function page_protect() { session_start(); global $db; if (isset($_SESSION['HTTP_USER_AGENT'])) { if ($_SESSION['HTTP_USER_AGENT'] != md5($_SERVER['HTTP_USER_AGENT'])) { logout(); exit; } } if (!isset($_SESSION['user_id']) && !isset($_SESSION['user_name'])) { if (isset($_COOKIE['user_id']) && isset($_COOKIE['user_key'])) { $cookie_user_id = filter($_COOKIE['user_id']); $rs_ctime = mysql_query("select `ckey`,`ctime` from `users` where `id` ='{$cookie_user_id}'") or die(mysql_error()); list($ckey, $ctime) = mysql_fetch_row($rs_ctime); if (time() - $ctime > 60 * 60 * 24 * COOKIE_TIME_OUT) { logout(); } if (!empty($ckey) && is_numeric($_COOKIE['user_id']) && isUserID($_COOKIE['user_name']) && $_COOKIE['user_key'] == sha1($ckey)) { session_regenerate_id(); //against session fixation attacks. $_SESSION['user_id'] = $_COOKIE['user_id']; $_SESSION['user_name'] = $_COOKIE['user_name']; list($user_level) = mysql_fetch_row(mysql_query("select user_level from users where id='{$_SESSION['user_id']}'")); $_SESSION['user_level'] = $user_level; $_SESSION['HTTP_USER_AGENT'] = md5($_SERVER['HTTP_USER_AGENT']); } else { logout(); } } else { header("Location: login.php"); exit; } } }
function page_protect() { //session_save_path(realpath(dirname($_SERVER['DOCUMENT_ROOT']) . '/sessions')); //session_save_path('/hermes/bosweb/web032/b328/ipg.undosonet/miconexionv173/sitio-php/sessions'); //ini_set('session.gc_probability', 1); //echo session_save_path(realpath(dirname($_SERVER['DOCUMENT_ROOT']) . '/sessions')); session_start(); global $db; /* Secure against Session Hijacking by checking user agent */ if (isset($_SESSION['HTTP_USER_AGENT'])) { if ($_SESSION['HTTP_USER_AGENT'] != md5($_SERVER['HTTP_USER_AGENT'])) { logout(); exit; } } // before we allow sessions, we need to check authentication key - ckey and ctime stored in database /* If session not set, check for cookies set by Remember me */ if (!isset($_SESSION['user_id']) && !isset($_SESSION['user_name'])) { if (isset($_COOKIE['user_id']) && isset($_COOKIE['user_key'])) { /* we double check cookie expiry time against stored in database */ $cookie_user_id = filter($_COOKIE['user_id']); $stmt = $conn->prepare('SELECT `ckey`,`ctime` FROM users WHERE id = :Id'); $stmt->execute(array('Id' => $cookie_user_id)); $rows = $stmt->fetchAll(PDO::FETCH_ASSOC); foreach ($rows as $row) { $ckey = $row["ckey"]; $ctime = $row["ctime"]; } // coookie expiry if (time() - $ctime > 60 * 60 * 24 * COOKIE_TIME_OUT) { logout(); } /* Security check with untrusted cookies - dont trust value stored in cookie. /* We also do authentication check of the `ckey` stored in cookie matches that stored in database during login*/ if (!empty($ckey) && is_numeric($_COOKIE['user_id']) && isUserID($_COOKIE['user_name']) && $_COOKIE['user_key'] == sha1($ckey)) { session_regenerate_id(); //against session fixation attacks. $_SESSION['user_id'] = $_COOKIE['user_id']; $_SESSION['user_name'] = $_COOKIE['user_name']; /* query user level from database instead of storing in cookies */ $stmt2 = $conn->prepare("SELECT user_level FROM users WHERE id= :Id"); $stmt2->execute(array('Id' => $_SESSION[user_id])); $rows = $stmt2->fetchAll(PDO::FETCH_ASSOC); foreach ($rows as $row) { $user_level = $row["user_level"]; } $_SESSION['user_level'] = $user_level; $_SESSION['HTTP_USER_AGENT'] = md5($_SERVER['HTTP_USER_AGENT']); } else { logout(); } } else { header("Location: login.php"); exit; } } }
