= time()))
return;
require_once($sourcedir . '/Subs-Auth.php');
// Hashed password, ahoy!
if (isset($_POST['admin_hash_pass']) && strlen($_POST['admin_hash_pass']) == 40)
{
checkSession();
$good_password = in_array(true, call_integration_hook('integrate_verify_password', array($user_info['username'], $_POST['admin_hash_pass'], true)), true);
if ($good_password || $_POST['admin_hash_pass'] == sha1($user_info['passwd'] . $sc))
{
$_SESSION['admin_time'] = time();
unset($_SESSION['request_referer']);
return;
}
}
// Posting the password... check it.
if (isset($_POST['admin_pass']))
{
checkSession();
$good_password = in_array(true, call_integration_hook('integrate_verify_password', array($user_info['username'], $_POST['admin_pass'], false)), true);
// Password correct?
if ($good_password || sha1(strtolower($user_info['username']) . $_POST['admin_pass']) == $user_info['passwd'])
{
$_SESSION['admin_time'] = time();
unset($_SESSION['request_referer']);
return;
}
}
// OpenID?
if (!empty($user_settings['openid_uri']))
{
require_once($sourcedir . '/Subs-OpenID.php');
smf_openID_revalidate();
$_SESSION['admin_time'] = time();
unset($_SESSION['request_referer']);
return;
}
// Better be sure to remember the real referer
if (empty($_SESSION['request_referer']))
$_SESSION['request_referer'] = isset($_SERVER['HTTP_REFERER']) ? @parse_url($_SERVER['HTTP_REFERER']) : array();
elseif (empty($_POST))
unset($_SESSION['request_referer']);
// Need to type in a password for that, man.
adminLogin();
}
// Require a user who is logged in. (not a guest.)
function is_not_guest($message = '')
{
global $user_info, $txt, $context, $scripturl;
// Luckily, this person isn't a guest.
if (!$user_info['is_guest'])
return;
// People always worry when they see people doing things they aren't actually doing...
$_GET['action'] = '';
$_GET['board'] = '';
$_GET['topic'] = '';
writeLog(true);
// Just die.
if (isset($_REQUEST['xml']))
obExit(false);
// Attempt to detect if they came from dlattach.
if (!WIRELESS && SMF != 'SSI' && empty($context['theme_loaded']))
loadTheme();
// Never redirect to an attachment
if (strpos($_SERVER['REQUEST_URL'], 'dlattach') === false)
$_SESSION['login_url'] = $_SERVER['REQUEST_URL'];
// Load the Login template and language file.
loadLanguage('Login');
// Are we in wireless mode?
if (WIRELESS)
{
$context['login_error'] = $message ? $message : $txt['only_members_can_access'];
$context['sub_template'] = WIRELESS_PROTOCOL . '_login';
}
// Apparently we're not in a position to handle this now. Let's go to a safer location for now.
elseif (empty($context['template_layers']))
{
$_SESSION['login_url'] = $scripturl . '?' . $_SERVER['QUERY_STRING'];
redirectexit('action=login');
}
else
{
loadTemplate('Login');
$context['sub_template'] = 'kick_guest';
$context['robot_no_index'] = true;
}
// Use the kick_guest sub template...
$context['kick_message'] = $message;
$context['page_title'] = $txt['login'];
obExit();
// We should never get to this point, but if we did we wouldn't know the user isn't a guest.
trigger_error('Hacking attempt...', E_USER_ERROR);
}
// Do banning related stuff. (ie. disallow access....)
function is_not_banned($forceCheck = false)
{
global $txt, $modSettings, $context, $user_info;
global $sourcedir, $cookiename, $user_settings, $smcFunc;
// You cannot be banned if you are an admin - doesn't help if you log out.
if ($user_info['is_admin'])
return;
// Only check the ban every so often. (to reduce load.)
if ($forceCheck || !isset($_SESSION['ban']) || empty($modSettings['banLastUpdated']) || ($_SESSION['ban']['last_checked'] < $modSettings['banLastUpdated']) || $_SESSION['ban']['id_member'] != $user_info['id'] || $_SESSION['ban']['ip'] != $user_info['ip'] || $_SESSION['ban']['ip2'] != $user_info['ip2'] || (isset($user_info['email'], $_SESSION['ban']['email']) && $_SESSION['ban']['email'] != $user_info['email']))
{
// Innocent until proven guilty. (but we know you are! :P)
$_SESSION['ban'] = array(
'last_checked' => time(),
'id_member' => $user_info['id'],
'ip' => $user_info['ip'],
'ip2' => $user_info['ip2'],
'email' => $user_info['email'],
);
$ban_query = array();
$ban_query_vars = array('current_time' => time());
$flag_is_activated = false;
// Check both IP addresses.
