@@ -137,6 +137,96 @@ function dede_random_bytes($length) | |||
} | |||
return FALSE; | |||
} | |||
//SQL语句过滤程序,由80sec提供,这里作了适当的修改 | |||
if (!function_exists('CheckSql')) { | |||
function CheckSql($db_string, $querytype = 'select') | |||
{ | |||
global $cfg_cookie_encode; | |||
$clean = ''; | |||
$error = ''; | |||
$old_pos = 0; | |||
$pos = -1; | |||
$enkey = substr(md5(substr($cfg_cookie_encode.'dedebiz', 0, 5)), 0, 10); | |||
$log_file = DEDEDATA.'/checksql_'.$enkey.'_safe.txt'; | |||
$userIP = GetIP(); | |||
$getUrl = GetCurUrl(); | |||
//如果是普通查询语句,直接过滤一些特殊语法 | |||
if ($querytype == 'select') { | |||
$notallow1 = "[^0-9a-z@\._-]{1,}(union|sleep|benchmark|load_file|outfile)[^0-9a-z@\.-]{1,}"; | |||
//$notallow2 = "--|/\*"; | |||
if (preg_match("/".$notallow1."/i", $db_string)) { | |||
fputs(fopen($log_file, 'a+'), "$userIP||$getUrl||$db_string||SelectBreak\r\n"); | |||
exit("<span>Safe Alert: Request Error step 1 !</span>"); | |||
} | |||
} | |||
//完整的SQL检查 | |||
while (TRUE) { | |||
$pos = strpos($db_string, '\'', $pos + 1); | |||
if ($pos === FALSE) { | |||
break; | |||
} | |||
$clean .= substr($db_string, $old_pos, $pos - $old_pos); | |||
while (TRUE) { | |||
$pos1 = strpos($db_string, '\'', $pos + 1); | |||
$pos2 = strpos($db_string, '\\', $pos + 1); | |||
if ($pos1 === FALSE) { | |||
break; | |||
} elseif ($pos2 == FALSE || $pos2 > $pos1) { | |||
$pos = $pos1; | |||
break; | |||
} | |||
$pos = $pos2 + 1; | |||
} | |||
$clean .= '$s$'; | |||
$old_pos = $pos + 1; | |||
} | |||
$clean .= substr($db_string, $old_pos); | |||
$clean = trim(strtolower(preg_replace(array('~\s+~s'), array(' '), $clean))); | |||
if ( | |||
strpos($clean, '@') !== FALSE or strpos($clean, 'char(') !== FALSE or strpos($clean, '"') !== FALSE | |||
or strpos($clean, '$s$$s$') !== FALSE | |||
) { | |||
$fail = TRUE; | |||
if (preg_match("#^create table#i", $clean)) $fail = FALSE; | |||
$error = "unusual character"; | |||
} | |||
//老版本的Mysql并不支持union,常用的程序里也不使用union,但是一些黑客使用它,所以检查它 | |||
if (strpos($clean, 'union') !== FALSE && preg_match('~(^|[^a-z])union($|[^[a-z])~s', $clean) != 0) { | |||
$fail = TRUE; | |||
$error = "union detect"; | |||
} | |||
//发布版本的程序可能比较少包括--,#这样的注释,但是黑客经常使用它们 | |||
elseif (strpos($clean, '/*') > 2 || strpos($clean, '--') !== FALSE || strpos($clean, '#') !== FALSE) { | |||
$fail = TRUE; | |||
$error = "comment detect"; | |||
} | |||
//这些函数不会被使用,但是黑客会用它来操作文件,down掉数据库 | |||
elseif (strpos($clean, 'sleep') !== FALSE && preg_match('~(^|[^a-z])sleep($|[^[a-z])~s', $clean) != 0) { | |||
$fail = TRUE; | |||
$error = "slown down detect"; | |||
} elseif (strpos($clean, 'benchmark') !== FALSE && preg_match('~(^|[^a-z])benchmark($|[^[a-z])~s', $clean) != 0) { | |||
$fail = TRUE; | |||
$error = "slown down detect"; | |||
} elseif (strpos($clean, 'load_file') !== FALSE && preg_match('~(^|[^a-z])load_file($|[^[a-z])~s', $clean) != 0) { | |||
$fail = TRUE; | |||
$error = "file fun detect"; | |||
} elseif (strpos($clean, 'into outfile') !== FALSE && preg_match('~(^|[^a-z])into\s+outfile($|[^[a-z])~s', $clean) != 0) { | |||
$fail = TRUE; | |||
