[ Index ] |
PHP Cross Reference of phpBB-3.3.14-deutsch |
[Summary view] [Print] [Text view]
1 <?php 2 /** 3 * 4 * This file is part of the phpBB Forum Software package. 5 * 6 * @copyright (c) phpBB Limited <https://www.phpbb.com> 7 * @license GNU General Public License, version 2 (GPL-2.0) 8 * 9 * For full copyright and license information, please see 10 * the docs/CREDITS.txt file. 11 * 12 */ 13 14 namespace phpbb; 15 16 /** 17 * Session class 18 */ 19 class session 20 { 21 var $cookie_data = array(); 22 var $page = array(); 23 var $data = array(); 24 var $browser = ''; 25 var $forwarded_for = ''; 26 var $host = ''; 27 var $session_id = ''; 28 var $ip = ''; 29 var $load = 0; 30 var $time_now = 0; 31 var $update_session_page = true; 32 33 /** 34 * Extract current session page 35 * 36 * @param string $root_path current root path (phpbb_root_path) 37 * @return array 38 */ 39 static function extract_current_page($root_path) 40 { 41 global $request, $symfony_request, $phpbb_filesystem; 42 43 $page_array = array(); 44 45 // First of all, get the request uri... 46 $script_name = $request->escape($symfony_request->getScriptName(), true); 47 $args = $request->escape(explode('&', $symfony_request->getQueryString()), true); 48 49 // If we are unable to get the script name we use REQUEST_URI as a failover and note it within the page array for easier support... 50 if (!$script_name) 51 { 52 $script_name = html_entity_decode($request->server('REQUEST_URI'), ENT_COMPAT); 53 $script_name = (($pos = strpos($script_name, '?')) !== false) ? substr($script_name, 0, $pos) : $script_name; 54 $page_array['failover'] = 1; 55 } 56 57 // Replace backslashes and doubled slashes (could happen on some proxy setups) 58 $script_name = str_replace(array('\\', '//'), '/', $script_name); 59 60 // Now, remove the sid and let us get a clean query string... 61 $use_args = array(); 62 63 // Since some browser do not encode correctly we need to do this with some "special" characters... 64 // " -> %22, ' => %27, < -> %3C, > -> %3E 65 $find = array('"', "'", '<', '>', '"', '<', '>'); 66 $replace = array('%22', '%27', '%3C', '%3E', '%22', '%3C', '%3E'); 67 68 foreach ($args as $key => $argument) 69 { 70 if (strpos($argument, 'sid=') === 0) 71 { 72 continue; 73 } 74 75 $use_args[] = str_replace($find, $replace, $argument); 76 } 77 unset($args); 78 79 // The following examples given are for an request uri of {path to the phpbb directory}/adm/index.php?i=10&b=2 80 81 // The current query string 82 $query_string = trim(implode('&', $use_args)); 83 84 // basenamed page name (for example: index.php) 85 $page_name = (substr($script_name, -1, 1) == '/') ? '' : basename($script_name); 86 $page_name = urlencode(htmlspecialchars($page_name, ENT_COMPAT)); 87 88 $symfony_request_path = $phpbb_filesystem->clean_path($symfony_request->getPathInfo()); 89 if ($symfony_request_path !== '/') 90 { 91 $page_name .= str_replace('%2F', '/', urlencode($symfony_request_path)); 92 } 93 94 if (substr($root_path, 0, 2) === './' && strpos($root_path, '..') === false) 95 { 96 $root_dirs = explode('/', str_replace('\\', '/', rtrim($root_path, '/'))); 97 $page_dirs = explode('/', str_replace('\\', '/', '.')); 98 } 99 else 100 { 101 // current directory within the phpBB root (for example: adm) 102 $root_dirs = explode('/', str_replace('\\', '/', $phpbb_filesystem->realpath($root_path))); 103 $page_dirs = explode('/', str_replace('\\', '/', $phpbb_filesystem->realpath('./'))); 104 } 105 106 $intersection = array_intersect_assoc($root_dirs, $page_dirs); 107 108 $root_dirs = array_diff_assoc($root_dirs, $intersection); 109 $page_dirs = array_diff_assoc($page_dirs, $intersection); 110 111 $page_dir = str_repeat('../', count($root_dirs)) . implode('/', $page_dirs); 112 113 if ($page_dir && substr($page_dir, -1, 1) == '/') 114 { 115 $page_dir = substr($page_dir, 0, -1); 116 } 117 118 // Current page from phpBB root (for example: adm/index.php?i=10&b=2) 119 $page = (($page_dir) ? $page_dir . '/' : '') . $page_name; 120 if ($query_string) 121 { 122 $page .= '?' . $query_string; 123 } 124 125 // The script path from the webroot to the current directory (for example: /phpBB3/adm/) : always prefixed with / and ends in / 126 $script_path = $symfony_request->getBasePath(); 127 128 // The script path from the webroot to the phpBB root (for example: /phpBB3/) 129 $script_dirs = explode('/', $script_path); 130 array_splice($script_dirs, -count($page_dirs)); 131 $root_script_path = implode('/', $script_dirs) . (count($root_dirs) ? '/' . implode('/', $root_dirs) : ''); 132 133 // We are on the base level (phpBB root == webroot), lets adjust the variables a bit... 134 if (!$root_script_path) 135 { 136 $root_script_path = ($page_dir) ? str_replace($page_dir, '', $script_path) : $script_path; 137 } 138 139 $script_path .= (substr($script_path, -1, 1) == '/') ? '' : '/'; 140 $root_script_path .= (substr($root_script_path, -1, 1) == '/') ? '' : '/'; 141 142 $forum_id = $request->variable('f', 0); 143 // maximum forum id value is maximum value of mediumint unsigned column 144 $forum_id = ($forum_id > 0 && $forum_id < 16777215) ? $forum_id : 0; 145 146 $page_array += array( 147 'page_name' => $page_name, 148 'page_dir' => $page_dir, 149 150 'query_string' => $query_string, 151 'script_path' => str_replace(' ', '%20', htmlspecialchars($script_path, ENT_COMPAT)), 152 'root_script_path' => str_replace(' ', '%20', htmlspecialchars($root_script_path, ENT_COMPAT)), 153 154 'page' => $page, 155 'forum' => $forum_id, 156 ); 157 158 return $page_array; 159 } 160 161 /** 162 * Get valid hostname/port. HTTP_HOST is used, SERVER_NAME if HTTP_HOST not present. 163 */ 164 function extract_current_hostname() 165 { 166 global $config, $request; 167 168 // Get hostname 169 $host = html_entity_decode($request->header('Host', $request->server('SERVER_NAME')), ENT_COMPAT); 170 171 // Should be a string and lowered 172 $host = (string) strtolower($host); 173 174 // If host is equal the cookie domain or the server name (if config is set), then we assume it is valid 175 if ((isset($config['cookie_domain']) && $host === $config['cookie_domain']) || (isset($config['server_name']) && $host === $config['server_name'])) 176 { 177 return $host; 178 } 179 180 // Is the host actually a IP? If so, we use the IP... (IPv4) 181 if (long2ip(ip2long($host)) === $host) 182 { 183 return $host; 184 } 185 186 // Now return the hostname (this also removes any port definition). The http:// is prepended to construct a valid URL, hosts never have a scheme assigned 187 $host = @parse_url('http://' . $host); 188 $host = (!empty($host['host'])) ? $host['host'] : ''; 189 190 // Remove any portions not removed by parse_url (#) 191 $host = str_replace('#', '', $host); 192 193 // If, by any means, the host is now empty, we will use a "best approach" way to guess one 194 if (empty($host)) 195 { 196 if (!empty($config['server_name'])) 197 { 198 $host = $config['server_name']; 199 } 200 else if (!empty($config['cookie_domain'])) 201 { 202 $host = (strpos($config['cookie_domain'], '.') === 0) ? substr($config['cookie_domain'], 1) : $config['cookie_domain']; 203 } 204 else 205 { 206 // Set to OS hostname or localhost 207 $host = (function_exists('php_uname')) ? php_uname('n') : 'localhost'; 208 } 209 } 210 211 // It may be still no valid host, but for sure only a hostname (we may further expand on the cookie domain... if set) 212 return $host; 213 } 214 215 /** 216 * Start session management 217 * 218 * This is where all session activity begins. We gather various pieces of 219 * information from the client and server. We test to see if a session already 220 * exists. If it does, fine and dandy. If it doesn't we'll go on to create a 221 * new one ... pretty logical heh? We also examine the system load (if we're 222 * running on a system which makes such information readily available) and 223 * halt if it's above an admin definable limit. 