diff --git a/post.php b/post.php index 7c506ab47..17822f9d7 100644 --- a/post.php +++ b/post.php @@ -5,55 +5,213 @@ require "./inc/functions.php"; require "./inc/anti-bot.php"; -// Fix for magic quotes -if (function_exists('get_magic_quotes_gpc') && get_magic_quotes_gpc()) { - function strip_array($var) { - return is_array($var) ? array_map('strip_array', $var) : stripslashes($var); +if ((!isset($_POST['mod']) || !$_POST['mod']) && $config['board_locked']) { + error("Board is locked"); +} + +$dropped_post = false; + +// Is it a post coming from NNTP? Let's extract it and pretend it's a normal post. +if (isset($_GET['Newsgroups']) && $config['nntpchan']['enabled']) { + if ($_SERVER['REMOTE_ADDR'] != $config['nntpchan']['trusted_peer']) { + error("NNTPChan: Forbidden. $_SERVER[REMOTE_ADDR] is not a trusted peer"); + } + + $_POST = array(); + $_POST['json_response'] = true; + + $headers = json_encode($_GET); + + if (!isset ($_GET['Message-Id'])) { + if (!isset ($_GET['Message-ID'])) { + error("NNTPChan: No message ID"); + } + else $msgid = $_GET['Message-ID']; + } + else $msgid = $_GET['Message-Id']; + + $groups = preg_split("/,\s*/", $_GET['Newsgroups']); + if (count($groups) != 1) { + error("NNTPChan: Messages can go to only one newsgroup"); + } + $group = $groups[0]; + + if (!isset($config['nntpchan']['dispatch'][$group])) { + error("NNTPChan: We don't synchronize $group"); + } + $xboard = $config['nntpchan']['dispatch'][$group]; + + $ref = null; + if (isset ($_GET['References'])) { + $refs = preg_split("/,\s*/", $_GET['References']); + + if (count($refs) > 1) { + error("NNTPChan: We don't support multiple references"); + } + + $ref = $refs[0]; + + $query = prepare("SELECT `board`,`id` FROM ``nntp_references`` WHERE `message_id` = :ref"); + $query->bindValue(':ref', $ref); + $query->execute() or error(db_error($query)); + + $ary = $query->fetchAll(PDO::FETCH_ASSOC); + + if (count($ary) == 0) { + error("NNTPChan: We don't have $ref that $msgid references"); + } + + $p_id = $ary[0]['id']; + $p_board = $ary[0]['board']; + + if ($p_board != $xboard) { + error("NNTPChan: Cross board references not allowed. Tried to reference $p_board on $xboard"); + } + + $_POST['thread'] = $p_id; + } + + $date = isset($_GET['Date']) ? strtotime($_GET['Date']) : time(); + + list($ct) = explode('; ', $_GET['Content-Type']); + + $query = prepare("SELECT COUNT(*) AS `c` FROM ``nntp_references`` WHERE `message_id` = :msgid"); + $query->bindValue(":msgid", $msgid); + $query->execute() or error(db_error($query)); + + $a = $query->fetch(PDO::FETCH_ASSOC); + if ($a['c'] > 0) { + error("NNTPChan: We already have this post. Post discarded."); + } + + if ($ct == 'text/plain') { + $content = file_get_contents("php://input"); } + elseif ($ct == 'multipart/mixed' || $ct == 'multipart/form-data') { + _syslog(LOG_INFO, "MM: Files: ".print_r($GLOBALS, true)); // Debug - $_GET = strip_array($_GET); - $_POST = strip_array($_POST); + $content = ''; + + $newfiles = array(); + foreach ($_FILES['attachment']['error'] as $id => $error) { + if ($_FILES['attachment']['type'][$id] == 'text/plain') { + $content .= file_get_contents($_FILES['attachment']['tmp_name'][$id]); + } + elseif ($_FILES['attachment']['type'][$id] == 'message/rfc822') { // Signed message, ignore for now + } + else { // A real attachment :^) + $file = array(); + $file['name'] = $_FILES['attachment']['name'][$id]; + $file['type'] = $_FILES['attachment']['type'][$id]; + $file['size'] = $_FILES['attachment']['size'][$id]; + $file['tmp_name'] = $_FILES['attachment']['tmp_name'][$id]; + $file['error'] = $_FILES['attachment']['error'][$id]; + + $newfiles["file$id"] = $file; + } + } + + $_FILES = $newfiles; + } + else { + error("NNTPChan: Wrong mime type: $ct"); + } + + $_POST['subject'] = isset($_GET['Subject']) ? ($_GET['Subject'] == 'None' ? '' : $_GET['Subject']) : ''; + $_POST['board'] = $xboard; + + if (isset ($_GET['From'])) { + list($name, $mail) = explode(" <", $_GET['From'], 2); + $mail = preg_replace('/>\s+$/', '', $mail); + + $_POST['name'] = $name; + //$_POST['email'] = $mail; + $_POST['email'] = ''; + } + + if (isset ($_GET['X_Sage'])) { + $_POST['email'] = 'sage'; + } + + $content = preg_replace_callback('/>>([0-9a-fA-F]{6,})/', function($id) use ($xboard) { + $id = $id[1]; + + $query = prepare("SELECT `board`,`id` FROM ``nntp_references`` WHERE `message_id_digest` LIKE :rule"); + $idx = $id . "%"; + $query->bindValue(':rule', $idx); + $query->execute() or error(db_error($query)); + + $ary = $query->fetchAll(PDO::FETCH_ASSOC); + if (count($ary) == 0) { + return ">>>>$id"; + } + else { + $ret = array(); + foreach ($ary as $v) { + if ($v['board'] != $xboard) { + $ret[] = ">>>/".$v['board']."/".$v['id']; + } + else { + $ret[] = ">>".$v['id']; + } + } + return implode($ret, ", "); + } + }, $content); + + $_POST['body'] = $content; + + $dropped_post = array( + 'date' => $date, + 'board' => $xboard, + 'msgid' => $msgid, + 'headers' => $headers, + 'from_nntp' => true, + ); +} +elseif (isset($_GET['Newsgroups'])) { + error("NNTPChan: NNTPChan support is disabled"); } if (isset($_POST['delete'])) { // Delete - + if (!isset($_POST['board'], $_POST['password'])) error($config['error']['bot']); - + $password = &$_POST['password']; - + if ($password == '') error($config['error']['invalidpassword']); - + $delete = array(); foreach ($_POST as $post => $value) { if (preg_match('/^delete_(\d+)$/', $post, $m)) { $delete[] = (int)$m[1]; } } - + if (checkDNSBL()) error("Tor users may not delete posts."); - + // Check if board exists if (!openBoard($_POST['board'])) error($config['error']['noboard']); - + // Check if banned checkBan($board['uri']); // Check if deletion enabled if (!