1000 ошибок от гостя за минуту

Автор Liza, 16 декабря 2017, 22:59:19

« назад - далее »

0 Пользователи и 1 гость просматривают эту тему.

Liza

Уважаемые, подскажите где что исправить. Ошибки от гостя, у которого не определяется IP


Undefined index: permissions
Файл:.... /Sources/Security.php
Строка: 836

/images/theme/light/backdrop1.jpg
8: Undefined index: permissions
Файл:...l/Sources/Security.php
Строка: 836

/images/theme/light/backdrop1.jpg
in_array() expects parameter 2 to be array, null given
 Файл: .../Sources/Security.php
Строка: 836

GeorG

ЦитироватьУважаемые, подскажите где что исправить. Ошибки от гостя, у которого не определяется IP


Undefined index: permissions
Файл:.... /Sources/Security.php
Строка: 836
В ошибке все сказано, про "где" - смотрите файл /Sources/Security.php, строка: 836, а вот что, завит от того, что там у вас.
Верстка тем по шаблону, их доработка/переработка, переделка тем с версии smf 1.1 на smf 2.0. Примеры работ - insidestyle.ru
Установка модов (заточка под ваш форум); Моды под заказ; Обновление форума; Правильный перенос; Удаление/лечение вирусов; Устранения ошибок.
Обращаться в ЛС
Мой форум
Модуль анти-спама CleanTalk, сам пользуюсь
Сервера которыми сам пользуюсь - cadedic.ru

Liza

GeorG вот эта строка

      if (!is_array($permission) && in_array($permission, $user_info['permissions']))

вот в этом фрагменте кода

      // Check if they can do it.
      if (!is_array($permission) && in_array($permission, $user_info['permissions']))
         return true;

Если можно подскажите пожалуйста что не так

GeorG

Цитироватьin_array() expects parameter 2 to be array, null given

Тут проверка переменной $permission, является ли она массивом, но судя по ошибкам выше, переменная неопределена. Смотрите выше, в коде, почему это происходит.
Верстка тем по шаблону, их доработка/переработка, переделка тем с версии smf 1.1 на smf 2.0. Примеры работ - insidestyle.ru
Установка модов (заточка под ваш форум); Моды под заказ; Обновление форума; Правильный перенос; Удаление/лечение вирусов; Устранения ошибок.
Обращаться в ЛС
Мой форум
Модуль анти-спама CleanTalk, сам пользуюсь
Сервера которыми сам пользуюсь - cadedic.ru

