function get_report_uuid() { require_once 'classes/Session.inc'; $uuid = Session::get_secure_id(); $url = null; if (empty($uuid)) { $db = new ossim_db(); $dbconn = $db->connect(); $user = Session::get_session_user(); $query = 'SELECT * FROM `users` WHERE login="******"'; $result = $dbconn->Execute($query); if (is_array($result->fields) && !empty($result->fields)) { $pass = $result->fields["pass"]; $uuid = sha1($user . "#" . $pass); } else { $uuid = false; } } return $uuid; }
$db->close($conn); echo "\n\n"; Util::execute_command("rm -f /var/tmp/logscheduler_err"); foreach ($scheduled_reports as $value) { $id_sched = $value['id']; $output = null; $to_text = null; // Login $user = $value['user']; $conn = $db->connect(); $pass = getUserWeb($conn, $value['user']); $pass_sha = $pass; // Don't know if pass is in md5 or sha256, external_login will try both $passEncript = getKeyEncript($conn); $login = base64_encode(Util::encrypt($user . '####' . $pass . '####' . $pass_sha, $passEncript)); $uuid = Session::get_secure_id($user); $db->close($conn); $cmd_login = '******'; $params_login = array('AV Report Scheduler [' . $id_sched . ']', $cookieName, 'login='******'/index.php'); $cmd_logout = 'wget -U ? -t 1 --timeout=43200 --no-check-certificate --cookies=on --keep-session-cookies --load-cookies=? ? -O /dev/null 2>> /var/tmp/logscheduler_err'; $params_logout = array('AV Report Scheduler [' . $id_sched . ']', $cookieName, $server . '/session/login.php?action=logout'); $output = Util::execute_command($cmd_login, $params_login, 'array'); $result = searchString($output, $info_text[0]); if ($result == true) { $to_text = sprintf("\n%-15s\n\n", _('ERROR: Wrong User & Password')); echo $to_text; clean($cookieName); exit; } $r_data = base64_decode($value['id_report']); $r_data = explode('###', $r_data);
$data['data'] = "<div style='text-align: left; padding: 0px 0px 3px 10px;'>" . _('We found the following errors') . ":</div>\n\t\t\t\t\t\t<div class='error_item'>" . ossim_get_error_clean() . "</div>"; echo json_encode($data); exit; } else { if (!preg_match('/\\/\\d{1,2}$/', $asset)) { $aux[] = $asset . '/32'; } else { $aux[] = $asset; } } } } $assets_string .= implode(' ', $aux); $db->close(); $assets = $assets_string; $scan_path_log = "/tmp/nmap_scanning_" . md5(Session::get_secure_id()) . '.log'; // Only Stop if ($only_stop) { $scan = new Scan(); $scan->stop(); $data['status'] = 'OK'; $data['data'] = NULL; echo json_encode($data); exit; } // Launch scan if (!$only_status && !$only_stop) { // This object is only for checking available sensors $rscan = new Remote_scan($assets, $scan_mode == 'full' ? 'root' : 'ping'); $available = $rscan->available_scan(preg_match('/^[0-9A-F]{32}$/i', $sensor) ? $sensor : ''); $remote_sensor = "null";