1 | <?php
|
---|
2 | /**
|
---|
3 | *
|
---|
4 | * @package phpBB3
|
---|
5 | * @version $Id$
|
---|
6 | * @copyright (c) 2005 phpBB Group
|
---|
7 | * @license http://opensource.org/licenses/gpl-license.php GNU Public License
|
---|
8 | *
|
---|
9 | */
|
---|
10 |
|
---|
11 | /**
|
---|
12 | * @ignore
|
---|
13 | */
|
---|
14 | define('IN_PHPBB', true);
|
---|
15 | $phpbb_root_path = (defined('PHPBB_ROOT_PATH')) ? PHPBB_ROOT_PATH : './../';
|
---|
16 | $phpEx = substr(strrchr(__FILE__, '.'), 1);
|
---|
17 |
|
---|
18 |
|
---|
19 | // Thank you sun.
|
---|
20 | if (isset($_SERVER['CONTENT_TYPE']))
|
---|
21 | {
|
---|
22 | if ($_SERVER['CONTENT_TYPE'] === 'application/x-java-archive')
|
---|
23 | {
|
---|
24 | exit;
|
---|
25 | }
|
---|
26 | }
|
---|
27 | else if (isset($_SERVER['HTTP_USER_AGENT']) && strpos($_SERVER['HTTP_USER_AGENT'], 'Java') !== false)
|
---|
28 | {
|
---|
29 | exit;
|
---|
30 | }
|
---|
31 |
|
---|
32 | if (isset($_GET['avatar']))
|
---|
33 | {
|
---|
34 | require($phpbb_root_path . 'config.' . $phpEx);
|
---|
35 |
|
---|
36 | if (!defined('PHPBB_INSTALLED') || empty($dbms) || empty($acm_type))
|
---|
37 | {
|
---|
38 | exit;
|
---|
39 | }
|
---|
40 |
|
---|
41 | require($phpbb_root_path . 'includes/acm/acm_' . $acm_type . '.' . $phpEx);
|
---|
42 | require($phpbb_root_path . 'includes/cache.' . $phpEx);
|
---|
43 | require($phpbb_root_path . 'includes/db/' . $dbms . '.' . $phpEx);
|
---|
44 | require($phpbb_root_path . 'includes/constants.' . $phpEx);
|
---|
45 |
|
---|
46 | $db = new $sql_db();
|
---|
47 | $cache = new cache();
|
---|
48 |
|
---|
49 | // Connect to DB
|
---|
50 | if (!@$db->sql_connect($dbhost, $dbuser, $dbpasswd, $dbname, $dbport, false, false))
|
---|
51 | {
|
---|
52 | exit;
|
---|
53 | }
|
---|
54 | unset($dbpasswd);
|
---|
55 |
|
---|
56 | // worst-case default
|
---|
57 | $browser = (!empty($_SERVER['HTTP_USER_AGENT'])) ? htmlspecialchars((string) $_SERVER['HTTP_USER_AGENT']) : 'msie 6.0';
|
---|
58 |
|
---|
59 | $config = $cache->obtain_config();
|
---|
60 | $filename = $_GET['avatar'];
|
---|
61 | $avatar_group = false;
|
---|
62 | $exit = false;
|
---|
63 |
|
---|
64 | if ($filename[0] === 'g')
|
---|
65 | {
|
---|
66 | $avatar_group = true;
|
---|
67 | $filename = substr($filename, 1);
|
---|
68 | }
|
---|
69 |
|
---|
70 | // '==' is not a bug - . as the first char is as bad as no dot at all
|
---|
71 | if (strpos($filename, '.') == false)
|
---|
72 | {
|
---|
73 | header('HTTP/1.0 403 Forbidden');
|
---|
74 | $exit = true;
|
---|
75 | }
|
---|
76 |
|
---|
77 | if (!$exit)
|
---|
78 | {
|
---|
79 | $ext = substr(strrchr($filename, '.'), 1);
|
---|
80 | $stamp = (int) substr(stristr($filename, '_'), 1);
|
---|
81 | $filename = (int) $filename;
|
---|
82 | $exit = set_modified_headers($stamp, $browser);
|
---|
83 | }
|
---|
84 | if (!$exit && !in_array($ext, array('png', 'gif', 'jpg', 'jpeg')))
|
---|
85 | {
|
---|
86 | // no way such an avatar could exist. They are not following the rules, stop the show.
