The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
Import External Images Details »» | |||||||||||||||||||||||||||||||||||
This vBulletin 4 product imports external images in your posts from external servers or paths into a specific path, normally your forum's image folder.
Differently than the previous product Image Cache for vBulletin 3.x., it parses the posts at regular intervals for new images and replaces the external references in the background. Also, instead of using only a single folder, it creates folders for years and months, making it much easier to handle large quantities of images. The source and destination image URL's are stored into database, too, avoiding unnecessary duplicates. It moves and optionally converts images from one place to another. It is a handy tool in order to keep your images local to your forums. Version 1.0.4 is temporarily in BETA stage until the users have confirmed the newly requested features. Version 1.0.5 is still in BETA stage. It adds a new bunch of additional features, one of which allows you to test your mathematical understanding ... and a few other to fine-tune CURL and socket timeouts, and resizing on the fly of too large images. If you don't know what these options do, please leave them at their default values. Download Now
Screenshots
Supporters / CoAuthors Show Your Support
|
20 благодарности(ей) от: | ||
Baja, bond010007, cRipTz, da_judge, Delfi_r, hivitro, imported_EkSeS, john7911, kafi, mescalin, mohammadxxx, RichieBoy67, sweetpotato, tbworld, Techno Cowboy, The_Hawk, thomas, Virus81, xertox, Zero13 |
Comments |
#822
|
||||
|
||||
The plugin in itself is not insecure as I do not believe that the intention of scanning files for malicious code was ever its intent. That being said you can then say vBulletin is not secure in that the way it allows you to have attachments and upload avatars. There is a known exploit:
The following issues exist in vBulletin itself, reported by us to vBulletin support over 60 days ago(years now). Since vBulletin has not patched or disclosed the issues since that time, we now do so here: An image decompression bomb vulnerability exists when vBulletin Options > Message Attachment Options > Resize Images = Yes. Disable it to protect your site. An image decompression bomb vulnerability exists when allowing user uploads for avatars and profile pictures. To protect your site, change your forum's permissions so that users cannot upload custom avatars or profile pics. An image decompression bomb vulnerability exists when using ImageMagick for images and allowing uploads. Currently known issues are for PDFs and TIFFs; however, because the filename of the incoming upload is not trustworthy, removing entries from the Attachment Manager or changing Attachment Permissions are not viable options. The following mitigation options exist: Change vBulletin Options > Image Settings > Image Processing Library = GD, OR Change your forum's permissions so that no users can upload anything. In an attempt to figure the best way to resolve this sort of thing would be to update the Fractalizer Plugin to work with VB 4: https://vborg.vbsupport.ru/showthread.php?t=187482 |
#823
|
||||
|
||||
Any fix for PHP 7.1+
PHP Fatal error: [] operator not supported for strings on line 324 in /home/........./public_html/forums/includes/cron/iei_cron.php |
#824
|
|||
|
|||
Edit
PHP Code:
PHP Code:
PHP Code:
Edit: former edit of line 342 was stupid. Deleted |
#825
|
||||
|
||||
Thank you for the quick reply
File edits made. Will check the log file latter on tonight and see if anything pops back up. Still getting (1) error with this... NOTICE: PHP message: PHP Fatal error: syntax error, unexpected ';', expecting ']' on line 334 in /home/........./public_html/forums/includes/cron/iei_cron.php" This did not work... Code:
if(!count($image_tags)) { $image_tags = ['img']; } |
#826
|
||||
|
||||
I'm very unhappy with PHP 7, which converts the untyped language in a typed one. Having said this, you may test
if (isset($iei_ignore)) ... in order to see if the variable was actually set, or better, use a different variable to read the value, and use $iei_ignore = array(); beforehand. E.g.: $iei_ignore = array(); $x_ignore = explode("\r\n", $input_ignore); if (!is_array($x_ignore)) { $iei_ignore[] = $bburl; } else { $iei_ignore = $x_ignore; } |
#827
|
|||
|
|||
Quote:
But of course you can use the other version or from y2ksw (but the if conditions there is wrong I think) |
#828
|
||||
|
||||
$image_tags = array('img');
As far as I know, implicit arrays are not allowed for a long time by now, but explicit arrays like above, must work. |
#829
|
||||
|
||||
Is there anyway to get this to support a URL such as:
Code:
https://scontent-lax3-1.xx.fbcdn.net/v/t1.0-9/fr/cp0/e15/q65/94475070_10213603321997797_6910232200327725056_o.jpg?_nc_cat=108&_nc_sid=ca434c&efg=eyJpIjoidCJ9&_nc_oc=AQlsUa106dvp0CMIRD8nGvIE-2Hc9WyOAf3nmJ0ANiOGTbUAnpGlycnsQFC5Sbpeq-4zdhQUmJqUb9BVRXAP4Uvg&_nc_ht=scontent-lax3-1.xx&_nc_tp=14&oh=ee495fa093d4139e821daa867b450a8e&oe=5EC82DE0 |
#830
|
|||
|
|||
I was going to suggest you strip off everything after the .jpg extension so it would just be this:
Code:
https://scontent-lax3-1.xx.fbcdn.net/v/t1.0-9/fr/cp0/e15/q65/94475070_10213603321997797_6910232200327725056_o.jpg Maybe because it's a CDN, possibly a private CDN? |
#831
|
||||
|
||||
Quote:
|
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
More Information | |
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|