$error = "file fun detect"; | |||
} | |||
//老版本的MYSQL不支持子查询,我们的程序里可能也用得少,但是黑客可以使用它来查询数据库敏感信息 | |||
elseif (preg_match('~\([^)]*?select~s', $clean) != 0) { | |||
$fail = TRUE; | |||
$error = "sub select detect"; | |||
} | |||
if (!empty($fail)) { | |||
fputs(fopen($log_file, 'a+'), "$userIP||$getUrl||$db_string||$error\r\n"); | |||
exit("<span>Safe Alert: Request Error step 2!</span>"); | |||
} else { | |||
return $db_string; | |||
} | |||
} | |||
} | |||
/** | |||
* 载入小助手,系统默认载入小助手 | |||
* 在/data/helper.inc.php中进行默认小助手初始化的设置 | |||
@@ -473,7 +473,9 @@ class DedeSqli | |||
} | |||
function RecordLog($runtime = 0) | |||
{ | |||
$RecordLogFile = DEDEDATA.'/mysqli_record_log.inc'; | |||
global $cfg_cookie_encode; | |||
$enkey = substr(md5(substr($cfg_cookie_encode.'dedebiz', 0, 5)), 0, 10); | |||
$RecordLogFile = DEDEDATA.'/mysqli_record_log_'.$enkey.'.inc'; | |||
$url = $this->GetCurUrl(); | |||
$savemsg = <<<EOT | |||
@@ -489,7 +491,9 @@ EOT; | |||
//显示数据链接错误信息 | |||
function DisplayError($msg) | |||
{ | |||
$errorTrackFile = DEDEDATA.'/mysqli_error_trace.inc'; | |||
global $cfg_cookie_encode; | |||
$enkey = substr(md5(substr($cfg_cookie_encode.'dedebiz', 0, 5)), 0, 10); | |||
$errorTrackFile = DEDEDATA.'/mysqli_error_trace_'.$enkey.'.inc'; | |||
if ($this->showError) { | |||
$msg = str_replace(array("\r","\n"),"",addslashes($msg)); | |||
ShowMsg("{$msg}", "javascript:;", -1); | |||
@@ -522,93 +526,4 @@ EOT; | |||
function CopySQLiPoint(&$ndsql) | |||
{ | |||
$GLOBALS['dsqli'] = $ndsql; | |||
} | |||
//SQL语句过滤程序,由80sec提供,这里作了适当的修改 | |||
if (!function_exists('CheckSql')) { | |||
function CheckSql($db_string, $querytype = 'select') | |||
{ | |||
global $cfg_cookie_encode; | |||
$clean = ''; | |||
$error = ''; | |||
$old_pos = 0; | |||
$pos = -1; | |||
$log_file = DEDEDATA.'/'.md5($cfg_cookie_encode).'_safe.txt'; | |||
$userIP = GetIP(); | |||
$getUrl = GetCurUrl(); | |||
//如果是普通查询语句,直接过滤一些特殊语法 | |||
if ($querytype == 'select') { | |||
$notallow1 = "[^0-9a-z@\._-]{1,}(union|sleep|benchmark|load_file|outfile)[^0-9a-z@\.-]{1,}"; | |||
//$notallow2 = "--|/\*"; | |||
if (preg_match("/".$notallow1."/i", $db_string)) { | |||
fputs(fopen($log_file, 'a+'), "$userIP||$getUrl||$db_string||SelectBreak\r\n"); | |||
exit("<span>Safe Alert: Request Error step 1 !</span>"); | |||
} | |||
} | |||
//完整的SQL检查 | |||
while (TRUE) { | |||
$pos = strpos($db_string, '\'', $pos + 1); | |||
if ($pos === FALSE) { | |||
break; | |||
} | |||
$clean .= substr($db_string, $old_pos, $pos - $old_pos); | |||
while (TRUE) { | |||
$pos1 = strpos($db_string, '\'', $pos + 1); | |||
$pos2 = strpos($db_string, '\\', $pos + 1); | |||
if ($pos1 === FALSE) { | |||
break; | |||
} elseif ($pos2 == FALSE || $pos2 > $pos1) { | |||
$pos = $pos1; | |||
break; | |||
} | |||
$pos = $pos2 + 1; | |||
} | |||
$clean .= '$s$'; | |||
$old_pos = $pos + 1; | |||
} | |||
$clean .= substr($db_string, $old_pos); | |||
$clean = trim(strtolower(preg_replace(array('~\s+~s'), array(' '), $clean))); | |||
if ( | |||
strpos($clean, '@') !== FALSE or strpos($clean, 'char(') !== FALSE or strpos($clean, '"') !== FALSE | |||