|
---|
87 | header("HTTP/1.0 403 Forbidden");
|
---|
88 | $exit = true;
|
---|
89 | }
|
---|
90 |
|
---|
91 |
|
---|
92 | if (!$exit)
|
---|
93 | {
|
---|
94 | if (!$filename)
|
---|
95 | {
|
---|
96 | // no way such an avatar could exist. They are not following the rules, stop the show.
|
---|
97 | header("HTTP/1.0 403 Forbidden");
|
---|
98 | }
|
---|
99 | else
|
---|
100 | {
|
---|
101 | send_avatar_to_browser(($avatar_group ? 'g' : '') . $filename . '.' . $ext, $browser);
|
---|
102 | }
|
---|
103 | }
|
---|
104 | file_gc();
|
---|
105 | }
|
---|
106 |
|
---|
107 | // implicit else: we are not in avatar mode
|
---|
108 | include($phpbb_root_path . 'common.' . $phpEx);
|
---|
109 |
|
---|
110 | $download_id = request_var('id', 0);
|
---|
111 | $mode = request_var('mode', '');
|
---|
112 | $thumbnail = request_var('t', false);
|
---|
113 |
|
---|
114 | // Start session management, do not update session page.
|
---|
115 | $user->session_begin(false);
|
---|
116 | $auth->acl($user->data);
|
---|
117 | $user->setup('viewtopic');
|
---|
118 |
|
---|
119 | if (!$download_id)
|
---|
120 | {
|
---|
121 | trigger_error('NO_ATTACHMENT_SELECTED');
|
---|
122 | }
|
---|
123 |
|
---|
124 | if (!$config['allow_attachments'] && !$config['allow_pm_attach'])
|
---|
125 | {
|
---|
126 | trigger_error('ATTACHMENT_FUNCTIONALITY_DISABLED');
|
---|
127 | }
|
---|
128 |
|
---|
129 | $sql = 'SELECT attach_id, in_message, post_msg_id, extension, is_orphan, poster_id, filetime
|
---|
130 | FROM ' . ATTACHMENTS_TABLE . "
|
---|
131 | WHERE attach_id = $download_id";
|
---|
132 | $result = $db->sql_query_limit($sql, 1);
|
---|
133 | $attachment = $db->sql_fetchrow($result);
|
---|
134 | $db->sql_freeresult($result);
|
---|
135 |
|
---|
136 | if (!$attachment)
|
---|
137 | {
|
---|
138 | trigger_error('ERROR_NO_ATTACHMENT');
|
---|
139 | }
|
---|
140 |
|
---|
141 | if ((!$attachment['in_message'] && !$config['allow_attachments']) || ($attachment['in_message'] && !$config['allow_pm_attach']))
|
---|
142 | {
|
---|
143 | trigger_error('ATTACHMENT_FUNCTIONALITY_DISABLED');
|
---|
144 | }
|
---|
145 |
|
---|
146 | $row = array();
|
---|
147 |
|
---|
148 | if ($attachment['is_orphan'])
|
---|
149 | {
|
---|
150 | // We allow admins having attachment permissions to see orphan attachments...
|
---|
151 | $own_attachment = ($auth->acl_get('a_attach') || $attachment['poster_id'] == $user->data['user_id']) ? true : false;
|
---|
152 |
|
---|
153 | if (!$own_attachment || ($attachment['in_message'] && !$auth->acl_get('u_pm_download')) || (!$attachment['in_message'] && !$auth->acl_get('u_download')))
|
---|
154 | {
|
---|
155 | trigger_error('ERROR_NO_ATTACHMENT');
|
---|
156 | }
|
---|
157 |
|
---|
158 | // Obtain all extensions...
|
---|
159 | $extensions = $cache->obtain_attach_extensions(true);
|
---|
160 | }
|
---|
161 | else
|
---|
162 | {
|
---|
163 | if (!$attachment['in_message'])
|
---|
164 | {
|
---|
165 | //
|
---|
166 | $sql = 'SELECT p.forum_id, f.forum_password, f.parent_id
|
---|
167 | FROM ' . POSTS_TABLE . ' p, ' . FORUMS_TABLE . ' f
|
---|
168 | WHERE p.post_id = ' . $attachment['post_msg_id'] . '
|
---|
169 | AND p.forum_id = f.forum_id';
|
---|
170 | $result = $db->sql_query_limit($sql, 1);
|
---|
171 | $row = $db->sql_fetchrow($result);
|
---|
172 | $db->sql_freeresult($result);
|
---|
173 |
|
---|
174 | // Global announcement?