Liza

GeorG посмотрите пожалуйста, я в этом коде ни как не разберусь

<?php/** * Simple Machines Forum (SMF) * * @package SMF * @author Simple Machines http://www.simplemachines.org * @copyright 2011 Simple Machines * @license http://www.simplemachines.org/about/smf/license.php BSD * * @version 2.0.3 */if (!defined('SMF'))	die('Hacking attempt...');/*	This file has the very important job of insuring forum security.  This	task includes banning and permissions, namely.  It does this by providing	the following functions:	void validateSession()		- makes sure the user is who they claim to be by requiring a		  password to be typed in every hour.		- is turned on and off by the securityDisable setting.		- uses the adminLogin() function of Subs-Auth.php if they need to		  login, which saves all request (post and get) data.	void is_not_guest(string message = '')		- checks if the user is currently a guest, and if so asks them to		  login with a message telling them why.		- message is what to tell them when asking them to login.	void is_not_banned(bool force_check = false)		- checks if the user is banned, and if so dies with an error.		- caches this information for optimization purposes.		- forces a recheck if force_check is true.	void banPermissions()		- applies any states of banning by removing permissions the user		  cannot have.	void log_ban(array ban_ids = array(), string email = null)		- log the current user in the ban logs.		- increment the hit counters for the specified ban ID's (if any.)	void isBannedEmail(string email, string restriction, string error)		- check if a given email is banned.		- performs an immediate ban if the turns turns out positive.	string checkSession(string type = 'post', string from_action = none,			is_fatal = true)		- checks the current session, verifying that the person is who he or		  she should be.		- also checks the referrer to make sure they didn't get sent here.		- depends on the disableCheckUA setting, which is usually missing.		- will check GET, POST, or REQUEST depending on the passed type.		- also optionally checks the referring action if passed. (note that		  the referring action must be by GET.)		- returns the error message if is_fatal is false.	bool checkSubmitOnce(string action, bool is_fatal = true)		- registers a sequence number for a form.		- checks whether a submitted sequence number is registered in the		  current session.		- depending on the value of is_fatal shows an error or returns true or		  false.		- frees a sequence number from the stack after it's been checked.		- frees a sequence number without checking if action == 'free'.	bool allowedTo(string permission, array boards = current)		- checks whether the user is allowed to do permission. (ie. post_new.)		- if boards is specified, checks those boards instead of the current		  one.		- always returns true if the user is an administrator.		- returns true if he or she can do it, false otherwise.	void isAllowedTo(string permission, array boards = current)		- uses allowedTo() to check if the user is allowed to do permission.		- checks the passed boards or current board for the permission.		- if they are not, it loads the Errors language file and shows an		  error using $txt['cannot_' . $permission].		- if they are a guest and cannot do it, this calls is_not_guest().	array boardsAllowedTo(string permission, bool check_access = false)		- returns a list of boards on which the user is allowed to do the		  specified permission.		- returns an array with only a 0 in it if the user has permission		  to do this on every board.		- returns an empty array if he or she cannot do this on any board.		- if check_access is true will also make sure the group has proper access to that board.	string showEmailAddress(string userProfile_hideEmail, int userProfile_id)		- returns whether an email address should be shown and how.		- possible outcomes are			'yes': show the full email address			'yes_permission_override': show the full email address, either you			  are a moderator or it's your own email address.			'no_through_forum': don't show the email address, but do allow			  things to be mailed using the built-in forum mailer.			'no': keep the email address hidden.*/// Check if the user is who he/she says he isfunction validateSession(){	global $modSettings, $sourcedir, $user_info, $sc, $user_settings;	// We don't care if the option is off, because Guests should NEVER get past here.	is_not_guest();	// If we're using XML give an additional ten minutes grace as an admin can't log on in XML mode.	$refreshTime = isset($_GET['xml']) ? 4200 : 3600;	// Is the security option off?  Or are they already logged in?	if (!empty($modSettings['securityDisable']) || (!empty($_SESSION['admin_time']) && $_SESSION['admin_time'] + $refreshTime >= time()))		return;	require_once($sourcedir . '/Subs-Auth.php');	// Hashed password, ahoy!	if (isset($_POST['admin_hash_pass']) && strlen($_POST['admin_hash_pass']) == 40)	{		checkSession();		$good_password = in_array(true, call_integration_hook('integrate_verify_password', array($user_info['username'], $_POST['admin_hash_pass'], true)), true);		if ($good_password || $_POST['admin_hash_pass'] == sha1($user_info['passwd'] . $sc))		{			$_SESSION['admin_time'] = time();			unset($_SESSION['request_referer']);			return;		}	}	// Posting the password... check it.	if (isset($_POST['admin_pass']))	{		checkSession();		$good_password = in_array(true, call_integration_hook('integrate_verify_password', array($user_info['username'], $_POST['admin_pass'], false)), true);		// Password correct?		if ($good_password || sha1(strtolower($user_info['username']) . $_POST['admin_pass']) == $user_info['passwd'])		{			$_SESSION['admin_time'] = time();			unset($_SESSION['request_referer']);			return;		}	}	// OpenID?	if (!empty($user_settings['openid_uri']))	{		require_once($sourcedir . '/Subs-OpenID.php');		smf_openID_revalidate();		$_SESSION['admin_time'] = time();		unset($_SESSION['request_referer']);		return;	}	// Better be sure to remember the real referer	if (empty($_SESSION['request_referer']))		$_SESSION['request_referer'] = isset($_SERVER['HTTP_REFERER']) ? @parse_url($_SERVER['HTTP_REFERER']) : array();	elseif (empty($_POST))		unset($_SESSION['request_referer']);	// Need to type in a password for that, man.	adminLogin();}// Require a user who is logged in. (not a guest.)function is_not_guest($message = ''){	global $user_info, $txt, $context, $scripturl;	// Luckily, this person isn't a guest.	if (!$user_info['is_guest'])		return;	// People always worry when they see people doing things they aren't actually doing...	$_GET['action'] = '';	$_GET['board'] = '';	$_GET['topic'] = '';	writeLog(true);	// Just die.	if (isset($_REQUEST['xml']))		obExit(false);	// Attempt to detect if they came from dlattach.	if (!WIRELESS && SMF != 'SSI' && empty($context['theme_loaded']))		loadTheme();	// Never redirect to an attachment	if (strpos($_SERVER['REQUEST_URL'], 'dlattach') === false)		$_SESSION['login_url'] = $_SERVER['REQUEST_URL'];	// Load the Login template and language file.	loadLanguage('Login');	// Are we in wireless mode?	if (WIRELESS)	{		$context['login_error'] = $message ? $message : $txt['only_members_can_access'];		$context['sub_template'] = WIRELESS_PROTOCOL . '_login';	}	// Apparently we're not in a position to handle this now. Let's go to a safer location for now.	elseif (empty($context['template_layers']))	{		$_SESSION['login_url'] = $scripturl . '?' . $_SERVER['QUERY_STRING'];		redirectexit('action=login');	}	else	{		loadTemplate('Login');		$context['sub_template'] = 'kick_guest';		$context['robot_no_index'] = true;	}	// Use the kick_guest sub template...	$context['kick_message'] = $message;	$context['page_title'] = $txt['login'];	obExit();	// We should never get to this point, but if we did we wouldn't know the user isn't a guest.	trigger_error('Hacking attempt...', E_USER_ERROR);}// Do banning related stuff.  (ie. disallow access....)function is_not_banned($forceCheck = false){	global $txt, $modSettings, $context, $user_info;	global $sourcedir, $cookiename, $user_settings, $smcFunc;	// You cannot be banned if you are an admin - doesn't help if you log out.	if ($user_info['is_admin'])		return;	// Only check the ban every so often. (to reduce load.)	if ($forceCheck || !isset($_SESSION['ban']) || empty($modSettings['banLastUpdated']) || ($_SESSION['ban']['last_checked'] < $modSettings['banLastUpdated']) || $_SESSION['ban']['id_member'] != $user_info['id'] || $_SESSION['ban']['ip'] != $user_info['ip'] || $_SESSION['ban']['ip2'] != $user_info['ip2'] || (isset($user_info['email'], $_SESSION['ban']['email']) && $_SESSION['ban']['email'] != $user_info['email']))	{		// Innocent until proven guilty.  (but we know you are! :P)		$_SESSION['ban'] = array(			'last_checked' => time(),			'id_member' => $user_info['id'],			'ip' => $user_info['ip'],			'ip2' => $user_info['ip2'],			'email' => $user_info['email'],		);		$ban_query = array();		$ban_query_vars = array('current_time' => time());		$flag_is_activated = false;		// Check both IP addresses.		foreach (array('ip', 'ip2') as $ip_number)		{			// Check if we have a valid IP address.			if (preg_match('/^(\d{1,3})\.(\d{1,3})\.(\d{1,3})\.(\d{1,3})$/', $user_info[$ip_number], $ip_parts) == 1)			{				$ban_query[] = '((' . $ip_parts[1] . ' BETWEEN bi.ip_low1 AND bi.ip_high1)							AND (' . $ip_parts[2] . ' BETWEEN bi.ip_low2 AND bi.ip_high2)							AND (' . $ip_parts[3] . ' BETWEEN bi.ip_low3 AND bi.ip_high3)							AND (' . $ip_parts[4] . ' BETWEEN bi.ip_low4 AND bi.ip_high4))';				// IP was valid, maybe there's also a hostname...				if (empty($modSettings['disableHostnameLookup']))				{					$hostname = host_from_ip($user_info[$ip_number]);					if (strlen($hostname) > 0)					{						$ban_query[] = '({string:hostname} LIKE bi.hostname)';						$ban_query_vars['hostname'] = $hostname;					}				}			}			// We use '255.255.255.255' for 'unknown' since it's not valid anyway.			elseif ($user_info['ip'] == 'unknown')				$ban_query[] = '(bi.ip_low1 = 255 AND bi.ip_high1 = 255							AND bi.ip_low2 = 255 AND bi.ip_high2 = 255							AND bi.ip_low3 = 255 AND bi.ip_high3 = 255							AND bi.ip_low4 = 255 AND bi.ip_high4 = 255)';		}		// Is their email address banned?		