Guest User

Untitled

a guest
Jan 14th, 2012
161
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 76.53 KB | None | 0 0
  1. <?php
  2. /**
  3. *
  4. * @package phpBB3
  5. * @version $Id$
  6. * @copyright (c) 2005 phpBB Group
  7. * @license http://opensource.org/licenses/gpl-license.php GNU Public License
  8. *
  9. */
  10.  
  11. /**
  12. * @ignore
  13. */
  14. if (!defined('IN_PHPBB'))
  15. {
  16. exit;
  17. }
  18.  
  19. /**
  20. * Session class
  21. * @package phpBB3
  22. */
  23. class session
  24. {
  25. var $cookie_data = array();
  26. var $page = array();
  27. var $data = array();
  28. var $browser = '';
  29. var $forwarded_for = '';
  30. var $host = '';
  31. var $session_id = '';
  32. var $ip = '';
  33. var $load = 0;
  34. var $time_now = 0;
  35. var $update_session_page = true;
  36.  
  37. /**
  38. * Extract current session page
  39. *
  40. * @param string $root_path current root path (phpbb_root_path)
  41. */
  42. function extract_current_page($root_path)
  43. {
  44. $page_array = array();
  45.  
  46. // First of all, get the request uri...
  47. $script_name = (!empty($_SERVER['PHP_SELF'])) ? $_SERVER['PHP_SELF'] : getenv('PHP_SELF');
  48. $args = (!empty($_SERVER['QUERY_STRING'])) ? explode('&', $_SERVER['QUERY_STRING']) : explode('&', getenv('QUERY_STRING'));
  49.  
  50. // If we are unable to get the script name we use REQUEST_URI as a failover and note it within the page array for easier support...
  51. if (!$script_name)
  52. {
  53. $script_name = (!empty($_SERVER['REQUEST_URI'])) ? $_SERVER['REQUEST_URI'] : getenv('REQUEST_URI');
  54. $script_name = (($pos = strpos($script_name, '?')) !== false) ? substr($script_name, 0, $pos) : $script_name;
  55. $page_array['failover'] = 1;
  56. }
  57.  
  58. // Replace backslashes and doubled slashes (could happen on some proxy setups)
  59. $script_name = str_replace(array('\\', '//'), '/', $script_name);
  60.  
  61. // Now, remove the sid and let us get a clean query string...
  62. $use_args = array();
  63.  
  64. // Since some browser do not encode correctly we need to do this with some "special" characters...
  65. // " -> %22, ' => %27, < -> %3C, > -> %3E
  66. $find = array('"', "'", '<', '>');
  67. $replace = array('%22', '%27', '%3C', '%3E');
  68.  
  69. foreach ($args as $key => $argument)
  70. {
  71. if (strpos($argument, 'sid=') === 0)
  72. {
  73. continue;
  74. }
  75.  
  76. $use_args[] = str_replace($find, $replace, $argument);
  77. }
  78. unset($args);
  79.  
  80. // The following examples given are for an request uri of {path to the phpbb directory}/adm/index.php?i=10&b=2
  81.  
  82. // The current query string
  83. $query_string = trim(implode('&', $use_args));
  84.  
  85. // basenamed page name (for example: index.php)
  86. $page_name = basename($script_name);
  87. $page_name = urlencode(htmlspecialchars($page_name));
  88.  
  89. // current directory within the phpBB root (for example: adm)
  90. $root_dirs = explode('/', str_replace('\\', '/', phpbb_realpath($root_path)));
  91. $page_dirs = explode('/', str_replace('\\', '/', phpbb_realpath('./')));
  92. $intersection = array_intersect_assoc($root_dirs, $page_dirs);
  93.  
  94. $root_dirs = array_diff_assoc($root_dirs, $intersection);
  95. $page_dirs = array_diff_assoc($page_dirs, $intersection);
  96.  
  97. $page_dir = str_repeat('../', sizeof($root_dirs)) . implode('/', $page_dirs);
  98.  
  99. if ($page_dir && substr($page_dir, -1, 1) == '/')
  100. {
  101. $page_dir = substr($page_dir, 0, -1);
  102. }
  103.  
  104. // Current page from phpBB root (for example: adm/index.php?i=10&b=2)
  105. $page = (($page_dir) ? $page_dir . '/' : '') . $page_name . (($query_string) ? "?$query_string" : '');
  106.  
  107. // The script path from the webroot to the current directory (for example: /phpBB3/adm/) : always prefixed with / and ends in /
  108. $script_path = trim(str_replace('\\', '/', dirname($script_name)));
  109.  
  110. // The script path from the webroot to the phpBB root (for example: /phpBB3/)
  111. $script_dirs = explode('/', $script_path);
  112. array_splice($script_dirs, -sizeof($page_dirs));
  113. $root_script_path = implode('/', $script_dirs) . (sizeof($root_dirs) ? '/' . implode('/', $root_dirs) : '');
  114.  
  115. // We are on the base level (phpBB root == webroot), lets adjust the variables a bit...
  116. if (!$root_script_path)
  117. {
  118. $root_script_path = ($page_dir) ? str_replace($page_dir, '', $script_path) : $script_path;
  119. }
  120.  
  121. $script_path .= (substr($script_path, -1, 1) == '/') ? '' : '/';
  122. $root_script_path .= (substr($root_script_path, -1, 1) == '/') ? '' : '/';
  123.  
  124. $page_array += array(
  125. 'page_name' => $page_name,
  126. 'page_dir' => $page_dir,
  127.  
  128. 'query_string' => $query_string,
  129. 'script_path' => str_replace(' ', '%20', htmlspecialchars($script_path)),
  130. 'root_script_path' => str_replace(' ', '%20', htmlspecialchars($root_script_path)),
  131.  
  132. 'page' => $page,
  133. 'forum' => (isset($_REQUEST['f']) && $_REQUEST['f'] > 0) ? (int) $_REQUEST['f'] : 0,
  134. );
  135.  
  136. return $page_array;
  137. }
  138.  
  139. /**
  140. * Get valid hostname/port. HTTP_HOST is used, SERVER_NAME if HTTP_HOST not present.
  141. */
  142. function extract_current_hostname()
  143. {
  144. global $config;
  145.  
  146. // Get hostname
  147. $host = (!empty($_SERVER['HTTP_HOST'])) ? $_SERVER['HTTP_HOST'] : ((!empty($_SERVER['SERVER_NAME'])) ? $_SERVER['SERVER_NAME'] : getenv('SERVER_NAME'));
  148.  
  149. // Should be a string and lowered
  150. $host = (string) strtolower($host);
  151.  
  152. // If host is equal the cookie domain or the server name (if config is set), then we assume it is valid
  153. if ((isset($config['cookie_domain']) && $host === $config['cookie_domain']) || (isset($config['server_name']) && $host === $config['server_name']))
  154. {
  155. return $host;
  156. }
  157.  
  158. // Is the host actually a IP? If so, we use the IP... (IPv4)
  159. if (long2ip(ip2long($host)) === $host)
  160. {
  161. return $host;
  162. }
  163.  
  164. // Now return the hostname (this also removes any port definition). The http:// is prepended to construct a valid URL, hosts never have a scheme assigned
  165. $host = @parse_url('http://' . $host);
  166. $host = (!empty($host['host'])) ? $host['host'] : '';
  167.  
  168. // Remove any portions not removed by parse_url (#)
  169. $host = str_replace('#', '', $host);
  170.  
  171. // If, by any means, the host is now empty, we will use a "best approach" way to guess one
  172. if (empty($host))
  173. {
  174. if (!empty($config['server_name']))
  175. {
  176. $host = $config['server_name'];
  177. }
  178. else if (!empty($config['cookie_domain']))
  179. {
  180. $host = (strpos($config['cookie_domain'], '.') === 0) ? substr($config['cookie_domain'], 1) : $config['cookie_domain'];
  181. }
  182. else
  183. {
  184. // Set to OS hostname or localhost
  185. $host = (function_exists('php_uname')) ? php_uname('n') : 'localhost';
  186. }
  187. }
  188.  
  189. // It may be still no valid host, but for sure only a hostname (we may further expand on the cookie domain... if set)
  190. return $host;
  191. }
  192.  
  193. /**
  194. * Start session management
  195. *
  196. * This is where all session activity begins. We gather various pieces of
  197. * information from the client and server. We test to see if a session already
  198. * exists. If it does, fine and dandy. If it doesn't we'll go on to create a
  199. * new one ... pretty logical heh? We also examine the system load (if we're
  200. * running on a system which makes such information readily available) and
  201. * halt if it's above an admin definable limit.
  202. *
  203. * @param bool $update_session_page if true the session page gets updated.
  204. * This can be set to circumvent certain scripts to update the users last visited page.
  205. */
  206. function session_begin($update_session_page = true)
  207. {
  208. global $phpEx, $SID, $_SID, $_EXTRA_URL, $db, $config, $phpbb_root_path;
  209.  
  210. // Give us some basic information
  211. $this->time_now = time();
  212. $this->cookie_data = array('u' => 0, 'k' => '');
  213. $this->update_session_page = $update_session_page;
  214. $this->browser = (!empty($_SERVER['HTTP_USER_AGENT'])) ? htmlspecialchars((string) $_SERVER['HTTP_USER_AGENT']) : '';
  215. $this->referer = (!empty($_SERVER['HTTP_REFERER'])) ? htmlspecialchars((string) $_SERVER['HTTP_REFERER']) : '';
  216. $this->forwarded_for = (!empty($_SERVER['HTTP_X_FORWARDED_FOR'])) ? htmlspecialchars((string) $_SERVER['HTTP_X_FORWARDED_FOR']) : '';
  217.  
  218. $this->host = $this->extract_current_hostname();
  219. $this->page = $this->extract_current_page($phpbb_root_path);
  220.  
  221. // if the forwarded for header shall be checked we have to validate its contents
  222. if ($config['forwarded_for_check'])
  223. {
  224. $this->forwarded_for = preg_replace('#[ ]{2,}#', ' ', str_replace(array(',', ' '), ' ', $this->forwarded_for));
  225.  
  226. // split the list of IPs
  227. $ips = explode(' ', $this->forwarded_for);
  228. foreach ($ips as $ip)
  229. {
  230. // check IPv4 first, the IPv6 is hopefully only going to be used very seldomly
  231. if (!empty($ip) && !preg_match(get_preg_expression('ipv4'), $ip) && !preg_match(get_preg_expression('ipv6'), $ip))
  232. {
  233. // contains invalid data, don't use the forwarded for header
  234. $this->forwarded_for = '';
  235. break;
  236. }
  237. }
  238. }
  239. else
  240. {
  241. $this->forwarded_for = '';
  242. }
  243.  
  244. if (isset($_COOKIE[$config['cookie_name'] . '_sid']) || isset($_COOKIE[$config['cookie_name'] . '_u']))
  245. {
  246. $this->cookie_data['u'] = request_var($config['cookie_name'] . '_u', 0, false, true);
  247. $this->cookie_data['k'] = request_var($config['cookie_name'] . '_k', '', false, true);
  248. $this->session_id = request_var($config['cookie_name'] . '_sid', '', false, true);
  249.  
  250. $SID = (defined('NEED_SID')) ? '?sid=' . $this->session_id : '?sid=';
  251. $_SID = (defined('NEED_SID')) ? $this->session_id : '';
  252.  
  253. if (empty($this->session_id))
  254. {
  255. $this->session_id = $_SID = request_var('sid', '');
  256. $SID = '?sid=' . $this->session_id;
  257. $this->cookie_data = array('u' => 0, 'k' => '');
  258. }
  259. }
  260. else
  261. {
  262. $this->session_id = $_SID = request_var('sid', '');
  263. $SID = '?sid=' . $this->session_id;
  264. }
  265.  
  266. $_EXTRA_URL = array();
  267.  
  268. // Why no forwarded_for et al? Well, too easily spoofed. With the results of my recent requests
  269. // it's pretty clear that in the majority of cases you'll at least be left with a proxy/cache ip.
  270. $this->ip = (!empty($_SERVER['REMOTE_ADDR'])) ? htmlspecialchars((string) $_SERVER['REMOTE_ADDR']) : '';
  271. $this->ip = preg_replace('#[ ]{2,}#', ' ', str_replace(array(',', ' '), ' ', $this->ip));
  272.  
  273. // split the list of IPs
  274. $ips = explode(' ', $this->ip);
  275.  
  276. // Default IP if REMOTE_ADDR is invalid
  277. $this->ip = '127.0.0.1';
  278.  
