
|
77 |
-
|
78 |
-
// Valid secret lengths are 80 to 640 bits
|
79 |
-
if ($secretLength < 16 || $secretLength > 128) {
|
80 |
-
throw new Exception('Bad secret length');
|
81 |
-
}
|
82 |
-
$secret = '';
|
83 |
-
$rnd = false;
|
84 |
-
if (function_exists('random_bytes')) {
|
85 |
-
$rnd = random_bytes($secretLength);
|
86 |
-
} elseif (function_exists('openssl_random_pseudo_bytes')) {
|
87 |
-
$rnd = openssl_random_pseudo_bytes($secretLength, $cryptoStrong);
|
88 |
-
if (!$cryptoStrong) {
|
89 |
-
$rnd = false;
|
90 |
-
}
|
91 |
-
}
|
92 |
-
if ($rnd !== false) {
|
93 |
-
for ($i = 0; $i < $secretLength; ++$i) {
|
94 |
-
$secret .= $validChars[ord($rnd[$i]) & 31];
|
95 |
-
}
|
96 |
-
} else {
|
97 |
-
throw new Exception('No source of secure random');
|
98 |
-
}
|
99 |
-
|
100 |
-
return $secret;
|
101 |
-
}
|
102 |
-
|
103 |
-
function _getBase32LookupTable()
|
104 |
-
{
|
105 |
-
return array(
|
106 |
-
'A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', // 7
|
107 |
-
'I', 'J', 'K', 'L', 'M', 'N', 'O', 'P', // 15
|
108 |
-
'Q', 'R', 'S', 'T', 'U', 'V', 'W', 'X', // 23
|
109 |
-
'Y', 'Z', '2', '3', '4', '5', '6', '7', // 31
|
110 |
-
'=', // padding char
|
111 |
-
);
|
112 |
-
}
|
113 |
-
|
114 |
-
function verifyCode($secret, $code,$discrepancy = 3, $currentTimeSlice = null)
|
115 |
-
{
|
116 |
-
global $Mo2fdbQueries;
|
117 |
-
$response=array("status"=>'false');
|
118 |
-
if ($currentTimeSlice === null) {
|
119 |
-
$currentTimeSlice = floor(time() / 30);
|
120 |
-
}
|
121 |
-
|
122 |
-
if (strlen($code) != 6) {
|
123 |
-
return json_encode($response);
|
124 |
-
}
|
125 |
-
for ($i = -$discrepancy; $i <= $discrepancy; ++$i) {
|
126 |
-
$calculatedCode = $this->getCode($secret, $currentTimeSlice + $i);
|
127 |
-
if ($this->timingSafeEquals($calculatedCode, $code)) {
|
128 |
-
update_option('mo2f_time_slice', $i);
|
129 |
-
$response['status']='SUCCESS';
|
130 |
-
return json_encode($response);
|
131 |
-
}
|
132 |
-
}
|
133 |
-
return json_encode($response);
|
134 |
-
}
|
135 |
-
|
136 |
-
function geturl($secret,$issuer,$email){
|
137 |
-
// id can be email or name
|
138 |
-
$url="otpauth://totp/";
|
139 |
-
|
140 |
-
$url.=$email."?secret=".$secret."&issuer=".$issuer;
|
141 |
-
return $url;
|
142 |
-
|
143 |
-
//aksjdbdzcaasd?secret=4RNWQWBQH4JDPABP&issuer=miniOrange/competits";
|
144 |
-
|
145 |
-
}
|
146 |
-
|
147 |
-
function timingSafeEquals($safeString, $userString)
|
148 |
-
{
|
149 |
-
if (function_exists('hash_equals')) {
|
150 |
-
return hash_equals($safeString, $userString);
|
151 |
-
}
|
152 |
-
$safeLen = strlen($safeString);
|
153 |
-
$userLen = strlen($userString);
|
154 |
-
|
155 |
-
if ($userLen != $safeLen) {
|
156 |
-
return false;
|
157 |
-
}
|
158 |
-
|
159 |
-
$result = 0;
|
160 |
-
|
161 |
-
for ($i = 0; $i < $userLen; ++$i) {
|
162 |
-
$result |= (ord($safeString[$i]) ^ ord($userString[$i]));
|
163 |
-
}
|
164 |
-
|
165 |
-
// They are only identical strings if $result is exactly 0...
