C++ 简单的SQL注入过滤

前几天帮一个客户写了一个C++连接MySQL,当他用到他的游戏中后,被人注射了,用了一个永真式,无限的刷了游戏装备
所以,我针对参数和整体SQL语句写了两个简单的函数,进行简单的过滤。

bool CheckSQL(string sql)
{
    string key[9] = { "%","/","union","|","&","^" ,"#","/*","*/"};
    for (int i = 0; i < 9; i++)
    {
        if (sql.find(key[i]) != string::npos)
        {
            return false;
        }
    }
    return true;
}
bool CheckParameter(string Parameter)
{
    string key[14] = {"and","*","="," ","%0a","%","/","union","|","&","^" ,"#","/*","*/" };
    for (int i = 0; i < 14; i++)
    {
        if (Parameter.find(key[i]) != string::npos)
        {
            return false;
        }
    }
    return true;
}
  • 1
    点赞
  • 5
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
下面是一个使用ADO防止SQL注入过滤C++代码示例: ```c++ #include <iostream> #include <string> #import "C:\Program Files\Common Files\System\ado\msado15.dll" no_namespace rename("EOF", "adoEOF") using namespace std; int main() { // 定义数据库连接 _ConnectionPtr pConn; _CommandPtr pCmd; _RecordsetPtr pRs; // 建立数据库连接 HRESULT hr = pConn.CreateInstance(__uuidof(Connection)); pConn->ConnectionString = "Provider=SQLOLEDB;Data Source=(local);Initial Catalog=your_database_name;User ID=your_username;Password=your_password;"; pConn->Open("", "", "", adConnectUnspecified); // 执行参数化查询 string username = "test' or 1=1 --"; string password = "123456"; string sql = "SELECT * FROM users WHERE username = ? AND password = ?"; hr = pCmd.CreateInstance(__uuidof(Command)); pCmd->ActiveConnection = pConn; pCmd->CommandText = sql.c_str(); pCmd->CommandType = adCmdText; pCmd->Parameters->Append(pCmd->CreateParameter("param1", adVarChar, adParamInput, username.length(), username.c_str())); pCmd->Parameters->Append(pCmd->CreateParameter("param2", adVarChar, adParamInput, password.length(), password.c_str())); pRs = pCmd->Execute(NULL, NULL, adCmdText); // 处理查询结果 if (!pRs->adoEOF) { while (!pRs->adoEOF) { string username = (char*)(_bstr_t)pRs->Fields->GetItem("username")->Value; string password = (char*)(_bstr_t)pRs->Fields->GetItem("password")->Value; cout << "username: " << username << ", password: " << password << endl; pRs->MoveNext(); } } // 释放连接和语句句柄 pRs->Close(); pCmd->Release(); pConn->Close(); pConn.Release(); return 0; } ``` 上述代码中,使用了ADO的_CommandPtr和_RecordsetPtr对象,通过CreateParameter函数来实现参数化查询,将用户输入的数据和SQL语句分开处理,从而避免了SQL注入攻击。同时,代码中也使用了_bstr_t类型来将COM VARIANT类型的数据转换为字符串类型。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值