Reminder.php 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402
  1. <?php
  2. /**
  3. * Handle sending out reminders, and checking the secret answer and question. It uses just a few functions to do this, which are:
  4. * Simple Machines Forum (SMF)
  5. *
  6. * @package SMF
  7. * @author Simple Machines http://www.simplemachines.org
  8. * @copyright 2014 Simple Machines and individual contributors
  9. * @license http://www.simplemachines.org/about/smf/license.php BSD
  10. *
  11. * @version 2.1 Alpha 1
  12. */
  13. if (!defined('SMF'))
  14. die('No direct access...');
  15. /**
  16. * This is the controlling delegator
  17. * @uses Profile language files and Reminder template
  18. */
  19. function RemindMe()
  20. {
  21. global $txt, $context;
  22. loadLanguage('Profile');
  23. loadTemplate('Reminder');
  24. $context['page_title'] = $txt['authentication_reminder'];
  25. $context['robot_no_index'] = true;
  26. // Delegation can be useful sometimes.
  27. $subActions = array(
  28. 'picktype' => 'RemindPick',
  29. 'secret2' => 'SecretAnswer2',
  30. 'setpassword' =>'setPassword',
  31. 'setpassword2' =>'setPassword2'
  32. );
  33. // Any subaction? If none, fall through to the main template, which will ask for one.
  34. if (isset($_REQUEST['sa']) && isset($subActions[$_REQUEST['sa']]))
  35. $subActions[$_REQUEST['sa']]();
  36. // Creating a one time token.
  37. else
  38. createToken('remind');
  39. }
  40. // Pick a reminder type.
  41. function RemindPick()
  42. {
  43. global $context, $txt, $scripturl, $sourcedir, $user_info, $webmaster_email, $smcFunc, $language, $modSettings;
  44. checkSession();
  45. validateToken('remind');
  46. createToken('remind');
  47. // Coming with a known ID?
  48. if (!empty($_REQUEST['uid']))
  49. {
  50. $where = 'id_member = {int:id_member}';
  51. $where_params['id_member'] = (int) $_REQUEST['uid'];
  52. }
  53. elseif (isset($_POST['user']) && $_POST['user'] != '')
  54. {
  55. $where = 'member_name = {string:member_name}';
  56. $where_params['member_name'] = $_POST['user'];
  57. $where_params['email_address'] = $_POST['user'];
  58. }
  59. // You must enter a username/email address.
  60. if (empty($where))
  61. fatal_lang_error('username_no_exist', false);
  62. // Make sure we are not being slammed
  63. // Don't call this if you're coming from the "Choose a reminder type" page - otherwise you'll likely get an error
  64. if (!isset($_POST['reminder_type']) || !in_array($_POST['reminder_type'], array('email', 'secret')))
  65. {
  66. spamProtection('remind');
  67. }
  68. // Find the user!
  69. $request = $smcFunc['db_query']('', '
  70. SELECT id_member, real_name, member_name, email_address, is_activated, validation_code, lngfile, openid_uri, secret_question
  71. FROM {db_prefix}members
  72. WHERE ' . $where . '
  73. LIMIT 1',
  74. array_merge($where_params, array(
  75. ))
  76. );
  77. // Maybe email?
  78. if ($smcFunc['db_num_rows']($request) == 0 && empty($_REQUEST['uid']))
  79. {
  80. $smcFunc['db_free_result']($request);
  81. $request = $smcFunc['db_query']('', '
  82. SELECT id_member, real_name, member_name, email_address, is_activated, validation_code, lngfile, openid_uri, secret_question
  83. FROM {db_prefix}members
  84. WHERE email_address = {string:email_address}
  85. LIMIT 1',
  86. array_merge($where_params, array(
  87. ))
  88. );
  89. if ($smcFunc['db_num_rows']($request) == 0)
  90. fatal_lang_error('no_user_with_email', false);
  91. }
  92. $row = $smcFunc['db_fetch_assoc']($request);
  93. $smcFunc['db_free_result']($request);
  94. $context['account_type'] = !empty($row['openid_uri']) ? 'openid' : 'password';
  95. // If the user isn't activated/approved, give them some feedback on what to do next.
