java通过过滤器方式,预防xss攻击:
一共两个类:
1.过滤器
2.通过重写getParameter()方法,将参数名和参数都做xss过滤
以下为具体代码:
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletRequestWrapper;
import java.text.CharacterIterator;
import java.text.StringCharacterIterator;
import java.util.regex.Pattern;
public class XssHttpServletRequestWrapperNew extends HttpServletRequestWrapper{
HttpServletRequest orgRequest = null;
public XssHttpServletRequestWrapperNew(HttpServletRequest request) {
super(request);
orgRequest = request;
}
/**
* 覆盖getParameter方法,将参数名和参数值都做xss过滤。
* 如果需要获得原始的值,则通过super.getParameterValues(name)来获取
* getParameterNames,getParameterValues和getParameterMap也可能需要覆盖
*/
@Override
public String getParameter(String name) {
String value = super.getParameter(xssEncode(name));
if (value != null) {
value = xssEncode(value);
value = HTMLEncode(value);
}
return value;
}
/**
* 对一些特殊字符进行转义
*/
public static String HTMLEncode(String aText){
final StringBuilder result = new StringBuilder();
final StringCharacterIterator iterator = new StringCharacterIterator(aText);
char character = iterator.current();
while (character != CharacterIterator.DONE ){
if (character == '<') {
result.append("<");
} else if (character == '>') {
result.append(">");
} else if (character == '&') {
result.append("&");