|
---|
175 | $f_download = (!$row) ? $auth->acl_getf_global('f_download') : $auth->acl_get('f_download', $row['forum_id']);
|
---|
176 |
|
---|
177 | if ($auth->acl_get('u_download') && $f_download)
|
---|
178 | {
|
---|
179 | if ($row && $row['forum_password'])
|
---|
180 | {
|
---|
181 | // Do something else ... ?
|
---|
182 | login_forum_box($row);
|
---|
183 | }
|
---|
184 | }
|
---|
185 | else
|
---|
186 | {
|
---|
187 | trigger_error('SORRY_AUTH_VIEW_ATTACH');
|
---|
188 | }
|
---|
189 | }
|
---|
190 | else
|
---|
191 | {
|
---|
192 | $row['forum_id'] = false;
|
---|
193 | if (!$auth->acl_get('u_pm_download'))
|
---|
194 | {
|
---|
195 | header('HTTP/1.0 403 Forbidden');
|
---|
196 | trigger_error('SORRY_AUTH_VIEW_ATTACH');
|
---|
197 | }
|
---|
198 |
|
---|
199 | // Check if the attachment is within the users scope...
|
---|
200 | $sql = 'SELECT user_id, author_id
|
---|
201 | FROM ' . PRIVMSGS_TO_TABLE . '
|
---|
202 | WHERE msg_id = ' . $attachment['post_msg_id'];
|
---|
203 | $result = $db->sql_query($sql);
|
---|
204 |
|
---|
205 | $allowed = false;
|
---|
206 | while ($user_row = $db->sql_fetchrow($result))
|
---|
207 | {
|
---|
208 | if ($user->data['user_id'] == $user_row['user_id'] || $user->data['user_id'] == $user_row['author_id'])
|
---|
209 | {
|
---|
210 | $allowed = true;
|
---|
211 | break;
|
---|
212 | }
|
---|
213 | }
|
---|
214 | $db->sql_freeresult($result);
|
---|
215 |
|
---|
216 | if (!$allowed)
|
---|
217 | {
|
---|
218 | header('HTTP/1.0 403 Forbidden');
|
---|
219 | trigger_error('ERROR_NO_ATTACHMENT');
|
---|
220 | }
|
---|
221 | }
|
---|
222 |
|
---|
223 | // disallowed?
|
---|
224 | $extensions = array();
|
---|
225 | if (!extension_allowed($row['forum_id'], $attachment['extension'], $extensions))
|
---|
226 | {
|
---|
227 | trigger_error(sprintf($user->lang['EXTENSION_DISABLED_AFTER_POSTING'], $attachment['extension']));
|
---|
228 | }
|
---|
229 | }
|
---|
230 |
|
---|
231 | if (!download_allowed())
|
---|
232 | {
|
---|
233 | header('HTTP/1.0 403 Forbidden');
|
---|
234 | trigger_error($user->lang['LINKAGE_FORBIDDEN']);
|
---|
235 | }
|
---|
236 |
|
---|
237 | $download_mode = (int) $extensions[$attachment['extension']]['download_mode'];
|
---|
238 |
|
---|
239 | // Fetching filename here to prevent sniffing of filename
|
---|
240 | $sql = 'SELECT attach_id, is_orphan, in_message, post_msg_id, extension, physical_filename, real_filename, mimetype, filetime
|
---|
241 | FROM ' . ATTACHMENTS_TABLE . "
|
---|
242 | WHERE attach_id = $download_id";
|
---|
243 | $result = $db->sql_query_limit($sql, 1);
|
---|
244 | $attachment = $db->sql_fetchrow($result);
|
---|
245 | $db->sql_freeresult($result);
|
---|
246 |
|
---|
247 | if (!$attachment)
|
---|
248 | {
|
---|
249 | trigger_error('ERROR_NO_ATTACHMENT');
|
---|
250 | }
|
---|
251 |
|
---|
252 | $attachment['physical_filename'] = utf8_basename($attachment['physical_filename']);
|
---|
253 | $display_cat = $extensions[$attachment['extension']]['display_cat'];
|
---|
254 |
|
---|
255 | if (($display_cat == ATTACHMENT_CATEGORY_IMAGE || $display_cat == ATTACHMENT_CATEGORY_THUMB) && !$user->optionget('viewimg'))
|
---|
256 | {
|
---|
257 | $display_cat = ATTACHMENT_CATEGORY_NONE;
|
---|
258 | }
|
---|
259 |
|
---|
260 | if ($display_cat == ATTACHMENT_CATEGORY_FLASH && !$user->optionget('viewflash'))
|
---|
261 | {
|
---|
262 | $display_cat = ATTACHMENT_CATEGORY_NONE;
|
---|
263 | }
|
---|
264 |
|
---|
265 | if ($thumbnail)