|
166 |
-
return $result === 0;
|
167 |
-
}
|
168 |
-
|
169 |
-
function getCode($secret, $timeSlice = null)
|
170 |
-
{
|
171 |
-
if ($timeSlice === null) {
|
172 |
-
$timeSlice = floor(time() / 30);
|
173 |
-
}
|
174 |
-
|
175 |
-
$secretkey = $this->_base32Decode($secret);
|
176 |
-
// Pack time into binary string
|
177 |
-
$time = chr(0).chr(0).chr(0).chr(0). pack('N*', $timeSlice);
|
178 |
-
// Hash it with users secret key
|
179 |
-
$hm = hash_hmac('SHA1', $time, $secretkey, true);
|
180 |
-
|
181 |
-
// Use last nipple of result as index/offset
|
182 |
-
$offset = ord(substr($hm, -1)) & 0x0F;
|
183 |
-
|
184 |
-
// grab 4 bytes of the result
|
185 |
-
$hashpart = substr($hm, $offset, 4);
|
186 |
-
// Unpak binary value
|
187 |
-
$value = unpack('N', $hashpart);
|
188 |
-
$value = $value[1];
|
189 |
-
// Only 32 bits
|
190 |
-
$value = $value & 0x7FFFFFFF;
|
191 |
-
$modulo = pow(10, $this->_codeLength);
|
192 |
-
return str_pad($value % $modulo, $this->_codeLength, '0', STR_PAD_LEFT);
|
193 |
-
}
|
194 |
-
|
195 |
-
function _base32Decode($secret)
|
196 |
-
{
|
197 |
-
if (empty($secret)) {
|
198 |
-
return '';
|
199 |
-
}
|
200 |
-
$base32chars = $this->_getBase32LookupTable();
|
201 |
-
$base32charsFlipped = array_flip($base32chars);
|
202 |
-
|
203 |
-
$paddingCharCount = substr_count($secret, $base32chars[32]);
|
204 |
-
$allowedValues = array(6, 4, 3, 1, 0);
|
205 |
-
if (!in_array($paddingCharCount, $allowedValues)) {
|
206 |
-
return false;
|
207 |
-
}
|
208 |
-
|
209 |
-
|
210 |
-
for ($i = 0; $i < 4; ++$i) {
|
211 |
-
if ($paddingCharCount == $allowedValues[$i] &&
|
212 |
-
substr($secret, -($allowedValues[$i])) != str_repeat($base32chars[32], $allowedValues[$i])) {
|
213 |
-
return false;
|
214 |
-
}
|
215 |
-
}
|
216 |
-
$secret = str_replace('=', '', $secret);
|
217 |
-
$secret = str_split($secret);
|
218 |
-
$binaryString = '';
|
219 |
-
for ($i = 0; $i < count($secret); $i = $i + 8) {
|
220 |
-
$x = '';
|
221 |
-
if (!in_array($secret[$i], $base32chars)) {
|
222 |
-
return false;
|
223 |
-
}
|
224 |
-
for ($j = 0; $j < 8; ++$j) {
|
225 |
-
|
226 |
-
$x .= str_pad(base_convert(@$base32charsFlipped[@$secret[$i + $j]], 10, 2), 5, '0', STR_PAD_LEFT);
|
227 |
-
}
|
228 |
-
$eightBits = str_split($x, 8);
|
229 |
-
for ($z = 0; $z < count($eightBits); ++$z) {
|
230 |
-
$binaryString .= (($y = chr(base_convert($eightBits[$z], 2, 10))) || ord($y) == 48) ? $y : '';
|
231 |
-
|
232 |
-
}
|
233 |
-
}
|
234 |
-
|
235 |
-
return $binaryString;
|
236 |
-
}
|
237 |
-
|
238 |
-
public static function mo2f_GAuth_get_option($option,$val=null){
|
239 |
-
if(is_multisite()){
|
240 |
-
|
241 |
-
$val=get_site_option($option,$val);
|
242 |
-
|
243 |
-
}else{
|
244 |
-
$val=get_option($option,$val);
|
245 |
-
}
|
246 |
-
|
247 |
-
return $val;
|
248 |
-
|
249 |
-
}
|
250 |
-
}
|
251 |
?>
|
1 |
+
<?php
|
2 |
+
include_once dirname( __FILE__ ) . DIRECTORY_SEPARATOR.'encryption.php';
|
3 |
+
class Google_auth_onpremise{
|
4 |
+
protected $_codeLength = 6;
|
5 |
+
function __construct(){
|
6 |
+
|
7 |
+
}
|
8 |
+
|
9 |
+
function mo_GAuth_get_details($setupWizard = false)
|
10 |
+
{
|
11 |
+
|
12 |
+
$user=wp_get_current_user();
|
13 |
+
$user_id=$user->ID;
|
14 |
+
|
15 |
+
if(isset($_POST) && isset($_POST['mo2f_session_id'])){
|
16 |
+
$session_id_encrypt = sanitize_text_field($_POST['mo2f_session_id']);
|
17 |
+
}else{
|
18 |
+
$session_id_encrypt = MO2f_Utility::random_str(20);
|
19 |
+
}
|
20 |
+
$secret_ga = MO2f_Utility::mo2f_get_transient($session_id_encrypt, 'secret_ga');
|
21 |
+
if(!$secret_ga){
|
22 |
+
$secret_ga = $this->createSecret();
|
23 |
+
MO2f_Utility::mo2f_set_transient($session_id_encrypt, 'secret_ga', $secret_ga);
|
24 |
+
}
|
25 |
+
|
26 |
+
|
27 |
+
$issuer=get_option('mo2f_google_appname', 'miniOrangeAu');
|
28 |
+
$email=$user->user_email;
|
29 |
+
$otpcode=$this->getCode($secret_ga);
|
30 |
+
$url=$this->geturl($secret_ga ,$issuer,$email);
|
31 |
+
if(!$setupWizard)
|
32 |
+
{
|
33 |
+
echo '<div class="mo2f_table_layout mo2f_table_layout1">';
|
34 |
+
mo2f_configure_google_authenticator_onprem( $secret_ga ,$url,$otpcode, $session_id_encrypt );
|
35 |
+
echo '</div>';
|
36 |
+
}
|
37 |
+
else
|
38 |
+
{
|
39 |
+
mo2f_configure_google_authenticator_setupWizard($secret_ga ,$url,$otpcode, $session_id_encrypt);
