亚洲乱码中文字幕综合,中国熟女仑乱hd,亚洲精品乱拍国产一区二区三区,一本大道卡一卡二卡三乱码全集资源,又粗又黄又硬又爽的免费视频

Springboot實(shí)現(xiàn)XSS漏洞過(guò)濾的示例代碼

 更新時(shí)間:2021年01月22日 16:05:10   作者:善良的小黑哥  
這篇文章主要介紹了Springboot實(shí)現(xiàn)XSS漏洞過(guò)濾的示例代碼,文中通過(guò)示例代碼介紹的非常詳細(xì),對(duì)大家的學(xué)習(xí)或者工作具有一定的參考學(xué)習(xí)價(jià)值,需要的朋友們下面隨著小編來(lái)一起學(xué)習(xí)學(xué)習(xí)吧

背景

前陣子做了幾個(gè)項(xiàng)目,終于開(kāi)發(fā)完畢,進(jìn)入了測(cè)試階段,信心滿(mǎn)滿(mǎn)將項(xiàng)目部署到測(cè)試環(huán)境,然后做了安全測(cè)評(píng)之后.....

​(什么!你竟然說(shuō)我代碼不安全???)

然后測(cè)出了 Xss漏洞 安全的問(wèn)題

解決方案

場(chǎng)景:可以在頁(yè)面輸入框輸入JS腳本, 攻擊者可以利用此漏洞執(zhí)行惡意的代碼

問(wèn)題演示

所以我們要對(duì)于前端傳輸?shù)膮?shù)做處理,做統(tǒng)一全局過(guò)濾處理

既然要過(guò)濾處理,我們首先需要實(shí)現(xiàn)一個(gè)自定義過(guò)濾器

總共包含以下四部分

  • XssUtil
  • XssFilterAutoConfig
  • XssHttpServletRequestWrapper
  • XssStringfJsonDeserializer

最后我們需要在全局過(guò)濾器中使用我們實(shí)現(xiàn)的Xss自定義過(guò)濾器

代碼實(shí)現(xiàn)

XssFilterAtuoConfig實(shí)現(xiàn)代碼

 import com.fasterxml.jackson.databind.ObjectMapper;
import com.fasterxml.jackson.databind.module.SimpleModule;
import net.greatsoft.overallbudget.filter.SimpleCORSFilter;
import org.springframework.boot.context.embedded.FilterRegistrationBean;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import org.springframework.context.annotation.Primary;
import org.springframework.http.converter.json.Jackson2ObjectMapperBuilder;
import org.springframework.http.converter.json.MappingJackson2HttpMessageConverter;

/**
 * Created by wjy on 2020/11/5.
 * xss 自動(dòng)配置類(lèi)
 */
@Configuration
public class XssFilterAtuoConfig {

  /**
   * 注冊(cè)自定義過(guò)濾器
   * @return
   */
  @Bean
  public FilterRegistrationBean xssFiltrRegister() {
    FilterRegistrationBean registration = new FilterRegistrationBean();
    //設(shè)置系統(tǒng)過(guò)濾器 (setFilter就是你所定義的過(guò)濾器filter類(lèi))
    registration.setFilter(new SimpleCORSFilter());
    //過(guò)濾所有路徑
    registration.addUrlPatterns("/*");
    //過(guò)濾器名稱(chēng)
    registration.setName("XssFilter");
    //優(yōu)先級(jí)
    registration.setOrder(1);
    return registration;
  }

  /**
   *  過(guò)濾JSON數(shù)據(jù)
   * @return
   */
  @Bean
  @Primary
  public MappingJackson2HttpMessageConverter mappingJackson2HttpMessageConverter() {
    SimpleModule module = new SimpleModule();
    //自定義序列化過(guò)濾配置(XssStringJsonDeserializer), 對(duì)入?yún)⑦M(jìn)行轉(zhuǎn)譯
    module.addDeserializer(String.class, new XssStringJsonDeserializer());
    // 注冊(cè)解析器
    ObjectMapper objectMapper = Jackson2ObjectMapperBuilder.json().build();
    objectMapper.registerModule(module);
    return new MappingJackson2HttpMessageConverter(objectMapper);
  }
}

XssHttpServletRequestWrapper實(shí)現(xiàn)代碼

/**
 * Created by wjy on 2020/11/5.
 * xss 包裝
 */
public class XssHttpServletRequestWrapper extends HttpServletRequestWrapper {

  public XssHttpServletRequestWrapper(HttpServletRequest request) {
    super(request);
  }

  /**
   * 對(duì)header處理
   * @param name
   * @return
   */
  @Override
  public String getHeader(String name) {
    String value = super.getHeader(name);
    return XssUtil.cleanXSS(value);
  }

