Project

General

Profile

1
<?php
2
/**
3
 *
4
 * @category        frontend
5
 * @package         account
6
 * @author          WebsiteBaker Project
7
 * @copyright       2004-2009, Ryan Djurovich
8
 * @copyright       2009-2011, Website Baker Org. e.V.
9
 * @link			http://www.websitebaker2.org/
10
 * @license         http://www.gnu.org/licenses/gpl.html
11
 * @platform        WebsiteBaker 2.8.x
12
 * @requirements    PHP 5.2.2 and higher
13
 * @version         $Id: signup2.php 1654 2012-03-31 23:12:40Z Luisehahne $
14
 * @filesource		$HeadURL: svn://isteam.dynxs.de/wb-archiv/branches/2.8.x/wb/account/signup2.php $
15
 * @lastmodified    $Date: 2012-04-01 01:12:40 +0200 (Sun, 01 Apr 2012) $
16
 *
17
 */
18

    
19
// Must include code to stop this file being access directly
20
if(defined('WB_PATH') == false) { die("Cannot access this file directly"); }
21

    
22
// require_once(WB_PATH.'/framework/class.wb.php');
23
$wb = new wb('Start', 'start', false, false);
24
include_once (WB_PATH.'/framework/functions.php');
25
// Get details entered
26
$groups_id = FRONTEND_SIGNUP;
27
$active = 1;
28
$username = strtolower(strip_tags($wb->get_post_escaped('username')));
29
$display_name = strip_tags($wb->get_post_escaped('display_name'));
30
$email = $wb->get_post('email');
31

    
32
// Create a javascript back link
33
$js_back = WB_URL.'/account/signup.php';
34
/*
35
if (!$wb->checkFTAN())
36
{
37
	$wb->print_error($MESSAGE['GENERIC_SECURITY_ACCESS'], $js_back, false);
38
	exit();
39
}
40
*/
41
// Check values
42
if($groups_id == "") {
43
	$wb->print_error($MESSAGE['USERS_NO_GROUP'], $js_back, false);
44
}
45
if(!preg_match('/^[a-z]{1}[a-z0-9_-]{2,}$/i', $username)) {
46
	$wb->print_error( $MESSAGE['USERS_NAME_INVALID_CHARS'].' / '.
47
	                  $MESSAGE['USERS_USERNAME_TOO_SHORT'], $js_back);
48
}
49
if($email != "") {
50
	if($wb->validate_email($email) == false) {
51
		$wb->print_error($MESSAGE['USERS_INVALID_EMAIL'], $js_back, false);
52
	}
53
} else {
54
	$wb->print_error($MESSAGE['SIGNUP_NO_EMAIL'], $js_back, false);
55
}
56

    
57
$email = $wb->add_slashes($email);
58
$search = array('{SERVER_EMAIL}');
59
$replace = array( SERVER_EMAIL);
60
// Captcha
61
if(ENABLED_CAPTCHA) {
62
	$aServerEmail = (defined('SERVER_EMAIL') && SERVER_EMAIL != '' ? SERVER_EMAIL : $_SERVER['SERVER_NAME']);
63
	$replace = array('SERVER_EMAIL' => $aServerEmail );
64
	$MESSAGE['MOD_FORM_INCORRECT_CAPTCHA'] = replace_vars($MESSAGE['MOD_FORM_INCORRECT_CAPTCHA'], $replace);
65
	if(isset($_POST['captcha']) AND $_POST['captcha'] != ''){
66
		// Check for a mismatch
67
		if(!isset($_POST['captcha']) OR !isset($_SESSION['captcha']) OR $_POST['captcha'] != $_SESSION['captcha']) {
68
			$wb->print_error($MESSAGE['MOD_FORM_INCORRECT_CAPTCHA'], $js_back, false);
69
		}
70
	} else {
71
		$wb->print_error($MESSAGE['MOD_FORM_INCORRECT_CAPTCHA'], $js_back, false);
72
	}
73
}
74
if(isset($_SESSION['captcha'])) { unset($_SESSION['captcha']); }
75

    
76
// Generate a random password then update the database with it
77
$new_pass = '';
78
$salt = "abchefghjkmnpqrstuvwxyz0123456789";
79
srand((double)microtime()*1000000);
80
$i = 0;
81
while ($i <= 7) {
82
	$num = rand() % 33;
83
	$tmp = substr($salt, $num, 1);
84
	$new_pass = $new_pass . $tmp;
85
	$i++;
86
}
87
$md5_password = md5($new_pass);
88

    
89
// Check if username already exists
90
$results = $database->query("SELECT user_id FROM ".TABLE_PREFIX."users WHERE username = '$username'");
91
if($results->numRows() > 0) {
92
	$wb->print_error($MESSAGE['USERS_USERNAME_TAKEN'], $js_back, false);
93
}
94

    
95
// Check if the email already exists
96
$results = $database->query("SELECT user_id FROM ".TABLE_PREFIX."users WHERE email = '".$wb->add_slashes($email)."'");
97
if($results->numRows() > 0) {
98
	if(isset($MESSAGE['USERS_EMAIL_TAKEN'])) {
99
		$wb->print_error($MESSAGE['USERS_EMAIL_TAKEN'], $js_back, false);
100
	} else {
101
		$wb->print_error($MESSAGE['USERS_INVALID_EMAIL'], $js_back, false);
102
	}
103
}
104

    
105
// MD5 supplied password
106
$md5_password = md5($new_pass);
107

    
108
// Inser the user into the database
109
$query = "INSERT INTO ".TABLE_PREFIX."users (group_id,groups_id,active,username,password,display_name,email) VALUES ('$groups_id', '$groups_id', '$active', '$username','$md5_password','$display_name','$email')";
110
$database->query($query);
111

    
112
if($database->is_error()) {
113
	// Error updating database
114
	$message = $database->get_error();
115
} else {
116
	// Setup email to send
117
	$mail_to = $email;
118
	$mail_subject = $MESSAGE['SIGNUP2_SUBJECT_LOGIN_INFO'];
119

    
120
	// Replace placeholders from language variable with values
121
	$search = array('{LOGIN_DISPLAY_NAME}', '{LOGIN_WEBSITE_TITLE}', '{LOGIN_NAME}', '{LOGIN_PASSWORD}');
122
	$replace = array($display_name, WEBSITE_TITLE, $username, $new_pass); 
123
	$mail_message = str_replace($search, $replace, $MESSAGE['SIGNUP2_BODY_LOGIN_INFO']);
124

    
125
	// Try sending the email
126
	if($wb->mail(SERVER_EMAIL,$mail_to,$mail_subject,$mail_message)) {
127
		$display_form = false;
128
		$wb->print_success($MESSAGE['FORGOT_PASS_PASSWORD_RESET'], WB_URL.'/account/login.php' );
129
	} else {
130
		$database->query("DELETE FROM ".TABLE_PREFIX."users WHERE username = '$username'");
131
		$wb->print_error($MESSAGE['FORGOT_PASS_CANNOT_EMAIL'], $js_back, false);
132
	}
133
}
134

    
(14-14/16)