Revision 1446
Added by DarkViper over 13 years ago
signup2.php | ||
---|---|---|
1 |
<?php |
|
2 |
/** |
|
3 |
* |
|
4 |
* @category frontend |
|
5 |
* @package account |
|
6 |
* @author WebsiteBaker Project |
|
7 |
* @copyright 2004-2009, Ryan Djurovich |
|
8 |
* @copyright 2009-2011, Website Baker Org. e.V. |
|
9 |
* @link http://www.websitebaker2.org/ |
|
10 |
* @license http://www.gnu.org/licenses/gpl.html |
|
11 |
* @platform WebsiteBaker 2.8.x |
|
12 |
* @requirements PHP 5.2.2 and higher |
|
13 |
* @version $Id$ |
|
14 |
* @filesource $HeadURL$ |
|
15 |
* @lastmodified $Date$ |
|
16 |
* |
|
17 |
*/ |
|
18 |
|
|
19 |
// Must include code to stop this file being access directly |
|
20 |
if(defined('WB_PATH') == false) { die("Cannot access this file directly"); } |
|
21 |
|
|
22 |
require_once(WB_PATH.'/framework/class.wb.php'); |
|
23 |
$wb = new wb('Start', 'start', false, false); |
|
24 |
|
|
25 |
// Create new database object |
|
26 |
// $database = new database(); |
|
27 |
|
|
28 |
// Get details entered |
|
29 |
$groups_id = FRONTEND_SIGNUP; |
|
30 |
$active = 1; |
|
31 |
$username = strtolower(strip_tags($wb->get_post_escaped('username'))); |
|
32 |
$display_name = strip_tags($wb->get_post_escaped('display_name')); |
|
33 |
$email = $wb->get_post('email'); |
|
34 |
|
|
35 |
// Create a javascript back link |
|
36 |
$js_back = WB_URL.'/account/signup.php'; |
|
37 |
|
|
38 |
if (!$wb->checkFTAN()) |
|
39 |
{ |
|
40 |
$wb->print_error($MESSAGE['GENERIC_SECURITY_ACCESS'], $js_back, false); |
|
41 |
exit(); |
|
42 |
} |
|
43 |
|
|
44 |
// Check values |
|
45 |
if($groups_id == "") { |
|
46 |
$wb->print_error($MESSAGE['USERS']['NO_GROUP'], $js_back, false); |
|
47 |
} |
|
48 |
if(strlen($username) < 3) { |
|
49 |
$wb->print_error($MESSAGE['USERS']['USERNAME_TOO_SHORT'], $js_back, false); |
|
50 |
} |
|
51 |
if($email != "") { |
|
52 |
if($wb->validate_email($email) == false) { |
|
53 |
$wb->print_error($MESSAGE['USERS']['INVALID_EMAIL'], $js_back, false); |
|
54 |
} |
|
55 |
} else { |
|
56 |
$wb->print_error($MESSAGE['SIGNUP']['NO_EMAIL'], $js_back, false); |
|
57 |
} |
|
58 |
|
|
59 |
$email = $wb->add_slashes($email); |
|
60 |
|
|
61 |
// Captcha |
|
62 |
if(ENABLED_CAPTCHA) { |
|
63 |
if(isset($_POST['captcha']) AND $_POST['captcha'] != ''){ |
|
64 |
// Check for a mismatch |
|
65 |
if(!isset($_POST['captcha']) OR !isset($_SESSION['captcha']) OR $_POST['captcha'] != $_SESSION['captcha']) { |
|
66 |
$wb->print_error($MESSAGE['MOD_FORM']['INCORRECT_CAPTCHA'], $js_back, false); |
|
67 |
} |
|
68 |
} else { |
|
69 |
$wb->print_error($MESSAGE['MOD_FORM']['INCORRECT_CAPTCHA'], $js_back, false); |
|
70 |
} |
|
71 |
} |
|
72 |
if(isset($_SESSION['captcha'])) { unset($_SESSION['captcha']); } |
|
73 |
|
|
74 |