if (strlen($user_info['email']) != 0)		{			$ban_query[] = '({string:email} LIKE bi.email_address)';			$ban_query_vars['email'] = $user_info['email'];		}		// How about this user?		if (!$user_info['is_guest'] && !empty($user_info['id']))		{			$ban_query[] = 'bi.id_member = {int:id_member}';			$ban_query_vars['id_member'] = $user_info['id'];		}		// Check the ban, if there's information.		if (!empty($ban_query))		{			$restrictions = array(				'cannot_access',				'cannot_login',				'cannot_post',				'cannot_register',			);			$request = $smcFunc['db_query']('', '				SELECT bi.id_ban, bi.email_address, bi.id_member, bg.cannot_access, bg.cannot_register,					bg.cannot_post, bg.cannot_login, bg.reason, IFNULL(bg.expire_time, 0) AS expire_time				FROM {db_prefix}ban_items AS bi					INNER JOIN {db_prefix}ban_groups AS bg ON (bg.id_ban_group = bi.id_ban_group AND (bg.expire_time IS NULL OR bg.expire_time > {int:current_time}))				WHERE					(' . implode(' OR ', $ban_query) . ')',				$ban_query_vars			);			// Store every type of ban that applies to you in your session.			while ($row = $smcFunc['db_fetch_assoc']($request))			{				foreach ($restrictions as $restriction)					if (!empty($row[$restriction]))					{						$_SESSION['ban'][$restriction]['reason'] = $row['reason'];						$_SESSION['ban'][$restriction]['ids'][] = $row['id_ban'];						if (!isset($_SESSION['ban']['expire_time']) || ($_SESSION['ban']['expire_time'] != 0 && ($row['expire_time'] == 0 || $row['expire_time'] > $_SESSION['ban']['expire_time'])))							$_SESSION['ban']['expire_time'] = $row['expire_time'];						if (!$user_info['is_guest'] && $restriction == 'cannot_access' && ($row['id_member'] == $user_info['id'] || $row['email_address'] == $user_info['email']))							$flag_is_activated = true;					}			}			$smcFunc['db_free_result']($request);		}		// Mark the cannot_access and cannot_post bans as being 'hit'.		if (isset($_SESSION['ban']['cannot_access']) || isset($_SESSION['ban']['cannot_post']) || isset($_SESSION['ban']['cannot_login']))			log_ban(array_merge(isset($_SESSION['ban']['cannot_access']) ? $_SESSION['ban']['cannot_access']['ids'] : array(), isset($_SESSION['ban']['cannot_post']) ? $_SESSION['ban']['cannot_post']['ids'] : array(), isset($_SESSION['ban']['cannot_login']) ? $_SESSION['ban']['cannot_login']['ids'] : array()));		// If for whatever reason the is_activated flag seems wrong, do a little work to clear it up.		if ($user_info['id'] && (($user_settings['is_activated'] >= 10 && !$flag_is_activated)			|| ($user_settings['is_activated'] < 10 && $flag_is_activated)))		{			require_once($sourcedir . '/ManageBans.php');			updateBanMembers();		}	}	// Hey, I know you! You're ehm...	if (!isset($_SESSION['ban']['cannot_access']) && !empty($_COOKIE[$cookiename . '_']))	{		$bans = explode(',', $_COOKIE[$cookiename . '_']);		foreach ($bans as $key => $value)			$bans[$key] = (int) $value;		$request = $smcFunc['db_query']('', '			SELECT bi.id_ban, bg.reason			FROM {db_prefix}ban_items AS bi				INNER JOIN {db_prefix}ban_groups AS bg ON (bg.id_ban_group = bi.id_ban_group)			WHERE bi.id_ban IN ({array_int:ban_list})				AND (bg.expire_time IS NULL OR bg.expire_time > {int:current_time})				AND bg.cannot_access = {int:cannot_access}			LIMIT ' . count($bans),			array(				'cannot_access' => 1,				'ban_list' => $bans,				'current_time' => time(),			)		);		while ($row = $smcFunc['db_fetch_assoc']($request))		{			$_SESSION['ban']['cannot_access']['ids'][] = $row['id_ban'];			$_SESSION['ban']['cannot_access']['reason'] = $row['reason'];		}		$smcFunc['db_free_result']($request);		// My mistake. Next time better.		if (!isset($_SESSION['ban']['cannot_access']))		{			require_once($sourcedir . '/Subs-Auth.php');			$cookie_url = url_parts(!empty($modSettings['localCookies']), !empty($modSettings['globalCookies']));			setcookie($cookiename . '_', '', time() - 3600, $cookie_url[1], $cookie_url[0], 0);		}	}	// If you're fully banned, it's end of the story for you.	if (isset($_SESSION['ban']['cannot_access']))	{		// We don't wanna see you!		if (!$user_info['is_guest'])			$smcFunc['db_query']('', '				DELETE FROM {db_prefix}log_online				WHERE id_member = {int:current_member}',				array(					'current_member' => $user_info['id'],				)			);		// 'Log' the user out.  Can't have any funny business... (save the name!)		$old_name = isset($user_info['name']) && $user_info['name'] != '' ? $user_info['name'] : $txt['guest_title'];		$user_info['name'] = '';		$user_info['username'] = '';		$user_info['is_guest'] = true;		$user_info['is_admin'] = false;		$user_info['permissions'] = array();		$user_info['id'] = 0;		$context['user'] = array(			'id' => 0,			'username' => '',			'name' => $txt['guest_title'],			'is_guest' => true,			'is_logged' => false,			'is_admin' => false,			'is_mod' => false,			'can_mod' => false,			'language' => $user_info['language'],		);		// A goodbye present.		require_once($sourcedir . '/Subs-Auth.php');		$cookie_url = url_parts(!empty($modSettings['localCookies']), !empty($modSettings['globalCookies']));		setcookie($cookiename . '_', implode(',', $_SESSION['ban']['cannot_access']['ids']), time() + 3153600, $cookie_url[1], $cookie_url[0], 0);		// Don't scare anyone, now.		