Advertisement
Guest User

Untitled

a guest
Nov 12th, 2016
98
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.06 KB | None | 0 0
  1. <?php
  2. /***************************************************************************
  3. * login.php
  4. * -------------------
  5. * begin : Saturday, Feb 13, 2001
  6. * copyright : (C) 2001 The phpBB Group
  7. * email : support@phpbb.com
  8. *
  9. * $Id: login.php 6772 2006-12-16 13:11:28Z acydburn $
  10. *
  11. *
  12. ***************************************************************************/
  13.  
  14. /***************************************************************************
  15. *
  16. * This program is free software; you can redistribute it and/or modify
  17. * it under the terms of the GNU General Public License as published by
  18. * the Free Software Foundation; either version 2 of the License, or
  19. * (at your option) any later version.
  20. *
  21. ***************************************************************************/
  22.  
  23. //
  24. // Allow people to reach login page if
  25. // board is shut down
  26. //
  27. define("IN_LOGIN", true);
  28.  
  29. define('IN_PHPBB', true);
  30. $phpbb_root_path = './';
  31. include($phpbb_root_path . 'extension.inc');
  32. include($phpbb_root_path . 'common.'.$phpEx);
  33.  
  34. //
  35. // Set page ID for session management
  36. //
  37. $userdata = session_pagestart($user_ip, PAGE_LOGIN);
  38. init_userprefs($userdata);
  39. //
  40. // End session management
  41. //
  42.  
  43. // session id check
  44. if (!empty($HTTP_POST_VARS['sid']) || !empty($HTTP_GET_VARS['sid']))
  45. {
  46. $sid = (!empty($HTTP_POST_VARS['sid'])) ? $HTTP_POST_VARS['sid'] : $HTTP_GET_VARS['sid'];
  47. }
  48. else
  49. {
  50. $sid = '';
  51. }
  52.  
  53. if( isset($HTTP_POST_VARS['login']) || isset($HTTP_GET_VARS['login']) || isset($HTTP_POST_VARS['logout']) || isset($HTTP_GET_VARS['logout']) )
  54. {
  55. if( ( isset($HTTP_POST_VARS['login']) || isset($HTTP_GET_VARS['login']) ) && (!$userdata['session_logged_in'] || isset($HTTP_POST_VARS['admin'])) )
  56. {
  57. $username = isset($HTTP_POST_VARS['username']) ? phpbb_clean_username($HTTP_POST_VARS['username']) : '';
  58. $password = isset($HTTP_POST_VARS['password']) ? $HTTP_POST_VARS['password'] : '';
  59.  
  60. // Modified for SQL injection
  61. $sql = "SELECT user_id, username, user_password, user_active, user_level, user_login_tries, user_last_login_try
  62. FROM " . USERS_TABLE . "
  63. WHERE username = '" . $username . "'";
  64. if ( !($result = $db->sql_query($sql)) )
  65. {
  66. message_die(GENERAL_ERROR, 'Error in obtaining userdata', '', __LINE__, __FILE__, $sql);
  67. }
  68.  
  69. if( $row = $db->sql_fetchrow($result) )
  70. {
  71. if( $row['user_level'] != ADMIN && $board_config['board_disable'] )
  72. {
  73. redirect(append_sid("index.$phpEx", true));
  74. }
  75. else
  76. {
  77. // If the last login is more than x minutes ago, then reset the login tries/time
  78. if ($row['user_last_login_try'] && $board_config['login_reset_time'] && $row['user_last_login_try'] < (time() - ($board_config['login_reset_time'] * 60)))
  79. {
  80. $db->sql_query('UPDATE ' . USERS_TABLE . ' SET user_login_tries = 0, user_last_login_try = 0 WHERE user_id = ' . $row['user_id']);
  81. $row['user_last_login_try'] = $row['user_login_tries'] = 0;
  82. }
  83.  
  84. // Check to see if user is allowed to login again... if his tries are exceeded
  85. if ($row['user_last_login_try'] && $board_config['login_reset_time'] && $board_config['max_login_attempts'] &&
  86. $row['user_last_login_try'] >= (time() - ($board_config['login_reset_time'] * 60)) && $row['user_login_tries'] >= $board_config['max_login_attempts'] && $userdata['user_level'] != ADMIN)
  87. {
  88. message_die(GENERAL_MESSAGE, sprintf($lang['Login_attempts_exceeded'], $board_config['max_login_attempts'], $board_config['login_reset_time']));
  89. }
  90.  