  279. foreach ($ips as $ip)
  280. {
  281. // check IPv4 first, the IPv6 is hopefully only going to be used very seldomly
  282. if (!empty($ip) && !preg_match(get_preg_expression('ipv4'), $ip) && !preg_match(get_preg_expression('ipv6'), $ip))
  283. {
  284. // Just break
  285. break;
  286. }
  287.  
  288. // Use the last in chain
  289. $this->ip = $ip;
  290. }
  291.  
  292. $this->load = false;
  293.  
  294. // Load limit check (if applicable)
  295. if ($config['limit_load'] || $config['limit_search_load'])
  296. {
  297. if ((function_exists('sys_getloadavg') && $load = sys_getloadavg()) || ($load = explode(' ', @file_get_contents('/proc/loadavg'))))
  298. {
  299. $this->load = array_slice($load, 0, 1);
  300. $this->load = floatval($this->load[0]);
  301. }
  302. else
  303. {
  304. set_config('limit_load', '0');
  305. set_config('limit_search_load', '0');
  306. }
  307. }
  308.  
  309. // Is session_id is set or session_id is set and matches the url param if required
  310. if (!empty($this->session_id) && (!defined('NEED_SID') || (isset($_GET['sid']) && $this->session_id === $_GET['sid'])))
  311. {
  312. $sql = 'SELECT u.*, s.*
  313. FROM ' . SESSIONS_TABLE . ' s, ' . USERS_TABLE . " u
  314. WHERE s.session_id = '" . $db->sql_escape($this->session_id) . "'
  315. AND u.user_id = s.session_user_id";
  316. $result = $db->sql_query($sql);
  317. $this->data = $db->sql_fetchrow($result);
  318. $db->sql_freeresult($result);
  319.  
  320. // Did the session exist in the DB?
  321. if (isset($this->data['user_id']))
  322. {
  323. // Validate IP length according to admin ... enforces an IP
  324. // check on bots if admin requires this
  325. // $quadcheck = ($config['ip_check_bot'] && $this->data['user_type'] & USER_BOT) ? 4 : $config['ip_check'];
  326.  
  327. if (strpos($this->ip, ':') !== false && strpos($this->data['session_ip'], ':') !== false)
  328. {
  329. $s_ip = short_ipv6($this->data['session_ip'], $config['ip_check']);
  330. $u_ip = short_ipv6($this->ip, $config['ip_check']);
  331. }
  332. else
  333. {
  334. $s_ip = implode('.', array_slice(explode('.', $this->data['session_ip']), 0, $config['ip_check']));
  335. $u_ip = implode('.', array_slice(explode('.', $this->ip), 0, $config['ip_check']));
  336. }
  337.  
  338. $s_browser = ($config['browser_check']) ? trim(strtolower(substr($this->data['session_browser'], 0, 149))) : '';
  339. $u_browser = ($config['browser_check']) ? trim(strtolower(substr($this->browser, 0, 149))) : '';
  340.  
  341. $s_forwarded_for = ($config['forwarded_for_check']) ? substr($this->data['session_forwarded_for'], 0, 254) : '';
  342. $u_forwarded_for = ($config['forwarded_for_check']) ? substr($this->forwarded_for, 0, 254) : '';
  343.  
  344. // referer checks
  345. // The @ before $config['referer_validation'] suppresses notices present while running the updater
  346. $check_referer_path = (@$config['referer_validation'] == REFERER_VALIDATE_PATH);
  347. $referer_valid = true;
  348.  
  349. // we assume HEAD and TRACE to be foul play and thus only whitelist GET
  350. if (@$config['referer_validation'] && isset($_SERVER['REQUEST_METHOD']) && strtolower($_SERVER['REQUEST_METHOD']) !== 'get')
  351. {
  352. $referer_valid = $this->validate_referer($check_referer_path);
  353. }
  354.  
  355. if ($u_ip === $s_ip && $s_browser === $u_browser && $s_forwarded_for === $u_forwarded_for && $referer_valid)
  356. {
  357. $session_expired = false;
  358.  
  359. // Check whether the session is still valid if we have one
  360. $method = basename(trim($config['auth_method']));
  361. include_once($phpbb_root_path . 'includes/auth/auth_' . $method . '.' . $phpEx);
  362.  
  363. $method = 'validate_session_' . $method;
  364. if (function_exists($method))
  365. {
  366. if (!$method($this->data))
  367. {
  368. $session_expired = true;
  369. }
  370. }
  371.  
  372. if (!$session_expired)
  373. {
  374. // Check the session length timeframe if autologin is not enabled.
  375. // Else check the autologin length... and also removing those having autologin enabled but no longer allowed board-wide.
  376. if (!$this->data['session_autologin'])
  377. {
  378. if ($this->data['session_time'] < $this->time_now - ($config['session_length'] + 60))
  379. {
  380. $session_expired = true;
  381. }
  382. }
  383. else if (!$config['allow_autologin'] || ($config['max_autologin_time'] && $this->data['session_time'] < $this->time_now - (86400 * (int) $config['max_autologin_time']) + 60))
  384. {
  385. $session_expired = true;
  386. }
  387. }
  388.  
  389. if (!$session_expired)
  390. {
  391. // Only update session DB a minute or so after last update or if page changes
  392. if ($this->time_now - $this->data['session_time'] > 60 || ($this->update_session_page && $this->data['session_page'] != $this->page['page']))
  393. {
  394. $sql_ary = array('session_time' => $this->time_now);
  395.  
  396. if ($this->update_session_page)
  397. {
  398. $sql_ary['session_page'] = substr($this->page['page'], 0, 199);
  399. $sql_ary['session_forum_id'] = $this->page['forum'];
  400. }
  401.  
  402. $db->sql_return_on_error(true);
  403.  
  404. $sql = 'UPDATE ' . SESSIONS_TABLE . ' SET ' . $db->sql_build_array('UPDATE', $sql_ary) . "
  405. WHERE session_id = '" . $db->sql_escape($this->session_id) . "'";
  406. $result = $db->sql_query($sql);
  407.  
  408. $db->sql_return_on_error(false);
  409.  
  410. // If the database is not yet updated, there will be an error due to the session_forum_id
  411. // @todo REMOVE for 3.0.2
  412. if ($result === false)
  413. {
  414. unset($sql_ary['session_forum_id']);
  415.  
  416. $sql = 'UPDATE ' . SESSIONS_TABLE . ' SET ' . $db->sql_build_array('UPDATE', $sql_ary) . "
  417. WHERE session_id = '" . $db->sql_escape($this->session_id) . "'";
  418. $db->sql_query($sql);
  419. }
  420.  
  421. if ($this->data['user_id'] != ANONYMOUS && !empty($config['new_member_post_limit']) && $this->data['user_new'] && $config['new_member_post_limit'] <= $this->data['user_posts'])
  422. {
  423. $this->leave_newly_registered();
  424. }
  425. }
  426.  
  427. $this->data['is_registered'] = ($this->data['user_id'] != ANONYMOUS && ($this->data['user_type'] == USER_NORMAL || $this->data['user_type'] == USER_FOUNDER)) ? true : false;
  428. $this->data['is_bot'] = (!$this->data['is_registered'] && $this->data['user_id'] != ANONYMOUS) ? true : false;
  429. $this->data['user_lang'] = basename($this->data['user_lang']);
  430.  
  431. return true;
  432. }
  433. }
  434. else
  435. {
  436. // Added logging temporarly to help debug bugs...
  437. if (defined('DEBUG_EXTRA') && $this->data['user_id'] != ANONYMOUS)
  438. {
  439. if ($referer_valid)
  440. {
  441. add_log('critical', 'LOG_IP_BROWSER_FORWARDED_CHECK', $u_ip, $s_ip, $u_browser, $s_browser, htmlspecialchars($u_forwarded_for), htmlspecialchars($s_forwarded_for));
  442. }
  443. else
  444. {
  445. add_log('critical', 'LOG_REFERER_INVALID', $this->referer);
  446. }
  447. }
  448. }
  449. }
  450. }
  451.  
  452. // If we reach here then no (valid) session exists. So we'll create a new one
  453. return $this->session_create();
  454. }
  455.  
  456. /**
  457. * Create a new session
  458. *
  459. * If upon trying to start a session we discover there is nothing existing we
  460. * jump here. Additionally this method is called directly during login to regenerate
  461. * the session for the specific user. In this method we carry out a number of tasks;
  462. * garbage collection, (search)bot checking, banned user comparison. Basically
  463. * though this method will result in a new session for a specific user.
  464. */
  465. function session_create($user_id = false, $set_admin = false, $persist_login = false, $viewonline = true)
  466. {
  467. global $SID, $_SID, $db, $config, $cache, $phpbb_root_path, $phpEx;
  468.  
  469. $this->data = array();
  470.  
  471. /* Garbage collection ... remove old sessions updating user information
  472. // if necessary. It means (potentially) 11 queries but only infrequently
  473. if ($this->time_now > $config['session_last_gc'] + $config['session_gc'])
  474. {
  475. $this->session_gc();
  476. }*/
  477.  
  478. // Do we allow autologin on this board? No? Then override anything
  479. // that may be requested here
  480. if (!$config['allow_autologin'])
  481. {
  482. $this->cookie_data['k'] = $persist_login = false;
  483. }
  484.  
  485. /**
  486. * Here we do a bot check, oh er saucy! No, not that kind of bot
  487. * check. We loop through the list of bots defined by the admin and
  488. * see if we have any useragent and/or IP matches. If we do, this is a
  489. * bot, act accordingly
  490. */
  491. $bot = false;
  492. $active_bots = $cache->obtain_bots();
  493.  
  494. foreach ($active_bots as $row)
  495. {
  496. if ($row['bot_agent'] && preg_match('#' . str_replace('\*', '.*?', preg_quote($row['bot_agent'], '#')) . '#i', $this->browser))
  497. {
  498. $bot = $row['user_id'];
  499. }
  500.  
  501. // If ip is supplied, we will make sure the ip is matching too...
  502. if ($row['bot_ip'] && ($bot || !$row['bot_agent']))
  503. {
  504. // Set bot to false, then we only have to set it to true if it is matching
  505. $bot = false;
  506.  
  507. foreach (explode(',', $row['bot_ip']) as $bot_ip)
  508. {
  509. $bot_ip = trim($bot_ip);
  510.  
  511. if (!$bot_ip)
  512. {
  513. continue;
  514. }
  515.  
  516. if (strpos($this->ip, $bot_ip) === 0)
  517. {
  518. $bot = (int) $row['user_id'];
  519. break;
  520. }
  521. }
  522. }
  523.  
  524. if ($bot)
  525. {
  526. break;
  527. }
  528. }
  529.  
  530. $method = basename(trim($config['auth_method']));
  531. include_once($phpbb_root_path . 'includes/auth/auth_' . $method . '.' . $phpEx);
  532.  
  533. $method = 'autologin_' . $method;
  534. if (function_exists($method))
  535. {
  536. $this->data = $method();
  537.  
  538. if (sizeof($this->data))
  539. {
  540. $this->cookie_data['k'] = '';
  541. $this->cookie_data['u'] = $this->data['user_id'];
  542. }
  543. }
  544.  
  545. // If we're presented with an autologin key we'll join against it.
  546. // Else if we've been passed a user_id we'll grab data based on that
  547. if (isset($this->cookie_data['k']) && $this->cookie_data['k'] && $this->cookie_data['u'] && !sizeof($this->data))
  548. {
  549. $sql = 'SELECT u.*
  550. FROM ' . USERS_TABLE . ' u, ' . SESSIONS_KEYS_TABLE . ' k
  551. WHERE u.user_id = ' . (int) $this->cookie_data['u'] . '
  552. AND u.user_type IN (' . USER_NORMAL . ', ' . USER_FOUNDER . ")
  553. AND k.user_id = u.user_id
  554. AND k.key_id = '" . $db->sql_escape(md5($this->cookie_data['k'])) . "'";
  555. $result = $db->sql_query($sql);
  556. $this->data = $db->sql_fetchrow($result);
  557. $db->sql_freeresult($result);
  558. $bot = false;
  559. }
  560. else if ($user_id !== false && !sizeof($this->data))
  561. {
  562. $this->cookie_data['k'] = '';
  563. $this->cookie_data['u'] = $user_id;
  564.  
  565. $sql = 'SELECT *
  566. FROM ' . USERS_TABLE . '
  567. WHERE user_id = ' . (int) $this->cookie_data['u'] . '
  568. AND user_type IN (' . USER_NORMAL . ', ' . USER_FOUNDER . ')';
  569. $result = $db->sql_query($sql);
  570. $this->data = $db->sql_fetchrow($result);
  571. $db->sql_freeresult($result);
  572. $bot = false;
  573. }
  574.  
