[ Index ]

PHP Cross Reference of phpBB-3.3.14-deutsch

title

Body

[close]

/phpbb/ -> session.php (source)

   1  <?php
   2  /**
   3  *
   4  * This file is part of the phpBB Forum Software package.
   5  *
   6  * @copyright (c) phpBB Limited <https://www.phpbb.com>
   7  * @license GNU General Public License, version 2 (GPL-2.0)
   8  *
   9  * For full copyright and license information, please see
  10  * the docs/CREDITS.txt file.
  11  *
  12  */
  13  
  14  namespace phpbb;
  15  
  16  /**
  17  * Session class
  18  */
  19  class session
  20  {
  21      var $cookie_data = array();
  22      var $page = array();
  23      var $data = array();
  24      var $browser = '';
  25      var $forwarded_for = '';
  26      var $host = '';
  27      var $session_id = '';
  28      var $ip = '';
  29      var $load = 0;
  30      var $time_now = 0;
  31      var $update_session_page = true;
  32  
  33      /**
  34       * Extract current session page
  35       *
  36       * @param string $root_path current root path (phpbb_root_path)
  37       * @return array
  38       */
  39  	static function extract_current_page($root_path)
  40      {
  41          global $request, $symfony_request, $phpbb_filesystem;
  42  
  43          $page_array = array();
  44  
  45          // First of all, get the request uri...
  46          $script_name = $request->escape($symfony_request->getScriptName(), true);
  47          $args = $request->escape(explode('&', $symfony_request->getQueryString()), true);
  48  
  49          // If we are unable to get the script name we use REQUEST_URI as a failover and note it within the page array for easier support...
  50          if (!$script_name)
  51          {
  52              $script_name = html_entity_decode($request->server('REQUEST_URI'), ENT_COMPAT);
  53              $script_name = (($pos = strpos($script_name, '?')) !== false) ? substr($script_name, 0, $pos) : $script_name;
  54              $page_array['failover'] = 1;
  55          }
  56  
  57          // Replace backslashes and doubled slashes (could happen on some proxy setups)
  58          $script_name = str_replace(array('\\', '//'), '/', $script_name);
  59  
  60          // Now, remove the sid and let us get a clean query string...
  61          $use_args = array();
  62  
  63          // Since some browser do not encode correctly we need to do this with some "special" characters...
  64          // " -> %22, ' => %27, < -> %3C, > -> %3E
  65          $find = array('"', "'", '<', '>', '&quot;', '&lt;', '&gt;');
  66          $replace = array('%22', '%27', '%3C', '%3E', '%22', '%3C', '%3E');
  67  
  68          foreach ($args as $key => $argument)
  69          {
  70              if (strpos($argument, 'sid=') === 0)
  71              {
  72                  continue;
  73              }
  74  
  75              $use_args[] = str_replace($find, $replace, $argument);
  76          }
  77          unset($args);
  78  
  79          // The following examples given are for an request uri of {path to the phpbb directory}/adm/index.php?i=10&b=2
  80  
  81          // The current query string
  82          $query_string = trim(implode('&', $use_args));
  83  
  84          // basenamed page name (for example: index.php)
  85          $page_name = (substr($script_name, -1, 1) == '/') ? '' : basename($script_name);
  86          $page_name = urlencode(htmlspecialchars($page_name, ENT_COMPAT));
  87  
  88          $symfony_request_path = $phpbb_filesystem->clean_path($symfony_request->getPathInfo());
  89          if ($symfony_request_path !== '/')
  90          {
  91              $page_name .= str_replace('%2F', '/', urlencode($symfony_request_path));
  92          }
  93  
  94          if (substr($root_path, 0, 2) === './' && strpos($root_path, '..') === false)
  95          {
  96              $root_dirs = explode('/', str_replace('\\', '/', rtrim($root_path, '/')));
  97              $page_dirs = explode('/', str_replace('\\', '/', '.'));
  98          }
  99          else
 100          {
 101              // current directory within the phpBB root (for example: adm)
 102              $root_dirs = explode('/', str_replace('\\', '/', $phpbb_filesystem->realpath($root_path)));
 103              $page_dirs = explode('/', str_replace('\\', '/', $phpbb_filesystem->realpath('./')));
 104          }
 105  
 106          $intersection = array_intersect_assoc($root_dirs, $page_dirs);
 107  
 108          $root_dirs = array_diff_assoc($root_dirs, $intersection);
 109          $page_dirs = array_diff_assoc($page_dirs, $intersection);
 110  
 111          $page_dir = str_repeat('../', count($root_dirs)) . implode('/', $page_dirs);
 112  
 113          if ($page_dir && substr($page_dir, -1, 1) == '/')
 114          {
 115              $page_dir = substr($page_dir, 0, -1);
 116          }
 117  
 118          // Current page from phpBB root (for example: adm/index.php?i=10&b=2)
 119          $page = (($page_dir) ? $page_dir . '/' : '') . $page_name;
 120          if ($query_string)
 121          {
 122              $page .= '?' . $query_string;
 123          }
 124  
 125          // The script path from the webroot to the current directory (for example: /phpBB3/adm/) : always prefixed with / and ends in /
 126          $script_path = $symfony_request->getBasePath();
 127  
 128          // The script path from the webroot to the phpBB root (for example: /phpBB3/)
 129          $script_dirs = explode('/', $script_path);
 130          array_splice($script_dirs, -count($page_dirs));
 131          $root_script_path = implode('/', $script_dirs) . (count($root_dirs) ? '/' . implode('/', $root_dirs) : '');
 132  
 133          // We are on the base level (phpBB root == webroot), lets adjust the variables a bit...
 134          if (!$root_script_path)
 135          {
 136              $root_script_path = ($page_dir) ? str_replace($page_dir, '', $script_path) : $script_path;
 137          }
 138  
 139          $script_path .= (substr($script_path, -1, 1) == '/') ? '' : '/';
 140          $root_script_path .= (substr($root_script_path, -1, 1) == '/') ? '' : '/';
 141  
 142          $forum_id = $request->variable('f', 0);
 143          // maximum forum id value is maximum value of mediumint unsigned column
 144          $forum_id = ($forum_id > 0 && $forum_id < 16777215) ? $forum_id : 0;
 145  
 146          $page_array += array(
 147              'page_name'            => $page_name,
 148              'page_dir'            => $page_dir,
 149  
 150              'query_string'        => $query_string,
 151              'script_path'        => str_replace(' ', '%20', htmlspecialchars($script_path, ENT_COMPAT)),
 152              'root_script_path'    => str_replace(' ', '%20', htmlspecialchars($root_script_path, ENT_COMPAT)),
 153  
 154              'page'                => $page,
 155              'forum'                => $forum_id,
 156          );
 157  
 158          return $page_array;
 159      }
 160  
 161      /**
 162      * Get valid hostname/port. HTTP_HOST is used, SERVER_NAME if HTTP_HOST not present.
 163      */
 164  	function extract_current_hostname()
 165      {
 166          global $config, $request;
 167  
 168          // Get hostname
 169          $host = html_entity_decode($request->header('Host', $request->server('SERVER_NAME')), ENT_COMPAT);
 170  
 171          // Should be a string and lowered
 172          $host = (string) strtolower($host);
 173  
 174          // If host is equal the cookie domain or the server name (if config is set), then we assume it is valid
 175          if ((isset($config['cookie_domain']) && $host === $config['cookie_domain']) || (isset($config['server_name']) && $host === $config['server_name']))
 176          {
 177              return $host;
 178          }
 179  
 180          // Is the host actually a IP? If so, we use the IP... (IPv4)
 181          if (long2ip(ip2long($host)) === $host)
 182          {
 183              return $host;
 184          }
 185  
 186          // Now return the hostname (this also removes any port definition). The http:// is prepended to construct a valid URL, hosts never have a scheme assigned
 187          $host = @parse_url('http://' . $host);
 188          $host = (!empty($host['host'])) ? $host['host'] : '';
 189  
 190          // Remove any portions not removed by parse_url (#)
 191          $host = str_replace('#', '', $host);
 192  
 193          // If, by any means, the host is now empty, we will use a "best approach" way to guess one
 194          if (empty($host))
 195          {
 196              if (!empty($config['server_name']))
 197              {
 198                  $host = $config['server_name'];
 199              }
 200              else if (!empty($config['cookie_domain']))
 201              {
 202                  $host = (strpos($config['cookie_domain'], '.') === 0) ? substr($config['cookie_domain'], 1) : $config['cookie_domain'];
 203              }
 204              else
 205              {
 206                  // Set to OS hostname or localhost
 207                  $host = (function_exists('php_uname')) ? php_uname('n') : 'localhost';
 208              }
 209          }
 210  
 211          // It may be still no valid host, but for sure only a hostname (we may further expand on the cookie domain... if set)
 212          return $host;
 213      }
 214  
 215      /**
 216      * Start session management
 217      *
 218      * This is where all session activity begins. We gather various pieces of
 219      * information from the client and server. We test to see if a session already
 220      * exists. If it does, fine and dandy. If it doesn't we'll go on to create a
 221      * new one ... pretty logical heh? We also examine the system load (if we're
 222      * running on a system which makes such information readily available) and
 223      * halt if it's above an admin definable limit.
 224      *
 225      * @param bool $update_session_page if true the session page gets updated.
