SQL盲注、SQL注入 - SpringBoot配置SQL注入過濾器


1. SQL盲注、SQL注入

  風險:可能會查看、修改或刪除數據庫條目和表。
  原因:未對用戶輸入正確執行危險字符清理。
  固定值:查看危險字符注入的可能解決方案。

2. pom.xml添加依賴

<dependency>
	<groupId>org.springframework.boot</groupId>
	<artifactId>spring-boot-configuration-processor</artifactId>
	<optional>true</optional>
</dependency>

3. 添加SQL注入包裝類

import java.util.regex.Matcher;
import java.util.regex.Pattern;

import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletRequestWrapper;

import lombok.extern.slf4j.Slf4j;

/**
 * SQL注入包裝類
 * 
 * @author CL
 *
 */
@Slf4j
public class SqlInjectHttpServletRequestWrapper extends HttpServletRequestWrapper {

	/**
	 * 構造請求對象
	 * 
	 * @param request
	 */
	public SqlInjectHttpServletRequestWrapper(HttpServletRequest request) {
		super(request);
	}

	/**
	 * 獲取頭部參數
	 * 
	 * @param v 參數值
	 */
	@Override
	public String getHeader(String v) {
		String header = super.getHeader(v);
		if (header == null || "".equals(header)) {
			return header;
		}
		return sqlFilter(header);
	}

	/**
	 * 獲取參數
	 * 
	 * @param v 參數值
	 */
	@Override
	public String getParameter(String v) {
		String param = super.getParameter(v);
		if (param == null || "".equals(param)) {
			return param;
		}
		return sqlFilter(param);
	}

	/**
	 * 獲取參數值
	 * 
	 * @param v 參數值
	 */
	@Override
	public String[] getParameterValues(String v) {
		String[] values = super.getParameterValues(v);
		if (values == null) {
			return values;
		}

		// 富文本內容不過濾
		if ("remarks".equals(v)) {
			return values;
		}

		int length = values.length;
		String[] resultValues = new String[length];
		for (int i = 0; i < length; i++) {
			// 過濾特殊字符
			resultValues[i] = sqlFilter(values[i]);
			if (!(resultValues[i]).equals(values[i])) {
				log.debug("SQL注入過濾器 => 過濾前:{} => 過濾后:{}", values[i], resultValues[i]);
			}
		}
		return resultValues;
	}

	/**
	 * 預編譯SQL過濾正則表達式
	 */
	private Pattern sqlPattern = Pattern.compile(
			"(?:')|(?:--)|(/\\*(?:.|[\\n\\r])*?\\*/)|(\\b(select|update|and|or|delete|insert|trancate|char|into|substr|ascii|declare|exec|count|master|into|drop|execute)\\b)",
			Pattern.CASE_INSENSITIVE);

	/**
	 * SQL過濾
	 * 
	 * @param v 參數值
	 * @return
	 */
	private String sqlFilter(String v) {
		if (v != null) {
			String resultVal = v;
			Matcher matcher = sqlPattern.matcher(resultVal);
			if (matcher.find()) {
				resultVal = matcher.replaceAll("");
			}
			if (!resultVal.equals(v)) {
				return "";
			}
			return resultVal;
		}
		return null;
	}
}

4. 配置文件添加配置

# 信息安全
security:
  sql:
    enable: true
    excludes:
      - /images/*
      - /jquery/*
      - /layui/*

5. 添加SQL注入過濾器

import java.io.IOException;
import java.util.List;
import java.util.regex.Matcher;
import java.util.regex.Pattern;

import javax.servlet.Filter;
import javax.servlet.FilterChain;
import javax.servlet.FilterConfig;
import javax.servlet.ServletException;
import javax.servlet.ServletRequest;
import javax.servlet.ServletResponse;
import javax.servlet.annotation.WebFilter;
import javax.servlet.http.HttpServletRequest;

import org.springframework.boot.context.properties.ConfigurationProperties;
import org.springframework.stereotype.Component;

/**
 * SQL注入過濾器
 * 
 * @author CL
 *
 */
@Component
@ConfigurationProperties(prefix = "security.sql")
@WebFilter(filterName = "SqlInjectFilter", urlPatterns = "/*")
public class SqlInjectFilter implements Filter {

	/**
	 * 過濾器配置對象
	 */
	FilterConfig filterConfig = null;

	/**
	 * 是否啟用
	 */
	private boolean enable;

	public void setEnable(boolean enable) {
		this.enable = enable;
	}

	/**
	 * 忽略的URL
	 */
	private List<String> excludes;

	public void setExcludes(List<String> excludes) {
		this.excludes = excludes;
	}

	/**
	 * 初始化
	 */
	@Override
	public void init(FilterConfig filterConfig) throws ServletException {
		this.filterConfig = filterConfig;
	}

	/**
	 * 攔截
	 */
	@Override
	public void doFilter(ServletRequest servletRequest, ServletResponse servletResponse, FilterChain filterChain)
			throws IOException, ServletException {
		HttpServletRequest request = (HttpServletRequest) servletRequest;

		// 不啟用或者已忽略的URL不攔截
		if (!enable || isExcludeUrl(request.getServletPath())) {
			filterChain.doFilter(servletRequest, servletResponse);
			return;
		}
		SqlInjectHttpServletRequestWrapper sqlInjectHttpServletRequestWrapper = new SqlInjectHttpServletRequestWrapper(
				request);
		filterChain.doFilter(sqlInjectHttpServletRequestWrapper, servletResponse);
	}

	/**
	 * 銷毀
	 */
	@Override
	public void destroy() {
		this.filterConfig = null;
	}

	/**
	 * 判斷是否為忽略的URL
	 * 
	 * @param urlPath URL路徑
	 * @return true-忽略,false-過濾
	 */
	private boolean isExcludeUrl(String url) {
		if (excludes == null || excludes.isEmpty()) {
			return false;
		}
		return excludes.stream().map(pattern -> Pattern.compile("^" + pattern)).map(p -> p.matcher(url))
				.anyMatch(Matcher::find);
	}
}


免責聲明!

本站轉載的文章為個人學習借鑒使用,本站對版權不負任何法律責任。如果侵犯了您的隱私權益,請聯系本站郵箱yoyou2525@163.com刪除。



 
粵ICP備18138465號   © 2018-2025 CODEPRJ.COM