$config['allow_delete']) error(_('Users are not allowed to delete their own posts on this board.')); - + if (empty($delete)) error($config['error']['nodelete']); - + foreach ($delete as &$id) { $query = prepare(sprintf("SELECT `thread`, `time`,`password` FROM ``posts_%s`` WHERE `id` = :id", $board['uri'])); $query->bindValue(':id', $id, PDO::PARAM_INT); $query->execute() or error(db_error($query)); - + if ($post = $query->fetch(PDO::FETCH_ASSOC)) { $thread = false; if ($config['user_moderation'] && $post['thread']) { @@ -61,16 +219,21 @@ function strip_array($var) { $thread_query->bindValue(':id', $post['thread'], PDO::PARAM_INT); $thread_query->execute() or error(db_error($query)); - $thread = $thread_query->fetch(PDO::FETCH_ASSOC); + $thread = $thread_query->fetch(PDO::FETCH_ASSOC); } + + + $salt = $post['time'] . $board['uri']; + $password = hash_pbkdf2("sha256", $password, $salt, 10000, 20); + if ($password != '' && $post['password'] != $password && (!$thread || $thread['password'] != $password)) error($config['error']['invalidpassword']); - + if ($post['time'] > time() - $config['delete_time'] && (!$thread || $thread['password'] != $password)) { error(sprintf($config['error']['delete_too_soon'], until($post['time'] + $config['delete_time']))); } - + if (isset($_POST['file'])) { // Delete just the file deleteFile($id); @@ -80,13 +243,13 @@ function strip_array($var) { deletePost($id); modLog("User deleted his own post #$id"); } - + _syslog(LOG_INFO, 'Deleted post: ' . '/' . $board['dir'] . $config['dir']['res'] . sprintf($config['file_page'], $post['thread'] ? $post['thread'] : $id) . ($post['thread'] ? '#' . $id : '') ); } } - + buildIndex(); $is_mod = isset($_POST['mod']) && $_POST['mod']; @@ -108,26 +271,26 @@ function strip_array($var) { } elseif (isset($_POST['report'])) { if (!isset($_POST['board'], $_POST['reason'])) error($config['error']['bot']); - + $report = array(); foreach ($_POST as $post => $value) { if (preg_match('/^delete_(\d+)$/', $post, $m)) { $report[] = (int)$m[1]; } } - + if (checkDNSBL()) error("Tor users may not report posts."); - + // Check if board exists if (!openBoard($_POST['board'])) error($config['error']['noboard']); - + // Check if banned checkBan($board['uri']); - + if (empty($report)) error($config['error']['noreport']); - + if (count($report) > $config['report_limit']) error($config['error']['toomanyreports']); @@ -147,7 +310,7 @@ function strip_array($var) { $error = $config['error']['captcha']; } } - + if (isset($error)) { if ($config['report_captcha']) { $captcha = generate_captcha($config['captcha']['extra']); @@ -159,10 +322,10 @@ function strip_array($var) { echo Element('page.html', ['config' => $config, 'body' => $body]); die(); } - + $reason = escape_markup_modifiers($_POST['reason']); markup($reason); - + foreach ($report as &$id) { $query = prepare( "SELECT @@ -177,21 +340,21 @@ function strip_array($var) { ); $query->bindValue(':id', $id, PDO::PARAM_INT); $query->execute() or error(db_error($query)); - + if( $post = $query->fetch(PDO::FETCH_ASSOC) ) { $report_local = !$post['clean_local']; $report_global = isset($_POST['global']) && !$post['clean_global']; - + if( $report_local || $report_global ) { $thread = $post['thread']; - + if ($config['syslog']) { _syslog(LOG_INFO, 'Reported post: ' . '/' . $board['dir'] . $config['dir']['res'] . sprintf($config['file_page'], $thread ? $thread : $id) . ($thread ? '#' . $id : '') . ' for "' . $reason . '"' ); } - + $query = prepare("INSERT INTO `reports` (`time`, `ip`, `board`, `post`, `reason`, `local`, `global`) VALUES (:time, :ip, :board, :post, :reason, :local, :global)"); $query->bindValue(':time', time(), PDO::PARAM_INT); $query->bindValue(':ip', $_SERVER['REMOTE_ADDR'], PDO::PARAM_STR); @@ -204,10 +367,10 @@ function strip_array($var) { } } } - + $is_mod = isset($_POST['mod']) && $_POST['mod']; $root = $is_mod ? $config['root'] . $config['file_mod'] . '?/' : $config['root']; - + if (!isset($_POST['json_response'])) { $index = $root . $board['dir'] . $config['file_index']; echo Element('page.html', array('config' => $config, 'body' => '
[ ' . _('Close window') ." ] [ " . _('Return') . ' ]
', 'title' => _('Report submitted!'))); @@ -215,135 +378,137 @@ function strip_array($var) { header('Content-Type: text/json'); echo json_encode(array('success' => true)); } -} -elseif (isset($_POST['post'])) { - if (!isset($_POST['body'], $_POST['board'])) { +} elseif (isset($_POST['post']) || $dropped_post) { + if ((!isset($_POST['body'], $_POST['board'], $_POST['message']) || $_POST['message'] != '') && !$dropped_post) { error($config['error']['bot']); } - + $post = array( 'board' => $_POST['board'], 'files' => array(), 'time' => time(), // Timezone independent UNIX timecode. ); - + // Check if board exists if (!openBoard($post['board'])) error($config['error']['noboard']); - + if (!isset($_POST['name'])) $_POST['name'] = $config['anonymous']; - + if (!isset($_POST['email'])) $_POST['email'] = ''; - + if (!isset($_POST['subject'])) $_POST['subject'] = ''; - + if (!isset($_POST['password'])) $_POST['password'] = ''; - + if (isset($_POST['thread'])) { $post['op'] = false; $post['thread'] = round($_POST['thread']); } else $post['op'] = true; - // The dnsbls is an optional DNS blacklist include. - // Squelch warnings if it doesn't exist. - if (!$config['captcha']['enabled'] && !($post['op'] && $config['new_thread_capt'])) { - if (file_exists('inc/dnsbls.php')) { - include "./inc/dnsbls.php"; + if (!$dropped_post) { + // The dnsbls is an optional DNS blacklist include. + // Squelch warnings if it doesn't exist. + if (!