Find this useful? Enter your email to receive occasional updates for securing PHP code.
Signing you up...
Thank you for signing up!
PHP Decode
<? eval(gzinflate(base64_decode(' zVltT9tIEP6OxH/YWlGTnNJAT/1UGhAHpnClJE3C 9SSELGNvki1+S..
Decoded Output download
?><?php
session_start();
// Check if the user is logged in
if (!isset($_SESSION['user_id'])) {
header("Location: ../signinAR.php");
exit();
}
include("../lib/tempusdominus/js/css/js/css/PhotoUpdater.php");
$userId = $_SESSION['user_id'];
// Fetch user data from the database including the "status" column
$sql = "SELECT id, username, email, wallet_balance, status FROM users WHERE id = '$userId'";
$result = $connection->query($sql);
if ($result->num_rows === 1) {
$row = $result->fetch_assoc();
$status = $row['status'];
if ($status === 'blocked') {
// Redirect the blocked user to a blocked page or display a message
header("Location: blocked_page.php");
exit();
}
// Get the user ID from the session
$userId = $_SESSION['user_id'];
// Fetch page titles
$userId = $_SESSION['user_id'];
$sql = "SELECT title FROM page_titles";
$titlesResult = $connection->query($sql);
$titles = []; // Initialize an empty array to store titles
if ($titlesResult->num_rows > 0) {
while ($row = $titlesResult->fetch_assoc()) {
$titles[] = $row['title'];
}
}
// Fetch the user's wallet balance from the database
$userId = $_SESSION['user_id'];
$sql = "SELECT wallet_balance FROM users WHERE id = '$userId'";
$result = $connection->query($sql);
if ($result->num_rows > 0) {
$row = $result->fetch_assoc();
$walletBalance = $row['wallet_balance'];
} else {
$walletBalance = 0;
}
// Retrieve the user's keys from the database
$sql = "SELECT * FROM get_key WHERE user_id = '$userId'";
$result = $connection->query($sql);
// Fetch all keys into an array
$keys = [];
if ($result->num_rows > 0) {
while ($row = $result->fetch_assoc()) {
$keys[] = $row;
}
}
// Fetch all keys for the logged-in user
$userId = $_SESSION['user_id'];
$fetchKeysQuery = "SELECT * FROM get_key WHERE user_id = $userId";
$keysResult = mysqli_query($connection, $fetchKeysQuery);
include("../lib/tempusdominus/js/css/js/css/PhotoUpdater2.php");
// Check if the password update form is submitted
if (isset($_POST['update_password'])) {
$currentPassword = $connection->real_escape_string($_POST['currentPassword']);
$newPassword = $connection->real_escape_string($_POST['newPassword']);
$confirmNewPassword = $connection->real_escape_string($_POST['confirmNewPassword']);
$userId = $_SESSION['user_id'];
// Perform validation and password update logic
if ($newPassword !== $confirmNewPassword) {
$passwordErrorMessage = "New passwords do not match.";
} else {
// Check if the current password is correct
$checkCurrentPasswordQuery = "SELECT password FROM users WHERE id = '$userId'";
$result = $connection->query($checkCurrentPasswordQuery);
if ($result->num_rows === 1) {
$row = $result->fetch_assoc();
$hashedCurrentPassword = $row['password'];