224 * 225 * @param bool $update_session_page if true the session page gets updated. 226 * This can be set to circumvent certain scripts to update the users last visited page. 227 */ 228 function session_begin($update_session_page = true) 229 { 230 global $phpEx, $SID, $_SID, $_EXTRA_URL, $db, $config, $phpbb_root_path; 231 global $request, $phpbb_container, $user, $phpbb_log, $phpbb_dispatcher; 232 233 // Give us some basic information 234 $this->time_now = time(); 235 $this->cookie_data = array('u' => 0, 'k' => ''); 236 $this->update_session_page = $update_session_page; 237 $this->browser = $request->header('User-Agent'); 238 $this->referer = $request->header('Referer'); 239 $this->forwarded_for = $request->header('X-Forwarded-For'); 240 241 $this->host = $this->extract_current_hostname(); 242 $this->page = $this->extract_current_page($phpbb_root_path); 243 244 // if the forwarded for header shall be checked we have to validate its contents 245 if ($config['forwarded_for_check']) 246 { 247 $this->forwarded_for = preg_replace('# {2,}#', ' ', str_replace(',', ' ', $this->forwarded_for)); 248 249 // split the list of IPs 250 $ips = explode(' ', $this->forwarded_for); 251 foreach ($ips as $ip) 252 { 253 if (!filter_var($ip, FILTER_VALIDATE_IP)) 254 { 255 // contains invalid data, don't use the forwarded for header 256 $this->forwarded_for = ''; 257 break; 258 } 259 } 260 } 261 else 262 { 263 $this->forwarded_for = ''; 264 } 265 266 if ($request->is_set($config['cookie_name'] . '_sid', \phpbb\request\request_interface::COOKIE) || $request->is_set($config['cookie_name'] . '_u', \phpbb\request\request_interface::COOKIE)) 267 { 268 $this->cookie_data['u'] = $request->variable($config['cookie_name'] . '_u', 0, false, \phpbb\request\request_interface::COOKIE); 269 $this->cookie_data['k'] = $request->variable($config['cookie_name'] . '_k', '', false, \phpbb\request\request_interface::COOKIE); 270 $this->session_id = $request->variable($config['cookie_name'] . '_sid', '', false, \phpbb\request\request_interface::COOKIE); 271 272 $SID = (defined('NEED_SID')) ? '?sid=' . $this->session_id : '?sid='; 273 $_SID = (defined('NEED_SID')) ? $this->session_id : ''; 274 275 if (empty($this->session_id)) 276 { 277 $this->session_id = $_SID = $request->variable('sid', ''); 278 $SID = '?sid=' . $this->session_id; 279 $this->cookie_data = array('u' => 0, 'k' => ''); 280 } 281 } 282 else 283 { 284 $this->session_id = $_SID = $request->variable('sid', ''); 285 $SID = '?sid=' . $this->session_id; 286 } 287 288 $_EXTRA_URL = array(); 289 290 // Why no forwarded_for et al? Well, too easily spoofed. With the results of my recent requests 291 // it's pretty clear that in the majority of cases you'll at least be left with a proxy/cache ip. 292 $ip = html_entity_decode($request->server('REMOTE_ADDR'), ENT_COMPAT); 293 $ip = preg_replace('# {2,}#', ' ', str_replace(',', ' ', $ip)); 294 295 /** 296 * Event to alter user IP address 297 * 298 * @event core.session_ip_after 299 * @var string ip REMOTE_ADDR 300 * @since 3.1.10-RC1 301 */ 302 $vars = array('ip'); 303 extract($phpbb_dispatcher->trigger_event('core.session_ip_after', compact($vars))); 304 305 // split the list of IPs 306 $ips = explode(' ', trim($ip)); 307 308 // Default IP if REMOTE_ADDR is invalid 309 $this->ip = '127.0.0.1'; 310 311 foreach ($ips as $ip) 312 { 313 // Normalise IP address 314 $ip = phpbb_ip_normalise($ip); 315 316 if ($ip === false) 317 { 318 // IP address is invalid. 319 break; 320 } 321 322 // IP address is valid. 323 $this->ip = $ip; 324 } 325 326 $this->load = false; 327 328 // Load limit check (if applicable) 329 if ($config['limit_load'] || $config['limit_search_load']) 330 { 331 if ((function_exists('sys_getloadavg') && $load = sys_getloadavg()) || ($load = explode(' ', @file_get_contents('/proc/loadavg')))) 332 { 333 $this->load = array_slice($load, 0, 1); 334 $this->load = floatval($this->load[0]); 335 } 336 else 337 { 338 $config->set('limit_load', '0'); 339 $config->set('limit_search_load', '0'); 340 } 341 } 342 343 // if no session id is set, redirect to index.php 344 $session_id = $request->variable('sid', ''); 345 if (defined('NEED_SID') && (empty($session_id) || $this->session_id !== $session_id)) 346 { 347 send_status_line(401, 'Unauthorized'); 348 redirect(append_sid("{$phpbb_root_path}index.$phpEx")); 349 } 350 351 // if session id is set 352 if (!empty($this->session_id)) 353 { 354 $sql = 'SELECT u.*, s.* 355 FROM ' . SESSIONS_TABLE . ' s, ' . USERS_TABLE . " u 356 WHERE s.session_id = '" . $db->sql_escape($this->session_id) . "' 357 AND u.user_id = s.session_user_id"; 358 $result = $db->sql_query($sql); 359 $this->data = $db->sql_fetchrow($result); 360 $db->sql_freeresult($result); 361 362 // Did the session exist in the DB? 363 if (isset($this->data['user_id'])) 364 { 365 // Validate IP length according to admin ... enforces an IP 366 // check on bots if admin requires this 367 // $quadcheck = ($config['ip_check_bot'] && $this->data['user_type'] & USER_BOT) ? 4 : $config['ip_check']; 368 369 if (strpos($this->ip, ':') !== false && strpos($this->data['session_ip'], ':') !== false) 370 { 371 $s_ip = short_ipv6($this->data['session_ip'], $config['ip_check']); 372 $u_ip = short_ipv6($this->ip, $config['ip_check']); 373 } 374 else 375 { 376 $s_ip = implode('.', array_slice(explode('.', $this->data['session_ip']), 0, $config['ip_check'])); 377 $u_ip = implode('.', array_slice(explode('.', $this->ip), 0, $config['ip_check'])); 378 } 379 380 $s_browser = ($config['browser_check']) ? trim(strtolower(substr($this->data['session_browser'], 0, 149))) : ''; 381 $u_browser = ($config['browser_check']) ? trim(strtolower(substr($this->browser, 0, 149))) : ''; 382 383 $s_forwarded_for = ($config['forwarded_for_check']) ? substr($this->data['session_forwarded_for'], 0, 254) : ''; 384 $u_forwarded_for = ($config['forwarded_for_check']) ? substr($this->forwarded_for, 0, 254) : ''; 385 386 // referer checks 387 // The @ before $config['referer_validation'] suppresses notices present while running the updater 388 $check_referer_path = (@$config['referer_validation'] == REFERER_VALIDATE_PATH); 389 $referer_valid = true; 390 391 // we assume HEAD and TRACE to be foul play and thus only whitelist GET 392 if (@$config['referer_validation'] && strtolower($request->server('REQUEST_METHOD')) !== 'get') 393 { 394 $referer_valid = $this->validate_referer($check_referer_path); 395 } 396 397 if ($u_ip === $s_ip && $s_browser === $u_browser && $s_forwarded_for === $u_forwarded_for && $referer_valid) 398 { 399 $session_expired = false; 400 401 // Check whether the session is still valid if we have one 402 /* @var $provider_collection \phpbb\auth\provider_collection */ 403 $provider_collection = $phpbb_container->get('auth.provider_collection'); 404 $provider = $provider_collection->get_provider(); 405 406 if (!($provider instanceof \phpbb\auth\provider\provider_interface)) 407 { 408 throw new \RuntimeException($provider . ' must implement \phpbb\auth\provider\provider_interface'); 409 } 410 411 $ret = $provider->validate_session($this->data); 412 if ($ret !== null && !$ret) 413 { 414 $session_expired = true; 415 } 416 417 if (!$session_expired) 418 { 419 // Check the session length timeframe if autologin is not enabled. 420 // Else check the autologin length... and also removing those having autologin enabled but no longer allowed board-wide. 421 if (!$this->data['session_autologin']) 422 { 423 if ($this->data['session_time'] < $this->time_now - ((int) $config['session_length'] + 60)) 424 { 425 $session_expired = true; 426 } 427 } 428 else if (!