  96. if ($row['is_activated'] != 1)
  97. {
  98. // Awaiting approval...
  99. if (trim($row['validation_code']) == '')
  100. fatal_error(sprintf($txt['registration_not_approved'], $scripturl . '?action=activate;user=' . $_POST['user']), false);
  101. else
  102. fatal_error(sprintf($txt['registration_not_activated'], $scripturl . '?action=activate;user=' . $_POST['user']), false);
  103. }
  104. // You can't get emailed if you have no email address.
  105. $row['email_address'] = trim($row['email_address']);
  106. if ($row['email_address'] == '')
  107. fatal_error($txt['no_reminder_email'] . '<br>' . $txt['send_email'] . ' <a href="mailto:' . $webmaster_email . '">webmaster</a> ' . $txt['to_ask_password'] . '.');
  108. // If they have no secret question then they can only get emailed the item, or they are requesting the email, send them an email.
  109. if (empty($row['secret_question']) || (isset($_POST['reminder_type']) && $_POST['reminder_type'] == 'email'))
  110. {
  111. // Randomly generate a new password, with only alpha numeric characters that is a max length of 10 chars.
  112. require_once($sourcedir . '/Subs-Members.php');
  113. $password = generateValidationCode();
  114. require_once($sourcedir . '/Subs-Post.php');
  115. $replacements = array(
  116. 'REALNAME' => $row['real_name'],
  117. 'REMINDLINK' => $scripturl . '?action=reminder;sa=setpassword;u=' . $row['id_member'] . ';code=' . $password,
  118. 'IP' => $user_info['ip'],
  119. 'MEMBERNAME' => $row['member_name'],
  120. 'OPENID' => $row['openid_uri'],
  121. );
  122. $emaildata = loadEmailTemplate('forgot_' . $context['account_type'], $replacements, empty($row['lngfile']) || empty($modSettings['userLanguage']) ? $language : $row['lngfile']);
  123. $context['description'] = $txt['reminder_' . (!empty($row['openid_uri']) ? 'openid_' : '') . 'sent'];
  124. // If they were using OpenID simply email them their OpenID identity.
  125. sendmail($row['email_address'], $emaildata['subject'], $emaildata['body'], null, 'reminder', false, 1);
  126. if (empty($row['openid_uri']))
  127. // Set the password in the database.
  128. updateMemberData($row['id_member'], array('validation_code' => substr(md5($password), 0, 10)));
  129. // Set up the template.
  130. $context['sub_template'] = 'sent';
  131. // Dont really.
  132. return;
  133. }
  134. // Otherwise are ready to answer the question?
  135. elseif (isset($_POST['reminder_type']) && $_POST['reminder_type'] == 'secret')
  136. {
  137. return SecretAnswerInput();
  138. }
  139. // No we're here setup the context for template number 2!
  140. $context['sub_template'] = 'reminder_pick';
  141. $context['current_member'] = array(
  142. 'id' => $row['id_member'],
  143. 'name' => $row['member_name'],
  144. );
  145. }
  146. // Set your new password
  147. function setPassword()
  148. {
  149. global $txt, $context;
  150. loadLanguage('Login');
  151. // You need a code!
  152. if (!isset($_REQUEST['code']))
  153. fatal_lang_error('no_access', false);
  154. // Fill the context array.
  155. $context += array(
  156. 'page_title' => $txt['reminder_set_password'],
  157. 'sub_template' => 'set_password',
  158. 'code' => $_REQUEST['code'],
  159. 'memID' => (int) $_REQUEST['u']
  160. );
  161. // Tokens!