|
40 |
+
}
|
41 |
+
}
|
42 |
+
|
43 |
+
function mo_GAuth_set_secret($user_id,$secret){
|
44 |
+
global $Mo2fdbQueries;
|
45 |
+
$key=$this->random_str(8);
|
46 |
+
update_user_meta( $user_id, 'mo2f_get_auth_rnd_string', $key);
|
47 |
+
$secret=mo2f_GAuth_AESEncryption::encrypt_data_ga($secret,$key);
|
48 |
+
update_user_meta( $user_id, 'mo2f_gauth_key', $secret);
|
49 |
+
}
|
50 |
+
|
51 |
+
function mo_GAuth_get_secret($user_id){
|
52 |
+
global $Mo2fdbQueries;
|
53 |
+
$key=get_user_meta( $user_id, 'mo2f_get_auth_rnd_string', true);
|
54 |
+
$secret=get_user_meta( $user_id, 'mo2f_gauth_key', true);
|
55 |
+
$secret=mo2f_GAuth_AESEncryption::decrypt_data($secret,$key);
|
56 |
+
|
57 |
+
return $secret;
|
58 |
+
}
|
59 |
+
|
60 |
+
function random_str($length, $keyspace = '0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ')
|
61 |
+
{
|
62 |
+
$randomString = '';
|
63 |
+
$charactersLength = strlen($keyspace);
|
64 |
+
for ($i = 0; $i < $length; $i++) {
|
65 |
+
$randomString .= $keyspace[rand(0, $charactersLength - 1)];
|
66 |
+
}
|
67 |
+
return $randomString;
|
68 |
+
|
69 |
+
}
|
70 |
+
|
71 |
+
|
72 |
+
|
73 |
+
|
74 |
+
function createSecret($secretLength = 16)
|
75 |
+
{
|
76 |
+
$validChars = $this->_getBase32LookupTable();
|
77 |
+
|
78 |
+
// Valid secret lengths are 80 to 640 bits
|
79 |
+
if ($secretLength < 16 || $secretLength > 128) {
|
80 |
+
throw new Exception('Bad secret length');
|
81 |
+
}
|
82 |
+
$secret = '';
|
83 |
+
$rnd = false;
|
84 |
+
if (function_exists('random_bytes')) {
|
85 |
+
$rnd = random_bytes($secretLength);
|
86 |
+
} elseif (function_exists('openssl_random_pseudo_bytes')) {
|
87 |
+
$rnd = openssl_random_pseudo_bytes($secretLength, $cryptoStrong);
|
88 |
+
if (!$cryptoStrong) {
|
89 |
+
$rnd = false;
|
90 |
+
}
|
91 |
+
}
|
92 |
+
if ($rnd !== false) {
|
93 |
+
for ($i = 0; $i < $secretLength; ++$i) {
|
94 |
+
$secret .= $validChars[ord($rnd[$i]) & 31];
|
95 |
+
}
|
96 |
+
} else {
|
97 |
+
throw new Exception('No source of secure random');
|
98 |
+
}
|
99 |
+
|
100 |
+
return $secret;
|
101 |
+
}
|
102 |
+
|
103 |
+
function _getBase32LookupTable()
|
104 |
+
{
|
105 |
+
return array(
|
106 |
+
'A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', // 7
|
107 |
+
'I', 'J', 'K', 'L', 'M', 'N', 'O', 'P', // 15
|
108 |
+
'Q', 'R', 'S', 'T', 'U', 'V', 'W', 'X', // 23
|
109 |
+
'Y', 'Z', '2', '3', '4', '5', '6', '7', // 31
|
110 |
+
'=', // padding char
|
111 |
+
);
|
112 |
+
}
|
113 |
+
|
114 |
+
function verifyCode($secret, $code,$discrepancy = 3, $currentTimeSlice = null)
|
115 |
+
{
|
116 |
+
global $Mo2fdbQueries;
|
117 |
+
$response=array("status"=>'false');
|
118 |
+
if ($currentTimeSlice === null) {
|
119 |
+
$currentTimeSlice = floor(time() / 30);
|
120 |
+
}
|
121 |
+
|
122 |
+
if (strlen($code) != 6) {
|
123 |
+
return json_encode($response);
|
124 |
+
}
|
125 |
+
for ($i = -$discrepancy; $i <= $discrepancy; ++$i) {
|
126 |
+
$calculatedCode = $this->getCode($secret, $currentTimeSlice + $i);
|
127 |
+
if ($this->timingSafeEquals($calculatedCode, $code)) {
|
128 |
+
update_option('mo2f_time_slice', $i);
|
129 |
+
$response['status']='SUCCESS';
|
130 |
+
return json_encode($response);
|
131 |
+
}
|
132 |
+
}
|
133 |
+
return json_encode($response);
|
134 |
+
}
|
135 |
+
|
136 |
+
function geturl($secret,$issuer,$email){
|
137 |
+
// id can be email or name
|
138 |
+
$url="otpauth://totp/";
|
139 |
+
|
140 |
+
$url.=$email."?secret=".$secret."&issuer=".$issuer;
|
141 |
+
return $url;
|
142 |
+
|
143 |
+
//aksjdbdzcaasd?secret=4RNWQWBQH4JDPABP&issuer=miniOrange/competits";
|
144 |
+
|
145 |
+
}
|
146 |
+
|
147 |
+
function timingSafeEquals($safeString, $userString)
|
148 |
+
{
|
149 |
+
if (function_exists('hash_equals')) {
|
150 |
+
return hash_equals($safeString, $userString);
|
151 |
+
}
|
152 |
+
$safeLen = strlen($safeString);
|
153 |
+
$userLen = strlen($userString);
|
154 |
+
|
155 |
+
if ($userLen != $safeLen) {
|
156 |
+
return false;
|
157 |
+
}
|
158 |
+
|
159 |
+
$result = 0;
|
160 |
+
|
161 |
+
for ($i = 0; $i < $userLen; ++$i) {
|
162 |
+
$result |= (ord($safeString[$i]) ^ ord($userString[$i]));
|
163 |
+
}
|
164 |
+
|
165 |
+
// They are only identical strings if $result is exactly 0...