$config['allow_autologin'] || ($config['max_autologin_time'] && $this->data['session_time'] < $this->time_now - (86400 * (int) $config['max_autologin_time']) + 60)) 429 { 430 $session_expired = true; 431 } 432 } 433 434 if (!$session_expired) 435 { 436 $this->data['is_registered'] = ($this->data['user_id'] != ANONYMOUS && ($this->data['user_type'] == USER_NORMAL || $this->data['user_type'] == USER_FOUNDER)) ? true : false; 437 $this->data['is_bot'] = (!$this->data['is_registered'] && $this->data['user_id'] != ANONYMOUS) ? true : false; 438 $this->data['user_lang'] = basename($this->data['user_lang']); 439 440 // Is user banned? Are they excluded? Won't return on ban, exists within method 441 $this->check_ban_for_current_session($config); 442 443 // Update user last active time accordingly, but in a minute or so 444 if ($this->time_now - (int) $this->data['user_last_active'] > 60) 445 { 446 $this->update_last_active_time(); 447 } 448 449 return true; 450 } 451 } 452 else 453 { 454 // Added logging temporarily to help debug bugs... 455 if ($phpbb_container->getParameter('session.log_errors') && $this->data['user_id'] != ANONYMOUS) 456 { 457 if ($referer_valid) 458 { 459 $phpbb_log->add('critical', $user->data['user_id'], $user->ip, 'LOG_IP_BROWSER_FORWARDED_CHECK', false, array( 460 $u_ip, 461 $s_ip, 462 $u_browser, 463 $s_browser, 464 htmlspecialchars($u_forwarded_for, ENT_COMPAT), 465 htmlspecialchars($s_forwarded_for, ENT_COMPAT) 466 )); 467 } 468 else 469 { 470 $phpbb_log->add('critical', $user->data['user_id'], $user->ip, 'LOG_REFERER_INVALID', false, array($this->referer)); 471 } 472 } 473 } 474 } 475 } 476 477 // If we reach here then no (valid) session exists. So we'll create a new one 478 return $this->session_create(); 479 } 480 481 /** 482 * Create a new session 483 * 484 * If upon trying to start a session we discover there is nothing existing we 485 * jump here. Additionally this method is called directly during login to regenerate 486 * the session for the specific user. In this method we carry out a number of tasks; 487 * garbage collection, (search)bot checking, banned user comparison. Basically 488 * though this method will result in a new session for a specific user. 489 */ 490 function session_create($user_id = false, $set_admin = false, $persist_login = false, $viewonline = true) 491 { 492 global $SID, $_SID, $db, $config, $cache, $phpbb_container, $phpbb_dispatcher; 493 494 $this->data = array(); 495 496 /* Garbage collection ... remove old sessions updating user information 497 // if necessary. It means (potentially) 11 queries but only infrequently 498 if ($this->time_now > $config['session_last_gc'] + $config['session_gc']) 499 { 500 $this->session_gc(); 501 }*/ 502 503 // Do we allow autologin on this board? No? Then override anything 504 // that may be requested here 505 if (!$config['allow_autologin']) 506 { 507 $this->cookie_data['k'] = $persist_login = false; 508 } 509 510 /** 511 * Here we do a bot check, oh er saucy! No, not that kind of bot 512 * check. We loop through the list of bots defined by the admin and 513 * see if we have any useragent and/or IP matches. If we do, this is a 514 * bot, act accordingly 515 */ 516 $bot = false; 517 $active_bots = $cache->obtain_bots(); 518 519 foreach ($active_bots as $row) 520 { 521 if ($row['bot_agent'] && preg_match('#' . str_replace('\*', '.*?', preg_quote($row['bot_agent'], '#')) . '#i', $this->browser)) 522 { 523 $bot = $row['user_id']; 524 } 525 526 // If ip is supplied, we will make sure the ip is matching too... 527 if ($row['bot_ip'] && ($bot || !$row['bot_agent'])) 528 { 529 // Set bot to false, then we only have to set it to true if it is matching 530 $bot = false; 531 532 foreach (explode(',', $row['bot_ip']) as $bot_ip) 533 { 534 $bot_ip = trim($bot_ip); 535 536 if (!$bot_ip) 537 { 538 continue; 539 } 540 541 if (strpos($this->ip, $bot_ip) === 0) 542 { 543 $bot = (int) $row['user_id']; 544 break; 545 } 546 } 547 } 548 549 if ($bot) 550 { 551 break; 552 } 553 } 554 555 /* @var $provider_collection \phpbb\auth\provider_collection */ 556 $provider_collection = $phpbb_container->get('auth.provider_collection'); 557 $provider = $provider_collection->get_provider(); 558 $this->data = $provider->autologin(); 559 560 if ($user_id !== false && isset($this->data['user_id']) && $this->data['user_id'] != $user_id) 561 { 562 $this->data = array(); 563 } 564 565 if (isset($this->data['user_id'])) 566 { 567 $this->cookie_data['k'] = ''; 568 $this->cookie_data['u'] = $this->data['user_id']; 569 } 570 571 // If we're presented with an autologin key we'll join against it. 572 // Else if we've been passed a user_id we'll grab data based on that 573 if (isset($this->cookie_data['k']) && $this->cookie_data['k'] && $this->cookie_data['u'] && empty($this->data)) 574 { 575 $sql = 'SELECT u.* 576 FROM ' . USERS_TABLE . ' u, ' . SESSIONS_KEYS_TABLE . ' k 577 WHERE u.user_id = ' . (int) $this->cookie_data['u'] . ' 578 AND u.user_type IN (' . USER_NORMAL . ', ' . USER_FOUNDER . ") 579 AND k.user_id = u.user_id 580 AND k.key_id = '" . $db->sql_escape(md5($this->cookie_data['k'])) . "'"; 581 $result = $db->sql_query($sql); 582 $user_data = $db->sql_fetchrow($result); 583 584 if ($user_id === false || (isset($user_data['user_id']) && $user_id == $user_data['user_id'])) 585 { 586 $this->data = $user_data; 587 $bot = false; 588 } 589 590 $db->sql_freeresult($result); 591 } 592 593 if ($user_id !== false && empty($this->data)) 594 { 595 $this->cookie_data['k'] = ''; 596 $this->cookie_data['u'] = $user_id; 597 598 $sql = 'SELECT * 599 FROM ' . USERS_TABLE . ' 600 WHERE user_id = ' . (int) $this->cookie_data['u'] . ' 601 AND user_type IN (' . USER_NORMAL . ', ' . USER_FOUNDER . ')'; 602 $result = $db->sql_query($sql); 603 $this->data = $db->sql_fetchrow($result); 604 $db->sql_freeresult($result); 605 $bot = false; 606 } 607 608 // Bot user, if they have a SID in the Request URI we need to get rid of it 609 // otherwise they'll index this page with the SID, duplicate content oh my! 610 if ($bot && isset($_GET['sid'])) 611 { 612 send_status_line(301, 'Moved Permanently'); 613 redirect(build_url(array('sid'))); 614 } 615 616 // If no data was returned one or more of the following occurred: 617 // Key didn't match one in the DB 618 // User does not exist 619 // User is inactive 620 // User is bot 621 if (!is_array($this->data) || !count($this->data)) 622 { 623 $this->cookie_data['k'] = ''; 624 $this->cookie_data['u'] = ($bot) ? $bot : ANONYMOUS; 625 626 if (!$bot) 627 { 628 $sql = 'SELECT * 629 FROM ' . USERS_TABLE . ' 630 WHERE user_id = ' . (int) $this->cookie_data['u']; 631 } 632 else 633 { 634 // We give bots always the same session if it is not yet expired. 635 $sql = 'SELECT u.*, s.* 636 FROM ' . USERS_TABLE . ' u 637 LEFT JOIN ' . SESSIONS_TABLE . ' s ON (s.session_user_id = u.user_id) 638 WHERE u.user_id = ' . (int) $bot; 639 } 640 641 $result = $db->sql_query($sql); 642 $this->data = $db->sql_fetchrow($result); 643 $db->sql_freeresult($result); 644 } 645 646 if ($this->data['user_id'] != ANONYMOUS && !$bot) 647 { 648 $this->data['session_last_visit'] = (isset($this->data['session_time']) && $this->data['session_time']) ? $this->data['session_time'] : (($this->data['user_lastvisit']) ? $this->data['user_lastvisit'] : time()); 649 } 650 else 651 { 652 $this->data['session_last_visit'] = $this->time_now; 653 } 654 655 // Force user id to be integer... 656 $this->data['user_id'] = (int) $this->data['user_id']; 657 658 // At this stage we should have a filled data array, defined cookie u and k data. 659 // data array should contain recent session info if we're a real user and a recent 660 // session exists in which case session_id will also be set 661 662 // Is user banned? Are they excluded? Won't return on ban, exists within method 663 $this->check_ban_for_current_session($config); 664 665 $this->data['is_registered'] = (!