XssHttpWrapper.java 9.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292
  1. /*
  2. * To change this template, choose Tools | Templates
  3. * and open the template in the editor.
  4. */
  5. package com.key.common.plugs.xss;
  6. import com.blogspot.radialmind.html.HTMLParser;
  7. import com.blogspot.radialmind.xss.XSSFilter;
  8. import com.itextpdf.text.log.SysoCounter;
  9. import java.io.StringReader;
  10. import java.io.StringWriter;
  11. import java.util.HashMap;
  12. import java.util.Iterator;
  13. import java.util.Map;
  14. import java.util.regex.Pattern;
  15. import javax.servlet.http.HttpServletRequest;
  16. import javax.servlet.http.HttpServletRequestWrapper;
  17. /**
  18. * XSS保护
  19. *
  20. * @author storezhang
  21. */
  22. public class XssHttpWrapper extends HttpServletRequestWrapper {
  23. private HttpServletRequest orgRequest;
  24. public XssHttpWrapper(HttpServletRequest request) {
  25. super(request);
  26. orgRequest = request;
  27. }
  28. /**
  29. * 覆盖getParameter方法,将参数名和参数值都做xss过滤。<br/>
  30. * 如果需要获得原始的值,则通过super.getParameterValues(name)来获取<br/>
  31. * getParameterNames,getParameterValues和getParameterMap也可能需要覆盖
  32. */
  33. @Override
  34. public String getParameter(String name) {
  35. String value = super.getParameter(xssEncode(name));
  36. if (value != null) {
  37. value = xssEncode(value);
  38. }
  39. return value;
  40. }
  41. /**
  42. * 覆盖getHeader方法,将参数名和参数值都做xss过滤。<br/>
  43. * 如果需要获得原始的值,则通过super.getHeaders(name)来获取<br/> getHeaderNames 也可能需要覆盖
  44. */
  45. @Override
  46. public String getHeader(String name) {
  47. String value = super.getHeader(xssEncode(name));
  48. if (value != null) {
  49. value = xssEncode(value);
  50. }
  51. return value;
  52. }
  53. /**
  54. *
  55. * @param name
  56. * @return
  57. */
  58. public String[] getParameterValues(String name) {
  59. String[] values = super.getParameterValues(name);
  60. if (values != null) {
  61. for (int i = 0; i < values.length; i++) {
  62. values[i] = xssEncode(values[i]);
  63. }
  64. }
  65. return values;
  66. }
  67. /**
  68. * @return
  69. */
  70. /*public Map getParameterMap() {
  71. HashMap paramMap = (HashMap) super.getParameterMap();
  72. paramMap = (HashMap) paramMap.clone();
  73. for (Iterator iterator = paramMap.entrySet().iterator(); iterator.hasNext(); ) {
  74. Map.Entry entry = (Map.Entry) iterator.next();
  75. String[] values = (String[]) entry.getValue();
  76. for (int i = 0; i < values.length; i++) {
  77. if(values[i] instanceof String){
  78. values[i] = xssEncode((String)values[i]);
  79. }
  80. }
  81. entry.setValue(values);
  82. }
  83. return paramMap;
  84. }*/
  85. /**
  86. * 从request中获得参数Map,并返回可读的Map
  87. *
  88. * @param request
  89. * @return
  90. */
  91. public Map<String, String[]> getParameterMap(HttpServletRequest request) {
  92. // 参数Map
  93. Map<String, String[]> properties = request.getParameterMap();
  94. Map<String,String[]> returnMap = new HashMap();
  95. Iterator entries = properties.entrySet().iterator();
  96. Map.Entry entry;
  97. String name = "";
  98. String[] value ;
  99. while (entries.hasNext()) {
  100. entry = (Map.Entry) entries.next();
  101. name = (String) entry.getKey();
  102. Object valueObj = entry.getValue();
  103. if(null == valueObj){
  104. value = new String[]{};
  105. }else if(valueObj instanceof String[]){
  106. value = (String[])valueObj;
  107. }else{
  108. value = new String[]{valueObj.toString()};
  109. }
  110. returnMap.put(name, value);
  111. }
  112. return returnMap;
  113. }
  114. /**
  115. * 获取最原始的request
  116. *
  117. * @return
  118. */
  119. public HttpServletRequest getOrgRequest() {
  120. return orgRequest;
  121. }
  122. /**
  123. * 获取最原始的request的静态方法
  124. *
  125. * @return
  126. */
  127. public static HttpServletRequest getOrgRequest(HttpServletRequest req) {
  128. if (req instanceof XssHttpWrapper) {
  129. return ((XssHttpWrapper) req).getOrgRequest();
  130. }
  131. return req;
  132. }
  133. public String escape(String s)
  134. {
  135. StringBuilder sb = new StringBuilder(s.length() + 16);
  136. for (int i = 0; i < s.length(); i++)
  137. {
  138. char c = s.charAt(i);
  139. switch (c)
  140. {
  141. case '>':
  142. sb.append('>');// 全角大于号
  143. break;
  144. case '<':
  145. sb.append('<');// 全角小于号
  146. break;
  147. case '\'':
  148. sb.append('‘');// 全角单引号
