diff --git a/threadr/login/redirect.php b/threadr/login/redirect.php index 983025a..051168c 100644 --- a/threadr/login/redirect.php +++ b/threadr/login/redirect.php @@ -1,19 +1,19 @@ prepare('SELECT id, authentication_algorithm, authentication_salt, authentication_string FROM users WHERE name = :username;'); -$result = $statement->execute(array('username' => $username)); +$result = $statement->execute(array('username' => $_POST['username'])); if ($statement->rowCount() > 0) { //existing user name $dbentry = $statement->fetch(); //chechk for correct password - if ($dbentry['authentication_string'] == hash($dbentry['authentication_algorithm'], $password . $dbentry['authentication_salt'])) { + if ($dbentry['authentication_string'] == hash($dbentry['authentication_algorithm'], $_POST['password'] . $dbentry['authentication_salt'])) { //password correct $_SESSION['user_id'] = $dbentry['id']; - $_SESSION['user_ip'] = $_SERVER['REMOTE_ADDR']; //ip will be used to prevent session stealing + // IP and user agent string are used to prevent cheap session stealing + $_SESSION['user_ip'] = $_SERVER['REMOTE_ADDR']; + $_SESSION['user_http_user_agent'] = $_SERVER['HTTP_USER_AGENT']; header("Location: https://lostcave.ddnss.de/common/threadr/userhome/"); } else { //password inorrect