代码审计及修复方法.springboot+ssm(erp).逻辑漏洞

文章详细描述了Tomcat中webfilter组件存在的两处逻辑漏洞,一处涉及请求URL包含特定页面时的绕过,另一处是正则匹配的漏洞。作者提供了漏洞复现的代码示例,并给出了修复这些漏洞的方法,采用了一个登陆拦截器,利用AntPathMatcher进行路径匹配,增强了安全性。
摘要由CSDN通过智能技术生成

1、tomcat 组件-webfilter,存在两处逻辑漏洞,可以绕过限制

2、漏洞代码1

        if (requestUrl != null && (requestUrl.contains("/doc.html") ||
            requestUrl.contains("/register.html") || requestUrl.contains("/login.html"))) {
            chain.doFilter(request, response);
            return;
        }

     复现1

 漏洞代码2

        if (verify(ignoredList, requestUrl)) {
            chain.doFilter(servletRequest, response);
            return;
        }
    
    private static String regexPrefix = "^.*";
    private static String regexSuffix = ".*$";

    private static boolean verify(List<String> ignoredList, String url) {
        for (String regex : ignoredList) {
            Pattern pattern = Pattern.compile(regexPrefix + regex + regexSuffix);
            Matcher matcher = pattern.matcher(url);
            if (matcher.matches()) {
                return true;
            }
        }
        return false;
    }

复现2,正则匹配绕过

3、修复

package com.****.filter;
 
 
import com.alibaba.fastjson.JSON;
import com.*****.entity.result.R;
import lombok.extern.slf4j.Slf4j;
import org.springframework.util.AntPathMatcher;
 
import javax.servlet.*;
import javax.servlet.annotation.WebFilter;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import java.io.IOException;
/**
 * 实现登陆拦截器
 */
@Slf4j
@WebFilter(filterName = "loginCheckFilter",urlPatterns = "/*")
public class LoginCheckFilter implements Filter {
    private static final AntPathMatcher ANT_PATH_MATCHER = new AntPathMatcher();
 
    @Override
    public void doFilter(ServletRequest servletRequest, ServletResponse servletResponse, FilterChain filterChain) throws IOException, ServletException {
        HttpServletRequest request = (HttpServletRequest) servletRequest;
        HttpServletResponse response = (HttpServletResponse) servletResponse;
        //获取本次请求的URI
        String requestURI = request.getRequestURI();
 
        String[] uris = new String[]{
                "/register.html",
                "/login.html",
                "/doc.html",
               
        };
        boolean check1 = check(uris, requestURI);
        if (check1) {
            log.info("check方法被调用,放行");
            log.info("拦截的请求 {}",requestURI);
            filterChain.doFilter(request, response);
            return;
        }
        if (request.getSession().getAttribute(("user")) != null) {
            filterChain.doFilter(request, response);
            return;
        }
 
        if (request.getSession().getAttribute(("user")) == null) {
            //如果未登录,通过输出流方式向客户端响应数据
            response.getWriter().write(JSON.toJSONString(R.error( "NOTLOGIN")));
            log.error("未登录,拦截页面 {}",requestURI);
        }
    }
    public boolean check(String[] urls, String requestURI) {
        for (String url : urls) {
            boolean match = ANT_PATH_MATCHER.match(url, requestURI);
            if (match){
                return  true;
            }
        }
        return false;
    }
}

 

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值