Mercurial > hg > vamp-website
diff forum/Sources/Security.php @ 76:e3e11437ecea website
Add forum code
author | Chris Cannam |
---|---|
date | Sun, 07 Jul 2013 11:25:48 +0200 |
parents | |
children |
line wrap: on
line diff
--- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/forum/Sources/Security.php Sun Jul 07 11:25:48 2013 +0200 @@ -0,0 +1,990 @@ +<?php + +/** + * Simple Machines Forum (SMF) + * + * @package SMF + * @author Simple Machines http://www.simplemachines.org + * @copyright 2011 Simple Machines + * @license http://www.simplemachines.org/about/smf/license.php BSD + * + * @version 2.0.3 + */ + +if (!defined('SMF')) + die('Hacking attempt...'); + +/* This file has the very important job of insuring forum security. This + task includes banning and permissions, namely. It does this by providing + the following functions: + + void validateSession() + - makes sure the user is who they claim to be by requiring a + password to be typed in every hour. + - is turned on and off by the securityDisable setting. + - uses the adminLogin() function of Subs-Auth.php if they need to + login, which saves all request (post and get) data. + + void is_not_guest(string message = '') + - checks if the user is currently a guest, and if so asks them to + login with a message telling them why. + - message is what to tell them when asking them to login. + + void is_not_banned(bool force_check = false) + - checks if the user is banned, and if so dies with an error. + - caches this information for optimization purposes. + - forces a recheck if force_check is true. + + void banPermissions() + - applies any states of banning by removing permissions the user + cannot have. + + void log_ban(array ban_ids = array(), string email = null) + - log the current user in the ban logs. + - increment the hit counters for the specified ban ID's (if any.) + + void isBannedEmail(string email, string restriction, string error) + - check if a given email is banned. + - performs an immediate ban if the turns turns out positive. + + string checkSession(string type = 'post', string from_action = none, + is_fatal = true) + - checks the current session, verifying that the person is who he or + she should be. + - also checks the referrer to make sure they didn't get sent here. + - depends on the disableCheckUA setting, which is usually missing. + - will check GET, POST, or REQUEST depending on the passed type. + - also optionally checks the referring action if passed. (note that + the referring action must be by GET.) + - returns the error message if is_fatal is false. + + bool checkSubmitOnce(string action, bool is_fatal = true) + - registers a sequence number for a form. + - checks whether a submitted sequence number is registered in the + current session. + - depending on the value of is_fatal shows an error or returns true or + false. + - frees a sequence number from the stack after it's been checked. + - frees a sequence number without checking if action == 'free'. + + bool allowedTo(string permission, array boards = current) + - checks whether the user is allowed to do permission. (ie. post_new.) + - if boards is specified, checks those boards instead of the current + one. + - always returns true if the user is an administrator. + - returns true if he or she can do it, false otherwise. + + void isAllowedTo(string permission, array boards = current) + - uses allowedTo() to check if the user is allowed to do permission. + - checks the passed boards or current board for the permission. + - if they are not, it loads the Errors language file and shows an + error using $txt['cannot_' . $permission]. + - if they are a guest and cannot do it, this calls is_not_guest(). + + array boardsAllowedTo(string permission, bool check_access = false) + - returns a list of boards on which the user is allowed to do the + specified permission. + - returns an array with only a 0 in it if the user has permission + to do this on every board. + - returns an empty array if he or she cannot do this on any board. + - if check_access is true will also make sure the group has proper access to that board. + + string showEmailAddress(string userProfile_hideEmail, int userProfile_id) + - returns whether an email address should be shown and how. + - possible outcomes are + 'yes': show the full email address + 'yes_permission_override': show the full email address, either you + are a moderator or it's your own email address. + 'no_through_forum': don't show the email address, but do allow + things to be mailed using the built-in forum mailer. + 'no': keep the email address hidden. +*/ + +// Check if the user is who he/she says he is +function validateSession() +{ + global $modSettings, $sourcedir, $user_info, $sc, $user_settings; + + // We don't care if the option is off, because Guests should NEVER get past here. + is_not_guest(); + + // If we're using XML give an additional ten minutes grace as an admin can't log on in XML mode. + $refreshTime = isset($_GET['xml']) ? 