  162. createToken('remind-sp');
  163. }
  164. function setPassword2()
  165. {
  166. global $context, $txt, $smcFunc, $sourcedir;
  167. checkSession();
  168. validateToken('remind-sp');
  169. if (empty($_POST['u']) || !isset($_POST['passwrd1']) || !isset($_POST['passwrd2']))
  170. fatal_lang_error('no_access', false);
  171. $_POST['u'] = (int) $_POST['u'];
  172. if ($_POST['passwrd1'] != $_POST['passwrd2'])
  173. fatal_lang_error('passwords_dont_match', false);
  174. if ($_POST['passwrd1'] == '')
  175. fatal_lang_error('no_password', false);
  176. loadLanguage('Login');
  177. // Get the code as it should be from the database.
  178. $request = $smcFunc['db_query']('', '
  179. SELECT validation_code, member_name, email_address, passwd_flood
  180. FROM {db_prefix}members
  181. WHERE id_member = {int:id_member}
  182. AND is_activated = {int:is_activated}
  183. AND validation_code != {string:blank_string}
  184. LIMIT 1',
  185. array(
  186. 'id_member' => $_POST['u'],
  187. 'is_activated' => 1,
  188. 'blank_string' => '',
  189. )
  190. );
  191. // Does this user exist at all?
  192. if ($smcFunc['db_num_rows']($request) == 0)
  193. fatal_lang_error('invalid_userid', false);
  194. list ($realCode, $username, $email, $flood_value) = $smcFunc['db_fetch_row']($request);
  195. $smcFunc['db_free_result']($request);
  196. // Is the password actually valid?
  197. require_once($sourcedir . '/Subs-Auth.php');
  198. $passwordError = validatePassword($_POST['passwrd1'], $username, array($email));
  199. // What - it's not?
  200. if ($passwordError != null)
  201. fatal_lang_error('profile_error_password_' . $passwordError, false);
  202. require_once($sourcedir . '/LogInOut.php');
  203. // Quit if this code is not right.
  204. if (empty($_POST['code']) || substr($realCode, 0, 10) !== substr(md5($_POST['code']), 0, 10))
  205. {
  206. // Stop brute force attacks like this.
  207. validatePasswordFlood($_POST['u'], $flood_value, false);
  208. fatal_error($txt['invalid_activation_code'], false);
  209. }
  210. // Just in case, flood control.
  211. validatePasswordFlood($_POST['u'], $flood_value, true);
  212. // User validated. Update the database!
  213. updateMemberData($_POST['u'], array('validation_code' => '', 'passwd' => sha1(strtolower($username) . $_POST['passwrd1'])));
  214. call_integration_hook('integrate_reset_pass', array($username, $username, $_POST['passwrd1']));
  215. loadTemplate('Login');
  216. $context += array(
  217. 'page_title' => $txt['reminder_password_set'],
  218. 'sub_template' => 'login',
  219. 'default_username' => $username,
  220. 'default_password' => $_POST['passwrd1'],
  221. 'never_expire' => false,
  222. 'description' => $txt['reminder_password_set']
  223. );
  224. loadJavascriptFile('sha1.js', array('default_theme' => true), 'smf_sha1');
  225. createToken('login');
  226. }
  227. // Get the secret answer.
  228. function SecretAnswerInput()
  229. {
  230. global $context, $smcFunc;
  231. checkSession();
  232. // Strings for the register auto javascript clever stuffy wuffy.
  233. loadLanguage('Login');
  234. // Check they entered something...
  235. if (empty($_REQUEST['uid']))
  236. fatal_lang_error('username_no_exist', false);
  237. // Get the stuff....