  575. // If no data was returned one or more of the following occurred:
  576. // Key didn't match one in the DB
  577. // User does not exist
  578. // User is inactive
  579. // User is bot
  580. if (!sizeof($this->data) || !is_array($this->data))
  581. {
  582. $this->cookie_data['k'] = '';
  583. $this->cookie_data['u'] = ($bot) ? $bot : ANONYMOUS;
  584.  
  585. if (!$bot)
  586. {
  587. $sql = 'SELECT *
  588. FROM ' . USERS_TABLE . '
  589. WHERE user_id = ' . (int) $this->cookie_data['u'];
  590. }
  591. else
  592. {
  593. // We give bots always the same session if it is not yet expired.
  594. $sql = 'SELECT u.*, s.*
  595. FROM ' . USERS_TABLE . ' u
  596. LEFT JOIN ' . SESSIONS_TABLE . ' s ON (s.session_user_id = u.user_id)
  597. WHERE u.user_id = ' . (int) $bot;
  598. }
  599.  
  600. $result = $db->sql_query($sql);
  601. $this->data = $db->sql_fetchrow($result);
  602. $db->sql_freeresult($result);
  603. }
  604.  
  605. if ($this->data['user_id'] != ANONYMOUS && !$bot)
  606. {
  607. $this->data['session_last_visit'] = (isset($this->data['session_time']) && $this->data['session_time']) ? $this->data['session_time'] : (($this->data['user_lastvisit']) ? $this->data['user_lastvisit'] : time());
  608. }
  609. else
  610. {
  611. $this->data['session_last_visit'] = $this->time_now;
  612. }
  613.  
  614. // Force user id to be integer...
  615. $this->data['user_id'] = (int) $this->data['user_id'];
  616.  
  617. // At this stage we should have a filled data array, defined cookie u and k data.
  618. // data array should contain recent session info if we're a real user and a recent
  619. // session exists in which case session_id will also be set
  620.  
  621. // Is user banned? Are they excluded? Won't return on ban, exists within method
  622. if ($this->data['user_type'] != USER_FOUNDER)
  623. {
  624. if (!$config['forwarded_for_check'])
  625. {
  626. $this->check_ban($this->data['user_id'], $this->ip);
  627. }
  628. else
  629. {
  630. $ips = explode(' ', $this->forwarded_for);
  631. $ips[] = $this->ip;
  632. $this->check_ban($this->data['user_id'], $ips);
  633. }
  634. }
  635.  
  636. $this->data['is_registered'] = (!$bot && $this->data['user_id'] != ANONYMOUS && ($this->data['user_type'] == USER_NORMAL || $this->data['user_type'] == USER_FOUNDER)) ? true : false;
  637. $this->data['is_bot'] = ($bot) ? true : false;
  638.  
  639. // If our friend is a bot, we re-assign a previously assigned session
  640. if ($this->data['is_bot'] && $bot == $this->data['user_id'] && $this->data['session_id'])
  641. {
  642. // Only assign the current session if the ip, browser and forwarded_for match...
  643. if (strpos($this->ip, ':') !== false && strpos($this->data['session_ip'], ':') !== false)
  644. {
  645. $s_ip = short_ipv6($this->data['session_ip'], $config['ip_check']);
  646. $u_ip = short_ipv6($this->ip, $config['ip_check']);
  647. }
  648. else
  649. {
  650. $s_ip = implode('.', array_slice(explode('.', $this->data['session_ip']), 0, $config['ip_check']));
  651. $u_ip = implode('.', array_slice(explode('.', $this->ip), 0, $config['ip_check']));
  652. }
  653.  
  654. $s_browser = ($config['browser_check']) ? trim(strtolower(substr($this->data['session_browser'], 0, 149))) : '';
  655. $u_browser = ($config['browser_check']) ? trim(strtolower(substr($this->browser, 0, 149))) : '';
  656.  
  657. $s_forwarded_for = ($config['forwarded_for_check']) ? substr($this->data['session_forwarded_for'], 0, 254) : '';
  658. $u_forwarded_for = ($config['forwarded_for_check']) ? substr($this->forwarded_for, 0, 254) : '';
  659.  
  660. if ($u_ip === $s_ip && $s_browser === $u_browser && $s_forwarded_for === $u_forwarded_for)
  661. {
  662. $this->session_id = $this->data['session_id'];
  663.  
  664. // Only update session DB a minute or so after last update or if page changes
  665. if ($this->time_now - $this->data['session_time'] > 60 || ($this->update_session_page && $this->data['session_page'] != $this->page['page']))
  666. {
  667. $this->data['session_time'] = $this->data['session_last_visit'] = $this->time_now;
  668.  
  669. $sql_ary = array('session_time' => $this->time_now, 'session_last_visit' => $this->time_now, 'session_admin' => 0);
  670.  
  671. if ($this->update_session_page)
  672. {
  673. $sql_ary['session_page'] = substr($this->page['page'], 0, 199);
  674. $sql_ary['session_forum_id'] = $this->page['forum'];
  675. }
  676.  
  677. $sql = 'UPDATE ' . SESSIONS_TABLE . ' SET ' . $db->sql_build_array('UPDATE', $sql_ary) . "
  678. WHERE session_id = '" . $db->sql_escape($this->session_id) . "'";
  679. $db->sql_query($sql);
  680.  
  681. // Update the last visit time
  682. $sql = 'UPDATE ' . USERS_TABLE . '
  683. SET user_lastvisit = ' . (int) $this->data['session_time'] . '
  684. WHERE user_id = ' . (int) $this->data['user_id'];
  685. $db->sql_query($sql);
  686. }
  687.  
  688. $SID = '?sid=';
  689. $_SID = '';
  690. return true;
  691. }
  692. else
  693. {
  694. // If the ip and browser does not match make sure we only have one bot assigned to one session
  695. $db->sql_query('DELETE FROM ' . SESSIONS_TABLE . ' WHERE session_user_id = ' . $this->data['user_id']);
  696. }
  697. }
  698.  
  699. $session_autologin = (($this->cookie_data['k'] || $persist_login) && $this->data['is_registered']) ? true : false;
  700. $set_admin = ($set_admin && $this->data['is_registered']) ? true : false;
  701.  
  702. // Create or update the session
  703. $sql_ary = array(
  704. 'session_user_id' => (int) $this->data['user_id'],
  705. 'session_start' => (int) $this->time_now,
  706. 'session_last_visit' => (int) $this->data['session_last_visit'],
  707. 'session_time' => (int) $this->time_now,
  708. 'session_browser' => (string) trim(substr($this->browser, 0, 149)),
  709. 'session_forwarded_for' => (string) $this->forwarded_for,
  710. 'session_ip' => (string) $this->ip,
  711. 'session_autologin' => ($session_autologin) ? 1 : 0,
  712. 'session_admin' => ($set_admin) ? 1 : 0,
  713. 'session_viewonline' => ($viewonline) ? 1 : 0,
  714. );
  715.  
  716. if ($this->update_session_page)
  717. {
  718. $sql_ary['session_page'] = (string) substr($this->page['page'], 0, 199);
  719. $sql_ary['session_forum_id'] = $this->page['forum'];
  720. }
  721.  
  722. $db->sql_return_on_error(true);
  723.  
  724. $sql = 'DELETE
  725. FROM ' . SESSIONS_TABLE . '
  726. WHERE session_id = \'' . $db->sql_escape($this->session_id) . '\'
  727. AND session_user_id = ' . ANONYMOUS;
  728.  
  729. if (!defined('IN_ERROR_HANDLER') && (!$this->session_id || !$db->sql_query($sql) || !$db->sql_affectedrows()))
  730. {
  731. // Limit new sessions in 1 minute period (if required)
  732. if (empty($this->data['session_time']) && $config['active_sessions'])
  733. {
  734. // $db->sql_return_on_error(false);
  735.  
  736. $sql = 'SELECT COUNT(session_id) AS sessions
  737. FROM ' . SESSIONS_TABLE . '
  738. WHERE session_time >= ' . ($this->time_now - 60);
  739. $result = $db->sql_query($sql);
  740. $row = $db->sql_fetchrow($result);
  741. $db->sql_freeresult($result);
  742.  
  743. if ((int) $row['sessions'] > (int) $config['active_sessions'])
  744. {
  745. header('HTTP/1.1 503 Service Unavailable');
  746. trigger_error('BOARD_UNAVAILABLE');
  747. }
  748. }
  749. }
  750.  
  751. // Since we re-create the session id here, the inserted row must be unique. Therefore, we display potential errors.
  752. // Commented out because it will not allow forums to update correctly
  753. // $db->sql_return_on_error(false);
  754.  
  755. // Something quite important: session_page always holds the *last* page visited, except for the *first* visit.
  756. // We are not able to simply have an empty session_page btw, therefore we need to tell phpBB how to detect this special case.
  757. // If the session id is empty, we have a completely new one and will set an "identifier" here. This identifier is able to be checked later.
  758. if (empty($this->data['session_id']))
  759. {
  760. // This is a temporary variable, only set for the very first visit
  761. $this->data['session_created'] = true;
  762. }
  763.  
  764. $this->session_id = $this->data['session_id'] = md5(unique_id());
  765.  
  766. $sql_ary['session_id'] = (string) $this->session_id;
  767. $sql_ary['session_page'] = (string) substr($this->page['page'], 0, 199);
  768. $sql_ary['session_forum_id'] = $this->page['forum'];
  769.  
  770. $sql = 'INSERT INTO ' . SESSIONS_TABLE . ' ' . $db->sql_build_array('INSERT', $sql_ary);
  771. $db->sql_query($sql);
  772.  
  773. $db->sql_return_on_error(false);
  774.  
  775. // Regenerate autologin/persistent login key
  776. if ($session_autologin)
  777. {
  778. $this->set_login_key();
  779. }
  780.  
  781. // refresh data
  782. $SID = '?sid=' . $this->session_id;
  783. $_SID = $this->session_id;
  784. $this->data = array_merge($this->data, $sql_ary);
  785.  
  786. if (!$bot)
  787. {
  788. $cookie_expire = $this->time_now + (($config['max_autologin_time']) ? 86400 * (int) $config['max_autologin_time'] : 31536000);
  789.  
  790. $this->set_cookie('u', $this->cookie_data['u'], $cookie_expire);
  791. $this->set_cookie('k', $this->cookie_data['k'], $cookie_expire);
  792. $this->set_cookie('sid', $this->session_id, $cookie_expire);
  793.  
  794. unset($cookie_expire);
  795.  
  796. $sql = 'SELECT COUNT(session_id) AS sessions
  797. FROM ' . SESSIONS_TABLE . '
  798. WHERE session_user_id = ' . (int) $this->data['user_id'] . '
  799. AND session_time >= ' . (int) ($this->time_now - (max($config['session_length'], $config['form_token_lifetime'])));
  800. $result = $db->sql_query($sql);
  801. $row = $db->sql_fetchrow($result);
  802. $db->sql_freeresult($result);
  803.  
  804. if ((int) $row['sessions'] <= 1 || empty($this->data['user_form_salt']))
  805. {
  806. $this->data['user_form_salt'] = unique_id();
  807. // Update the form key
  808. $sql = 'UPDATE ' . USERS_TABLE . '
  809. SET user_form_salt = \'' . $db->sql_escape($this->data['user_form_salt']) . '\'
  810. WHERE user_id = ' . (int) $this->data['user_id'];
  811. $db->sql_query($sql);
  812. }
  813. }
  814. else
  815. {
  816. $this->data['session_time'] = $this->data['session_last_visit'] = $this->time_now;
  817.  
  818. // Update the last visit time
  819. $sql = 'UPDATE ' . USERS_TABLE . '
  820. SET user_lastvisit = ' . (int) $this->data['session_time'] . '
  821. WHERE user_id = ' . (int) $this->data['user_id'];
  822. $db->sql_query($sql);
  823.  
  824. $SID = '?sid=';
  825. $_SID = '';
  826. }
  827.  
  828. return true;
  829. }
  830.  
  831. /**
  832. * Kills a session
  833. *
  834. * This method does what it says on the tin. It will delete a pre-existing session.
  835. * It resets cookie information (destroying any autologin key within that cookie data)
  836. * and update the users information from the relevant session data. It will then
  837. * grab guest user information.
  838. */
  839. function session_kill($new_session = true)
  840. {
  841. global $SID, $_SID, $db, $config, $phpbb_root_path, $phpEx;
  842.  