$_GET['action'] = '';		$_GET['board'] = '';		$_GET['topic'] = '';		writeLog(true);		// You banned, sucka!		fatal_error(sprintf($txt['your_ban'], $old_name) . (empty($_SESSION['ban']['cannot_access']['reason']) ? '' : '<br />' . $_SESSION['ban']['cannot_access']['reason']) . '<br />' . (!empty($_SESSION['ban']['expire_time']) ? sprintf($txt['your_ban_expires'], timeformat($_SESSION['ban']['expire_time'], false)) : $txt['your_ban_expires_never']), 'user');		// If we get here, something's gone wrong.... but let's try anyway.		trigger_error('Hacking attempt...', E_USER_ERROR);	}	// You're not allowed to log in but yet you are. Let's fix that.	elseif (isset($_SESSION['ban']['cannot_login']) && !$user_info['is_guest'])	{		// We don't wanna see you!		$smcFunc['db_query']('', '			DELETE FROM {db_prefix}log_online			WHERE id_member = {int:current_member}',			array(				'current_member' => $user_info['id'],			)		);		// 'Log' the user out.  Can't have any funny business... (save the name!)		$old_name = isset($user_info['name']) && $user_info['name'] != '' ? $user_info['name'] : $txt['guest_title'];		$user_info['name'] = '';		$user_info['username'] = '';		$user_info['is_guest'] = true;		$user_info['is_admin'] = false;		$user_info['permissions'] = array();		$user_info['id'] = 0;		$context['user'] = array(			'id' => 0,			'username' => '',			'name' => $txt['guest_title'],			'is_guest' => true,			'is_logged' => false,			'is_admin' => false,			'is_mod' => false,			'can_mod' => false,			'language' => $user_info['language'],		);		// SMF's Wipe 'n Clean(r) erases all traces.		$_GET['action'] = '';		$_GET['board'] = '';		$_GET['topic'] = '';		writeLog(true);		require_once($sourcedir . '/LogInOut.php');		Logout(true, false);		fatal_error(sprintf($txt['your_ban'], $old_name) . (empty($_SESSION['ban']['cannot_login']['reason']) ? '' : '<br />' . $_SESSION['ban']['cannot_login']['reason']) . '<br />' . (!empty($_SESSION['ban']['expire_time']) ? sprintf($txt['your_ban_expires'], timeformat($_SESSION['ban']['expire_time'], false)) : $txt['your_ban_expires_never']) . '<br />' . $txt['ban_continue_browse'], 'user');	}	// Fix up the banning permissions.	if (isset($user_info['permissions']))		banPermissions();}// Fix permissions according to ban status.function banPermissions(){	global $user_info, $sourcedir, $modSettings, $context;	// Somehow they got here, at least take away all permissions...	if (isset($_SESSION['ban']['cannot_access']))		$user_info['permissions'] = array();	// Okay, well, you can watch, but don't touch a thing.	elseif (isset($_SESSION['ban']['cannot_post']) || (!empty($modSettings['warning_mute']) && $modSettings['warning_mute'] <= $user_info['warning']))	{		$denied_permissions = array(			'pm_send',			'calendar_post', 'calendar_edit_own', 'calendar_edit_any',			'poll_post',			'poll_add_own', 'poll_add_any',			'poll_edit_own', 'poll_edit_any',			'poll_lock_own', 'poll_lock_any',			'poll_remove_own', 'poll_remove_any',			'manage_attachments', 'manage_smileys', 'manage_boards', 'admin_forum', 'manage_permissions',			'moderate_forum', 'manage_membergroups', 'manage_bans', 'send_mail', 'edit_news',			'profile_identity_any', 'profile_extra_any', 'profile_title_any',			'post_new', 'post_reply_own', 'post_reply_any',			'delete_own', 'delete_any', 'delete_replies',			'make_sticky',			'merge_any', 'split_any',			'modify_own', 'modify_any', 'modify_replies',			'move_any',			'send_topic',			'thank_you_post_post', 'thank_you_post_lock_own', 'thank_you_post_lock_any',			'thank_you_post_delete_own', 'thank_you_post_delete_any',			'thank_you_post_delete_mem_own', 'thank_you_post_delete_mem_any',			'thank_you_post_lock_all_own', 'thank_you_post_lock_all_any',			'thank_you_post_unlock_all',			'lock_own', 'lock_any',			'remove_own', 'remove_any',			'post_unapproved_topics', 'post_unapproved_replies_own', 'post_unapproved_replies_any',		);		$user_info['permissions'] = array_diff($user_info['permissions'], $denied_permissions);	}	// Are they absolutely under moderation?	elseif (!empty($modSettings['warning_moderate']) && $modSettings['warning_moderate'] <= $user_info['warning'])	{		// Work out what permissions should change...		$permission_change = array(			'post_new' => 'post_unapproved_topics',			'post_reply_own' => 'post_unapproved_replies_own',			'post_reply_any' => 'post_unapproved_replies_any',			'post_attachment' => 'post_unapproved_attachments',		);		foreach ($permission_change as $old => $new)		{			if (!in_array($old, $user_info['permissions']))				unset($permission_change[$old]);			else				$user_info['permissions'][] = $new;		}		$user_info['permissions'] = array_diff($user_info['permissions'], array_keys($permission_change));	}	//!!! Find a better place to call this? Needs to be after permissions loaded!	// Finally, some bits we cache in the session because it saves queries.	