// Generate a random password then update the database with it |
|
75 |
$new_pass = ''; |
|
76 |
$salt = "abchefghjkmnpqrstuvwxyz0123456789"; |
|
77 |
srand((double)microtime()*1000000); |
|
78 |
$i = 0; |
|
79 |
while ($i <= 7) { |
|
80 |
$num = rand() % 33; |
|
81 |
$tmp = substr($salt, $num, 1); |
|
82 |
$new_pass = $new_pass . $tmp; |
|
83 |
$i++; |
|
84 |
} |
|
85 |
$md5_password = md5($new_pass); |
|
86 |
|
|
87 |
// Check if username already exists |
|
88 |
$results = $database->query("SELECT user_id FROM ".TABLE_PREFIX."users WHERE username = '$username'"); |
|
89 |
if($results->numRows() > 0) { |
|
90 |
$wb->print_error($MESSAGE['USERS']['USERNAME_TAKEN'], $js_back, false); |
|
91 |
} |
|
92 |
|
|
93 |
// Check if the email already exists |
|
94 |
$results = $database->query("SELECT user_id FROM ".TABLE_PREFIX."users WHERE email = '".$wb->add_slashes($email)."'"); |
|
95 |
if($results->numRows() > 0) { |
|
96 |
if(isset($MESSAGE['USERS']['EMAIL_TAKEN'])) { |
|
97 |
$wb->print_error($MESSAGE['USERS']['EMAIL_TAKEN'], $js_back, false); |
|
98 |
} else { |
|
99 |
$wb->print_error($MESSAGE['USERS']['INVALID_EMAIL'], $js_back, false); |
|
100 |
} |
|
101 |
} |
|
102 |
|
|
103 |
// MD5 supplied password |
|
104 |
$md5_password = md5($new_pass); |
|
105 |
|
|
106 |
// Inser the user into the database |
|
107 |
$query = "INSERT INTO ".TABLE_PREFIX."users (group_id,groups_id,active,username,password,display_name,email) VALUES ('$groups_id', '$groups_id', '$active', '$username','$md5_password','$display_name','$email')"; |
|
108 |
$database->query($query); |
|
109 |
|
|
110 |
if($database->is_error()) { |
|
111 |
// Error updating database |
|
112 |
$message = $database->get_error(); |
|
113 |
} else { |
|
114 |
// Setup email to send |
|
115 |
$mail_to = $email; |
|
116 |
$mail_subject = $MESSAGE['SIGNUP2']['SUBJECT_LOGIN_INFO']; |
|
117 |
|
|
118 |
// Replace placeholders from language variable with values |
|
119 |
$search = array('{LOGIN_DISPLAY_NAME}', '{LOGIN_WEBSITE_TITLE}', '{LOGIN_NAME}', '{LOGIN_PASSWORD}'); |
|
120 |
$replace = array($display_name, WEBSITE_TITLE, $username, $new_pass); |
|
121 |
$mail_message = str_replace($search, $replace, $MESSAGE['SIGNUP2']['BODY_LOGIN_INFO']); |
|
122 |
|
|
123 |
// Try sending the email |
|
124 |
if($wb->mail(SERVER_EMAIL,$mail_to,$mail_subject,$mail_message)) { |
|
125 |
$display_form = false; |
|
126 |
$wb->print_success($MESSAGE['FORGOT_PASS']['PASSWORD_RESET'], WB_URL.'/account/login.php' ); |
|
127 |
} else { |
|
128 |
$database->query("DELETE FROM ".TABLE_PREFIX."users WHERE username = '$username'"); |
|
129 |
$wb->print_error($MESSAGE['FORGOT_PASS']['CANNOT_EMAIL'], $js_back, false); |
|
130 |
} |
|
131 |
} |
|
132 |
|
|
133 |
?> |
|
1 |
<?php |
|
2 |
/** |
|
3 |
* |
|
4 |
