2019独角兽企业重金招聘Python工程师标准>>>
package cn.manmanda.api.util;import javax.servlet.http.HttpServletRequest;/*** 防止SQL注入工具类* @author * @date 2017/12/29 15:39*/
public class AntiSQLInjectionUtil {// public final static String regex = "#|/*|*/|'|%|--|and|or|not|use|insert|delete|update|select|count|group|union"
// + "|create|drop|truncate|alter|grant|execute|exec|xp_cmdshell|call|declare|source|sql";public final static String regex = "'|and|exec|execute|insert|select|delete|update|count|drop|*|%|chr|mid|master|truncate|" +"char|declare|sitename|net user|xp_cmdshell|;|or|-|+|,|like'|and|exec|execute|insert|create|drop|" +"table|from|grant|use|group_concat|column_name|" +"information_schema.columns|table_schema|union|where|select|delete|update|order|by|count|*|" +"chr|mid|master|truncate|char|declare|or|;|-|--|+|,|like|//|/|%|#";/*** 把SQL关键字替换为空字符串* * @param param* @return*/public static String filter(String param) {if (param == null) {return param;}return param.replaceAll("(?i)" + regex, ""); // (?i)不区分大小写替换}/*** 返回经过防注入处理的字符串* * @param request* @param name* @return*/public static String getParameter(HttpServletRequest request, String name) {return AntiSQLInjectionUtil.filter(request.getParameter(name));}public static void main(String[] args) {// System.out.println(StringEscapeUtils.escapeSql("1' or '1' = '1; drop table test"));// //1'' or ''1'' = ''1; drop table testString str = "sElect * from test where id = 1 And name != 'sql' ";String outStr = "";for (int i = 0; i < 1000; i++) {outStr = AntiSQLInjectionUtil.filter(str);}System.out.println(outStr);}}