The prerequisite is that we need to have administrative rights on the server, that is, we can modify the php.ini file. Now I will introduce the method of modifying the php configuration file to prevent SQL injection. Friends who need to learn can refer to it.
For security reasons, you can turn on the safe mode of the "php.ini" file and set "safe_mode=On"; if the "display_erros" option that displays PHP execution error information is turned on, a lot of exploitable information will be returned to the intruder , so set it to "display_erros=off"; in this way, the information after the PHP function execution error will not be displayed in the client's browser.
In addition, there is a very important configuration option in the file. If the "magic_quotes_gpc" item is set to "On", the PHP program will automatically change the variables submitted by the user to include "'", """, "" is automatically converted to an escape character containing a backslash. This option is similar to the parameter filtering in the ASP program and can prevent most character injection attacks.
This program is great if you don’t have server management rights
The code is as follows
代码如下 |
复制代码 |
class sqlsafe {
private $getfilter = "'|(and|or)b.+?(>|<|=|in|like)|/*.+?*/|
private $postfilter = "b(and|or)b.{1,6}?(=|>|<|binb|blikeb)|/*.+?*/|
private $cookiefilter = "b(and|or)b.{1,6}?(=|>|<|binb|blikeb)|/*.+?*/|
/**
* 构造函数
*/
public function __construct() {
foreach($_GET as $key=>$value){$this->stopattack($key,$value,$this->getfilter);}
foreach($_POST as $key=>$value){$this->stopattack($key,$value,$this->postfilter);}
foreach($_COOKIE as $key=>$value){$this->stopattack($key,$value,$this->cookiefilter);}
}
/**
* 参数检查并写日志
*/
public function stopattack($StrFiltKey, $StrFiltValue, $ArrFiltReq){
if(is_array($StrFiltValue))$StrFiltValue = implode($StrFiltValue);
if (preg_match("/".$ArrFiltReq."/is",$StrFiltValue) == 1){
$this->writeslog($_SERVER["REMOTE_ADDR"]." ".strftime("%Y-%m-%d %H:%M:%S")." ".$_SERVER["PHP_SELF"]." ".$_SERVER["REQUEST_METHOD"]." ".$StrFiltKey." ".$StrFiltValue);
showmsg('您提交的参数非法,系统已记录您的本次操作!','',0,1);
}
}
/**
* SQL注入日志
*/
public function writeslog($log){
$log_path = CACHE_PATH.'logs'.DIRECTORY_SEPARATOR.'sql_log.txt';
$ts = fopen($log_path,"a+");
fputs($ts,$log."rn");
fclose($ts);
}
}
?>
|
|
Copy code |
|
class sqlsafe {
private $getfilter = "'|(and|or)b.+?(>|<|=|in|like)|/*.+?*/|
private $postfilter = "b(and|or)b.{1,6}?(=|>|<|binb|blikeb)|/*.+?*/|
private $cookiefilter = "b(and|or)b.{1,6}?(=|>|<|binb|blikeb)|/*.+?*/|
/**
* Constructor
*/
public function __construct() {
foreach($_GET as $key=>$value){$this->stopattack($key,$value,$this->getfilter);}
foreach($_POST as $key=>$value){$this->stopattack($key,$value,$this->postfilter);}
foreach($_COOKIE as $key=>$value){$this->stopattack($key,$value,$this->cookiefilter);}
}
/**
* Parameter check and log writing
*/
public function stopattack($StrFiltKey, $StrFiltValue, $ArrFiltReq){
if(is_array($StrFiltValue))$StrFiltValue = implode($StrFiltValue);
if (preg_match("/".$ArrFiltReq."/is",$StrFiltValue) == 1){
$this->writeslog($_SERVER["REMOTE_ADDR"]." ".strftime("%Y-%m-%d %H:%M:%S")." ".$_SERVER["PHP_SELF"] ." ".$_SERVER["REQUEST_METHOD"]." ".$StrFiltKey." ".$StrFiltValue);
showmsg('The parameters you submitted are illegal, the system has recorded your operation!','',0,1);
}
}
/**
* SQL injection log
*/
public function writeslog($log){
$log_path = CACHE_PATH.'logs'.DIRECTORY_SEPARATOR.'sql_log.txt';
$ts = fopen($log_path,"a+");
fputs($ts,$log."rn");
fclose($ts);
}
}
?>
http://www.bkjia.com/PHPjc/629633.htmlwww.bkjia.comtrue
http: //www.bkjia.com/PHPjc/629633.htmlThe prerequisite is that we need to have administrative rights to the server, that is, we can modify the php.ini file. I will introduce it below. Friends who need to learn how to modify the php configuration file to prevent SQL injection can...