$bot && $this->data['user_id'] != ANONYMOUS && ($this->data['user_type'] == USER_NORMAL || $this->data['user_type'] == USER_FOUNDER)) ? true : false; 666 $this->data['is_bot'] = ($bot) ? true : false; 667 668 // If our friend is a bot, we re-assign a previously assigned session 669 if ($this->data['is_bot'] && $bot == $this->data['user_id'] && $this->data['session_id']) 670 { 671 // Only assign the current session if the ip, browser and forwarded_for match... 672 if (strpos($this->ip, ':') !== false && strpos($this->data['session_ip'], ':') !== false) 673 { 674 $s_ip = short_ipv6($this->data['session_ip'], $config['ip_check']); 675 $u_ip = short_ipv6($this->ip, $config['ip_check']); 676 } 677 else 678 { 679 $s_ip = implode('.', array_slice(explode('.', $this->data['session_ip']), 0, $config['ip_check'])); 680 $u_ip = implode('.', array_slice(explode('.', $this->ip), 0, $config['ip_check'])); 681 } 682 683 $s_browser = ($config['browser_check']) ? trim(strtolower(substr($this->data['session_browser'], 0, 149))) : ''; 684 $u_browser = ($config['browser_check']) ? trim(strtolower(substr($this->browser, 0, 149))) : ''; 685 686 $s_forwarded_for = ($config['forwarded_for_check']) ? substr($this->data['session_forwarded_for'], 0, 254) : ''; 687 $u_forwarded_for = ($config['forwarded_for_check']) ? substr($this->forwarded_for, 0, 254) : ''; 688 689 if ($u_ip === $s_ip && $s_browser === $u_browser && $s_forwarded_for === $u_forwarded_for) 690 { 691 $this->session_id = $this->data['session_id']; 692 693 // Only update session DB a minute or so after last update or if page changes 694 if ($this->time_now - $this->data['session_time'] > 60 || ($this->update_session_page && $this->data['session_page'] != $this->page['page'])) 695 { 696 // Update the last visit time 697 $this->update_user_lastvisit(); 698 } 699 700 $SID = '?sid='; 701 $_SID = ''; 702 return true; 703 } 704 else 705 { 706 // If the ip and browser does not match make sure we only have one bot assigned to one session 707 $db->sql_query('DELETE FROM ' . SESSIONS_TABLE . ' WHERE session_user_id = ' . $this->data['user_id']); 708 } 709 } 710 711 $session_autologin = (($this->cookie_data['k'] || $persist_login) && $this->data['is_registered']) ? true : false; 712 $set_admin = ($set_admin && $this->data['is_registered']) ? true : false; 713 714 // Create or update the session 715 $sql_ary = array( 716 'session_user_id' => (int) $this->data['user_id'], 717 'session_start' => (int) $this->time_now, 718 'session_last_visit' => (int) $this->data['session_last_visit'], 719 'session_time' => (int) $this->time_now, 720 'session_browser' => (string) trim(substr($this->browser, 0, 149)), 721 'session_forwarded_for' => (string) $this->forwarded_for, 722 'session_ip' => (string) $this->ip, 723 'session_autologin' => ($session_autologin) ? 1 : 0, 724 'session_admin' => ($set_admin) ? 1 : 0, 725 'session_viewonline' => ($viewonline) ? 1 : 0, 726 ); 727 728 if ($this->update_session_page) 729 { 730 $sql_ary['session_page'] = (string) substr($this->page['page'], 0, 199); 731 $sql_ary['session_forum_id'] = $this->page['forum']; 732 } 733 734 $db->sql_return_on_error(true); 735 736 $sql = 'DELETE 737 FROM ' . SESSIONS_TABLE . ' 738 WHERE session_id = \'' . $db->sql_escape($this->session_id) . '\' 739 AND session_user_id = ' . ANONYMOUS; 740 741 if (!defined('IN_ERROR_HANDLER') && (!$this->session_id || !$db->sql_query($sql) || !$db->sql_affectedrows())) 742 { 743 // Limit new sessions in 1 minute period (if required) 744 if (empty($this->data['session_time']) && $config['active_sessions']) 745 { 746 // $db->sql_return_on_error(false); 747 748 $sql = 'SELECT COUNT(session_id) AS sessions 749 FROM ' . SESSIONS_TABLE . ' 750 WHERE session_time >= ' . ($this->time_now - 60); 751 $result = $db->sql_query($sql); 752 $row = $db->sql_fetchrow($result); 753 $db->sql_freeresult($result); 754 755 if ((int) $row['sessions'] > (int) $config['active_sessions']) 756 { 757 send_status_line(503, 'Service Unavailable'); 758 trigger_error('BOARD_UNAVAILABLE'); 759 } 760 } 761 } 762 763 // Since we re-create the session id here, the inserted row must be unique. Therefore, we display potential errors. 764 // Commented out because it will not allow forums to update correctly 765 // $db->sql_return_on_error(false); 766 767 // Something quite important: session_page always holds the *last* page visited, except for the *first* visit. 768 // We are not able to simply have an empty session_page btw, therefore we need to tell phpBB how to detect this special case. 769 // If the session id is empty, we have a completely new one and will set an "identifier" here. This identifier is able to be checked later. 770 if (empty($this->data['session_id'])) 771 { 772 // This is a temporary variable, only set for the very first visit 773 $this->data['session_created'] = true; 774 } 775 776 $this->session_id = $this->data['session_id'] = md5(unique_id()); 777 778 $sql_ary['session_id'] = (string) $this->session_id; 779 $sql_ary['session_page'] = (string) substr($this->page['page'], 0, 199); 780 $sql_ary['session_forum_id'] = $this->page['forum']; 781 782 $sql = 'INSERT INTO ' . SESSIONS_TABLE . ' ' . $db->sql_build_array('INSERT', $sql_ary); 783 $db->sql_query($sql); 784 785 $db->sql_return_on_error(false); 786 787 // Regenerate autologin/persistent login key 788 if ($session_autologin) 789 { 790 $this->set_login_key(); 791 } 792 793 // refresh data 794 $SID = '?sid=' . $this->session_id; 795 $_SID = $this->session_id; 796 $this->data = array_merge($this->data, $sql_ary); 797 798 if (!$bot) 799 { 800 $cookie_expire = $this->time_now + (($config['max_autologin_time']) ? 86400 * (int) $config['max_autologin_time'] : 31536000); 801 802 $this->set_cookie('u', $this->cookie_data['u'], $cookie_expire); 803 $this->set_cookie('k', $this->cookie_data['k'], $cookie_expire); 804 $this->set_cookie('sid', $this->session_id, $cookie_expire); 805 806 unset($cookie_expire); 807 808 $sql = 'SELECT COUNT(session_id) AS sessions 809 FROM ' . SESSIONS_TABLE . ' 810 WHERE session_user_id = ' . (int) $this->data['user_id'] . ' 811 AND session_time >= ' . (int) ($this->time_now - (max((int) $config['session_length'], (int) $config['form_token_lifetime']))); 812 $result = $db->sql_query($sql); 813 $row = $db->sql_fetchrow($result); 814 $db->sql_freeresult($result); 815 816 if ((int) $row['sessions'] <= 1 || empty($this->data['user_form_salt'])) 817 { 818 $this->data['user_form_salt'] = unique_id(); 819 // Update the form key 820 $sql = 'UPDATE ' . USERS_TABLE . ' 821 SET user_form_salt = \'' . $db->sql_escape($this->data['user_form_salt']) . '\', 822 user_last_active = ' . (int) $this->time_now . ' 823 WHERE user_id = ' . (int) $this->data['user_id']; 824 $db->sql_query($sql); 825 } 826 else 827 { 828 $this->update_last_active_time(); 829 } 830 } 831 else 832 { 833 $this->data['session_time'] = $this->data['session_last_visit'] = $this->time_now; 834 835 $this->update_user_lastvisit(); 836 837 $SID = '?sid='; 838 $_SID = ''; 839 } 840 841 $session_data = $sql_ary; 842 /** 843 * Event to send new session data to extension 844 * Read-only event 845 * 846 * @event core.session_create_after 847 * @var array session_data Associative array of session keys to be updated 848 * @since 3.1.6-RC1 849 */ 850 $vars = array('session_data'); 851 extract($phpbb_dispatcher->trigger_event('core.session_create_after', compact($vars))); 852 unset($session_data); 853 854 return true; 855 } 856 857 /** 858 * Kills a session 859 * 860 * This method does what it says on the tin. It will delete a pre-existing session. 