foreach (array('ip', 'ip2') as $ip_number)
{
// Check if we have a valid IP address.
if (preg_match('/^(\d{1,3})\.(\d{1,3})\.(\d{1,3})\.(\d{1,3})$/', $user_info[$ip_number], $ip_parts) == 1)
{
$ban_query[] = '((' . $ip_parts[1] . ' BETWEEN bi.ip_low1 AND bi.ip_high1)
AND (' . $ip_parts[2] . ' BETWEEN bi.ip_low2 AND bi.ip_high2)
AND (' . $ip_parts[3] . ' BETWEEN bi.ip_low3 AND bi.ip_high3)
AND (' . $ip_parts[4] . ' BETWEEN bi.ip_low4 AND bi.ip_high4))';
// IP was valid, maybe there's also a hostname...
if (empty($modSettings['disableHostnameLookup']))
{
$hostname = host_from_ip($user_info[$ip_number]);
if (strlen($hostname) > 0)
{
$ban_query[] = '({string:hostname} LIKE bi.hostname)';
$ban_query_vars['hostname'] = $hostname;
}
}
}
// We use '255.255.255.255' for 'unknown' since it's not valid anyway.
elseif ($user_info['ip'] == 'unknown')
$ban_query[] = '(bi.ip_low1 = 255 AND bi.ip_high1 = 255
AND bi.ip_low2 = 255 AND bi.ip_high2 = 255
AND bi.ip_low3 = 255 AND bi.ip_high3 = 255
AND bi.ip_low4 = 255 AND bi.ip_high4 = 255)';
}
// Is their email address banned?
if (strlen($user_info['email']) != 0)
{
$ban_query[] = '({string:email} LIKE bi.email_address)';
$ban_query_vars['email'] = $user_info['email'];
}
// How about this user?
if (!$user_info['is_guest'] && !empty($user_info['id']))
{
$ban_query[] = 'bi.id_member = {int:id_member}';
$ban_query_vars['id_member'] = $user_info['id'];
}
// Check the ban, if there's information.
if (!empty($ban_query))
{
$restrictions = array(
'cannot_access',
'cannot_login',
'cannot_post',
'cannot_register',
);
$request = $smcFunc['db_query']('', '
SELECT bi.id_ban, bi.email_address, bi.id_member, bg.cannot_access, bg.cannot_register,
bg.cannot_post, bg.cannot_login, bg.reason, IFNULL(bg.expire_time, 0) AS expire_time
FROM {db_prefix}ban_items AS bi
INNER JOIN {db_prefix}ban_groups AS bg ON (bg.id_ban_group = bi.id_ban_group AND (bg.expire_time IS NULL OR bg.expire_time > {int:current_time}))
WHERE
(' . implode(' OR ', $ban_query) . ')',
$ban_query_vars
);
// Store every type of ban that applies to you in your session.
while ($row = $smcFunc['db_fetch_assoc']($request))
{
foreach ($restrictions as $restriction)
if (!empty($row[$restriction]))
{
$_SESSION['ban'][$restriction]['reason'] = $row['reason'];
$_SESSION['ban'][$restriction]['ids'][] = $row['id_ban'];
if (!isset($_SESSION['ban']['expire_time']) || ($_SESSION['ban']['expire_time'] != 0 && ($row['expire_time'] == 0 || $row['expire_time'] > $_SESSION['ban']['expire_time'])))
$_SESSION['ban']['expire_time'] = $row['expire_time'];
if (!$user_info['is_guest'] && $restriction == 'cannot_access' && ($row['id_member'] == $user_info['id'] || array_key_exists($row['id_member'], $user_info['subaccounts']) || $row['email_address'] == $user_info['email']))
$flag_is_activated = true;
}
}
$smcFunc['db_free_result']($request);
}
// Mark the cannot_access and cannot_post bans as being 'hit'.