4200 : 3600; + + // Is the security option off? Or are they already logged in? + if (!empty($modSettings['securityDisable']) || (!empty($_SESSION['admin_time']) && $_SESSION['admin_time'] + $refreshTime >= time())) + return; + + require_once($sourcedir . '/Subs-Auth.php'); + + // Hashed password, ahoy! + if (isset($_POST['admin_hash_pass']) && strlen($_POST['admin_hash_pass']) == 40) + { + checkSession(); + + $good_password = in_array(true, call_integration_hook('integrate_verify_password', array($user_info['username'], $_POST['admin_hash_pass'], true)), true); + + if ($good_password || $_POST['admin_hash_pass'] == sha1($user_info['passwd'] . $sc)) + { + $_SESSION['admin_time'] = time(); + unset($_SESSION['request_referer']); + return; + } + } + // Posting the password... check it. + if (isset($_POST['admin_pass'])) + { + checkSession(); + + $good_password = in_array(true, call_integration_hook('integrate_verify_password', array($user_info['username'], $_POST['admin_pass'], false)), true); + + // Password correct? + if ($good_password || sha1(strtolower($user_info['username']) . $_POST['admin_pass']) == $user_info['passwd']) + { + $_SESSION['admin_time'] = time(); + unset($_SESSION['request_referer']); + return; + } + } + // OpenID? + if (!empty($user_settings['openid_uri'])) + { + require_once($sourcedir . '/Subs-OpenID.php'); + smf_openID_revalidate(); + + $_SESSION['admin_time'] = time(); + unset($_SESSION['request_referer']); + return; + } + + // Better be sure to remember the real referer + if (empty($_SESSION['request_referer'])) + $_SESSION['request_referer'] = isset($_SERVER['HTTP_REFERER']) ? @parse_url($_SERVER['HTTP_REFERER']) : array(); + elseif (empty($_POST)) + unset($_SESSION['request_referer']); + // Need to type in a password for that, man. + adminLogin(); +} + +// Require a user who is logged in. (not a guest.) +function is_not_guest($message = '') +{ + global $user_info, $txt, $context, $scripturl; + + // Luckily, this person isn't a guest. + if (!$user_info['is_guest']) + return; + + // People always worry when they see people doing things they aren't actually doing... + $_GET['action'] = ''; + $_GET['board'] = ''; + $_GET['topic'] = ''; + writeLog(true); + + // Just die. + if (isset($_REQUEST['xml'])) + obExit(false); + + // Attempt to detect if they came from dlattach. + if (!WIRELESS && SMF != 'SSI' && empty($context['theme_loaded'])) + loadTheme(); + + // Never redirect to an attachment + if (strpos($_SERVER['REQUEST_URL'], 'dlattach') === false) + $_SESSION['login_url'] = $_SERVER['REQUEST_URL']; + + // Load the Login template and language file. + loadLanguage('Login'); + + // Are we in wireless mode? + if (WIRELESS) + { + $context['login_error'] = $message ? $message : $txt['only_members_can_access']; + $context['sub_template'] = WIRELESS_PROTOCOL . '_login'; + } + // Apparently we're not in a position to handle this now. Let's go to a safer location for now. + elseif (empty($context['template_layers'])) + { + $_SESSION['login_url'] = $scripturl . '?' . $_SERVER['QUERY_STRING']; + redirectexit('action=login'); + } + else + { + loadTemplate('Login'); + $context['sub_template'] = 'kick_guest'; + $context['robot_no_index'] = true; + } + + // Use the kick_guest sub template... + $context['kick_message'] = $message; + $context['page_title'] = $txt['login']; + + obExit(); + + // We should never get to this point, but if we did we wouldn't know the user isn't a guest. + trigger_error('Hacking attempt...', E_USER_ERROR); +} + +// Do banning related stuff. (ie. disallow access....) +function is_not_banned($forceCheck = false) +{ + global $txt, $modSettings, $context, $user_info; + global $sourcedir, $cookiename, $user_settings, $smcFunc; + + // You cannot be banned if you are an admin - doesn't help if you log out. + if ($user_info['is_admin']) + return; + + // Only check the ban every so often. (to reduce load.) + if ($forceCheck || !isset($_SESSION['ban']) || empty($modSettings['banLastUpdated']) || ($_SESSION['ban']['last_checked'] < $modSettings['banLastUpdated']) || $_SESSION['ban']['id_member'] != $user_info['id'] || $_SESSION['ban']['ip'] != $user_info['ip'] || $_SESSION['ban']['ip2'] != $user_info['ip2'] || (isset($user_info['email'], $_SESSION['ban']['email']) && $_SESSION['ban']['email'] != $user_info['email'])) + { + // Innocent until proven guilty. (but we know you are! :P) + $_SESSION['ban'] = array( + 'last_checked' => time(), + 'id_member' => $user_info['id'], + 'ip' => $user_info['ip'], + 'ip2' => $user_info['ip2'], + 'email' => $user_info['email'], + ); + + $ban_query = array(); + $ban_query_vars = array('current_time' => time()); + $flag_is_activated = false; + + // Check both IP addresses. + foreach (array('ip', 'ip2') as $ip_number) + { + // Check if we have a valid IP address. + if (preg_match('/^(\d{1,3})\.(\d{1,3})\.(\d{1,3})\.(\d{1,3})$/', $user_info[$ip_number], $ip_parts) == 1) + { + $ban_query[] = '((' . $ip_parts[1] . ' BETWEEN bi.ip_low1 AND bi.ip_high1) + AND (' . $ip_parts[2] . ' BETWEEN bi.ip_low2 AND bi.ip_high2) + AND (' . $ip_parts[3] . ' BETWEEN bi.ip_low3 AND bi.ip_high3) + AND (' . $ip_parts[4] . ' BETWEEN bi.ip_low4 AND bi.ip_high4))'; + + // IP was valid, maybe there's also a hostname... + if (empty($modSettings['disableHostnameLookup'])) + { + $hostname = host_from_ip($user_info[$ip_number]); + if (strlen($hostname) > 0) + { + $ban_query[] = '({string:hostname} LIKE bi.hostname)'; + $ban_query_vars['hostname'] = $hostname; + } + } + } + // We use '255.255.255.255' for 'unknown' since it's not valid anyway. + elseif ($user_info['ip'] == 'unknown') + $ban_query[] = '(bi.ip_low1 = 255 AND bi.ip_high1 = 255 + AND bi.ip_low2 = 255 AND bi.ip_high2 = 255 + AND bi.ip_low3 = 255 AND bi.ip_high3 = 255 + AND bi.ip_low4 = 255 AND bi.ip_high4 = 255)'; + } + + // Is their email address banned? + if (strlen($user_info['email']) != 0) + { + $ban_query[] = '({string:email} LIKE bi.email_address)'; + $ban_query_vars['email'] = $user_info['email']; + } + + // How about this user? + if (!$user_info['is_guest'] && !empty($user_info['id'])) + { + $ban_query[] = 'bi.id_member = {int:id_member}'; + $ban_query_vars['id_member'] = $user_info['id']; + } + + // Check the ban, if there's information. + if (!empty($ban_query)) + { + $restrictions = array( + 'cannot_access', + 'cannot_login', + 'cannot_post', + 'cannot_register', + ); + $request = $smcFunc['db_query']('', ' + SELECT bi.id_ban, bi.email_address, bi.id_member, bg.cannot_access, bg.cannot_register, + bg.cannot_post, bg.cannot_login, bg.reason, IFNULL(bg.expire_time, 0) AS expire_time + FROM {db_prefix}ban_items AS bi + INNER JOIN {db_prefix}ban_groups AS bg ON (bg.id_ban_group = bi.id_ban_group AND (bg.expire_time IS NULL OR bg.expire_time > {int:current_time})) + WHERE + (' . implode(' OR ', $ban_query) . ')', + $ban_query_vars + ); + // Store every type of ban that applies to you in your session. + while ($row = $smcFunc['db_fetch_assoc']($request)) + { + foreach ($restrictions as $restriction) + if (!empty($row[$restriction])) + { + $_SESSION['ban'][$restriction]['reason'] = $row['reason']; + $_SESSION['ban'][$restriction]['ids'][] = $row['id_ban']; + if (!isset($_SESSION['ban']['expire_time']) || ($_SESSION['ban']['expire_time'] != 0 && ($row['expire_time'] == 0 || $row['expire_time'] > $_SESSION['ban']['expire_time']))) + $_SESSION['ban']['expire_time'] = $row['expire_time']; + + if (!$user_info['is_guest'] && $restriction == 'cannot_access' && ($row['id_member'] == $user_info['id'] || $row['email_address'] == $user_info['email'])) + $flag_is_activated = true; + } + } + $smcFunc['db_free_result']($request); + } + + // Mark the cannot_access and cannot_post bans as being 'hit'. + if (isset($_SESSION['ban']['cannot_access']) || isset($_SESSION['ban']['cannot_post']) || isset($_SESSION['ban']['cannot_login'])) + log_ban(array_merge(isset($_SESSION['ban']['cannot_access']) ? $_SESSION['ban']['cannot_access']['ids'] : array(), isset($_SESSION['ban']['cannot_post']) ? $_SESSION['ban']['cannot_post']['ids'] : array(), isset($_SESSION['ban']['cannot_login']) ? $_SESSION['ban']['cannot_login']['ids'] : array())); + + // If for whatever reason the is_activated flag seems wrong, do a little work to clear it up. + if ($user_info['id'] && (($user_settings['is_activated'] >= 10 && !