|
166 |
+
return $result === 0;
|
167 |
+
}
|
168 |
+
|
169 |
+
function getCode($secret, $timeSlice = null)
|
170 |
+
{
|
171 |
+
if ($timeSlice === null) {
|
172 |
+
$timeSlice = floor(time() / 30);
|
173 |
+
}
|
174 |
+
|
175 |
+
$secretkey = $this->_base32Decode($secret);
|
176 |
+
// Pack time into binary string
|
177 |
+
$time = chr(0).chr(0).chr(0).chr(0). pack('N*', $timeSlice);
|
178 |
+
// Hash it with users secret key
|
179 |
+
$hm = hash_hmac('SHA1', $time, $secretkey, true);
|
180 |
+
|
181 |
+
// Use last nipple of result as index/offset
|
182 |
+
$offset = ord(substr($hm, -1)) & 0x0F;
|
183 |
+
|
184 |
+
// grab 4 bytes of the result
|
185 |
+
$hashpart = substr($hm, $offset, 4);
|
186 |
+
// Unpak binary value
|
187 |
+
$value = unpack('N', $hashpart);
|
188 |
+
$value = $value[1];
|
189 |
+
// Only 32 bits
|
190 |
+
$value = $value & 0x7FFFFFFF;
|
191 |
+
$modulo = pow(10, $this->_codeLength);
|
192 |
+
return str_pad($value % $modulo, $this->_codeLength, '0', STR_PAD_LEFT);
|
193 |
+
}
|
194 |
+
|
195 |
+
function _base32Decode($secret)
|
196 |
+
{
|
197 |
+
if (empty($secret)) {
|
198 |
+
return '';
|
199 |
+
}
|
200 |
+
$base32chars = $this->_getBase32LookupTable();
|
201 |
+
$base32charsFlipped = array_flip($base32chars);
|
202 |
+
|
203 |
+
$paddingCharCount = substr_count($secret, $base32chars[32]);
|
204 |
+
$allowedValues = array(6, 4, 3, 1, 0);
|
205 |
+
if (!in_array($paddingCharCount, $allowedValues)) {
|
206 |
+
return false;
|
207 |
+
}
|
208 |
+
|
209 |
+
|
210 |
+
for ($i = 0; $i < 4; ++$i) {
|
211 |
+
if ($paddingCharCount == $allowedValues[$i] &&
|
212 |
+
substr($secret, -($allowedValues[$i])) != str_repeat($base32chars[32], $allowedValues[$i])) {
|
213 |
+
return false;
|
214 |
+
}
|
215 |
+
}
|
216 |
+
$secret = str_replace('=', '', $secret);
|
217 |
+
$secret = str_split($secret);
|
218 |
+
$binaryString = '';
|
219 |
+
for ($i = 0; $i < count($secret); $i = $i + 8) {
|
220 |
+
$x = '';
|
221 |
+
if (!in_array($secret[$i], $base32chars)) {
|
222 |
+
return false;
|
223 |
+
}
|
224 |
+
for ($j = 0; $j < 8; ++$j) {
|
225 |
+
|
226 |
+
$x .= str_pad(base_convert(@$base32charsFlipped[@$secret[$i + $j]], 10, 2), 5, '0', STR_PAD_LEFT);
|
227 |
+
}
|
228 |
+
$eightBits = str_split($x, 8);
|
229 |
+
for ($z = 0; $z < count($eightBits); ++$z) {
|
230 |
+
$binaryString .= (($y = chr(base_convert($eightBits[$z], 2, 10))) || ord($y) == 48) ? $y : '';
|
231 |
+
|
232 |
+
}
|
233 |
+
}
|
234 |
+
|
235 |
+
return $binaryString;
|
236 |
+
}
|
237 |
+
|
238 |
+
public static function mo2f_GAuth_get_option($option,$val=null){
|
239 |
+
if(is_multisite()){
|
240 |
+
|
241 |
+
$val=get_site_option($option,$val);
|
242 |
+
|
243 |
+
}else{
|
244 |
+
$val=get_option($option,$val);
|
245 |
+
}
|
246 |
+
|
247 |
+
return $val;
|
248 |
+
|
249 |
+
}
|
250 |
+
}
|
251 |
?>
|
handler/twofa/two_fa_constants.php
CHANGED
@@ -1,454 +1,454 @@
|
|
1 |
-
<?php
|
2 |
-
if ( ! defined( 'ABSPATH' ) ) {
|
3 |
-
exit;
|
4 |
-
}
|
5 |
-
|
6 |
-
class Mo2fConstants {
|
7 |
-
static function langTranslate( $text ) {
|
8 |
-
switch ( $text ) {
|
9 |
-
case 'Successfully validated.':
|
10 |
-
return mo2f_lt( 'Successfully validated.' );
|
11 |
-
break;
|
12 |
-
case 'SCAN_QR_CODE':
|
13 |
-
return mo2f_lt( 'Please scan the QR Code now.' );
|
14 |
-
break;
|
15 |
-
case 'miniOrange QR Code Authentication':
|
16 |
-
return mo2f_lt( 'miniOrange QR Code Authentication' );
|
17 |
-
break;
|
18 |
-
case 'miniOrange Push Notification':
|
19 |
-
return mo2f_lt( 'miniOrange Push Notification' );
|
20 |
-
break;
|
21 |
-
case 'miniOrange Soft Token':
|
22 |
-
return mo2f_lt( 'miniOrange Soft Token' );
|
23 |
-
break;
|
24 |
-
case 'Security Questions':
|
25 |
-
return mo2f_lt( 'Security Questions' );
|
26 |
-
break;
|
27 |
-
case 'Google Authenticator':
|
28 |
-
return mo2f_lt( 'Google Authenticator' );
|
29 |
-
break;
|
30 |
-
case 'Authy Authenticator':
|
31 |
-
return mo2f_lt( 'Authy Authenticator' );
|
32 |
-
break;
|
33 |
-
case 'Email Verification':
|
34 |
-
return mo2f_lt( 'Email Verification' );
|
35 |
-
break;
|
36 |
-
case 'OTP Over SMS':
|
37 |
-
return mo2f_lt( 'OTP Over SMS' );
|
38 |
-
break;
|
39 |
-
case 'OTP Over SMS And Email':
|
40 |
-