|
---|
266 | {
|
---|
267 | $attachment['physical_filename'] = 'thumb_' . $attachment['physical_filename'];
|
---|
268 | }
|
---|
269 | else if (($display_cat == ATTACHMENT_CATEGORY_NONE/* || $display_cat == ATTACHMENT_CATEGORY_IMAGE*/) && !$attachment['is_orphan'])
|
---|
270 | {
|
---|
271 | // Update download count
|
---|
272 | $sql = 'UPDATE ' . ATTACHMENTS_TABLE . '
|
---|
273 | SET download_count = download_count + 1
|
---|
274 | WHERE attach_id = ' . $attachment['attach_id'];
|
---|
275 | $db->sql_query($sql);
|
---|
276 | }
|
---|
277 |
|
---|
278 | if ($display_cat == ATTACHMENT_CATEGORY_IMAGE && $mode === 'view' && (strpos($attachment['mimetype'], 'image') === 0) && ((strpos(strtolower($user->browser), 'msie') !== false) && (strpos(strtolower($user->browser), 'msie 8.0') === false)))
|
---|
279 | {
|
---|
280 | wrap_img_in_html(append_sid($phpbb_root_path . 'download/file.' . $phpEx, 'id=' . $attachment['attach_id']), $attachment['real_filename']);
|
---|
281 | file_gc();
|
---|
282 | }
|
---|
283 | else
|
---|
284 | {
|
---|
285 | // Determine the 'presenting'-method
|
---|
286 | if ($download_mode == PHYSICAL_LINK)
|
---|
287 | {
|
---|
288 | // This presenting method should no longer be used
|
---|
289 | if (!@is_dir($phpbb_root_path . $config['upload_path']))
|
---|
290 | {
|
---|
291 | trigger_error($user->lang['PHYSICAL_DOWNLOAD_NOT_POSSIBLE']);
|
---|
292 | }
|
---|
293 |
|
---|
294 | redirect($phpbb_root_path . $config['upload_path'] . '/' . $attachment['physical_filename']);
|
---|
295 | file_gc();
|
---|
296 | }
|
---|
297 | else
|
---|
298 | {
|
---|
299 | send_file_to_browser($attachment, $config['upload_path'], $display_cat);
|
---|
300 | file_gc();
|
---|
301 | }
|
---|
302 | }
|
---|
303 |
|
---|
304 |
|
---|
305 | /**
|
---|
306 | * A simplified function to deliver avatars
|
---|
307 | * The argument needs to be checked before calling this function.
|
---|
308 | */
|
---|
309 | function send_avatar_to_browser($file, $browser)
|
---|
310 | {
|
---|
311 | global $config, $phpbb_root_path;
|
---|
312 |
|
---|
313 | $prefix = $config['avatar_salt'] . '_';
|
---|
314 | $image_dir = $config['avatar_path'];
|
---|
315 |
|
---|
316 | // Adjust image_dir path (no trailing slash)
|
---|
317 | if (substr($image_dir, -1, 1) == '/' || substr($image_dir, -1, 1) == '\\')
|
---|
318 | {
|
---|
319 | $image_dir = substr($image_dir, 0, -1) . '/';
|
---|
320 | }
|
---|
321 | $image_dir = str_replace(array('../', '..\\', './', '.\\'), '', $image_dir);
|
---|
322 |
|
---|
323 | if ($image_dir && ($image_dir[0] == '/' || $image_dir[0] == '\\'))
|
---|
324 | {
|
---|
325 | $image_dir = '';
|
---|
326 | }
|
---|
327 | $file_path = $phpbb_root_path . $image_dir . '/' . $prefix . $file;
|
---|
328 |
|
---|
329 | if ((@file_exists($file_path) && @is_readable($file_path)) && !headers_sent())
|
---|
330 | {
|
---|
331 | header('Pragma: public');
|
---|
332 |
|
---|
333 | $image_data = @getimagesize($file_path);
|
---|
334 | header('Content-Type: ' . image_type_to_mime_type($image_data[2]));
|
---|
335 |
|
---|
336 | if (strpos(strtolower($browser), 'msie') !== false && strpos(strtolower($browser), 'msie 8.0') === false)
|
---|
337 | {
|
---|
338 | header('Content-Disposition: attachment; ' . header_filename($file));
|
---|
339 |
|
---|
340 | if (strpos(strtolower($browser), 'msie 6.0') !== false)
|
---|
341 | {
|
---|
342 | header('Expires: -1');
|
---|
343 | }
|
---|
344 | else
|
---|
345 | {
|