 226      *            This can be set to circumvent certain scripts to update the users last visited page.
 227      */
 228  	function session_begin($update_session_page = true)
 229      {
 230          global $phpEx, $SID, $_SID, $_EXTRA_URL, $db, $config, $phpbb_root_path;
 231          global $request, $phpbb_container, $user, $phpbb_log, $phpbb_dispatcher;
 232  
 233          // Give us some basic information
 234          $this->time_now                = time();
 235          $this->cookie_data            = array('u' => 0, 'k' => '');
 236          $this->update_session_page    = $update_session_page;
 237          $this->browser                = $request->header('User-Agent');
 238          $this->referer                = $request->header('Referer');
 239          $this->forwarded_for        = $request->header('X-Forwarded-For');
 240  
 241          $this->host                    = $this->extract_current_hostname();
 242          $this->page                    = $this->extract_current_page($phpbb_root_path);
 243  
 244          // if the forwarded for header shall be checked we have to validate its contents
 245          if ($config['forwarded_for_check'])
 246          {
 247              $this->forwarded_for = preg_replace('# {2,}#', ' ', str_replace(',', ' ', $this->forwarded_for));
 248  
 249              // split the list of IPs
 250              $ips = explode(' ', $this->forwarded_for);
 251              foreach ($ips as $ip)
 252              {
 253                  if (!filter_var($ip, FILTER_VALIDATE_IP))
 254                  {
 255                      // contains invalid data, don't use the forwarded for header
 256                      $this->forwarded_for = '';
 257                      break;
 258                  }
 259              }
 260          }
 261          else
 262          {
 263              $this->forwarded_for = '';
 264          }
 265  
 266          if ($request->is_set($config['cookie_name'] . '_sid', \phpbb\request\request_interface::COOKIE) || $request->is_set($config['cookie_name'] . '_u', \phpbb\request\request_interface::COOKIE))
 267          {
 268              $this->cookie_data['u'] = $request->variable($config['cookie_name'] . '_u', 0, false, \phpbb\request\request_interface::COOKIE);
 269              $this->cookie_data['k'] = $request->variable($config['cookie_name'] . '_k', '', false, \phpbb\request\request_interface::COOKIE);
 270              $this->session_id         = $request->variable($config['cookie_name'] . '_sid', '', false, \phpbb\request\request_interface::COOKIE);
 271  
 272              $SID = (defined('NEED_SID')) ? '?sid=' . $this->session_id : '?sid=';
 273              $_SID = (defined('NEED_SID')) ? $this->session_id : '';
 274  
 275              if (empty($this->session_id))
 276              {
 277                  $this->session_id = $_SID = $request->variable('sid', '');
 278                  $SID = '?sid=' . $this->session_id;
 279                  $this->cookie_data = array('u' => 0, 'k' => '');
 280              }
 281          }
 282          else
 283          {
 284              $this->session_id = $_SID = $request->variable('sid', '');
 285              $SID = '?sid=' . $this->session_id;
 286          }
 287  
 288          $_EXTRA_URL = array();
 289  
 290          // Why no forwarded_for et al? Well, too easily spoofed. With the results of my recent requests
 291          // it's pretty clear that in the majority of cases you'll at least be left with a proxy/cache ip.
 292          $ip = html_entity_decode($request->server('REMOTE_ADDR'), ENT_COMPAT);
 293          $ip = preg_replace('# {2,}#', ' ', str_replace(',', ' ', $ip));
 294  
 295          /**
 296          * Event to alter user IP address
 297          *
 298          * @event core.session_ip_after
 299          * @var    string    ip    REMOTE_ADDR
 300          * @since 3.1.10-RC1
 301          */
 302          $vars = array('ip');
 303          extract($phpbb_dispatcher->trigger_event('core.session_ip_after', compact($vars)));
 304  
 305          // split the list of IPs
 306          $ips = explode(' ', trim($ip));
 307  
 308          // Default IP if REMOTE_ADDR is invalid
 309          $this->ip = '127.0.0.1';
 310  
 311          foreach ($ips as $ip)
 312          {
 313              // Normalise IP address
 314              $ip = phpbb_ip_normalise($ip);
 315  
 316              if ($ip === false)
 317              {
 318                  // IP address is invalid.
 319                  break;
 320              }
 321  
 322              // IP address is valid.
 323              $this->ip = $ip;
 324          }
 325  
 326          $this->load = false;
 327  
 328          // Load limit check (if applicable)
 329          if ($config['limit_load'] || $config['limit_search_load'])
 330          {
 331              if ((function_exists('sys_getloadavg') && $load = sys_getloadavg()) || ($load = explode(' ', @file_get_contents('/proc/loadavg'))))
 332              {
 333                  $this->load = array_slice($load, 0, 1);
 334                  $this->load = floatval($this->load[0]);
 335              }
 336              else
 337              {
 338                  $config->set('limit_load', '0');
 339                  $config->set('limit_search_load', '0');
 340              }
 341          }
 342  
 343          // if no session id is set, redirect to index.php
 344          $session_id = $request->variable('sid', '');
 345          if (defined('NEED_SID') && (empty($session_id) || $this->session_id !== $session_id))
 346          {
 347              send_status_line(401, 'Unauthorized');
 348              redirect(append_sid("{$phpbb_root_path}index.$phpEx"));
 349          }
 350  
 351          // if session id is set
 352          if (!empty($this->session_id))
 353          {
 354              $sql = 'SELECT u.*, s.*
 355                  FROM ' . SESSIONS_TABLE . ' s, ' . USERS_TABLE . " u
 356                  WHERE s.session_id = '" . $db->sql_escape($this->session_id) . "'
 357                      AND u.user_id = s.session_user_id";
 358              $result = $db->sql_query($sql);
 359              $this->data = $db->sql_fetchrow($result);
 360              $db->sql_freeresult($result);
 361  
 362              // Did the session exist in the DB?
 363              if (isset($this->data['user_id']))
 364              {
 365                  // Validate IP length according to admin ... enforces an IP
 366                  // check on bots if admin requires this
 367  //                $quadcheck = ($config['ip_check_bot'] && $this->data['user_type'] & USER_BOT) ? 4 : $config['ip_check'];
 368  
 369                  if (strpos($this->ip, ':') !== false && strpos($this->data['session_ip'], ':') !== false)
 370                  {
 371                      $s_ip = short_ipv6($this->data['session_ip'], $config['ip_check']);
 372                      $u_ip = short_ipv6($this->ip, $config['ip_check']);
 373                  }
 374                  else
 375                  {
 376                      $s_ip = implode('.', array_slice(explode('.', $this->data['session_ip']), 0, $config['ip_check']));
 377                      $u_ip = implode('.', array_slice(explode('.', $this->ip), 0, $config['ip_check']));
 378                  }
 379  
 380                  $s_browser = ($config['browser_check']) ? trim(strtolower(substr($this->data['session_browser'], 0, 149))) : '';
 381                  $u_browser = ($config['browser_check']) ? trim(strtolower(substr($this->browser, 0, 149))) : '';
 382  
 383                  $s_forwarded_for = ($config['forwarded_for_check']) ? substr($this->data['session_forwarded_for'], 0, 254) : '';
 384                  $u_forwarded_for = ($config['forwarded_for_check']) ? substr($this->forwarded_for, 0, 254) : '';
 385  
 386                  // referer checks
 387                  // The @ before $config['referer_validation'] suppresses notices present while running the updater
 388                  $check_referer_path = (@$config['referer_validation'] == REFERER_VALIDATE_PATH);
 389                  $referer_valid = true;
 390  
 391                  // we assume HEAD and TRACE to be foul play and thus only whitelist GET
 392                  if (@$config['referer_validation'] && strtolower($request->server('REQUEST_METHOD')) !== 'get')
 393                  {
 394                      $referer_valid = $this->validate_referer($check_referer_path);
 395                  }
 396  
 397                  if ($u_ip === $s_ip && $s_browser === $u_browser && $s_forwarded_for === $u_forwarded_for && $referer_valid)
 398                  {
 399                      $session_expired = false;
 400  
 401                      // Check whether the session is still valid if we have one
 402                      /* @var $provider_collection \phpbb\auth\provider_collection */
 403                      $provider_collection = $phpbb_container->get('auth.provider_collection');
 404                      $provider = $provider_collection->get_provider();
 405  
 406                      if (!($provider instanceof \phpbb\auth\provider\provider_interface))
 407                      {
 408                          throw new \RuntimeException($provider . ' must implement \phpbb\auth\provider\provider_interface');
 409                      }
 410  
 411                      $ret = $provider->validate_session($this->data);
 412                      if ($ret !== null && !$ret)
 413                      {
 414                          $session_expired = true;
 415                      }
 416  
 417                      if (!$session_expired)
 418                      {
 419                          // Check the session length timeframe if autologin is not enabled.
 420                          // Else check the autologin length... and also removing those having autologin enabled but no longer allowed board-wide.
