sql注入 XSS

来源:互联网 发布:网络销售只要做些什么 编辑:程序博客网 时间:2024/05/29 13:09

实例如下:

XSSFilter.java

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
publicvoid doFilter(ServletRequest servletrequest,
            ServletResponse servletresponse, FilterChain filterchain)
            throwsIOException, ServletException {
         
 
        //flag = true 只做URL验证; flag = false 做所有字段的验证;
        booleanflag = true;
        if(flag){
            //只对URL做xss校验
            HttpServletRequest httpServletRequest = (HttpServletRequest) servletrequest;
            HttpServletResponse httpServletResponse = (HttpServletResponse) servletresponse;
             
            String requesturi = httpServletRequest.getRequestURL().toString();
            requesturi = URLDecoder.decode(requesturi, "UTF-8");
            if(requesturi!=null&&requesturi.indexOf("alipay_hotel_book_return.html")!=-1){
                filterchain.doFilter(servletrequest, servletresponse);
                return;
            }
            if(requesturi!=null&&requesturi.indexOf("account_bank_return.html")!=-1){
                filterchain.doFilter(servletrequest, servletresponse);
                return;
            }
            if(requesturi!=null&&requesturi.indexOf("/alipay/activity.html")!=-1){
                filterchain.doFilter(servletrequest, servletresponse);
                return;
            }
            if(requesturi!=null&&requesturi.indexOf("/alipayLogin.html")!=-1){
                filterchain.doFilter(servletrequest, servletresponse);
                return;
            }
            RequestWrapper rw = newRequestWrapper(httpServletRequest);
            String param = httpServletRequest.getQueryString();
            if(!"".equals(param) && param != null) {
                param = URLDecoder.decode(param, "UTF-8");
                String originalurl = requesturi + param;
                 
                String sqlParam = param;
                //添加sql注入的判断
                if(requesturi.endsWith("/askQuestion.html") || requesturi.endsWith("/member/answer.html")){
                    sqlParam = rw.cleanSQLInject(param);
                }
                 
                String xssParam = rw.cleanXSS(sqlParam);
                requesturi += "?"+xssParam;
                 
                 
                if(!xssParam.equals(param)){
                    System.out.println("requesturi::::::"+requesturi);
                    httpServletResponse.sendRedirect(requesturi);
                    System.out.println("no entered.");
//                  filterchain.doFilter(new RequestWrapper((HttpServletRequest) servletrequest), servletresponse);
                    return;
                }
            }
            filterchain.doFilter(servletrequest, servletresponse);
        }else{
             
            //对请求中的所有东西都做校验,包括表单。此功能校验比较严格容易屏蔽表单正常输入,使用此功能请注意。
            filterchain.doFilter(newRequestWrapper((HttpServletRequest) servletrequest), servletresponse);
        }
    }
requestMapping:
 
 
publicRequestWrapper(){
        super(null);
    }
 
    publicRequestWrapper(HttpServletRequest httpservletrequest) {
        super(httpservletrequest);
    }
 
    publicString[] getParameterValues(String s) {
        String str[] = super.getParameterValues(s);
        if(str == null) {
            returnnull;
        }
        inti = str.length;
        String as1[] = newString[i];
        for(intj = 0; j < i; j++) {
            as1[j] = cleanXSS(cleanSQLInject(str[j]));
        }
 
        returnas1;
    }
 
    publicString getParameter(String s) {
        String s1 = super.getParameter(s);
        if(s1 == null) {
            returnnull;
        }else{
            returncleanXSS(cleanSQLInject(s1));
        }
    }
 
    publicString getHeader(String s) {
        String s1 = super.getHeader(s);
        if(s1 == null) {
            returnnull;
        }else{
            returncleanXSS(cleanSQLInject(s1));
        }
    }
 
    publicString cleanXSS(String src) {
        String temp =src;
 
        System.out.println("xss---temp-->"+src);
    src = src.replaceAll("<","<").replaceAll(">",">");
    // if (src.indexOf("address")==-1)
    //  {
     src = src.replaceAll("\\(","(").replaceAll("\\)",")");
        //}
    
    src = src.replaceAll("'","'");
     
    Pattern pattern=Pattern.compile("(eval\\((.*)\\)|script)",Pattern.CASE_INSENSITIVE); 
      Matcher matcher=pattern.matcher(src); 
      src = matcher.replaceAll("");
 
      pattern=Pattern.compile("[\\\"\\'][\\s]*javascript:(.*)[\\\"\\']",Pattern.CASE_INSENSITIVE);
      matcher=pattern.matcher(src);
      src = matcher.replaceAll("\"\"");
       
      //增加脚本
      src = src.replaceAll("script","").replaceAll(";","")
        .replaceAll("\"","").replaceAll("@","")
        .replaceAll("0x0d","")
        .replaceAll("0x0a","").replaceAll(",","");
 
        if(!temp.equals(src)){
            System.out.println("输入信息存在xss攻击!");
            System.out.println("原始输入信息-->"+temp);
            System.out.println("处理后信息-->"+src);
        }
        returnsrc;
    }
     
    //需要增加通配,过滤大小写组合
    publicString cleanSQLInject(String src) {
        String temp =src;
    src = src.replaceAll("insert","forbidI")
        .replaceAll("select","forbidS")
        .replaceAll("update","forbidU")
        .replaceAll("delete","forbidD")
        .replaceAll("and","forbidA")
        .replaceAll("or","forbidO");
     
        if(!temp.equals(src)){
            System.out.println("输入信息存在SQL攻击!");
            System.out.println("原始输入信息-->"+temp);
            System.out.println("处理后信息-->"+src);
        }
        returnsrc;
    }

xml配置:

?
1
2
3
4
5
6
7
8
9
10
11
12
<filter>
        <filter-name>XssFilter</filter-name>
        <filter-class>cn.com.jsoft.xss.XSSFilter</filter-class>
        <init-param>
            <param-name>encoding</param-name>
            <param-value>UTF-8</param-value>
        </init-param>
    </filter>
    <filter-mapping>
        <filter-name>XssFilter</filter-name>
        <url-pattern>/*</url-pattern>
    </filter-mapping>

以上代码仅仅将特殊的sql字符,特殊script脚本字符处理掉,具体的页面处理还需要后台处理!!

0 0
原创粉丝点击