if (isset($_SESSION['ban']['cannot_access']) || isset($_SESSION['ban']['cannot_post']) || isset($_SESSION['ban']['cannot_login']))
log_ban(array_merge(isset($_SESSION['ban']['cannot_access']) ? $_SESSION['ban']['cannot_access']['ids'] : array(), isset($_SESSION['ban']['cannot_post']) ? $_SESSION['ban']['cannot_post']['ids'] : array(), isset($_SESSION['ban']['cannot_login']) ? $_SESSION['ban']['cannot_login']['ids'] : array()));
// If for whatever reason the is_activated flag seems wrong, do a little work to clear it up.
if ($user_info['id'] && (($user_settings['is_activated'] >= 10 && !$flag_is_activated)
|| ($user_settings['is_activated'] < 10 && $flag_is_activated)))
{
require_once($sourcedir . '/ManageBans.php');
updateBanMembers();
}
}
// Hey, I know you! You're ehm...
if (!isset($_SESSION['ban']['cannot_access']) && !empty($_COOKIE[$cookiename . '_']))
{
$bans = explode(',', $_COOKIE[$cookiename . '_']);
foreach ($bans as $key => $value)
$bans[$key] = (int) $value;
$request = $smcFunc['db_query']('', '
SELECT bi.id_ban, bg.reason
FROM {db_prefix}ban_items AS bi
INNER JOIN {db_prefix}ban_groups AS bg ON (bg.id_ban_group = bi.id_ban_group)
WHERE bi.id_ban IN ({array_int:ban_list})
AND (bg.expire_time IS NULL OR bg.expire_time > {int:current_time})
AND bg.cannot_access = {int:cannot_access}
LIMIT ' . count($bans),
array(
'cannot_access' => 1,
'ban_list' => $bans,
'current_time' => time(),
)
);
while ($row = $smcFunc['db_fetch_assoc']($request))
{
$_SESSION['ban']['cannot_access']['ids'][] = $row['id_ban'];
$_SESSION['ban']['cannot_access']['reason'] = $row['reason'];
}
$smcFunc['db_free_result']($request);
// My mistake. Next time better.
if (!isset($_SESSION['ban']['cannot_access']))
{
require_once($sourcedir . '/Subs-Auth.php');
$cookie_url = url_parts(!empty($modSettings['localCookies']), !empty($modSettings['globalCookies']));
setcookie($cookiename . '_', '', time() - 3600, $cookie_url[1], $cookie_url[0], 0);
}
}
// If you're fully banned, it's end of the story for you.
if (isset($_SESSION['ban']['cannot_access']))
{
// We don't wanna see you!
if (!$user_info['is_guest'])
$smcFunc['db_query']('', '
DELETE FROM {db_prefix}log_online
WHERE id_member = {int:current_member}',
array(
'current_member' => $user_info['id'],
)
);
// 'Log' the user out. Can't have any funny business... (save the name!)
$old_name = isset($user_info['name']) && $user_info['name'] != '' ? $user_info['name'] : $txt['guest_title'];
$user_info['name'] = '';
$user_info['username'] = '';
$user_info['is_guest'] = true;
$user_info['is_admin'] = false;
$user_info['permissions'] = array();
$user_info['id'] = 0;
$context['user'] = array(
'id' => 0,
'username' => '',
'name' => $txt['guest_title'],
'is_guest' => true,
'is_logged' => false,
'is_admin' => false,
'is_mod' => false,
'can_mod' => false,
'language' => $user_info['language'],
);
// A goodbye present.
require_once($sourcedir . '/Subs-Auth.php');
$cookie_url = url_parts(!empty($modSettings['localCookies']), !empty($modSettings['globalCookies']));
setcookie($cookiename . '_', implode(',', $_SESSION['ban']['cannot_access']['ids']), time() + 3153600, $cookie_url[1], $cookie_url[0], 0);
// Don't scare anyone, now.
$_GET['action'] = '';
$_GET['board'] = '';
$_GET['topic'] = '';
writeLog(true);
// You banned, sucka!
fatal_error(sprintf($txt['your_ban'], $old_name) . (empty($_SESSION['ban']['cannot_access']['reason']) ? '' : '
' . $_SESSION['ban']['cannot_access']['reason']) . '
' . (!empty($_SESSION['ban']['expire_time']) ? sprintf($txt['your_ban_expires'], timeformat($_SESSION['ban']['expire_time'], false)) : $txt['your_ban_expires_never']), 'user');
// If we get here, something's gone wrong.... but let's try anyway.
trigger_error('Hacking attempt...', E_USER_ERROR);
}
// You're not allowed to log in but yet you are. Let's fix that.
elseif (isset($_SESSION['ban']['cannot_login']) && !$user_info['is_guest'])
{
// We don't wanna see you!