 421                          if (!$this->data['session_autologin'])
 422                          {
 423                              if ($this->data['session_time'] < $this->time_now - ((int) $config['session_length'] + 60))
 424                              {
 425                                  $session_expired = true;
 426                              }
 427                          }
 428                          else if (!$config['allow_autologin'] || ($config['max_autologin_time'] && $this->data['session_time'] < $this->time_now - (86400 * (int) $config['max_autologin_time']) + 60))
 429                          {
 430                              $session_expired = true;
 431                          }
 432                      }
 433  
 434                      if (!$session_expired)
 435                      {
 436                          $this->data['is_registered'] = ($this->data['user_id'] != ANONYMOUS && ($this->data['user_type'] == USER_NORMAL || $this->data['user_type'] == USER_FOUNDER)) ? true : false;
 437                          $this->data['is_bot'] = (!$this->data['is_registered'] && $this->data['user_id'] != ANONYMOUS) ? true : false;
 438                          $this->data['user_lang'] = basename($this->data['user_lang']);
 439  
 440                          // Is user banned? Are they excluded? Won't return on ban, exists within method
 441                          $this->check_ban_for_current_session($config);
 442  
 443                          // Update user last active time accordingly, but in a minute or so
 444                          if ($this->time_now - (int) $this->data['user_last_active'] > 60)
 445                          {
 446                              $this->update_last_active_time();
 447                          }
 448  
 449                          return true;
 450                      }
 451                  }
 452                  else
 453                  {
 454                      // Added logging temporarily to help debug bugs...
 455                      if ($phpbb_container->getParameter('session.log_errors') && $this->data['user_id'] != ANONYMOUS)
 456                      {
 457                          if ($referer_valid)
 458                          {
 459                              $phpbb_log->add('critical', $user->data['user_id'], $user->ip, 'LOG_IP_BROWSER_FORWARDED_CHECK', false, array(
 460                                  $u_ip,
 461                                  $s_ip,
 462                                  $u_browser,
 463                                  $s_browser,
 464                                  htmlspecialchars($u_forwarded_for, ENT_COMPAT),
 465                                  htmlspecialchars($s_forwarded_for, ENT_COMPAT)
 466                              ));
 467                          }
 468                          else
 469                          {
 470                              $phpbb_log->add('critical', $user->data['user_id'], $user->ip, 'LOG_REFERER_INVALID', false, array($this->referer));
 471                          }
 472                      }
 473                  }
 474              }
 475          }
 476  
 477          // If we reach here then no (valid) session exists. So we'll create a new one
 478          return $this->session_create();
 479      }
 480  
 481      /**
 482      * Create a new session
 483      *
 484      * If upon trying to start a session we discover there is nothing existing we
 485      * jump here. Additionally this method is called directly during login to regenerate
 486      * the session for the specific user. In this method we carry out a number of tasks;
 487      * garbage collection, (search)bot checking, banned user comparison. Basically
 488      * though this method will result in a new session for a specific user.
 489      */
 490  	function session_create($user_id = false, $set_admin = false, $persist_login = false, $viewonline = true)
 491      {
 492          global $SID, $_SID, $db, $config, $cache, $phpbb_container, $phpbb_dispatcher;
 493  
 494          $this->data = array();
 495  
 496          /* Garbage collection ... remove old sessions updating user information
 497          // if necessary. It means (potentially) 11 queries but only infrequently
 498          if ($this->time_now > $config['session_last_gc'] + $config['session_gc'])
 499          {
 500              $this->session_gc();
 501          }*/
 502  
 503          // Do we allow autologin on this board? No? Then override anything
 504          // that may be requested here
 505          if (!$config['allow_autologin'])
 506          {
 507              $this->cookie_data['k'] = $persist_login = false;
 508          }
 509  
 510          /**
 511          * Here we do a bot check, oh er saucy! No, not that kind of bot
 512          * check. We loop through the list of bots defined by the admin and
 513          * see if we have any useragent and/or IP matches. If we do, this is a
 514          * bot, act accordingly
 515          */
 516          $bot = false;
 517          $active_bots = $cache->obtain_bots();
 518  
 519          foreach ($active_bots as $row)
 520          {
 521              if ($row['bot_agent'] && preg_match('#' . str_replace('\*', '.*?', preg_quote($row['bot_agent'], '#')) . '#i', $this->browser))
 522              {
 523                  $bot = $row['user_id'];
 524              }
 525  
 526              // If ip is supplied, we will make sure the ip is matching too...
 527              if ($row['bot_ip'] && ($bot || !$row['bot_agent']))
 528              {
 529                  // Set bot to false, then we only have to set it to true if it is matching
 530                  $bot = false;
 531  
 532                  foreach (explode(',', $row['bot_ip']) as $bot_ip)
 533                  {
 534                      $bot_ip = trim($bot_ip);
 535  
 536                      if (!$bot_ip)
 537                      {
 538                          continue;
 539                      }
 540  
 541                      if (strpos($this->ip, $bot_ip) === 0)
 542                      {
 543                          $bot = (int) $row['user_id'];
 544                          break;
 545                      }
 546                  }
 547              }
 548  
 549              if ($bot)
 550              {
 551                  break;
 552              }
 553          }
 554  
 555          /* @var $provider_collection \phpbb\auth\provider_collection */
 556          $provider_collection = $phpbb_container->get('auth.provider_collection');
 557          $provider = $provider_collection->get_provider();
 558          $this->data = $provider->autologin();
 559  
 560          if ($user_id !== false && isset($this->data['user_id']) && $this->data['user_id'] != $user_id)
 561          {
 562              $this->data = array();
 563          }
 564  
 565          if (isset($this->data['user_id']))
 566          {
 567              $this->cookie_data['k'] = '';
 568              $this->cookie_data['u'] = $this->data['user_id'];
 569          }
 570  
 571          // If we're presented with an autologin key we'll join against it.
 572          // Else if we've been passed a user_id we'll grab data based on that
 573          if (isset($this->cookie_data['k']) && $this->cookie_data['k'] && $this->cookie_data['u'] && empty($this->data))
 574          {
 575              $sql = 'SELECT u.*
 576                  FROM ' . USERS_TABLE . ' u, ' . SESSIONS_KEYS_TABLE . ' k
 577                  WHERE u.user_id = ' . (int) $this->cookie_data['u'] . '
 578                      AND u.user_type IN (' . USER_NORMAL . ', ' . USER_FOUNDER . ")
 579                      AND k.user_id = u.user_id
 580                      AND k.key_id = '" . $db->sql_escape(md5($this->cookie_data['k'])) . "'";
 581              $result = $db->sql_query($sql);
 582              $user_data = $db->sql_fetchrow($result);
 583  
 584              if ($user_id === false || (isset($user_data['user_id']) && $user_id == $user_data['user_id']))
 585              {
 586                  $this->data = $user_data;
 587                  $bot = false;
 588              }
 589  
 590              $db->sql_freeresult($result);
 591          }
 592  
 593          if ($user_id !== false && empty($this->data))
 594          {
 595              $this->cookie_data['k'] = '';
 596              $this->cookie_data['u'] = $user_id;
 597  
 598              $sql = 'SELECT *
 599                  FROM ' . USERS_TABLE . '
 600                  WHERE user_id = ' . (int) $this->cookie_data['u'] . '
 601                      AND user_type IN (' . USER_NORMAL . ', ' . USER_FOUNDER . ')';
 602              $result = $db->sql_query($sql);
 603              $this->data = $db->sql_fetchrow($result);
 604              $db->sql_freeresult($result);
 605              $bot = false;
 606          }
 607  
 608          // Bot user, if they have a SID in the Request URI we need to get rid of it
 609          // otherwise they'll index this page with the SID, duplicate content oh my!
 610          if ($bot && isset($_GET['sid']))
 611          {
 612              send_status_line(301, 'Moved Permanently');
 613              redirect(build_url(array('sid')));
 614          }
 615  
 616          // If no data was returned one or more of the following occurred:
 617          // Key didn't match one in the DB
 618          // User does not exist
 619          // User is inactive
 620          // User is bot
 621          if (!is_array($this->data) || !count($this->data))
 622          {
 623              $this->cookie_data['k'] = '';
 624              $this->cookie_data['u'] = ($bot) ? $bot : ANONYMOUS;
 625  
 626              if (!$bot)
 627              {
 628                  $sql = 'SELECT *
 629                      FROM ' . USERS_TABLE . '
 630                      WHERE user_id = ' . (int) $this->cookie_data['u'];
 631              }
 632              else
 633              {
 634                  // We give bots always the same session if it is not yet expired.
 635                  $sql = 'SELECT u.*, s.*
 636                      FROM ' . USERS_TABLE . ' u
 637                      LEFT JOIN ' . SESSIONS_TABLE . ' s ON (s.session_user_id = u.user_id)
 638                      WHERE u.user_id = ' . (int) $bot;
 639              }
 640  
 641              $result = $db->sql_query($sql);
 642              $this->data = $db->sql_fetchrow($result);
 643              $db->sql_freeresult($result);
 644          }
 645  
 646          if ($this->data['user_id'] != ANONYMOUS && !$bot)
 647          {
 648              $this->data['session_last_visit'] = (isset($this->data['session_time']) && $this->data['session_time']) ? $this->data['session_time'] : (($this->data['user_lastvisit']) ? $this->data['user_lastvisit'] : time());
 649          }
 650          else
 651          {
 652              $this->data['session_last_visit'] = $this->time_now;
 653          }
 654  
 655          // Force user id to be integer...
 656          $this->data['user_id'] = (int) $this->data['user_id'];
 657  
 658          // At this stage we should have a filled data array, defined cookie u and k data.