$flag_is_activated) + || ($user_settings['is_activated'] < 10 && $flag_is_activated))) + { + require_once($sourcedir . '/ManageBans.php'); + updateBanMembers(); + } + } + + // Hey, I know you! You're ehm... + if (!isset($_SESSION['ban']['cannot_access']) && !empty($_COOKIE[$cookiename . '_'])) + { + $bans = explode(',', $_COOKIE[$cookiename . '_']); + foreach ($bans as $key => $value) + $bans[$key] = (int) $value; + $request = $smcFunc['db_query']('', ' + SELECT bi.id_ban, bg.reason + FROM {db_prefix}ban_items AS bi + INNER JOIN {db_prefix}ban_groups AS bg ON (bg.id_ban_group = bi.id_ban_group) + WHERE bi.id_ban IN ({array_int:ban_list}) + AND (bg.expire_time IS NULL OR bg.expire_time > {int:current_time}) + AND bg.cannot_access = {int:cannot_access} + LIMIT ' . count($bans), + array( + 'cannot_access' => 1, + 'ban_list' => $bans, + 'current_time' => time(), + ) + ); + while ($row = $smcFunc['db_fetch_assoc']($request)) + { + $_SESSION['ban']['cannot_access']['ids'][] = $row['id_ban']; + $_SESSION['ban']['cannot_access']['reason'] = $row['reason']; + } + $smcFunc['db_free_result']($request); + + // My mistake. Next time better. + if (!isset($_SESSION['ban']['cannot_access'])) + { + require_once($sourcedir . '/Subs-Auth.php'); + $cookie_url = url_parts(!empty($modSettings['localCookies']), !empty($modSettings['globalCookies'])); + setcookie($cookiename . '_', '', time() - 3600, $cookie_url[1], $cookie_url[0], 0); + } + } + + // If you're fully banned, it's end of the story for you. + if (isset($_SESSION['ban']['cannot_access'])) + { + // We don't wanna see you! + if (!$user_info['is_guest']) + $smcFunc['db_query']('', ' + DELETE FROM {db_prefix}log_online + WHERE id_member = {int:current_member}', + array( + 'current_member' => $user_info['id'], + ) + ); + + // 'Log' the user out. Can't have any funny business... (save the name!) + $old_name = isset($user_info['name']) && $user_info['name'] != '' ? $user_info['name'] : $txt['guest_title']; + $user_info['name'] = ''; + $user_info['username'] = ''; + $user_info['is_guest'] = true; + $user_info['is_admin'] = false; + $user_info['permissions'] = array(); + $user_info['id'] = 0; + $context['user'] = array( + 'id' => 0, + 'username' => '', + 'name' => $txt['guest_title'], + 'is_guest' => true, + 'is_logged' => false, + 'is_admin' => false, + 'is_mod' => false, + 'can_mod' => false, + 'language' => $user_info['language'], + ); + + // A goodbye present. + require_once($sourcedir . '/Subs-Auth.php'); + $cookie_url = url_parts(!empty($modSettings['localCookies']), !empty($modSettings['globalCookies'])); + setcookie($cookiename . '_', implode(',', $_SESSION['ban']['cannot_access']['ids']), time() + 3153600, $cookie_url[1], $cookie_url[0], 0); + + // Don't scare anyone, now. + $_GET['action'] = ''; + $_GET['board'] = ''; + $_GET['topic'] = ''; + writeLog(true); + + // You banned, sucka! + fatal_error(sprintf($txt['your_ban'], $old_name) . (empty($_SESSION['ban']['cannot_access']['reason']) ? '' : '<br />' . $_SESSION['ban']['cannot_access']['reason']) . '<br />' . (!empty($_SESSION['ban']['expire_time']) ? sprintf($txt['your_ban_expires'], timeformat($_SESSION['ban']['expire_time'], false)) : $txt['your_ban_expires_never']), 'user'); + + // If we get here, something's gone wrong.... but let's try anyway. + trigger_error('Hacking attempt...', E_USER_ERROR); + } + // You're not allowed to log in but yet you are. Let's fix that. + elseif (isset($_SESSION['ban']['cannot_login']) && !$user_info['is_guest']) + { + // We don't wanna see you! + $smcFunc['db_query']('', ' + DELETE FROM {db_prefix}log_online + WHERE id_member = {int:current_member}', + array( + 'current_member' => $user_info['id'], + ) + ); + + // 'Log' the user out. Can't have any funny business... (save the name!) + $old_name = isset($user_info['name']) && $user_info['name'] != '' ? $user_info['name'] : $txt['guest_title']; + $user_info['name'] = ''; + $user_info['username'] = ''; + $user_info['is_guest'] = true; + $user_info['is_admin'] = false; + $user_info['permissions'] = array(); + $user_info['id'] = 0; + $context['user'] = array( + 'id' => 0, + 'username' => '', + 'name' => $txt['guest_title'], + 'is_guest' => true, + 'is_logged' => false, + 'is_admin' => false, + 'is_mod' => false, + 'can_mod' => false, + 'language' => $user_info['language'], + ); + + // SMF's Wipe 'n Clean(r) erases all traces. + $_GET['action'] = ''; + $_GET['board'] = ''; + $_GET['topic'] = ''; + writeLog(true); + + require_once($sourcedir . '/LogInOut.php'); + Logout(true, false); + + fatal_error(sprintf($txt['your_ban'], $old_name) . (empty($_SESSION['ban']['cannot_login']['reason']) ? '' : '<br />' . $_SESSION['ban']['cannot_login']['reason']) . '<br />' . (!empty($_SESSION['ban']['expire_time']) ? sprintf($txt['your_ban_expires'], timeformat($_SESSION['ban']['expire_time'], false)) : $txt['your_ban_expires_never']) . '<br />' . $txt['ban_continue_browse'], 