or strpos($clean, '$s$$s$') !== FALSE | |||
) { | |||
$fail = TRUE; | |||
if (preg_match("#^create table#i", $clean)) $fail = FALSE; | |||
$error = "unusual character"; | |||
} | |||
//老版本的Mysql并不支持union,常用的程序里也不使用union,但是一些黑客使用它,所以检查它 | |||
if (strpos($clean, 'union') !== FALSE && preg_match('~(^|[^a-z])union($|[^[a-z])~s', $clean) != 0) { | |||
$fail = TRUE; | |||
$error = "union detect"; | |||
} | |||
//发布版本的程序可能比较少包括--,#这样的注释,但是黑客经常使用它们 | |||
elseif (strpos($clean, '/*') > 2 || strpos($clean, '--') !== FALSE || strpos($clean, '#') !== FALSE) { | |||
$fail = TRUE; | |||
$error = "comment detect"; | |||
} | |||
//这些函数不会被使用,但是黑客会用它来操作文件,down掉数据库 | |||
elseif (strpos($clean, 'sleep') !== FALSE && preg_match('~(^|[^a-z])sleep($|[^[a-z])~s', $clean) != 0) { | |||
$fail = TRUE; | |||
$error = "slown down detect"; | |||
} elseif (strpos($clean, 'benchmark') !== FALSE && preg_match('~(^|[^a-z])benchmark($|[^[a-z])~s', $clean) != 0) { | |||
$fail = TRUE; | |||
$error = "slown down detect"; | |||
} elseif (strpos($clean, 'load_file') !== FALSE && preg_match('~(^|[^a-z])load_file($|[^[a-z])~s', $clean) != 0) { | |||
$fail = TRUE; | |||
$error = "file fun detect"; | |||
} elseif (strpos($clean, 'into outfile') !== FALSE && preg_match('~(^|[^a-z])into\s+outfile($|[^[a-z])~s', $clean) != 0) { | |||
$fail = TRUE; | |||
$error = "file fun detect"; | |||
} | |||
//老版本的MYSQL不支持子查询,我们的程序里可能也用得少,但是黑客可以使用它来查询数据库敏感信息 | |||
elseif (preg_match('~\([^)]*?select~s', $clean) != 0) { | |||
$fail = TRUE; | |||
$error = "sub select detect"; | |||
} | |||
if (!empty($fail)) { | |||
fputs(fopen($log_file, 'a+'), "$userIP||$getUrl||$db_string||$error\r\n"); | |||
exit("<span>Safe Alert: Request Error step 2!</span>"); | |||
} else { | |||
return $db_string; | |||
} | |||
} | |||
} |
@@ -487,7 +487,9 @@ class DedeSqlite | |||
} | |||
function RecordLog($runtime = 0) | |||
{ | |||
$RecordLogFile = DEDEDATA.'/mysqli_record_log.inc'; | |||
global $cfg_cookie_encode; | |||
$enkey = substr(md5(substr($cfg_cookie_encode.'dedebiz', 0, 5)), 0, 10); | |||
$RecordLogFile = DEDEDATA.'/mysqli_record_log_'.$enkey.'.inc'; | |||
$url = $this->GetCurUrl(); | |||
$savemsg = <<<EOT | |||
@@ -503,7 +505,9 @@ EOT; | |||
//显示数据链接错误信息 | |||
function DisplayError($msg) | |||
{ | |||
$errorTrackFile = DEDEDATA.'/sqlite_error_trace.inc'; | |||
global $cfg_cookie_encode; | |||
$enkey = substr(md5(substr($cfg_cookie_encode.'dedebiz', 0, 5)), 0, 10); | |||
$errorTrackFile = DEDEDATA.'/sqlite_error_trace_'.$enkey.'.inc'; | |||
if ($this->showError) { | |||
$msg = str_replace(array("\r","\n"),"",addslashes($msg)); | |||
ShowMsg("{$msg}", "javascript:;", -1); | |||
@@ -536,93 +540,4 @@ EOT; | |||
function CopySQLiPoint(&$ndsql) | |||
{ | |||
$GLOBALS['dsqlite'] = $ndsql; | |||
} | |||
//SQL语句过滤程序,由80sec提供,这里作了适当的修改 | |||
if (!function_exists('CheckSql')) { | |||
function CheckSql($db_string, $querytype = 'select') | |||
{ | |||
global $cfg_cookie_encode; | |||
$clean = ''; | |||
$error = ''; | |||
$old_pos = 0; | |||
$pos = -1; | |||
