📄 sqlin.asp
字号:
<%
'--------版权说明------------------
'SQL通用防注入程序 V3.0
'--------数据库连接部分--------------
'dim dbkillSql,killSqlconn,connkillSql
'dbkillSql="SqlIn.mdb"
'On Error Resume Next
'Set killSqlconn = Server.CreateObject("ADODB.Connection")
'connkillSql="Provider=Microsoft.Jet.OLEDB.4.0;Data Source=" & Server.MapPath(dbkillSql)
'killSqlconn.Open connkillSql
'If Err Then
'err.Clear
'Set killSqlconn = Nothing
'Response.Write "数据库连接出错,请检查连接字串。"
'Response.End
'End If
'--------定义部份------------------
Dim Fy_Post,Fy_Get,Fy_In,Fy_Inf,Fy_Xh,Fy_db,Fy_dbstr,Kill_IP,WriteSql
'自定义需要过滤的字串,用 "|" 分隔
Fy_In = "'|;|and|(|)|exec|insert|select|delete|update|count|*|%|chr|mid|master|truncate|or|char|declare"
Kill_IP=True
WriteSql=True
'----------------------------------
Fy_Inf = split(Fy_In,"|")
'--------POST部份------------------
If Request.Form<>"" Then
For Each Fy_Post In Request.Form
For Fy_Xh=0 To Ubound(Fy_Inf)
If Instr(LCase(Request.Form(Fy_Post)),Fy_Inf(Fy_Xh))<>0 Then
'If WriteSql=True Then
'killSqlconn.Execute("insert into SqlIn(Sqlin_IP,SqlIn_Web,SqlIn_FS,SqlIn_CS,SqlIn_SJ) values('"&Request.ServerVariables("REMOTE_ADDR")&"','"&Request.ServerVariables("URL")&"','POST','"&Fy_Post&"','"&replace(Request.Form(Fy_Post),"'","''")&"')")
'killSqlconn.close
'Set killSqlconn = Nothing
'End If
Response.Write "<Script Language=JavaScript>alert('系统提示:\n\n请不要在参数中包含非法字符尝试注入!\n');</Script>"
Response.Write "非法操作!你已被系统记录做了如下非法操作↓<br>"
Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"<br>"
Response.Write "操作时间:"&Now&"<br>"
Response.Write "操作页面:"&Request.ServerVariables("URL")&"<br>"
Response.Write "提交方式:POST<br>"
Response.Write "提交参数:"&Fy_Post&"<br>"
Response.Write "提交数据:"&Request.Form(Fy_Post)
Call ErroTo(Request.Form(Fy_Post))
Response.End
End If
Next
Next
End If
'----------------------------------
'--------GET部份-------------------
If Request.QueryString<>"" Then
For Each Fy_Get In Request.QueryString
For Fy_Xh=0 To Ubound(Fy_Inf)
If Instr(LCase(Request.QueryString(Fy_Get)),Fy_Inf(Fy_Xh))<>0 Then
'If WriteSql=True Then
'killSqlconn.Execute("insert into SqlIn(Sqlin_IP,SqlIn_Web,SqlIn_FS,SqlIn_CS,SqlIn_SJ) values('"&Request.ServerVariables("REMOTE_ADDR")&"','"&Request.ServerVariables("URL")&"','GET','"&Fy_Get&"','"&replace(Request.QueryString(Fy_Get),"'","''")&"')")
'killSqlconn.close
'Set killSqlconn = Nothing
'End If
Response.Write "<Script Language=JavaScript>alert('系统提示:\n\n请不要在参数中包含非法字符尝试注入!\n');</Script>"
Response.Write "非法操作!你已被系统记录做了如下非法操作↓<br>"
Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"<br>"
Response.Write "操作时间:"&Now&"<br>"
Response.Write "操作页面:"&Request.ServerVariables("URL")&"<br>"
Response.Write "提交方式:GET<br>"
Response.Write "提交参数:"&Fy_Get&"<br>"
Response.Write "提交数据:"&Request.QueryString(Fy_Get)
Call ErroTo(Request.QueryString(Fy_Get))
Response.End
End If
Next
Next
End If
Sub ErroTo(msg)
dim fileName,fs,thisfile
fileName=server.mappath("SqlErr.asp")
set fs=CreateObject("Scripting.FileSystemObject")
set thisfile=fs.opentextfile(fileName,8,-2)
thisfile.Writeline(""&msg&"")
thisfile.close
set fs=Nothing
response.write " 错误内容已被记录"
End Sub
'If Kill_IP=True Then
'Dim Sqlin_IP,rsKill_IP,Kill_IPsql
'Sqlin_IP=Request.ServerVariables("REMOTE_ADDR")
'Kill_IPsql="select Sqlin_IP from SqlIn where Sqlin_IP='"&Sqlin_IP&"' and kill_ip=true"
'Set rsKill_IP=killSqlconn.execute(Kill_IPsql)
'If Not(rsKill_IP.eof or rsKill_IP.bof) Then
'Response.write "<Script Language=JavaScript>alert('SQL通用防注入系统提示你↓\n\n你的Ip已经被本系统自动锁定!\n\n如想访问本站请和管理员联系!\n\nHttp://Www.wrsky.Com \n\n系统版本:V3.0(ASP)\n\nBy:Neeao')
'Response.End
'End If
'rsKill_IP.close
'End If
%>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -