Filter安全过滤高级最终行(XSS攻击)

package com.what21.filter.xss;

import java.io.IOException;
import java.util.LinkedHashMap;
import java.util.Map;

import javax.servlet.Filter;
import javax.servlet.FilterChain;
import javax.servlet.FilterConfig;
import javax.servlet.ServletException;
import javax.servlet.ServletRequest;
import javax.servlet.ServletResponse;
import javax.servlet.http.HttpServletRequest;

public class XSSFilter implements Filter {

// XSS处理Map
private static Map xssMap = new LinkedHashMap();
 
public void init(FilterConfig filterConfig) throws ServletException {
    // 含有脚本: script
    xssMap.put("[s|S][c|C][r|R][i|C][p|P][t|T]", "");
    // 含有脚本 javascript
    xssMap.put("[\\\"\\\'][\\s]*[j|J][a|A][v|V][a|A][s|S][c|C][r|R][i|I][p|P][t|T]:(.*)[\\\"\\\']", "\"\"");
    // 含有函数: eval
    xssMap.put("[e|E][v|V][a|A][l|L]\\((.*)\\)", "");
    // 含有符号 <
    xssMap.put("<", "<");
    // 含有符号 >
    xssMap.put(">", ">");
    // 含有符号 (
    xssMap.put("\\(", "(");
    // 含有符号 )
    xssMap.put("\\)", ")");
    // 含有符号 '
    xssMap.put("'", "'");
    // 含有符号 "
    xssMap.put("\"", "\"");
}
 
public void doFilter(ServletRequest request, ServletResponse response,
        FilterChain chain) throws IOException, ServletException {
    // 强制类型转换 HttpServletRequest
    HttpServletRequest httpReq = (HttpServletRequest)request;
    // 构造HttpRequestWrapper对象处理XSS
    HttpRequestWrapper httpReqWarp = new HttpRequestWrapper(httpReq,xssMap);
    // 
    chain.doFilter(httpReqWarp, response);

}

public void destroy() {
     
}

}

=============================
package com.what21.filter.xss;

import java.util.Map;
import java.util.Set;

import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletRequestWrapper;

public final class HttpRequestWrapper extends HttpServletRequestWrapper {

private Map xssMap;
 
public HttpRequestWrapper(HttpServletRequest request) {
    super(request);
}

public HttpRequestWrapper(HttpServletRequest request,
        Map xssMap) {
    super(request);
    this.xssMap = xssMap;
}

@Override
public String[] getParameterValues(String parameter) {
    String[] values = super.getParameterValues(parameter);
    if (values == null) {
        return null;
    }
    int count = values.length;
    // 遍历每一个参数,检查是否含有
    String[] encodedValues = new String[count];
    for (int i = 0; i < count; i++) {
        encodedValues[i] = cleanXSS(values[i]);
    }
    return encodedValues;
}

@Override
public String getParameter(String parameter) {
    String value = super.getParameter(parameter);
    if (value == null) {
        return null;
    }
    return cleanXSS(value);
}

public String getHeader(String name) {
    String value = super.getHeader(name);
    if (value == null)
        return null;
    return cleanXSS(value);

}

/**
* 清除恶意的XSS脚本
*
* @param value
* @return
*/
private String cleanXSS(String value) {
Set keySet = xssMap.keySet();
for(String key : keySet){
String v = xssMap.get(key);
value = value.replaceAll(key,v);
}
return value;
}
}

=============================================================================

XSSFilter
com.what21.filter.xss.XSSFilter


XSSFilter
/*

你可能感兴趣的:(Filter安全过滤高级最终行(XSS攻击))