$smcFunc['db_query']('', '
DELETE FROM {db_prefix}log_online
WHERE id_member = {int:current_member}',
array(
'current_member' => $user_info['id'],
)
);
// 'Log' the user out. Can't have any funny business... (save the name!)
$old_name = isset($user_info['name']) && $user_info['name'] != '' ? $user_info['name'] : $txt['guest_title'];
$user_info['name'] = '';
$user_info['username'] = '';
$user_info['is_guest'] = true;
$user_info['is_admin'] = false;
$user_info['permissions'] = array();
$user_info['id'] = 0;
$context['user'] = array(
'id' => 0,
'username' => '',
'name' => $txt['guest_title'],
'is_guest' => true,
'is_logged' => false,
'is_admin' => false,
'is_mod' => false,
'can_mod' => false,
'language' => $user_info['language'],
);
// SMF's Wipe 'n Clean(r) erases all traces.
$_GET['action'] = '';
$_GET['board'] = '';
$_GET['topic'] = '';
writeLog(true);
require_once($sourcedir . '/LogInOut.php');
Logout(true, false);
fatal_error(sprintf($txt['your_ban'], $old_name) . (empty($_SESSION['ban']['cannot_login']['reason']) ? '' : '
' . $_SESSION['ban']['cannot_login']['reason']) . '
' . (!empty($_SESSION['ban']['expire_time']) ? sprintf($txt['your_ban_expires'], timeformat($_SESSION['ban']['expire_time'], false)) : $txt['your_ban_expires_never']) . '
' . $txt['ban_continue_browse'], 'user');
}
// Fix up the banning permissions.
if (isset($user_info['permissions']))
banPermissions();
}
// Fix permissions according to ban status.
function banPermissions()
{
global $user_info, $sourcedir, $modSettings, $context;
// Somehow they got here, at least take away all permissions...
if (isset($_SESSION['ban']['cannot_access']))
$user_info['permissions'] = array();
// Okay, well, you can watch, but don't touch a thing.
elseif (isset($_SESSION['ban']['cannot_post']) || (!empty($modSettings['warning_mute']) && $modSettings['warning_mute'] <= $user_info['warning']))
{
$denied_permissions = array(
'pm_send',
'calendar_post', 'calendar_edit_own', 'calendar_edit_any',
'poll_post',
'poll_add_own', 'poll_add_any',
'poll_edit_own', 'poll_edit_any',
'poll_lock_own', 'poll_lock_any',
'poll_remove_own', 'poll_remove_any',
'manage_attachments', 'manage_smileys', 'manage_boards', 'admin_forum', 'manage_permissions',
'moderate_forum', 'manage_membergroups', 'manage_bans', 'send_mail', 'edit_news',
'profile_identity_any', 'profile_extra_any', 'profile_title_any',
'post_new', 'post_reply_own', 'post_reply_any',
'delete_own', 'delete_any', 'delete_replies',
'make_sticky',
'merge_any', 'split_any',
'modify_own', 'modify_any', 'modify_replies',
'move_any',
'send_topic',
'lock_own', 'lock_any',
'remove_own', 'remove_any',
'post_unapproved_topics', 'post_unapproved_replies_own', 'post_unapproved_replies_any',
);
$user_info['permissions'] = array_diff($user_info['permissions'], $denied_permissions);
}
// Are they absolutely under moderation?
elseif (!empty($modSettings['warning_moderate']) && $modSettings['warning_moderate'] <= $user_info['warning'])
{
// Work out what permissions should change...
$permission_change = array(
'post_new' => 'post_unapproved_topics',
'post_reply_own' => 'post_unapproved_replies_own',
'post_reply_any' => 'post_unapproved_replies_any',
'post_attachment' => 'post_unapproved_attachments',
);
foreach ($permission_change as $old => $new)
{
if (!in_array($old, $user_info['permissions']))
unset($permission_change[$old]);
else
$user_info['permissions'][] = $new;
}
$user_info['permissions'] = array_diff($user_info['permissions'], array_keys($permission_change));
}
//!!! Find a better place to call this? Needs to be after permissions loaded!