  843. $sql = 'DELETE FROM ' . SESSIONS_TABLE . "
  844. WHERE session_id = '" . $db->sql_escape($this->session_id) . "'
  845. AND session_user_id = " . (int) $this->data['user_id'];
  846. $db->sql_query($sql);
  847.  
  848. // Allow connecting logout with external auth method logout
  849. $method = basename(trim($config['auth_method']));
  850. include_once($phpbb_root_path . 'includes/auth/auth_' . $method . '.' . $phpEx);
  851.  
  852. $method = 'logout_' . $method;
  853. if (function_exists($method))
  854. {
  855. $method($this->data, $new_session);
  856. }
  857.  
  858. if ($this->data['user_id'] != ANONYMOUS)
  859. {
  860. // Delete existing session, update last visit info first!
  861. if (!isset($this->data['session_time']))
  862. {
  863. $this->data['session_time'] = time();
  864. }
  865.  
  866. $sql = 'UPDATE ' . USERS_TABLE . '
  867. SET user_lastvisit = ' . (int) $this->data['session_time'] . '
  868. WHERE user_id = ' . (int) $this->data['user_id'];
  869. $db->sql_query($sql);
  870.  
  871. if ($this->cookie_data['k'])
  872. {
  873. $sql = 'DELETE FROM ' . SESSIONS_KEYS_TABLE . '
  874. WHERE user_id = ' . (int) $this->data['user_id'] . "
  875. AND key_id = '" . $db->sql_escape(md5($this->cookie_data['k'])) . "'";
  876. $db->sql_query($sql);
  877. }
  878.  
  879. // Reset the data array
  880. $this->data = array();
  881.  
  882. $sql = 'SELECT *
  883. FROM ' . USERS_TABLE . '
  884. WHERE user_id = ' . ANONYMOUS;
  885. $result = $db->sql_query($sql);
  886. $this->data = $db->sql_fetchrow($result);
  887. $db->sql_freeresult($result);
  888. }
  889.  
  890. $cookie_expire = $this->time_now - 31536000;
  891. $this->set_cookie('u', '', $cookie_expire);
  892. $this->set_cookie('k', '', $cookie_expire);
  893. $this->set_cookie('sid', '', $cookie_expire);
  894. unset($cookie_expire);
  895.  
  896. $SID = '?sid=';
  897. $this->session_id = $_SID = '';
  898.  
  899. // To make sure a valid session is created we create one for the anonymous user
  900. if ($new_session)
  901. {
  902. $this->session_create(ANONYMOUS);
  903. }
  904.  
  905. return true;
  906. }
  907.  
  908. /**
  909. * Session garbage collection
  910. *
  911. * This looks a lot more complex than it really is. Effectively we are
  912. * deleting any sessions older than an admin definable limit. Due to the
  913. * way in which we maintain session data we have to ensure we update user
  914. * data before those sessions are destroyed. In addition this method
  915. * removes autologin key information that is older than an admin defined
  916. * limit.
  917. */
  918. function session_gc()
  919. {
  920. global $db, $config, $phpbb_root_path, $phpEx;
  921.  
  922. $batch_size = 10;
  923.  
  924. if (!$this->time_now)
  925. {
  926. $this->time_now = time();
  927. }
  928.  
  929. // Firstly, delete guest sessions
  930. $sql = 'DELETE FROM ' . SESSIONS_TABLE . '
  931. WHERE session_user_id = ' . ANONYMOUS . '
  932. AND session_time < ' . (int) ($this->time_now - $config['session_length']);
  933. $db->sql_query($sql);
  934.  
  935. // Get expired sessions, only most recent for each user
  936. $sql = 'SELECT session_user_id, session_page, MAX(session_time) AS recent_time
  937. FROM ' . SESSIONS_TABLE . '
  938. WHERE session_time < ' . ($this->time_now - $config['session_length']) . '
  939. GROUP BY session_user_id, session_page';
  940. $result = $db->sql_query_limit($sql, $batch_size);
  941.  
  942. $del_user_id = array();
  943. $del_sessions = 0;
  944.  
  945. while ($row = $db->sql_fetchrow($result))
  946. {
  947. $sql = 'UPDATE ' . USERS_TABLE . '
  948. SET user_lastvisit = ' . (int) $row['recent_time'] . ", user_lastpage = '" . $db->sql_escape($row['session_page']) . "'
  949. WHERE user_id = " . (int) $row['session_user_id'];
  950. $db->sql_query($sql);
  951.  
  952. $del_user_id[] = (int) $row['session_user_id'];
  953. $del_sessions++;
  954. }
  955. $db->sql_freeresult($result);
  956.  
  957. if (sizeof($del_user_id))
  958. {
  959. // Delete expired sessions
  960. $sql = 'DELETE FROM ' . SESSIONS_TABLE . '
  961. WHERE ' . $db->sql_in_set('session_user_id', $del_user_id) . '
  962. AND session_time < ' . ($this->time_now - $config['session_length']);
  963. $db->sql_query($sql);
  964. }
  965.  
  966. if ($del_sessions < $batch_size)
  967. {
  968. // Less than 10 users, update gc timer ... else we want gc
  969. // called again to delete other sessions
  970. set_config('session_last_gc', $this->time_now, true);
  971.  
  972. if ($config['max_autologin_time'])
  973. {
  974. $sql = 'DELETE FROM ' . SESSIONS_KEYS_TABLE . '
  975. WHERE last_login < ' . (time() - (86400 * (int) $config['max_autologin_time']));
  976. $db->sql_query($sql);
  977. }
  978.  
  979. // only called from CRON; should be a safe workaround until the infrastructure gets going
  980. if (!class_exists('captcha_factory'))
  981. {
  982. include($phpbb_root_path . "includes/captcha/captcha_factory." . $phpEx);
  983. }
  984. phpbb_captcha_factory::garbage_collect($config['captcha_plugin']);
  985. }
  986.  
  987. return;
  988. }
  989.  
  990. /**
  991. * Sets a cookie
  992. *
  993. * Sets a cookie of the given name with the specified data for the given length of time. If no time is specified, a session cookie will be set.
  994. *
  995. * @param string $name Name of the cookie, will be automatically prefixed with the phpBB cookie name. track becomes [cookie_name]_track then.
  996. * @param string $cookiedata The data to hold within the cookie
  997. * @param int $cookietime The expiration time as UNIX timestamp. If 0 is provided, a session cookie is set.
  998. */
  999. function set_cookie($name, $cookiedata, $cookietime)
  1000. {
  1001. global $config;
  1002.  
  1003. $name_data = rawurlencode($config['cookie_name'] . '_' . $name) . '=' . rawurlencode($cookiedata);
  1004. $expire = gmdate('D, d-M-Y H:i:s \\G\\M\\T', $cookietime);
  1005. $domain = (!$config['cookie_domain'] || $config['cookie_domain'] == 'localhost' || $config['cookie_domain'] == '127.0.0.1') ? '' : '; domain=' . $config['cookie_domain'];
  1006.  
  1007.  
  1008.  
  1009. header('Set-Cookie: ' . $name_data . (($cookietime) ? '; expires=' . $expire : '') . '; path=' . $config['cookie_path'] . $domain . ((!$config['cookie_secure']) ? '' : '; secure') . '; HttpOnly', false);
  1010. }
  1011.  
  1012. /**
  1013. * Check for banned user
  1014. *
  1015. * Checks whether the supplied user is banned by id, ip or email. If no parameters
  1016. * are passed to the method pre-existing session data is used. If $return is false
  1017. * this routine does not return on finding a banned user, it outputs a relevant
  1018. * message and stops execution.
  1019. *
  1020. * @param string|array $user_ips Can contain a string with one IP or an array of multiple IPs
  1021. */
  1022. function check_ban($user_id = false, $user_ips = false, $user_email = false, $return = false)
  1023. {
  1024. global $config, $db;
  1025.  
  1026. if (defined('IN_CHECK_BAN'))
  1027. {
  1028. return;
  1029. }
  1030.  
  1031. $banned = false;
  1032. $cache_ttl = 3600;
  1033. $where_sql = array();
  1034.  
  1035. $sql = 'SELECT ban_ip, ban_userid, ban_email, ban_exclude, ban_give_reason, ban_end
  1036. FROM ' . BANLIST_TABLE . '
  1037. WHERE ';
  1038.  
  1039. // Determine which entries to check, only return those
  1040. if ($user_email === false)
  1041. {
  1042. $where_sql[] = "ban_email = ''";
  1043. }
  1044.  
  1045. if ($user_ips === false)
  1046. {
  1047. $where_sql[] = "(ban_ip = '' OR ban_exclude = 1)";
  1048. }
  1049.  
  1050. if ($user_id === false)
  1051. {
  1052. $where_sql[] = '(ban_userid = 0 OR ban_exclude = 1)';
  1053. }
  1054. else
  1055. {
  1056. $cache_ttl = ($user_id == ANONYMOUS) ? 3600 : 0;
  1057. $_sql = '(ban_userid = ' . $user_id;
  1058.  
  1059. if ($user_email !== false)
  1060. {
  1061. $_sql .= " OR ban_email <> ''";
  1062. }
  1063.  
  1064. if ($user_ips !== false)
  1065. {
  1066. $_sql .= " OR ban_ip <> ''";
  1067. }
  1068.  
  1069. $_sql .= ')';
  1070.  
  1071. $where_sql[] = $_sql;
  1072. }
  1073.  
  1074. $sql .= (sizeof($where_sql)) ? implode(' AND ', $where_sql) : '';
  1075. $result = $db->sql_query($sql, $cache_ttl);
  1076.  
  1077. $ban_triggered_by = 'user';
  1078. while ($row = $db->sql_fetchrow($result))
  1079. {
  1080. if ($row['ban_end'] && $row['ban_end'] < time())
  1081. {
  1082. continue;
  1083. }
  1084.  
  1085. $ip_banned = false;
  1086. if (!empty($row['ban_ip']))
  1087. {
  1088. if (!is_array($user_ips))
  1089. {
  1090. $ip_banned = preg_match('#^' . str_replace('\*', '.*?', preg_quote($row['ban_ip'], '#')) . '$#i', $user_ips);
  1091. }
  1092. else
  1093. {
  1094. foreach ($user_ips as $user_ip)
  1095. {
  1096. if (preg_match('#^' . str_replace('\*', '.*?', preg_quote($row['ban_ip'], '#')) . '$#i', $user_ip))
  1097. {
  1098. $ip_banned = true;
  1099. break;
  1100. }
  1101. }
  1102. }
  1103. }
  1104.  
  1105. if ((!empty($row['ban_userid']) && intval($row['ban_userid']) == $user_id) ||
  1106. $ip_banned ||
  1107. (!empty($row['ban_email']) && preg_match('#^' . str_replace('\*', '.*?', preg_quote($row['ban_email'], '#')) . '$#i', $user_email)))
  1108. {
  1109. if (!empty($row['ban_exclude']))
  1110. {
  1111. $banned = false;
  1112. break;
  1113. }
  1114. else
  1115. {
  1116. $banned = true;
  1117. $ban_row = $row;
  1118.  
  1119. if (!empty($row['ban_userid']) && intval($row['ban_userid']) == $user_id)
  1120. {
  1121. $ban_triggered_by = 'user';
  1122. }
  1123. else if ($ip_banned)
  1124. {
  1125. $ban_triggered_by = 'ip';
  1126. }
  1127. else
  1128. {
  1129. $ban_triggered_by = 'email';
  1130. }
  1131.  
  1132. // Don't break. Check if there is an exclude rule for this user
  1133. }
  1134. }
  1135. }
  1136. $db->sql_freeresult($result);
  1137.  
  1138. if ($banned && !$return)
  1139. {
  1140. global $template;
  1141.  
  1142. // If the session is empty we need to create a valid one...
  1143. if (empty($this->session_id))
  1144. {
  1145. // This seems to be no longer needed? - #14971
  1146. // $this->session_create(ANONYMOUS);
  1147. }
  1148.  
  1149. // Initiate environment ... since it won't be set at this stage
  1150. $this->setup();
  1151.  
  1152. // Logout the user, banned users are unable to use the normal 'logout' link
  1153. if ($this->data['user_id'] != ANONYMOUS)
  1154. {
  1155. $this->session_kill();
  1156. }
  1157.  
  1158. // We show a login box here to allow founders accessing the board if banned by IP
  1159. if (defined('IN_LOGIN') && $this->data['user_id'] == ANONYMOUS)
  1160. {
  1161. global $phpEx;
  1162.  
  1163. $this->setup('ucp');
  1164. $this->data['is_registered'] = $this->data['is_bot'] = false;
  1165.  
  1166. // Set as a precaution to allow login_box() handling this case correctly as well as this function not being executed again.