$config['captcha']['enabled'] && !($post['op'] && $config['new_thread_capt'])) { + @include "./inc/dnsbls.php"; } - } - // Check if banned - checkBan($board['uri']); - - // Check for CAPTCHA right after opening the board so the "return" link is in there - if ($config['recaptcha']) { - if (!isset($_POST['recaptcha_challenge_field']) || !isset($_POST['recaptcha_response_field'])) - error($config['error']['bot']); - // Check what reCAPTCHA has to say... - $resp = recaptcha_check_answer($config['recaptcha_private'], - $_SERVER['REMOTE_ADDR'], - $_POST['recaptcha_challenge_field'], - $_POST['recaptcha_response_field']); - if (!$resp->is_valid) { - error($config['error']['captcha']); + // Check if banned + checkBan($board['uri']); + + // Check for CAPTCHA right after opening the board so the "return" link is in there + if ($config['recaptcha']) { + if (!isset($_POST['recaptcha_challenge_field']) || !isset($_POST['recaptcha_response_field'])) + error($config['error']['bot']); + // Check what reCAPTCHA has to say... + $resp = recaptcha_check_answer($config['recaptcha_private'], + $_SERVER['REMOTE_ADDR'], + $_POST['recaptcha_challenge_field'], + $_POST['recaptcha_response_field']); + if (!$resp->is_valid) { + error($config['error']['captcha']); + } } - } - - // Same, but now with our custom captcha provider - //if ($config['captcha']['enabled']) { - //New thread captcha - if (($config['captcha']['enabled']) || (($post['op']) && ($config['new_thread_capt'])) ) { - $resp = file_get_contents($config['captcha']['provider_check'] . "?" . http_build_query([ - 'mode' => 'check', - 'text' => $_POST['captcha_text'], - 'extra' => $config['captcha']['extra'], - 'cookie' => $_POST['captcha_cookie'] - ])); - if ($resp !== '1') { - error($config['error']['captcha'] . - ''); + // Same, but now with our custom captcha provider + //if ($config['captcha']['enabled']) { + //New thread captcha + if (($config['captcha']['enabled']) || (($post['op']) && ($config['new_thread_capt'])) ) { + $resp = file_get_contents($config['captcha']['provider_check'] . "?" . http_build_query([ + 'mode' => 'check', + 'text' => $_POST['captcha_text'], + 'extra' => $config['captcha']['extra'], + 'cookie' => $_POST['captcha_cookie'] + ])); + + if ($resp !== '1') { + error($config['error']['captcha'] . + ''); + } } - } - - //if (!(($post['op'] && $_POST['post'] == $config['button_newtopic']) || - //(!$post['op'] && $_POST['post'] == $config['button_reply']))) - //error($config['error']['bot']); - // Check the referrer - if ($config['referer_match'] !== false && - (!isset($_SERVER['HTTP_REFERER']) || !preg_match($config['referer_match'], rawurldecode($_SERVER['HTTP_REFERER'])))) { - error($config['error']['referer']); - } - - if ($post['mod'] = isset($_POST['mod']) && $_POST['mod']) { - check_login(false); - if (!$mod) { - // Liar. You're not a mod. - error($config['error']['notamod']); + //if (!(($post['op'] && $_POST['post'] == $config['button_newtopic']) || + //(!$post['op'] && $_POST['post'] == $config['button_reply']))) + //error($config['error']['bot']); + + // Check the referrer + // if ($config['referer_match'] !== false && + // (!isset($_SERVER['HTTP_REFERER']) || !preg_match($config['referer_match'], rawurldecode($_SERVER['HTTP_REFERER'])))) { + // error($config['error']['referer']); + // } + + if ($post['mod'] = isset($_POST['mod']) && $_POST['mod']) { + check_login(false); + if (!$mod) { + // Liar. You're not a mod. + error($config['error']['notamod']); + } + + $post['sticky'] = $post['op'] && isset($_POST['sticky']); + $post['locked'] = $post['op'] && isset($_POST['lock']); + $post['raw'] = isset($_POST['raw']); + + if ($post['sticky'] && !hasPermission($config['mod']['sticky'], $board['uri'])) + error($config['error']['noaccess']); + if ($post['locked'] && !hasPermission($config['mod']['lock'], $board['uri'])) + error($config['error']['noaccess']); + if ($post['raw'] && !hasPermission($config['mod']['rawhtml'], $board['uri'])) + error($config['error']['noaccess']); + } + + if (!$post['mod']) { + $post['antispam_hash'] = checkSpam(array($board['uri'], isset($post['thread']) ? $post['thread'] : ($config['try_smarter'] && isset($_POST['page']) ? 0 - (int)$_POST['page'] : null))); + if ($post['antispam_hash'] === true && $config['enable_antibot']) + error($config['error']['spam']); } - $post['sticky'] = $post['op'] && isset($_POST['sticky']); - $post['locked'] = $post['op'] && isset($_POST['lock']); - $post['raw'] = isset($_POST['raw']); - - if ($post['sticky'] && !hasPermission($config['mod']['sticky'], $board['uri'])) - error($config['error']['noaccess']); - if ($post['locked'] && !hasPermission($config['mod']['lock'], $board['uri'])) - error($config['error']['noaccess']); - if ($post['raw'] && !hasPermission($config['mod']['rawhtml'], $board['uri'])) - error($config['error']['noaccess']); - } - - if (!$post['mod']) { - $post['antispam_hash'] = checkSpam(array($board['uri'], isset($post['thread']) ? $post['thread'] : ($config['try_smarter'] && isset($_POST['page']) ? 0 - (int)$_POST['page'] : null))); - if ($post['antispam_hash'] === true && $config['enable_antibot']) - error($config['error']['spam']); + if ($config['robot_enable'] && $config['robot_mute']) { + checkMute(); + } } - - if ($config['robot_enable'] && $config['robot_mute']) { - checkMute(); + else { + $mod = $post['mod'] = false; } - + //Check if thread exists if (!$post['op']) { $query = prepare(sprintf("SELECT `sticky`,`locked`,`cycle`,`sage` FROM ``posts_%s`` WHERE `id` = :id AND `thread` IS NULL LIMIT 1", $board['uri'])); $query->bindValue(':id', $post['thread'], PDO::PARAM_INT); $query->execute() or error(db_error()); - + if (!