---|
346 | header('Expires: ' . gmdate('D, d M Y H:i:s \G\M\T', time() + 31536000));
|
---|
347 | }
|
---|
348 | }
|
---|
349 | else
|
---|
350 | {
|
---|
351 | header('Content-Disposition: inline; ' . header_filename($file));
|
---|
352 | header('Expires: ' . gmdate('D, d M Y H:i:s \G\M\T', time() + 31536000));
|
---|
353 | }
|
---|
354 |
|
---|
355 | $size = @filesize($file_path);
|
---|
356 | if ($size)
|
---|
357 | {
|
---|
358 | header("Content-Length: $size");
|
---|
359 | }
|
---|
360 |
|
---|
361 | if (@readfile($file_path) == false)
|
---|
362 | {
|
---|
363 | $fp = @fopen($file_path, 'rb');
|
---|
364 |
|
---|
365 | if ($fp !== false)
|
---|
366 | {
|
---|
367 | while (!feof($fp))
|
---|
368 | {
|
---|
369 | echo fread($fp, 8192);
|
---|
370 | }
|
---|
371 | fclose($fp);
|
---|
372 | }
|
---|
373 | }
|
---|
374 |
|
---|
375 | flush();
|
---|
376 | }
|
---|
377 | else
|
---|
378 | {
|
---|
379 | header('HTTP/1.0 404 Not Found');
|
---|
380 | }
|
---|
381 | }
|
---|
382 |
|
---|
383 | /**
|
---|
384 | * Wraps an url into a simple html page. Used to display attachments in IE.
|
---|
385 | * this is a workaround for now; might be moved to template system later
|
---|
386 | * direct any complaints to 1 Microsoft Way, Redmond
|
---|
387 | */
|
---|
388 | function wrap_img_in_html($src, $title)
|
---|
389 | {
|
---|
390 | echo '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-Strict.dtd">';
|
---|
391 | echo '<html>';
|
---|
392 | echo '<head>';
|
---|
393 | echo '<meta http-equiv="content-type" content="text/html; charset=UTF-8" />';
|
---|
394 | echo '<title>' . $title . '</title>';
|
---|
395 | echo '</head>';
|
---|
396 | echo '<body>';
|
---|
397 | echo '<div>';
|
---|
398 | echo '<img src="' . $src . '" alt="' . $title . '" />';
|
---|
399 | echo '</div>';
|
---|
400 | echo '</body>';
|
---|
401 | echo '</html>';
|
---|
402 | }
|
---|
403 |
|
---|
404 | /**
|
---|
405 | * Send file to browser
|
---|
406 | */
|
---|
407 | function send_file_to_browser($attachment, $upload_dir, $category)
|
---|
408 | {
|
---|
409 | global $user, $db, $config, $phpbb_root_path;
|
---|
410 |
|
---|
411 | $filename = $phpbb_root_path . $upload_dir . '/' . $attachment['physical_filename'];
|
---|
412 |
|
---|
413 | if (!@file_exists($filename))
|
---|
414 | {
|
---|
415 | trigger_error($user->lang['ERROR_NO_ATTACHMENT'] . '<br /><br />' . sprintf($user->lang['FILE_NOT_FOUND_404'], $filename));
|
---|
416 | }
|
---|
417 |
|
---|
418 | // Correct the mime type - we force application/octetstream for all files, except images
|
---|
419 | // Please do not change this, it is a security precaution
|
---|
420 | if ($category != ATTACHMENT_CATEGORY_IMAGE || strpos($attachment['mimetype'], 'image') !== 0)
|
---|
421 | {
|
---|
422 | $attachment['mimetype'] = (strpos(strtolower($user->browser), 'msie') !== false || strpos(strtolower($user->browser), 'opera') !== false) ? 'application/octetstream' : 'application/octet-stream';
|
---|
423 | }
|
---|
424 |
|
---|
425 | if (@ob_get_length())
|
---|
426 | {
|
---|
427 | @ob_end_clean();
|
---|
428 | }
|
---|
429 |
|
---|
430 | // Now send the File Contents to the Browser
|
---|
431 | $size = @filesize($filename);
|
---|
432 |
|
---|
433 | // To correctly display further errors we need to make sure we are using the correct headers for both (unsetting content-length may not work)
|
---|
434 |
|
---|
435 | // Check if headers already sent or not able to get the file contents.