861 * It resets cookie information (destroying any autologin key within that cookie data) 862 * and update the users information from the relevant session data. It will then 863 * grab guest user information. 864 */ 865 function session_kill($new_session = true) 866 { 867 global $SID, $_SID, $db, $phpbb_container, $phpbb_dispatcher; 868 869 $sql = 'DELETE FROM ' . SESSIONS_TABLE . " 870 WHERE session_id = '" . $db->sql_escape($this->session_id) . "' 871 AND session_user_id = " . (int) $this->data['user_id']; 872 $db->sql_query($sql); 873 874 $user_id = (int) $this->data['user_id']; 875 $session_id = $this->session_id; 876 /** 877 * Event to send session kill information to extension 878 * Read-only event 879 * 880 * @event core.session_kill_after 881 * @var int user_id user_id of the session user. 882 * @var string session_id current user's session_id 883 * @var bool new_session should we create new session for user 884 * @since 3.1.6-RC1 885 */ 886 $vars = array('user_id', 'session_id', 'new_session'); 887 extract($phpbb_dispatcher->trigger_event('core.session_kill_after', compact($vars))); 888 unset($user_id); 889 unset($session_id); 890 891 // Allow connecting logout with external auth method logout 892 /* @var $provider_collection \phpbb\auth\provider_collection */ 893 $provider_collection = $phpbb_container->get('auth.provider_collection'); 894 $provider = $provider_collection->get_provider(); 895 $provider->logout($this->data, $new_session); 896 897 if ($this->data['user_id'] != ANONYMOUS) 898 { 899 // Delete existing session, update last visit info first! 900 if (!isset($this->data['session_time'])) 901 { 902 $this->data['session_time'] = time(); 903 } 904 905 $sql = 'UPDATE ' . USERS_TABLE . ' 906 SET user_lastvisit = ' . (int) $this->data['session_time'] . ' 907 WHERE user_id = ' . (int) $this->data['user_id']; 908 $db->sql_query($sql); 909 910 if ($this->cookie_data['k']) 911 { 912 $sql = 'DELETE FROM ' . SESSIONS_KEYS_TABLE . ' 913 WHERE user_id = ' . (int) $this->data['user_id'] . " 914 AND key_id = '" . $db->sql_escape(md5($this->cookie_data['k'])) . "'"; 915 $db->sql_query($sql); 916 } 917 918 // Reset the data array 919 $this->data = array(); 920 921 $sql = 'SELECT * 922 FROM ' . USERS_TABLE . ' 923 WHERE user_id = ' . ANONYMOUS; 924 $result = $db->sql_query($sql); 925 $this->data = $db->sql_fetchrow($result); 926 $db->sql_freeresult($result); 927 } 928 929 $cookie_expire = $this->time_now - 31536000; 930 $this->set_cookie('u', '', $cookie_expire); 931 $this->set_cookie('k', '', $cookie_expire); 932 $this->set_cookie('sid', '', $cookie_expire); 933 unset($cookie_expire); 934 935 $SID = '?sid='; 936 $this->session_id = $_SID = ''; 937 938 // To make sure a valid session is created we create one for the anonymous user 939 if ($new_session) 940 { 941 $this->session_create(ANONYMOUS); 942 } 943 944 return true; 945 } 946 947 /** 948 * Session garbage collection 949 * 950 * This looks a lot more complex than it really is. Effectively we are 951 * deleting any sessions older than an admin definable limit. Due to the 952 * way in which we maintain session data we have to ensure we update user 953 * data before those sessions are destroyed. In addition this method 954 * removes autologin key information that is older than an admin defined 955 * limit. 956 */ 957 function session_gc() 958 { 959 global $db, $config, $phpbb_container, $phpbb_dispatcher; 960 961 if (!$this->time_now) 962 { 963 $this->time_now = time(); 964 } 965 966 /** 967 * Get expired sessions for registered users, only most recent for each user 968 * Inner SELECT gets most recent expired sessions for unique session_user_id 969 * Outer SELECT gets data for them 970 */ 971 $sql_select = 'SELECT s1.session_page, s1.session_user_id, s1.session_time AS recent_time 972 FROM ' . SESSIONS_TABLE . ' AS s1 973 INNER JOIN ( 974 SELECT session_user_id, MAX(session_time) AS recent_time 975 FROM ' . SESSIONS_TABLE . ' 976 WHERE session_time < ' . ($this->time_now - (int) $config['session_length']) . ' 977 AND session_user_id <> ' . ANONYMOUS . ' 978 GROUP BY session_user_id 979 ) AS s2 980 ON s1.session_user_id = s2.session_user_id 981 AND s1.session_time = s2.recent_time'; 982 983 switch ($db->get_sql_layer()) 984 { 985 case 'sqlite3': 986 if (phpbb_version_compare($db->sql_server_info(true), '3.8.3', '>=')) 987 { 988 // For SQLite versions 3.8.3+ which support Common Table Expressions (CTE) 989 $sql = "WITH s3 (session_page, session_user_id, session_time) AS ($sql_select) 990 UPDATE " . USERS_TABLE . ' 991 SET (user_lastpage, user_lastvisit) = (SELECT session_page, session_time FROM s3 WHERE session_user_id = user_id) 992 WHERE EXISTS (SELECT session_user_id FROM s3 WHERE session_user_id = user_id)'; 993 $db->sql_query($sql); 994 995 break; 996 } 997 998 // No break, for SQLite versions prior to 3.8.3 and Oracle 999 case 'oracle': 1000 $result = $db->sql_query($sql_select); 1001 while ($row = $db->sql_fetchrow($result)) 1002 { 1003 $sql = 'UPDATE ' . USERS_TABLE . ' 1004 SET user_lastvisit = ' . (int) $row['recent_time'] . ", user_lastpage = '" . $db->sql_escape($row['session_page']) . "' 1005 WHERE user_id = " . (int) $row['session_user_id']; 1006 $db->sql_query($sql); 1007 } 1008 $db->sql_freeresult($result); 1009 break; 1010 1011 case 'mysqli': 1012 $sql = 'UPDATE ' . USERS_TABLE . " u, 1013 ($sql_select) s3 1014 SET u.user_lastvisit = s3.recent_time, u.user_lastpage = s3.session_page 1015 WHERE u.user_id = s3.session_user_id"; 1016 $db->sql_query($sql); 1017 break; 1018 1019 default: 1020 $sql = 'UPDATE ' . USERS_TABLE . " 1021 SET user_lastvisit = s3.recent_time, user_lastpage = s3.session_page 1022 FROM ($sql_select) s3 1023 WHERE user_id = s3.session_user_id"; 1024 $db->sql_query($sql); 1025 break; 1026 } 1027 1028 // Delete all expired sessions 1029 $sql = 'DELETE FROM ' . SESSIONS_TABLE . ' 1030 WHERE session_time < ' . ($this->time_now - (int) $config['session_length']); 1031 $db->sql_query($sql); 1032 1033 // Update gc timer 1034 $config->set('session_last_gc', $this->time_now, false); 1035 1036 if ($config['max_autologin_time']) 1037 { 1038 $sql = 'DELETE FROM ' . SESSIONS_KEYS_TABLE . ' 1039 WHERE last_login < ' . (time() - (86400 * (int) $config['max_autologin_time'])); 1040 $db->sql_query($sql); 1041 } 1042 1043 // only called from CRON; should be a safe workaround until the infrastructure gets going 1044 /* @var \phpbb\captcha\factory $captcha_factory */ 1045 $captcha_factory = $phpbb_container->get('captcha.factory'); 1046 $captcha_factory->garbage_collect($config['captcha_plugin']); 1047 1048 $sql = 'DELETE FROM ' . LOGIN_ATTEMPT_TABLE . ' 1049 WHERE attempt_time < ' . (time() - (int) $config['ip_login_limit_time']); 1050 $db->sql_query($sql); 1051 1052 /** 1053 * Event to trigger extension on session_gc 1054 * 1055 * @event core.session_gc_after 1056 * @since 3.1.6-RC1 1057 */ 1058 $phpbb_dispatcher->dispatch('core.session_gc_after'); 1059 1060 return; 1061 } 1062 1063 /** 1064 * Sets a cookie 1065 * 1066 * Sets a cookie of the given name with the specified data for the given length of time. If no time is specified, a session cookie will be set. 1067 * 1068 * @param string $name Name of the cookie, will be automatically prefixed with the phpBB cookie name. track becomes [cookie_name]_track then. 1069 * @param string $cookiedata The data to hold within the cookie 1070 * @param int $cookietime The expiration time as UNIX timestamp. If 0 is provided, a session cookie is set. 1071 * @param bool $httponly Use HttpOnly. Defaults to true. Use false to make cookie accessible by client-side scripts. 