function page_protect() { session_start(); global $db; if (isset($_SESSION['HTTP_USER_AGENT'])) { if ($_SESSION['HTTP_USER_AGENT'] != md5($_SERVER['HTTP_USER_AGENT'])) { logout(); exit; } } if (!isset($_SESSION['user_id']) && !isset($_SESSION['user_name']) ) { if(isset($_COOKIE['user_id']) && isset($_COOKIE['user_key'])){ $cookie_user_id = filter($_COOKIE['user_id']); $rs_ctime = mysql_query("select `ckey`,`ctime` from `users` where `id` ='$cookie_user_id'") or die(mysql_error()); list($ckey,$ctime) = mysql_fetch_row($rs_ctime); // coookie expiry if( (time() - $ctime) > 60*60*24*COOKIE_TIME_OUT) { logout(); } if( !empty($ckey) && is_numeric($_COOKIE['user_id']) && isUserID($_COOKIE['user_name']) && $_COOKIE['user_key'] == sha1($ckey) ) { session_regenerate_id(); $_SESSION['user_id'] = $_COOKIE['user_id']; $_SESSION['user_name'] = $_COOKIE['user_name']; $_SESSION['user_firstname'] = $first_name; $_SESSION['user_lastname'] = $last_name; $_SESSION['HTTP_USER_AGENT'] = md5($_SERVER['HTTP_USER_AGENT']); } else { logout(); } } else { header("Location: index.php"); exit(); } } }
function page_protect() { session_start(); global $mysql_hostname, $mysql_username, $mysql_password, $mysql_dbname; /* Secure against Session Hijacking by checking user agent */ if (isset($_SESSION['HTTP_USER_AGENT'])) { if ($_SESSION['HTTP_USER_AGENT'] != md5($_SERVER['HTTP_USER_AGENT'])) { logout(); exit; } } // before we allow sessions, we need to check authentication key - ckey and ctime stored in database /* If session not set, check for cookies set by Remember me */ if (!isset($_SESSION['username'])) { if (isset($_COOKIE['username']) && isset($_COOKIE['userkey'])) { /* we double check cookie expiry time against stored in database */ $conn = mysql_connect($mysql_hostname, $mysql_username, $mysql_password); if (!$conn) { die('Could not connect: ' . mysql_error()); } mysql_select_db($mysql_dbname); $qry = "SELECT ckey,ctime FROM users where username='******'"; $cookie_username = filter($_COOKIE['username']); $rs_ctime = mysql_query($qry, $conn); list($ckey, $ctime) = mysql_fetch_row($rs_ctime); mysql_close($conn); // coookie expiry if (time() - $ctime > 60 * 60 * 24 * COOKIE_TIME_OUT) { logout(); } /* Security check with untrusted cookies - dont trust value stored in cookie. /* We also do authentication check of the `ckey` stored in cookie matches that stored in database during login*/ if (!empty($ckey) && isUserID($_COOKIE['username']) && $_COOKIE['userkey'] == sha1($ckey)) { session_regenerate_id(); //against session fixation attacks. $_SESSION['username'] = $_COOKIE['username']; $_SESSION['HTTP_USER_AGENT'] = md5($_SERVER['HTTP_USER_AGENT']); } else { logout(); } } else { header("Location: index.php"); exit; } } }
function page_protect() { session_start(); global $link, $linkopd; /* Secure against Session Hijacking by checking user agent */ if (isset($_SESSION['HTTP_USER_AGENT'])) { if ($_SESSION['HTTP_USER_AGENT'] != md5($_SERVER['HTTP_USER_AGENT'])) { logout(); exit; } } // before we allow sessions, we need to check authentication key - ckey and ctime stored in database /* If session not set, check for cookies set by Remember me */ if (!isset($_SESSION['user_id']) && !isset($_SESSION['user_name'])) { if (isset($_COOKIE['user_id']) && isset($_COOKIE['user_key'])) { /* we double check cookie expiry time against stored in database */ $cookie_user_id = filter($_COOKIE['user_id']); $rs_ctime = mysqli_query($link, "select `ckey`,`ctime` from `users` where `id` ='{$cookie_user_id}'") or die(mysqli_error($link)); list($ckey, $ctime) = mysqli_fetch_row($rs_ctime); // coookie expiry if (time() - $ctime > 60 * 60 * 24 * COOKIE_TIME_OUT) { logout(); } /* Security check with untrusted cookies - dont trust value stored in