// Finally, some bits we cache in the session because it saves queries.
if (isset($_SESSION['mc']) && $_SESSION['mc']['time'] > $modSettings['settings_updated'] && ($_SESSION['mc']['id'] == $user_info['id'] || array_key_exists($_SESSION['mc']['id'], $user_info['subaccounts'])))
$user_info['mod_cache'] = $_SESSION['mc'];
else
{
require_once($sourcedir . '/Subs-Auth.php');
rebuildModCache();
}
// Now that we have the mod cache taken care of lets setup a cache for the number of mod reports still open
if (isset($_SESSION['rc']) && $_SESSION['rc']['time'] > $modSettings['last_mod_report_action'] && ($_SESSION['rc']['id'] == $user_info['id'] || array_key_exists($_SESSION['rc']['id'], $user_info['subaccounts'])))
$context['open_mod_reports'] = $_SESSION['rc']['reports'];
elseif ($_SESSION['mc']['bq'] != '0=1')
{
require_once($sourcedir . '/ModerationCenter.php');
recountOpenReports();
}
else
$context['open_mod_reports'] = 0;
}
// Log a ban in the database.
function log_ban($ban_ids = array(), $email = null)
{
global $user_info, $smcFunc;
// Don't log web accelerators, it's very confusing...
if (isset($_SERVER['HTTP_X_MOZ']) && $_SERVER['HTTP_X_MOZ'] == 'prefetch')
return;
$smcFunc['db_insert']('',
'{db_prefix}log_banned',
array('id_member' => 'int', 'ip' => 'string-16', 'email' => 'string', 'log_time' => 'int'),
array($user_info['id'], $user_info['ip'], ($email === null ? ($user_info['is_guest'] ? '' : $user_info['email']) : $email), time()),
array('id_ban_log')
);
// One extra point for these bans.
if (!empty($ban_ids))
$smcFunc['db_query']('', '
UPDATE {db_prefix}ban_items
SET hits = hits + 1
WHERE id_ban IN ({array_int:ban_ids})',
array(
'ban_ids' => $ban_ids,
)
);
}
// Checks if a given email address might be banned.
function isBannedEmail($email, $restriction, $error)
{
global $txt, $smcFunc;
// Can't ban an empty email
if (empty($email) || trim($email) == '')
return;
// Let's start with the bans based on your IP/hostname/memberID...
$ban_ids = isset($_SESSION['ban'][$restriction]) ? $_SESSION['ban'][$restriction]['ids'] : array();
$ban_reason = isset($_SESSION['ban'][$restriction]) ? $_SESSION['ban'][$restriction]['reason'] : '';
// ...and add to that the email address you're trying to register.
$request = $smcFunc['db_query']('', '
SELECT bi.id_ban, bg.' . $restriction . ', bg.cannot_access, bg.reason
FROM {db_prefix}ban_items AS bi
INNER JOIN {db_prefix}ban_groups AS bg ON (bg.id_ban_group = bi.id_ban_group)
WHERE {string:email} LIKE bi.email_address
AND (bg.' . $restriction . ' = {int:cannot_access} OR bg.cannot_access = {int:cannot_access})
AND (bg.expire_time IS NULL OR bg.expire_time >= {int:now})',
array(
'email' => $email,
'cannot_access' => 1,
'now' => time(),
)
);
while ($row = $smcFunc['db_fetch_assoc']($request))
{
if (!empty($row['cannot_access']))
{
$_SESSION['ban']['cannot_access']['ids'][] = $row['id_ban'];
$_SESSION['ban']['cannot_access']['reason'] = $row['reason'];
}
if (!empty($row[$restriction]))
{
$ban_ids[] = $row['id_ban'];
$ban_reason = $row['reason'];
}
}
$smcFunc['db_free_result']($request);
// You're in biiig trouble. Banned for the rest of this session!
if (isset($_SESSION['ban']['cannot_access']))
{
log_ban($_SESSION['ban']['cannot_access']['ids']);
$_SESSION['ban']['last_checked'] = time();
fatal_error(sprintf($txt['your_ban'], $txt['guest_title']) . $_SESSION['ban']['cannot_access']['reason'], false);
}
if (!empty($ban_ids))
{
// Log this ban for future reference.