* @category frontend |
|
5 |
* @package account |
|
6 |
* @author WebsiteBaker Project |
|
7 |
* @copyright 2004-2009, Ryan Djurovich |
|
8 |
* @copyright 2009-2011, Website Baker Org. e.V. |
|
9 |
* @link http://www.websitebaker2.org/ |
|
10 |
* @license http://www.gnu.org/licenses/gpl.html |
|
11 |
* @platform WebsiteBaker 2.8.x |
|
12 |
* @requirements PHP 5.2.2 and higher |
|
13 |
* @version $Id$ |
|
14 |
* @filesource $HeadURL$ |
|
15 |
* @lastmodified $Date$ |
|
16 |
* |
|
17 |
*/ |
|
18 |
|
|
19 |
// Must include code to stop this file being access directly |
|
20 |
if(defined('WB_PATH') == false) { die("Cannot access this file directly"); } |
|
21 |
|
|
22 |
require_once(WB_PATH.'/framework/class.wb.php'); |
|
23 |
$wb = new wb('Start', 'start', false, false); |
|
24 |
|
|
25 |
// Create new database object |
|
26 |
// $database = new database(); |
|
27 |
|
|
28 |
// Get details entered |
|
29 |
$groups_id = FRONTEND_SIGNUP; |
|
30 |
$active = 1; |
|
31 |
$username = strtolower(strip_tags($wb->get_post_escaped('username'))); |
|
32 |
$display_name = strip_tags($wb->get_post_escaped('display_name')); |
|
33 |
$email = $wb->get_post('email'); |
|
34 |
|
|
35 |
// Create a javascript back link |
|
36 |
$js_back = WB_URL.'/account/signup.php'; |
|
37 |
|
|
38 |
if (!$wb->checkFTAN()) |
|
39 |
{ |
|
40 |
$wb->print_error($MESSAGE['GENERIC_SECURITY_ACCESS'], $js_back, false); |
|
41 |
exit(); |
|
42 |
} |
|
43 |
|
|
44 |
// Check values |
|
45 |
if($groups_id == "") { |
|
46 |
$wb->print_error($MESSAGE['USERS']['NO_GROUP'], $js_back, false); |
|
47 |
} |
|
48 |
if(!preg_match('/^[a-z]{1}[a-z0-9_-]{2,}$/i', $username)) { |
|
49 |
$wb->print_error( $MESSAGE['USERS_NAME_INVALID_CHARS'].' / '. |
|
50 |
$MESSAGE['USERS_USERNAME_TOO_SHORT'], $js_back); |
|
51 |
} |
|
52 |
if($email != "") { |
|
53 |
if($wb->validate_email($email) == false) { |
|
54 |
$wb->print_error($MESSAGE['USERS']['INVALID_EMAIL'], $js_back, false); |
|
55 |
} |
|
56 |
} else { |
|
57 |
$wb->print_error($MESSAGE['SIGNUP']['NO_EMAIL'], $js_back, false); |
|
58 |
} |
|
59 |
|
|
60 |
$email = $wb->add_slashes($email); |
|
61 |
|
|
62 |
// Captcha |
|
63 |
if(ENABLED_CAPTCHA) { |
|
64 |
if(isset($_POST['captcha']) AND $_POST['captcha'] != ''){ |
|
65 |
// Check for a mismatch |
|
66 |
if(!isset($_POST['captcha']) OR !isset($_SESSION['captcha']) OR $_POST['captcha'] != $_SESSION['captcha']) { |
|
67 |
$wb->print_error($MESSAGE['MOD_FORM']['INCORRECT_CAPTCHA'], $js_back, false); |
|
68 |
} |
|
69 |
} else { |
|
70 |
$wb->print_error($MESSAGE['MOD_FORM']['INCORRECT_CAPTCHA'], $js_back, false); |
|
71 |
} |
|
72 |
} |
|
73 |
if(isset($_SESSION['captcha'])) { unset($_SESSION['captcha']); } |
|
74 |
|
|
75 |
// Generate a random password then update the database with it |