'user'); + } + + // Fix up the banning permissions. + if (isset($user_info['permissions'])) + banPermissions(); +} + +// Fix permissions according to ban status. +function banPermissions() +{ + global $user_info, $sourcedir, $modSettings, $context; + + // Somehow they got here, at least take away all permissions... + if (isset($_SESSION['ban']['cannot_access'])) + $user_info['permissions'] = array(); + // Okay, well, you can watch, but don't touch a thing. + elseif (isset($_SESSION['ban']['cannot_post']) || (!empty($modSettings['warning_mute']) && $modSettings['warning_mute'] <= $user_info['warning'])) + { + $denied_permissions = array( + 'pm_send', + 'calendar_post', 'calendar_edit_own', 'calendar_edit_any', + 'poll_post', + 'poll_add_own', 'poll_add_any', + 'poll_edit_own', 'poll_edit_any', + 'poll_lock_own', 'poll_lock_any', + 'poll_remove_own', 'poll_remove_any', + 'manage_attachments', 'manage_smileys', 'manage_boards', 'admin_forum', 'manage_permissions', + 'moderate_forum', 'manage_membergroups', 'manage_bans', 'send_mail', 'edit_news', + 'profile_identity_any', 'profile_extra_any', 'profile_title_any', + 'post_new', 'post_reply_own', 'post_reply_any', + 'delete_own', 'delete_any', 'delete_replies', + 'make_sticky', + 'merge_any', 'split_any', + 'modify_own', 'modify_any', 'modify_replies', + 'move_any', + 'send_topic', + 'lock_own', 'lock_any', + 'remove_own', 'remove_any', + 'post_unapproved_topics', 'post_unapproved_replies_own', 'post_unapproved_replies_any', + ); + $user_info['permissions'] = array_diff($user_info['permissions'], $denied_permissions); + } + // Are they absolutely under moderation? + elseif (!empty($modSettings['warning_moderate']) && $modSettings['warning_moderate'] <= $user_info['warning']) + { + // Work out what permissions should change... + $permission_change = array( + 'post_new' => 'post_unapproved_topics', + 'post_reply_own' => 'post_unapproved_replies_own', + 'post_reply_any' => 'post_unapproved_replies_any', + 'post_attachment' => 'post_unapproved_attachments', + ); + foreach ($permission_change as $old => $new) + { + if (!in_array($old, $user_info['permissions'])) + unset($permission_change[$old]); + else + $user_info['permissions'][] = $new; + } + $user_info['permissions'] = array_diff($user_info['permissions'], array_keys($permission_change)); + } + + //!!! Find a better place to call this? Needs to be after permissions loaded! + // Finally, some bits we cache in the session because it saves queries. + if (isset($_SESSION['mc']) && $_SESSION['mc']['time'] > $modSettings['settings_updated'] && $_SESSION['mc']['id'] == $user_info['id']) + $user_info['mod_cache'] = $_SESSION['mc']; + else + { + require_once($sourcedir . '/Subs-Auth.php'); + rebuildModCache(); + } + + // Now that we have the mod cache taken care of lets setup a cache for the number of mod reports still open + if (isset($_SESSION['rc']) && $_SESSION['rc']['time'] > $modSettings['last_mod_report_action'] && $_SESSION['rc']['id'] == $user_info['id']) + $context['open_mod_reports'] = $_SESSION['rc']['reports']; + elseif ($_SESSION['mc']['bq'] != '0=1') + { + require_once($sourcedir . '/ModerationCenter.php'); + recountOpenReports(); + } + else + $context['open_mod_reports'] = 0; +} + +// Log a ban in the database. +function log_ban($ban_ids = array(), $email = null) +{ + global $user_info, $smcFunc; + + // Don't log web accelerators, it's very confusing... + if (isset($_SERVER['HTTP_X_MOZ']) && $_SERVER['HTTP_X_MOZ'] == 'prefetch') + return; + + $smcFunc['db_insert']('', + '{db_prefix}log_banned', + array('id_member' => 'int', 'ip' => 'string-16', 'email' => 'string', 'log_time' => 'int'), + array($user_info['id'], $user_info['ip'], ($email === null ? ($user_info['is_guest'] ? '' : $user_info['email']) : $email), time()), + array('id_ban_log') + ); + + // One extra point for these bans. + if (!empty($ban_ids)) + $smcFunc['db_query']('', ' + UPDATE {db_prefix}ban_items + SET hits = hits + 1 + WHERE id_ban IN ({array_int:ban_ids})', + array( + 'ban_ids' => $ban_ids, + ) + ); +} + +// Checks if a given email address might be banned. +function isBannedEmail($email, $restriction, $error) +{ + global $txt, $smcFunc; + + // Can't ban an empty email + if (empty($email) || trim($email) == '') + return; + + // Let's start with the bans based on your IP/hostname/memberID... + $ban_ids = isset($_SESSION['ban'][$restriction]) ? $_SESSION['ban'][$restriction]['ids'] : array(); + $ban_reason = isset($_SESSION['ban'][$restriction]) ? $_SESSION['ban'][$restriction]['reason'] : ''; + + // ...and add