Filter过滤防止SQL漏洞
同事写的一个在请求中过滤SQL和一些HTML危险标记的东东。
从一个开源项目中修改而成的。
原本的这个开源项目下载地址是:
http://sourceforge.net/projects/antisqlfilter
在web.xml中增加如下内容:
<filter>
<filter-name>inputStringFilter</filter-name>
<filter-class>
com.sillycat.web.util.InputStringFilter
</filter-class>
</filter>
<filter-mapping>
<filter-name>inputStringFilter</filter-name>
<url-pattern>*.do</url-pattern>
</filter-mapping>
<filter-mapping>
<filter-name>inputStringFilter</filter-name>
<url-pattern>*.jsp</url-pattern>
</filter-mapping>
这个负责过滤的类InputStringFilter.java如下:
package com.sillycat.web.util;
import java.io.IOException;
import javax.servlet.Filter;
import javax.servlet.FilterChain;
import javax.servlet.FilterConfig;
import javax.servlet.ServletException;
import javax.servlet.ServletRequest;
import javax.servlet.ServletResponse;
import javax.servlet.http.HttpServletRequest;
import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;
/**
* 对request 中的所有对象, 进行内容替换,主要是替换HTML代码,防止安全漏洞
* @author feng_bin
*
*
*/
public class InputStringFilter implements Filter {
private static Log log = LogFactory.getLog(InputStringFilter.class);
public void init(FilterConfig filterConfig) throws ServletException {
}
public void doFilter(ServletRequest request, ServletResponse response,
FilterChain chain) throws IOException, ServletException {
// 遍历request 中的所有Attribute
/*
* 经过试验,发现所有提交的内容都在parameter 中
* Filter 处理结束后生成的。
* 替换String 中的内容只需要处理parameter
*
*/
chain.doFilter((new ParameterReplaceRequestWrapper((HttpServletRequest)request)), response);
}
public void destroy() {
}
}
替换HTML和SQL关键字的实现体ParameterReplaceRequestWrapper.java如下:
package com.sillycat.web.util;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletRequestWrapper;
import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;
public class ParameterReplaceRequestWrapper extends HttpServletRequestWrapper {
private static Log log = LogFactory
.getLog(ParameterReplaceRequestWrapper.class);
private static String[] KEYWORDS = {"(", "%", "/*", "*/", "--",
"exec ", "select ", "update ", "delete ", "insert ", "alter ", "drop ",
"create ", "shutdown" };
public ParameterReplaceRequestWrapper(HttpServletRequest request) {
super(request);
}
/**
* 替换html 代码
*/
public String[] getParameterValues(String parameter) {
String[] results = super.getParameterValues(parameter);
if (results == null) {
return null;
}
int count = results.length;
String[] ret_results = new String[count];
for (int i = 0; i < count; i++) {
String old_value = results[i];
if(isUnsafe(old_value)){
old_value = getSafeValue(old_value);
}
ret_results[i] = old_value.replaceAll("<", "<").replace("'",
"'").trim();
// log.debug("old value->"+old_value+", new
// value->"+ret_results[i]);
}
return ret_results;
}
public String getParameter(String parameter) {
String old_value = super.getParameter(parameter);
if (old_value == null) {
return null;
}
if(isUnsafe(old_value)){
old_value = getSafeValue(old_value);
}
String new_value = old_value.replaceAll("<", "<").replace("'",
"'").trim();
return new_value;
}
private boolean isUnsafe(String value) {
String lowerCase = value.toLowerCase();
for (int i = 0; i < KEYWORDS.length; i++) {
if (lowerCase.indexOf(KEYWORDS[i]) >= 0) {
return true;
}
}
return false;
}
private String getSafeValue(String oldValue) {
StringBuffer sb = new StringBuffer(oldValue);
String lowerCase = oldValue.toLowerCase();
for (int i = 0; i < KEYWORDS.length; i++) {
int x = -1;
while ((x = lowerCase.indexOf(KEYWORDS[i])) >= 0) {
if (KEYWORDS[i].length() == 1) {
sb.replace(x, x + 1, " ");
lowerCase = sb.toString().toLowerCase();
continue;
}
sb.deleteCharAt(x + 1);
lowerCase = sb.toString().toLowerCase();
}
}
return sb.toString();