cookie. /* We also do authentication check of the `ckey` stored in cookie matches that stored in database during login*/ if (!empty($ckey) && is_numeric($_COOKIE['user_id']) && isUserID($_COOKIE['user_name']) && $_COOKIE['user_key'] == sha1($ckey)) { session_regenerate_id(); //against session fixation attacks. $_SESSION['user_id'] = $_COOKIE['user_id']; $_SESSION['user_name'] = $_COOKIE['user_name']; /* query user level from database instead of storing in cookies */ list($user_level) = mysqli_fetch_row(mysqli_query($link, "select user_level from users where id='{$_SESSION['user_id']}'")); list($accode) = mysqli_fetch_row(mysqli_query($link, "select user_level from users where id='{$_SESSION['user_id']}'")); $_SESSION['user_level'] = $user_level; $_SESSION['user_accode'] = $accode; $_SESSION['HTTP_USER_AGENT'] = md5($_SERVER['HTTP_USER_AGENT']); } else { logout(); } } else { header("Location: ../login/login.php"); exit; } } }
} /********************* RECAPTCHA CHECK ******************************* This code checks and validates recaptcha ****************************************************************/ require_once 'recaptchalib.php'; $resp = recaptcha_check_answer($privatekey, $_SERVER["REMOTE_ADDR"], $_POST["recaptcha_challenge_field"], $_POST["recaptcha_response_field"]); if (!$resp->is_valid) { die("<h2>Image Verification failed!. Go back and try again.</h2> (reCAPTCHA said: " . $resp->error . ")"); } /************************ SERVER SIDE VALIDATION **************************************/ /********** This validation is useful if javascript is disabled in the browswer ***/ if (empty($data['full_name']) || strlen($data['full_name']) < 4) { $err[] = "ERROR - Invalid name. Please enter at least 3 or more characters for your name"; } // Validate User Name if (!isUserID($data['user_name'])) { $err[] = "ERROR - Invalid user name. It can contain alphabet, number and underscore."; } // Validate Email if (!isEmail($data['usr_email'])) { $err[] = "ERROR - Invalid email address."; } // Check User Passwords if (!checkPwd($data['pwd'], $data['pwd2'])) { $err[] = "ERROR - Invalid Password or mismatch. Enter 5 chars or more"; } $user_ip = $_SERVER['REMOTE_ADDR']; // stores sha1 of password $sha1pass = PwdHash($data['pwd']); // Automatically collects the hostname or domain like example.com) $host = $_SERVER['HTTP_HOST'];
<?php include 'dbc.php'; foreach ($_GET as $key => $value) { $get[$key] = filter($value); } $user = mysql_real_escape_string($get['user']); if (isset($get['cmd']) && $get['cmd'] == 'check') { if (!isUserID($user)) { echo "Invalid User ID"; exit; } if (empty($user) && strlen($user) <= 3) { echo "Enter 5 chars or more"; exit; } $rs_duplicate = mysql_query("select count(*) as total from users where user_name='{$user}' ") or die(mysql_error()); list($total) = mysql_fetch_row($rs_duplicate); if ($total > 0) { echo "Not Available"; } else { echo "Available"; } }
function register() { global $link; function get_include_contents($filename, $variablesToMakeLocal) { extract($variablesToMakeLocal); if (is_file($filename)) { ob_start(); include $filename; return ob_get_clean(); } return false; } /******************* Filtering/Sanitizing Input ***************************** This code filters harmful script code and escapes data of all POST data from the user submitted form. *****************************************************************/ foreach ($_POST as $key => $value) { $data[$key] = $value; } /********************* RECAPTCHA CHECK ******************************* This code checks and validates recaptcha ****************************************************************/ // require_once('recaptchalib.php'); // $resp = recaptcha_check_answer ($privatekey, // $_SERVER["REMOTE_ADDR"], // $_POST["recaptcha_challenge_field"], // $_POST["recaptcha_response_field"]); // if (!