 659          // data array should contain recent session info if we're a real user and a recent
 660          // session exists in which case session_id will also be set
 661  
 662          // Is user banned? Are they excluded? Won't return on ban, exists within method
 663          $this->check_ban_for_current_session($config);
 664  
 665          $this->data['is_registered'] = (!$bot && $this->data['user_id'] != ANONYMOUS && ($this->data['user_type'] == USER_NORMAL || $this->data['user_type'] == USER_FOUNDER)) ? true : false;
 666          $this->data['is_bot'] = ($bot) ? true : false;
 667  
 668          // If our friend is a bot, we re-assign a previously assigned session
 669          if ($this->data['is_bot'] && $bot == $this->data['user_id'] && $this->data['session_id'])
 670          {
 671              // Only assign the current session if the ip, browser and forwarded_for match...
 672              if (strpos($this->ip, ':') !== false && strpos($this->data['session_ip'], ':') !== false)
 673              {
 674                  $s_ip = short_ipv6($this->data['session_ip'], $config['ip_check']);
 675                  $u_ip = short_ipv6($this->ip, $config['ip_check']);
 676              }
 677              else
 678              {
 679                  $s_ip = implode('.', array_slice(explode('.', $this->data['session_ip']), 0, $config['ip_check']));
 680                  $u_ip = implode('.', array_slice(explode('.', $this->ip), 0, $config['ip_check']));
 681              }
 682  
 683              $s_browser = ($config['browser_check']) ? trim(strtolower(substr($this->data['session_browser'], 0, 149))) : '';
 684              $u_browser = ($config['browser_check']) ? trim(strtolower(substr($this->browser, 0, 149))) : '';
 685  
 686              $s_forwarded_for = ($config['forwarded_for_check']) ? substr($this->data['session_forwarded_for'], 0, 254) : '';
 687              $u_forwarded_for = ($config['forwarded_for_check']) ? substr($this->forwarded_for, 0, 254) : '';
 688  
 689              if ($u_ip === $s_ip && $s_browser === $u_browser && $s_forwarded_for === $u_forwarded_for)
 690              {
 691                  $this->session_id = $this->data['session_id'];
 692  
 693                  // Only update session DB a minute or so after last update or if page changes
 694                  if ($this->time_now - $this->data['session_time'] > 60 || ($this->update_session_page && $this->data['session_page'] != $this->page['page']))
 695                  {
 696                      // Update the last visit time
 697                      $this->update_user_lastvisit();
 698                  }
 699  
 700                  $SID = '?sid=';
 701                  $_SID = '';
 702                  return true;
 703              }
 704              else
 705              {
 706                  // If the ip and browser does not match make sure we only have one bot assigned to one session
 707                  $db->sql_query('DELETE FROM ' . SESSIONS_TABLE . ' WHERE session_user_id = ' . $this->data['user_id']);
 708              }
 709          }
 710  
 711          $session_autologin = (($this->cookie_data['k'] || $persist_login) && $this->data['is_registered']) ? true : false;
 712          $set_admin = ($set_admin && $this->data['is_registered']) ? true : false;
 713  
 714          // Create or update the session
 715          $sql_ary = array(
 716              'session_user_id'        => (int) $this->data['user_id'],
 717              'session_start'            => (int) $this->time_now,
 718              'session_last_visit'    => (int) $this->data['session_last_visit'],
 719              'session_time'            => (int) $this->time_now,
 720              'session_browser'        => (string) trim(substr($this->browser, 0, 149)),
 721              'session_forwarded_for'    => (string) $this->forwarded_for,
 722              'session_ip'            => (string) $this->ip,
 723              'session_autologin'        => ($session_autologin) ? 1 : 0,
 724              'session_admin'            => ($set_admin) ? 1 : 0,
 725              'session_viewonline'    => ($viewonline) ? 1 : 0,
 726          );
 727  
 728          if ($this->update_session_page)
 729          {
 730              $sql_ary['session_page'] = (string) substr($this->page['page'], 0, 199);
 731              $sql_ary['session_forum_id'] = $this->page['forum'];
 732          }
 733  
 734          $db->sql_return_on_error(true);
 735  
 736          $sql = 'DELETE
 737              FROM ' . SESSIONS_TABLE . '
 738              WHERE session_id = \'' . $db->sql_escape($this->session_id) . '\'
 739                  AND session_user_id = ' . ANONYMOUS;
 740  
 741          if (!defined('IN_ERROR_HANDLER') && (!$this->session_id || !$db->sql_query($sql) || !$db->sql_affectedrows()))
 742          {
 743              // Limit new sessions in 1 minute period (if required)
 744              if (empty($this->data['session_time']) && $config['active_sessions'])
 745              {
 746  //                $db->sql_return_on_error(false);
 747  
 748                  $sql = 'SELECT COUNT(session_id) AS sessions
 749                      FROM ' . SESSIONS_TABLE . '
 750                      WHERE session_time >= ' . ($this->time_now - 60);
 751                  $result = $db->sql_query($sql);
 752                  $row = $db->sql_fetchrow($result);
 753                  $db->sql_freeresult($result);
 754  
 755                  if ((int) $row['sessions'] > (int) $config['active_sessions'])
 756                  {
 757                      send_status_line(503, 'Service Unavailable');
 758                      trigger_error('BOARD_UNAVAILABLE');
 759                  }
 760              }
 761          }
 762  
 763          // Since we re-create the session id here, the inserted row must be unique. Therefore, we display potential errors.
 764          // Commented out because it will not allow forums to update correctly
 765  //        $db->sql_return_on_error(false);
 766  
 767          // Something quite important: session_page always holds the *last* page visited, except for the *first* visit.
 768          // We are not able to simply have an empty session_page btw, therefore we need to tell phpBB how to detect this special case.
 769          // If the session id is empty, we have a completely new one and will set an "identifier" here. This identifier is able to be checked later.
 770          if (empty($this->data['session_id']))
 771          {
 772              // This is a temporary variable, only set for the very first visit
 773              $this->data['session_created'] = true;
 774          }
 775  
 776          $this->session_id = $this->data['session_id'] = md5(unique_id());
 777  
 778          $sql_ary['session_id'] = (string) $this->session_id;
 779          $sql_ary['session_page'] = (string) substr($this->page['page'], 0, 199);
 780          $sql_ary['session_forum_id'] = $this->page['forum'];
 781  
 782          $sql = 'INSERT INTO ' . SESSIONS_TABLE . ' ' . $db->sql_build_array('INSERT', $sql_ary);
 783          $db->sql_query($sql);
 784  
 785          $db->sql_return_on_error(false);
 786  
 787          // Regenerate autologin/persistent login key
 788          if ($session_autologin)
 789          {
 790              $this->set_login_key();
 791          }
 792  
 793          // refresh data
 794          $SID = '?sid=' . $this->session_id;
 795          $_SID = $this->session_id;
 796          $this->data = array_merge($this->data, $sql_ary);
 797  
 798          if (!$bot)
 799          {
 800              $cookie_expire = $this->time_now + (($config['max_autologin_time']) ? 86400 * (int) $config['max_autologin_time'] : 31536000);
 801  
 802              $this->set_cookie('u', $this->cookie_data['u'], $cookie_expire);
 803              $this->set_cookie('k', $this->cookie_data['k'], $cookie_expire);
 804              $this->set_cookie('sid', $this->session_id, $cookie_expire);
 805  
 806              unset($cookie_expire);
 807  
 808              $sql = 'SELECT COUNT(session_id) AS sessions
 809                      FROM ' . SESSIONS_TABLE . '
 810                      WHERE session_user_id = ' . (int) $this->data['user_id'] . '
 811                      AND session_time >= ' . (int) ($this->time_now - (max((int) $config['session_length'], (int) $config['form_token_lifetime'])));
 812              $result = $db->sql_query($sql);
 813              $row = $db->sql_fetchrow($result);
 814              $db->sql_freeresult($result);
 815  
 816              if ((int) $row['sessions'] <= 1 || empty($this->data['user_form_salt']))
 817              {
 818                  $this->data['user_form_salt'] = unique_id();
 819                  // Update the form key
 820                  $sql = 'UPDATE ' . USERS_TABLE . '
 821                      SET user_form_salt = \'' . $db->sql_escape($this->data['user_form_salt']) . '\',
 822                          user_last_active = ' . (int) $this->time_now . '
 823                      WHERE user_id = ' . (int) $this->data['user_id'];
 824                  $db->sql_query($sql);
 825              }
 826              else
 827              {
 828                  $this->update_last_active_time();
 829              }
 830          }
 831          else
 832          {
 833              $this->data['session_time'] = $this->data['session_last_visit'] = $this->time_now;
 834  
 835              $this->update_user_lastvisit();
 836  
 837              $SID = '?sid=';
 838              $_SID = '';
 839          }
 840  
 841          $session_data = $sql_ary;
 842          /**
 843          * Event to send new session data to extension
 844          * Read-only event
 845          *
 846          * @event core.session_create_after
 847          * @var    array        session_data                Associative array of session keys to be updated
 848          * @since 3.1.6-RC1
 849          */
 850          $vars = array('session_data');
 851          extract($phpbb_dispatcher->trigger_event('core.session_create_after', compact($vars)));
 852          unset($session_data);
 853  
 854          return true;
 855      }
 856  
 857      /**
 858      * Kills a session
 859      *
 860      * This method does what it says on the tin. It will delete a pre-existing session.
