2005/11/14 | ASP防SQL注入
类别(ASP) | 评论(0) | 阅读(179) | 发表于 10:42
拦截get请求的注入
dim sql_injdata 
SQL_injdata = "'|and|exec|insert|select|delete|update|count|*|%|chr|mid|master|truncate|char|declare" 
SQL_inj = split(SQL_Injdata,"|") 
If Request.QueryString<>"" Then 
 For Each SQL_Get In Request.QueryString 
  For SQL_Data=0 To Ubound(SQL_inj) 
   if instr(Request.QueryString(SQL_Get),Sql_Inj(Sql_DATA))>0 Then 
    Response.Write "<Script Language=****>alert('本网站提示↓nn请不要在参数中包含非法字符尝试注入!');history.back(-1)</Script>" 
    Response.end 
   end if 
  next 
 Next 
End If 

拦截post请求的注入
If Request.Form<>"" Then 
 For Each Sql_Post In Request.Form 
  For SQL_Data=0 To Ubound(SQL_inj) 
   if instr(Request.Form(Sql_Post),Sql_Inj(Sql_DATA))>0 Then 
    Response.Write "<Script Language=****>alert('本网站提示↓nn请不要在参数中包含非法字符尝试注入!nnHTTP://www.521movie.com ');history.back(-1)</Script>" 
    Response.end 
   end if 
  next 
 next 
end if
0

评论Comments

日志分类
首页[142]
Diary[42]
Flash[8]
JS/CSS/XHTML[34]
ASP[29]
ASP.NET[2]
Database[6]
Extension[1]
Other[17]
Production[3]