$resp->is_valid) { // die ("<h3>Image Verification failed!. Go back and try again.</h3>" . // "(reCAPTCHA said: " . $resp->error . ")"); // } /************************ SERVER SIDE VALIDATION **************************************/ /********** This validation is useful if javascript is disabled in the browswer ***/ if (empty($data['user_name']) || strlen($data['user_name']) < 4) { echo "hello4"; $err[] = "ERROR - Invalid name. Please enter atleast 3 or more characters for your name"; //header("Location: register.php?msg=$err"); //exit(); } // Validate User Name if (!isUserID($data['user_username'])) { echo "hello3"; $err[] = "ERROR - Invalid user name. It can contain alphabet, number and underscore."; //header("Location: register.php?msg=$err"); //exit(); } // Validate Email if (!isEmail($data['user_email'])) { echo "hello1"; $err[] = "ERROR - Invalid email address."; //header("Location: register.php?msg=$err"); //exit(); } // Check User Passwords // if (!checkPwd($data['pass'],$data['pass2'])) {echo ("hello2"); // $err[] = "ERROR - Invalid Password or mismatch. Enter 5 chars or more"; //header("Location: register.php?msg=$err"); //exit(); // } $user_ip = $_SERVER['REMOTE_ADDR']; // stores sha1 of password $sha1pass = PwdHash($data['pass']); // Automatically collects the hostname or domain like example.com) $host = $_SERVER['HTTP_HOST']; $host_upper = strtoupper($host); $path = rtrim(dirname($_SERVER['PHP_SELF']), '/\\'); // Generates activation code simple 4 digit number $activ_code = rand(1000, 9999); $user_email = $data['user_email']; $user_name = $data['user_name']; /************ USER EMAIL CHECK ************************************ This code does a second check on the server side if the email already exists. It queries the database and if it has any existing email it throws user email already exists *******************************************************************/ $rs_duplicate = mysqli_query($link, "select count(*) as total from users where user_email='{$user_email}' OR user_name='{$user_name}'") or die(mysql_error()); list($total) = mysqli_fetch_row($rs_duplicate); if ($total > 2) { echo "hello5"; $err[] = "ERROR - The username/email already exists. Please try again with different username and email."; //header("Location: register.php?msg=$err"); //exit(); } /***************************************************************************/ if (empty($err)) { $sql_insert = "INSERT into `users`(`full_name`,`user_email`,`pwd`,`date`,`users_ip`,`activation_code`,`user_name`)\n\t\t\t\tVALUES('{$data['user_name']}','{$user_email}','{$sha1pass}',now(),'{$user_ip}','{$activ_code}','{$user_name}')"; mysqli_query($link, $sql_insert) or die("Insertion Failed:" . mysql_error()); $user_id = mysqli_insert_id($link); $md5_id = md5($user_id); mysqli_query($link, "update users set md5_id='{$md5_id}' where id='{$user_id}'"); // echo "<h3>Thank You</h3> We received your submission."; $mail = new PHPMailer(); $mail->isSMTP(); // Set mailer to use SMTP $mail->Host = 'smtp.gmail.com'; // Specify main and backup server $mail->SMTPAuth = true; // Enable SMTP authentication $mail->Username = '******'; // SMTP username $mail->Password = '******'; // SMTP password $mail->SMTPSecure = 'tls'; // Enable encryption, 'ssl' also accepted $mail->Port = 587; //Set the SMTP port number - 587 for authenticated TLS $mail->setFrom('*****@*****.