PHP防注入注意要過濾的信息基本是get,post,然后對于sql就是我們常用的查詢,插入等等sql命令了,下面我給各位整理兩個簡單的例子,希望這些例子能給你網站帶來安全.
PHP防注入類代碼如下:
- <?php
- /**
- * 參數處理類
- * @author JasonWei
- */
- class Params
- {
- public $get = array();
- public $post = array();
- function __construct()
- {
- if (!emptyempty($_GET)) {
- foreach ($_GET as $key => $val) {
- if (is_numeric($val)) {
- $this->get[$key] = $this->getInt($val);
- } else {
- $this->get[$key] = $this->getStr($val);
- }
- }
- }
- if (!emptyempty($_POST)) {
- foreach ($_POST as $key => $val) {
- if (is_numeric($val)) {
- $this->post[$key] = $this->getInt($val);
- } else {
- $this->post[$key] = $this->getStr($val);
- }
- }
- }
- }
- public function getInt($number)
- {
- return intval($number);
- }
- public function getStr($string)
- {
- if (!get_magic_quotes_gpc()) {
- $string = addslashes($string);
- }
- return $string;
- }
- public function checkInject($string)
- {
- return eregi('select|insert|update|delete|/*|*|../|./|union|into|load_file|outfile', $string);
- }
- public function verifyId($id = null)
- {
- if (!$id || $this->checkInject($id) || !is_numeric($id)) {
- $id = false;
- } else {
- $id = intval($id);
- }//開源代碼Vevb.com
- return $id;
- }
- }
- ?>
例子二,代碼如下:
- <?php
- /*************************
- 說明:
- 判斷傳遞的變量中是否含有非法字符
- 如$_POST、$_GET
- 功能:
- 防注入
- *************************/
- //要過濾的非法字符
- $ArrFiltrate=array("'","or","and","union","where");
- //出錯后要跳轉的url,不填則默認前一頁
- $StrGoUrl="";
- //是否存在數組中的值
- function FunStringExist($StrFiltrate,$ArrFiltrate){
- foreach ($ArrFiltrate as $key=>$value){
- if (eregi($value,$StrFiltrate)){
- return true;
- }
- }
- return false;
- }
- //合并$_POST 和 $_GET
- if(function_exists(array_merge)){
- $ArrPostAndGet=array_merge($HTTP_POST_VARS,$HTTP_GET_VARS);
- }else{
- foreach($HTTP_POST_VARS as $key=>$value){
- $ArrPostAndGet[]=$value;
- }
- foreach($HTTP_GET_VARS as $key=>$value){
- $ArrPostAndGet[]=$value;
- }
- }
- //驗證開始
- foreach($ArrPostAndGet as $key=>$value){
- if (FunStringExist($value,$ArrFiltrate)){
- echo "<script language='javascript'>alert('傳遞的信息中不得包含{',or,and,union}等非法字符請您把他們換成{‘,OR,AND,UNION}');</script>";
- if (emptyempty($StrGoUrl)){
- echo "<scriptlanguage='javascript'>history.go(-1);</script>";
- }else{
- echo "<scriptlanguage='javascript'>window.location='".$StrGoUrl."';</script>";
- }
- exit;
- }
- }
- /***************結束防止PHP注入*****************/
- ?>
新聞熱點
疑難解答