  238. $request = $smcFunc['db_query']('', '
  239. SELECT id_member, real_name, member_name, secret_question, openid_uri
  240. FROM {db_prefix}members
  241. WHERE id_member = {int:id_member}
  242. LIMIT 1',
  243. array(
  244. 'id_member' => (int) $_REQUEST['uid'],
  245. )
  246. );
  247. if ($smcFunc['db_num_rows']($request) == 0)
  248. fatal_lang_error('username_no_exist', false);
  249. $row = $smcFunc['db_fetch_assoc']($request);
  250. $smcFunc['db_free_result']($request);
  251. $context['account_type'] = !empty($row['openid_uri']) ? 'openid' : 'password';
  252. // If there is NO secret question - then throw an error.
  253. if (trim($row['secret_question']) == '')
  254. fatal_lang_error('registration_no_secret_question', false);
  255. // Ask for the answer...
  256. $context['remind_user'] = $row['id_member'];
  257. $context['remind_type'] = '';
  258. $context['secret_question'] = $row['secret_question'];
  259. $context['sub_template'] = 'ask';
  260. createToken('remind-sai');
  261. }
  262. function SecretAnswer2()
  263. {
  264. global $txt, $context, $smcFunc, $sourcedir;
  265. checkSession();
  266. validateToken('remind-sai');
  267. // Hacker? How did you get this far without an email or username?
  268. if (empty($_REQUEST['uid']))
  269. fatal_lang_error('username_no_exist', false);
  270. loadLanguage('Login');
  271. // Get the information from the database.
  272. $request = $smcFunc['db_query']('', '
  273. SELECT id_member, real_name, member_name, secret_answer, secret_question, openid_uri, email_address
  274. FROM {db_prefix}members
  275. WHERE id_member = {int:id_member}
  276. LIMIT 1',
  277. array(
  278. 'id_member' => $_REQUEST['uid'],
  279. )
  280. );
  281. if ($smcFunc['db_num_rows']($request) == 0)
  282. fatal_lang_error('username_no_exist', false);
  283. $row = $smcFunc['db_fetch_assoc']($request);
  284. $smcFunc['db_free_result']($request);
  285. // Check if the secret answer is correct.
  286. if ($row['secret_question'] == '' || $row['secret_answer'] == '' || md5($_POST['secret_answer']) != $row['secret_answer'])
  287. {
  288. log_error(sprintf($txt['reminder_error'], $row['member_name']), 'user');
  289. fatal_lang_error('incorrect_answer', false);
  290. }
  291. // If it's OpenID this is where the music ends.
  292. if (!empty($row['openid_uri']))
  293. {
  294. $context['sub_template'] = 'sent';
  295. $context['description'] = sprintf($txt['reminder_openid_is'], $row['openid_uri']);
  296. return;
  297. }
  298. // You can't use a blank one!
  299. if (strlen(trim($_POST['passwrd1'])) === 0)
  300. fatal_lang_error('no_password', false);
  301. // They have to be the same too.
  302. if ($_POST['passwrd1'] != $_POST['passwrd2'])
  303. fatal_lang_error('passwords_dont_match', false);
  304. // Make sure they have a strong enough password.
  305. require_once($sourcedir . '/Subs-Auth.php');
  306. $passwordError = validatePassword($_POST['passwrd1'], $row['member_name'], array($row['email_address']));
  307. // Invalid?
  308. if ($passwordError != null)
  309. fatal_lang_error('profile_error_password_' . $passwordError, false);
  310. // Alright, so long as 'yer sure.
  311. updateMemberData($row['id_member'], array('passwd' => sha1(strtolower($row['member_name']) . $_POST['passwrd1'])));
  312. call_integration_hook('integrate_reset_pass', array($row['member_name'], $row['member_name'], $_POST['passwrd1']));
  313. // Tell them it went fine.
  314. loadTemplate('Login');
  315. $context += array(
  316. 'page_title' => $txt['reminder_password_set'],
  317. 'sub_template' => 'login',
  318. 'default_username' => $row['member_name'],
  319. 'default_password' => $_POST['passwrd1'],
  320. 'never_expire' => false,
  321. 'description' => $txt['reminder_password_set']
  322. );
  323. createToken('login');
  324. }
  325. ?>