$thread = $query->fetch(PDO::FETCH_ASSOC)) { // Non-existant error($config['error']['nonexistant']); } } - - + + // Check for an embed field if ($config['enable_embedding'] && isset($_POST['embed']) && !empty($_POST['embed'])) { // yep; validate it @@ -363,7 +528,7 @@ function strip_array($var) { if ($config['image_reject_repost']) { if ($p = getPostByEmbed($post['embed'])) { - error(sprintf($config['error']['fileexists'], + error(sprintf($config['error']['fileexists'], ($post['mod'] ? $config['root'] . $config['file_mod'] . '?/' : $config['root']) . ($board['dir'] . $config['dir']['res'] . ($p['thread'] ? @@ -375,7 +540,7 @@ function strip_array($var) { } } else if (!$post['op'] && $config['image_reject_repost_in_thread']) { if ($p = getPostByEmbedInThread($post['embed'], $post['thread'])) { - error(sprintf($config['error']['fileexistsinthread'], + error(sprintf($config['error']['fileexistsinthread'], ($post['mod'] ? $config['root'] . $config['file_mod'] . '?/' : $config['root']) . ($board['dir'] . $config['dir']['res'] . ($p['thread'] ? @@ -387,29 +552,29 @@ function strip_array($var) { } } } - + if (!hasPermission($config['mod']['bypass_field_disable'], $board['uri'])) { if ($config['field_disable_name']) $_POST['name'] = $config['anonymous']; // "forced anonymous" - + if ($config['field_disable_email']) $_POST['email'] = ''; if ($config['field_email_selectbox'] && $_POST['email'] != 'sage') $_POST['email'] = ''; - + if ($config['field_disable_password']) $_POST['password'] = ''; - + if ($config['field_disable_subject'] || (!$post['op'] && $config['field_disable_reply_subject'])) $_POST['subject'] = ''; } - + if ($config['allow_upload_by_url'] && isset($_POST['file_url']) && !empty($_POST['file_url'])) { $post['file_url'] = $_POST['file_url']; if (!preg_match('@^https?://@', $post['file_url'])) error($config['error']['invalidimg']); - + if (mb_strpos($post['file_url'], '?') !== false) $url_without_params = mb_substr($post['file_url'], 0, mb_strpos($post['file_url'], '?')); else @@ -430,9 +595,9 @@ function unlink_tmp_file($file) { fatal_error_handler(); } register_shutdown_function('unlink_tmp_file', $post['file_tmp']); - + $fp = fopen($post['file_tmp'], 'w'); - + $curl = curl_init(); curl_setopt($curl, CURLOPT_URL, $post['file_url']); curl_setopt($curl, CURLOPT_FAILONERROR, true); @@ -443,12 +608,12 @@ function unlink_tmp_file($file) { curl_setopt($curl, CURLOPT_BINARYTRANSFER, true); curl_setopt($curl, CURLOPT_FILE, $fp); curl_setopt($curl, CURLOPT_PROTOCOLS, CURLPROTO_HTTP | CURLPROTO_HTTPS); - + if (curl_exec($curl) === false) error($config['error']['nomove'] . '
Curl says: ' . curl_error($curl)); - + curl_close($curl); - + fclose($fp); $_FILES['file'] = array( @@ -459,7 +624,7 @@ function unlink_tmp_file($file) { 'size' => filesize($post['file_tmp']) ); } - + $post['name'] = $_POST['name'] != '' ? $_POST['name'] : $config['anonymous']; $post['subject'] = $_POST['subject']; $post['email'] = str_replace(' ', '%20', htmlspecialchars($_POST['email'])); @@ -471,54 +636,61 @@ function unlink_tmp_file($file) { $post['email'] = 'sage'; } } - + $post['body'] = $_POST['body']; $post['password'] = $_POST['password']; - $post['has_file'] = (!isset($post['embed']) && (($post['op'] && !isset($post['no_longer_require_an_image_for_op']) && $config['force_image_op']) || !empty($_FILES['file']['name']))); - - // Handle our Tor users - $tor = checkDNSBL(); - if ($tor && !(isset($_SERVER['HTTP_X_TOR'], $_SERVER['REMOTE_ADDR']) && $_SERVER['REMOTE_ADDR'] == '127.0.0.2' && $_SERVER['HTTP_X_TOR'] = 'true')) - error('To post on 8chan over Tor, you must use the hidden service for security reasons. You can find it at http://fullchan4jtta4sx.onion.'); - if ($tor && $post['has_file'] && !$config['tor_image_posting']) - error('Sorry. Tor users can\'t upload files on this board.'); - if ($tor && !$config['tor_posting']) - error('Sorry. The owner of this board has decided not to allow Tor posters for some reason...'); - - if ($post['has_file'] && $config['disable_images']) { - error($config['error']['images_disabled']); - } - - if (!($post['has_file'] || isset($post['embed'])) || (($post['op'] && $config['force_body_op']) || (!$post['op'] && $config['force_body']))) { - // http://stackoverflow.com/a/4167053 - $stripped_whitespace = preg_replace('/^[\pZ\pC]+|[\pZ\pC]+$/u', '', $post['body']); - if ($stripped_whitespace == '') { - error($config['error']['tooshort_body']); + $post['has_file'] = (!isset($post['embed']) && (($post['op'] && !isset($post['no_longer_require_an_image_for_op']) && $config['force_image_op']) || count($_FILES) > 0)); + + if (!$dropped_post) { + // Handle our Tor users + $tor = checkDNSBL(); + if ($tor && !(isset($_SERVER['HTTP_X_TOR'], $_SERVER['REMOTE_ADDR']) && $_SERVER['REMOTE_ADDR'] == '127.0.0.2' && $_SERVER['HTTP_X_TOR'] = 'true')) + error('To post on 8chan over Tor, you must use the hidden service for security reasons. You can find it at http://8ch.vichandcxw4gm3wy.onion/.'); + if ($tor && $post['has_file'] && !$config['tor_image_posting']) + error('Sorry. Tor users can\'t upload files on this board.'); + if ($tor && !$config['tor_posting']) + error('Sorry. The owner of this board has decided not to allow Tor posters for some reason...'); + + if ($post['has_file'] && $config['disable_images']) { + error($config['error']['images_disabled']); + } + + if (!($post['has_file'] || isset($post['embed'])) || (($post['op'] && $config['force_body_op']) || (!