 861      * It resets cookie information (destroying any autologin key within that cookie data)
 862      * and update the users information from the relevant session data. It will then
 863      * grab guest user information.
 864      */
 865  	function session_kill($new_session = true)
 866      {
 867          global $SID, $_SID, $db, $phpbb_container, $phpbb_dispatcher;
 868  
 869          $sql = 'DELETE FROM ' . SESSIONS_TABLE . "
 870              WHERE session_id = '" . $db->sql_escape($this->session_id) . "'
 871                  AND session_user_id = " . (int) $this->data['user_id'];
 872          $db->sql_query($sql);
 873  
 874          $user_id = (int) $this->data['user_id'];
 875          $session_id = $this->session_id;
 876          /**
 877          * Event to send session kill information to extension
 878          * Read-only event
 879          *
 880          * @event core.session_kill_after
 881          * @var    int        user_id                user_id of the session user.
 882          * @var    string        session_id                current user's session_id
 883          * @var    bool    new_session     should we create new session for user
 884          * @since 3.1.6-RC1
 885          */
 886          $vars = array('user_id', 'session_id', 'new_session');
 887          extract($phpbb_dispatcher->trigger_event('core.session_kill_after', compact($vars)));
 888          unset($user_id);
 889          unset($session_id);
 890  
 891          // Allow connecting logout with external auth method logout
 892          /* @var $provider_collection \phpbb\auth\provider_collection */
 893          $provider_collection = $phpbb_container->get('auth.provider_collection');
 894          $provider = $provider_collection->get_provider();
 895          $provider->logout($this->data, $new_session);
 896  
 897          if ($this->data['user_id'] != ANONYMOUS)
 898          {
 899              // Delete existing session, update last visit info first!
 900              if (!isset($this->data['session_time']))
 901              {
 902                  $this->data['session_time'] = time();
 903              }
 904  
 905              $sql = 'UPDATE ' . USERS_TABLE . '
 906                  SET user_lastvisit = ' . (int) $this->data['session_time'] . '
 907                  WHERE user_id = ' . (int) $this->data['user_id'];
 908              $db->sql_query($sql);
 909  
 910              if ($this->cookie_data['k'])
 911              {
 912                  $sql = 'DELETE FROM ' . SESSIONS_KEYS_TABLE . '
 913                      WHERE user_id = ' . (int) $this->data['user_id'] . "
 914                          AND key_id = '" . $db->sql_escape(md5($this->cookie_data['k'])) . "'";
 915                  $db->sql_query($sql);
 916              }
 917  
 918              // Reset the data array
 919              $this->data = array();
 920  
 921              $sql = 'SELECT *
 922                  FROM ' . USERS_TABLE . '
 923                  WHERE user_id = ' . ANONYMOUS;
 924              $result = $db->sql_query($sql);
 925              $this->data = $db->sql_fetchrow($result);
 926              $db->sql_freeresult($result);
 927          }
 928  
 929          $cookie_expire = $this->time_now - 31536000;
 930          $this->set_cookie('u', '', $cookie_expire);
 931          $this->set_cookie('k', '', $cookie_expire);
 932          $this->set_cookie('sid', '', $cookie_expire);
 933          unset($cookie_expire);
 934  
 935          $SID = '?sid=';
 936          $this->session_id = $_SID = '';
 937  
 938          // To make sure a valid session is created we create one for the anonymous user
 939          if ($new_session)
 940          {
 941              $this->session_create(ANONYMOUS);
 942          }
 943  
 944          return true;
 945      }
 946  
 947      /**
 948      * Session garbage collection
 949      *
 950      * This looks a lot more complex than it really is. Effectively we are
 951      * deleting any sessions older than an admin definable limit. Due to the
 952      * way in which we maintain session data we have to ensure we update user
 953      * data before those sessions are destroyed. In addition this method
 954      * removes autologin key information that is older than an admin defined
 955      * limit.
 956      */
 957  	function session_gc()
 958      {
 959          global $db, $config, $phpbb_container, $phpbb_dispatcher;
 960  
 961          if (!$this->time_now)
 962          {
 963              $this->time_now = time();
 964          }
 965  
 966          /**
 967           * Get expired sessions for registered users, only most recent for each user
 968           * Inner SELECT gets most recent expired sessions for unique session_user_id
 969           * Outer SELECT gets data for them
 970           */
 971          $sql_select = 'SELECT s1.session_page, s1.session_user_id, s1.session_time AS recent_time
 972              FROM ' . SESSIONS_TABLE . ' AS s1
 973              INNER JOIN (
 974                  SELECT session_user_id, MAX(session_time) AS recent_time
 975                  FROM ' . SESSIONS_TABLE . '
 976                  WHERE session_time < ' . ($this->time_now - (int) $config['session_length']) . '
 977                      AND session_user_id <> ' . ANONYMOUS . '
 978                  GROUP BY session_user_id
 979              ) AS s2
 980              ON s1.session_user_id = s2.session_user_id
 981                  AND s1.session_time = s2.recent_time';
 982  
 983          switch ($db->get_sql_layer())
 984          {
 985              case 'sqlite3':
 986                  if (phpbb_version_compare($db->sql_server_info(true), '3.8.3', '>='))
 987                  {
 988                      // For SQLite versions 3.8.3+ which support Common Table Expressions (CTE)
 989                      $sql = "WITH s3 (session_page, session_user_id, session_time) AS ($sql_select)
 990                          UPDATE " . USERS_TABLE . '
 991                          SET (user_lastpage, user_lastvisit) = (SELECT session_page, session_time FROM s3 WHERE session_user_id = user_id)
 992                          WHERE EXISTS (SELECT session_user_id FROM s3 WHERE session_user_id = user_id)';
 993                      $db->sql_query($sql);
 994  
 995                      break;
 996                  }
 997  
 998              // No break, for SQLite versions prior to 3.8.3 and Oracle
 999              case 'oracle':
1000                  $result = $db->sql_query($sql_select);
1001                  while ($row = $db->sql_fetchrow($result))
1002                  {
1003                      $sql = 'UPDATE ' . USERS_TABLE . '
1004                          SET user_lastvisit = ' . (int) $row['recent_time'] . ", user_lastpage = '" . $db->sql_escape($row['session_page']) . "'
1005                          WHERE user_id = " . (int) $row['session_user_id'];
1006                      $db->sql_query($sql);
1007                  }
1008                  $db->sql_freeresult($result);
1009              break;
1010  
1011              case 'mysqli':
1012                  $sql = 'UPDATE ' . USERS_TABLE . " u,
1013                      ($sql_select) s3
1014                      SET u.user_lastvisit = s3.recent_time, u.user_lastpage = s3.session_page
1015                      WHERE u.user_id = s3.session_user_id";
1016                  $db->sql_query($sql);
1017              break;
1018  
1019              default:
1020                  $sql = 'UPDATE ' . USERS_TABLE . "
1021                      SET user_lastvisit = s3.recent_time, user_lastpage = s3.session_page
1022                      FROM ($sql_select) s3
1023                      WHERE user_id = s3.session_user_id";
1024                  $db->sql_query($sql);
1025              break;
1026          }
1027  
1028          // Delete all expired sessions
1029          $sql = 'DELETE FROM ' . SESSIONS_TABLE . '
1030              WHERE session_time < ' . ($this->time_now - (int) $config['session_length']);
1031          $db->sql_query($sql);
1032  
1033          // Update gc timer
1034          $config->set('session_last_gc', $this->time_now, false);
1035  
1036          if ($config['max_autologin_time'])
1037          {
1038              $sql = 'DELETE FROM ' . SESSIONS_KEYS_TABLE . '
1039                  WHERE last_login < ' . (time() - (86400 * (int) $config['max_autologin_time']));
1040              $db->sql_query($sql);
1041          }
1042  
1043          // only called from CRON; should be a safe workaround until the infrastructure gets going
1044          /* @var \phpbb\captcha\factory $captcha_factory */
1045          $captcha_factory = $phpbb_container->get('captcha.factory');
1046          $captcha_factory->garbage_collect($config['captcha_plugin']);
1047  
1048          $sql = 'DELETE FROM ' . LOGIN_ATTEMPT_TABLE . '
1049              WHERE attempt_time < ' . (time() - (int) $config['ip_login_limit_time']);
1050          $db->sql_query($sql);
1051  
1052          /**
1053          * Event to trigger extension on session_gc
1054          *
1055          * @event core.session_gc_after
1056          * @since 3.1.6-RC1
1057          */
1058          $phpbb_dispatcher->dispatch('core.session_gc_after');
1059  
1060          return;
1061      }
1062  
1063      /**
1064      * Sets a cookie
1065      *
1066      * Sets a cookie of the given name with the specified data for the given length of time. If no time is specified, a session cookie will be set.
1067      *
1068      * @param string $name        Name of the cookie, will be automatically prefixed with the phpBB cookie name. track becomes [cookie_name]_track then.
1069      * @param string $cookiedata    The data to hold within the cookie
1070      * @param int $cookietime    The expiration time as UNIX timestamp. If 0 is provided, a session cookie is set.
1071      * @param bool $httponly        Use HttpOnly. Defaults to true. Use false to make cookie accessible by client-side scripts.
