PHP webpage prevention method configuration for SQL injection_PHP tutorial

WBOY
Release: 2016-07-13 17:10:53
Original
1177 people have browsed it

The prerequisite is that we need to have administrative rights on the server, that is, we can modify the php.ini file. Now I will introduce the method of modifying the php configuration file to prevent SQL injection. Friends who need to learn can refer to it.

For security reasons, you can turn on the safe mode of the "php.ini" file and set "safe_mode=On"; if the "display_erros" option that displays PHP execution error information is turned on, a lot of exploitable information will be returned to the intruder , so set it to "display_erros=off"; in this way, the information after the PHP function execution error will not be displayed in the client's browser.

In addition, there is a very important configuration option in the file. If the "magic_quotes_gpc" item is set to "On", the PHP program will automatically change the variables submitted by the user to include "'", """, "" is automatically converted to an escape character containing a backslash. This option is similar to the parameter filtering in the ASP program and can prevent most character injection attacks.

This program is great if you don’t have server management rights

The code is as follows
 代码如下 复制代码

class sqlsafe {
private $getfilter = "'|(and|or)b.+?(>|<|=|in|like)|/*.+?*/| private $postfilter = "b(and|or)b.{1,6}?(=|>|<|binb|blikeb)|/*.+?*/| private $cookiefilter = "b(and|or)b.{1,6}?(=|>|<|binb|blikeb)|/*.+?*/| /**
* 构造函数
*/
public function __construct() {
foreach($_GET as $key=>$value){$this->stopattack($key,$value,$this->getfilter);}
  foreach($_POST as $key=>$value){$this->stopattack($key,$value,$this->postfilter);}
  foreach($_COOKIE as $key=>$value){$this->stopattack($key,$value,$this->cookiefilter);}
 }
 /**
  * 参数检查并写日志
  */
 public function stopattack($StrFiltKey, $StrFiltValue, $ArrFiltReq){
  if(is_array($StrFiltValue))$StrFiltValue = implode($StrFiltValue);
  if (preg_match("/".$ArrFiltReq."/is",$StrFiltValue) == 1){  
   $this->writeslog($_SERVER["REMOTE_ADDR"]."    ".strftime("%Y-%m-%d %H:%M:%S")."    ".$_SERVER["PHP_SELF"]."    ".$_SERVER["REQUEST_METHOD"]."    ".$StrFiltKey."    ".$StrFiltValue);
   showmsg('您提交的参数非法,系统已记录您的本次操作!','',0,1);
  }
 }
 /**
  * SQL注入日志
  */
 public function writeslog($log){
  $log_path = CACHE_PATH.'logs'.DIRECTORY_SEPARATOR.'sql_log.txt';
  $ts = fopen($log_path,"a+");
  fputs($ts,$log."rn");
  fclose($ts);
 }
}
?>

Copy code
class sqlsafe {
private $getfilter = "'|(and|or)b.+?(>|<|=|in|like)|/*.+?*/| private $postfilter = "b(and|or)b.{1,6}?(=|>|<|binb|blikeb)|/*.+?*/| private $cookiefilter = "b(and|or)b.{1,6}?(=|>|<|binb|blikeb)|/*.+?*/| /**
* Constructor
​*/
public function __construct() {
foreach($_GET as $key=>$value){$this->stopattack($key,$value,$this->getfilter);}
foreach($_POST as $key=>$value){$this->stopattack($key,$value,$this->postfilter);}
foreach($_COOKIE as $key=>$value){$this->stopattack($key,$value,$this->cookiefilter);}
}
/**
* Parameter check and log writing
​*/
public function stopattack($StrFiltKey, $StrFiltValue, $ArrFiltReq){
if(is_array($StrFiltValue))$StrFiltValue = implode($StrFiltValue);
if (preg_match("/".$ArrFiltReq."/is",$StrFiltValue) == 1){
$this->writeslog($_SERVER["REMOTE_ADDR"]." ".strftime("%Y-%m-%d %H:%M:%S")." ".$_SERVER["PHP_SELF"] ." ".$_SERVER["REQUEST_METHOD"]." ".$StrFiltKey." ".$StrFiltValue);
showmsg('The parameters you submitted are illegal, the system has recorded your operation!','',0,1);
}
}
/**
* SQL injection log
​*/
public function writeslog($log){
$log_path = CACHE_PATH.'logs'.DIRECTORY_SEPARATOR.'sql_log.txt';
$ts = fopen($log_path,"a+");
fputs($ts,$log."rn");
fclose($ts);
}
}
?>

http://www.bkjia.com/PHPjc/629633.htmlwww.bkjia.comtrue
http: //www.bkjia.com/PHPjc/629633.html
TechArticle
The prerequisite is that we need to have administrative rights to the server, that is, we can modify the php.ini file. I will introduce it below. Friends who need to learn how to modify the php configuration file to prevent SQL injection can...
source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template