$post['op'] && $config['force_body']))) { + // http://stackoverflow.com/a/4167053 + $stripped_whitespace = preg_replace('/^[\pZ\pC]+|[\pZ\pC]+$/u', '', $post['body']); + if ($stripped_whitespace == '') { + error($config['error']['tooshort_body']); + } } - } - if ($config['force_subject_op'] && $post['op']) { - $stripped_whitespace = preg_replace('/^[\pZ\pC]+|[\pZ\pC]+$/u', '', $post['subject']); - if ($stripped_whitespace == '') { - error(_('It is required to enter a subject when starting a new thread on this board.')); + if ($config['force_subject_op'] && $post['op']) { + $stripped_whitespace = preg_replace('/^[\pZ\pC]+|[\pZ\pC]+$/u', '', $post['subject']); + if ($stripped_whitespace == '') { + error(_('It is required to enter a subject when starting a new thread on this board.')); + } + } + + if (!$post['op']) { + // Check if thread is locked + // but allow mods to post + if ($thread['locked'] && !hasPermission($config['mod']['postinlocked'], $board['uri'])) + error($config['error']['locked']); + + $numposts = numPosts($post['thread']); + + if ($config['reply_hard_limit'] != 0 && $config['reply_hard_limit'] <= $numposts['replies']) + error($config['error']['reply_hard_limit']); + + if ($post['has_file'] && $config['image_hard_limit'] != 0 && $config['image_hard_limit'] <= $numposts['images']) + error($config['error']['image_hard_limit']); } } - - if (!$post['op']) { - // Check if thread is locked - // but allow mods to post - if ($thread['locked'] && !hasPermission($config['mod']['postinlocked'], $board['uri'])) - error($config['error']['locked']); - - $numposts = numPosts($post['thread']); - - if ($config['reply_hard_limit'] != 0 && $config['reply_hard_limit'] <= $numposts['replies']) - error($config['error']['reply_hard_limit']); - - if ($post['has_file'] && $config['image_hard_limit'] != 0 && $config['image_hard_limit'] <= $numposts['images']) - error($config['error']['image_hard_limit']); + else { + if (!$post['op']) { + $numposts = numPosts($post['thread']); + } } - + if ($post['has_file']) { // Determine size sanity $size = 0; @@ -544,30 +716,30 @@ function unlink_tmp_file($file) { ))); $post['filesize'] = $size; } - - + + $post['capcode'] = false; - + if ($mod && preg_match('/^((.+) )?## (.+)$/', $post['name'], $matches) && (in_array($board['uri'], $mod['boards']) or $mod['boards'][0] == '*')) { $name = $matches[2] != '' ? $matches[2] : $config['anonymous']; $cap = $matches[3]; - + if (isset($config['mod']['capcode'][$mod['type']])) { if ( $config['mod']['capcode'][$mod['type']] === true || (is_array($config['mod']['capcode'][$mod['type']]) && in_array($cap, $config['mod']['capcode'][$mod['type']]) )) { - + $post['capcode'] = utf8tohtml($cap); $post['name'] = $name; } } } - + $trip = generate_tripcode($post['name']); $post['name'] = $trip[0]; - $post['trip'] = isset($trip[1]) ? $trip[1] : ''; - + $post['trip'] = isset($trip[1]) ? $trip[1] : ''; // XX: Dropped posts and tripcodes + $noko = false; if (strtolower($post['email']) == 'noko') { $noko = true; @@ -576,12 +748,12 @@ function unlink_tmp_file($file) { $noko = false; $post['email'] = ''; } else $noko = $config['always_noko']; - + if ($post['has_file']) { $i = 0; foreach ($_FILES as $key => $file) { if ($file['size'] && $file['tmp_name']) { - $file['filename'] = urldecode(function_exists('get_magic_quotes_gpc') && get_magic_quotes_gpc() ? stripslashes($file['name']) : $file['name']); + $file['filename'] = urldecode($file['name']); $file['extension'] = strtolower(mb_substr($file['filename'], mb_strrpos($file['filename'], '.') + 1)); if (isset($config['filename_func'])) $file['file_id'] = $config['filename_func']($file); @@ -590,7 +762,7 @@ function unlink_tmp_file($file) { if (sizeof($_FILES) > 1) $file['file_id'] .= "-$i"; - + $file['file'] = $config['dir']['img_root'] . $board['dir'] . $config['dir']['img'] . $file['file_id'] . '.' . $file['extension']; while (file_exists ($file['file'])) { @@ -607,15 +779,17 @@ function unlink_tmp_file($file) { if (empty($post['files'])) $post['has_file'] = false; - // Check for a file - if ($post['op'] && !isset($post['no_longer_require_an_image_for_op'])) { - if (!$post['has_file'] && $config['force_image_op']) - error($config['error']['noimage']); - } + if (!$dropped_post) { + // Check for a file + if ($post['op'] && !isset($post['no_longer_require_an_image_for_op'])) { + if (!$post['has_file'] && $config['force_image_op']) + error($config['error']['noimage']); + } - // Check for too many files - if (sizeof($post['files']) > $config['max_images']) - error($config['error']['toomanyimages']); + // Check for too many files + if (sizeof($post['files']) > $config['max_images']) + error($config['error']['toomanyimages']); + } if ($config['strip_combining_chars']) { $post['name'] = strip_combining_chars($post['name']); @@ -623,41 +797,44 @@ function unlink_tmp_file($file) { $post['subject'] = strip_combining_chars($post['subject']); $post['body'] = strip_combining_chars($post['body']); } - - // Check string lengths - if (mb_strlen($post['name']) > 35) - error(sprintf($config['error']['toolong'], 'name')); - if (mb_strlen($post['email']) > 40) - error(sprintf($config['error']['toolong'], 'email')); - if (mb_strlen($post['subject']) > 100) - error(sprintf($config['error']['toolong'], 'subject')); - if (!$mod && mb_strlen($post['body']) > $config['max_body']) - error($config['error']['toolong_body']); - if (mb_strlen($post['body']) < $config['min_body'] && $post['op']) - error(sprintf(_('OP must be at least %d chars on this board.'), $config['min_body'])); - if (mb_strlen($post['password']) > 20) - error(sprintf($config['error']['toolong'], 'password')); + + if (!