1072 */ 1073 function set_cookie($name, $cookiedata, $cookietime, $httponly = true) 1074 { 1075 global $config, $phpbb_dispatcher; 1076 1077 // If headers are already set, we just return 1078 if (headers_sent()) 1079 { 1080 return; 1081 } 1082 1083 $disable_cookie = false; 1084 /** 1085 * Event to modify or disable setting cookies 1086 * 1087 * @event core.set_cookie 1088 * @var bool disable_cookie Set to true to disable setting this cookie 1089 * @var string name Name of the cookie 1090 * @var string cookiedata The data to hold within the cookie 1091 * @var int cookietime The expiration time as UNIX timestamp 1092 * @var bool httponly Use HttpOnly? 1093 * @since 3.2.9-RC1 1094 */ 1095 $vars = array( 1096 'disable_cookie', 1097 'name', 1098 'cookiedata', 1099 'cookietime', 1100 'httponly', 1101 ); 1102 extract($phpbb_dispatcher->trigger_event('core.set_cookie', compact($vars))); 1103 1104 if ($disable_cookie) 1105 { 1106 return; 1107 } 1108 1109 $name_data = rawurlencode($config['cookie_name'] . '_' . $name) . '=' . rawurlencode($cookiedata); 1110 $expire = gmdate('D, d-M-Y H:i:s \\G\\M\\T', $cookietime); 1111 $domain = (!$config['cookie_domain'] || $config['cookie_domain'] == '127.0.0.1' || strpos($config['cookie_domain'], '.') === false) ? '' : '; domain=' . $config['cookie_domain']; 1112 1113 header('Set-Cookie: ' . $name_data . (($cookietime) ? '; expires=' . $expire : '') . '; path=' . $config['cookie_path'] . $domain . ((!$config['cookie_secure']) ? '' : '; secure') . ';' . (($httponly) ? ' HttpOnly' : ''), false); 1114 } 1115 1116 /** 1117 * Check for banned user 1118 * 1119 * Checks whether the supplied user is banned by id, ip or email. If no parameters 1120 * are passed to the method pre-existing session data is used. 1121 * 1122 * @param int|false $user_id The user id 1123 * @param mixed $user_ips Can contain a string with one IP or an array of multiple IPs 1124 * @param string|false $user_email The user email 1125 * @param bool $return If $return is false this routine does not return on finding a banned user, 1126 * it outputs a relevant message and stops execution. 1127 */ 1128 function check_ban($user_id = false, $user_ips = false, $user_email = false, $return = false) 1129 { 1130 global $config, $db, $phpbb_dispatcher; 1131 1132 if (defined('IN_CHECK_BAN') || defined('SKIP_CHECK_BAN')) 1133 { 1134 return; 1135 } 1136 1137 $banned = false; 1138 $cache_ttl = 3600; 1139 $where_sql = array(); 1140 1141 $sql = 'SELECT ban_ip, ban_userid, ban_email, ban_exclude, ban_give_reason, ban_end 1142 FROM ' . BANLIST_TABLE . ' 1143 WHERE '; 1144 1145 // Determine which entries to check, only return those 1146 if ($user_email === false) 1147 { 1148 $where_sql[] = "ban_email = ''"; 1149 } 1150 1151 if ($user_ips === false) 1152 { 1153 $where_sql[] = "(ban_ip = '' OR ban_exclude = 1)"; 1154 } 1155 1156 if ($user_id === false) 1157 { 1158 $where_sql[] = '(ban_userid = 0 OR ban_exclude = 1)'; 1159 } 1160 else 1161 { 1162 $cache_ttl = ($user_id == ANONYMOUS) ? 3600 : 0; 1163 $_sql = '(ban_userid = ' . $user_id; 1164 1165 if ($user_email !== false) 1166 { 1167 $_sql .= " OR ban_email <> ''"; 1168 } 1169 1170 if ($user_ips !== false) 1171 { 1172 $_sql .= " OR ban_ip <> ''"; 1173 } 1174 1175 $_sql .= ')'; 1176 1177 $where_sql[] = $_sql; 1178 } 1179 1180 $sql .= (count($where_sql)) ? implode(' AND ', $where_sql) : ''; 1181 $result = $db->sql_query($sql, $cache_ttl); 1182 1183 $ban_triggered_by = 'user'; 1184 while ($row = $db->sql_fetchrow($result)) 1185 { 1186 if ($row['ban_end'] && $row['ban_end'] < time()) 1187 { 1188 continue; 1189 } 1190 1191 $ip_banned = false; 1192 if (!empty($row['ban_ip'])) 1193 { 1194 if (!is_array($user_ips)) 1195 { 1196 $ip_banned = preg_match('#^' . str_replace('\*', '.*?', preg_quote($row['ban_ip'], '#')) . '$#i', $user_ips); 1197 } 1198 else 1199 { 1200 foreach ($user_ips as $user_ip) 1201 { 1202 if (preg_match('#^' . str_replace('\*', '.*?', preg_quote($row['ban_ip'], '#')) . '$#i', $user_ip)) 1203 { 1204 $ip_banned = true; 1205 break; 1206 } 1207 } 1208 } 1209 } 1210 1211 if ((!empty($row['ban_userid']) && intval($row['ban_userid']) == $user_id) || 1212 $ip_banned || 1213 (!empty($row['ban_email']) && preg_match('#^' . str_replace('\*', '.*?', preg_quote($row['ban_email'], '#')) . '$#i', $user_email))) 1214 { 1215 if (!empty($row['ban_exclude'])) 1216 { 1217 $banned = false; 1218 break; 1219 } 1220 else 1221 { 1222 $banned = true; 1223 $ban_row = $row; 1224 1225 if (!empty($row['ban_userid']) && intval($row['ban_userid']) == $user_id) 1226 { 1227 $ban_triggered_by = 'user'; 1228 } 1229 else if ($ip_banned) 1230 { 1231 $ban_triggered_by = 'ip'; 1232 } 1233 else 1234 { 1235 $ban_triggered_by = 'email'; 1236 } 1237 1238 // Don't break. Check if there is an exclude rule for this user 1239 } 1240 } 1241 } 1242 $db->sql_freeresult($result); 1243 1244 /** 1245 * Event to set custom ban type 1246 * 1247 * @event core.session_set_custom_ban 1248 * @var bool return If $return is false this routine does not return on finding a banned user, it outputs a relevant message and stops execution 1249 * @var bool banned Check if user already banned 1250 * @var array|false ban_row Ban data 1251 * @var string ban_triggered_by Method that caused ban, can be your custom method 1252 * @since 3.1.3-RC1 1253 */ 1254 $ban_row = isset($ban_row) ? $ban_row : false; 1255 $vars = array('return', 'banned', 'ban_row', 'ban_triggered_by'); 1256 extract($phpbb_dispatcher->trigger_event('core.session_set_custom_ban', compact($vars))); 1257 1258 if ($banned && !$return) 1259 { 1260 global $phpbb_root_path, $phpEx; 1261 1262 // If the session is empty we need to create a valid one... 1263 if (empty($this->session_id)) 1264 { 1265 // This seems to be no longer needed? - #14971 1266 // $this->session_create(ANONYMOUS); 1267 } 1268 1269 // Initiate environment ... since it won't be set at this stage 1270 $this->setup(); 1271 1272 // Logout the user, banned users are unable to use the normal 'logout' link 1273 if ($this->data['user_id'] != ANONYMOUS) 1274 { 1275 $this->session_kill(); 1276 } 1277 1278 // We show a login box here to allow founders accessing the board if banned by IP 1279 if (defined('IN_LOGIN') && $this->data['user_id'] == ANONYMOUS) 1280 { 1281 $this->setup('ucp'); 1282 $this->data['is_registered'] = $this->data['is_bot'] = false; 1283 1284 // Set as a precaution to allow login_box() handling this case correctly as well as this function not being executed again. 1285 define('IN_CHECK_BAN', 1); 1286 1287 login_box("index.$phpEx"); 1288 1289 // The false here is needed, else the user is able to circumvent the ban. 1290 $this->session_kill(false); 1291 } 1292 1293 // Ok, we catch the case of an empty session id for the anonymous user... 1294 // This can happen if the user is logging in, banned by username and the login_box() being called "again". 1295 if (empty($this->session_id) && defined('IN_CHECK_BAN')) 1296 { 1297 $this->session_create(ANONYMOUS); 1298 } 1299 1300 // Determine which message to output 1301 $till_date = ($ban_row['ban_end']) ? $this->format_date($ban_row['ban_end']) : ''; 1302 $message = ($ban_row['ban_end']) ? 'BOARD_BAN_TIME' : 'BOARD_BAN_PERM'; 1303 1304 $contact_link = phpbb_get_board_contact_link($config, $phpbb_root_path, $phpEx); 1305 $message = sprintf($this->lang[$message], $till_date, '<a href="' . $contact_link . '">', '</a>'); 1306 $message .= ($ban_row['ban_give_reason']) ? '<br /><br />' . sprintf($this->lang['BOARD_BAN_REASON'], $ban_row['ban_give_reason']) : ''; 1307 $message .= '<br /><br /><em>' . $this->lang['BAN_TRIGGERED_BY_' . strtoupper($ban_triggered_by)] . '</em>'; 1308 1309 // A very special case... we are within the cron script which is not supposed to print out the ban message... show blank page 1310 if (defined('IN_CRON')) 1311 { 1312 garbage_collection(); 1313 exit_handler(); 1314 exit; 1315 } 1316 1317 // To circumvent session_begin returning a valid value and the check_ban() not called on second page view, we kill the session again 1318 $this->session_kill(false); 1319 1320 trigger_error($message); 1321 } 1322 1323 if (!empty($ban_row)) 1324 { 1325 $ban_row['ban_triggered_by'] = $ban_triggered_by; 1326 } 1327 1328 return ($banned && $ban_row) ? $ban_row : $banned; 1329 } 1330 1331 /** 1332 * Check the current session for bans 1333 * 1334 * @return true if session user is banned. 