1072      */
1073  	function set_cookie($name, $cookiedata, $cookietime, $httponly = true)
1074      {
1075          global $config, $phpbb_dispatcher;
1076  
1077          // If headers are already set, we just return
1078          if (headers_sent())
1079          {
1080              return;
1081          }
1082  
1083          $disable_cookie = false;
1084          /**
1085          * Event to modify or disable setting cookies
1086          *
1087          * @event core.set_cookie
1088          * @var    bool        disable_cookie    Set to true to disable setting this cookie
1089          * @var    string        name            Name of the cookie
1090          * @var    string        cookiedata        The data to hold within the cookie
1091          * @var    int            cookietime        The expiration time as UNIX timestamp
1092          * @var    bool        httponly        Use HttpOnly?
1093          * @since 3.2.9-RC1
1094          */
1095          $vars = array(
1096              'disable_cookie',
1097              'name',
1098              'cookiedata',
1099              'cookietime',
1100              'httponly',
1101          );
1102          extract($phpbb_dispatcher->trigger_event('core.set_cookie', compact($vars)));
1103  
1104          if ($disable_cookie)
1105          {
1106              return;
1107          }
1108  
1109          $name_data = rawurlencode($config['cookie_name'] . '_' . $name) . '=' . rawurlencode($cookiedata);
1110          $expire = gmdate('D, d-M-Y H:i:s \\G\\M\\T', $cookietime);
1111          $domain = (!$config['cookie_domain'] || $config['cookie_domain'] == '127.0.0.1' || strpos($config['cookie_domain'], '.') === false) ? '' : '; domain=' . $config['cookie_domain'];
1112  
1113          header('Set-Cookie: ' . $name_data . (($cookietime) ? '; expires=' . $expire : '') . '; path=' . $config['cookie_path'] . $domain . ((!$config['cookie_secure']) ? '' : '; secure') . ';' . (($httponly) ? ' HttpOnly' : ''), false);
1114      }
1115  
1116      /**
1117      * Check for banned user
1118      *
1119      * Checks whether the supplied user is banned by id, ip or email. If no parameters
1120      * are passed to the method pre-existing session data is used.
1121      *
1122      * @param int|false        $user_id        The user id
1123      * @param mixed            $user_ips        Can contain a string with one IP or an array of multiple IPs
1124      * @param string|false    $user_email        The user email
1125      * @param bool            $return            If $return is false this routine does not return on finding a banned user,
1126      *    it outputs a relevant message and stops execution.
1127      */
1128  	function check_ban($user_id = false, $user_ips = false, $user_email = false, $return = false)
1129      {
1130          global $config, $db, $phpbb_dispatcher;
1131  
1132          if (defined('IN_CHECK_BAN') || defined('SKIP_CHECK_BAN'))
1133          {
1134              return;
1135          }
1136  
1137          $banned = false;
1138          $cache_ttl = 3600;
1139          $where_sql = array();
1140  
1141          $sql = 'SELECT ban_ip, ban_userid, ban_email, ban_exclude, ban_give_reason, ban_end
1142              FROM ' . BANLIST_TABLE . '
1143              WHERE ';
1144  
1145          // Determine which entries to check, only return those
1146          if ($user_email === false)
1147          {
1148              $where_sql[] = "ban_email = ''";
1149          }
1150  
1151          if ($user_ips === false)
1152          {
1153              $where_sql[] = "(ban_ip = '' OR ban_exclude = 1)";
1154          }
1155  
1156          if ($user_id === false)
1157          {
1158              $where_sql[] = '(ban_userid = 0 OR ban_exclude = 1)';
1159          }
1160          else
1161          {
1162              $cache_ttl = ($user_id == ANONYMOUS) ? 3600 : 0;
1163              $_sql = '(ban_userid = ' . $user_id;
1164  
1165              if ($user_email !== false)
1166              {
1167                  $_sql .= " OR ban_email <> ''";
1168              }
1169  
1170              if ($user_ips !== false)
1171              {
1172                  $_sql .= " OR ban_ip <> ''";
1173              }
1174  
1175              $_sql .= ')';
1176  
1177              $where_sql[] = $_sql;
1178          }
1179  
1180          $sql .= (count($where_sql)) ? implode(' AND ', $where_sql) : '';
1181          $result = $db->sql_query($sql, $cache_ttl);
1182  
1183          $ban_triggered_by = 'user';
1184          while ($row = $db->sql_fetchrow($result))
1185          {
1186              if ($row['ban_end'] && $row['ban_end'] < time())
1187              {
1188                  continue;
1189              }
1190  
1191              $ip_banned = false;
1192              if (!empty($row['ban_ip']))
1193              {
1194                  if (!is_array($user_ips))
1195                  {
1196                      $ip_banned = preg_match('#^' . str_replace('\*', '.*?', preg_quote($row['ban_ip'], '#')) . '$#i', $user_ips);
1197                  }
1198                  else
1199                  {
1200                      foreach ($user_ips as $user_ip)
1201                      {
1202                          if (preg_match('#^' . str_replace('\*', '.*?', preg_quote($row['ban_ip'], '#')) . '$#i', $user_ip))
1203                          {
1204                              $ip_banned = true;
1205                              break;
1206                          }
1207                      }
1208                  }
1209              }
1210  
1211              if ((!empty($row['ban_userid']) && intval($row['ban_userid']) == $user_id) ||
1212                  $ip_banned ||
1213                  (!empty($row['ban_email']) && preg_match('#^' . str_replace('\*', '.*?', preg_quote($row['ban_email'], '#')) . '$#i', $user_email)))
1214              {
1215                  if (!empty($row['ban_exclude']))
1216                  {
1217                      $banned = false;
1218                      break;
1219                  }
1220                  else
1221                  {
1222                      $banned = true;
1223                      $ban_row = $row;
1224  
1225                      if (!empty($row['ban_userid']) && intval($row['ban_userid']) == $user_id)
1226                      {
1227                          $ban_triggered_by = 'user';
1228                      }
1229                      else if ($ip_banned)
1230                      {
1231                          $ban_triggered_by = 'ip';
1232                      }
1233                      else
1234                      {
1235                          $ban_triggered_by = 'email';
1236                      }
1237  
1238                      // Don't break. Check if there is an exclude rule for this user
1239                  }
1240              }
1241          }
1242          $db->sql_freeresult($result);
1243  
1244          /**
1245          * Event to set custom ban type
1246          *
1247          * @event core.session_set_custom_ban
1248          * @var    bool        return                If $return is false this routine does not return on finding a banned user, it outputs a relevant message and stops execution
1249          * @var    bool        banned                Check if user already banned
1250          * @var    array|false    ban_row                Ban data
1251          * @var    string        ban_triggered_by    Method that caused ban, can be your custom method
1252          * @since 3.1.3-RC1
1253          */
1254          $ban_row = isset($ban_row) ? $ban_row : false;
1255          $vars = array('return', 'banned', 'ban_row', 'ban_triggered_by');
1256          extract($phpbb_dispatcher->trigger_event('core.session_set_custom_ban', compact($vars)));
1257  
1258          if ($banned && !$return)
1259          {
1260              global $phpbb_root_path, $phpEx;
1261  
1262              // If the session is empty we need to create a valid one...
1263              if (empty($this->session_id))
1264              {
1265                  // This seems to be no longer needed? - #14971
1266  //                $this->session_create(ANONYMOUS);
1267              }
1268  
1269              // Initiate environment ... since it won't be set at this stage
1270              $this->setup();
1271  
1272              // Logout the user, banned users are unable to use the normal 'logout' link
1273              if ($this->data['user_id'] != ANONYMOUS)
1274              {
1275                  $this->session_kill();
1276              }
1277  
1278              // We show a login box here to allow founders accessing the board if banned by IP
1279              if (defined('IN_LOGIN') && $this->data['user_id'] == ANONYMOUS)
1280              {
1281                  $this->setup('ucp');
1282                  $this->data['is_registered'] = $this->data['is_bot'] = false;
1283  
1284                  // Set as a precaution to allow login_box() handling this case correctly as well as this function not being executed again.
1285                  define('IN_CHECK_BAN', 1);
1286  
1287                  login_box("index.$phpEx");
1288  
1289                  // The false here is needed, else the user is able to circumvent the ban.
1290                  $this->session_kill(false);
1291              }
1292  
1293              // Ok, we catch the case of an empty session id for the anonymous user...
1294              // This can happen if the user is logging in, banned by username and the login_box() being called "again".
1295              if (empty($this->session_id) && defined('IN_CHECK_BAN'))
1296              {
1297                  $this->session_create(ANONYMOUS);
1298              }
1299  
1300              // Determine which message to output
1301              $till_date = ($ban_row['ban_end']) ? $this->format_date($ban_row['ban_end']) : '';
1302              $message = ($ban_row['ban_end']) ? 'BOARD_BAN_TIME' : 'BOARD_BAN_PERM';
1303  
1304              $contact_link = phpbb_get_board_contact_link($config, $phpbb_root_path, $phpEx);
1305              $message = sprintf($this->lang[$message], $till_date, '<a href="' . $contact_link . '">', '</a>');
1306              $message .= ($ban_row['ban_give_reason']) ? '<br /><br />' . sprintf($this->lang['BOARD_BAN_REASON'], $ban_row['ban_give_reason']) : '';
1307              $message .= '<br /><br /><em>' . $this->lang['BAN_TRIGGERED_BY_' . strtoupper($ban_triggered_by)] . '</em>';
1308  
1309              // A very special case... we are within the cron script which is not supposed to print out the ban message... show blank page
1310              if (defined('IN_CRON'))
1311              {
1312                  garbage_collection();
1313                  exit_handler();
1314                  exit;
1315              }
1316  
1317              // To circumvent session_begin returning a valid value and the check_ban() not called on second page view, we kill the session again
1318              $this->session_kill(false);
1319  
1320              trigger_error($message);
1321          }
1322  
1323          if (!empty($ban_row))
1324          {
1325              $ban_row['ban_triggered_by'] = $ban_triggered_by;
1326          }
1327  
1328          return ($banned && $ban_row) ? $ban_row : $banned;
1329      }
1330  
1331      /**
1332       * Check the current session for bans
1333       *
1334       * @return true if session user is banned.