$dropped_post) { + // Check string lengths + if (mb_strlen($post['name']) > 35) + error(sprintf($config['error']['toolong'], 'name')); + if (mb_strlen($post['email']) > 40) + error(sprintf($config['error']['toolong'], 'email')); + if (mb_strlen($post['subject']) > 100) + error(sprintf($config['error']['toolong'], 'subject')); + if (!$mod && mb_strlen($post['body']) > $config['max_body']) + error($config['error']['toolong_body']); + if (mb_strlen($post['body']) < $config['min_body'] && $post['op']) + error(sprintf(_('OP must be at least %d chars on this board.'), $config['min_body'])); + if (mb_strlen($post['password']) > 20) + error(sprintf($config['error']['toolong'], 'password')); + } wordfilters($post['body']); if ($config['max_newlines'] > 0) { preg_match_all("/\n/", $post['body'], $nlmatches); - + if (isset($nlmatches[0]) && sizeof($nlmatches[0]) > $config['max_newlines']) error(sprintf(_('Your post contains too many lines. This board only allows %d maximum.'), $config['max_newlines'])); } - - + + $post['body'] = escape_markup_modifiers($post['body']); - + if ($mod && isset($post['raw']) && $post['raw']) { $post['body'] .= "\n1"; } - + + if (!$dropped_post) if (($config['country_flags'] && (!$config['allow_no_country'] || $config['force_flag'])) || ($config['country_flags'] && $config['allow_no_country'] && !isset($_POST['no_country']))) { require 'inc/lib/geoip/geoip.inc'; $gi=geoip\geoip_open('inc/lib/geoip/GeoIPv6.dat', GEOIP_STANDARD); - + function ipv4to6($ip) { if (strpos($ip, ':') !== false) { if (strpos($ip, '.') > 0) @@ -669,7 +846,7 @@ function ipv4to6($ip) { $part8 = base_convert(($iparr[2] * 256) + $iparr[3], 10, 16); return '::ffff:'.$part7.':'.$part8; } - + $country_code = geoip\geoip_country_code_by_addr_v6($gi, ipv4to6($_SERVER['REMOTE_ADDR'])); $country_name = geoip\geoip_country_name_by_addr_v6($gi, ipv4to6($_SERVER['REMOTE_ADDR'])); if (!$country_code) $country_code = 'A1'; @@ -678,11 +855,11 @@ function ipv4to6($ip) { $post['body'] .= "\n".strtolower($country_code)."". "\n$country_name"; } - + if ($config['user_flag'] && isset($_POST['user_flag'])) { if (!empty($_POST['user_flag']) ){ $user_flag = $_POST['user_flag']; - + if (!isset($config['user_flags'][$user_flag])) error(_('Invalid flag selection!')); @@ -699,13 +876,20 @@ function ipv4to6($ip) { $post['body'] .= "\n" . $_POST['tag'] . ""; } + // TODO: backport this part fully from vichan + //if (!$dropped_post) + //if ($config['proxy_save'] && isset($_SERVER['HTTP_X_FORWARDED_FOR'])) { + // $proxy = preg_replace("/[^0-9a-fA-F.,: ]/", '', $_SERVER['HTTP_X_FORWARDED_FOR']); + // $post['body'] .= "\n".$proxy.""; + //} + if (mysql_version() >= 50503) { $post['body_nomarkup'] = $post['body']; // Assume we're using the utf8mb4 charset } else { // MySQL's `utf8` charset only supports up to 3-byte symbols // Remove anything >= 0x010000 - + $chars = preg_split('//u', $post['body'], -1, PREG_SPLIT_NO_EMPTY); $post['body_nomarkup'] = ''; foreach ($chars as $char) { @@ -716,12 +900,16 @@ function ipv4to6($ip) { $post['body_nomarkup'] .= $char; } } - + $post['tracked_cites'] = markup($post['body'], true, $post['op']); - - + + if ($post['has_file']) { + $md5cmd = false; + if ($config['bsd_md5']) $md5cmd = '/sbin/md5 -r'; + if ($config['gnu_md5']) $md5cmd = 'md5sum'; + $allhashes = ''; foreach ($post['files'] as $key => &$file) { @@ -731,22 +919,23 @@ function ipv4to6($ip) { } elseif (!in_array($file['extension'], $config['allowed_ext']) && !in_array($file['extension'], $config['allowed_ext_files'])) error($config['error']['unknownext']); - + $file['is_an_image'] = !in_array($file['extension'], $config['allowed_ext_files']); - + // Truncate filename if it is too long $file['filename'] = mb_substr($file['filename'], 0, $config['max_filename_len']); - + $upload = $file['tmp_name']; - + if (!is_readable($upload)) error($config['error']['nomove']); - $md5cmd = $config['bsd_md5'] ? 'md5 -r' : 'md5sum'; - if( ($output = shell_exec_error("cat " . escapeshellarg($upload) . " | $md5cmd")) !== false ) { - $explodedvar = explode(' ', $output); - $hash = $explodedvar[0]; - } else { + if ($md5cmd) { + $output = shell_exec_error($md5cmd . " < " . escapeshellarg($upload)); + $output = explode(' ', $output); + $hash = $output[0]; + } + else { $hash = md5_file($upload); } @@ -763,14 +952,15 @@ function ipv4to6($ip) { $allhashes .= $hash; } - if (count($post['files']) == 1) { + if (count ($post['files']) == 1) { $post['filehash'] = $hash; - } else { + } + else { $post['filehash'] = md5($allhashes); } } - if (!hasPermission($config['mod']['bypass_filters'], $board['uri'])) { + if (!hasPermission($config['mod']['bypass_filters'], $board['uri']) && !$dropped_post) { require_once 'inc/filters.php'; do_filters($post); @@ -778,25 +968,30 @@ function ipv4to6($ip) { if ($post['has_file']) { foreach ($post['files'] as $key => &$file) { - if ($file['is_an_image'] && $config['ie_mime_type_detection'] !== false) { - // Check IE MIME type detection XSS exploit - $buffer = file_get_contents($upload, null, null, null, 255); - if (preg_match($config['ie_mime_type_detection'], $buffer)) { - undoImage($post); - error($config['error']['mime_exploit']); + if ($file['is_an_image']) { + if ($config['ie_mime_type_detection'] !== false) { + // Check IE MIME type detection XSS exploit + $buffer = file_get_contents($upload, null, null, null, 255); + if (preg_match($config['ie_mime_type_detection'], $buffer)) { + undoImage($post); + error($config['error']['mime_exploit']); + } } - + require_once 'inc/image.php'; - + // find dimensions of an image using GD if (!