ITPub博客

首页 > 数据库 > 数据库开发技术 > ASP上两个防止SQL注入式攻击Function

ASP上两个防止SQL注入式攻击Function

原创 数据库开发技术 作者:gavinlee 时间:2005-11-15 11:35:39 0 删除 编辑

过滤提交表单中的SQL

过滤查询中的SQL

[@more@]

''==========================
'
'过滤提交表单中的SQL
'
'==========================
function ForSqlForm()
dim fqys,errc,i,items
dim nothis(18)
nothis(0)="net user"
nothis(1)="xp_cmdshell"
nothis(2)="/add"
nothis(3)="exec%20master.dbo.xp_cmdshell"
nothis(4)="net localgroup administrators"
nothis(5)="select"
nothis(6)="count"
nothis(7)="asc"
nothis(8)="char"
nothis(9)="mid"
nothis(10)="''"
nothis(11)=":"
nothis(12)=""""
nothis(13)="insert"
nothis(14)="delete"
nothis(15)="drop"
nothis(16)="truncate"
nothis(17)="from"
nothis(18)="%"
''nothis(19)="@"
errc=false

for i= 0 to ubound(nothis)
for each items in request.Form
if instr(request.Form(items),nothis(i))<>0 then
response.write("

")
response.write("你所填写的信息:" & server.HTMLEncode(request.Form(items)) & "
含非法字符:" & nothis(i))
response.write("
")
response.write("对不起,你所填写的信息含非法字符!返回")
response.End()
end if
next
next
end function

''==========================
''过滤查询中的SQL
''==========================
function ForSqlInjection()
dim fqys,errc,i
dim nothis(19)
fqys = request.ServerVariables("QUERY_STRING")
nothis(0)="net user"

nothis(1)="xp_cmdshell"

nothis(2)="/add"

nothis(3)="exec%20master.dbo.xp_cmdshell"

nothis(4)="net localgroup administrators"

nothis(5)="select"

nothis(6)="count"

nothis(7)="asc"

nothis(8)="char"

nothis(9)="mid"

nothis(10)="''"

nothis(11)=":"

nothis(12)=""""

nothis(13)="insert"

nothis(14)="delete"

nothis(15)="drop"

nothis(16)="truncate"

nothis(17)="from"

nothis(18)="%"

nothis(19)="@"

errc=false

for i= 0 to ubound(nothis)

if instr(FQYs,nothis(i))<>0 then

errc=true

end if

next

if errc then
response.write "查询信息含非法字符!返回"
response.end

end if

end function

来自 “ ITPUB博客 ” ,链接:http://blog.itpub.net/310974/viewspace-810096/,如需转载,请注明出处,否则将追究法律责任。

请登录后发表评论 登录
全部评论
  • 博文量
    51
  • 访问量
    784436