1335       */
1336  	protected function check_ban_for_current_session($config)
1337      {
1338          if (!defined('SKIP_CHECK_BAN') && $this->data['user_type'] != USER_FOUNDER)
1339          {
1340              if (!$config['forwarded_for_check'])
1341              {
1342                  $this->check_ban($this->data['user_id'], $this->ip);
1343              }
1344              else
1345              {
1346                  $ips = explode(' ', $this->forwarded_for);
1347                  $ips[] = $this->ip;
1348                  $this->check_ban($this->data['user_id'], $ips);
1349              }
1350          }
1351      }
1352  
1353      /**
1354      * Check if ip is blacklisted by Spamhaus SBL
1355      *
1356      * Disables DNSBL setting if errors are returned by Spamhaus due to a policy violation.
1357      * https://www.spamhaus.com/product/help-for-spamhaus-public-mirror-users/
1358      *
1359      * @param string         $dnsbl    the blacklist to check against
1360      * @param string|false    $ip        the IPv4 address to check
1361      *
1362      * @return bool true if listed in spamhaus database, false if not
1363      */
1364  	function check_dnsbl_spamhaus($dnsbl, $ip = false)
1365      {
1366          global $config, $phpbb_log;
1367  
1368          if ($ip === false)
1369          {
1370              $ip = $this->ip;
1371          }
1372  
1373          // Spamhaus does not support IPv6 addresses.
1374          if (strpos($ip, ':') !== false)
1375          {
1376              return false;
1377          }
1378  
1379          if ($ip)
1380          {
1381              $quads = explode('.', $ip);
1382              $reverse_ip = $quads[3] . '.' . $quads[2] . '.' . $quads[1] . '.' . $quads[0];
1383  
1384              $records = dns_get_record($reverse_ip . '.' . $dnsbl . '.', DNS_A);
1385              if (empty($records))
1386              {
1387                  return false;
1388              }
1389              else
1390              {
1391                  $error = false;
1392                  foreach ($records as $record)
1393                  {
1394                      if ($record['ip'] == '127.255.255.254')
1395                      {
1396                          $error = 'LOG_SPAMHAUS_OPEN_RESOLVER';
1397                          break;
1398                      }
1399                      else if ($record['ip'] == '127.255.255.255')
1400                      {
1401                          $error = 'LOG_SPAMHAUS_VOLUME_LIMIT';
1402                          break;
1403                      }
1404                  }
1405  
1406                  if ($error !== false)
1407                  {
1408                      $config->set('check_dnsbl', 0);
1409                      $phpbb_log->add('critical', $this->data['user_id'], $ip, $error);
1410                  }
1411                  else
1412                  {
1413                      // The existence of a non-error A record means it's a hit
1414                      return true;
1415                  }
1416              }
1417          }
1418  
1419          return false;
1420      }
1421  
1422      /**
1423      * Checks if an IPv4 address is in a specified DNS blacklist
1424      *
1425      * Only checks if a record is returned or not.
1426      *
1427      * @param string         $dnsbl    the blacklist to check against
1428      * @param string|false    $ip        the IPv4 address to check
1429      *
1430      * @return bool true if record is returned, false if not
1431      */
1432  	function check_dnsbl_ipv4_generic($dnsbl, $ip = false)
1433      {
1434          if ($ip === false)
1435          {
1436              $ip = $this->ip;
1437          }
1438  
1439          // This function does not support IPv6 addresses.
1440          if (strpos($ip, ':') !== false)
1441          {
1442              return false;
1443          }
1444  
1445          $quads = explode('.', $ip);
1446          $reverse_ip = $quads[3] . '.' . $quads[2] . '.' . $quads[1] . '.' . $quads[0];
1447  
1448          if (checkdnsrr($reverse_ip . '.' . $dnsbl . '.', 'A') === true)
1449          {
1450              return true;
1451          }
1452  
1453          return false;
1454      }
1455  
1456      /**
1457      * Check if ip is blacklisted
1458      * This should be called only where absolutely necessary
1459      *
1460      * Only IPv4 (rbldns does not support AAAA records/IPv6 lookups)
1461      *
1462      * @author satmd (from the php manual)
1463      * @param string         $mode    register/post - spamcop for example is omitted for posting
1464      * @param string|false    $ip        the IPv4 address to check
1465      *
1466      * @return false if ip is not blacklisted, else an array([checked server], [lookup])
1467      */
1468  	function check_dnsbl($mode, $ip = false)
1469      {
1470          if ($ip === false)
1471          {
1472              $ip = $this->ip;
1473          }
1474  
1475          // Neither Spamhaus nor Spamcop supports IPv6 addresses.
1476          if (strpos($ip, ':') !== false)
1477          {
1478              return false;
1479          }
1480  
1481          $dnsbl_check = array(
1482              'sbl.spamhaus.org'    => ['https://check.spamhaus.org/listed/?searchterm=', 'check_dnsbl_spamhaus'],
1483          );
1484  
1485          if ($mode == 'register')
1486          {
1487              $dnsbl_check['bl.spamcop.net'] = ['https://www.spamcop.net/bl.shtml?', 'check_dnsbl_ipv4_generic'];
1488          }
1489  
1490          if ($ip)
1491          {
1492              // Need to be listed on all servers...
1493              $listed = true;
1494              $info = array();
1495  
1496              foreach ($dnsbl_check as $dnsbl => $lookup)
1497              {
1498                  if (call_user_func(array($this, $lookup[1]), $dnsbl, $ip) === true)
1499                  {
1500                      $info = array($dnsbl, $lookup[0] . $ip);
1501                  }
1502                  else
1503                  {
1504                      $listed = false;
1505                  }
1506              }
1507  
1508              if ($listed)
1509              {
1510                  return $info;
1511              }
1512          }
1513  
1514          return false;
1515      }
1516  
1517      /**
1518      * Check if URI is blacklisted
1519      * This should be called only where absolutely necessary, for example on the submitted website field
1520      * This function is not in use at the moment and is only included for testing purposes, it may not work at all!
1521      * This means it is untested at the moment and therefore commented out
1522      *
1523      * @param string $uri URI to check
1524      * @return true if uri is on blacklist, else false. Only blacklist is checked (~zero FP), no grey lists
1525      function check_uribl($uri)
1526      {
1527          // Normally parse_url() is not intended to parse uris
1528          // We need to get the top-level domain name anyway... change.
1529          $uri = parse_url($uri);
1530  
1531          if ($uri === false || empty($uri['host']))
1532          {
1533              return false;
1534          }
1535  
1536          $uri = trim($uri['host']);
1537  
1538          if ($uri)
1539          {
1540              // One problem here... the return parameter for the "windows" method is different from what
1541              // we expect... this may render this check useless...
1542              if (checkdnsrr($uri . '.multi.uribl.com.', 'A') === true)
1543              {
1544                  return true;
1545              }
1546          }
1547  
1548          return false;
1549      }
1550      */
1551  
1552      /**
1553      * Set/Update a persistent login key
1554      *
1555      * This method creates or updates a persistent session key. When a user makes
1556      * use of persistent (formerly auto-) logins a key is generated and stored in the
1557      * DB. When they revisit with the same key it's automatically updated in both the
1558      * DB and cookie. Multiple keys may exist for each user representing different
1559      * browsers or locations. As with _any_ non-secure-socket no passphrase login this
1560      * remains vulnerable to exploit.
