Java 防止 SQL 注入工具類

package cn.manmanda.api.util;
 
import javax.servlet.http.HttpServletRequest;

/**
 * 防止SQL注入工具類
 * @author 
 * @date 2017/12/29 15:39
 */
public class AntiSQLInjectionUtil {

//	public final static String regex = "#|/*|*/|'|%|--|and|or|not|use|insert|delete|update|select|count|group|union"
//			+ "|create|drop|truncate|alter|grant|execute|exec|xp_cmdshell|call|declare|source|sql";
	
	public final static String regex = "'|and|exec|execute|insert|select|delete|update|count|drop|*|%|chr|mid|master|truncate|" +
                "char|declare|sitename|net user|xp_cmdshell|;|or|-|+|,|like'|and|exec|execute|insert|create|drop|" +
                "table|from|grant|use|group_concat|column_name|" +
                "information_schema.columns|table_schema|union|where|select|delete|update|order|by|count|*|" +
                "chr|mid|master|truncate|char|declare|or|;|-|--|+|,|like|//|/|%|#";

	/**
	 * 把SQL關鍵字替換爲空字符串
	 * 
	 * @param param
	 * @return
	 */
	public static String filter(String param) {
		if (param == null) {
			return param;
		}
		return param.replaceAll("(?i)" + regex, ""); // (?i)不區分大小寫替換
	}

	/**
	 * 返回經過防注入處理的字符串
	 * 
	 * @param request
	 * @param name
	 * @return
	 */
	public static String getParameter(HttpServletRequest request, String name) {
		return AntiSQLInjectionUtil.filter(request.getParameter(name));
	}

	public static void main(String[] args) {
		// System.out.println(StringEscapeUtils.escapeSql("1' or '1' = '1; drop table test"));
		// //1'' or ''1'' = ''1; drop table test
		String str = "sElect * from test where id = 1 And name != 'sql' ";
		String outStr = "";
		for (int i = 0; i < 1000; i++) {
			outStr = AntiSQLInjectionUtil.filter(str);
		}
		System.out.println(outStr);
	}
	
}

 

發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章