$log_file = DEDEINC.'/../data/'.md5($cfg_cookie_encode).'_safe.txt'; | |||
$userIP = GetIP(); | |||
$getUrl = GetCurUrl(); | |||
//如果是普通查询语句,直接过滤一些特殊语法 | |||
if ($querytype == 'select') { | |||
$notallow1 = "[^0-9a-z@\._-]{1,}(union|sleep|benchmark|load_file|outfile)[^0-9a-z@\.-]{1,}"; | |||
//$notallow2 = "--|/\*"; | |||
if (preg_match("/".$notallow1."/i", $db_string)) { | |||
fputs(fopen($log_file, 'a+'), "$userIP||$getUrl||$db_string||SelectBreak\r\n"); | |||
exit("<span>Safe Alert: Request Error step 1 !</span>"); | |||
} | |||
} | |||
//完整的SQL检查 | |||
while (TRUE) { | |||
$pos = strpos($db_string, '\'', $pos + 1); | |||
if ($pos === FALSE) { | |||
break; | |||
} | |||
$clean .= substr($db_string, $old_pos, $pos - $old_pos); | |||
while (TRUE) { | |||
$pos1 = strpos($db_string, '\'', $pos + 1); | |||
$pos2 = strpos($db_string, '\\', $pos + 1); | |||
if ($pos1 === FALSE) { | |||
break; | |||
} elseif ($pos2 == FALSE || $pos2 > $pos1) { | |||
$pos = $pos1; | |||
break; | |||
} | |||
$pos = $pos2 + 1; | |||
} | |||
$clean .= '$s$'; | |||
$old_pos = $pos + 1; | |||
} | |||
$clean .= substr($db_string, $old_pos); | |||
$clean = trim(strtolower(preg_replace(array('~\s+~s'), array(' '), $clean))); | |||
if ( | |||
strpos($clean, '@') !== FALSE or strpos($clean, 'char(') !== FALSE or strpos($clean, '"') !== FALSE | |||
or strpos($clean, '$s$$s$') !== FALSE | |||
) { | |||
$fail = TRUE; | |||
if (preg_match("#^create table#i", $clean)) $fail = FALSE; | |||
$error = "unusual character"; | |||
} | |||
//老版本的Mysql并不支持union,常用的程序里也不使用union,但是一些黑客使用它,所以检查它 | |||
if (strpos($clean, 'union') !== FALSE && preg_match('~(^|[^a-z])union($|[^[a-z])~s', $clean) != 0) { | |||
$fail = TRUE; | |||
$error = "union detect"; | |||
} | |||
//发布版本的程序可能比较少包括--,#这样的注释,但是黑客经常使用它们 | |||
elseif (strpos($clean, '/*') > 2 || strpos($clean, '--') !== FALSE || strpos($clean, '#') !== FALSE) { | |||
$fail = TRUE; | |||
$error = "comment detect"; | |||
} | |||
//这些函数不会被使用,但是黑客会用它来操作文件,down掉数据库 | |||
elseif (strpos($clean, 'sleep') !== FALSE && preg_match('~(^|[^a-z])sleep($|[^[a-z])~s', $clean) != 0) { | |||
$fail = TRUE; | |||
$error = "slown down detect"; | |||
} elseif (strpos($clean, 'benchmark') !== FALSE && preg_match('~(^|[^a-z])benchmark($|[^[a-z])~s', $clean) != 0) { | |||
$fail = TRUE; | |||
$error = "slown down detect"; | |||
} elseif (strpos($clean, 'load_file') !== FALSE && preg_match('~(^|[^a-z])load_file($|[^[a-z])~s', $clean) != 0) { | |||
$fail = TRUE; | |||
$error = "file fun detect"; | |||
} elseif (strpos($clean, 'into outfile') !== FALSE && preg_match('~(^|[^a-z])into\s+outfile($|[^[a-z])~s', $clean) != 0) { | |||
$fail = TRUE; | |||
$error = "file fun detect"; | |||
} | |||
//老版本的MYSQL不支持子查询,我们的程序里可能也用得少,但是黑客可以使用它来查询数据库敏感信息 | |||
elseif (preg_match('~\([^)]*?select~s', $clean) != 0) { | |||
$fail = TRUE; | |||
$error = "sub select detect"; | |||
} | |||
if (!empty($fail)) { | |||
fputs(fopen($log_file, 'a+'), "$userIP||$getUrl||$db_string||$error\r\n"); | |||
exit("<span>Safe Alert: Request Error step 2!</span>"); | |||
} else { | |||
return $db_string; | |||
} | |||
} | |||
} |