1561      */
1562  	function set_login_key($user_id = false, $key = false, $user_ip = false)
1563      {
1564          global $db, $phpbb_dispatcher;
1565  
1566          $user_id = ($user_id === false) ? $this->data['user_id'] : $user_id;
1567          $user_ip = ($user_ip === false) ? $this->ip : $user_ip;
1568          $key = ($key === false) ? (($this->cookie_data['k']) ? $this->cookie_data['k'] : false) : $key;
1569  
1570          $key_id = unique_id(hexdec(substr($this->session_id, 0, 8)));
1571  
1572          $sql_ary = array(
1573              'key_id'        => (string) md5($key_id),
1574              'last_ip'        => (string) $user_ip,
1575              'last_login'    => (int) time()
1576          );
1577  
1578          if (!$key)
1579          {
1580              $sql_ary += array(
1581                  'user_id'    => (int) $user_id
1582              );
1583          }
1584  
1585          if ($key)
1586          {
1587              $sql = 'UPDATE ' . SESSIONS_KEYS_TABLE . '
1588                  SET ' . $db->sql_build_array('UPDATE', $sql_ary) . '
1589                  WHERE user_id = ' . (int) $user_id . "
1590                      AND key_id = '" . $db->sql_escape(md5($key)) . "'";
1591          }
1592          else
1593          {
1594              $sql = 'INSERT INTO ' . SESSIONS_KEYS_TABLE . ' ' . $db->sql_build_array('INSERT', $sql_ary);
1595          }
1596  
1597          /**
1598           * Event to adjust autologin keys process
1599           *
1600           * @event core.set_login_key
1601           * @var    string|false    key            Current autologin key if exists, false otherwise
1602           * @var    string            key_id        New autologin key
1603           * @var    string            sql            SQL query to update/insert autologin key
1604           * @var    array            sql_ary        Aray with autologin key data
1605           * @var    int                user_id        Current user's ID
1606           * @var    string            user_ip        Current user's IP address
1607           * @since 3.3.2-RC1
1608           */
1609          $vars = [
1610              'key',
1611              'key_id',
1612              'sql',
1613              'sql_ary',
1614              'user_id',
1615              'user_ip',
1616          ];
1617          extract($phpbb_dispatcher->trigger_event('core.set_login_key', compact($vars)));
1618  
1619          $db->sql_query($sql);
1620  
1621          $this->cookie_data['k'] = $key_id;
1622  
1623          return false;
1624      }
1625  
1626      /**
1627      * Reset all login keys for the specified user
1628      *
1629      * This method removes all current login keys for a specified (or the current)
1630      * user. It will be called on password change to render old keys unusable
1631      */
1632  	function reset_login_keys($user_id = false)
1633      {
1634          global $db;
1635  
1636          $user_id = ($user_id === false) ? (int) $this->data['user_id'] : (int) $user_id;
1637  
1638          $sql = 'DELETE FROM ' . SESSIONS_KEYS_TABLE . '
1639              WHERE user_id = ' . (int) $user_id;
1640          $db->sql_query($sql);
1641  
1642          // If the user is logged in, update last visit info first before deleting sessions
1643          $sql = 'SELECT session_time, session_page
1644              FROM ' . SESSIONS_TABLE . '
1645              WHERE session_user_id = ' . (int) $user_id . '
1646              ORDER BY session_time DESC';
1647          $result = $db->sql_query_limit($sql, 1);
1648          $row = $db->sql_fetchrow($result);
1649          $db->sql_freeresult($result);
1650  
1651          if ($row)
1652          {
1653              $sql = 'UPDATE ' . USERS_TABLE . '
1654                  SET user_lastvisit = ' . (int) $row['session_time'] . ", user_lastpage = '" . $db->sql_escape($row['session_page']) . "'
1655                  WHERE user_id = " . (int) $user_id;
1656              $db->sql_query($sql);
1657          }
1658  
1659          // Let's also clear any current sessions for the specified user_id
1660          // If it's the current user then we'll leave this session intact
1661          $sql_where = 'session_user_id = ' . (int) $user_id;
1662          $sql_where .= ($user_id === (int) $this->data['user_id']) ? " AND session_id <> '" . $db->sql_escape($this->session_id) . "'" : '';
1663  
1664          $sql = 'DELETE FROM ' . SESSIONS_TABLE . "
1665              WHERE $sql_where";
1666          $db->sql_query($sql);
1667  
1668          // We're changing the password of the current user and they have a key
1669          // Lets regenerate it to be safe
1670          if ($user_id === (int) $this->data['user_id'] && $this->cookie_data['k'])
1671          {
1672              $this->set_login_key($user_id);
1673          }
1674      }
1675  
1676  
1677      /**
1678      * Check if the request originated from the same page.
1679      * @param bool $check_script_path If true, the path will be checked as well
1680      */
1681  	function validate_referer($check_script_path = false)
1682      {
1683          global $config, $request;
1684  
1685          // no referer - nothing to validate, user's fault for turning it off (we only check on POST; so meta can't be the reason)
1686          if (empty($this->referer) || empty($this->host))
1687          {
1688              return true;
1689          }
1690  
1691          $host = htmlspecialchars($this->host, ENT_COMPAT);
1692          $ref = substr($this->referer, strpos($this->referer, '://') + 3);
1693  
1694          if (!(stripos($ref, $host) === 0) && (!$config['force_server_vars'] || !(stripos($ref, $config['server_name']) === 0)))
1695          {
1696              return false;
1697          }
1698          else if ($check_script_path && rtrim($this->page['root_script_path'], '/') !== '')
1699          {
1700              $ref = substr($ref, strlen($host));
1701              $server_port = $request->server('SERVER_PORT', 0);
1702  
1703              if ($server_port !== 80 && $server_port !== 443 && stripos($ref, ":$server_port") === 0)
1704              {
1705                  $ref = substr($ref, strlen(":$server_port"));
1706              }
1707  
1708              if (!(stripos(rtrim($ref, '/'), rtrim($this->page['root_script_path'], '/')) === 0))
1709              {
1710                  return false;
1711              }
1712          }
1713  
1714          return true;
1715      }
1716  
1717  
1718  	function unset_admin()
1719      {
1720          global $db;
1721          $sql = 'UPDATE ' . SESSIONS_TABLE . '
1722              SET session_admin = 0
1723              WHERE session_id = \'' . $db->sql_escape($this->session_id) . '\'';
1724          $db->sql_query($sql);
1725      }
1726  
1727      /**
1728      * Update the session data
1729      *
1730      * @param array $session_data associative array of session keys to be updated
1731      * @param string $session_id optional session_id, defaults to current user's session_id
1732      */
1733  	public function update_session($session_data, $session_id = null)
1734      {
1735          global $db, $phpbb_dispatcher;
1736  
1737          $session_id = ($session_id) ? $session_id : $this->session_id;
1738  
1739          $sql = 'UPDATE ' . SESSIONS_TABLE . ' SET ' . $db->sql_build_array('UPDATE', $session_data) . "
1740              WHERE session_id = '" . $db->sql_escape($session_id) . "'";
1741          $db->sql_query($sql);
1742  
1743          /**
1744          * Event to send update session information to extension
1745          * Read-only event
1746          *
1747          * @event core.update_session_after
1748          * @var    array        session_data                Associative array of session keys to be updated
1749          * @var    string        session_id                current user's session_id
1750          * @since 3.1.6-RC1
1751          */
1752          $vars = array('session_data', 'session_id');
1753          extract($phpbb_dispatcher->trigger_event('core.update_session_after', compact($vars)));
1754      }
1755  
1756  	public function update_session_infos()
1757      {
1758          global $config, $db, $request;
1759  
1760          // No need to update if it's a new session. Informations are already inserted by session_create()
1761          if (isset($this->data['session_created']) && $this->data['session_created'])
1762          {
1763              return;
1764          }
1765  
1766          // Do not update the session page for ajax requests, so the view online still works as intended
1767          $page_changed = $this->update_session_page && (!isset($this->data['session_page']) || $this->data['session_page'] != $this->page['page'] || $this->data['session_forum_id'] != $this->page['forum']) && !$request->is_ajax();
1768  
1769          // Only update session DB a minute or so after last update or if page changes
1770          if ($this->time_now - (isset($this->data['session_time']) ? $this->data['session_time'] : 0) > 60 || $page_changed)
1771          {
1772              $sql_ary = array('session_time' => $this->time_now);
1773  
1774              if ($page_changed)
1775              {
1776                  $sql_ary['session_page'] = substr($this->page['page'], 0, 199);
1777                  $sql_ary['session_forum_id'] = $this->page['forum'];
1778              }
1779  
1780              $db->sql_return_on_error(true);
1781  
1782              $this->update_session($sql_ary);
1783  
1784              $db->sql_return_on_error(false);
1785  
1786              $this->data = array_merge($this->data, $sql_ary);
1787  
1788              if ($this->data['user_id'] != ANONYMOUS && isset($config['new_member_post_limit']) && $this->data['user_new'] && $config['new_member_post_limit'] <= $this->data['user_posts'])
1789              {
1790                  $this->leave_newly_registered();
1791              }
1792          }
1793      }
1794  
1795      /**
1796       * Get user ID
1797       *
1798       * @return int User ID
1799       */
1800      public function id() : int
1801      {
1802          return isset($this->data['user_id']) ? (int) $this->data['user_id'] : ANONYMOUS;
1803      }
1804  
1805      /**
1806       * Update user last visit time
1807       */
1808  	public function update_user_lastvisit()
1809      {
1810          global $db;
1811  
1812          if (isset($this->data['session_time'], $this->data['user_id']))
1813          {
1814              $sql = 'UPDATE ' . USERS_TABLE . '
1815                  SET user_lastvisit = ' . (int) $this->data['session_time'] . ',
1816                      user_last_active = ' . $this->time_now . '
1817                  WHERE user_id = ' . (int) $this->data['user_id'];
1818              $db->sql_query($sql);
1819          }
1820      }
1821  
1822      /**
1823       * Update user's last active time
1824       *
1825       * @return void
1826       */
1827  	public function update_last_active_time()
1828      {
1829          global $db;
1830  
1831          if (isset($this->time_now, $this->data['user_id']))
1832          {
1833              $sql = 'UPDATE ' . USERS_TABLE . '
1834                  SET user_last_active = ' . $this->time_now . '
1835                  WHERE user_id = ' . (int) $this->data['user_id'];
1836              $db->sql_query($sql);
1837          }
1838      }
1839  }


Generated: Mon Nov 25 19:05:08 2024 Cross-referenced by PHPXref 0.7.1