|
---|
436 | if (headers_sent() || !@file_exists($filename) || !@is_readable($filename))
|
---|
437 | {
|
---|
438 | // PHP track_errors setting On?
|
---|
439 | if (!empty($php_errormsg))
|
---|
440 | {
|
---|
441 | trigger_error($user->lang['UNABLE_TO_DELIVER_FILE'] . '<br />' . sprintf($user->lang['TRACKED_PHP_ERROR'], $php_errormsg));
|
---|
442 | }
|
---|
443 |
|
---|
444 | trigger_error('UNABLE_TO_DELIVER_FILE');
|
---|
445 | }
|
---|
446 |
|
---|
447 | // Now the tricky part... let's dance
|
---|
448 | header('Pragma: public');
|
---|
449 |
|
---|
450 | /**
|
---|
451 | * Commented out X-Sendfile support. To not expose the physical filename within the header if xsendfile is absent we need to look into methods of checking it's status.
|
---|
452 | *
|
---|
453 | * Try X-Sendfile since it is much more server friendly - only works if the path is *not* outside of the root path...
|
---|
454 | * lighttpd has core support for it. An apache2 module is available at http://celebnamer.celebworld.ws/stuff/mod_xsendfile/
|
---|
455 | *
|
---|
456 | * Not really ideal, but should work fine...
|
---|
457 | * <code>
|
---|
458 | * if (strpos($upload_dir, '/') !== 0 && strpos($upload_dir, '../') === false)
|
---|
459 | * {
|
---|
460 | * header('X-Sendfile: ' . $filename);
|
---|
461 | * }
|
---|
462 | * </code>
|
---|
463 | */
|
---|
464 |
|
---|
465 | // Send out the Headers. Do not set Content-Disposition to inline please, it is a security measure for users using the Internet Explorer.
|
---|
466 | $is_ie8 = (strpos(strtolower($user->browser), 'msie 8.0') !== false);
|
---|
467 | header('Content-Type: ' . $attachment['mimetype']);
|
---|
468 |
|
---|
469 | if ($is_ie8)
|
---|
470 | {
|
---|
471 | header('X-Content-Type-Options: nosniff');
|
---|
472 | }
|
---|
473 |
|
---|
474 | if ($category == ATTACHMENT_CATEGORY_FLASH && request_var('view', 0) === 1)
|
---|
475 | {
|
---|
476 | // We use content-disposition: inline for flash files and view=1 to let it correctly play with flash player 10 - any other disposition will fail to play inline
|
---|
477 | header('Content-Disposition: inline');
|
---|
478 | }
|
---|
479 | else
|
---|
480 | {
|
---|
481 | if (empty($user->browser) || (!$is_ie8 && (strpos(strtolower($user->browser), 'msie') !== false)))
|
---|
482 | {
|
---|
483 | header('Content-Disposition: attachment; ' . header_filename(htmlspecialchars_decode($attachment['real_filename'])));
|
---|
484 | if (empty($user->browser) || (strpos(strtolower($user->browser), 'msie 6.0') !== false))
|
---|
485 | {
|
---|
486 | header('expires: -1');
|
---|
487 | }
|
---|
488 | }
|
---|
489 | else
|
---|
490 | {
|
---|
491 | header('Content-Disposition: ' . ((strpos($attachment['mimetype'], 'image') === 0) ? 'inline' : 'attachment') . '; ' . header_filename(htmlspecialchars_decode($attachment['real_filename'])));
|
---|
492 | if ($is_ie8 && (strpos($attachment['mimetype'], 'image') !== 0))
|
---|
493 | {
|
---|
494 | header('X-Download-Options: noopen');
|
---|
495 | }
|
---|
496 | }
|
---|
497 | }
|
---|
498 |
|
---|
499 | if ($size)
|
---|
500 | {
|
---|
501 | header("Content-Length: $size");
|
---|
502 | }
|
---|
503 |
|
---|
504 | // Close the db connection before sending the file
|
---|
505 | $db->sql_close();
|
---|
506 |
|
---|
507 | if (!set_modified_headers($attachment['filetime'], $user->browser))
|
---|
508 | {
|
---|
509 | // Try to deliver in chunks
|
---|
510 | @set_time_limit(0);
|
---|
511 |
|
---|
512 | $fp = @fopen($filename, 'rb');
|
---|
513 |
|
---|
514 | if ($fp !== false)
|
---|
515 | {
|
---|
516 | while (!feof($fp))
|
---|
517 | {
|
---|
518 | echo fread($fp, 8192);
|
---|
519 | }
|
---|
520 | fclose($fp);
|
---|
521 | }
|
---|
522 | else
|
---|
523 | {
|
---|
524 | @readfile($filename);
|
---|
525 | }
|
---|
526 |
|
---|
527 | flush();
|
---|
528 | }
|
---|
529 | file_gc();
|
---|
530 | }
|
---|
531 |
|
---|
532 | /**
|
---|
533 | * Get a browser friendly UTF-8 encoded filename
|
---|
534 | */
|
---|
535 | function header_filename($file)
|
---|
536 | {
|
---|
537 | $user_agent = (!empty($_SERVER['HTTP_USER_AGENT'])) ? htmlspecialchars((string) $_SERVER['HTTP_USER_AGENT']) : '';
|
---|
538 |
|
---|
539 | // There be dragons here.