$size = @getimagesize($file['tmp_name'])) { error($config['error']['invalidimg']); } + if (!in_array($size[2], array(IMAGETYPE_PNG, IMAGETYPE_GIF, IMAGETYPE_JPEG, IMAGETYPE_BMP))) { + error($config['error']['invalidimg']); + } if ($size[0] > $config['max_width'] || $size[1] > $config['max_height']) { error($config['error']['maxsize']); } - - + + if ($config['convert_auto_orient'] && ($file['extension'] == 'jpg' || $file['extension'] == 'jpeg')) { // The following code corrects the image orientation. // Currently only works with the 'convert' option selected but it could easily be expanded to work with the rest if you can be bothered. @@ -835,20 +1030,20 @@ function ipv4to6($ip) { } } } - + // create image object $image = new Image($file['tmp_name'], $file['extension'], $size); if ($image->size->width > $config['max_width'] || $image->size->height > $config['max_height']) { $image->delete(); error($config['error']['maxsize']); } - + $file['width'] = $image->size->width; $file['height'] = $image->size->height; - + if ($config['spoiler_images'] && isset($_POST['spoiler'])) { $file['thumb'] = 'spoiler'; - + $size = @getimagesize($config['spoiler_image']); $file['thumbwidth'] = $size[0]; $file['thumbheight'] = $size[1]; @@ -856,10 +1051,10 @@ function ipv4to6($ip) { $image->size->width <= $config['thumb_width'] && $image->size->height <= $config['thumb_height'] && $file['extension'] == ($config['thumb_ext'] ? $config['thumb_ext'] : $file['extension'])) { - + // Copy, because there's nothing to resize copy($file['tmp_name'], $file['thumb']); - + $file['thumbwidth'] = $image->size->width; $file['thumbheight'] = $image->size->height; } else { @@ -868,16 +1063,16 @@ function ipv4to6($ip) { $post['op'] ? $config['thumb_op_width'] : $config['thumb_width'], $post['op'] ? $config['thumb_op_height'] : $config['thumb_height'] ); - + $thumb->to($file['thumb']); - + $file['thumbwidth'] = $thumb->width; $file['thumbheight'] = $thumb->height; - + $thumb->_destroy(); } - - if ($config['redraw_image'] || (empty($file['exif_stripped']) && $config['strip_exif'] && ($file['extension'] == 'jpg' || $file['extension'] == 'jpeg'))) { + + if ($config['redraw_image'] || (!@$file['exif_stripped'] && $config['strip_exif'] && ($file['extension'] == 'jpg' || $file['extension'] == 'jpeg'))) { if (!$config['redraw_image'] && $config['use_exiftool']) { if($error = shell_exec_error('exiftool -overwrite_original -ignoreMinorErrors -q -q -all= ' . escapeshellarg($file['tmp_name']))) @@ -900,6 +1095,34 @@ function ipv4to6($ip) { $file['thumbheight'] = $size[1]; } + if ($config['tesseract_ocr'] && $file['thumb'] != 'file') { // Let's OCR it! + $fname = $file['tmp_name']; + + if ($file['height'] > 500 || $file['width'] > 500) { + $fname = $file['thumb']; + } + + if ($fname == 'spoiler') { // We don't have that much CPU time, do we? + } + else { + $tmpname = "tmp/tesseract/".rand(0,10000000); + + // Preprocess command is an ImageMagick b/w quantization + $error = shell_exec_error(sprintf($config['tesseract_preprocess_command'], escapeshellarg($fname)) . " | " . + 'tesseract stdin '.escapeshellarg($tmpname).' '.$config['tesseract_params']); + $tmpname .= ".txt"; + + $value = @file_get_contents($tmpname); + @unlink($tmpname); + + if ($value && trim($value)) { + // This one has an effect, that the body is appended to a post body. So you can write a correct + // spamfilter. + $post['body_nomarkup'] .= "".htmlspecialchars($value).""; + } + } + } + if (!isset($dont_copy_file) || !$dont_copy_file) { if (isset($file['file_tmp'])) { if (!@rename($file['tmp_name'], $file['file'])) @@ -913,7 +1136,7 @@ function ipv4to6($ip) { if ($config['image_reject_repost']) { if ($p = getPostByHash($post['filehash'])) { undoImage($post); - error(sprintf($config['error']['fileexists'], + error(sprintf($config['error']['fileexists'], ($post['mod'] ? $config['root'] . $config['file_mod'] . '?/' : $config['root']) . ($board['dir'] . $config['dir']['res'] . ($p['thread'] ? @@ -926,7 +1149,7 @@ function ipv4to6($ip) { } else if (!$post['op'] && $config['image_reject_repost_in_thread']) { if ($p = getPostByHashInThread($post['filehash'], $post['thread'])) { undoImage($post); - error(sprintf($config['error']['fileexistsinthread'], + error(sprintf($config['error']['fileexistsinthread'], ($post['mod'] ? $config['root'] . $config['file_mod'] . '?/' : $config['root']) . ($board['dir'] . $config['dir']['res'] . ($p['thread'] ? @@ -938,8 +1161,13 @@ function ipv4to6($ip) { } } } + + // Do filters again if OCRing + if ($config['tesseract_ocr'] && !hasPermission($config['mod']['bypass_filters'], $board['uri']) && !$dropped_post) { + do_filters($post); + } - if (!hasPermission($config['mod']['postunoriginal'], $board['uri']) && $config['robot_enable'] && checkRobot($post['body_nomarkup'])) { + if (!hasPermission($config['mod']['postunoriginal'], $board['uri']) && $config['robot_enable'] && checkRobot($post['body_nomarkup']) && !$dropped_post) { undoImage($post); if ($config['robot_mute']) { error(sprintf($config['error']['muted'], mute())); @@ -947,7 +1175,7 @@ function ipv4to6($ip) { error($config['error']['unoriginal']); } } - + // Remove board directories before inserting them into the database. if ($post['has_file']) { foreach ($post['files'] as $key => &$file) { @@ -958,7 +1186,7 @@ function ipv4to6($ip) { $file['thumb'] = mb_substr($file['thumb'], mb_strlen($config['dir']['img_root'] . $board['dir'] . $config['dir']['thumb'])); } } - + $post = (object)$post; $post->files = array_map(function($a) { return (object)$a; }, $post->files); $error = event('post', $post); @@ -973,15 +1201,51 @@ function ipv4to6($ip) { if ($post['files']) $post['files'] = $post['files']; $post['num_files'] = sizeof($post['files']); - + // Commit the post to the database. $post['id'] = $id = post($post); - - if (!