您的位置:首页 > 数据库

防范SQL注入攻击的新办法

2008-07-08 08:34 204 查看
近段时间由于修改一个ASP程序(有SQL注入漏洞),在网上找了很多相关的一些防范办法,都不近人意,所以我将现在网上的一些方法综合改良了一下,写出这个ASP函数,供大家参考。

  以下是引用片段:

Function SafeRequest(ParaName)

Dim ParaValue

ParaValue=Request(ParaName)

if IsNumeric(ParaValue) = True then

SafeRequest=ParaValue

exit Function

elseIf Instr(LCase(ParaValue),"select ") > 0 or Instr(LCase(ParaValue),"insert ") > 0 or Instr(LCase(ParaValue),"delete from") > 0 or Instr(LCase(ParaValue),"count(") > 0 or Instr(LCase(ParaValue),"drop table") > 0 or Instr(LCase(ParaValue),"update ") > 0 or Instr(LCase(ParaValue),"truncate ") > 0 or Instr(LCase(ParaValue),"asc(") > 0 or Instr(LCase(ParaValue),"mid(") > 0 or Instr(LCase(ParaValue),"char(") > 0 or Instr(LCase(ParaValue),"xp_cmdshell") > 0 or Instr(LCase(ParaValue),"exec master") > 0 or Instr(LCase(ParaValue),"net localgroup administrators") > 0 or Instr(LCase(ParaValue)," and ") > 0 or Instr(LCase(ParaValue),"net user") > 0 or Instr(LCase(ParaValue)," or ") > 0 then

Response.Write "<script language='javascript'>"

Response.Write "alert('非法的请求!');" '发现SQL注入攻击提示信息

Response.Write "location.href='http://blog.knowsky.com/';" '发现SQL注入攻击转跳网址

Response.Write "<script>"

Response.end

else

SafeRequest=ParaValue

End If

End function

  使用SafeRequest函数替换你的Request
内容来自用户分享和网络整理,不保证内容的准确性,如有侵权内容,可联系管理员处理 点击这里给我发消息
标签: