防止最近流行的com/css/c.js注入的解决方法

针对近期流行的com/css/c.js注入攻击,本文提供了一种有效的防御措施。通过使用提供的ASP代码,可以有效阻止恶意SQL注入行为,保护网站安全。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

 防止最近流行的com/css/c.js注入的解决方法

  最近IE7漏洞的爆发,使得黑客们利用最新发现IE漏洞发起攻击的数量急剧增加,而相应补丁程序目前尚未完成开发,3天时间,被注入、挂马的网站已达两万之多,为解这燃眉之急,威盾安全专家们经过努力,找到了解决最近流行病毒SQL代码:Script Src=http://c.nu%63%6Cear3.com/css/c.js>的方法。

方法步骤如下:
直接复制下面的代码保存一个ASP文件
#include到数据库连接文件就OK了
至于已经存在的咋数据库直接运行一下代码替换
update ass set title =replace(cast(title as varchar(8000)),’js代码段’,”)

只能一个字段一个字段的进行替换,没有别的办法


<%
'--------定义部份------------------
Dim XH_Post,XH_Get,XH_Cookie,XH_In,XH_Inf,XH_Xh,XH_Inf2,XH_In2
'自定义需要过滤的字串,用 "|" 分隔
XH_In = "'|;|and|exec|insert|select|delete%20from|update|count|*|%|chr|mid|master|truncate|char|declare|drop%20table|from|net%20user|xp_cmdshell|/add|net%20localgroup%20administrators|Asc|char"
XH_In2 = "'|;|and|exec|insert|select|delete%20from|update|count|chr|mid|master|truncate|char|declare|drop%20table|from|net%20user|xp_cmdshell|/add|net%20localgroup%20administrators|Asc|char"
'----------------------------------
%>

<%
XH_Inf = split(XH_In,"|")
XH_Inf2 = split(XH_In2,"|")
'--------POST部份------------------
If Request.Form<>"" Then
For Each XH_Post In Request.Form

For XH_Xh=0 To Ubound(XH_Inf)
If Instr(LCase(Request.Form(XH_Post)),XH_Inf(XH_Xh))<>0 Then
Response.Write "非法操作!系统做了如下记录↓<br>"
Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"<br>"
Response.Write "操作时间:"&Now&"<br>"
Response.Write "操作页面:"&Request.ServerVariables("URL")&"<br>"
Response.Write "提交方式:POST<br>"
Response.Write "提交参数:"&XH_Post&"<br>"
Response.Write "提交数据:"&Request.Form(XH_Post)
Response.End
End If
Next
Next
End If
'----------------------------------

'--------GET部份-------------------
If Request.QueryString<>"" Then
For Each XH_Get In Request.QueryString

For XH_Xh=0 To Ubound(XH_Inf)
If Instr(LCase(Request.QueryString(XH_Get)),XH_Inf(XH_Xh))<>0 Then
Response.Write "非法操作!系统做了如下记录↓<br>"
Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"<br>"
Response.Write "操作时间:"&Now&"<br>"
Response.Write "操作页面:"&Request.ServerVariables("URL")&"<br>"
Response.Write "提交方式:GET<br>"
Response.Write "提交参数:"&XH_Get&"<br>"
Response.Write "提交数据:"&Request.QueryString(XH_Get)
Response.End
End If
Next
Next
End If
'----------------------------------

'--------COOKIE部份-------------------
If Request.Cookies<>"" Then
For Each XH_Cookie In Request.Cookies

For XH_Xh=0 To Ubound(XH_Inf2)
If Instr(LCase(Request.Cookies(XH_Cookie)),XH_Inf2(XH_Xh))<>0 Then
Response.Write "非法操作!系统做了如下记录↓<br>"
Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"<br>"
Response.Write "操作时间:"&Now&"<br>"
Response.Write "操作页面:"&Request.ServerVariables("URL")&"<br>"
Response.Write "提交方式:Cookie<br>"
Response.Write "提交参数:"&XH_Cookie&"<br>"
Response.Write "提交数据:"&Request.Cookies(XH_Cookie)
Response.End
End If
Next
Next
End If
'----------------------------------
%>

如果有必要用cookie做认证的可以用下面试验下,可以保证躲过这次的自动攻击,但手动攻击不保证能防住,有条件的还是把cookie认证改成session认证保险点
如果没有COOKIE认证,可以直接用这个,代码不需要修改
代码如下

<%

'--------定义部份------------------
Dim XH_Post,XH_Get,XH_Cookie,XH_In,XH_Inf,XH_Xh
'自定义需要过滤的字串,用 "|" 分隔
XH_In = "'|;|and|exec|insert|select|delete%20from|update|count|*|%|chr|mid|master|truncate|char|declare|drop%20table|from|net%20user|xp_cmdshell|/add|net%20localgroup%20administrators|Asc|char"

'----------------------------------
%>

<%
XH_Inf = split(XH_In,"|")

'--------POST部份------------------
If Request.Form<>"" Then
For Each XH_Post In Request.Form

