вот что произошло после замены файлов при интеграции на сервере .. сверху в админке и на сайте написано вот это
T'] )) { header( 'HTTP/1.0 403 Forbidden' ); mosErrorAlert( _NOT_AUTH ); return; } // Make sure the form was indeed POST'ed: // (requires your html form to use: action="post") if (!$_SERVER['REQUEST_METHOD'] == 'POST' ) { header( 'HTTP/1.0 403 Forbidden' ); mosErrorAlert( _NOT_AUTH ); return; } if ($header) { // Attempt to defend against header injections: $badStrings = array( 'Content-Type:', 'MIME-Version:', 'Content-Transfer-Encoding:', 'bcc:', 'cc:' ); // Loop through each POST'ed value and test if it contains // one of the $badStrings: _josSpoofCheck( $_POST, $badStrings ); } } function _josSpoofCheck( $array, $badStrings ) { // Loop through each $array value and test if it contains // one of the $badStrings foreach( $array as $v ) { if (is_array( $v )) { _josSpoofCheck( $v, $badStrings ); } else { foreach ($badStrings as $v2) { if ( stripos( $v, $v2 ) !== false ) { header( 'HTTP/1.0 403 Forbidden' ); mosErrorAlert( _NOT_AUTH ); exit(); // mosErrorAlert dies anyway, double check just to make sure } } } } } /** * Method to determine a hash for anti-spoofing variable names * * @return string Hashed var name * @static */ function josSpoofValue($alt=NULL) { global $mainframe; if ($alt) { if ( $alt == 1 ) { $random = date( 'Ymd' ); } else { $random = $alt . date( 'Ymd' ); } } else { $random = date( 'dmY' ); } // the prefix ensures that the hash is non-numeric // otherwise it will be intercepted by globals.php $validate = 'j' . mosHash( $mainframe->getCfg( 'db' ) . $random ); return $validate; } // ----- NO MORE CLASSES OR FUNCTIONS PASSED THIS POINT ----- // Post class declaration initialisations // some version of PHP don't allow the instantiation of classes // before they are defined /** @global mosPlugin $_MAMBOTS */ $_MAMBOTS = new mosMambotHandler(); ?>
что это ??