Filter过滤防止SQL漏洞

Filter过滤防止SQL漏洞
同事写的一个在请求中过滤SQL和一些HTML危险标记的东东。
从一个开源项目中修改而成的。
原本的这个开源项目下载地址是:

http://sourceforge.net/projects/antisqlfilter

在web.xml中增加如下内容:
<filter>
<filter-name>inputStringFilter</filter-name>
<filter-class>
com.sillycat.web.util.InputStringFilter
</filter-class>
</filter>

<filter-mapping>
<filter-name>inputStringFilter</filter-name>
<url-pattern>*.do</url-pattern>
</filter-mapping>
<filter-mapping>
<filter-name>inputStringFilter</filter-name>
<url-pattern>*.jsp</url-pattern>
</filter-mapping>

这个负责过滤的类InputStringFilter.java如下:
package com.sillycat.web.util;

import java.io.IOException;

import javax.servlet.Filter;
import javax.servlet.FilterChain;
import javax.servlet.FilterConfig;
import javax.servlet.ServletException;
import javax.servlet.ServletRequest;
import javax.servlet.ServletResponse;
import javax.servlet.http.HttpServletRequest;

import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;

/**
* 对request 中的所有对象, 进行内容替换,主要是替换HTML代码,防止安全漏洞
* @author feng_bin
*
*
*/
public class InputStringFilter implements Filter {

private static Log log = LogFactory.getLog(InputStringFilter.class);

public void init(FilterConfig filterConfig) throws ServletException {
}

public void doFilter(ServletRequest request, ServletResponse response,
FilterChain chain) throws IOException, ServletException {

// 遍历request 中的所有Attribute
/*
* 经过试验,发现所有提交的内容都在parameter 中
* Filter 处理结束后生成的。
* 替换String 中的内容只需要处理parameter
*
*/
chain.doFilter((new ParameterReplaceRequestWrapper((HttpServletRequest)request)), response);

}
public void destroy() {
}

}

替换HTML和SQL关键字的实现体ParameterReplaceRequestWrapper.java如下:
package com.sillycat.web.util;

import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletRequestWrapper;

import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;

public class ParameterReplaceRequestWrapper extends HttpServletRequestWrapper {

private static Log log = LogFactory
.getLog(ParameterReplaceRequestWrapper.class);

private static String[] KEYWORDS = {"(", "%", "/*", "*/", "--",
"exec ", "select ", "update ", "delete ", "insert ", "alter ", "drop ",
"create ", "shutdown" };

public ParameterReplaceRequestWrapper(HttpServletRequest request) {
super(request);
}

/**
* 替换html 代码
*/
public String[] getParameterValues(String parameter) {
String[] results = super.getParameterValues(parameter);
if (results == null) {
return null;
}

int count = results.length;
String[] ret_results = new String[count];
for (int i = 0; i < count; i++) {
String old_value = results[i];
if(isUnsafe(old_value)){
old_value = getSafeValue(old_value);
}
ret_results[i] = old_value.replaceAll("<", "<").replace("'",
"'").trim();
// log.debug("old value->"+old_value+", new
// value->"+ret_results[i]);
}

return ret_results;
}

public String getParameter(String parameter) {
String old_value = super.getParameter(parameter);
if (old_value == null) {
return null;
}
if(isUnsafe(old_value)){
old_value = getSafeValue(old_value);
}
String new_value = old_value.replaceAll("<", "<").replace("'",
"'").trim();
return new_value;
}

private boolean isUnsafe(String value) {
String lowerCase = value.toLowerCase();
for (int i = 0; i < KEYWORDS.length; i++) {
if (lowerCase.indexOf(KEYWORDS[i]) >= 0) {
return true;
}
}
return false;
}

private String getSafeValue(String oldValue) {
StringBuffer sb = new StringBuffer(oldValue);
String lowerCase = oldValue.toLowerCase();
for (int i = 0; i < KEYWORDS.length; i++) {
int x = -1;
while ((x = lowerCase.indexOf(KEYWORDS[i])) >= 0) {
if (KEYWORDS[i].length() == 1) {
sb.replace(x, x + 1, " ");
lowerCase = sb.toString().toLowerCase();
continue;
}
sb.deleteCharAt(x + 1);
lowerCase = sb.toString().toLowerCase();
}
}
return sb.toString();
}

}
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值