StringEscapeUtils類可以對html js xml sql 等代碼進行轉義來防止SQL注入及XSS注入
添加依賴
<dependency>
<groupId>commons-lang</groupId>
<artifactId>commons-lang</artifactId>
<version>2.6</version>
</dependency>
1.html腳本
escapeHtml轉義html腳本
unescapeHtml反轉義html腳本
System.out.println(StringEscapeUtils.escapeHtml("<a>abc</a>")); System.out.println(StringEscapeUtils.unescapeHtml("<a>abc</a>"));
輸出
<a>abc</a>
<a>abc</a>
2.js腳本
escapeJavaScript轉義js腳本
unescapeJavaScript反轉義js腳本
System.out.println(StringEscapeUtils.escapeJavaScript("<script>alert('123')<script>")); System.out.println(StringEscapeUtils.unescapeJavaScript("<script>alert(\'123\')<script>"));
輸出
<script>alert(\'123\')<script>
<script>alert('123')<script>
3.字符串Unicode
escapeJava轉義成Unicode編碼
unescapeJava反轉義成Unicode編碼
System.out.println(StringEscapeUtils.escapeJava("你好")); System.out.println(StringEscapeUtils.unescapeJava("\u4F60\u597D"));
輸出
\u4F60\u597D
你好
4.xml
escapeXML轉義XML
unescapeXML反轉義XML
System.out.println(StringEscapeUtils.escapeXml("<name>貝貝</name>")); System.out.println(StringEscapeUtils.unescapeXml("<name>贝贝</name>"));
輸出
<name>贝贝</name>
<name>貝貝</name>
5.sql
escapeSql sql轉義,防止sql注入攻擊
轉義后
StringBuffer sql = new StringBuffer("select * from users where 1=1 "); String keyWord="aaa' or '1=1"; if(!keyWord.isEmpty()){ sql.append(" and username like '%" + StringEscapeUtils.escapeSql(keyWord) + "%'"); } System.out.println(sql);
輸出
select * from users where 1=1 and username like '%aaa'' or ''1=1%'
不進行轉義的,會查出全部用戶
select * from users where 1=1 and username like '%aaa' or '1=1%'