return mo2f_lt( 'OTP Over SMS And Email' );
|
41 |
-
break;
|
42 |
-
case 'Your license has expired. Please renew your license to continue using our service.':
|
43 |
-
return mo2f_lt( 'Your license has expired. Please renew your license to continue using our service.' );
|
44 |
-
break;
|
45 |
-
case 'The total transaction limit has been exceeded. Please upgrade your premium plan.':
|
46 |
-
return mo2f_lt( 'The total transaction limit has been exceeded. Please upgrade your premium plan.' );
|
47 |
-
break;
|
48 |
-
case 'The transaction limit has exceeded.':
|
49 |
-
return mo2f_lt( 'The transaction limit has exceeded.' );
|
50 |
-
break;
|
51 |
-
case 'GenerateOtpRequest is null':
|
52 |
-
return mo2f_lt( 'GenerateOtpRequest is null' );
|
53 |
-
break;
|
54 |
-
case 'The sms transaction limit has been exceeded. Please refer to the Licensing Plans tab for purchasing your SMS transactions.':
|
55 |
-
return mo2f_lt( 'The sms transaction limit has been exceeded. Please refer to the Licensing Plans tab for purchasing your SMS transactions.' );
|
56 |
-
break;
|
57 |
-
case 'The email transaction limit has been exceeded. Please refer to the Licensing Plans tab for purchasing your SMS transactions.':
|
58 |
-
return mo2f_lt( 'The email transaction limit has been exceeded. Please refer to the Licensing Plans tab for purchasing your SMS transactions.' );
|
59 |
-
break;
|
60 |
-
case 'Transaction limit exceeded. Please contact your administrator':
|
61 |
-
return mo2f_lt( 'Transaction limit exceeded. Please contact your administrator' );
|
62 |
-
break;
|
63 |
-
case 'Free Trial has already been taken or expired for this plugin. Please upgrade to a premium plan.':
|
64 |
-
return mo2f_lt( 'Free Trial has already been taken or expired for this plugin. Please upgrade to a premium plan.' );
|
65 |
-
break;
|
66 |
-
case 'Invalid format.':
|
67 |
-
return mo2f_lt( 'Invalid format.' );
|
68 |
-
break;
|
69 |
-
case 'Mobile registration failed.':
|
70 |
-
return mo2f_lt( 'Mobile registration failed.' );
|
71 |
-
break;
|
72 |
-
case 'Invalid mobile authentication request.':
|
73 |
-
return mo2f_lt( 'Invalid mobile authentication request.' );
|
74 |
-
break;
|
75 |
-
case 'Exception during SMS sending':
|
76 |
-
return mo2f_lt( 'Exception during SMS sending' );
|
77 |
-
break;
|
78 |
-
case 'There was an error during sending an SMS.':
|
79 |
-
return mo2f_lt( 'There was an error during sending an SMS.' );
|
80 |
-
break;
|
81 |
-
case 'Exception during logUserTransaction':
|
82 |
-
return mo2f_lt( 'Exception during logUserTransaction' );
|
83 |
-
break;
|
84 |
-
case 'There was an error processing the challenge user request.':
|
85 |
-
return mo2f_lt( 'There was an error processing the challenge user request.' );
|
86 |
-
break;
|
87 |
-
case 'What is your first company name?':
|
88 |
-
return mo2f_lt( 'What is your first company name?' );
|
89 |
-
break;
|
90 |
-
case 'What was your childhood nickname?':
|
91 |
-
return mo2f_lt( 'What was your childhood nickname?' );
|
92 |
-
break;
|
93 |
-
case 'In what city did you meet your spouse/significant other?':
|
94 |
-
return mo2f_lt( 'In what city did you meet your spouse/significant other?' );
|
95 |
-
break;
|
96 |
-
case 'What is the name of your favorite childhood friend?':
|
97 |
-
return mo2f_lt( 'What is the name of your favorite childhood friend?' );
|
98 |
-
break;
|
99 |
-
case "What was your first vehicle's registration number?":
|
100 |
-
return mo2f_lt( "What was your first vehicle's registration number?" );
|
101 |
-
break;
|
102 |
-
case "What is your grandmother's maiden name?":
|
103 |
-
return mo2f_lt( "What is your grandmother's maiden name?" );
|
104 |
-
break;
|
105 |
-
case 'Who is your favourite sports player?':
|
106 |
-
return mo2f_lt( 'Who is your favourite sports player?' );
|
107 |
-
break;
|
108 |
-
case 'What is your favourite sport?':
|
109 |
-
return mo2f_lt( 'What is your favourite sport?' );
|
110 |
-
break;
|
111 |
-
case 'In what city or town was your first job':
|
112 |
-
return mo2f_lt( 'In what city or town was your first job' );
|
113 |
-
break;
|
114 |
-
case 'What school did you attend for sixth grade?':
|
115 |
-
return mo2f_lt( 'What school did you attend for sixth grade?' );