  /**
   * 對(duì)參數(shù)處理
   * @param name
   * @return
   */
  @Override
  public String getParameter(String name) {
    String value = super.getParameter(name);
    return XssUtil.cleanXSS(value);
  }

  /**
   * 對(duì)數(shù)值進(jìn)行處理
   * @param name
   * @return
   */
  @Override
  public String[] getParameterValues(String name) {
    String[] values = super.getParameterValues(name);
    if (values != null) {
      int length = values.length;
      String[] escapseValues = new String[length];
      for (int i = 0; i < length; i++) {
        escapseValues[i] = XssUtil.cleanXSS(values[i]);
      }
      return escapseValues;
    }
    return super.getParameterValues(name);
  }

  /**
   * 主要是針對(duì)HandlerMapping.URI_TEMPLATE_VARIABLES_ATTRIBUTE 獲取pathvalue的時(shí)候把原來(lái)的pathvalue經(jīng)過(guò)xss過(guò)濾掉
   */
  @Override
  public Object getAttribute(String name) {
    // 獲取pathvalue的值
    if (HandlerMapping.URI_TEMPLATE_VARIABLES_ATTRIBUTE.equals(name)) {
      Map uriTemplateVars = (Map) super.getAttribute(HandlerMapping.URI_TEMPLATE_VARIABLES_ATTRIBUTE);
      if (Objects.isNull(uriTemplateVars)) {
        return uriTemplateVars;
      }
      Map newMap = new LinkedHashMap<>();
      uriTemplateVars.forEach((key, value) -> {
        if (value instanceof String) {
          newMap.put(key, XssUtil.cleanXSS((String) value));
        } else {
          newMap.put(key, value);

        }
      });
      return newMap;
    } else {
      return super.getAttribute(name);
    }
  }
} 

XssStringJsonDeserializer代碼實(shí)現(xiàn)

 /**
 * Created by wjy on 2020/11/5.
 * 基于xss的JsonDeserializer
 */
public class XssStringJsonDeserializer extends JsonDeserializer<String> {


  @Override
  public Class<String> handledType() {
    return String.class;
  }

  @Override
  public String deserialize(JsonParser jsonParser, DeserializationContext deserializationContext) throws IOException {
    return XssUtil.cleanXSS(jsonParser.getValueAsString());
  }
} 

XssUtil代碼實(shí)現(xiàn)

 /**
 * Created by wjy on 2020/11/5.
 * xss工具類(lèi)
 */
public class XssUtil {

  public static String cleanXSS(String value) {
    if (Objects.isNull(value)) {
      return value;
    }
    //在這里自定義需要過(guò)濾的字符
    value = value.replaceAll("<", "& lt;").replaceAll(">", "& gt;");
    value = value.replaceAll("(", "& #40;").replaceAll(")", "& #41;");
    value = value.replaceAll("'", "& #39;");
    value = value.replaceAll("eval((.*))", "");
    value = value.replaceAll("["'][s]*javascript:(.*)["']", """");
    value = value.replaceAll("<script>", "");
    return value;
  }
} 

全局過(guò)濾器實(shí)現(xiàn)

 @Component
public class SimpleCORSFilter implements Filter {

  @Override
  public void doFilter(ServletRequest req, ServletResponse res,
      FilterChain chain) throws IOException, ServletException {
    // 在這里,使用我們實(shí)現(xiàn)的XSS過(guò)濾器
    XssHttpServletRequestWrapper request =
        new XssHttpServletRequestWrapper((HttpServletRequest) req);

    HttpServletResponse response = (HttpServletResponse) res;
    response.setHeader("Access-Control-Allow-Origin", "*");
    response.setHeader("Access-Control-Allow-Methods",
        "POST, GET, PUT, OPTIONS, DELETE");
    response.setHeader("Access-Control-Max-Age", "3600");
    response.setHeader("Access-Control-Allow-Headers",
        "Origin, X-Requested-With, Content-Type, Accept, token");
    
    chain.doFilter(request, response);
    
  }

  public void init(FilterConfig filterConfig) {
  }

  public void destroy() {
  }

} 

到此這篇關(guān)于Springboot實(shí)現(xiàn)XSS漏洞過(guò)濾的示例代碼的文章就介紹到這了,更多相關(guān)Springboot XSS漏洞過(guò)濾內(nèi)容請(qǐng)搜索腳本之家以前的文章或繼續(xù)瀏覽下面的相關(guān)文章希望大家以后多多支持腳本之家!

相關(guān)文章

最新評(píng)論