利用简单的过滤器 过滤特殊字符实现 防止XSS攻击
2017-03-12 13:29
531 查看
利用简单的过滤器 过滤特殊字符实现 防止XSS攻击
web.xml配置文件 [html]
view plain
copy
print?
<filter>
<filter-name>XSSFilter</filter-name>
<filter-class>com.neusoft.common.filter.XSSFilter</filter-class>
</filter>
<filter-mapping>
<filter-name>XSSFilter</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
[java]
view plain
copy
print?
package com.neusoft.common.filter;
import java.io.IOException;
import javax.servlet.Filter;
import javax.servlet.FilterChain;
import javax.servlet.FilterConfig;
import javax.servlet.ServletException;
import javax.servlet.ServletRequest;
import javax.servlet.ServletResponse;
import javax.servlet.http.HttpServletRequest;
public class XSSFilter implements Filter {
@Override
public void destroy() {
// TODO Auto-generated method stub
}
@Override
public void doFilter(ServletRequest arg0, ServletResponse arg1, FilterChain arg2)
throws IOException, ServletException {
// TODO Auto-generated method stub
arg2.doFilter(new XSSRequestWrapper((HttpServletRequest) arg0), arg1);
}
@Override
public void init(FilterConfig arg0) throws ServletException {
// TODO Auto-generated method stub
}
}
[java]
view plain
copy
print?
package com.neusoft.common.filter;
import java.util.regex.Pattern;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletRequestWrapper;
public class XSSRequestWrapper extends HttpServletRequestWrapper {
public XSSRequestWrapper(HttpServletRequest request) {
super(request);
}
@Override
public String[] getParameterValues(String parameter) {
String[] values = super.getParameterValues(parameter);
if (values == null) {
return null;
}
int count = values.length;
String[] encodedValues = new String[count];
for (int i = 0; i < count; i++) {
encodedValues[i] = stripXSS(values[i]);
}
return encodedValues;
}
@Override
public String getParameter(String parameter) {
String value = super.getParameter(parameter);
return stripXSS(value);
}
@Override
public String getHeader(String name) {
String value = super.getHeader(name);
//return stripXSS(value);
return value;
}
public String getQueryString() {
String value = super.getQueryString();
if (value != null) {
value = stripXSS(value);
}
return value;
}
private String stripXSS(String value) {
if (value != null) {
// Avoid anything between script tags
Pattern scriptPattern = Pattern.compile("<script>(.*?)</script>", Pattern.CASE_INSENSITIVE);
value = scriptPattern.matcher(value).replaceAll("");
// Avoid anything in a
// expression
scriptPattern = Pattern.compile("src[\r\n]*=[\r\n]*\\\'(.*?)\\\'",
Pattern.CASE_INSENSITIVE | Pattern.MULTILINE | Pattern.DOTALL);
value = scriptPattern.matcher(value).replaceAll("");
scriptPattern = Pattern.compile("src[\r\n]*=[\r\n]*\\\"(.*?)\\\"",
Pattern.CASE_INSENSITIVE | Pattern.MULTILINE | Pattern.DOTALL);
value = scriptPattern.matcher(value).replaceAll("");
// Remove any lonesome </script> tag
scriptPattern = Pattern.compile("</script>", Pattern.CASE_INSENSITIVE);
value = scriptPattern.matcher(value).replaceAll("");
// Remove any lonesome <script ...> tag
scriptPattern = Pattern.compile("<script(.*?)>",
Pattern.CASE_INSENSITIVE | Pattern.MULTILINE | Pattern.DOTALL);
value = scriptPattern.matcher(value).replaceAll("");
// Avoid eval(...) expressions
scriptPattern = Pattern.compile("eval\\((.*?)\\)",
Pattern.CASE_INSENSITIVE | Pattern.MULTILINE | Pattern.DOTALL);
value = scriptPattern.matcher(value).replaceAll("");
// Avoid expression(...) expressions
scriptPattern = Pattern.compile("expression\\((.*?)\\)",
Pattern.CASE_INSENSITIVE | Pattern.MULTILINE | Pattern.DOTALL);
value = scriptPattern.matcher(value).replaceAll("");
// Avoid javascript:... expressions
scriptPattern = Pattern.compile("javascript:", Pattern.CASE_INSENSITIVE);
value = scriptPattern.matcher(value).replaceAll("");
// Avoid vbscript:... expressions
scriptPattern = Pattern.compile("vbscript:", Pattern.CASE_INSENSITIVE);
value = scriptPattern.matcher(value).replaceAll("");
// Avoid onload= expressions
scriptPattern = Pattern.compile("onload(.*?)=",
Pattern.CASE_INSENSITIVE | Pattern.MULTILINE | Pattern.DOTALL);
value = scriptPattern.matcher(value).replaceAll("");
}
return value;
}
}
相关文章推荐
- 利用简单的过滤器 过滤特殊字符实现 防止XSS攻击
- 利用微软AntiXss Library过滤输出字符,防止XSS攻击
- .htaccess实际运用案例之过滤URL特殊字符,防止XSS攻击
- 利用微软AntiXss Library过滤输出字符,防止XSS攻击
- Tornado Web 防止XSS攻击,即对变量进行特殊字符过滤
- 常识2-转换特殊字符为HTML实体和利用时间限制防止机器人自动提交信息
- 利用IEHelper实现简单网址过滤
- 利用mysql对特殊字符和超长字符会进行截断的特性 进行存储型XSS攻击——WordPress <4.1.2 & <=4.2 存储型xss
- JS特殊字符过滤,防止xss和sql注入。
- 利用java servlet实现简单的web请求过滤和跳转
- SQLServer过滤文件名特殊字符(利用SQLServer修改文件物理地址名称)
- 通过过滤掉字符和特殊字母来防止SQL注入攻击
- 过滤网址和输入框中的特殊字符,防止sql注入(C#版)
- C#实现简单过滤非法字符实例
- springMVC利用过滤器防止xss攻击
- java 过滤敏感词和特殊字符 防止sql注入
- 利用URLScan工具过滤URL中的特殊字符(仅针对IIS6)
- java 过滤器(过滤客户端表单特殊字符、服务器端特殊字符、以及编码过滤)
- 利用URLScan工具过滤URL中的特殊字符(仅针对IIS6)
- JS过滤url参数特殊字符的实现方法