  1167. define('IN_CHECK_BAN', 1);
  1168.  
  1169. login_box("index.$phpEx");
  1170.  
  1171. // The false here is needed, else the user is able to circumvent the ban.
  1172. $this->session_kill(false);
  1173. }
  1174.  
  1175. // Ok, we catch the case of an empty session id for the anonymous user...
  1176. // This can happen if the user is logging in, banned by username and the login_box() being called "again".
  1177. if (empty($this->session_id) && defined('IN_CHECK_BAN'))
  1178. {
  1179. $this->session_create(ANONYMOUS);
  1180. }
  1181.  
  1182.  
  1183. // Determine which message to output
  1184. $till_date = ($ban_row['ban_end']) ? $this->format_date($ban_row['ban_end']) : '';
  1185. $message = ($ban_row['ban_end']) ? 'BOARD_BAN_TIME' : 'BOARD_BAN_PERM';
  1186.  
  1187. $message = sprintf($this->lang[$message], $till_date, '<a href="mailto:' . $config['board_contact'] . '">', '</a>');
  1188. $message .= ($ban_row['ban_give_reason']) ? '<br /><br />' . sprintf($this->lang['BOARD_BAN_REASON'], $ban_row['ban_give_reason']) : '';
  1189. $message .= '<br /><br /><em>' . $this->lang['BAN_TRIGGERED_BY_' . strtoupper($ban_triggered_by)] . '</em>';
  1190.  
  1191. // To circumvent session_begin returning a valid value and the check_ban() not called on second page view, we kill the session again
  1192. $this->session_kill(false);
  1193.  
  1194. // A very special case... we are within the cron script which is not supposed to print out the ban message... show blank page
  1195. if (defined('IN_CRON'))
  1196. {
  1197. garbage_collection();
  1198. exit_handler();
  1199. exit;
  1200. }
  1201.  
  1202. trigger_error($message);
  1203. }
  1204.  
  1205. return ($banned && $ban_row['ban_give_reason']) ? $ban_row['ban_give_reason'] : $banned;
  1206. }
  1207.  
  1208. /**
  1209. * Check if ip is blacklisted
  1210. * This should be called only where absolutly necessary
  1211. *
  1212. * Only IPv4 (rbldns does not support AAAA records/IPv6 lookups)
  1213. *
  1214. * @author satmd (from the php manual)
  1215. * @param string $mode register/post - spamcop for example is ommitted for posting
  1216. * @return false if ip is not blacklisted, else an array([checked server], [lookup])
  1217. */
  1218. function check_dnsbl($mode, $ip = false)
  1219. {
  1220. if ($ip === false)
  1221. {
  1222. $ip = $this->ip;
  1223. }
  1224.  
  1225. $dnsbl_check = array(
  1226. 'sbl.spamhaus.org' => 'http://www.spamhaus.org/query/bl?ip=',
  1227. );
  1228.  
  1229. if ($mode == 'register')
  1230. {
  1231. $dnsbl_check['bl.spamcop.net'] = 'http://spamcop.net/bl.shtml?';
  1232. }
  1233.  
  1234. if ($ip)
  1235. {
  1236. $quads = explode('.', $ip);
  1237. $reverse_ip = $quads[3] . '.' . $quads[2] . '.' . $quads[1] . '.' . $quads[0];
  1238.  
  1239. // Need to be listed on all servers...
  1240. $listed = true;
  1241. $info = array();
  1242.  
  1243. foreach ($dnsbl_check as $dnsbl => $lookup)
  1244. {
  1245. if (phpbb_checkdnsrr($reverse_ip . '.' . $dnsbl . '.', 'A') === true)
  1246. {
  1247. $info = array($dnsbl, $lookup . $ip);
  1248. }
  1249. else
  1250. {
  1251. $listed = false;
  1252. }
  1253. }
  1254.  
  1255. if ($listed)
  1256. {
  1257. return $info;
  1258. }
  1259. }
  1260.  
  1261. return false;
  1262. }
  1263.  
  1264. /**
  1265. * Check if URI is blacklisted
  1266. * This should be called only where absolutly necessary, for example on the submitted website field
  1267. * This function is not in use at the moment and is only included for testing purposes, it may not work at all!
  1268. * This means it is untested at the moment and therefore commented out
  1269. *
  1270. * @param string $uri URI to check
  1271. * @return true if uri is on blacklist, else false. Only blacklist is checked (~zero FP), no grey lists
  1272. function check_uribl($uri)
  1273. {
  1274. // Normally parse_url() is not intended to parse uris
  1275. // We need to get the top-level domain name anyway... change.
  1276. $uri = parse_url($uri);
  1277.  
  1278. if ($uri === false || empty($uri['host']))
  1279. {
  1280. return false;
  1281. }
  1282.  
  1283. $uri = trim($uri['host']);
  1284.  
  1285. if ($uri)
  1286. {
  1287. // One problem here... the return parameter for the "windows" method is different from what
  1288. // we expect... this may render this check useless...
  1289. if (phpbb_checkdnsrr($uri . '.multi.uribl.com.', 'A') === true)
  1290. {
  1291. return true;
  1292. }
  1293. }
  1294.  
  1295. return false;
  1296. }
  1297. */
  1298.  
  1299. /**
  1300. * Set/Update a persistent login key
  1301. *
  1302. * This method creates or updates a persistent session key. When a user makes
  1303. * use of persistent (formerly auto-) logins a key is generated and stored in the
  1304. * DB. When they revisit with the same key it's automatically updated in both the
  1305. * DB and cookie. Multiple keys may exist for each user representing different
  1306. * browsers or locations. As with _any_ non-secure-socket no passphrase login this
  1307. * remains vulnerable to exploit.
  1308. */
  1309. function set_login_key($user_id = false, $key = false, $user_ip = false)
  1310. {
  1311. global $config, $db;
  1312.  
  1313. $user_id = ($user_id === false) ? $this->data['user_id'] : $user_id;
  1314. $user_ip = ($user_ip === false) ? $this->ip : $user_ip;
  1315. $key = ($key === false) ? (($this->cookie_data['k']) ? $this->cookie_data['k'] : false) : $key;
  1316.  
  1317. $key_id = unique_id(hexdec(substr($this->session_id, 0, 8)));
  1318.  
  1319. $sql_ary = array(
  1320. 'key_id' => (string) md5($key_id),
  1321. 'last_ip' => (string) $this->ip,
  1322. 'last_login' => (int) time()
  1323. );
  1324.  
  1325. if (!$key)
  1326. {
  1327. $sql_ary += array(
  1328. 'user_id' => (int) $user_id
  1329. );
  1330. }
  1331.  
  1332. if ($key)
  1333. {
  1334. $sql = 'UPDATE ' . SESSIONS_KEYS_TABLE . '
  1335. SET ' . $db->sql_build_array('UPDATE', $sql_ary) . '
  1336. WHERE user_id = ' . (int) $user_id . "
  1337. AND key_id = '" . $db->sql_escape(md5($key)) . "'";
  1338. }
  1339. else
  1340. {
  1341. $sql = 'INSERT INTO ' . SESSIONS_KEYS_TABLE . ' ' . $db->sql_build_array('INSERT', $sql_ary);
  1342. }
  1343. $db->sql_query($sql);
  1344.  
  1345. $this->cookie_data['k'] = $key_id;
  1346.  
  1347. return false;
  1348. }
  1349.  
  1350. /**
  1351. * Reset all login keys for the specified user
  1352. *
  1353. * This method removes all current login keys for a specified (or the current)
  1354. * user. It will be called on password change to render old keys unusable
  1355. */
  1356. function reset_login_keys($user_id = false)
  1357. {
  1358. global $config, $db;
  1359.  
  1360. $user_id = ($user_id === false) ? (int) $this->data['user_id'] : (int) $user_id;
  1361.  
  1362. $sql = 'DELETE FROM ' . SESSIONS_KEYS_TABLE . '
  1363. WHERE user_id = ' . (int) $user_id;
  1364. $db->sql_query($sql);
  1365.  
  1366. // If the user is logged in, update last visit info first before deleting sessions
  1367. $sql = 'SELECT session_time, session_page
  1368. FROM ' . SESSIONS_TABLE . '
  1369. WHERE session_user_id = ' . (int) $user_id . '
  1370. ORDER BY session_time DESC';
  1371. $result = $db->sql_query_limit($sql, 1);
  1372. $row = $db->sql_fetchrow($result);
  1373. $db->sql_freeresult($result);
  1374.  
  1375. if ($row)
  1376. {
  1377. $sql = 'UPDATE ' . USERS_TABLE . '
  1378. SET user_lastvisit = ' . (int) $row['session_time'] . ", user_lastpage = '" . $db->sql_escape($row['session_page']) . "'
  1379. WHERE user_id = " . (int) $user_id;
  1380. $db->sql_query($sql);
  1381. }
  1382.  
  1383. // Let's also clear any current sessions for the specified user_id
  1384. // If it's the current user then we'll leave this session intact
  1385. $sql_where = 'session_user_id = ' . (int) $user_id;
  1386. $sql_where .= ($user_id === (int) $this->data['user_id']) ? " AND session_id <> '" . $db->sql_escape($this->session_id) . "'" : '';
  1387.  
  1388. $sql = 'DELETE FROM ' . SESSIONS_TABLE . "
  1389. WHERE $sql_where";
  1390. $db->sql_query($sql);
  1391.  
  1392. // We're changing the password of the current user and they have a key
  1393. // Lets regenerate it to be safe
  1394. if ($user_id === (int) $this->data['user_id'] && $this->cookie_data['k'])
  1395. {
  1396. $this->set_login_key($user_id);
  1397. }
  1398. }
  1399.  
  1400.  
  1401. /**
  1402. * Check if the request originated from the same page.
  1403. * @param bool $check_script_path If true, the path will be checked as well
  1404. */
  1405. function validate_referer($check_script_path = false)
  1406. {
  1407. global $config;
  1408.  
  1409. // no referer - nothing to validate, user's fault for turning it off (we only check on POST; so meta can't be the reason)
  1410. if (empty($this->referer) || empty($this->host))
  1411. {
  1412. return true;
  1413. }
  1414.  
  1415. $host = htmlspecialchars($this->host);
  1416. $ref = substr($this->referer, strpos($this->referer, '://') + 3);
  1417.  
  1418. if (!(stripos($ref, $host) === 0) && (!$config['force_server_vars'] || !(stripos($ref, $config['server_name']) === 0)))
  1419. {
  1420. return false;
  1421. }
  1422. else if ($check_script_path && rtrim($this->page['root_script_path'], '/') !== '')
  1423. {
  1424. $ref = substr($ref, strlen($host));
  1425. $server_port = (!empty($_SERVER['SERVER_PORT'])) ? (int) $_SERVER['SERVER_PORT'] : (int) getenv('SERVER_PORT');
  1426.  
  1427. if ($server_port !== 80 && $server_port !== 443 && stripos($ref, ":$server_port") === 0)
  1428. {
  1429. $ref = substr($ref, strlen(":$server_port"));
  1430. }
  1431.  
  1432. if (!(stripos(rtrim($ref, '/'), rtrim($this->page['root_script_path'], '/')) === 0))
  1433. {
  1434. return false;
  1435. }
  1436. }
  1437.  
  1438. return true;
  1439. }
  1440.  
  1441.  
  1442. function unset_admin()
  1443. {
  1444. global $db;
  1445. $sql = 'UPDATE ' . SESSIONS_TABLE . '
  1446. SET session_admin = 0
  1447. WHERE session_id = \'' . $db->sql_escape($this->session_id) . '\'';
  1448. $db->sql_query($sql);
  1449. }
  1450. }
  1451.  
  1452.  
  1453. /**
  1454. * Base user class
  1455. *
  1456. * This is the overarching class which contains (through session extend)
  1457. * all methods utilised for user functionality during a session.
  1458. *
  1459. * @package phpBB3
  1460. */
  1461. class user extends session
  1462. {
  1463. var $lang = array();
  1464. var $help = array();
  1465. var $theme = array();
  1466. var $date_format;
  1467. var $timezone;
  1468. var $dst;
  1469.  
  1470. var $lang_name = false;
  1471. var $lang_id = false;
  1472. var $lang_path;
  1473. var $img_lang;
  1474. var $img_array = array();
  1475.  