log_ban($ban_ids, $email);
fatal_error($error . $ban_reason, false);
}
}
// Make sure the user's correct session was passed, and they came from here. (type can be post, get, or request.)
function checkSession($type = 'post', $from_action = '', $is_fatal = true)
{
global $sc, $modSettings, $boardurl;
// Is it in as $_POST['sc']?
if ($type == 'post')
{
$check = isset($_POST[$_SESSION['session_var']]) ? $_POST[$_SESSION['session_var']] : (empty($modSettings['strictSessionCheck']) && isset($_POST['sc']) ? $_POST['sc'] : null);
if ($check !== $sc)
$error = 'session_timeout';
}
// How about $_GET['sesc']?
elseif ($type == 'get')
{
$check = isset($_GET[$_SESSION['session_var']]) ? $_GET[$_SESSION['session_var']] : (empty($modSettings['strictSessionCheck']) && isset($_GET['sesc']) ? $_GET['sesc'] : null);
if ($check !== $sc)
$error = 'session_verify_fail';
}
// Or can it be in either?
elseif ($type == 'request')
{
$check = isset($_GET[$_SESSION['session_var']]) ? $_GET[$_SESSION['session_var']] : (empty($modSettings['strictSessionCheck']) && isset($_GET['sesc']) ? $_GET['sesc'] : (isset($_POST[$_SESSION['session_var']]) ? $_POST[$_SESSION['session_var']] : (empty($modSettings['strictSessionCheck']) && isset($_POST['sc']) ? $_POST['sc'] : null)));
if ($check !== $sc)
$error = 'session_verify_fail';
}
// Verify that they aren't changing user agents on us - that could be bad.
if ((!isset($_SESSION['USER_AGENT']) || $_SESSION['USER_AGENT'] != $_SERVER['HTTP_USER_AGENT']) && empty($modSettings['disableCheckUA']))
$error = 'session_verify_fail';
// Make sure a page with session check requirement is not being prefetched.
if (isset($_SERVER['HTTP_X_MOZ']) && $_SERVER['HTTP_X_MOZ'] == 'prefetch')
{
ob_end_clean();
header('HTTP/1.1 403 Forbidden');
die;
}
// Check the referring site - it should be the same server at least!
if (isset($_SESSION['request_referer']))
$referrer = $_SESSION['request_referer'];
else
$referrer = isset($_SERVER['HTTP_REFERER']) ? @parse_url($_SERVER['HTTP_REFERER']) : array();
if (!empty($referrer['host']))
{
if (strpos($_SERVER['HTTP_HOST'], ':') !== false)
$real_host = substr($_SERVER['HTTP_HOST'], 0, strpos($_SERVER['HTTP_HOST'], ':'));
else
$real_host = $_SERVER['HTTP_HOST'];
$parsed_url = parse_url($boardurl);
// Are global cookies on? If so, let's check them ;).
if (!empty($modSettings['globalCookies']))
{
if (preg_match('~(?:[^\.]+\.)?([^\.]{3,}\..+)\z~i', $parsed_url['host'], $parts) == 1)
$parsed_url['host'] = $parts[1];
if (preg_match('~(?:[^\.]+\.)?([^\.]{3,}\..+)\z~i', $referrer['host'], $parts) == 1)
$referrer['host'] = $parts[1];
if (preg_match('~(?:[^\.]+\.)?([^\.]{3,}\..+)\z~i', $real_host, $parts) == 1)
$real_host = $parts[1];
}
// Okay: referrer must either match parsed_url or real_host.
if (isset($parsed_url['host']) && strtolower($referrer['host']) != strtolower($parsed_url['host']) && strtolower($referrer['host']) != strtolower($real_host))
{
$error = 'verify_url_fail';
$log_error = true;
}
}
// Well, first of all, if a from_action is specified you'd better have an old_url.
if (!empty($from_action) && (!isset($_SESSION['old_url']) || preg_match('~[?;&]action=' . $from_action . '([;&]|$)~', $_SESSION['old_url']) == 0))
{
$error = 'verify_url_fail';
$log_error = true;
}
if (strtolower($_SERVER['HTTP_USER_AGENT']) == 'hacker')
fatal_error('Sound the alarm! It\'s a hacker! Close the castle gates!!', false);
// Everything is ok, return an empty string.
if (!isset($error))
return '';
// A session error occurred, show the error.