|
116 |
-
break;
|
117 |
-
case 'G_AUTH':
|
118 |
-
return mo2f_lt( 'Google Authenticator' );
|
119 |
-
break;
|
120 |
-
case 'AUTHY_2FA':
|
121 |
-
return mo2f_lt( 'Authy 2-Factor Authentication' );
|
122 |
-
break;
|
123 |
-
case 'An unknown error occurred while creating the end user.':
|
124 |
-
return mo2f_lt( 'An unknown error occurred while creating the end user.' );
|
125 |
-
break;
|
126 |
-
case 'An unknown error occurred while challenging the user':
|
127 |
-
return mo2f_lt( 'An unknown error occurred while challenging the user.' );
|
128 |
-
break;
|
129 |
-
case 'An unknown error occurred while generating QR Code for registering mobile.':
|
130 |
-
return mo2f_lt( 'An unknown error occurred while generating QR Code for registering mobile.' );
|
131 |
-
break;
|
132 |
-
case 'An unknown error occurred while validating the user\'s identity.':
|
133 |
-
return mo2f_lt( 'An unknown error occurred while validating the user\'s identity.' );
|
134 |
-
break;
|
135 |
-
case 'Customer not found.':
|
136 |
-
return mo2f_lt( 'Customer not found.' );
|
137 |
-
break;
|
138 |
-
case 'The customer is not valid ':
|
139 |
-
return mo2f_lt( 'The customer is not valid' );
|
140 |
-
break;
|
141 |
-
case 'The user is not valid ':
|
142 |
-
return mo2f_lt( 'The user is not valid ' );
|
143 |
-
break;
|
144 |
-
case 'Customer already exists.':
|
145 |
-
return mo2f_lt( 'Customer already exists.' );
|
146 |
-
break;
|
147 |
-
case 'Customer Name is null':
|
148 |
-
return mo2f_lt( 'Customer Name is null' );
|
149 |
-
break;
|
150 |
-
case 'Customer check request failed.':
|
151 |
-
return mo2f_lt( 'Customer check request failed.' );
|
152 |
-
break;
|
153 |
-
case 'Invalid username or password. Please try again.':
|
154 |
-
return mo2f_lt( 'Invalid username or password. Please try again.' );
|
155 |
-
break;
|
156 |
-
case 'You are not authorized to perform this operation.':
|
157 |
-
return mo2f_lt( 'You are not authorized to perform this operation.' );
|
158 |
-
break;
|
159 |
-
case 'Invalid request. No such challenge request was initiated.':
|
160 |
-
return mo2f_lt( 'Invalid request. No such challenge request was initiated.' );
|
161 |
-
break;
|
162 |
-
case 'No OTP Token for the given request was found.':
|
163 |
-
return mo2f_lt( 'No OTP Token for the given request was found.' );
|
164 |
-
break;
|
165 |
-
case 'Query submitted.':
|
166 |
-
return mo2f_lt( 'Query submitted.' );
|
167 |
-
break;
|
168 |
-
case 'Invalid parameters.':
|
169 |
-
return mo2f_lt( 'Invalid parameters.' );
|
170 |
-
break;
|
171 |
-
case 'Alternate email cannot be same as primary email.':
|
172 |
-
return mo2f_lt( 'Alternate email cannot be same as primary email.' );
|
173 |
-
break;
|
174 |
-
case 'CustomerId is null.':
|
175 |
-
return mo2f_lt( 'CustomerId is null.' );
|
176 |
-
break;
|
177 |
-
case 'You are not authorized to create users. Please upgrade to premium plan. ':
|
178 |
-
return mo2f_lt( 'You are not authorized to create users. Please upgrade to premium plan. ' );
|
179 |
-
break;
|
180 |
-
case 'Your user creation limit has been completed. Please upgrade your license to add more users.':
|
181 |
-
return mo2f_lt( 'Your user creation limit has been completed. Please upgrade your license to add more users.' );
|
182 |
-
break;
|
183 |
-
case 'Username cannot be blank.':
|
184 |
-
return mo2f_lt( 'Username cannot be blank.' );
|
185 |
-
break;
|
186 |
-
case 'End user created successfully.':
|
187 |
-
return mo2f_lt( 'End user created successfully.' );
|
188 |
-
break;
|
189 |
-
case 'There was an exception processing the update user request.':
|
190 |
-
return mo2f_lt( 'There was an exception processing the update user request.' );
|
191 |
-
break;
|
192 |
-
case 'End user found.':
|
193 |
-
return mo2f_lt( 'End user found.' );
|
194 |
-
break;
|
195 |
-
case 'End user found under different customer. ':
|
196 |
-
return mo2f_lt( 'End user found under different customer. ' );
|
197 |
-
break;
|
198 |
-
case 'End user not found.':
|
199 |
-
return mo2f_lt( 'End user not found.' );
|
200 |
-
break;
|
201 |
-
case 'Customer successfully registered.':
|
202 |
-
return mo2f_lt( 'Customer successfully registered.' );
|
203 |
-
break;
|
204 |
-