}
}
同事写的一个在请求中过滤SQL和一些HTML危险标记的东东。
从一个开源项目中修改而成的。
原本的这个开源项目下载地址是:
http://sourceforge.net/projects/antisqlfilter
在web.xml中增加如下内容:
<filter>
<filter-name>inputStringFilter</filter-name>
<filter-class>
com.sillycat.web.util.InputStringFilter
</filter-class>
</filter>
<filter-mapping>
<filter-name>inputStringFilter</filter-name>
<url-pattern>*.do</url-pattern>
</filter-mapping>
<filter-mapping>
<filter-name>inputStringFilter</filter-name>
<url-pattern>*.jsp</url-pattern>
</filter-mapping>
这个负责过滤的类InputStringFilter.java如下:
package com.sillycat.web.util;
import java.io.IOException;
import javax.servlet.Filter;
import javax.servlet.FilterChain;
import javax.servlet.FilterConfig;
import javax.servlet.ServletException;
import javax.servlet.ServletRequest;
import javax.servlet.ServletResponse;
import javax.servlet.http.HttpServletRequest;
import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;
/**
* 对request 中的所有对象, 进行内容替换,主要是替换HTML代码,防止安全漏洞
* @author feng_bin
*
*
*/
public class InputStringFilter implements Filter {
private static Log log = LogFactory.getLog(InputStringFilter.class);
public void init(FilterConfig filterConfig) throws ServletException {
}
public void doFilter(ServletRequest request, ServletResponse response,
FilterChain chain) throws IOException, ServletException {
// 遍历request 中的所有Attribute
/*
* 经过试验,发现所有提交的内容都在parameter 中
* Filter 处理结束后生成的。
* 替换String 中的内容只需要处理parameter
*
*/
chain.doFilter((new ParameterReplaceRequestWrapper((HttpServletRequest)request)), response);
}
public void destroy() {
}
}
替换HTML和SQL关键字的实现体ParameterReplaceRequestWrapper.java如下:
package com.sillycat.web.util;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletRequestWrapper;
import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;
public class ParameterReplaceRequestWrapper extends HttpServletRequestWrapper {
private static Log log = LogFactory
.getLog(ParameterReplaceRequestWrapper.class);
private static String[] KEYWORDS = {"(", "%", "/*", "*/", "--",
"exec ", "select ", "update ", "delete ", "insert ", "alter ", "drop ",
"create ", "shutdown" };
public ParameterReplaceRequestWrapper(HttpServletRequest request) {
super(request);
}
/**
* 替换html 代码
*/
public String[] getParameterValues(String parameter) {
String[] results = super.getParameterValues(parameter);
if (results == null) {
return null;
}
int count = results.length;
String[] ret_results = new String[count];
for (int i = 0; i < count; i++) {
String old_value = results[i];
if(isUnsafe(old_value)){
old_value = getSafeValue(old_value);
}
ret_results[i] = old_value.replaceAll("<", "<").replace("'",
"'").trim();
// log.debug("old value->"+old_value+", new
// value->"+ret_results[i]);
}
return ret_results;
}
public String getParameter(String parameter) {
String old_value = super.getParameter(parameter);
if (old_value == null) {
return null;
}
if(isUnsafe(old_value)){
old_value = getSafeValue(old_value);
}
String new_value = old_value.replaceAll("<", "<").replace("'",
"'").trim();
return new_value;
}
private boolean isUnsafe(String value) {
String lowerCase = value.toLowerCase();
for (int i = 0; i < KEYWORDS.length; i++) {
if (lowerCase.indexOf(KEYWORDS[i]) >= 0) {
return true;
}
}
return false;
}
private String getSafeValue(String oldValue) {
StringBuffer sb = new StringBuffer(oldValue);
String lowerCase = oldValue.toLowerCase();
for (int i = 0; i < KEYWORDS.length; i++) {
int x = -1;
while ((x = lowerCase.indexOf(KEYWORDS[i])) >= 0) {
if (KEYWORDS[i].length() == 1) {
sb.replace(x, x + 1, " ");
lowerCase = sb.toString().toLowerCase();
continue;
}
sb.deleteCharAt(x + 1);
lowerCase = sb.toString().toLowerCase();
}
}
return sb.toString();
}
}