查询界面:
前台代码:
<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml">
<head runat="server">
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"/>
<title></title>
</head>
<body>
<form id="form1" runat="server">
<div>
<asp:SqlDataSource ID="SqlDataSource1" runat="server" ConnectionString="<%$ ConnectionStrings:SConnectionString %>" SelectCommand="SELECT * FROM [Teacher]"></asp:SqlDataSource>
<br />
<asp:TextBox ID="TextBox1" runat="server" Width="252px"></asp:TextBox>
<asp:Button ID="Button1" runat="server" OnClick="Button1_Click" Text="检索" />
<br />
<asp:GridView ID="GridView1" runat="server" AutoGenerateColumns="False" DataKeyNames="TId" DataSourceID="SqlDataSource1">
<Columns>
<asp:BoundField DataField="TId" HeaderText="TId" ReadOnly="True" SortExpression="TId" />
<asp:BoundField DataField="TName" HeaderText="TName" SortExpression="TName" />
<asp:BoundField DataField="TTel" HeaderText="TTel" SortExpression="TTel" />
</Columns>
</asp:GridView>
</div>
</form>
</body>
</html>
后台代码:利用连接字符串查询
public partial class WebForm1 : System.Web.UI.Page
{
protected void Page_Load(object sender, EventArgs e)
{
}
protected void Button1_Click(object sender, EventArgs e)
{
SqlDataSource1.SelectCommand += "where TName='"+TextBox1.Text.Trim()+"'";
GridView1.DataBind();
}
}
正常查询:输入 qwe
若输入qwe' or '1'='1
这就是SQL注入攻击,通过输入SQL脚本组成连接查询字符串查得全部信息。
预防措施:将输入的 ' 转为' ' ,这样可以影响SQL语句的执行
SqlDataSource1.SelectCommand += "where TName='"+TextBox1.Text.Replace("'","''").Trim()+"'";
GridView1.DataBind();