stmt如何获取完整sql_浅谈在JDBC下对SQL注射的防御

#网络安全在我身边#

题记:今天给大家分享的是网络安全相关技术:在JDBC下对SQL注射的防御

什么是SQL注入

详见文章:

安界:入坑解读 | 什么是SQL注入?

JDBC下对SQL注射的防御

关于我的理解,则会将其总结为一句话:“被动态拼接执行的SQL语句中包含了不可信任的数据。”
什么是动态拼接?看看下面这条SQL语句:

select * from "+param_table+" where name='"+param_name+"'";

看到语句中的‘+’号了么,这意味着param_table和param_name并不是写死在语句中的,而我可以对其进行传参从而达到我的某些目的。那么假如我有student表:

5f9659e3e740e7863f3cc0ea4ea075de.png

teacher表:

ba186820887fc42ded7bb60658df80b3.png

我想从中查询hacker的信息那么将有如下代码:

String param_table = "student";String param_name = "hacker";Statement stmt = conn.createStatement();ResultSet rs =  stmt.executeQuery("select * from "+param_table+" where name='"+param_name+"'");while(rs.next()) {     out.println(rs.getString(1)+"/"+                 rs.getString(2)+"/"+                 rs.getString(3));            }

于是构成了这样一条语句:

select * from student where name='hacker';

这样就可以查询到hacker的信息:

fa4ac32a435008275a080c198c1a14fb.png

但是如果我将hacker修改为hacker’ or 1=1#:String param_name = “hacker’ or 1=1#”;则student表中所有数据被dump出来:

0ae2b56b179c9b8555c48d7f819a4d44.png

接着也可以将student修改为student union select * from teacher,于是连同teacher表的数据也被dump出来:

b8cd7c4899bf309a80c8a2e9f475bafe.png

那该如何防护?这是重点,我以前挖SQL注入的时候,仅仅是给厂商提供了这样的建议,但对于厂商来说可能只是极其模糊的概念:

bd13a28f8aa2ad5607a6aa38144fe953.png

接下来我介绍几种在JDBC下对SQL注入的防御方式:

1.预编译:这里用到PreparedStatement类进行预编译,那么将有如下代码:

String param_table = "student";String param_name = "hacker";String stmt = "select * from ? where name= ?";PreparedStatement ps = conn.prepareStatement(stmt);ps.setString(1,param_table);ps.setString(2,param_name);ResultSet rs =  ps.executeQuery();while(rs.next()) {      out.println(rs.getString(1)+"/"+                  rs.getString(2)+"/"+                  rs.getString(3));

接着运行却出现了错误:

com.mysql.jdbc.exceptions.jdbc4.MySQLSyntaxErrorException: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''student' where name= 'hacker'' at line 1

最后经过调试发现param_table不能被绑定,并且发现字段名也不能被绑定,那么可能会用拼接的方式进行预编译再查询,代码如下:

String param_table = "student";String param_name = "hacker";PreparedStatement ps = conn.prepareStatement("select * from "+param_table+" where name=?");ps.setString(1,param_name);ResultSet rs =  ps.executeQuery();while(rs.next()) {      out.println(rs.getString(1)+"/"+                  rs.getString(2)+"/"+                  rs.getString(3));            }

但是param_table=student这里依旧产生了注入,如果修改为:

String param_table = "student union select * from teacher";

则:

9e6fcd4d6cd6af5d9f8009c058dfd45f.png
b02d6174b5dcaa87e24779d1d1fdbaed.png

那么我只能把student写死在语句中:

String param_name = "hacker";String stmt = "select * from student where name=?";PreparedStatement ps = conn.prepareStatement(stmt);ps.setString(1,param_name);ResultSet rs =  ps.executeQuery();while(rs.next()) {      out.println(rs.getString(1)+"/"+                  rs.getString(2)+"/"+                  rs.getString(3));            }

此时再将param_name修改为hacker’ or 1=1#:则会将hacker’ or 1=1#当做表名来查询,查不到这个表,当然无回显了:

a70d4a1fb4af857286b0bbcb8a21da71.png

2.存储过程:有这样一个对student表操作的存储过程:

create procedure `getstudent`(in aname varchar(20),out uname varchar(20),out uage int(11),out usex varchar(10))beginselect * from student where name=aname into uname,uage,usex;end;

那么我们可以用CallableStatement类来防止注入,代码如下:

String param_name = "hacker’ or 1=1#";CallableStatement cs = conn.prepareCall("{call getstudent(?,?,?,?)}");cs.setString(1,param_name);cs.registerOutParameter(2,Types.VARCHAR);cs.registerOutParameter(3,Types.INTEGER);cs.registerOutParameter(4,Types.VARCHAR);cs.executeQuery();out.println(cs.getString(2)+"/"+cs.getInt(3)+"/"+cs.getString(4));

可以看到SQL注入的语句已经不再起作用:

3772a1d32c65cee0bb91264b040ee63e.png

3.白名单验证:前面的预编译和存储过程不能对表名进行操作,那么这里用白名单对表名进行过滤,代码如下:

String param_table = "student union select * from teacher";String param_name = "hacker";String stmt = "";if(param_table.equals("student")) {stmt = "select * from student where name=?";}else if(param_table.equals("teacher")) {stmt = "select * from teacher where name=?";}else {out.println("table name error!");}PreparedStatement ps = conn.prepareStatement(stmt);ps.setString(1,param_name);ResultSet rs = ps.executeQuery();while(rs.next()) {      out.println(rs.getString(1)+"/"+  rs.getString(2)+"/"+  rs.getString(3));}

尝试进行注入则会报错:

e05374b8bb5ae94e0be36e41d27726dc.png

4.对输入进行编码:这里我使用十六进制对输入进行编码,方法的声明及定义代码如下:

public static String bytestoHex(byte[] byteArr) {if(byteArr == null || byteArr.length < 1) return "";StringBuilder sb = new StringBuilder();for(byte t : byteArr) {if((t & 0xF0) == 0) sb.append("0");sb.append(Integer.toHexString(t & 0xFF));}return sb.toString().toUpperCase();}

使用方法byte2HexStr对输入param_name进行编码,代码:

String param_name = "hacker' or 1=1#";Statement stmt = conn.createStatement();String hex_param_name = bytestoHex(param_name.getBytes());out.println("编码后的param_name为:"+bytestoHex(param_name.getBytes()));ResultSet rs = stmt.executeQuery("select * from student where hex(name)='"+hex_param_name+"'");while(rs.next()) {out.println(rs.getString(1)+"/"+rs.getString(2)+"/"+rs.getString(3));}

由于hacker’ or 1=1#被编码为6861636B657227206F7220313D3123并被作为表名进行查询,因此不会dump出其他信息:

d7167ba922eb87022e8886166f4b7774.png
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值