|
---|
540 | // Not many follows the RFC...
|
---|
541 | if (strpos($user_agent, 'MSIE') !== false || strpos($user_agent, 'Safari') !== false || strpos($user_agent, 'Konqueror') !== false)
|
---|
542 | {
|
---|
543 | return "filename=" . rawurlencode($file);
|
---|
544 | }
|
---|
545 |
|
---|
546 | // follow the RFC for extended filename for the rest
|
---|
547 | return "filename*=UTF-8''" . rawurlencode($file);
|
---|
548 | }
|
---|
549 |
|
---|
550 | /**
|
---|
551 | * Check if downloading item is allowed
|
---|
552 | */
|
---|
553 | function download_allowed()
|
---|
554 | {
|
---|
555 | global $config, $user, $db;
|
---|
556 |
|
---|
557 | if (!$config['secure_downloads'])
|
---|
558 | {
|
---|
559 | return true;
|
---|
560 | }
|
---|
561 |
|
---|
562 | $url = (!empty($_SERVER['HTTP_REFERER'])) ? trim($_SERVER['HTTP_REFERER']) : trim(getenv('HTTP_REFERER'));
|
---|
563 |
|
---|
564 | if (!$url)
|
---|
565 | {
|
---|
566 | return ($config['secure_allow_empty_referer']) ? true : false;
|
---|
567 | }
|
---|
568 |
|
---|
569 | // Split URL into domain and script part
|
---|
570 | $url = @parse_url($url);
|
---|
571 |
|
---|
572 | if ($url === false)
|
---|
573 | {
|
---|
574 | return ($config['secure_allow_empty_referer']) ? true : false;
|
---|
575 | }
|
---|
576 |
|
---|
577 | $hostname = $url['host'];
|
---|
578 | unset($url);
|
---|
579 |
|
---|
580 | $allowed = ($config['secure_allow_deny']) ? false : true;
|
---|
581 | $iplist = array();
|
---|
582 |
|
---|
583 | if (($ip_ary = @gethostbynamel($hostname)) !== false)
|
---|
584 | {
|
---|
585 | foreach ($ip_ary as $ip)
|
---|
586 | {
|
---|
587 | if ($ip)
|
---|
588 | {
|
---|
589 | $iplist[] = $ip;
|
---|
590 | }
|
---|
591 | }
|
---|
592 | }
|
---|
593 |
|
---|
594 | // Check for own server...
