好得很程序员自学网

<tfoot draggable='sEl'></tfoot>

Simple Cross Site Scripting (XSS) Servlet Filter -

我们的Java网站今天遇到了一些问题,需要一个快速解决的方案,以保护网站恶意跨站脚本(XSS)的尝试。我不是说这是一个完美的解决方案,但它很容易实施和纠正 漏洞 ,表单和URL注入。我们基本上可以通过Servlet过滤器拦截每个发送到Web应用程序的请求,然后我们用一个HttpServletRequestWrapper 来包装和重写 getParameter 方法,清除任何可能的脚本注入。

Here's the Filter:

  package com.greatwebguy.filter;

import java.io.IOException;

import javax.servlet.Filter;

import javax.servlet.FilterChain;

import javax.servlet.FilterConfig;

import javax.servlet.ServletException;

import javax.servlet.ServletRequest;

import javax.servlet.ServletResponse;

import javax.servlet.http.HttpServletRequest;

public class CrossScriptingFilter implements Filter {

    public void init(FilterConfig filterConfig) throws ServletException {

        this.filterConfig = filterConfig;

    }

    public void destroy() {

        this.filterConfig = null;

    }

    public void doFilter(ServletRequest request, ServletResponse response, FilterChain chain)

        throws IOException, ServletException {

        chain.doFilter(new RequestWrapper((HttpServletRequest) request), response);

    }

}

Here's the wrapper:

  package com.greatwebguy.filter;

import javax.servlet.http.HttpServletRequest;

import javax.servlet.http.HttpServletRequestWrapper;

public final class RequestWrapper extends HttpServletRequestWrapper {

    public RequestWrapper(HttpServletRequest servletRequest) {

        super(servletRequest);

    }

    public String[] getParameterValues(String parameter) {

      String[] values = super.getParameterValues(parameter);

      if (values==null)  {

                  return null;

          }

      int count = values.length;

      String[] encodedValues = new String[count];

      for (int i = 0; i < count; i++) {

                 encodedValues[i] = cleanXSS(values[i]);

       }

      return encodedValues;

    }

    public String getParameter(String parameter) {

          String value = super.getParameter(parameter);

          if (value == null) {

                 return null;

                  }

          return cleanXSS(value);

    }

    public String getHeader(String name) {

        String value = super.getHeader(name);

        if (value == null)

            return null;

        return cleanXSS(value);

    }

    private String cleanXSS(String value) {

                //You'll need to remove the spaces from the html entities below

        value = value.replaceAll("<", "& lt;").replaceAll(">", "& gt;");

        value = value.replaceAll("\\(", "& #40;").replaceAll("\\)", "& #41;");

        value = value.replaceAll("'", "& #39;");

        value = value.replaceAll("eval\\((.*)\\)", "");

        value = value.replaceAll("[\\\"\\\'][\\s]*javascript:(.*)[\\\"\\\']", "\"\"");

        value = value.replaceAll("script", "");

        return value;

    }

}

添加到您的 web.xml 的顶部: www.2cto.com

 <filter>

    <filter-name>XSS</filter-name>

    <display-name>XSS</display-name>

    <description></description>

    <filter-class>com.greatwebguy.filter.CrossScriptingFilter</filter-class>

</filter>

<filter-mapping>

    <filter-name>XSS</filter-name>

    <url-pattern>/*</url-pattern>

</filter-mapping>

 

 

查看更多关于Simple Cross Site Scripting (XSS) Servlet Filter -的详细内容...

  阅读:50次