to that the email address you're trying to register. + $request = $smcFunc['db_query']('', ' + SELECT bi.id_ban, bg.' . $restriction . ', bg.cannot_access, bg.reason + FROM {db_prefix}ban_items AS bi + INNER JOIN {db_prefix}ban_groups AS bg ON (bg.id_ban_group = bi.id_ban_group) + WHERE {string:email} LIKE bi.email_address + AND (bg.' . $restriction . ' = {int:cannot_access} OR bg.cannot_access = {int:cannot_access}) + AND (bg.expire_time IS NULL OR bg.expire_time >= {int:now})', + array( + 'email' => $email, + 'cannot_access' => 1, + 'now' => time(), + ) + ); + while ($row = $smcFunc['db_fetch_assoc']($request)) + { + if (!empty($row['cannot_access'])) + { + $_SESSION['ban']['cannot_access']['ids'][] = $row['id_ban']; + $_SESSION['ban']['cannot_access']['reason'] = $row['reason']; + } + if (!empty($row[$restriction])) + { + $ban_ids[] = $row['id_ban']; + $ban_reason = $row['reason']; + } + } + $smcFunc['db_free_result']($request); + + // You're in biiig trouble. Banned for the rest of this session! + if (isset($_SESSION['ban']['cannot_access'])) + { + log_ban($_SESSION['ban']['cannot_access']['ids']); + $_SESSION['ban']['last_checked'] = time(); + + fatal_error(sprintf($txt['your_ban'], $txt['guest_title']) . $_SESSION['ban']['cannot_access']['reason'], false); + } + + if (!empty($ban_ids)) + { + // Log this ban for future reference. + log_ban($ban_ids, $email); + fatal_error($error . $ban_reason, false); + } +} + +// Make sure the user's correct session was passed, and they came from here. (type can be post, get, or request.) +function checkSession($type = 'post', $from_action = '', $is_fatal = true) +{ + global $sc, $modSettings, $boardurl; + + // Is it in as $_POST['sc']? + if ($type == 'post') + { + $check = isset($_POST[$_SESSION['session_var']]) ? $_POST[$_SESSION['session_var']] : (empty($modSettings['strictSessionCheck']) && isset($_POST['sc']) ? $_POST['sc'] : null); + if ($check !== $sc) + $error = 'session_timeout'; + } + + // How about $_GET['sesc']? + elseif ($type == 'get') + { + $check = isset($_GET[$_SESSION['session_var']]) ? $_GET[$_SESSION['session_var']] : (empty($modSettings['strictSessionCheck']) && isset($_GET['sesc']) ? $_GET['sesc'] : null); + if ($check !== $sc) + $error = 'session_verify_fail'; + } + + // Or can it be in either? + elseif ($type == 'request') + { + $check = isset($_GET[$_SESSION['session_var']]) ? $_GET[$_SESSION['session_var']] : (empty($modSettings['strictSessionCheck']) && isset($_GET['sesc']) ? $_GET['sesc'] : (isset($_POST[$_SESSION['session_var']]) ? $_POST[$_SESSION['session_var']] : (empty($modSettings['strictSessionCheck']) && isset($_POST['sc']) ? $_POST['sc'] : null))); + + if ($check !== $sc) + $error = 'session_verify_fail'; + } + + // Verify that they aren't changing user agents on us - that could be bad. + if ((!isset($_SESSION['USER_AGENT']) || $_SESSION['USER_AGENT'] != $_SERVER['HTTP_USER_AGENT']) && empty($modSettings['disableCheckUA'])) + $error = 'session_verify_fail'; + + // Make sure a page with session check requirement is not being prefetched. + if (isset($_SERVER['HTTP_X_MOZ']) && $_SERVER['HTTP_X_MOZ'] == 'prefetch') + { + ob_end_clean(); + header('HTTP/1.1 403 Forbidden'); + die; + } + + // Check the referring site - it should be the same server at least! + if (isset($_SESSION['request_referer'])) + $referrer = $_SESSION['request_referer']; + else + $referrer = isset($_SERVER['HTTP_REFERER']) ? @parse_url($_SERVER['HTTP_REFERER']) : array(); + if (!empty($referrer['host'])) + { + if (strpos($_SERVER['HTTP_HOST'], ':') !== false) + $real_host = substr($_SERVER['HTTP_HOST'], 0, strpos($_SERVER['HTTP_HOST'], ':')); + else + $real_host = $_SERVER['HTTP_HOST']; + + $parsed_url = parse_url($boardurl); + + // Are global cookies on? If so, let's check them ;). + if (!empty($modSettings['globalCookies'])) + { + if (preg_match('~(?:[^\.]+\.)?([^\.]{3,}\..+)\z~i', $parsed_url['host'], $parts) == 1) + $parsed_url['host'] = $parts[1]; + + if (preg_match('~(?:[^\.]+\.)?([^\.]{3,}\..+)\z~i', $referrer['host'], $parts) == 1) + $referrer['host'] = $parts[1]; + + if (preg_match('~(?:[^\.]+\.)?([^\.]{3,}\..