|
---|
595 | $server_name = $user->host;
|
---|
596 |
|
---|
597 | // Forcing server vars is the only way to specify/override the protocol
|
---|
598 | if ($config['force_server_vars'] || !$server_name)
|
---|
599 | {
|
---|
600 | $server_name = $config['server_name'];
|
---|
601 | }
|
---|
602 |
|
---|
603 | if (preg_match('#^.*?' . preg_quote($server_name, '#') . '.*?$#i', $hostname))
|
---|
604 | {
|
---|
605 | $allowed = true;
|
---|
606 | }
|
---|
607 |
|
---|
608 | // Get IP's and Hostnames
|
---|
609 | if (!$allowed)
|
---|
610 | {
|
---|
611 | $sql = 'SELECT site_ip, site_hostname, ip_exclude
|
---|
612 | FROM ' . SITELIST_TABLE;
|
---|
613 | $result = $db->sql_query($sql);
|
---|
614 |
|
---|
615 | while ($row = $db->sql_fetchrow($result))
|
---|
616 | {
|
---|
617 | $site_ip = trim($row['site_ip']);
|
---|
618 | $site_hostname = trim($row['site_hostname']);
|
---|
619 |
|
---|
620 | if ($site_ip)
|
---|
621 | {
|
---|
622 | foreach ($iplist as $ip)
|
---|
623 | {
|
---|
624 | if (preg_match('#^' . str_replace('\*', '.*?', preg_quote($site_ip, '#')) . '$#i', $ip))
|
---|
625 | {
|
---|
626 | if ($row['ip_exclude'])
|
---|
627 | {
|
---|
628 | $allowed = ($config['secure_allow_deny']) ? false : true;
|
---|
629 | break 2;
|
---|
630 | }
|
---|
631 | else
|
---|
632 | {
|
---|
633 | $allowed = ($config['secure_allow_deny']) ? true : false;
|
---|
634 | }
|
---|
635 | }
|
---|
636 | }
|
---|
637 | }
|
---|
638 |
|
---|
639 | if ($site_hostname)
|
---|
640 | {
|
---|
641 | if (preg_match('#^' . str_replace('\*', '.*?', preg_quote($site_hostname, '#')) . '$#i', $hostname))
|
---|
642 | {
|
---|
643 | if ($row['ip_exclude'])
|
---|
644 | {
|
---|
645 | $allowed = ($config['secure_allow_deny']) ? false : true;
|
---|
646 | break;
|
---|
647 | }
|
---|
648 | else
|
---|
649 | {
|
---|
650 | $allowed = ($config['secure_allow_deny']) ? true : false;
|
---|
651 | }
|
---|
652 | }
|
---|
653 | }
|
---|
654 | }
|
---|
655 | $db->sql_freeresult($result);
|
---|
656 | }
|
---|
657 |
|
---|
658 | return $allowed;
|
---|
659 | }
|
---|
660 |
|
---|
661 | /**
|
---|
662 | * Check if the browser has the file already and set the appropriate headers-
|
---|
663 | * @returns false if a resend is in order.
|
---|
664 | */
|
---|
665 | function set_modified_headers($stamp, $browser)
|
---|
666 | {
|
---|
667 | // let's see if we have to send the file at all
|
---|
668 | $last_load = isset($_SERVER['HTTP_IF_MODIFIED_SINCE']) ? strtotime(trim($_SERVER['HTTP_IF_MODIFIED_SINCE'])) : false;
|
---|
669 | if ((strpos(strtolower($browser), 'msie 6.0') === false) && (strpos(strtolower($browser), 'msie 8.0') === false))
|
---|
670 | {
|
---|
671 | if ($last_load !== false && $last_load >= $stamp)
|
---|
672 | {
|
---|
673 | if (substr(strtolower(@php_sapi_name()),0,3) === 'cgi')
|
---|
674 | {
|
---|
675 | // in theory, we shouldn't need that due to php doing it. Reality offers a differing opinion, though
|
---|
676 | header('Status: 304 Not Modified', true, 304);
|
---|
677 | }
|
---|
678 | else
|
---|
679 | {
|
---|
680 | header('HTTP/1.0 304 Not Modified', true, 304);
|
---|
681 | }
|
---|
682 | // seems that we need those too ... browsers
|
---|
683 | header('Pragma: public');
|
---|
684 | header('Expires: ' . gmdate('D, d M Y H:i:s \G\M\T', time() + 31536000));
|
---|
685 | return true;
|
---|
686 | }
|
---|
687 | else
|
---|
688 | {
|
---|
689 | header('Last-Modified: ' . gmdate('D, d M Y H:i:s', $stamp) . ' GMT');
|
---|
690 | }
|
---|
691 | }
|
---|
692 | return false;
|
---|
693 | }
|
---|
694 |
|
---|
695 | function file_gc()
|
---|
696 | {
|
---|
697 | global $cache, $db;
|
---|
698 | if (!empty($cache))
|
---|
699 | {
|
---|
700 | $cache->unload();
|
---|
701 | }
|
---|
702 | $db->sql_close();
|
---|
703 | exit;
|
---|
704 | }
|
---|
705 |
|
---|
706 | ?>
|
---|