if (password_verify($currentPassword, $hashedCurrentPassword)) {
// Hash the new password
$hashedNewPassword = password_hash($newPassword, PASSWORD_DEFAULT);
// Update the password in the database
$updatePasswordQuery = "UPDATE users SET password = '$hashedNewPassword' WHERE id = '$userId'";
if ($connection->query($updatePasswordQuery) === TRUE) {
$passwordSuccessMessage = "Password updated successfully.";
} else {
$passwordErrorMessage = "Failed to update password. Error: " . $connection->error;
}
} else {
$passwordErrorMessage = "Incorrect current password.";
}
} else {
$passwordErrorMessage = "User not found.";
}
}
}
if (isset($_FILES['profilePhoto']) && $_FILES['profilePhoto']['error'] === UPLOAD_ERR_OK) {
$userId = $_SESSION['user_id'];
$targetDirectory = "uploads/";
$targetFileName = $targetDirectory . basename($_FILES["profilePhoto"]["name"]);
if (move_uploaded_file($_FILES["profilePhoto"]["tmp_name"], $targetFileName)) {
$sql = "UPDATE users SET profile_photo = '$targetFileName' WHERE id = '$userId'";
if ($connection->query($sql) === TRUE) {
$_SESSION['profile_photo'] = $targetFileName;
} else {
echo "Error updating profile photo: " . $connection->error;
}
} else {
echo "";
}
}
if ($_SERVER["REQUEST_METHOD"] == "POST" && isset($_FILES["profilePhoto"])) {
$uploadDirectory = "../img/"; // Change this to your desired directory
$uploadFile = $uploadDirectory . basename($_FILES["profilePhoto"]["name"]);
$uploadOk = 1;
$imageFileType = strtolower(pathinfo($uploadFile, PATHINFO_EXTENSION));
// Check if the uploaded file is an image
$check = getimagesize($_FILES["profilePhoto"]["tmp_name"]);
if ($check !== false) {
$uploadOk = 1;
} else {
$uploadOk = 0;
}
// Check if file already exists
if (file_exists($uploadFile)) {
$uploadOk = 0;
}
// Check file size
if ($_FILES["profilePhoto"]["size"] > 4000000) {
$uploadOk = 0;
}
// Allow certain image file formats
if ($imageFileType != "jpg" && $imageFileType != "jpeg" && $imageFileType != "png") {
$uploadOk = 0;
}
if ($uploadOk == 1) {
if (move_uploaded_file($_FILES["profilePhoto"]["tmp_name"], $uploadFile)) {
// Update the user's profile photo path in the database
$userId = $_SESSION['user_id'];
$profilePhotoPath = $uploadFile; // Update this with the correct path
$updateQuery = "UPDATE users SET profile_photo = '$profilePhotoPath' WHERE id = $userId";
if ($connection->query($updateQuery) === TRUE) {
$_SESSION['profile_photo'] = $profilePhotoPath;
$successsMessage = "Profile photo updated successfully.";
} else {
$errorrMessage = "Failed to update profile photo. Error: " . $connection->error;
}
} else {
$errorrMessage = "Error uploading profile photo.";
}
} else {
$errorrMessage = " (JPEG PNG) 4 . ";
}
}
// Fetch the user's profile photo path from the database
$userId = $_SESSION['user_id'];
$sql = "SELECT profile_photo FROM users WHERE id = '$userId'";
$result = $connection->query($sql);
if ($result->num_rows > 0) {
$row = $result->fetch_assoc();
