该文件可以包含在任何需要调用数据库的ASP文件头部,直接过虑掉非法注入

来源:互联网 发布:天弘沪深300 知乎 编辑:程序博客网 时间:2024/05/29 15:56

<%
'该文件可以包含在任何需要调用数据库的ASP文件头部,直接过虑掉非法注入
'调用方法为:
<!-- #include file="safe.asp" -->

Function Safe(str)'该函数用来判断传递过来的变量是否包含特殊字符,没有返回TRUE
  Dim s_BadStr, n, i
  s_BadStr = "'  &<>?%,;:()`~!@#$^*{}[]|//+-="&Chr(34)&Chr(9)&Chr(32)
  n = Len(s_BadStr)
  Safe = True
 
  For i = 1 To n
    If Instr(str, Mid(s_BadStr, i, 1)) > 0 Then
      Safe = False
      Exit Function
    End If
  Next
End Function
'以下代码直接判断发生请求的URL是否包含非法字符
On Error Resume Next
Dim strTemp

If LCase(Request.ServerVariables("HTTPS")) = "off" Then
 strTemp = "http://"
Else
 strTemp = "https://"
End If

strTemp = strTemp & Request.ServerVariables("SERVER_NAME")
If Request.ServerVariables("SERVER_PORT") <> 80 Then strTemp = strTemp & ":" & Request.ServerVariables("SERVER_PORT")
strTemp = strTemp & Request.ServerVariables("URL")

If Trim(Request.QueryString) <> "" Then strTemp = strTemp & "?" & Trim(Request.QueryString)
strTemp = LCase(strTemp)

If Instr(strTemp,"select%20") or Instr(strTemp,"insert%20") or Instr(strTemp,"delete%20from") or Instr(strTemp,"count(") or Instr(strTemp,"drop%20table") or Instr(strTemp,"update%20") or Instr(strTemp,"truncate%20") or Instr(strTemp,"asc(") or Instr(strTemp,"mid(") or Instr(strTemp,"char(") or Instr(strTemp,"xp_cmdshell") or Instr(strTemp,"exec%20master") or Instr(strTemp,"net%20localgroup%20administrators")  or Instr(strTemp,"db_name(") or Instr(strTemp,"net%20user") or Instr(strTemp,"'") or Instr(strTemp,"%20or") or Instr(strTemp,"backup%20") then
  Response.Write "<script language='javascript'>"
  Response.Write "alert('非法地址!!');"
  Response.Write "location.href='http://www.myzone.cn';"
  Response.Write "</script>"
End If

For Each name In Request.Form
   Dim s_BadStr, s_Sz, i
  s_BadStr = "'|and|select|update|chr|delete|from|;|insert|mid|master.|truncate|db_name|xp_cmdshell|exec%20master|net%20localgroup%20administrators|drop|table|db_name(|exec"
  s_Sz = split(s_BadStr,"|")
  For i = 0 To ubound(s_Sz)
    If Instr(Request.Form(name), s_Sz(i)) > 0 Then
    Response.Write "<script language='javascript'>"
    Response.Write "alert('非法地址!!');"
    Response.Write "location.href='http://www.myzone.cn';"
    Response.Write "</script>"
    End If
  Next
Next
 %>

原创粉丝点击