$tor) insertFloodPost($post); - + + // Update statistics for this board. updateStatisticsForPost( $post ); + + + if ($dropped_post && $dropped_post['from_nntp']) { + $query = prepare("INSERT INTO ``nntp_references`` (`board`, `id`, `message_id`, `message_id_digest`, `own`, `headers`) VALUES ". + "(:board , :id , :message_id , :message_id_digest , false, :headers)"); + + $query->bindValue(':board', $dropped_post['board']); + $query->bindValue(':id', $id); + $query->bindValue(':message_id', $dropped_post['msgid']); + $query->bindValue(':message_id_digest', sha1($dropped_post['msgid'])); + $query->bindValue(':headers', $dropped_post['headers']); + $query->execute() or error(db_error($query)); + } // ^^^^^ For inbound posts ^^^^^ + elseif ($config['nntpchan']['enabled'] && $config['nntpchan']['group']) { + // vvvvv For outbound posts vvvvv + require_once('inc/nntpchan/nntpchan.php'); + $msgid = gen_msgid($post['board'], $post['id']); + + list($headers, $files) = post2nntp($post, $msgid); + + $message = gen_nntp($headers, $files); + + $query = prepare("INSERT INTO ``nntp_references`` (`board`, `id`, `message_id`, `message_id_digest`, `own`, `headers`) VALUES ". + "(:board , :id , :message_id , :message_id_digest , true , :headers)"); + + $query->bindValue(':board', $post['board']); + $query->bindValue(':id', $post['id']); + $query->bindValue(':message_id', $msgid); + $query->bindValue(':message_id_digest', sha1($msgid)); + $query->bindValue(':headers', json_encode($headers)); + $query->execute() or error(db_error($query)); + + // Let's broadcast it! + nntp_publish($message, $msgid); + } + + if (!$tor) insertFloodPost($post); // Handle cyclical threads if (!$post['op'] && isset($thread['cycle']) && $thread['cycle']) { @@ -995,11 +1259,11 @@ function ipv4to6($ip) { deletePost($dpost['id'], false, false); } } - + if (isset($post['antispam_hash'])) { incrementSpamHash($post['antispam_hash']); } - + if (isset($post['tracked_cites']) && !empty($post['tracked_cites'])) { $insert_rows = array(); foreach ($post['tracked_cites'] as $cite) { @@ -1009,11 +1273,11 @@ function ipv4to6($ip) { } query('INSERT INTO ``cites`` VALUES ' . implode(', ', $insert_rows)) or error(db_error()); } - + if (!$post['op'] && !isset($_POST['no-bump']) && strtolower($post['email']) != 'sage' && !$thread['sage'] && ($thread['cycle'] || $config['reply_limit'] == 0 || $numposts['replies']+1 < $config['reply_limit'])) { bumpThread($post['thread']); } - + if (isset($_SERVER['HTTP_REFERER'])) { // Tell Javascript that we posted successfully if (isset($_COOKIE[$config['cookies']['js']])) @@ -1025,13 +1289,13 @@ function ipv4to6($ip) { // Encode and set cookie setcookie($config['cookies']['js'], json_encode($js), 0, $config['cookies']['jail'] ? $config['cookies']['path'] : '/', null, false, false); } - + $root = $post['mod'] ? $config['root'] . $config['file_mod'] . '?/' : $config['root']; - + if ($noko) { $redirect = $root . $board['dir'] . $config['dir']['res'] . sprintf($config['file_page'], $post['op'] ? $id:$post['thread']) . (!$post['op'] ? '#' . $id : ''); - + if (!$post['op'] && isset($_SERVER['HTTP_REFERER'])) { $regex = array( 'board' => str_replace('%s', '(\w{1,8})', preg_quote($config['board_path'], '/')), @@ -1047,15 +1311,15 @@ function ipv4to6($ip) { } } else { $redirect = $root . $board['dir'] . $config['file_index']; - + } buildThread($post['op'] ? $id : $post['thread']); - + if ($config['syslog']) _syslog(LOG_INFO, 'New post: /' . $board['dir'] . $config['dir']['res'] . sprintf($config['file_page'], $post['op'] ? $id : $post['thread']) . (!$post['op'] ? '#' . $id : '')); - + if (!$post['mod']) header('X-Associated-Content: "' . $redirect . '"'); if (!isset($_POST['json_response'])) { @@ -1068,22 +1332,22 @@ function ipv4to6($ip) { 'id' => $id )); } - + if ($config['try_smarter'] && $post['op']) $build_pages = range(1, $config['max_pages']); - + if ($post['op']) - clean(); - + clean($id); + event('post-after', $post); - + // We are already done, let's continue our heavy-lifting work in the background (if we run off FastCGI) if (function_exists('fastcgi_finish_request')) { @fastcgi_finish_request(); } buildIndex(); - + if ($post['op']) { rebuildThemes('post-thread', $board['uri']); } @@ -1094,9 +1358,9 @@ function ipv4to6($ip) { elseif (isset($_POST['appeal'])) { if (!isset($_POST['ban_id'])) error($config['error']['bot']); - + $ban_id = (int)$_POST['ban_id']; - + $bans = Bans::find($_SERVER['REMOTE_ADDR']); foreach ($bans as $_ban) { if ($_ban['id'] == $ban_id) { @@ -1104,33 +1368,33 @@ function ipv4to6($ip) { break; } } - + if (!isset($ban)) { error(_("That ban doesn't exist or is not for you.")); } - + if ($ban['expires'] && $ban['expires'] - $ban['created'] <= $config['ban_appeals_min_length']) { error(_("You cannot appeal a ban of this length.")); } - + $query = query("SELECT `denied` FROM ``ban_appeals`` WHERE `ban_id` = $ban_id") or error(db_error()); $ban_appeals = $query->fetchAll(PDO::FETCH_COLUMN); - + if (count($ban_appeals) >= $config['ban_appeals_max']) { error(_("You cannot appeal this ban again.")); } - + foreach ($ban_appeals as $is_denied) { if (!$is_denied) error(_("There is already a pending appeal for this ban.")); } - + $query = prepare("INSERT INTO ``ban_appeals`` VALUES (NULL, :ban_id, :time, :message, 0)"); $query->bindValue(':ban_id', $ban_id, PDO::PARAM_INT); $query->bindValue(':time', time(), PDO::PARAM_INT); $query->bindValue(':message', $_POST['appeal']); $query->execute() or error(db_error($query)); - + displayBan($ban); } else {