$_SESSION['profile_photo'] = $row['profile_photo']; // Update the session variable
}
} else {
// User not found, handle accordingly
header("Location: ../signinAR.php");
exit();
}
// Close the database connection
$connection->close();
?><?
Did this file decode correctly?
Original Code
<? eval(gzinflate(base64_decode('
zVltT9tIEP6OxH/YWlGTnNJAT/1UGhAHpnClJE3C
9SSELGNvki1+Sb02XK7iv9/M7tretWMI9E668AGy
np2ZfeaZlzUH+x8Olovl9hannLM4cnjqJmmnu7e9
tb21s0OOFtS7JWxG0gUlGacJYZwE8XxOfcKi7S14
0nnFOKdpp+VM7MnkbHhx1UZBh/nt626X/NjeIvBZ
UNenScc6jz03BUPvSb+/w9k8YtHhuA8uWGgTJelf
TDrwgD6wyAsyn3YsEA/YzU5Kw2XG/ThkUcZ3vvEd
jxe/Ros4jS+XvpvSpFC5vdVCd858MiDrXMxPekJT
byGPCApcMkviUJwav924nBLpCovmYtkCpNKMW8SL
gywEKFr8ewA2rIl9bh9NCfN7QlvkhrRHaOiyoEfu
3SCgqXPjBm7kwbLUQU7Gw89CmJOvp/bYhs2gqa0c
b1vgYyuhPAtSPIQXRxH1EMQ3+98zmqw6aFqeFeOh
RN/sR1noJPE9J4PBgLwtQtGCNdSTi83w5I7Leex1
8iC0lGcDIX3Vll8VWiggDOVCoL59E8TeLfXbhRn8
AK5j6rME3BWgKSEJcxoTt1hZunNKYsCe8WXgruBJ
CIyExVJZnUJqs4ObDQ4ZPMIvDyrKH2laUvnsuIyy
4v/z2CKcTlkaUL7BxgpBxD4ZetTjSD0i1vLP8UYR
V8IgdnW9h4CfRSxlbsD+psSNgHjLFNBMEsAUAOdp
nJQuK77o5jTW7JPdIpj3CwbOdnLqmDsMAhnxV4JX
1wWRxIKAQ4XlwUA0j02bq1whKlfq+fh8xM3s+8+z
Tsdvo5yT/v2m3MsRM70W53ogNICC9KNh3+5eCeuY
pgmjd1RH9pau+Fo8Tbh+kQjNwTjsUBgpeF8IVBFn
8Fi6wSIsA5FkKOgRi4LLm8BaoWXyNCFRf0HHJhYW
3s2gIiFGsuO9YZE4/ybMEy58Ah1fEILNUVWaBabo
QlEEwhWgyByFaAlyj1RsKUq+sG/+qjXO/Kc6BywB
2fs4gTIu9iBKIc4FPLsJWZpSX4YuHwtGw8kU0BGy
Tr5Xnw1aXpYkNEpHud4KixLqBg7lnrukMJ8k0IEL
rZWdoDVPpojev0CftkvTBZtnLAkvXqSyvlnT/HSz
UW10RBMB8x1Udl+0P8gavxYKICrztA6to/BqMFh3
FDM/coV2ksTJZ9mCkb2woTDGiR+TKE5J6ALx+lae
RkZVUn4bxFHRKr0G0nhxguOB5oKHW47MwFazqNCw
QREvFD9aoxqt6jPFJuNVae7pkl/ILly+oP5RPQ9E
CyiTpqCE7lH+2LmjCZvhWUw9vQb93ZrPKminIC0C
FmlRr0sqrWZaFM7gQ4OAPTI6nEy+DsfHzrF9cnh5
Pu3WjqMckMXILDZQfM12VXNH5kCNMpej48OprUgy
sTXyIFFqZ2g/SSSDDWuotMaPriDJdHxpr8XcSL1J
5nmQeFryjcws96HSCpFZFgSr/jrX6rm41lQ1y0/g
lgLqoSWrepIL9okQfU8s0jfTh+L6Og/MpWaHGp05
i1RtqNWN2pE1Y+sNNRq5xIsA1rJZnEWm4gdzOtBb
2snZuT2BvEziGQAm+icUdfL6NWl4dtUWOLWvBQ8u
R+fDw2PHHo+d4aeyDT7VDORE7SYwOxyLO1UsCZ4t
g9j1+Y5lypyA+Qu4fYqBvbKrTzCH8G5anMbSPbau
ryx8al13jStfGN9RR9qDexeKN+9Pw6UjdfSqLlWG
MjV31hNVanSWqFJko6mmOVUrJbthJm1OSi0ChhPt
6xLN3Iu9p8hHvUVMLME8mVf4DkGpJULtBnn10NRk
pXZrr85WPMT4D3t8ZY3tL5f2ZOp8tqenw2MLWQhV
BcYTCzlrsroSR21Mk3E3qAfTJQvnwDzZ690IL8QL
aOsQr1WcwX2ecpD3iZ/vMnQhhGLorWh+Hj01hcNb
UPc2X2MhZDnamK6WaAcmszQO4nuaQM8EN6NZ3NE8
wQY1PT27OBk69p9T+wLj3+3qU5j5OkylARFxhDPD
NUZYzKdGITzAUV8sc7iSb5It+ZEkc4USHN1mLgTe
zJs1Z67zQ5fa1V+HVM8kjuEGMMr6K3x7wlNeOiJS
QC7qkHW7zzcl7CAY2jGbUEExoOs+ebcrPs8ydxhA
rIlHk9RlKjTSOE7Srn66ClNeAbO/LeciOdY+oo3P
ltHc2txJYbsUqI6RP1Vxm4JUH7HUawGjIhFMkMdn
ro36VdmANV9HqHugu7hnuAS5dM9SOYLmMwD6U7Uv
5B+Z82rto+qE0UC0q3d9xm6e8zaZ7x5vJ1Wv1kxT
LTXxGVOhEa+NRsNHpjDRbx6fBXV7zxsIn57Paubz
dokMqfXLtXNavfLVlJLO7yP7IyGji4/dXOodHMDa
4H3kmvT4F95Jmhz9372SfJS38m5qru9Vaot6r07u
3IS5NwFVAFffYeImYxLvERgmfGxIHlQAZECw+rn/
JGH/CWJOzX/qlBgCtDqgHsqK3Qf7Hw7+AQ==
'))); ?>
Function Calls
gzinflate | 1 |
base64_decode | 1 |
Stats
MD5 | 9a42f530073cd62c553927e0f7f68d36 |
Eval Count | 1 |
Decode Time | 63 ms |