防范SQL注入攻击的新办法,防范SQL注入攻击的新办法
【 tulaoshi.com - SQLServer 】
近段时间由于修改一个ASP程序(有SQL注入漏洞),在网上找了很多相关的一些防范办法,都不近人意,所以我将现在网上的一些方法综合改良了一下,写出这个ASP函数,供大家参考。
(本文来源于图老师网站,更多请访问http://www.tulaoshi.com/sqlserver/)Function SafeRequest(ParaName)
Dim ParaValue
ParaValue=Request(ParaName)
if IsNumeric(ParaValue) = True then
SafeRequest=ParaValue
exit Function
elseIf Instr(LCase(ParaValue),"select ") 0 or Instr(LCase(ParaValue),"insert ") 0 or Instr(LCase(ParaValue),"delete from") 0 or Instr(LCase(ParaValue),"count(") 0 or Instr(LCase(ParaValue),"drop table") 0 or Instr(LCase(ParaValue),"update ") 0 or Instr(LCase(ParaValue),"truncate ") 0 or Instr(LCase(ParaValue),"asc(") 0 or Instr(LCase(ParaValue),"mid(") 0 or Instr(LCase(ParaValue),"char(") 0 or Instr(LCase(ParaValue),"xp_cmdshell") 0 or Instr(LCase(ParaValue),"exec master") 0 or Instr(LCase(ParaValue),"net localgroup administrators") 0 or Instr(LCase(ParaValue)," and ") 0 or Instr(LCase(ParaValue),"net user") 0 or Instr(LCase(ParaValue)," or ") 0 then
Response.Write "<script language='javascript'"
Response.Write "alert('非法的请求!');" '发现SQL注入攻击提示信息
Response.Write "location.href='http://www.wz114.com/';" '发现SQL注入攻击转跳网址
Response.Write "<script"
Response.end
else
SafeRequest=ParaValue
End If
End function
使用SafeRequest函数替换你的Request
可以防范所有的SQL注入攻击,如果还有什么问题请与我联系
Email:ruixing123@hotmail.com
来源:http://www.tulaoshi.com/n/20160129/1496541.html
看过《防范SQL注入攻击的新办法》的人还看了以下文章 更多>>