  91. // Modified for SQL injection
  92. $sql_checkpasswd = "SELECT user_id, username, user_password, user_active, user_level, user_login_tries, user_last_login_try
  93. FROM " . USERS_TABLE . "
  94. WHERE username = '" . $username . "'" . " AND user_password = '" . md5($password). "'";
  95. if ( !($result_checkpasswd = $db->sql_query($sql_checkpasswd)) )
  96. {
  97. message_die(GENERAL_ERROR, 'Error in obtaining userdata', '', __LINE__, __FILE__, $sql);
  98. }
  99. $row = $db->sql_fetchrow($result_checkpasswd);
  100. if($row && $row['user_active'] )
  101. {
  102. $autologin = ( isset($HTTP_POST_VARS['autologin']) ) ? TRUE : 0;
  103.  
  104. $admin = (isset($HTTP_POST_VARS['admin'])) ? 1 : 0;
  105. $session_id = session_begin($row['user_id'], $user_ip, PAGE_INDEX, FALSE, $autologin, $admin);
  106.  
  107. // Reset login tries
  108. $db->sql_query('UPDATE ' . USERS_TABLE . ' SET user_login_tries = 0, user_last_login_try = 0 WHERE user_id = ' . $row['user_id']);
  109.  
  110. if( $session_id )
  111. {
  112. $url = ( !empty($HTTP_POST_VARS['redirect']) ) ? str_replace('&amp;', '&', htmlspecialchars($HTTP_POST_VARS['redirect'])) : "index.$phpEx";
  113. redirect(append_sid($url, true));
  114. }
  115. else
  116. {
  117. message_die(CRITICAL_ERROR, "Couldn't start session : login", "", __LINE__, __FILE__);
  118. }
  119. }
  120. // Only store a failed login attempt for an active user - inactive users can't login even with a correct password
  121. elseif( $row['user_active'] )
  122. {
  123. // Save login tries and last login
  124. if ($row['user_id'] != ANONYMOUS)
  125. {
  126. $sql = 'UPDATE ' . USERS_TABLE . '
  127. SET user_login_tries = user_login_tries + 1, user_last_login_try = ' . time() . '
  128. WHERE user_id = ' . $row['user_id'];
  129. $db->sql_query($sql);
  130. }
  131. }
  132.  
  133. $redirect = ( !empty($HTTP_POST_VARS['redirect']) ) ? str_replace('&amp;', '&', htmlspecialchars($HTTP_POST_VARS['redirect'])) : '';
  134. $redirect = str_replace('?', '&', $redirect);
  135.  
  136. if (strstr(urldecode($redirect), "\n") || strstr(urldecode($redirect), "\r") || strstr(urldecode($redirect), ';url'))
  137. {
  138. message_die(GENERAL_ERROR, 'Tried to redirect to potentially insecure url.');
  139. }
  140.  
  141. $template->assign_vars(array(
  142. 'META' => "<meta http-equiv=\"refresh\" content=\"3;url=login.$phpEx?redirect=$redirect\">")
  143. );
  144.  
  145. $message = $lang['Error_login'] . '<br /><br />' . sprintf($lang['Click_return_login'], "<a href=\"login.$phpEx?redirect=$redirect\">", '</a>') . '<br /><br />' . sprintf($lang['Click_return_index'], '<a href="' . append_sid("index.$phpEx") . '">', '</a>');
  146.  
  147. message_die(GENERAL_MESSAGE, $message);
  148. }
  149. }
  150. else
  151. {
  152. $redirect = ( !empty($HTTP_POST_VARS['redirect']) ) ? str_replace('&amp;', '&', htmlspecialchars($HTTP_POST_VARS['redirect'])) : "";
  153. $redirect = str_replace("?", "&", $redirect);
  154.  
  155. if (strstr(urldecode($redirect), "\n") || strstr(urldecode($redirect), "\r") || strstr(urldecode($redirect), ';url'))
  156. {
  157. message_die(GENERAL_ERROR, 'Tried to redirect to potentially insecure url.');
  158. }
  159.  
  160. $template->assign_vars(array(
  161. 'META' => "<meta http-equiv=\"refresh\" content=\"3;url=login.$phpEx?redirect=$redirect\">")
  162. );
  163.  
  164. $message = $lang['Error_login'] . '<br /><br />' . sprintf($lang['Click_return_login'], "<a href=\"login.$phpEx?redirect=$redirect\">", '</a>') . '<br /><br />' . sprintf($lang['Click_return_index'], '<a href="' . append_sid("index.$phpEx") . '">', '</a>');
  165.  