**', 'Lake Nona'); //Set who the message is to be sent from //$mail->addReplyTo('*****@*****.**', 'First Last'); //Set an alternative reply-to address $mail->addAddress($user_email, $user_name); // Add a recipient //$mail->addAddress('*****@*****.**'); // Name is optional //$mail->addCC('*****@*****.**'); //$mail->addBCC('*****@*****.**'); $mail->WordWrap = 50; // Set word wrap to 50 characters //$mail->addAttachment('/usr/labnol/file.doc'); // Add attachments //$mail->addAttachment('/images/image.jpg', 'new.jpg'); // Optional name $mail->isHTML(true); // Set email format to HTML // $mail->SMTPDebug = 2; $mail->Subject = 'GroupX onDemand Registration / Activation'; $variable['user_username'] = $data['user_name']; $variable['user_name'] = $data['user_name']; $variable['user_email'] = $data['user_email']; $variable['host'] = $host; $variable['path'] = $path; $variable['activ_code'] = $activ_code; $variable['id'] = $md5_id; //$mail->Body = 'This is the HTML message body <b>in bold!</b>'; //$mail->AltBody = 'HEllo JIm Reydnolds this is a test'; //Read an HTML message body from an external file, convert referenced images to embedded, //convert HTML into a basic plain-text alternative body $mail->Body = get_include_contents('registration.php', $variable); $mail->Send(); $msg['errorCode'] = 1; echo json_encode($msg); exit; } else { if (!$mail->send()) { echo 'Message could not be sent.'; echo 'Mailer Error: ' . $mail->ErrorInfo; exit; } } }
if (isset($_POST['username'])) { foreach ($_POST as $key => $value) { $posts[$key] = filter($value); } $checkForUser = mysql_query("SELECT id FROM `users` WHERE `username`='{$posts['username']}' OR `email`='{$posts['email']}'"); $checkForUserRows = mysql_num_rows($checkForUser); $ip = VisitorIP(); $checkForIP = mysql_query("SELECT id FROM `users` WHERE `ip`='{$ip}'"); $checkForIPRows = mysql_num_rows($checkForIP); if ($checkForUserRows > 0) { $error = "Username or email already registered!"; } else { if ($checkForIPRows > 0) { $error = "You may only have one account per IP!"; } else { if (!isUserID($posts['username'])) { $error = "Username is incorrect!"; } else { if (!isEmail($posts['email'])) { $error = "Enter a valid email address!"; } else { if (!checkPwd($posts['password'], $posts['password2'])) { $error = "Passwords do not match and/or are not atleast 4 characters long!"; } else { $ref = ""; if (isset($_COOKIE['ref'])) { $ref = $_COOKIE['ref']; $refInfo = mysql_query("SELECT * FROM `users` WHERE `id`='{$ref}'"); $refInfo = mysql_fetch_object($refInfo); mysql_query("INSERT INTO `referals`(user,referal,date) values('{$refInfo->username}','{$posts['username']}',NOW())"); }
function page_protect() { session_start(); global $connect_db; /* Secure against Session Hijacking by checking user agent */ if (isset($_SESSION['HTTP_USER_AGENT'])) { if ($_SESSION['HTTP_USER_AGENT'] != md5($_SERVER['HTTP_USER_AGENT'])) { logout(); exit; } } // log out if cookies are deleted if (!isset($_COOKIE['user_id']) && !isset($_COOKIE['user_key'])) { logout(); } // log out if cookies expired! if (isset($_COOKIE['user_id']) && isset($_COOKIE['user_key'])) { /* we double check cookie expiry time against stored in database */ $cookie_user_id = filter($_COOKIE['user_id']); $rs_ctime = mysql_query("select `ckey`,`ctime`,`remember` from `admins` where `admin_id` ='{$cookie_user_id}'") or die(mysql_error()); list($ckey, $ctime, $remember) = mysql_fetch_row($rs_ctime); // coookie expiry //with remember me if ($remember) { if (time() - $ctime > 60 * 60 * 24 * COOKIE_TIME_OUT) { logout(); } } else { //without