case 'Customer registration failed.':
|
205 |
-
return mo2f_lt( 'Customer registration failed.' );
|
206 |
-
break;
|
207 |
-
case 'There was an error processing the register mobile request.':
|
208 |
-
return mo2f_lt( 'There was an error processing the register mobile request.' );
|
209 |
-
break;
|
210 |
-
case 'There was an exception processing the get user request.':
|
211 |
-
return mo2f_lt( 'There was an exception processing the get user request.' );
|
212 |
-
break;
|
213 |
-
case 'End User retrieved successfully.':
|
214 |
-
return mo2f_lt( 'End User retrieved successfully.' );
|
215 |
-
break;
|
216 |
-
case 'COMPLETED_TEST':
|
217 |
-
Return mo2f_lt( 'You have successfully completed the test.' );
|
218 |
-
break;
|
219 |
-
case 'INVALID_EMAIL_VER_REQ':
|
220 |
-
Return mo2f_lt( 'Invalid request. test case failed.');
|
221 |
-
break;
|
222 |
-
case 'INVALID_ENTRY':
|
223 |
-
Return mo2f_lt( 'All the fields are required. Please enter valid entries.' );
|
224 |
-
break;
|
225 |
-
case 'INVALID_PASSWORD':
|
226 |
-
Return mo2f_lt( 'You already have an account with miniOrange. Please enter a valid password.' );
|
227 |
-
break;
|
228 |
-
case 'INVALID_REQ':
|
229 |
-
Return mo2f_lt( 'Invalid request. Please try again' );
|
230 |
-
break;
|
231 |
-
case 'INVALID_OTP':
|
232 |
-
Return mo2f_lt( 'Invalid OTP. Please try again.' );
|
233 |
-
break;
|
234 |
-
case 'INVALID_EMAIL_OR_PASSWORD':
|
235 |
-
Return mo2f_lt( 'Invalid email or password. Please try again.' );
|
236 |
-
break;
|
237 |
-
case 'PASSWORDS_MISMATCH':
|
238 |
-
Return mo2f_lt( 'Password and Confirm password do not match.' );
|
239 |
-
break;
|
240 |
-
case 'ENTER_YOUR_EMAIL_PASSWORD':
|
241 |
-
Return mo2f_lt( 'Please enter your registered email and password.' );
|
242 |
-
break;
|
243 |
-
case 'OTP_SENT':
|
244 |
-
Return mo2f_lt( 'One Time Passcode has been sent for verification to ' );
|
245 |
-
break;
|
246 |
-
case 'ERROR_IN_SENDING_OTP_OVER_EMAIL':
|
247 |
-
Return mo2f_lt( 'There was an error in sending OTP over email. Please click on Resend OTP to try again.' );
|
248 |
-
break;
|
249 |
-
case 'ERROR_DURING_REGISTRATION':
|
250 |
-
Return mo2f_lt( 'Error occured while registration. Please try again.' );
|
251 |
-
break;
|
252 |
-
case 'ERROR_DURING_PROCESS':
|
253 |
-
Return mo2f_lt( 'An error occured while processing your request. Please Try again.' );
|
254 |
-
break;
|
255 |
-
case 'ERROR_DURING_PROCESS_EMAIL':
|
256 |
-
Return mo2f_lt( 'An error occured while processing your request. Please check your SMTP server is configured.' );
|
257 |
-
break;
|
258 |
-
case 'ERROR_WHILE_SENDING_SMS':
|
259 |
-
Return mo2f_lt( 'There was an error in sending sms. Please click on Resend OTP to try again.' );
|
260 |
-
break;
|
261 |
-
case 'ERROR_DURING_USER_REGISTRATION':
|
262 |
-
Return mo2f_lt( 'Error occurred while registering the user. Please try again.' );
|
263 |
-
break;
|
264 |
-
case 'VALIDATE_DUO':
|
265 |
-
Return mo2f_lt( 'Duo push notification validate successfully.' );
|
266 |
-
break;
|
267 |
-
case 'SET_AS_2ND_FACTOR':
|
268 |
-
Return mo2f_lt( 'is set as your 2 factor authentication method.' );
|
269 |
-
break;
|
270 |
-
case 'ERROR_WHILE_SAVING_KBA':
|
271 |
-
Return mo2f_lt( 'Error occured while saving your kba details. Please try again.' );
|
272 |
-
break;
|
273 |
-
case 'ANSWER_SECURITY_QUESTIONS':
|
274 |
-
Return mo2f_lt( 'Please answer the following security questions.' );
|
275 |
-
break;
|
276 |
-
|
277 |
-
case 'BACKUP_CODE_LIMIT_REACH':
|
278 |
-
Return mo2f_lt( 'You have already downloaded the backup codes for this domain.' );
|
279 |
-
break;
|
280 |
-
case 'BACKUP_CODE_DOMAIN_LIMIT_REACH':
|
281 |
-
Return mo2f_lt( 'User Limit is reached for your domain.' );
|
282 |
-
break;
|
283 |
-
case 'BACKUP_CODE_INVALID_REQUEST':
|
284 |
-
Return mo2f_lt( 'Invalid request.' );
|
285 |
-
break;
|
286 |
-
case 'USED_ALL_BACKUP_CODES':
|
287 |
-
Return mo2f_lt( 'You have used all of the backup codes' );
|
288 |
-
break;
|
289 |
-
case 'RESET_DUO_CONFIGURATON':
|
290 |
-
Return mo2f_lt( 'Your Duo configuration has been reset successfully.' );
|
291 |
-
break;
|
292 |
-
case 'ERROR_FETCHING_QUESTIONS':
|
293 |
-
Return mo2f_lt( 'There was an error fetching security questions. Please try again.' );