  149. break;
  150. case '\"':
  151. sb.append('“');// 全角双引号
  152. break;
  153. case '\\':
  154. sb.append('\');// 全角斜线
  155. break;
  156. case '%':
  157. sb.append('%'); // 全角冒号
  158. break;
  159. default:
  160. sb.append(c);
  161. break;
  162. }
  163. }
  164. return sb.toString();
  165. }
  166. /**
  167. * 将容易引起xss漏洞的半角字符直接替换成全角字符
  168. *
  169. * @param s
  170. * @return
  171. */
  172. private static String xssEncode(String s) {
  173. if (s == null || s.isEmpty()) {
  174. return s;
  175. }
  176. StringReader reader = new StringReader(s);
  177. StringWriter writer = new StringWriter();
  178. try {
  179. HTMLParser.process(reader, writer, new XSSFilter(), true);
  180. return writer.toString();
  181. } catch (NullPointerException e) {
  182. return s;
  183. } catch (Exception ex) {
  184. ex.printStackTrace(System.out);
  185. }
  186. return null;
  187. }
  188. /**
  189. * 将容易引起xss漏洞的半角字符直接替换成全角字符
  190. *
  191. * @param s
  192. * @return
  193. */
  194. /* public String xssEncode(String s)
  195. {
  196. if (s == null || s.isEmpty())
  197. {
  198. return s;
  199. }
  200. String result = stripXSS(s);
  201. if (null != result)
  202. {
  203. result = escape(result);
  204. }
  205. return result;
  206. }*/
  207. /**
  208. * 插件之所以报 mismatched tree node: EOF expecting错误是因为其对注入的脚本格式有校验
  209. * @param
  210. * @return
  211. */
  212. /*private String stripXSS(String value)
  213. {
  214. if (value != null)
  215. {
  216. // NOTE: It's highly recommended to use the ESAPI library and uncomment the following line to
  217. // avoid encoded attacks.
  218. // value = ESAPI.encoder().canonicalize(value);
  219. // Avoid null characters
  220. value = value.replaceAll("", "");
  221. // Avoid anything between script tags
  222. Pattern scriptPattern = Pattern.compile("<script>(.*?)</script>", Pattern.CASE_INSENSITIVE);
  223. value = scriptPattern.matcher(value).replaceAll("");
  224. // Avoid anything in a src='...' type of expression
  225. scriptPattern = Pattern.compile("src[\r\n]*=[\r\n]*\\\'(.*?)\\\'", Pattern.CASE_INSENSITIVE | Pattern.MULTILINE | Pattern.DOTALL);
  226. value = scriptPattern.matcher(value).replaceAll("");
  227. scriptPattern = Pattern.compile("src[\r\n]*=[\r\n]*\\\"(.*?)\\\"", Pattern.CASE_INSENSITIVE | Pattern.MULTILINE | Pattern.DOTALL);
  228. value = scriptPattern.matcher(value).replaceAll("");
  229. // Remove any lonesome </script> tag
  230. scriptPattern = Pattern.compile("</script>", Pattern.CASE_INSENSITIVE);
  231. value = scriptPattern.matcher(value).replaceAll("");
  232. // Remove any lonesome <script ...> tag
  233. scriptPattern = Pattern.compile("<script(.*?)>", Pattern.CASE_INSENSITIVE | Pattern.MULTILINE | Pattern.DOTALL);
  234. value = scriptPattern.matcher(value).replaceAll("");
  235. // Avoid eval(...) expressions
  236. scriptPattern = Pattern.compile("eval\\((.*?)\\)", Pattern.CASE_INSENSITIVE | Pattern.MULTILINE | Pattern.DOTALL);
  237. value = scriptPattern.matcher(value).replaceAll("");
  238. // Avoid expression(...) expressions
  239. scriptPattern = Pattern.compile("expression\\((.*?)\\)", Pattern.CASE_INSENSITIVE | Pattern.MULTILINE | Pattern.DOTALL);
  240. value = scriptPattern.matcher(value).replaceAll("");
  241. // Avoid javascript:... expressions
  242. scriptPattern = Pattern.compile("javascript:", Pattern.CASE_INSENSITIVE);
  243. value = scriptPattern.matcher(value).replaceAll("");
  244. // Avoid vbscript:... expressions
  245. scriptPattern = Pattern.compile("vbscript:", Pattern.CASE_INSENSITIVE);
  246. value = scriptPattern.matcher(value).replaceAll("");
  247. // Avoid onload= expressions
  248. scriptPattern = Pattern.compile("onload(.*?)=", Pattern.CASE_INSENSITIVE | Pattern.MULTILINE | Pattern.DOTALL);
  249. value = scriptPattern.matcher(value).replaceAll("");
  250. scriptPattern = Pattern.compile("<iframe>(.*?)</iframe>", Pattern.CASE_INSENSITIVE);
  251. value = scriptPattern.matcher(value).replaceAll("");
  252. scriptPattern = Pattern.compile("</iframe>", Pattern.CASE_INSENSITIVE);
  253. value = scriptPattern.matcher(value).replaceAll("");
  254. // Remove any lonesome <script ...> tag
  255. scriptPattern = Pattern.compile("<iframe(.*?)>", Pattern.CASE_INSENSITIVE | Pattern.MULTILINE | Pattern.DOTALL);
  256. value = scriptPattern.matcher(value).replaceAll("");
  257. }
  258. return value;
  259. }*/
  260. }