remember me // coookie expiry if (time() - $ctime > 60 * 60 * COOKIE_TIME_OUT_DEFAULT) { logout(); } } } /* If session not set, check for cookies set by Remember me */ if (!isset($_SESSION['user_id']) && !isset($_SESSION['user_name'])) { if (isset($_COOKIE['user_id']) && isset($_COOKIE['user_key'])) { /* we double check cookie expiry time against stored in database */ $cookie_user_id = filter($_COOKIE['user_id']); $rs_ctime = mysql_query("select `ckey`,`ctime`,`remember` from `admins` where `admin_id` ='{$cookie_user_id}'") or die(mysql_error()); list($ckey, $ctime, $remember) = mysql_fetch_row($rs_ctime); // coookie expiry //with remember me if ($remember) { if (time() - $ctime > 60 * 60 * 24 * COOKIE_TIME_OUT) { logout(); } } else { //without remember me // coookie expiry if (time() - $ctime > 60 * 60 * COOKIE_TIME_OUT_DEFAULT) { logout(); } } /* Security check with untrusted cookies - dont trust value stored in cookie. /* We also do authentication check of the `ckey` stored in cookie matches that stored in database during login*/ if (!empty($ckey) && is_numeric($_COOKIE['user_id']) && isUserID($_COOKIE['user_name']) && $_COOKIE['user_key'] == sha1($ckey)) { session_regenerate_id(); //against session fixation attacks. $_SESSION['user_id'] = $_COOKIE['user_id']; $_SESSION['user_name'] = $_COOKIE['user_name']; $_SESSION['user_level'] = 1; $_SESSION['HTTP_USER_AGENT'] = md5($_SERVER['HTTP_USER_AGENT']); } else { logout(); } } else { header("Location: login.php"); exit; } } }
<?php include 'header.php'; if (isset($_POST['register'])) { foreach ($_POST as $key => $value) { $protect[$key] = filter($value); } $verify = mysql_num_rows(mysql_query("SELECT * FROM `users` WHERE `user`='{$protect['user']}' OR `email`='{$protect['email']}'")); if ($verify > 0) { $message = "<div class=\"msg\"><div class=\"error\">ERROR: Username or email already registered!</div></div>"; } else { if (strlen($protect['user']) > 12 or strlen($protect['user']) < 2) { $message = "<div class=\"msg\"><div class=\"error\">ERROR: Your username must have from 2 to 12 characters!</div></div>"; } else { if (!isUserID($protect['user'])) { $message = "<div class=\"msg\"><div class=\"error\">ERROR: Username is incorrect!</div></div>"; } else { if (!isEmail($protect['email'])) { $message = "<div class=\"msg\"><div class=\"error\">ERROR: Enter a valid email address!</div></div>"; } else { if (!checkPwd($protect['password'], $protect['password2'])) { $message = "<div class=\"msg\"><div class=\"error\">ERROR: Passwords do not match!</div></div>"; } else { $passa = $protect['password']; $passc = MD5($passa); $guid = getGUID(); mysql_query("INSERT INTO `users` (user, password, email, guid) values('{$protect['user']}', '{$passc}', '{$protect['email']}', '" . $guid . "')") or die(mysql_error()); $message = "<div class=\"msg\"><div class=\"success\">Registered!</div></div>"; echo "<script>document.location.href='index.php'</script>"; } }
function register() { include 'datalink.php'; $err = array(); if($_POST['doRegister'] == 'Register') { /******************* Filtering/Sanitizing Input ***************************** This code filters harmful script code and escapes data of all POST data from the user submitted form. *****************************************************************/ foreach($_POST as $key => $value) { $data[$key] = filter($value); } /************************ SERVER SIDE VALIDATION **************************************/ /********** This validation is useful if javascript is disabled in the browswer ***/ if(empty($data['full_name']) || strlen($data['full_name']) < 