+)\z~i', $real_host, $parts) == 1) + $real_host = $parts[1]; + } + + // Okay: referrer must either match parsed_url or real_host. + if (isset($parsed_url['host']) && strtolower($referrer['host']) != strtolower($parsed_url['host']) && strtolower($referrer['host']) != strtolower($real_host)) + { + $error = 'verify_url_fail'; + $log_error = true; + } + } + + // Well, first of all, if a from_action is specified you'd better have an old_url. + if (!empty($from_action) && (!isset($_SESSION['old_url']) || preg_match('~[?;&]action=' . $from_action . '([;&]|$)~', $_SESSION['old_url']) == 0)) + { + $error = 'verify_url_fail'; + $log_error = true; + } + + if (strtolower($_SERVER['HTTP_USER_AGENT']) == 'hacker') + fatal_error('Sound the alarm! It\'s a hacker! Close the castle gates!!', false); + + // Everything is ok, return an empty string. + if (!isset($error)) + return ''; + // A session error occurred, show the error. + elseif ($is_fatal) + { + if (isset($_GET['xml'])) + { + ob_end_clean(); + header('HTTP/1.1 403 Forbidden - Session timeout'); + die; + } + else + fatal_lang_error($error, isset($log_error) ? 'user' : false); + } + // A session error occurred, return the error to the calling function. + else + return $error; + + // We really should never fall through here, for very important reasons. Let's make sure. + trigger_error('Hacking attempt...', E_USER_ERROR); +} + +// Check if a specific confirm parameter was given. +function checkConfirm($action) +{ + global $modSettings; + + if (isset($_GET['confirm']) && isset($_SESSION['confirm_' . $action]) && md5($_GET['confirm'] . $_SERVER['HTTP_USER_AGENT']) == $_SESSION['confirm_' . $action]) + return true; + + else + { + $token = md5(mt_rand() . session_id() . (string) microtime() . $modSettings['rand_seed']); + $_SESSION['confirm_' . $action] = md5($token . $_SERVER['HTTP_USER_AGENT']); + + return $token; + } +} + +// Check whether a form has been submitted twice. +function checkSubmitOnce($action, $is_fatal = true) +{ + global $context; + + if (!isset($_SESSION['forms'])) + $_SESSION['forms'] = array(); + + // Register a form number and store it in the session stack. (use this on the page that has the form.) + if ($action == 'register') + { + $context['form_sequence_number'] = 0; + while (empty($context['form_sequence_number']) || in_array($context['form_sequence_number'], $_SESSION['forms'])) + $context['form_sequence_number'] = mt_rand(1, 16000000); + } + // Check whether the submitted number can be found in the session. + elseif ($action == 'check') + { + if (!isset($_REQUEST['seqnum'])) + return true; + elseif (!in_array($_REQUEST['seqnum'], $_SESSION['forms'])) + { + $_SESSION['forms'][] = (int) $_REQUEST['seqnum']; + return true; + } + elseif ($is_fatal) + fatal_lang_error('error_form_already_submitted', false); + else + return false; + } + // Don't check, just free the stack number. + elseif ($action == 'free' && isset($_REQUEST['seqnum']) && in_array($_REQUEST['seqnum'], $_SESSION['forms'])) + $_SESSION['forms'] = array_diff($_SESSION['forms'], array($_REQUEST['seqnum'])); + elseif ($action != 'free') + trigger_error('checkSubmitOnce(): Invalid action \'' . $action . '\'', E_USER_WARNING); +} + +// Check the user's permissions. +function allowedTo($permission, $boards = null) +{ + global $user_info, $modSettings, $smcFunc; + + // You're always allowed to do nothing. (unless you're a working man, MR. LAZY :P!) + if (empty($permission)) + return true; + + // You're never allowed to do something if your data hasn't been loaded yet! + if (empty($user_info)) + return false; + + // Administrators are supermen :P. + if ($user_info['is_admin']) + return true; + + // Are we checking the _current_ board, or some other boards? + if ($boards === null) + { + // Check if they can do it. + if (!is_array($permission) && in_array($permission, $user_info['permissions'])) + return true; + // Search for any of a list of permissions. + elseif (is_array($permission) && count(array_intersect($permission, $user_info['permissions'])) != 0) + return true; + // You aren't allowed, by default. + else + return false; + } + elseif (!is_array($boards)) + $boards = array($boards); + + $request = $smcFunc['db_query']('', ' + SELECT MIN(bp.add_deny) AS add_deny + FROM {db_prefix}boards AS b + INNER JOIN {db_prefix}board_permissions AS bp ON (bp.id_profile = b.id_profile) + LEFT JOIN {db_prefix}moderators AS mods ON (mods.id_board = b.id_board AND mods.id_member = {int:current_member}) + WHERE b.id_board IN ({array_int:board_list}) + AND bp.id_group IN ({array_int:group_list}, {int:moderator_group}) + AND bp.permission {raw:permission_list} + AND (mods.id_member IS NOT NULL OR bp.id_group != {int:moderator_group}) + GROUP BY b.id_board', + array( + 'current_member' => $user_info['id'], + 'board_list' => $boards, + 'group_list' => $user_info['groups'], + 'moderator_group' => 3, + 'permission_list' => (is_array($permission) ? 