  1476. // Able to add new options (up to id 31)
  1477. var $keyoptions = array('viewimg' => 0, 'viewflash' => 1, 'viewsmilies' => 2, 'viewsigs' => 3, 'viewavatars' => 4, 'viewcensors' => 5, 'attachsig' => 6, 'bbcode' => 8, 'smilies' => 9, 'popuppm' => 10, 'viewtopicpreview' => 11, 'topicprevfirstlast' => 12, 'sig_bbcode' => 15, 'sig_smilies' => 16, 'sig_links' => 17);
  1478. var $keyvalues = array();
  1479.  
  1480. /**
  1481. * Constructor to set the lang path
  1482. */
  1483. function user()
  1484. {
  1485. global $phpbb_root_path;
  1486.  
  1487. $this->lang_path = $phpbb_root_path . 'language/';
  1488. }
  1489.  
  1490. /**
  1491. * Function to set custom language path (able to use directory outside of phpBB)
  1492. *
  1493. * @param string $lang_path New language path used.
  1494. * @access public
  1495. */
  1496. function set_custom_lang_path($lang_path)
  1497. {
  1498. $this->lang_path = $lang_path;
  1499.  
  1500. if (substr($this->lang_path, -1) != '/')
  1501. {
  1502. $this->lang_path .= '/';
  1503. }
  1504. }
  1505.  
  1506. /**
  1507. * Setup basic user-specific items (style, language, ...)
  1508. */
  1509. function setup($lang_set = false, $style = false)
  1510. {
  1511. global $db, $template, $config, $auth, $phpEx, $phpbb_root_path, $cache;
  1512.  
  1513. if ($this->data['user_id'] != ANONYMOUS)
  1514. {
  1515. $this->lang_name = (file_exists($this->lang_path . $this->data['user_lang'] . "/common.$phpEx")) ? $this->data['user_lang'] : basename($config['default_lang']);
  1516.  
  1517. $this->date_format = $this->data['user_dateformat'];
  1518. $this->timezone = $this->data['user_timezone'] * 3600;
  1519. $this->dst = $this->data['user_dst'] * 3600;
  1520. }
  1521. else
  1522. {
  1523. $this->lang_name = basename($config['default_lang']);
  1524. $this->date_format = $config['default_dateformat'];
  1525. $this->timezone = $config['board_timezone'] * 3600;
  1526. $this->dst = $config['board_dst'] * 3600;
  1527.  
  1528. /**
  1529. * If a guest user is surfing, we try to guess his/her language first by obtaining the browser language
  1530. * If re-enabled we need to make sure only those languages installed are checked
  1531. * Commented out so we do not loose the code.
  1532.  
  1533. if (isset($_SERVER['HTTP_ACCEPT_LANGUAGE']))
  1534. {
  1535. $accept_lang_ary = explode(',', $_SERVER['HTTP_ACCEPT_LANGUAGE']);
  1536.  
  1537. foreach ($accept_lang_ary as $accept_lang)
  1538. {
  1539. // Set correct format ... guess full xx_YY form
  1540. $accept_lang = substr($accept_lang, 0, 2) . '_' . strtoupper(substr($accept_lang, 3, 2));
  1541. $accept_lang = basename($accept_lang);
  1542.  
  1543. if (file_exists($this->lang_path . $accept_lang . "/common.$phpEx"))
  1544. {
  1545. $this->lang_name = $config['default_lang'] = $accept_lang;
  1546. break;
  1547. }
  1548. else
  1549. {
  1550. // No match on xx_YY so try xx
  1551. $accept_lang = substr($accept_lang, 0, 2);
  1552. $accept_lang = basename($accept_lang);
  1553.  
  1554. if (file_exists($this->lang_path . $accept_lang . "/common.$phpEx"))
  1555. {
  1556. $this->lang_name = $config['default_lang'] = $accept_lang;
  1557. break;
  1558. }
  1559. }
  1560. }
  1561. }
  1562. */
  1563. }
  1564.  
  1565. // We include common language file here to not load it every time a custom language file is included
  1566. $lang = &$this->lang;
  1567.  
  1568. // Do not suppress error if in DEBUG_EXTRA mode
  1569. $include_result = (defined('DEBUG_EXTRA')) ? (include $this->lang_path . $this->lang_name . "/common.$phpEx") : (@include $this->lang_path . $this->lang_name . "/common.$phpEx");
  1570.  
  1571. if ($include_result === false)
  1572. {
  1573. die('Language file ' . $this->lang_path . $this->lang_name . "/common.$phpEx" . " couldn't be opened.");
  1574. }
  1575.  
  1576. $this->add_lang($lang_set);
  1577. unset($lang_set);
  1578.  
  1579. if (!empty($_GET['style']) && !defined('ADMIN_START'))
  1580. {
  1581. global $SID, $_EXTRA_URL;
  1582.  
  1583. $style = request_var('style', 0);
  1584. $SID .= '&amp;style=' . $style;
  1585. $_EXTRA_URL = array('style=' . $style);
  1586. }
  1587. else
  1588. {
  1589. // Set up style
  1590. //-- mod: Prime Quick Style -------------------------------------------------//
  1591. include($phpbb_root_path . 'includes/prime_quick_style.' . $phpEx);
  1592. $prime_quick_style->set_guest_style($style);
  1593. //-- end: Prime Quick Style -------------------------------------------------//
  1594.  
  1595. $style = ($style) ? $style : ((!$config['override_user_style']) ? $this->data['user_style'] : $config['default_style']);
  1596. }
  1597.  
  1598. $sql = 'SELECT s.style_id, t.template_storedb, t.template_path, t.template_id, t.bbcode_bitfield, t.template_inherits_id, t.template_inherit_path, c.theme_path, c.theme_name, c.theme_storedb, c.theme_id, i.imageset_path, i.imageset_id, i.imageset_name
  1599. FROM ' . STYLES_TABLE . ' s, ' . STYLES_TEMPLATE_TABLE . ' t, ' . STYLES_THEME_TABLE . ' c, ' . STYLES_IMAGESET_TABLE . " i
  1600. WHERE s.style_id = $style
  1601. AND t.template_id = s.template_id
  1602. AND c.theme_id = s.theme_id
  1603. AND i.imageset_id = s.imageset_id";
  1604. $result = $db->sql_query($sql, 3600);
  1605. $this->theme = $db->sql_fetchrow($result);
  1606. $db->sql_freeresult($result);
  1607.  
  1608. // User has wrong style
  1609. if (!$this->theme && $style == $this->data['user_style'])
  1610. {
  1611. $style = $this->data['user_style'] = $config['default_style'];
  1612.  
  1613. $sql = 'UPDATE ' . USERS_TABLE . "
  1614. SET user_style = $style
  1615. WHERE user_id = {$this->data['user_id']}";
  1616. $db->sql_query($sql);
  1617.  
  1618. $sql = 'SELECT s.style_id, t.template_storedb, t.template_path, t.template_id, t.bbcode_bitfield, c.theme_path, c.theme_name, c.theme_storedb, c.theme_id, i.imageset_path, i.imageset_id, i.imageset_name
  1619. FROM ' . STYLES_TABLE . ' s, ' . STYLES_TEMPLATE_TABLE . ' t, ' . STYLES_THEME_TABLE . ' c, ' . STYLES_IMAGESET_TABLE . " i
  1620. WHERE s.style_id = $style
  1621. AND t.template_id = s.template_id
  1622. AND c.theme_id = s.theme_id
  1623. AND i.imageset_id = s.imageset_id";
  1624. $result = $db->sql_query($sql, 3600);
  1625. $this->theme = $db->sql_fetchrow($result);
  1626. $db->sql_freeresult($result);
  1627. }
  1628.  
  1629. if (!$this->theme)
  1630. {
  1631. trigger_error('Could not get style data', E_USER_ERROR);
  1632. }
  1633.  
  1634. // Now parse the cfg file and cache it
  1635. $parsed_items = $cache->obtain_cfg_items($this->theme);
  1636.  
  1637. // We are only interested in the theme configuration for now
  1638. $parsed_items = $parsed_items['theme'];
  1639.  
  1640. $check_for = array(
  1641. 'parse_css_file' => (int) 0,
  1642. 'pagination_sep' => (string) ', '
  1643. );
  1644.  
  1645. foreach ($check_for as $key => $default_value)
  1646. {
  1647. $this->theme[$key] = (isset($parsed_items[$key])) ? $parsed_items[$key] : $default_value;
  1648. settype($this->theme[$key], gettype($default_value));
  1649.  
  1650. if (is_string($default_value))
  1651. {
  1652. $this->theme[$key] = htmlspecialchars($this->theme[$key]);
  1653. }
  1654. }
  1655.  
  1656. // If the style author specified the theme needs to be cached
  1657. // (because of the used paths and variables) than make sure it is the case.
  1658. // For example, if the theme uses language-specific images it needs to be stored in db.
  1659. if (!$this->theme['theme_storedb'] && $this->theme['parse_css_file'])
  1660. {
  1661. $this->theme['theme_storedb'] = 1;
  1662.  
  1663. $stylesheet = file_get_contents("{$phpbb_root_path}styles/{$this->theme['theme_path']}/theme/stylesheet.css");
  1664. // Match CSS imports
  1665. $matches = array();
  1666. preg_match_all('/@import url\(["\'](.*)["\']\);/i', $stylesheet, $matches);
  1667.  
  1668. if (sizeof($matches))
  1669. {
  1670. $content = '';
  1671. foreach ($matches[0] as $idx => $match)
  1672. {
  1673. if ($content = @file_get_contents("{$phpbb_root_path}styles/{$this->theme['theme_path']}/theme/" . $matches[1][$idx]))
  1674. {
  1675. $content = trim($content);
  1676. }
  1677. else
  1678. {
  1679. $content = '';
  1680. }
  1681. $stylesheet = str_replace($match, $content, $stylesheet);
  1682. }
  1683. unset($content);
  1684. }
  1685.  
  1686. $stylesheet = str_replace('./', 'styles/' . $this->theme['theme_path'] . '/theme/', $stylesheet);
  1687.  
  1688. $sql_ary = array(
  1689. 'theme_data' => $stylesheet,
  1690. 'theme_mtime' => time(),
  1691. 'theme_storedb' => 1
  1692. );
  1693.  
  1694. $sql = 'UPDATE ' . STYLES_THEME_TABLE . '
  1695. SET ' . $db->sql_build_array('UPDATE', $sql_ary) . '
  1696. WHERE theme_id = ' . $this->theme['theme_id'];
  1697. $db->sql_query($sql);
  1698.  
  1699. unset($sql_ary);
  1700. }
  1701.  
  1702. $template->set_template();
  1703.  
  1704. $this->img_lang = (file_exists($phpbb_root_path . 'styles/' . $this->theme['imageset_path'] . '/imageset/' . $this->lang_name)) ? $this->lang_name : $config['default_lang'];
  1705.  
  1706. // Same query in style.php
  1707. $sql = 'SELECT *
  1708. FROM ' . STYLES_IMAGESET_DATA_TABLE . '
  1709. WHERE imageset_id = ' . $this->theme['imageset_id'] . "
  1710. AND image_filename <> ''
  1711. AND image_lang IN ('" . $db->sql_escape($this->img_lang) . "', '')";
  1712. $result = $db->sql_query($sql, 3600);
  1713.  
  1714. $localised_images = false;
  1715. while ($row = $db->sql_fetchrow($result))
  1716. {
  1717. if ($row['image_lang'])
  1718. {
  1719. $localised_images = true;
  1720. }
  1721.  
  1722. $row['image_filename'] = rawurlencode($row['image_filename']);
  1723. $this->img_array[$row['image_name']] = $row;
  1724. }
  1725. $db->sql_freeresult($result);
  1726.  
  1727. // there were no localised images, try to refresh the localised imageset for the user's language
  1728. if (!$localised_images)
  1729. {
  1730. // Attention: this code ignores the image definition list from acp_styles and just takes everything
  1731. // that the config file contains
  1732. $sql_ary = array();
  1733.  
  1734. $db->sql_transaction('begin');
  1735.  
  1736. $sql = 'DELETE FROM ' . STYLES_IMAGESET_DATA_TABLE . '
  1737. WHERE imageset_id = ' . $this->theme['imageset_id'] . '
  1738. AND image_lang = \'' . $db->sql_escape($this->img_lang) . '\'';
  1739. $result = $db->sql_query($sql);
  1740.  
