发布网友 发布时间:2022-04-30 21:41
共3个回答
懂视网 时间:2022-05-01 02:03
/** * 通用漏洞防护补丁 * 功能说明:防护XSS,SQL,代码执行,文件包含等多种高危漏洞 * Class CheckRequestServer */ class CheckRequestServer { /** * 过滤提交数据正则 * @var array */ protected static $filterUrl = [ ‘xss‘ => "\=\+\/v(?:8|9|\+|\/)|\%0acontent\-(?:id|location|type|transfer\-encoding)", ]; /** * 过滤提交数据正则 * @var array */ protected static $filterArgs = [ ‘xss‘ => "[\‘\"\;\*\<\>].*\bon[a-zA-Z]{3,15}[\s\r\n\v\f]*\=|\b(?:expression)\(|\<script[\s\\\/]|\<\!\[cdata\[|\b(?:eval|alert|prompt|msgbox)\s*\(|url\((?:\#|data|javascript)", ‘sql‘ => "[^\{\s]{1}(\s|\b)+(?:select\b|update\b|insert(?:(\/\*.*?\*\/)|(\s)|(\+))+into\b).+?(?:from\b|set\b)|[^\{\s]{1}(\s|\b)+(?:create|delete|drop|truncate|rename|desc)(?:(\/\*.*?\*\/)|(\s)|(\+))+(?:table\b|from\b|database\b)|into(?:(\/\*.*?\*\/)|\s|\+)+(?:dump|out)file\b|\bsleep\([\s]*[\d]+[\s]*\)|benchmark\(([^\,]*)\,([^\,]*)\)|(?:declare|set|select)\b.*@|union\b.*(?:select|all)\b|(?:select|update|insert|create|delete|drop|grant|truncate|rename|exec|desc|from|table|database|set|where)\b.*(charset|ascii|bin|char|uncompress|concat|concat_ws|conv|export_set|hex|instr|left|load_file|locate|mid|sub|substring|oct|reverse|right|unhex)\(|(?:master\.\.sysdatabases|msysaccessobjects|msysqueries|sysmodules|mysql\.db|sys\.database_name|information_schema\.|sysobjects|sp_makewebtask|xp_cmdshell|sp_oamethod|sp_addextendedproc|sp_oacreate|xp_regread|sys\.dbms_export_extension)", ‘other‘ => "\.\.[\\\/].*\%00([^0-9a-fA-F]|$)|%00[\‘\"\.]", ]; /** * 数据过滤 * @param $filterData * @param $filterArgs */ protected static function filterData($filterData, $filterArgs) { foreach ($filterData as $key => $value) { if (!is_array($key)) { self::filterCheck($key, $filterArgs); } else { self::filterData($key, $filterArgs); } if (!is_array($value)) { self::filterCheck($value, $filterArgs); } else { self::filterData($value, $filterArgs); } } } /** * 数据检查 * @param $str * @param $filterArgs */ protected static function filterCheck($str, $filterArgs) { foreach ($filterArgs as $key => $value) { if (preg_match("/" . $value . "/is", $str) == 1 || preg_match("/" . $value . "/is", urlencode($str)) == 1) { //记录日志 - 信息拦截 exit(‘您的提交带有不合法参数,谢谢合作‘); } } } /** * 数据检查入口 */ public static function run() { $referer = empty($_SERVER[‘HTTP_REFERER‘]) ? [] : [$_SERVER[‘HTTP_REFERER‘]]; $queryString = empty($_SERVER["QUERY_STRING"]) ? [] : [$_SERVER["QUERY_STRING"]]; self::filterData($queryString, self::$filterUrl); self::filterData($_GET, self::$filterArgs); self::filterData($_POST, self::$filterArgs); self::filterData($_COOKIE, self::$filterArgs); self::filterData($referer, self::$filterArgs); } } CheckRequestServer::run();
php检查漏洞防护补丁-防护XSS,SQL,文件包含等多种高危漏洞
标签:
热心网友 时间:2022-04-30 23:11
攻击方法就在:
request:{"body":"ClassID=1+and%281%3D1%29","header":"POST /m/dianhua.asp HTTP 1.1
Content-Length: 24
/m/dianhua.asp这里,即你要修复的位置。
热心网友 时间:2022-05-01 00:29
可以去打开腾讯智慧安全的页面