4) { $err[] = "ERROR - Invalid name. Please enter atleast 3 or more characters for your name"; //header("Location: register.php?msg=$err"); //exit(); } // Validate User Name if (!isUserID($data['user_name'])) { $err[] = "ERROR - Invalid user name. It can contain alphabet, number and underscore."; //header("Location: register.php?msg=$err"); //exit(); } // Validate Email if(!isEmail($data['usr_email'])) { $err[] = "ERROR - Invalid email address."; //header("Location: register.php?msg=$err"); //exit(); } // Check User Passwords if (!checkPwd($data['pwd'],$data['pwd2'])) { $err[] = "ERROR - Invalid Password or mismatch. Enter 5 chars or more"; //header("Location: register.php?msg=$err"); //exit(); } $user_ip = $_SERVER['REMOTE_ADDR']; // stores sha1 of password $sha1pass = PwdHash($data['pwd']); // Automatically collects the hostname or domain like example.com) $host = $_SERVER['HTTP_HOST']; $host_upper = strtoupper($host); $path = rtrim(dirname($_SERVER['PHP_SELF']), '/\\'); // Generates activation code simple 4 digit number $activ_code = rand(1000,9999); $usr_email = $data['usr_email']; $user_name = $data['user_name']; /************ USER EMAIL CHECK ************************************ This code does a second check on the server side if the email already exists. It queries the database and if it has any existing email it throws user email already exists *******************************************************************/ $rs_duplicate = mysql_query("select count(*) as total from users where user_email='$usr_email' OR user_name='$user_name'") or die(mysql_error()); list($total) = mysql_fetch_row($rs_duplicate); if ($total > 0) { $err[] = "ERROR - The username/email already exists. Please try again with different username and email."; //header("Location: register.php?msg=$err"); //exit(); } /***************************************************************************/ if(empty($err)) { $sql_insert = "INSERT into `users` (`first_name`, `last_name`, `user_name`, `user_email`,`pwd`,`city`,`state`,`field`,`gpa`,`date`,`users_ip`,`activation_code` ) VALUES ('$data[first_name]','$data[last_name]','$user_name','$usr_email','$sha1pass','$data[city]','$data[state]','$data[field]','$data[gpa]', ,now(),'$user_ip','$activ_code' ) "; mysql_query($sql_insert,$link) or die("Insertion Failed:" . mysql_error()); $user_id = mysql_insert_id($link); $md5_id = md5($user_id); mysql_query("update users set md5_id='$md5_id' where id='$user_id'"); // echo "<h3>Thank You</h3> We received your submission."; if($user_registration) { $a_link = " *****ACTIVATION LINK*****\n http://$host$path/activate.php?user=$md5_id&activ_code=$activ_code "; } else { $a_link = "Your account is *PENDING APPROVAL* and will be soon activated the administrator. "; } $message = "Hello \n Thank you for registering with us. Here are your login details...\n User ID: $user_name Email: $usr_email \n Passwd: $data[pwd] \n $a_link Thank You Administrator $host_upper ______________________________________________________ THIS IS AN AUTOMATED RESPONSE. ***DO NOT RESPOND TO THIS EMAIL**** "; mail($usr_email, "Login Details", $message, "From: \"Member Registration\" <auto-reply@$host>\r\n" . "X-Mailer: PHP/" . phpversion()); header("Location: thankyou.php"); exit(); } } }