if (isset($_SESSION['mc']) && $_SESSION['mc']['time'] > $modSettings['settings_updated'] && $_SESSION['mc']['id'] == $user_info['id'])		$user_info['mod_cache'] = $_SESSION['mc'];	else	{		require_once($sourcedir . '/Subs-Auth.php');		rebuildModCache();	}	// Now that we have the mod cache taken care of lets setup a cache for the number of mod reports still open	if (isset($_SESSION['rc']) && $_SESSION['rc']['time'] > $modSettings['last_mod_report_action'] && $_SESSION['rc']['id'] == $user_info['id'])		$context['open_mod_reports'] = $_SESSION['rc']['reports'];	elseif ($_SESSION['mc']['bq'] != '0=1')	{		require_once($sourcedir . '/ModerationCenter.php');		recountOpenReports();	}	else		$context['open_mod_reports'] = 0;}// Log a ban in the database.function log_ban($ban_ids = array(), $email = null){	global $user_info, $smcFunc;	// Don't log web accelerators, it's very confusing...	if (isset($_SERVER['HTTP_X_MOZ']) && $_SERVER['HTTP_X_MOZ'] == 'prefetch')		return;	$smcFunc['db_insert']('',		'{db_prefix}log_banned',		array('id_member' => 'int', 'ip' => 'string-16', 'email' => 'string', 'log_time' => 'int'),		array($user_info['id'], $user_info['ip'], ($email === null ? ($user_info['is_guest'] ? '' : $user_info['email']) : $email), time()),		array('id_ban_log')	);	// One extra point for these bans.	if (!empty($ban_ids))		$smcFunc['db_query']('', '			UPDATE {db_prefix}ban_items			SET hits = hits + 1			WHERE id_ban IN ({array_int:ban_ids})',			array(				'ban_ids' => $ban_ids,			)		);}// Checks if a given email address might be banned.function isBannedEmail($email, $restriction, $error){	global $txt, $smcFunc;	// Can't ban an empty email	if (empty($email) || trim($email) == '')		return;	// Let's start with the bans based on your IP/hostname/memberID...	$ban_ids = isset($_SESSION['ban'][$restriction]) ? $_SESSION['ban'][$restriction]['ids'] : array();	$ban_reason = isset($_SESSION['ban'][$restriction]) ? $_SESSION['ban'][$restriction]['reason'] : '';	// ...and add to that the email address you're trying to register.	$request = $smcFunc['db_query']('', '		SELECT bi.id_ban, bg.' . $restriction . ', bg.cannot_access, bg.reason		FROM {db_prefix}ban_items AS bi			INNER JOIN {db_prefix}ban_groups AS bg ON (bg.id_ban_group = bi.id_ban_group)		WHERE {string:email} LIKE bi.email_address			AND (bg.' . $restriction . ' = {int:cannot_access} OR bg.cannot_access = {int:cannot_access})			AND (bg.expire_time IS NULL OR bg.expire_time >= {int:now})',		array(			'email' => $email,			'cannot_access' => 1,			'now' => time(),		)	);	while ($row = $smcFunc['db_fetch_assoc']($request))	{		if (!empty($row['cannot_access']))		{			$_SESSION['ban']['cannot_access']['ids'][] = $row['id_ban'];			$_SESSION['ban']['cannot_access']['reason'] = $row['reason'];		}		if (!empty($row[$restriction]))		{			$ban_ids[] = $row['id_ban'];			$ban_reason = $row['reason'];		}	}	$smcFunc['db_free_result']($request);	// You're in biiig trouble.  Banned for the rest of this session!	if (isset($_SESSION['ban']['cannot_access']))	{		log_ban($_SESSION['ban']['cannot_access']['ids']);		$_SESSION['ban']['last_checked'] = time();		fatal_error(sprintf($txt['your_ban'], $txt['guest_title']) . $_SESSION['ban']['cannot_access']['reason'], false);	}	if (!empty($ban_ids))	{		// Log this ban for future reference.		log_ban($ban_ids, $email);		fatal_error($error . $ban_reason, false);	}}// Make sure the user's correct session was passed, and they came from here. (type can be post, get, or request.)function checkSession($type = 'post', $from_action = '', $is_fatal = true){	global $sc, $modSettings, $boardurl;	// Is it in as $_POST['sc']?	if ($type == 'post')	{		$check = isset($_POST[$_SESSION['session_var']]) ? $_POST[$_SESSION['session_var']] : (empty($modSettings['strictSessionCheck']) && isset($_POST['sc']) ? $_POST['sc'] : null);		if ($check !== $sc)			$error = 'session_timeout';	}	// How about $_GET['sesc']?	elseif ($type == 'get')	{		$check = isset($_GET[$_SESSION['session_var']]) ? $_GET[$_SESSION['session_var']] : (empty($modSettings['strictSessionCheck']) && isset($_GET['sesc']) ? $_GET['sesc'] : null);		if ($check !== $sc)			$error = 'session_verify_fail';	}	// Or can it be in either?	elseif ($type == 'request')	{		$check = isset($_GET[$_SESSION['session_var']]) ? $_GET[$_SESSION['session_var']] : (empty($modSettings['strictSessionCheck']) && isset($_GET['sesc']) ? $_GET['sesc'] : (isset($_POST[$_SESSION['session_var']]) ? $_POST[$_SESSION['session_var']] : (empty($modSettings['strictSessionCheck']) && isset($_POST['sc']) ? $_POST['sc'] : null)));		if ($check !== $sc)			$error = 'session_verify_fail';	}	// Verify that they aren't changing user agents on us - that could be bad.	if ((!isset($_SESSION['USER_AGENT']) || $_SESSION['USER_AGENT'] != $_SERVER['HTTP_USER_AGENT']) && empty($modSettings['disableCheckUA']))		$error = 'session_verify_fail';	// Make sure a page with session check requirement is not being prefetched.	if (isset($_SERVER['HTTP_X_MOZ']) && $_SERVER['HTTP_X_MOZ'] == 'prefetch')	{		ob_end_clean();		header('HTTP/1.1 403 Forbidden');		die;	}	// Check the referring site - it should be the same server at least!	if (isset($_SESSION['request_referer']))		$referrer = $_SESSION['request_referer'];	else		$referrer = isset($_SERVER['HTTP_REFERER']) ? @parse_url($_SERVER['HTTP_REFERER']) : array();	if (!empty($referrer['host']))	{		if (strpos($_SERVER['HTTP_HOST'], ':') !