import javax.servlet.http.HttpServletRequest;
/**
-
防SQL注入工具类
-
把SQL关键字替换为空字符串
-
@author zhao
-
@since 2015.7.23
*/
public class AntiSqlInjection {public final static String regex = “’|%|–|and|or|not|use|insert|delete|update|select|count|group|union” +
“|create|drop|truncate|alter|grant|execute|exec|xp_cmdshell|call|declare|source|sql”;/**
- 把SQL关键字替换为空字符串
- @param param
- @return
*/
public static String filter(String param){
if(param == null){
return param;
}
return param.replaceAll("(?i)"+regex, “”); //(?i)不区分大小写替换
}
/**
- 返回经过防注入处理的字符串
- @param request
- @param name
- @return
*/
public static String getParameter(HttpServletRequest request, String name){
return AntiSqlInjection.filter(request.getParameter(name));
}
public static void main(String[] args) {
//System.out.println(StringEscapeUtils.escapeSql(“1’ or ‘1’ = '1; drop table test”)); //1’’ or ‘‘1’’ = ''1; drop table test
String str = "sElect * from test where id = 1 And name != ‘sql’ ";
String outStr = “”;
for(int i=0; i<1000; i++){
outStr = AntiSqlInjection.filter(str);
}
System.out.println(outStr);
}
}