css防注入,防止最近流行的com/css/c.js注入的解决方法

最近流行的病毒SQL代码:Script Src=;现已找到解决办法。

直接复制下面的代码保存一个ASP文件

#include到数据库连接文件就OK了

至于已经存在的咋数据库直接运行一下代码替换

update ass set title =replace(cast(title as varchar(8000)),’js代码段’,”)

只能一个字段一个字段的进行替换,没有别的办法

'--------定义部份------------------

Dim XH_Post,XH_Get,XH_Cookie,XH_In,XH_Inf,XH_Xh,XH_Inf2,XH_In2

'自定义需要过滤的字串,用 "|" 分隔

XH_In = "'|;|and|exec|insert|select|delete%20from|update|count|*|%|chr|mid|master|truncate|char|declare|drop%20table|from|net%20user|xp_cmdshell|/add|net%20localgroup%20administrators|Asc|char"

XH_In2 = "'|;|and|exec|insert|select|delete%20from|update|count|chr|mid|master|truncate|char|declare|drop%20table|from|net%20user|xp_cmdshell|/add|net%20localgroup%20administrators|Asc|char"

'----------------------------------

%>

XH_Inf = split(XH_In,"|")

XH_Inf2 = split(XH_In2,"|")

'--------POST部份------------------

If Request.Form<>"" Then

For Each XH_Post In Request.Form

For XH_Xh=0 To Ubound(XH_Inf)

If Instr(LCase(Request.Form(XH_Post)),XH_Inf(XH_Xh))<>0 Then

Response.Write "非法操作!系统做了如下记录↓
"

Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"
"

Response.Write "操作时间:"&Now&"
"

Response.Write "操作页面:"&Request.ServerVariables("URL")&"
"

Response.Write "提交方式:POST
"

Response.Write "提交参数:"&XH_Post&"
"

Response.Write "提交数据:"&Request.Form(XH_Post)

Response.End

End If

Next

Next

End If

'----------------------------------

'--------GET部份-------------------

If Request.QueryString<>"" Then

For Each XH_Get In Request.QueryString

For XH_Xh=0 To Ubound(XH_Inf)

If Instr(LCase(Request.QueryString(XH_Get)),XH_Inf(XH_Xh))<>0 Then

Response.Write "非法操作!系统做了如下记录↓
"

Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"
"

Response.Write "操作时间:"&Now&"
"

Response.Write "操作页面:"&Request.ServerVariables("URL")&"
"

Response.Write "提交方式:GET
"

Response.Write "提交参数:"&XH_Get&"
"

Response.Write "提交数据:"&Request.QueryString(XH_Get)

Response.End

End If

Next

Next

End If

'----------------------------------

'--------COOKIE部份-------------------

If Request.Cookies<>"" Then

For Each XH_Cookie In Request.Cookies

For XH_Xh=0 To Ubound(XH_Inf2)

If Instr(LCase(Request.Cookies(XH_Cookie)),XH_Inf2(XH_Xh))<>0 Then

Response.Write "非法操作!系统做了如下记录↓
"

Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"
"

Response.Write "操作时间:"&Now&"
"

Response.Write "操作页面:"&Request.ServerVariables("URL")&"
"

Response.Write "提交方式:Cookie
"

Response.Write "提交参数:"&XH_Cookie&"
"

Response.Write "提交数据:"&Request.Cookies(XH_Cookie)

Response.End

End If

Next

Next

End If

'----------------------------------

%>

如果有必要用cookie做认证的可以用下面试验下,可以保证躲过这次的自动攻击,但手动攻击不保证能防住,有条件的还是把cookie认证改成session认证保险点

如果没有COOKIE认证,可以直接用这个,代码不需要修改

代码如下

'--------定义部份------------------

Dim XH_Post,XH_Get,XH_Cookie,XH_In,XH_Inf,XH_Xh

'自定义需要过滤的字串,用 "|" 分隔

XH_In = "'|;|and|exec|insert|select|delete%20from|update|count|*|%|chr|mid|master|truncate|char|declare|drop%20table|from|net%20user|xp_cmdshell|/add|net%20localgroup%20administrators|Asc|char"

'----------------------------------

%>

XH_Inf = split(XH_In,"|")

'--------POST部份------------------

If Request.Form<>"" Then

For Each XH_Post In Request.Form

For XH_Xh=0 To Ubound(XH_Inf)

If Instr(LCase(Request.Form(XH_Post)),XH_Inf(XH_Xh))<>0 Then

Response.Write "非法操作!系统做了如下记录↓
"

Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"
"

Response.Write "操作时间:"&Now&"
"

Response.Write "操作页面:"&Request.ServerVariables("URL")&"
"

Response.Write "提交方式:POST
"

Response.Write "提交参数:"&XH_Post&"
"

Response.Write "提交数据:"&Request.Form(XH_Post)

Response.End

End If

Next

Next

End If

'----------------------------------

'--------GET部份-------------------

If Request.QueryString<>"" Then

For Each XH_Get In Request.QueryString

For XH_Xh=0 To Ubound(XH_Inf)

If Instr(LCase(Request.QueryString(XH_Get)),XH_Inf(XH_Xh))<>0 Then

Response.Write "非法操作!系统做了如下记录↓
"

Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"
"

Response.Write "操作时间:"&Now&"
"

Response.Write "操作页面:"&Request.ServerVariables("URL")&"
"

Response.Write "提交方式:GET
"

Response.Write "提交参数:"&XH_Get&"
"

Response.Write "提交数据:"&Request.QueryString(XH_Get)

Response.End

End If

Next

Next

End If

'----------------------------------

'--------COOKIE部份-------------------

If Request.Cookies<>"" Then

For Each XH_Cookie In Request.Cookies

For XH_Xh=0 To Ubound(XH_Inf)

If Instr(LCase(Request.Cookies(XH_Cookie)),XH_Inf(XH_Xh))<>0 Then

Response.Write "非法操作!系统做了如下记录↓
"

Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"
"

Response.Write "操作时间:"&Now&"
"

Response.Write "操作页面:"&Request.ServerVariables("URL")&"
"

Response.Write "提交方式:Cookie
"

Response.Write "提交参数:"&XH_Cookie&"
"

Response.Write "提交数据:"&Request.Cookies(XH_Cookie)

Response.End

End If

Next

Next

End If

'----------------------------------

%>

为了自己的网站不再被SQL注入,请大家及时检查和修复漏洞.

申请创业报道,分享创业好点子。点击此处,共同探讨创业新机遇!

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值