== false)			$real_host = substr($_SERVER['HTTP_HOST'], 0, strpos($_SERVER['HTTP_HOST'], ':'));		else			$real_host = $_SERVER['HTTP_HOST'];		$parsed_url = parse_url($boardurl);		// Are global cookies on?  If so, let's check them ;).		if (!empty($modSettings['globalCookies']))		{			if (preg_match('~(?:[^\.]+\.)?([^\.]{3,}\..+)\z~i', $parsed_url['host'], $parts) == 1)				$parsed_url['host'] = $parts[1];			if (preg_match('~(?:[^\.]+\.)?([^\.]{3,}\..+)\z~i', $referrer['host'], $parts) == 1)				$referrer['host'] = $parts[1];			if (preg_match('~(?:[^\.]+\.)?([^\.]{3,}\..+)\z~i', $real_host, $parts) == 1)				$real_host = $parts[1];		}		// Okay: referrer must either match parsed_url or real_host.		if (isset($parsed_url['host']) && strtolower($referrer['host']) != strtolower($parsed_url['host']) && strtolower($referrer['host']) != strtolower($real_host))		{			$error = 'verify_url_fail';			$log_error = true;		}	}	// Well, first of all, if a from_action is specified you'd better have an old_url.	if (!empty($from_action) && (!isset($_SESSION['old_url']) || preg_match('~[?;&]action=' . $from_action . '([;&]|$)~', $_SESSION['old_url']) == 0))	{		$error = 'verify_url_fail';		$log_error = true;	}	if (strtolower($_SERVER['HTTP_USER_AGENT']) == 'hacker')		fatal_error('Sound the alarm!  It\'s a hacker!  Close the castle gates!!', false);	// Everything is ok, return an empty string.	if (!isset($error))		return '';	// A session error occurred, show the error.	elseif ($is_fatal)	{		if (isset($_GET['xml']))		{			ob_end_clean();			header('HTTP/1.1 403 Forbidden - Session timeout');			die;		}		else			fatal_lang_error($error, isset($log_error) ? 'user' : false);	}	// A session error occurred, return the error to the calling function.	else		return $error;	// We really should never fall through here, for very important reasons.  Let's make sure.	trigger_error('Hacking attempt...', E_USER_ERROR);}// Check if a specific confirm parameter was given.function checkConfirm($action){	global $modSettings;	if (isset($_GET['confirm']) && isset($_SESSION['confirm_' . $action]) && md5($_GET['confirm'] . $_SERVER['HTTP_USER_AGENT']) == $_SESSION['confirm_' . $action])		return true;	else	{		$token = md5(mt_rand() . session_id() . (string) microtime() . $modSettings['rand_seed']);		$_SESSION['confirm_' . $action] = md5($token . $_SERVER['HTTP_USER_AGENT']);		return $token;	}}// Check whether a form has been submitted twice.function checkSubmitOnce($action, $is_fatal = true){	global $context;	if (!isset($_SESSION['forms']))		$_SESSION['forms'] = array();	// Register a form number and store it in the session stack. (use this on the page that has the form.)	if ($action == 'register')	{		$context['form_sequence_number'] = 0;		while (empty($context['form_sequence_number']) || in_array($context['form_sequence_number'], $_SESSION['forms']))			$context['form_sequence_number'] = mt_rand(1, 16000000);	}	// Check whether the submitted number can be found in the session.	elseif ($action == 'check')	{		if (!isset($_REQUEST['seqnum']))			return true;		elseif (!in_array($_REQUEST['seqnum'], $_SESSION['forms']))		{			$_SESSION['forms'][] = (int) $_REQUEST['seqnum'];			return true;		}		elseif ($is_fatal)			fatal_lang_error('error_form_already_submitted', false);		else			return false;	}	// Don't check, just free the stack number.	elseif ($action == 'free' && isset($_REQUEST['seqnum']) && in_array($_REQUEST['seqnum'], $_SESSION['forms']))		$_SESSION['forms'] = array_diff($_SESSION['forms'], array($_REQUEST['seqnum']));	elseif ($action != 'free')		trigger_error('checkSubmitOnce(): Invalid action \'' . $action . '\'', E_USER_WARNING);}// Check the user's permissions.function allowedTo($permission, $boards = null){	global $user_info, $modSettings, $smcFunc;	// You're always allowed to do nothing. (unless you're a working man, MR. LAZY :P!)	if (empty($permission))		return true;	// You're never allowed to do something if your data hasn't been loaded yet!	if (empty($user_info))		return false;	// Administrators are supermen :P.	if ($user_info['is_admin'])		return true;	// Are we checking the _current_ board, or some other boards?	if ($boards === null)	{		// Check if they can do it.		if (!is_array($permission) && in_array($permission, $user_info['permissions']))			return true;		// Search for any of a list of permissions.		elseif (is_array($permission) && count(array_intersect($permission, $user_info['permissions'])) != 0)			return true;		// You aren't allowed, by default.		else			return false;	}	elseif (!is_array($boards))		$boards = array($boards);	$request = $smcFunc['db_query']('', '		SELECT MIN(bp.add_deny) AS add_deny		FROM {db_prefix}boards AS b			INNER JOIN {db_prefix}board_permissions AS bp ON (bp.id_profile = b.id_profile)			LEFT JOIN {db_prefix}moderators AS mods ON (mods.id_board = b.id_board AND mods.id_member = {int:current_member})		WHERE b.id_board IN ({array_int:board_list})			AND bp.id_group IN ({array_int:group_list}, {int:moderator_group})			AND bp.permission {raw:permission_list}			AND (mods.id_member IS NOT NULL OR bp.id_group != {int:moderator_group})		GROUP BY b.id_board',		array(			'current_member' => $user_info['id'],			'board_list' => $boards,			'group_list' => $user_info['groups'],			'moderator_group' => 3,			'permission_list' => (is_array($permission) ? 