|
76 |
$new_pass = ''; |
|
77 |
$salt = "abchefghjkmnpqrstuvwxyz0123456789"; |
|
78 |
srand((double)microtime()*1000000); |
|
79 |
$i = 0; |
|
80 |
while ($i <= 7) { |
|
81 |
$num = rand() % 33; |
|
82 |
$tmp = substr($salt, $num, 1); |
|
83 |
$new_pass = $new_pass . $tmp; |
|
84 |
$i++; |
|
85 |
} |
|
86 |
$md5_password = md5($new_pass); |
|
87 |
|
|
88 |
// Check if username already exists |
|
89 |
$results = $database->query("SELECT user_id FROM ".TABLE_PREFIX."users WHERE username = '$username'"); |
|
90 |
if($results->numRows() > 0) { |
|
91 |
$wb->print_error($MESSAGE['USERS']['USERNAME_TAKEN'], $js_back, false); |
|
92 |
} |
|
93 |
|
|
94 |
// Check if the email already exists |
|
95 |
$results = $database->query("SELECT user_id FROM ".TABLE_PREFIX."users WHERE email = '".$wb->add_slashes($email)."'"); |
|
96 |
if($results->numRows() > 0) { |
|
97 |
if(isset($MESSAGE['USERS']['EMAIL_TAKEN'])) { |
|
98 |
$wb->print_error($MESSAGE['USERS']['EMAIL_TAKEN'], $js_back, false); |
|
99 |
} else { |
|
100 |
$wb->print_error($MESSAGE['USERS']['INVALID_EMAIL'], $js_back, false); |
|
101 |
} |
|
102 |
} |
|
103 |
|
|
104 |
// MD5 supplied password |
|
105 |
$md5_password = md5($new_pass); |
|
106 |
|
|
107 |
// Inser the user into the database |
|
108 |
$query = "INSERT INTO ".TABLE_PREFIX."users (group_id,groups_id,active,username,password,display_name,email) VALUES ('$groups_id', '$groups_id', '$active', '$username','$md5_password','$display_name','$email')"; |
|
109 |
$database->query($query); |
|
110 |
|
|
111 |
if($database->is_error()) { |
|
112 |
// Error updating database |
|
113 |
$message = $database->get_error(); |
|
114 |
} else { |
|
115 |
// Setup email to send |
|
116 |
$mail_to = $email; |
|
117 |
$mail_subject = $MESSAGE['SIGNUP2']['SUBJECT_LOGIN_INFO']; |
|
118 |
|
|
119 |
// Replace placeholders from language variable with values |
|
120 |
$search = array('{LOGIN_DISPLAY_NAME}', '{LOGIN_WEBSITE_TITLE}', '{LOGIN_NAME}', '{LOGIN_PASSWORD}'); |
|
121 |
$replace = array($display_name, WEBSITE_TITLE, $username, $new_pass); |
|
122 |
$mail_message = str_replace($search, $replace, $MESSAGE['SIGNUP2']['BODY_LOGIN_INFO']); |
|
123 |
|
|
124 |
// Try sending the email |
|
125 |
if($wb->mail(SERVER_EMAIL,$mail_to,$mail_subject,$mail_message)) { |
|
126 |
$display_form = false; |
|
127 |
$wb->print_success($MESSAGE['FORGOT_PASS']['PASSWORD_RESET'], WB_URL.'/account/login.php' ); |
|
128 |
} else { |
|
129 |
$database->query("DELETE FROM ".TABLE_PREFIX."users WHERE username = '$username'"); |
|
130 |
$wb->print_error($MESSAGE['FORGOT_PASS']['CANNOT_EMAIL'], $js_back, false); |
|
131 |
} |
|
132 |
} |
|
133 |
|
|
134 |
?> |
Also available in: Unified diff
fixed validation of loginname (admin/users and signup)