function page_protect() { session_start(); global $db; $const = get_defined_constants(); /* Secure against Session Hijacking by checking user agent */ if (isset($_SESSION['HTTP_USER_AGENT'])) { if ($_SESSION['HTTP_USER_AGENT'] != md5($_SERVER['HTTP_USER_AGENT'])) { logout(); exit; } } // if there is a session we first check to see if they are set to be forced to log out // then make sure the php session_id() matches the value stored in the database if ($_SESSION[user_id]) { $result = mysql_query("select force_logout, sid from {$const['TBL_USERS']} where id='{$_SESSION['user_id']}'"); list($force_logout, $sid) = mysql_fetch_row($result); if ($force_logout) { logout(); exit; } if ($sid != sha1('occasions2011' . session_id())) { logout(); exit; } } // before we allow sessions, we need to check authentication key - ckey and ctime stored in database /* If session not set, check for cookies set by Remember me */ if (!isset($_SESSION['user_id']) && !isset($_SESSION['user_name'])) { if (isset($_COOKIE['user_id']) && isset($_COOKIE['user_key'])) { /* we double check cookie expiry time against stored in database */ $cookie_user_id = filter($_COOKIE['user_id']); $rs_ctime = mysql_query("select `ckey`,`ctime` from {$const['TBL_USERS']} where `id` ='{$cookie_user_id}'") or die(mysql_error()); list($ckey, $ctime) = mysql_fetch_row($rs_ctime); // cookie expiry if (time() - $ctime > 60 * 60 * 24 * COOKIE_TIME_OUT) { logout(); exit; } /* Security check with untrusted cookies - dont trust value stored in cookie. /* We also do authentication check of the `ckey` stored in cookie matches that stored in database during login*/ if (!empty($ckey) && is_numeric($_COOKIE['user_id']) && isUserID($_COOKIE['user_name']) && $_COOKIE['user_key'] == sha1($ckey)) { session_regenerate_id(); //against session fixation attacks. $_SESSION['user_id'] = $_COOKIE['user_id']; $_SESSION['fake_user_id'] = $_COOKIE['user_id']; $_SESSION['user_name'] = $_COOKIE['user_name']; //* query user level from database instead of storing in cookies */ //$result = mysql_query("select user_level, user_can_leadlist from {$const['TBL_USERS']} where id='$_SESSION[user_id]'"); //list($user_level, $user_can_leadlist) = mysql_fetch_row($result); // //$_SESSION['user_level'] = $user_level; //$_SESSION['user_can_leadlist'] = $user_can_leadlist; $_SESSION['HTTP_USER_AGENT'] = md5($_SERVER['HTTP_USER_AGENT']); } else { logout(); exit; } } else { header("Location: " . PAGE_LOGIN); exit; } } /* query user level from database instead of storing in cookies */ $result = mysql_query("select full_name, user_level, force_logout, user_can_leadlist, user_can_events from {$const['TBL_USERS']} where id='{$_SESSION['user_id']}'"); list($full_name, $user_level, $force_logout, $user_can_leadlist, $user_can_events) = mysql_fetch_row($result); if ($force_logout) { logout(); exit; } $_SESSION['user_level'] = $user_level; $_SESSION['full_name'] = $full_name; $_SESSION['user_can_leadlist'] = $user_can_leadlist; $_SESSION['user_can_events'] = $user_can_events; }
$x111022oo[0] = 'UP'; } if ($x111022oo[0] == 'SD') { $x111022oo[0] = 'SU'; } if ($x111022oo[0] == 'BD') { $x111022oo[0] = 'BG'; } if (isset($_POST['register'])) { $verificare1 = mysql_query("SELECT * FROM `vbusers` WHERE `login`='{$_POST['user']}' OR `email`='{$_POST['email']}'"); $verificare = mysql_num_rows($verificare1); if ($verificare > 0) { $message = "This email address or username Already Registered! Please Try to Login."; $message2 = 1; } else { if (!isUserID($_POST['user'])) { $message = "Username format is incorrect!"; $message2 = 1; } else { if (!isEmail($_POST['email'])) { $message = "Email format is incorrect!"; $message2 = 1; } else { if ($_POST['email'] != $_POST['email2']) { $message = "Email addresses do Not match!"; $message2 = 1; } else { if (!checkPwd($_POST['password'], $_POST['password2'])) { $message = "Passwords do not match!"; $message2 = 1; } else {