|
294 |
-
break;
|
295 |
-
case 'INVALID_ANSWERS':
|
296 |
-
Return mo2f_lt( 'Invalid Answers. Please try again.' );
|
297 |
-
break;
|
298 |
-
case 'MIN_PASS_LENGTH':
|
299 |
-
Return mo2f_lt( 'Choose a password with minimum length 6.' );
|
300 |
-
break;
|
301 |
-
case 'ACCOUNT_RETRIEVED_SUCCESSFULLY':
|
302 |
-
Return mo2f_lt( 'Your account has been retrieved successfully.' );
|
303 |
-
break;
|
304 |
-
case 'DEFAULT_2ND_FACTOR':
|
305 |
-
Return mo2f_lt( 'has been set as your default 2nd factor method' );
|
306 |
-
break;
|
307 |
-
case 'RESENT_OTP':
|
308 |
-
Return mo2f_lt( 'Another One Time Passcode has been sent' );
|
309 |
-
break;
|
310 |
-
case 'VERIFY':
|
311 |
-
Return mo2f_lt( 'for verification to' );
|
312 |
-
break;
|
313 |
-
case 'ERROR_IN_SENDING_EMAIL':
|
314 |
-
Return mo2f_lt( 'There was an error in sending email. Please click on Resend OTP to try again.' );
|
315 |
-
break;
|
316 |
-
case 'EMAIL_IN_USE':
|
317 |
-
Return mo2f_lt( 'The email is already used by other user. Please register with other email.' );
|
318 |
-
break;
|
319 |
-
case 'EMAIL_MANDATORY':
|
320 |
-
Return mo2f_lt( 'Please submit your query with email' );
|
321 |
-
break;
|
322 |
-
case 'ERROR_WHILE_SUBMITTING_QUERY':
|
323 |
-
Return mo2f_lt( 'Your query could not be submitted. Please try again.' );
|
324 |
-
break;
|
325 |
-
case 'QUERY_SUBMITTED_SUCCESSFULLY':
|
326 |
-
Return mo2f_lt( 'Thanks for getting in touch! We shall get back to you shortly.' );
|
327 |
-
break;
|
328 |
-
case 'SETTINGS_SAVED':
|
329 |
-
Return mo2f_lt( 'Your settings are saved successfully.' );
|
330 |
-
break;
|
331 |
-
case 'AUTHENTICATION_FAILED':
|
332 |
-
Return mo2f_lt( 'Authentication failed. Please try again to test the configuration.' );
|
333 |
-
break;
|
334 |
-
case 'REGISTER_WITH_MO':
|
335 |
-
Return mo2f_lt( 'Invalid request. Please register with miniOrange before configuring your mobile.' );
|
336 |
-
break;
|
337 |
-
case 'ENTER_EMAILID':
|
338 |
-
Return mo2f_lt( 'Please enter email-id to register.' );
|
339 |
-
break;
|
340 |
-
case 'ENTER_VALUE':
|
341 |
-
Return mo2f_lt( 'Please enter a value to test your authentication.' );
|
342 |
-
break;
|
343 |
-
case 'ENTER_OTP':
|
344 |
-
Return mo2f_lt( 'Please enter the one time passcode below.' );
|
345 |
-
break;
|
346 |
-
case 'ERROR_IN_SENDING_OTP':
|
347 |
-
Return mo2f_lt( 'There was an error in sending one-time passcode. Your transaction limit might have exceeded. Please contact miniOrange or upgrade to our premium plan.' );
|
348 |
-
break;
|
349 |
-
case 'ERROR_IN_SENDING_OTP_ONPREM':
|
350 |
-
Return mo2f_lt( 'There was an error in sending one-time passcode. Please check your SMTP Setup and remaining transactions.' );
|
351 |
-
break;
|
352 |
-
case 'SMTP_CHECK_FOR_EMAIL_VERIFICATON':
|
353 |
-
Return mo2f_lt('Please set your SMTP to get the email to verify the email at the time of login otherwise you will get logged out');
|
354 |
-
break;
|
355 |
-
case 'PUSH_NOTIFICATION_SENT':
|
356 |
-
Return mo2f_lt( 'A Push notification has been sent to your miniOrange Authenticator App.' );
|
357 |
-
break;
|
358 |
-
case 'ERROR_WHILE_VALIDATING_OTP':
|
359 |
-
Return mo2f_lt( 'Error occurred while validating the OTP. Please try again.' );
|
360 |
-
break;
|
361 |
-
case 'TEST_GAUTH_METHOD':
|
362 |
-
Return mo2f_lt( 'to test Google Authenticator method.' );
|
363 |
-
break;
|
364 |
-
case 'ERROR_IN_SENDING_OTP_CAUSES':
|
365 |
-
Return mo2f_lt( 'Error occurred while validating the OTP. Please try again. Possible causes:' );
|
366 |
-
break;
|
367 |
-
case 'APP_TIME_SYNC':
|
368 |
-
Return mo2f_lt( 'Your App Time is not in sync.Go to settings and tap on tap on Sync Time now .' );
|
369 |
-
break;
|
370 |
-
case 'SERVER_TIME_SYNC':
|
371 |
-
Return mo2f_lt( 'Please make sure your System and device have the same time as the displayed Server time.' );
|
372 |
-
break;
|
373 |
-
case 'ERROR_WHILE_VALIDATING_USER':
|
374 |
-
Return mo2f_lt( 'Error occurred while validating the user. Please try again.' );
|
375 |
-
break;
|
376 |
-
case 'ONLY_DIGITS_ALLOWED':
|
377 |
-
Return mo2f_lt( 'Only digits are allowed. Please enter agai
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|