1335 */ 1336 protected function check_ban_for_current_session($config) 1337 { 1338 if (!defined('SKIP_CHECK_BAN') && $this->data['user_type'] != USER_FOUNDER) 1339 { 1340 if (!$config['forwarded_for_check']) 1341 { 1342 $this->check_ban($this->data['user_id'], $this->ip); 1343 } 1344 else 1345 { 1346 $ips = explode(' ', $this->forwarded_for); 1347 $ips[] = $this->ip; 1348 $this->check_ban($this->data['user_id'], $ips); 1349 } 1350 } 1351 } 1352 1353 /** 1354 * Check if ip is blacklisted by Spamhaus SBL 1355 * 1356 * Disables DNSBL setting if errors are returned by Spamhaus due to a policy violation. 1357 * https://www.spamhaus.com/product/help-for-spamhaus-public-mirror-users/ 1358 * 1359 * @param string $dnsbl the blacklist to check against 1360 * @param string|false $ip the IPv4 address to check 1361 * 1362 * @return bool true if listed in spamhaus database, false if not 1363 */ 1364 function check_dnsbl_spamhaus($dnsbl, $ip = false) 1365 { 1366 global $config, $phpbb_log; 1367 1368 if ($ip === false) 1369 { 1370 $ip = $this->ip; 1371 } 1372 1373 // Spamhaus does not support IPv6 addresses. 1374 if (strpos($ip, ':') !== false) 1375 { 1376 return false; 1377 } 1378 1379 if ($ip) 1380 { 1381 $quads = explode('.', $ip); 1382 $reverse_ip = $quads[3] . '.' . $quads[2] . '.' . $quads[1] . '.' . $quads[0]; 1383 1384 $records = dns_get_record($reverse_ip . '.' . $dnsbl . '.', DNS_A); 1385 if (empty($records)) 1386 { 1387 return false; 1388 } 1389 else 1390 { 1391 $error = false; 1392 foreach ($records as $record) 1393 { 1394 if ($record['ip'] == '127.255.255.254') 1395 { 1396 $error = 'LOG_SPAMHAUS_OPEN_RESOLVER'; 1397 break; 1398 } 1399 else if ($record['ip'] == '127.255.255.255') 1400 { 1401 $error = 'LOG_SPAMHAUS_VOLUME_LIMIT'; 1402 break; 1403 } 1404 } 1405 1406 if ($error !== false) 1407 { 1408 $config->set('check_dnsbl', 0); 1409 $phpbb_log->add('critical', $this->data['user_id'], $ip, $error); 1410 } 1411 else 1412 { 1413 // The existence of a non-error A record means it's a hit 1414 return true; 1415 } 1416 } 1417 } 1418 1419 return false; 1420 } 1421 1422 /** 1423 * Checks if an IPv4 address is in a specified DNS blacklist 1424 * 1425 * Only checks if a record is returned or not. 1426 * 1427 * @param string $dnsbl the blacklist to check against 1428 * @param string|false $ip the IPv4 address to check 1429 * 1430 * @return bool true if record is returned, false if not 1431 */ 1432 function check_dnsbl_ipv4_generic($dnsbl, $ip = false) 1433 { 1434 if ($ip === false) 1435 { 1436 $ip = $this->ip; 1437 } 1438 1439 // This function does not support IPv6 addresses. 1440 if (strpos($ip, ':') !== false) 1441 { 1442 return false; 1443 } 1444 1445 $quads = explode('.', $ip); 1446 $reverse_ip = $quads[3] . '.' . $quads[2] . '.' . $quads[1] . '.' . $quads[0]; 1447 1448 if (checkdnsrr($reverse_ip . '.' . $dnsbl . '.', 'A') === true) 1449 { 1450 return true; 1451 } 1452 1453 return false; 1454 } 1455 1456 /** 1457 * Check if ip is blacklisted 1458 * This should be called only where absolutely necessary 1459 * 1460 * Only IPv4 (rbldns does not support AAAA records/IPv6 lookups) 1461 * 1462 * @author satmd (from the php manual) 1463 * @param string $mode register/post - spamcop for example is omitted for posting 1464 * @param string|false $ip the IPv4 address to check 1465 * 1466 * @return false if ip is not blacklisted, else an array([checked server], [lookup]) 1467 */ 1468 function check_dnsbl($mode, $ip = false) 1469 { 1470 if ($ip === false) 1471 { 1472 $ip = $this->ip; 1473 } 1474 1475 // Neither Spamhaus nor Spamcop supports IPv6 addresses. 1476 if (strpos($ip, ':') !== false) 1477 { 1478 return false; 1479 } 1480 1481 $dnsbl_check = array( 1482 'sbl.spamhaus.org' => ['https://check.spamhaus.org/listed/?searchterm=', 'check_dnsbl_spamhaus'], 1483 ); 1484 1485 if ($mode == 'register') 1486 { 1487 $dnsbl_check['bl.spamcop.net'] = ['https://www.spamcop.net/bl.shtml?', 'check_dnsbl_ipv4_generic']; 1488 } 1489 1490 if ($ip) 1491 { 1492 // Need to be listed on all servers... 1493 $listed = true; 1494 $info = array(); 1495 1496 foreach ($dnsbl_check as $dnsbl => $lookup) 1497 { 1498 if (call_user_func(array($this, $lookup[1]), $dnsbl, $ip) === true) 1499 { 1500 $info = array($dnsbl, $lookup[0] . $ip); 1501 } 1502 else 1503 { 1504 $listed = false; 1505 } 1506 } 1507 1508 if ($listed) 1509 { 1510 return $info; 1511 } 1512 } 1513 1514 return false; 1515 } 1516 1517 /** 1518 * Check if URI is blacklisted 1519 * This should be called only where absolutely necessary, for example on the submitted website field 1520 * This function is not in use at the moment and is only included for testing purposes, it may not work at all! 1521 * This means it is untested at the moment and therefore commented out 1522 * 1523 * @param string $uri URI to check 1524 * @return true if uri is on blacklist, else false. Only blacklist is checked (~zero FP), no grey lists 1525 function check_uribl($uri) 1526 { 1527 // Normally parse_url() is not intended to parse uris 1528 // We need to get the top-level domain name anyway... change. 1529 $uri = parse_url($uri); 1530 1531 if ($uri === false || empty($uri['host'])) 1532 { 1533 return false; 1534 } 1535 1536 $uri = trim($uri['host']); 1537 1538 if ($uri) 1539 { 1540 // One problem here... the return parameter for the "windows" method is different from what 1541 // we expect... this may render this check useless... 1542 if (checkdnsrr($uri . '.multi.uribl.com.', 'A') === true) 1543 { 1544 return true; 1545 } 1546 } 1547 1548 return false; 1549 } 1550 */ 1551 1552 /** 1553 * Set/Update a persistent login key 1554 * 1555 * This method creates or updates a persistent session key. When a user makes 1556 * use of persistent (formerly auto-) logins a key is generated and stored in the 1557 * DB. When they revisit with the same key it's automatically updated in both the 1558 * DB and cookie. Multiple keys may exist for each user representing different 1559 * browsers or locations. As with _any_ non-secure-socket no passphrase login this 1560 * remains vulnerable to exploit. 1561 */ 1562 function set_login_key($user_id = false, $key = false, $user_ip = false) 1563 { 1564 global $db, $phpbb_dispatcher; 1565 1566 $user_id = ($user_id === false) ? $this->data['user_id'] : $user_id; 1567 $user_ip = ($user_ip === false) ? $this->ip : $user_ip; 1568 $key = ($key === false) ? (($this->cookie_data['k']) ? $this->cookie_data['k'] : false) : $key; 1569 1570 $key_id = unique_id(hexdec(substr($this->session_id, 0, 8))); 1571 1572 $sql_ary = array( 1573 'key_id' => (string) md5($key_id), 1574 'last_ip' => (string) $user_ip, 1575 'last_login' => (int) time() 1576 ); 1577 1578 if (!