SQL注入字符串 有哪些
编辑框内接受用户输入,判断输入字符串 有SQL注入风险,我面前只判断了一下这些,请大家补充..
1,转义字符
2,SQL关键字
3,Incorrect type handling
由于之前的别人写的代码多未处理SQL注入,所以我不可能每个地方去改SQL语句,以参数的方式避免SQL注入,所以只检查SQL输入语句是否有SQL注入风险
------解决方案--------------------有避免sql注入的精华贴,你搜一下,去看看叶子的刻薄
------解决方案--------------------1 Function SafeRequest(ParaName)
2 Dim ParaValue
3 ParaValue=Request(ParaName)
4 if IsNumeric(ParaValue) = True then
5 SafeRequest=ParaValue
6 exit Function
7 elseIf Instr(LCase(ParaValue),"select ") > 0 or Instr(LCase(ParaValue),"insert ") > 0 or Instr(LCase(ParaValue),"delete from") > 0 or Instr(LCase(ParaValue),"count(") > 0 or Instr(LCase(ParaValue),"drop table") > 0 or Instr(LCase(ParaValue),"update ") > 0 or Instr(LCase(ParaValue),"truncate ") > 0 or Instr(LCase(ParaValue),"asc(") > 0 or Instr(LCase(ParaValue),"mid(") > 0 or Instr(LCase(ParaValue),"char(") > 0 or Instr(LCase(ParaValue),"xp_cmdshell") > 0 or Instr(LCase(ParaValue),"exec master") > 0 or Instr(LCase(ParaValue),"net localgroup administrators") > 0 or Instr(LCase(ParaValue)," and ") > 0 or Instr(LCase(ParaValue),"net user") > 0 or Instr(LCase(ParaValue)," or ") > 0 then
8 Response.Write "<script language='javascript'>"
9 Response.Write "alert('非法的请求!');" '
发现SQL注入攻击提示信息
Response.Write "location.href='http://dev.yesky.com/';" '发现SQL注入攻击转跳网址
1 Response.Write "<script>"
2 Response.end
3 else
4 SafeRequest=ParaValue
5 End If
6 End function
使用SafeRequest函
上述的相关内容就是对新手入门:防范SQL注入攻击的新办法
------解决方案--------------------http://topic.csdn.net/u/20081205/09/3dd06076-bcbe-45d4-998c-8999fdbe6fae.html?84220