'IN (\'' . implode('\', \'', $permission) . '\')' : ' = \'' . $permission . '\''), + ) + ); + + // Make sure they can do it on all of the boards. + if ($smcFunc['db_num_rows']($request) != count($boards)) + return false; + + $result = true; + while ($row = $smcFunc['db_fetch_assoc']($request)) + $result &= !empty($row['add_deny']); + $smcFunc['db_free_result']($request); + + // If the query returned 1, they can do it... otherwise, they can't. + return $result; +} + +// Fatal error if they cannot... +function isAllowedTo($permission, $boards = null) +{ + global $user_info, $txt; + + static $heavy_permissions = array( + 'admin_forum', + 'manage_attachments', + 'manage_smileys', + 'manage_boards', + 'edit_news', + 'moderate_forum', + 'manage_bans', + 'manage_membergroups', + 'manage_permissions', + ); + + // Make it an array, even if a string was passed. + $permission = is_array($permission) ? $permission : array($permission); + + // Check the permission and return an error... + if (!allowedTo($permission, $boards)) + { + // Pick the last array entry as the permission shown as the error. + $error_permission = array_shift($permission); + + // If they are a guest, show a login. (because the error might be gone if they do!) + if ($user_info['is_guest']) + { + loadLanguage('Errors'); + is_not_guest($txt['cannot_' . $error_permission]); + } + + // Clear the action because they aren't really doing that! + $_GET['action'] = ''; + $_GET['board'] = ''; + $_GET['topic'] = ''; + writeLog(true); + + fatal_lang_error('cannot_' . $error_permission, false); + + // Getting this far is a really big problem, but let's try our best to prevent any cases... + trigger_error('Hacking attempt...', E_USER_ERROR); + } + + // If you're doing something on behalf of some "heavy" permissions, validate your session. + // (take out the heavy permissions, and if you can't do anything but those, you need a validated session.) + if (!allowedTo(array_diff($permission, $heavy_permissions), $boards)) + validateSession(); +} + +// Return the boards a user has a certain (board) permission on. (array(0) if all.) +function boardsAllowedTo($permissions, $check_access = true) +{ + global $user_info, $modSettings, $smcFunc; + + // Administrators are all powerful, sorry. + if ($user_info['is_admin']) + return array(0); + + // Arrays are nice, most of the time. + if (!is_array($permissions)) + $permissions = array($permissions); + + // All groups the user is in except 'moderator'. + $groups = array_diff($user_info['groups'], array(3)); + + $request = $smcFunc['db_query']('', ' + SELECT b.id_board, bp.add_deny + FROM {db_prefix}board_permissions AS bp + INNER JOIN {db_prefix}boards AS b ON (b.id_profile = bp.id_profile) + LEFT JOIN {db_prefix}moderators AS mods ON (mods.id_board = b.id_board AND mods.id_member = {int:current_member}) + WHERE bp.id_group IN ({array_int:group_list}, {int:moderator_group}) + AND bp.permission IN ({array_string:permissions}) + AND (mods.id_member IS NOT NULL OR bp.id_group != {int:moderator_group})' . + ($check_access ? ' AND {query_see_board}' : ''), + array( + 'current_member' => $user_info['id'], + 'group_list' => $groups, + 'moderator_group' => 3, + 'permissions' => $permissions, + ) + ); + $boards = array(); + $deny_boards = array(); + while ($row = $smcFunc['db_fetch_assoc']($request)) + { + if (empty($row['add_deny'])) + $deny_boards[] = $row['id_board']; + else + $boards[] = $row['id_board']; + } + $smcFunc['db_free_result']($request); + + $boards = array_unique(array_values(array_diff($boards, $deny_boards))); + + return $boards; +} + +function showEmailAddress($userProfile_hideEmail, $userProfile_id) +{ + global $modSettings, $user_info; + + // Should this users email address be shown? + // If you're guest and the forum is set to hide email for guests: no. + // If the user is post-banned: no. + // If it's your own profile and you've set your address hidden: yes_permission_override. + // If you're a moderator with sufficient permissions: yes_permission_override. + // If the user has set their email address to be hidden: no. + // If the forum is set to show full email addresses: yes. + // Otherwise: no_through_forum. + + return (!empty($modSettings['guest_hideContacts']) && $user_info['is_guest']) || isset($_SESSION['ban']['cannot_post']) ? 'no' : ((!$user_info['is_guest'] && $user_info['id'] == $userProfile_id && !$userProfile_hideEmail) || allowedTo('moderate_forum') ? 'yes_permission_override' : ($userProfile_hideEmail ? 'no' : (!empty($modSettings['make_email_viewable']) ? 'yes' : 'no_through_forum'))); +} + +?> \ No newline at end of file