For XH_Xh=0 To Ubound(XH_Inf)
If Instr(LCase(Request.Form(XH_Post)),XH_Inf(XH_Xh))<>0 Then
Response.Write "非法操作!系统做了如下记录↓<br>"
Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"<br>"
Response.Write "操作时间:"&Now&"<br>"
Response.Write "操作页面:"&Request.ServerVariables("URL")&"<br>"
Response.Write "提交方式:POST<br>"
Response.Write "提交参数:"&XH_Post&"<br>"
Response.Write "提交数据:"&Request.Form(XH_Post)
Response.End
End If
Next
Next
End If
'----------------------------------

'--------GET部份-------------------
If Request.QueryString<>"" Then
For Each XH_Get In Request.QueryString

For XH_Xh=0 To Ubound(XH_Inf)
If Instr(LCase(Request.QueryString(XH_Get)),XH_Inf(XH_Xh))<>0 Then
Response.Write "非法操作!系统做了如下记录↓<br>"
Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"<br>"
Response.Write "操作时间:"&Now&"<br>"
Response.Write "操作页面:"&Request.ServerVariables("URL")&"<br>"
Response.Write "提交方式:GET<br>"
Response.Write "提交参数:"&XH_Get&"<br>"
Response.Write "提交数据:"&Request.QueryString(XH_Get)
Response.End
End If
Next
Next
End If
'----------------------------------

'--------COOKIE部份-------------------
If Request.Cookies<>"" Then
For Each XH_Cookie In Request.Cookies

For XH_Xh=0 To Ubound(XH_Inf)
If Instr(LCase(Request.Cookies(XH_Cookie)),XH_Inf(XH_Xh))<>0 Then
Response.Write "非法操作!系统做了如下记录↓<br>"
Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"<br>"
Response.Write "操作时间:"&Now&"<br>"
Response.Write "操作页面:"&Request.ServerVariables("URL")&"<br>"
Response.Write "提交方式:Cookie<br>"
Response.Write "提交参数:"&XH_Cookie&"<br>"
Response.Write "提交数据:"&Request.Cookies(XH_Cookie)
Response.End
End If
Next
Next
End If
'----------------------------------
%>
为了自己的网站不再被SQL注入,请大家及时安装威盾专业网站防火墙。

原文地址:http://www.weidun.com.cn/news/weidun/486.htm

!doctype html> <html lang="en"> <head> <meta charset="utf-8"/> <title>跳转提示</title> <meta name="viewport" content="width =device-width, initial-scale=1.0"> <!--Bootstrap Css --> <link href="/static/merchant/default/css/ bootstrap.min.css" id="bootstrap-style" rel="s tylesheet"type="text/css"/> <!--Icons Css --> <link href="/static/merchant/default/css/i cons.min.css" rel="stylesheet" type="text/css" <!-- App Css--> <link href="/static/merchant/default/css/ app.min.css" id="app-style" rel="stylesheet"ty pe="text/css"/> <style> 0.1); .content-icon { width: 96px; height: 96px; background-color: rgba(240, 64, 55, border-radius: 15px; display:-webkit-inline-box; display: inline-flex; -webkit-box-align: center; align-items: center; 0.1); } -webkit-box-pack: center; justify-content: center; margin-bottom: 20px; margin-top: 100px; .content-icon.error { background-color: rgba(240, 64, 55, 0.1); .content-icon.success{ background-color:rgba(33, 202, 51, </style> </head> <body style="background-image: url('/stati c/theme/default/img/404-bg.jpg'); visibility: vi sible; animation-name: fadeln;"> <div class="account-pages"> <div class="container"> <div class="row mt-5"> <div class="col-lg-12"> tent-icon error"> <div class="text-center mb-5"> <div class="con <iclass="bx bx-message-sq uare-dots display-4 text-danger"></i> </div> <h3 class='text-danger font-w eight-bold mt-5'>请刷新后重试!</h3> <p class="mt-4">页面自动<ai d="href" href="javascript:history.back(-1);"> 跳转</a>等待时间:<bid="wait">3</b></p </div> </div> </div> </div> </div> <!-- JAVASCRIPT --> <script src="/static/merchant/default/libs /jquery/jquery.min.js"></script> <script src="/static/merchant/default/libs /bootstrap/js/bootstrap.bundle.min.js"></scri pt> <script src="/static/merchant/default/libs /metismenu/metisMenu.min.js"></script> <script src="/static/merchant/default/libs /simplebar/simplebar.min.js"></script> <script src="/static/merchant/default/libs /node-waves/waves.min.js"></script> <script src="/static/merchant/default/ass ets/js/app.js"></script> <script type="text/javascript"> ('wait'), (function(){ var wait = document.getElementByld d('href').href; href= document.getElementByl var interval = setlnterval(function (){ var time =--wait.innerHTML; if (time <= 0){ location.replace(href); clearlnterval(interval); },1000); })(); </script> </body> </html>
最新发布
06-13
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值