  1741. if (@file_exists("{$phpbb_root_path}styles/{$this->theme['imageset_path']}/imageset/{$this->img_lang}/imageset.cfg"))
  1742. {
  1743. $cfg_data_imageset_data = parse_cfg_file("{$phpbb_root_path}styles/{$this->theme['imageset_path']}/imageset/{$this->img_lang}/imageset.cfg");
  1744. foreach ($cfg_data_imageset_data as $image_name => $value)
  1745. {
  1746. if (strpos($value, '*') !== false)
  1747. {
  1748. if (substr($value, -1, 1) === '*')
  1749. {
  1750. list($image_filename, $image_height) = explode('*', $value);
  1751. $image_width = 0;
  1752. }
  1753. else
  1754. {
  1755. list($image_filename, $image_height, $image_width) = explode('*', $value);
  1756. }
  1757. }
  1758. else
  1759. {
  1760. $image_filename = $value;
  1761. $image_height = $image_width = 0;
  1762. }
  1763.  
  1764. if (strpos($image_name, 'img_') === 0 && $image_filename)
  1765. {
  1766. $image_name = substr($image_name, 4);
  1767. $sql_ary[] = array(
  1768. 'image_name' => (string) $image_name,
  1769. 'image_filename' => (string) $image_filename,
  1770. 'image_height' => (int) $image_height,
  1771. 'image_width' => (int) $image_width,
  1772. 'imageset_id' => (int) $this->theme['imageset_id'],
  1773. 'image_lang' => (string) $this->img_lang,
  1774. );
  1775. }
  1776. }
  1777. }
  1778.  
  1779. if (sizeof($sql_ary))
  1780. {
  1781. $db->sql_multi_insert(STYLES_IMAGESET_DATA_TABLE, $sql_ary);
  1782. $db->sql_transaction('commit');
  1783. $cache->destroy('sql', STYLES_IMAGESET_DATA_TABLE);
  1784.  
  1785. add_log('admin', 'LOG_IMAGESET_LANG_REFRESHED', $this->theme['imageset_name'], $this->img_lang);
  1786. }
  1787. else
  1788. {
  1789. $db->sql_transaction('commit');
  1790. add_log('admin', 'LOG_IMAGESET_LANG_MISSING', $this->theme['imageset_name'], $this->img_lang);
  1791. }
  1792. }
  1793.  
  1794. // Call phpbb_user_session_handler() in case external application want to "bend" some variables or replace classes...
  1795. // After calling it we continue script execution...
  1796. phpbb_user_session_handler();
  1797.  
  1798. // If this function got called from the error handler we are finished here.
  1799. if (defined('IN_ERROR_HANDLER'))
  1800. {
  1801. return;
  1802. }
  1803.  
  1804. // Disable board if the install/ directory is still present
  1805. // For the brave development army we do not care about this, else we need to comment out this everytime we develop locally
  1806. if (!defined('DEBUG_EXTRA') && !defined('ADMIN_START') && !defined('IN_INSTALL') && !defined('IN_LOGIN') && file_exists($phpbb_root_path . 'install') && !is_file($phpbb_root_path . 'install'))
  1807. {
  1808. // Adjust the message slightly according to the permissions
  1809. if ($auth->acl_gets('a_', 'm_') || $auth->acl_getf_global('m_'))
  1810. {
  1811. $message = 'REMOVE_INSTALL';
  1812. }
  1813. else
  1814. {
  1815. $message = (!empty($config['board_disable_msg'])) ? $config['board_disable_msg'] : 'BOARD_DISABLE';
  1816. }
  1817. trigger_error($message);
  1818. }
  1819.  
  1820. // Is board disabled and user not an admin or moderator?
  1821. if ($config['board_disable'] && !defined('IN_LOGIN') && !$auth->acl_gets('a_', 'm_') && !$auth->acl_getf_global('m_'))
  1822. {
  1823. if ($this->data['is_bot'])
  1824. {
  1825. header('HTTP/1.1 503 Service Unavailable');
  1826. }
  1827.  
  1828. $message = (!empty($config['board_disable_msg'])) ? $config['board_disable_msg'] : 'BOARD_DISABLE';
  1829. trigger_error($message);
  1830. }
  1831.  
  1832. // Is load exceeded?
  1833. if ($config['limit_load'] && $this->load !== false)
  1834. {
  1835. if ($this->load > floatval($config['limit_load']) && !defined('IN_LOGIN'))
  1836. {
  1837. // Set board disabled to true to let the admins/mods get the proper notification
  1838. $config['board_disable'] = '1';
  1839.  
  1840. if (!$auth->acl_gets('a_', 'm_') && !$auth->acl_getf_global('m_'))
  1841. {
  1842. if ($this->data['is_bot'])
  1843. {
  1844. header('HTTP/1.1 503 Service Unavailable');
  1845. }
  1846. trigger_error('BOARD_UNAVAILABLE');
  1847. }
  1848. }
  1849. }
  1850.  
  1851. if (isset($this->data['session_viewonline']))
  1852. {
  1853. // Make sure the user is able to hide his session
  1854. if (!$this->data['session_viewonline'])
  1855. {
  1856. // Reset online status if not allowed to hide the session...
  1857. if (!$auth->acl_get('u_hideonline'))
  1858. {
  1859. $sql = 'UPDATE ' . SESSIONS_TABLE . '
  1860. SET session_viewonline = 1
  1861. WHERE session_user_id = ' . $this->data['user_id'];
  1862. $db->sql_query($sql);
  1863. $this->data['session_viewonline'] = 1;
  1864. }
  1865. }
  1866. else if (!$this->data['user_allow_viewonline'])
  1867. {
  1868. // the user wants to hide and is allowed to -> cloaking device on.
  1869. if ($auth->acl_get('u_hideonline'))
  1870. {
  1871. $sql = 'UPDATE ' . SESSIONS_TABLE . '
  1872. SET session_viewonline = 0
  1873. WHERE session_user_id = ' . $this->data['user_id'];
  1874. $db->sql_query($sql);
  1875. $this->data['session_viewonline'] = 0;
  1876. }
  1877. }
  1878. }
  1879.  
  1880.  
  1881. // Does the user need to change their password? If so, redirect to the
  1882. // ucp profile reg_details page ... of course do not redirect if we're already in the ucp
  1883. if (!defined('IN_ADMIN') && !defined('ADMIN_START') && $config['chg_passforce'] && !empty($this->data['is_registered']) && $auth->acl_get('u_chgpasswd') && $this->data['user_passchg'] < time() - ($config['chg_passforce'] * 86400))
  1884. {
  1885. if (strpos($this->page['query_string'], 'mode=reg_details') === false && $this->page['page_name'] != "ucp.$phpEx")
  1886. {
  1887. redirect(append_sid("{$phpbb_root_path}ucp.$phpEx", 'i=profile&amp;mode=reg_details'));
  1888. }
  1889. }
  1890.  
  1891. return;
  1892. }
  1893.  
  1894. /**
  1895. * More advanced language substitution
  1896. * Function to mimic sprintf() with the possibility of using phpBB's language system to substitute nullar/singular/plural forms.
  1897. * Params are the language key and the parameters to be substituted.
  1898. * This function/functionality is inspired by SHS` and Ashe.
  1899. *
  1900. * Example call: <samp>$user->lang('NUM_POSTS_IN_QUEUE', 1);</samp>
  1901. */
  1902. function lang()
  1903. {
  1904. $args = func_get_args();
  1905. $key = $args[0];
  1906.  
  1907. if (is_array($key))
  1908. {
  1909. $lang = &$this->lang[array_shift($key)];
  1910.  
  1911. foreach ($key as $_key)
  1912. {
  1913. $lang = &$lang[$_key];
  1914. }
  1915. }
  1916. else
  1917. {
  1918. $lang = &$this->lang[$key];
  1919. }
  1920.  
  1921. // Return if language string does not exist
  1922. if (!isset($lang) || (!is_string($lang) && !is_array($lang)))
  1923. {
  1924. return $key;
  1925. }
  1926.  
  1927. // If the language entry is a string, we simply mimic sprintf() behaviour
  1928. if (is_string($lang))
  1929. {
  1930. if (sizeof($args) == 1)
  1931. {
  1932. return $lang;
  1933. }
  1934.  
  1935. // Replace key with language entry and simply pass along...
  1936. $args[0] = $lang;
  1937. return call_user_func_array('sprintf', $args);
  1938. }
  1939.  
  1940. // It is an array... now handle different nullar/singular/plural forms
  1941. $key_found = false;
  1942.  
  1943. // We now get the first number passed and will select the key based upon this number
  1944. for ($i = 1, $num_args = sizeof($args); $i < $num_args; $i++)
  1945. {
  1946. if (is_int($args[$i]))
  1947. {
  1948. $numbers = array_keys($lang);
  1949.  
  1950. foreach ($numbers as $num)
  1951. {
  1952. if ($num > $args[$i])
  1953. {
  1954. break;
  1955. }
  1956.  
  1957. $key_found = $num;
  1958. }
  1959. }
  1960. }
  1961.  
  1962. // Ok, let's check if the key was found, else use the last entry (because it is mostly the plural form)
  1963. if ($key_found === false)
  1964. {
  1965. $numbers = array_keys($lang);
  1966. $key_found = end($numbers);
  1967. }
  1968.  
  1969. // Use the language string we determined and pass it to sprintf()
  1970. $args[0] = $lang[$key_found];
  1971. return call_user_func_array('sprintf', $args);
  1972. }
  1973.  
  1974. /**
  1975. * Add Language Items - use_db and use_help are assigned where needed (only use them to force inclusion)
  1976. *
  1977. * @param mixed $lang_set specifies the language entries to include
  1978. * @param bool $use_db internal variable for recursion, do not use
  1979. * @param bool $use_help internal variable for recursion, do not use
  1980. *
  1981. * Examples:
  1982. * <code>
  1983. * $lang_set = array('posting', 'help' => 'faq');
  1984. * $lang_set = array('posting', 'viewtopic', 'help' => array('bbcode', 'faq'))
  1985. * $lang_set = array(array('posting', 'viewtopic'), 'help' => array('bbcode', 'faq'))
  1986. * $lang_set = 'posting'
  1987. * $lang_set = array('help' => 'faq', 'db' => array('help:faq', 'posting'))
  1988. * </code>
  1989. */
  1990. function add_lang($lang_set, $use_db = false, $use_help = false)
  1991. {
  1992. global $phpEx;
  1993.  
  1994. if (is_array($lang_set))
  1995. {
  1996. foreach ($lang_set as $key => $lang_file)
  1997. {
  1998. // Please do not delete this line.
  1999. // We have to force the type here, else [array] language inclusion will not work
  2000. $key = (string) $key;
  2001.  
  2002. if ($key == 'db')
  2003. {
  2004. $this->add_lang($lang_file, true, $use_help);
  2005. }
  2006. else if ($key == 'help')
  2007. {
  2008. $this->add_lang($lang_file, $use_db, true);
  2009. }
  2010. else if (!is_array($lang_file))
  2011. {
  2012. $this->set_lang($this->lang, $this->help, $lang_file, $use_db, $use_help);
  2013. }
  2014. else
  2015. {
  2016. $this->add_lang($lang_file, $use_db, $use_help);
  2017. }
  2018. }
  2019. unset($lang_set);
  2020. }
  2021. else if ($lang_set)
  2022. {
  2023. $this->set_lang($this->lang, $this->help, $lang_set, $use_db, $use_help);
  2024. }
  2025. }
  2026.  
  2027. /**
  2028. * Set language entry (called by add_lang)
  2029. * @access private
  2030. */
  2031. function set_lang(&$lang, &$help, $lang_file, $use_db = false, $use_help = false)
  2032. {
  2033. global $phpEx;
  2034.  
  2035. // Make sure the language name is set (if the user setup did not happen it is not set)
  2036. if (!$this->lang_name)
  2037. {
  2038. global $config;
  2039. $this->lang_name = basename($config['default_lang']);
  2040. }
  2041.  
  2042. // $lang == $this->lang
  2043. // $help == $this->help
  2044. // - add appropriate variables here, name them as they are used within the language file...
  2045. if (!$use_db)
  2046. {
  2047. if ($use_help && strpos($lang_file, '/') !== false)
  2048. {
  2049. $language_filename = $this->lang_path . $this->lang_name . '/' . substr($lang_file, 0, stripos($lang_file, '/') + 1) . 'help_' . substr($lang_file, stripos($lang_file, '/') + 1) . '.' . $phpEx;
  2050. }
  2051. else
  2052. {
  2053. $language_filename = $this->lang_path . $this->lang_name . '/' . (($use_help) ? 'help_' : '') . $lang_file . '.' . $phpEx;
  2054. }
  2055.  
  2056. if (!file_exists($language_filename))
  2057. {
  2058. global $config;
  2059.  
  2060. if ($this->lang_name == 'en')
  2061. {
  2062. // The user's selected language is missing the file, the board default's language is missing the file, and the file doesn't exist in /en.
  2063. $language_filename = str_replace($this->lang_path . 'en', $this->lang_path . $this->data['user_lang'], $language_filename);
  2064. trigger_error('Language file ' . $language_filename . ' couldn\'t be opened.', E_USER_ERROR);
  2065. }
  2066. else if ($this->lang_name == basename($config['default_lang']))
  2067. {
  2068. // Fall back to the English Language
  2069. $this->lang_name = 'en';
  2070. $this->set_lang($lang, $help, $lang_file, $use_db, $use_help);
  2071. }
  2072. else if ($this->lang_name == $this->data['user_lang'])
  2073. {
  2074. // Fall back to the board default language
  2075. $this->lang_name = basename($config['default_lang']);
  2076. $this->set_lang($lang, $help, $lang_file, $use_db, $use_help);
  2077. }
  2078.  
  2079. // Reset the lang name
  2080. $this->lang_name = (file_exists($this->lang_path . $this->data['user_lang'] . "/common.$phpEx")) ? $this->data['user_lang'] : basename($config['default_lang']);
  2081. return;
  2082. }
  2083.  
  2084. // Do not suppress error if in DEBUG_EXTRA mode
  2085. $include_result = (defined('DEBUG_EXTRA')) ? (include $language_filename) : (@include $language_filename);
  2086.  
  2087. if ($include_result === false)
  2088. {
  2089. trigger_error('Language file ' . $language_filename . ' couldn\'t be opened.', E_USER_ERROR);
  2090. }
  2091. }
  2092. else if ($use_db)
  2093. {
  2094. // Get Database Language Strings
  2095. // Put them into $lang if nothing is prefixed, put them into $help if help: is prefixed
  2096. // For example: help:faq, posting
  2097. }
  2098. }
  2099.  
  2100. /**
  2101. * Format user date
  2102. *
  2103. * @param int $gmepoch unix timestamp
  2104. * @param string $format date format in date() notation. | used to indicate relative dates, for example |d m Y|, h:i is translated to Today, h:i.
  2105. * @param bool $forcedate force non-relative date format.
  2106. *
  2107. * @return mixed translated date
  2108. */
  2109. function format_date($gmepoch, $format = false, $forcedate = false)
  2110. {
  2111. static $midnight;
  2112. static $date_cache;
  2113.  
  2114. $format = (!$format) ? $this->date_format : $format;
  2115. $now = time();
  2116. $delta = $now - $gmepoch;
  2117.  
  2118. if (!isset($date_cache[$format]))
  2119. {
  2120. // Is the user requesting a friendly date format (i.e. 'Today 12:42')?
  2121. $date_cache[$format] = array(
  2122. 'is_short' => strpos($format, '|'),
  2123. 'format_short' => substr($format, 0, strpos($format, '|')) . '||' . substr(strrchr($format, '|'), 1),
  2124. 'format_long' => str_replace('|', '', $format),
  2125. 'lang' => $this->lang['datetime'],
  2126. );
  2127.  
  2128. // Short representation of month in format? Some languages use different terms for the long and short format of May
  2129. if ((strpos($format, '\M') === false && strpos($format, 'M') !== false) || (strpos($format, '\r') === false && strpos($format, 'r') !== false))
  2130. {
  2131. $date_cache[$format]['lang']['May'] = $this->lang['datetime']['May_short'];
  2132. }
  2133. }
  2134.  
  2135. // Zone offset
  2136. $zone_offset = $this->timezone + $this->dst;
  2137.  
  2138. // Show date <= 1 hour ago as 'xx min ago'
  2139. // A small tolerence is given for times in the future but in the same minute are displayed as '< than a minute ago'
  2140. if ($delta <= 3600 && ($delta >= -5 || (($now / 60) % 60) == (($gmepoch / 60) % 60)) && $date_cache[$format]['is_short'] !== false && !$forcedate && isset($this->lang['datetime']['AGO']))
  2141. {
  2142. return $this->lang(array('datetime', 'AGO'), max(0, (int) floor($delta / 60)));
  2143. }
  2144.  
  2145. if (!$midnight)
  2146. {
  2147. list($d, $m, $y) = explode(' ', gmdate('j n Y', time() + $zone_offset));
  2148. $midnight = gmmktime(0, 0, 0, $m, $d, $y) - $zone_offset;
  2149. }
  2150.  
  2151. if ($date_cache[$format]['is_short'] !== false && !$forcedate && !($gmepoch < $midnight - 86400 || $gmepoch > $midnight + 172800))
  2152. {
  2153. $day = false;
  2154.  
  2155. if ($gmepoch > $midnight + 86400)
  2156. {
  2157. $day = 'TOMORROW';
  2158. }
  2159. else if ($gmepoch > $midnight)
  2160. {
  2161. $day = 'TODAY';
  2162. }
  2163. else if ($gmepoch > $midnight - 86400)
  2164. {
  2165. $day = 'YESTERDAY';
  2166. }
  2167.  
  2168. if ($day !== false)
  2169. {
  2170. return str_replace('||', $this->lang['datetime'][$day], strtr(@gmdate($date_cache[$format]['format_short'], $gmepoch + $zone_offset), $date_cache[$format]['lang']));
  2171. }
  2172. }
  2173.  
  2174. return strtr(@gmdate($date_cache[$format]['format_long'], $gmepoch + $zone_offset), $date_cache[$format]['lang']);
  2175. }
  2176.  
  2177. /**
  2178. * Get language id currently used by the user
  2179. */
  2180. function get_iso_lang_id()
  2181. {
  2182. global $config, $db;
  2183.  
  2184. if (!empty($this->lang_id))
  2185. {
  2186. return $this->lang_id;
  2187. }
  2188.  
  2189. if (!$this->lang_name)
  2190. {
  2191. $this->lang_name = $config['default_lang'];
  2192. }
  2193.  
  2194. $sql = 'SELECT lang_id
  2195. FROM ' . LANG_TABLE . "
  2196. WHERE lang_iso = '" . $db->sql_escape($this->lang_name) . "'";
  2197. $result = $db->sql_query($sql);
  2198. $this->lang_id = (int) $db->sql_fetchfield('lang_id');
  2199. $db->sql_freeresult($result);
  2200.  
  2201. return $this->lang_id;
  2202. }
  2203.  
  2204. /**
  2205. * Get users profile fields
  2206. */
  2207. function get_profile_fields($user_id)
  2208. {
  2209. global $db;
  2210.  
  2211. if (isset($this->profile_fields))
  2212. {
  2213. return;
  2214. }
  2215.  
  2216. $sql = 'SELECT *
  2217. FROM ' . PROFILE_FIELDS_DATA_TABLE . "
  2218. WHERE user_id = $user_id";
  2219. $result = $db->sql_query_limit($sql, 1);
  2220. $this->profile_fields = (!($row = $db->sql_fetchrow($result))) ? array() : $row;
  2221. $db->sql_freeresult($result);
  2222. }
  2223.  
  2224. /**
  2225. * Specify/Get image
  2226. * $suffix is no longer used - we know it. ;) It is there for backward compatibility.
  2227. */
  2228. function img($img, $alt = '', $width = false, $suffix = '', $type = 'full_tag')
  2229. {
  2230. static $imgs;
  2231. global $phpbb_root_path;
  2232.  
  2233. $img_data = &$imgs[$img];
  2234.  
  2235. if (empty($img_data))
  2236. {
  2237. if (!isset($this->img_array[$img]))
  2238. {
  2239. // Do not fill the image to let designers decide what to do if the image is empty
  2240. $img_data = '';
  2241. return $img_data;
  2242. }
  2243.  
  2244. // Use URL if told so
  2245. $root_path = (defined('PHPBB_USE_BOARD_URL_PATH') && PHPBB_USE_BOARD_URL_PATH) ? generate_board_url() . '/' : $phpbb_root_path;
  2246.  
  2247. $img_data['src'] = $root_path . 'styles/' . rawurlencode($this->theme['imageset_path']) . '/imageset/' . ($this->img_array[$img]['image_lang'] ? $this->img_array[$img]['image_lang'] .'/' : '') . $this->img_array[$img]['image_filename'];
  2248. $img_data['width'] = $this->img_array[$img]['image_width'];
  2249. $img_data['height'] = $this->img_array[$img]['image_height'];
  2250. }
  2251.  
  2252. $alt = (!empty($this->lang[$alt])) ? $this->lang[$alt] : $alt;
  2253.  
  2254. switch ($type)
  2255. {
  2256. case 'src':
  2257. return $img_data['src'];
  2258. break;
  2259.  
  2260. case 'width':
  2261. return ($width === false) ? $img_data['width'] : $width;
  2262. break;
  2263.  
  2264. case 'height':
  2265. return $img_data['height'];
  2266. break;
  2267.  
  2268. default:
  2269. $use_width = ($width === false) ? $img_data['width'] : $width;
  2270.  
  2271. return '<img src="' . $img_data['src'] . '"' . (($use_width) ? ' width="' . $use_width . '"' : '') . (($img_data['height']) ? ' height="' . $img_data['height'] . '"' : '') . ' alt="' . $alt . '" title="' . $alt . '" />';
  2272. break;
  2273. }
  2274. }
  2275.  
  2276. /**
  2277. * Get option bit field from user options
  2278. */
  2279. function optionget($key, $data = false)
  2280. {
  2281. if (!isset($this->keyvalues[$key]))
  2282. {
  2283. $var = ($data) ? $data : $this->data['user_options'];
  2284. $this->keyvalues[$key] = ($var & 1 << $this->keyoptions[$key]) ? true : false;
  2285. }
  2286.  
  2287. return $this->keyvalues[$key];
  2288. }
  2289.  
  2290. /**
  2291. * Set option bit field for user options
  2292. */
  2293. function optionset($key, $value, $data = false)
  2294. {
  2295. $var = ($data) ? $data : $this->data['user_options'];
  2296.  
  2297. if ($value && !($var & 1 << $this->keyoptions[$key]))
  2298. {
  2299. $var += 1 << $this->keyoptions[$key];
  2300. }
  2301. else if (!$value && ($var & 1 << $this->keyoptions[$key]))
  2302. {
  2303. $var -= 1 << $this->keyoptions[$key];
  2304. }
  2305. else
  2306. {
  2307. return ($data) ? $var : false;
  2308. }
  2309.  
  2310. if (!$data)
  2311. {
  2312. $this->data['user_options'] = $var;
  2313. return true;
  2314. }
  2315. else
  2316. {
  2317. return $var;
  2318. }
  2319. }
  2320.  
  2321. /**
  2322. * Funtion to make the user leave the NEWLY_REGISTERED system group.
  2323. * @access public
  2324. */
  2325. function leave_newly_registered()
  2326. {
  2327. global $db;
  2328.  
  2329. if (empty($this->data['user_new']))
  2330. {
  2331. return false;
  2332. }
  2333.  
  2334. if (!function_exists('remove_newly_registered'))
  2335. {
  2336. global $phpbb_root_path, $phpEx;
  2337.  
  2338. include($phpbb_root_path . 'includes/functions_user.' . $phpEx);
  2339. }
  2340. if ($group = remove_newly_registered($this->data['user_id'], $this->data))
  2341. {
  2342. $this->data['group_id'] = $group;
  2343.  
  2344. }
  2345. $this->data['user_permissions'] = '';
  2346. $this->data['user_new'] = 0;
  2347.  
  2348. return true;
  2349. }
  2350.  
  2351. /**
  2352. * Returns all password protected forum ids the user is currently NOT authenticated for.
  2353. *
  2354. * @return array Array of forum ids
  2355. * @access public
  2356. */
  2357. function get_passworded_forums()
  2358. {
  2359. global $db;
  2360.  
  2361. $sql = 'SELECT f.forum_id, fa.user_id
  2362. FROM ' . FORUMS_TABLE . ' f
  2363. LEFT JOIN ' . FORUMS_ACCESS_TABLE . " fa
  2364. ON (fa.forum_id = f.forum_id
  2365. AND fa.session_id = '" . $db->sql_escape($this->session_id) . "')
  2366. WHERE f.forum_password <> ''";
  2367. $result = $db->sql_query($sql);
  2368.  
  2369. $forum_ids = array();
  2370. while ($row = $db->sql_fetchrow($result))
  2371. {
  2372. $forum_id = (int) $row['forum_id'];
  2373.  
  2374. if ($row['user_id'] != $this->data['user_id'])
  2375. {
  2376. $forum_ids[$forum_id] = $forum_id;
  2377. }
  2378. }
  2379. $db->sql_freeresult($result);
  2380.  
  2381. return $forum_ids;
  2382. }
  2383. }
  2384.  
  2385. ?>
Advertisement
Add Comment
Please, Sign In to add comment