elseif ($is_fatal)
{
if (isset($_GET['xml']))
{
ob_end_clean();
header('HTTP/1.1 403 Forbidden - Session timeout');
die;
}
else
fatal_lang_error($error, isset($log_error) ? 'user' : false);
}
// A session error occurred, return the error to the calling function.
else
return $error;
// We really should never fall through here, for very important reasons. Let's make sure.
trigger_error('Hacking attempt...', E_USER_ERROR);
}
// Check if a specific confirm parameter was given.
function checkConfirm($action)
{
global $modSettings;
if (isset($_GET['confirm']) && isset($_SESSION['confirm_' . $action]) && md5($_GET['confirm'] . $_SERVER['HTTP_USER_AGENT']) == $_SESSION['confirm_' . $action])
return true;
else
{
$token = md5(mt_rand() . session_id() . (string) microtime() . $modSettings['rand_seed']);
$_SESSION['confirm_' . $action] = md5($token . $_SERVER['HTTP_USER_AGENT']);
return $token;
}
}
// Check whether a form has been submitted twice.
function checkSubmitOnce($action, $is_fatal = true)
{
global $context;
if (!isset($_SESSION['forms']))
$_SESSION['forms'] = array();
// Register a form number and store it in the session stack. (use this on the page that has the form.)
if ($action == 'register')
{
$context['form_sequence_number'] = 0;
while (empty($context['form_sequence_number']) || in_array($context['form_sequence_number'], $_SESSION['forms']))
$context['form_sequence_number'] = mt_rand(1, 16000000);
}
// Check whether the submitted number can be found in the session.
elseif ($action == 'check')
{
if (!isset($_REQUEST['seqnum']))
return true;
elseif (!in_array($_REQUEST['seqnum'], $_SESSION['forms']))
{
$_SESSION['forms'][] = (int) $_REQUEST['seqnum'];
return true;
}
elseif ($is_fatal)
fatal_lang_error('error_form_already_submitted', false);
else
return false;
}
// Don't check, just free the stack number.
elseif ($action == 'free' && isset($_REQUEST['seqnum']) && in_array($_REQUEST['seqnum'], $_SESSION['forms']))
$_SESSION['forms'] = array_diff($_SESSION['forms'], array($_REQUEST['seqnum']));
elseif ($action != 'free')
trigger_error('checkSubmitOnce(): Invalid action \'' . $action . '\'', E_USER_WARNING);
}
// Check the user's permissions.
function allowedTo($permission, $boards = null)
{
global $user_info, $modSettings, $smcFunc;
// You're always allowed to do nothing. (unless you're a working man, MR. LAZY :P!)
if (empty($permission))
return true;
// You're never allowed to do something if your data hasn't been loaded yet!
if (empty($user_info))
return false;
// Administrators are supermen :P.
if ($user_info['is_admin'])
return true;
// Are we checking the _current_ board, or some other boards?
if ($boards === null)
{
// Check if they can do it.
if (!is_array($permission) && in_array($permission, $user_info['permissions']))
return true;
// Search for any of a list of permissions.
elseif (is_array($permission) && count(array_intersect($permission, $user_info['permissions'])) != 0)
return true;
// You aren't allowed, by default.
else
return false;
}
elseif (!is_array($boards))
$boards = array($boards);
$request = $smcFunc['db_query']('', '
SELECT MIN(bp.add_deny) AS add_deny
FROM {db_prefix}boards AS b
INNER JOIN {db_prefix}board_permissions AS bp ON (bp.id_profile = b.id_profile)
LEFT JOIN {db_prefix}moderators AS mods ON (mods.id_board = b.id_board AND mods.id_member = {int:current_member})
WHERE b.id_board IN ({array_int:board_list})
AND bp.id_group IN ({array_int:group_list}, {int:moderator_group})
AND bp.permission {raw:permission_list}
AND (mods.id_member IS NOT NULL OR bp.id_group != {int:moderator_group})
GROUP BY b.id_board',
array(
'current_member' => $user_info['id'],
'board_list' => $boards,
'group_list' => $user_info['groups'],
'moderator_group' => 3,
'permission_list' => (is_array($permission) ? 'IN (\'' . implode('\', \'', $permission) . '\')' : ' = \'' . $permission . '\''),
)
);
// Make sure they can do it on all of the boards.