  166. message_die(GENERAL_MESSAGE, $message);
  167. }
  168. }
  169. else if( ( isset($HTTP_GET_VARS['logout']) || isset($HTTP_POST_VARS['logout']) ) && $userdata['session_logged_in'] )
  170. {
  171. // session id check
  172. if ($sid == '' || $sid != $userdata['session_id'])
  173. {
  174. message_die(GENERAL_ERROR, 'Invalid_session');
  175. }
  176.  
  177. if( $userdata['session_logged_in'] )
  178. {
  179. session_end($userdata['session_id'], $userdata['user_id']);
  180. }
  181.  
  182. if (!empty($HTTP_POST_VARS['redirect']) || !empty($HTTP_GET_VARS['redirect']))
  183. {
  184. $url = (!empty($HTTP_POST_VARS['redirect'])) ? htmlspecialchars($HTTP_POST_VARS['redirect']) : htmlspecialchars($HTTP_GET_VARS['redirect']);
  185. $url = str_replace('&amp;', '&', $url);
  186. redirect(append_sid($url, true));
  187. }
  188. else
  189. {
  190. redirect(append_sid("index.$phpEx", true));
  191. }
  192. }
  193. else
  194. {
  195. $url = ( !empty($HTTP_POST_VARS['redirect']) ) ? str_replace('&amp;', '&', htmlspecialchars($HTTP_POST_VARS['redirect'])) : "index.$phpEx";
  196. redirect(append_sid($url, true));
  197. }
  198. }
  199. else
  200. {
  201. //
  202. // Do a full login page dohickey if
  203. // user not already logged in
  204. //
  205. if( !$userdata['session_logged_in'] || (isset($HTTP_GET_VARS['admin']) && $userdata['session_logged_in'] && $userdata['user_level'] == ADMIN))
  206. {
  207. $page_title = $lang['Login'];
  208. include($phpbb_root_path . 'includes/page_header.'.$phpEx);
  209.  
  210. $template->set_filenames(array(
  211. 'body' => 'login_body.tpl')
  212. );
  213.  
  214. $forward_page = '';
  215.  
  216. if( isset($HTTP_POST_VARS['redirect']) || isset($HTTP_GET_VARS['redirect']) )
  217. {
  218. $forward_to = $HTTP_SERVER_VARS['QUERY_STRING'];
  219.  
  220. if( preg_match("/^redirect=([a-z0-9\.#\/\?&=\+\-_]+)/si", $forward_to, $forward_matches) )
  221. {
  222. $forward_to = ( !empty($forward_matches[3]) ) ? $forward_matches[3] : $forward_matches[1];
  223. $forward_match = explode('&', $forward_to);
  224.  
  225. if(count($forward_match) > 1)
  226. {
  227. for($i = 1; $i < count($forward_match); $i++)
  228. {
  229. if( !ereg("sid=", $forward_match[$i]) )
  230. {
  231. if( $forward_page != '' )
  232. {
  233. $forward_page .= '&';
  234. }
  235. $forward_page .= $forward_match[$i];
  236. }
  237. }
  238. $forward_page = $forward_match[0] . '?' . $forward_page;
  239. }
  240. else
  241. {
  242. $forward_page = $forward_match[0];
  243. }
  244. }
  245. }
  246.  
  247. $username = ( $userdata['user_id'] != ANONYMOUS ) ? $userdata['username'] : '';
  248.  
  249. $s_hidden_fields = '<input type="hidden" name="redirect" value="' . $forward_page . '" />';
  250. $s_hidden_fields .= (isset($HTTP_GET_VARS['admin'])) ? '<input type="hidden" name="admin" value="1" />' : '';
  251.  
  252. make_jumpbox('viewforum.'.$phpEx);
  253. $template->assign_vars(array(
  254. 'USERNAME' => $username,
  255.  
  256. 'L_ENTER_PASSWORD' => (isset($HTTP_GET_VARS['admin'])) ? $lang['Admin_reauthenticate'] : $lang['Enter_password'],
  257. 'L_SEND_PASSWORD' => $lang['Forgotten_password'],
  258.  
  259. 'U_SEND_PASSWORD' => append_sid("profile.$phpEx?mode=sendpassword"),
  260.  
  261. 'S_HIDDEN_FIELDS' => $s_hidden_fields)
  262. );
  263.  
  264. $template->pparse('body');
  265.  
  266. include($phpbb_root_path . 'includes/page_tail.'.$phpEx);
  267. }
  268. else
  269. {
  270. redirect(append_sid("index.$phpEx", true));
  271. }
  272.  
  273. }
  274.  
  275. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement