Exemple #1
0
function get_report_uuid()
{
    require_once 'classes/Session.inc';
    $uuid = Session::get_secure_id();
    $url = null;
    if (empty($uuid)) {
        $db = new ossim_db();
        $dbconn = $db->connect();
        $user = Session::get_session_user();
        $query = 'SELECT * FROM `users` WHERE login="******"';
        $result = $dbconn->Execute($query);
        if (is_array($result->fields) && !empty($result->fields)) {
            $pass = $result->fields["pass"];
            $uuid = sha1($user . "#" . $pass);
        } else {
            $uuid = false;
        }
    }
    return $uuid;
}
Exemple #2
0
$db->close($conn);
echo "\n\n";
Util::execute_command("rm -f /var/tmp/logscheduler_err");
foreach ($scheduled_reports as $value) {
    $id_sched = $value['id'];
    $output = null;
    $to_text = null;
    // Login
    $user = $value['user'];
    $conn = $db->connect();
    $pass = getUserWeb($conn, $value['user']);
    $pass_sha = $pass;
    // Don't know if pass is in md5 or sha256, external_login will try both
    $passEncript = getKeyEncript($conn);
    $login = base64_encode(Util::encrypt($user . '####' . $pass . '####' . $pass_sha, $passEncript));
    $uuid = Session::get_secure_id($user);
    $db->close($conn);
    $cmd_login = '******';
    $params_login = array('AV Report Scheduler [' . $id_sched . ']', $cookieName, 'login='******'/index.php');
    $cmd_logout = 'wget -U ? -t 1 --timeout=43200 --no-check-certificate --cookies=on --keep-session-cookies --load-cookies=? ? -O /dev/null 2>> /var/tmp/logscheduler_err';
    $params_logout = array('AV Report Scheduler [' . $id_sched . ']', $cookieName, $server . '/session/login.php?action=logout');
    $output = Util::execute_command($cmd_login, $params_login, 'array');
    $result = searchString($output, $info_text[0]);
    if ($result == true) {
        $to_text = sprintf("\n%-15s\n\n", _('ERROR: Wrong User & Password'));
        echo $to_text;
        clean($cookieName);
        exit;
    }
    $r_data = base64_decode($value['id_report']);
    $r_data = explode('###', $r_data);
Exemple #3
0
            $data['data'] = "<div style='text-align: left; padding: 0px 0px 3px 10px;'>" . _('We found the following errors') . ":</div>\n\t\t\t\t\t\t<div class='error_item'>" . ossim_get_error_clean() . "</div>";
            echo json_encode($data);
            exit;
        } else {
            if (!preg_match('/\\/\\d{1,2}$/', $asset)) {
                $aux[] = $asset . '/32';
            } else {
                $aux[] = $asset;
            }
        }
    }
}
$assets_string .= implode(' ', $aux);
$db->close();
$assets = $assets_string;
$scan_path_log = "/tmp/nmap_scanning_" . md5(Session::get_secure_id()) . '.log';
// Only Stop
if ($only_stop) {
    $scan = new Scan();
    $scan->stop();
    $data['status'] = 'OK';
    $data['data'] = NULL;
    echo json_encode($data);
    exit;
}
// Launch scan
if (!$only_status && !$only_stop) {
    // This object is only for checking available sensors
    $rscan = new Remote_scan($assets, $scan_mode == 'full' ? 'root' : 'ping');
    $available = $rscan->available_scan(preg_match('/^[0-9A-F]{32}$/i', $sensor) ? $sensor : '');
    $remote_sensor = "null";