if ($smcFunc['db_num_rows']($request) != count($boards))
return false;
$result = true;
while ($row = $smcFunc['db_fetch_assoc']($request))
$result &= !empty($row['add_deny']);
$smcFunc['db_free_result']($request);
// If the query returned 1, they can do it... otherwise, they can't.
return $result;
}
// Fatal error if they cannot...
function isAllowedTo($permission, $boards = null)
{
global $user_info, $txt;
static $heavy_permissions = array(
'admin_forum',
'manage_attachments',
'manage_smileys',
'manage_boards',
'edit_news',
'moderate_forum',
'manage_bans',
'manage_membergroups',
'manage_permissions',
);
// Make it an array, even if a string was passed.
$permission = is_array($permission) ? $permission : array($permission);
// Check the permission and return an error...
if (!allowedTo($permission, $boards))
{
// Pick the last array entry as the permission shown as the error.
$error_permission = array_shift($permission);
// If they are a guest, show a login. (because the error might be gone if they do!)
if ($user_info['is_guest'])
{
loadLanguage('Errors');
is_not_guest($txt['cannot_' . $error_permission]);
}
// Clear the action because they aren't really doing that!
$_GET['action'] = '';
$_GET['board'] = '';
$_GET['topic'] = '';
writeLog(true);
fatal_lang_error('cannot_' . $error_permission, false);
// Getting this far is a really big problem, but let's try our best to prevent any cases...
trigger_error('Hacking attempt...', E_USER_ERROR);
}
// If you're doing something on behalf of some "heavy" permissions, validate your session.
// (take out the heavy permissions, and if you can't do anything but those, you need a validated session.)
if (!allowedTo(array_diff($permission, $heavy_permissions), $boards))
validateSession();
}
// Return the boards a user has a certain (board) permission on. (array(0) if all.)
function boardsAllowedTo($permissions, $check_access = true)
{
global $user_info, $modSettings, $smcFunc;
// Administrators are all powerful, sorry.
if ($user_info['is_admin'])
return array(0);
// Arrays are nice, most of the time.
if (!is_array($permissions))
$permissions = array($permissions);
// All groups the user is in except 'moderator'.
$groups = array_diff($user_info['groups'], array(3));
$request = $smcFunc['db_query']('', '
SELECT b.id_board, bp.add_deny
FROM {db_prefix}board_permissions AS bp
INNER JOIN {db_prefix}boards AS b ON (b.id_profile = bp.id_profile)
LEFT JOIN {db_prefix}moderators AS mods ON (mods.id_board = b.id_board AND mods.id_member = {int:current_member})
WHERE bp.id_group IN ({array_int:group_list}, {int:moderator_group})
AND bp.permission IN ({array_string:permissions})
AND (mods.id_member IS NOT NULL OR bp.id_group != {int:moderator_group})' .
($check_access ? ' AND {query_see_board}' : ''),
array(
'current_member' => $user_info['id'],
'group_list' => $groups,
'moderator_group' => 3,
'permissions' => $permissions,
)
);
$boards = array();
$deny_boards = array();
while ($row = $smcFunc['db_fetch_assoc']($request))
{
if (empty($row['add_deny']))
$deny_boards[] = $row['id_board'];
else
$boards[] = $row['id_board'];
}
$smcFunc['db_free_result']($request);
$boards = array_unique(array_values(array_diff($boards, $deny_boards)));
return $boards;
}
function showEmailAddress($userProfile_hideEmail, $userProfile_id)
{
global $modSettings, $user_info;
// Should this users email address be shown?
// If you're guest and the forum is set to hide email for guests: no.
// If the user is post-banned: no.
// If it's your own profile and you've set your address hidden: yes_permission_override.
// If you're a moderator with sufficient permissions: yes_permission_override.
// If the user has set their email address to be hidden: no.
// If the forum is set to show full email addresses: yes.
// Otherwise: no_through_forum.
return (!empty($modSettings['guest_hideContacts']) && $user_info['is_guest']) || isset($_SESSION['ban']['cannot_post']) ? 'no' : ((!$user_info['is_guest'] && $user_info['id'] == $userProfile_id && !$userProfile_hideEmail) || allowedTo('moderate_forum') ? 'yes_permission_override' : ($userProfile_hideEmail ? 'no' : (!empty($modSettings['make_email_viewable']) ? 'yes' : 'no_through_forum')));
}
?>