$key) 1579 { 1580 $sql_ary += array( 1581 'user_id' => (int) $user_id 1582 ); 1583 } 1584 1585 if ($key) 1586 { 1587 $sql = 'UPDATE ' . SESSIONS_KEYS_TABLE . ' 1588 SET ' . $db->sql_build_array('UPDATE', $sql_ary) . ' 1589 WHERE user_id = ' . (int) $user_id . " 1590 AND key_id = '" . $db->sql_escape(md5($key)) . "'"; 1591 } 1592 else 1593 { 1594 $sql = 'INSERT INTO ' . SESSIONS_KEYS_TABLE . ' ' . $db->sql_build_array('INSERT', $sql_ary); 1595 } 1596 1597 /** 1598 * Event to adjust autologin keys process 1599 * 1600 * @event core.set_login_key 1601 * @var string|false key Current autologin key if exists, false otherwise 1602 * @var string key_id New autologin key 1603 * @var string sql SQL query to update/insert autologin key 1604 * @var array sql_ary Aray with autologin key data 1605 * @var int user_id Current user's ID 1606 * @var string user_ip Current user's IP address 1607 * @since 3.3.2-RC1 1608 */ 1609 $vars = [ 1610 'key', 1611 'key_id', 1612 'sql', 1613 'sql_ary', 1614 'user_id', 1615 'user_ip', 1616 ]; 1617 extract($phpbb_dispatcher->trigger_event('core.set_login_key', compact($vars))); 1618 1619 $db->sql_query($sql); 1620 1621 $this->cookie_data['k'] = $key_id; 1622 1623 return false; 1624 } 1625 1626 /** 1627 * Reset all login keys for the specified user 1628 * 1629 * This method removes all current login keys for a specified (or the current) 1630 * user. It will be called on password change to render old keys unusable 1631 */ 1632 function reset_login_keys($user_id = false) 1633 { 1634 global $db; 1635 1636 $user_id = ($user_id === false) ? (int) $this->data['user_id'] : (int) $user_id; 1637 1638 $sql = 'DELETE FROM ' . SESSIONS_KEYS_TABLE . ' 1639 WHERE user_id = ' . (int) $user_id; 1640 $db->sql_query($sql); 1641 1642 // If the user is logged in, update last visit info first before deleting sessions 1643 $sql = 'SELECT session_time, session_page 1644 FROM ' . SESSIONS_TABLE . ' 1645 WHERE session_user_id = ' . (int) $user_id . ' 1646 ORDER BY session_time DESC'; 1647 $result = $db->sql_query_limit($sql, 1); 1648 $row = $db->sql_fetchrow($result); 1649 $db->sql_freeresult($result); 1650 1651 if ($row) 1652 { 1653 $sql = 'UPDATE ' . USERS_TABLE . ' 1654 SET user_lastvisit = ' . (int) $row['session_time'] . ", user_lastpage = '" . $db->sql_escape($row['session_page']) . "' 1655 WHERE user_id = " . (int) $user_id; 1656 $db->sql_query($sql); 1657 } 1658 1659 // Let's also clear any current sessions for the specified user_id 1660 // If it's the current user then we'll leave this session intact 1661 $sql_where = 'session_user_id = ' . (int) $user_id; 1662 $sql_where .= ($user_id === (int) $this->data['user_id']) ? " AND session_id <> '" . $db->sql_escape($this->session_id) . "'" : ''; 1663 1664 $sql = 'DELETE FROM ' . SESSIONS_TABLE . " 1665 WHERE $sql_where"; 1666 $db->sql_query($sql); 1667 1668 // We're changing the password of the current user and they have a key 1669 // Lets regenerate it to be safe 1670 if ($user_id === (int) $this->data['user_id'] && $this->cookie_data['k']) 1671 { 1672 $this->set_login_key($user_id); 1673 } 1674 } 1675 1676 1677 /** 1678 * Check if the request originated from the same page. 1679 * @param bool $check_script_path If true, the path will be checked as well 1680 */ 1681 function validate_referer($check_script_path = false) 1682 { 1683 global $config, $request; 1684 1685 // no referer - nothing to validate, user's fault for turning it off (we only check on POST; so meta can't be the reason) 1686 if (empty($this->referer) || empty($this->host)) 1687 { 1688 return true; 1689 } 1690 1691 $host = htmlspecialchars($this->host, ENT_COMPAT); 1692 $ref = substr($this->referer, strpos($this->referer, '://') + 3); 1693 1694 if (!(stripos($ref, $host) === 0) && (!$config['force_server_vars'] || !(stripos($ref, $config['server_name']) === 0))) 1695 { 1696 return false; 1697 } 1698 else if ($check_script_path && rtrim($this->page['root_script_path'], '/') !== '') 1699 { 1700 $ref = substr($ref, strlen($host)); 1701 $server_port = $request->server('SERVER_PORT', 0); 1702 1703 if ($server_port !== 80 && $server_port !== 443 && stripos($ref, ":$server_port") === 0) 1704 { 1705 $ref = substr($ref, strlen(":$server_port")); 1706 } 1707 1708 if (!(stripos(rtrim($ref, '/'), rtrim($this->page['root_script_path'], '/')) === 0)) 1709 { 1710 return false; 1711 } 1712 } 1713 1714 return true; 1715 } 1716 1717 1718 function unset_admin() 1719 { 1720 global $db; 1721 $sql = 'UPDATE ' . SESSIONS_TABLE . ' 1722 SET session_admin = 0 1723 WHERE session_id = \'' . $db->sql_escape($this->session_id) . '\''; 1724 $db->sql_query($sql); 1725 } 1726 1727 /** 1728 * Update the session data 1729 * 1730 * @param array $session_data associative array of session keys to be updated 1731 * @param string $session_id optional session_id, defaults to current user's session_id 1732 */ 1733 public function update_session($session_data, $session_id = null) 1734 { 1735 global $db, $phpbb_dispatcher; 1736 1737 $session_id = ($session_id) ? $session_id : $this->session_id; 1738 1739 $sql = 'UPDATE ' . SESSIONS_TABLE . ' SET ' . $db->sql_build_array('UPDATE', $session_data) . " 1740 WHERE session_id = '" . $db->sql_escape($session_id) . "'"; 1741 $db->sql_query($sql); 1742 1743 /** 1744 * Event to send update session information to extension 1745 * Read-only event 1746 * 1747 * @event core.update_session_after 1748 * @var array session_data Associative array of session keys to be updated 1749 * @var string session_id current user's session_id 1750 * @since 3.1.6-RC1 1751 */ 1752 $vars = array('session_data', 'session_id'); 1753 extract($phpbb_dispatcher->trigger_event('core.update_session_after', compact($vars))); 1754 } 1755 1756 public function update_session_infos() 1757 { 1758 global $config, $db, $request; 1759 1760 // No need to update if it's a new session. Informations are already inserted by session_create() 1761 if (isset($this->data['session_created']) && $this->data['session_created']) 1762 { 1763 return; 1764 } 1765 1766 // Do not update the session page for ajax requests, so the view online still works as intended 1767 $page_changed = $this->update_session_page && (!isset($this->data['session_page']) || $this->data['session_page'] != $this->page['page'] || $this->data['session_forum_id'] != $this->page['forum']) && !$request->is_ajax(); 1768 1769 // Only update session DB a minute or so after last update or if page changes 1770 if ($this->time_now - (isset($this->data['session_time']) ? $this->data['session_time'] : 0) > 60 || $page_changed) 1771 { 1772 $sql_ary = array('session_time' => $this->time_now); 1773 1774 if ($page_changed) 1775 { 1776 $sql_ary['session_page'] = substr($this->page['page'], 0, 199); 1777 $sql_ary['session_forum_id'] = $this->page['forum']; 1778 } 1779 1780 $db->sql_return_on_error(true); 1781 1782 $this->update_session($sql_ary); 1783 1784 $db->sql_return_on_error(false); 1785 1786 $this->data = array_merge($this->data, $sql_ary); 1787 1788 if ($this->data['user_id'] != ANONYMOUS && isset($config['new_member_post_limit']) && $this->data['user_new'] && $config['new_member_post_limit'] <= $this->data['user_posts']) 1789 { 1790 $this->leave_newly_registered(); 1791 } 1792 } 1793 } 1794 1795 /** 1796 * Get user ID 1797 * 1798 * @return int User ID 1799 */ 1800 public function id() : int 1801 { 1802 return isset($this->data['user_id']) ? (int) $this->data['user_id'] : ANONYMOUS; 1803 } 1804 1805 /** 1806 * Update user last visit time 1807 */ 1808 public function update_user_lastvisit() 1809 { 1810 global $db; 1811 1812 if (isset($this->data['session_time'], $this->data['user_id'])) 1813 { 1814 $sql = 'UPDATE ' . USERS_TABLE . ' 1815 SET user_lastvisit = ' . (int) $this->data['session_time'] . ', 1816 user_last_active = ' . $this->time_now . ' 1817 WHERE user_id = ' . (int) $this->data['user_id']; 1818 $db->sql_query($sql); 1819 } 1820 } 1821 1822 /** 1823 * Update user's last active time 1824 * 1825 * @return void 1826 */ 1827 public function update_last_active_time() 1828 { 1829 global $db; 1830 1831 if (isset($this->time_now, $this->data['user_id'])) 1832 { 1833 $sql = 'UPDATE ' . USERS_TABLE . ' 1834 SET user_last_active = ' . $this->time_now . ' 1835 WHERE user_id = ' . (int) $this->data['user_id']; 1836 $db->sql_query($sql); 1837 } 1838 } 1839 }
title
Description
Body
title
Description
Body
title
Description
Body
title
Body
Generated: Mon Nov 25 19:05:08 2024 | Cross-referenced by PHPXref 0.7.1 |