'IN (\'' . implode('\', \'', $permission) . '\')' : ' = \'' . $permission . '\''),		)	);	// Make sure they can do it on all of the boards.	if ($smcFunc['db_num_rows']($request) != count($boards))		return false;	$result = true;	while ($row = $smcFunc['db_fetch_assoc']($request))		$result &= !empty($row['add_deny']);	$smcFunc['db_free_result']($request);	// If the query returned 1, they can do it... otherwise, they can't.	return $result;}// Fatal error if they cannot...function isAllowedTo($permission, $boards = null){	global $user_info, $txt;	static $heavy_permissions = array(		'admin_forum',		'manage_attachments',		'manage_smileys',		'manage_boards',		'edit_news',		'moderate_forum',		'manage_bans',		'manage_membergroups',		'manage_permissions',	);	// Make it an array, even if a string was passed.	$permission = is_array($permission) ? $permission : array($permission);	// Check the permission and return an error...	if (!allowedTo($permission, $boards))	{		// Pick the last array entry as the permission shown as the error.		$error_permission = array_shift($permission);		// If they are a guest, show a login. (because the error might be gone if they do!)		if ($user_info['is_guest'])		{			loadLanguage('Errors');			is_not_guest($txt['cannot_' . $error_permission]);		}		// Clear the action because they aren't really doing that!		$_GET['action'] = '';		$_GET['board'] = '';		$_GET['topic'] = '';		writeLog(true);		fatal_lang_error('cannot_' . $error_permission, false);		// Getting this far is a really big problem, but let's try our best to prevent any cases...		trigger_error('Hacking attempt...', E_USER_ERROR);	}	// If you're doing something on behalf of some "heavy" permissions, validate your session.	// (take out the heavy permissions, and if you can't do anything but those, you need a validated session.)	if (!allowedTo(array_diff($permission, $heavy_permissions), $boards))		validateSession();}// Return the boards a user has a certain (board) permission on. (array(0) if all.)function boardsAllowedTo($permissions, $check_access = true){	global $user_info, $modSettings, $smcFunc;	// Administrators are all powerful, sorry.	if ($user_info['is_admin'])		return array(0);	// Arrays are nice, most of the time.	if (!is_array($permissions))		$permissions = array($permissions);	// All groups the user is in except 'moderator'.	$groups = array_diff($user_info['groups'], array(3));	$request = $smcFunc['db_query']('', '		SELECT b.id_board, bp.add_deny		FROM {db_prefix}board_permissions AS bp			INNER JOIN {db_prefix}boards AS b ON (b.id_profile = bp.id_profile)			LEFT JOIN {db_prefix}moderators AS mods ON (mods.id_board = b.id_board AND mods.id_member = {int:current_member})		WHERE bp.id_group IN ({array_int:group_list}, {int:moderator_group})			AND bp.permission IN ({array_string:permissions})			AND (mods.id_member IS NOT NULL OR bp.id_group != {int:moderator_group})' .			($check_access ? ' AND {query_see_board}' : ''),		array(			'current_member' => $user_info['id'],			'group_list' => $groups,			'moderator_group' => 3,			'permissions' => $permissions,		)	);	$boards = array();	$deny_boards = array();	while ($row = $smcFunc['db_fetch_assoc']($request))	{		if (empty($row['add_deny']))			$deny_boards[] = $row['id_board'];		else			$boards[] = $row['id_board'];	}	$smcFunc['db_free_result']($request);	$boards = array_unique(array_values(array_diff($boards, $deny_boards)));	return $boards;}function showEmailAddress($userProfile_hideEmail, $userProfile_id){ global $modSettings, $user_info;    return 'no';	// Should this users email address be shown?	// If you're guest and the forum is set to hide email for guests: no.	// If the user is post-banned: no.	// If it's your own profile and you've set your address hidden: yes_permission_override.	// If you're a moderator with sufficient permissions: yes_permission_override.	// If the user has set their email address to be hidden: no.	// If the forum is set to show full email addresses: yes.	// Otherwise: no_through_forum.	return (!empty($modSettings['guest_hideContacts']) && $user_info['is_guest']) || isset($_SESSION['ban']['cannot_post']) ? 'no' : ((!$user_info['is_guest'] && $user_info['id'] == $userProfile_id && !$userProfile_hideEmail) || allowedTo('moderate_forum') ? 'yes_permission_override' : ($userProfile_hideEmail ? 'no' : (!empty($modSettings['make_email_viewable']) ? 'yes' : 'no_through_forum')));}?>

GeorG

Нормально у вас всё в коде (на этом отрезке), надо в другом месте искать, там где функция вызывается. Видимо мод какой-то...
Тут только если на месте разбираться, если интересует, то пишите в ЛС.
Верстка тем по шаблону, их доработка/переработка, переделка тем с версии smf 1.1 на smf 2.0. Примеры работ - insidestyle.ru
Установка модов (заточка под ваш форум); Моды под заказ; Обновление форума; Правильный перенос; Удаление/лечение вирусов; Устранения ошибок.
Обращаться в ЛС
Мой форум
Модуль анти-спама CleanTalk, сам пользуюсь
Сервера которыми сам пользуюсь - cadedic.ru