背景

前阵子做了几个我的项目,终于开发结束,进入了测试阶段,信念满满将我的项目部署到测试环境,而后做了平安测评之后.....

                 (什么!你居然说我代码不平安???)

而后测出了Xss破绽平安的问题

解决方案

场景:能够在页面输入框输出JS脚本,攻击者能够利用此破绽执行歹意的代码

问题演示


所以咱们要对于前端传输的参数做解决,做对立全局过滤解决

既然要过滤解决,咱们首先须要实现一个自定义过滤器

总共蕴含以下四局部

XssUtil

XssFilterAutoConfig

XssHttpServletRequestWrapper

XssStringfJsonDeserializer

最初咱们须要在全局过滤器中应用咱们实现的Xss自定义过滤器

代码实现

  • XssFilterAtuoConfig实现代码
 import com.fasterxml.jackson.databind.ObjectMapper;import com.fasterxml.jackson.databind.module.SimpleModule;import net.greatsoft.overallbudget.filter.SimpleCORSFilter;import org.springframework.boot.context.embedded.FilterRegistrationBean;import org.springframework.context.annotation.Bean;import org.springframework.context.annotation.Configuration;import org.springframework.context.annotation.Primary;import org.springframework.http.converter.json.Jackson2ObjectMapperBuilder;import org.springframework.http.converter.json.MappingJackson2HttpMessageConverter;/** * Created by wjy on 2020/11/5. * xss 主动配置类 */@Configurationpublic class XssFilterAtuoConfig {    /**     * 注册自定义过滤器     * @return     */    @Bean    public FilterRegistrationBean xssFiltrRegister() {        FilterRegistrationBean registration = new FilterRegistrationBean();        //设置零碎过滤器 (setFilter就是你所定义的过滤器filter类)        registration.setFilter(new SimpleCORSFilter());        //过滤所有门路        registration.addUrlPatterns("/*");        //过滤器名称        registration.setName("XssFilter");        //优先级        registration.setOrder(1);        return registration;    }    /**     *    过滤JSON数据     * @return     */    @Bean    @Primary    public MappingJackson2HttpMessageConverter mappingJackson2HttpMessageConverter() {        SimpleModule module = new SimpleModule();        //自定义序列化过滤配置(XssStringJsonDeserializer), 对入参进行转译        module.addDeserializer(String.class, new XssStringJsonDeserializer());        // 注册解析器        ObjectMapper objectMapper = Jackson2ObjectMapperBuilder.json().build();        objectMapper.registerModule(module);        return new MappingJackson2HttpMessageConverter(objectMapper);    }}

  • XssHttpServletRequestWrapper实现代码
/** * Created by wjy on 2020/11/5. * xss 包装 */public class XssHttpServletRequestWrapper extends HttpServletRequestWrapper {    public XssHttpServletRequestWrapper(HttpServletRequest request) {        super(request);    }    /**     * 对header解决     * @param name     * @return     */    @Override    public String getHeader(String name) {        String value = super.getHeader(name);        return XssUtil.cleanXSS(value);    }    /**     * 对参数解决     * @param name     * @return     */    @Override    public String getParameter(String name) {        String value = super.getParameter(name);        return XssUtil.cleanXSS(value);    }    /**     * 对数值进行解决     * @param name     * @return     */    @Override    public String[] getParameterValues(String name) {        String[] values = super.getParameterValues(name);        if (values != null) {            int length = values.length;            String[] escapseValues = new String[length];            for (int i = 0; i < length; i++) {                escapseValues[i] = XssUtil.cleanXSS(values[i]);            }            return escapseValues;        }        return super.getParameterValues(name);    }    /**     * 次要是针对HandlerMapping.URI_TEMPLATE_VARIABLES_ATTRIBUTE 获取pathvalue的时候把原来的pathvalue通过xss过滤掉     */    @Override    public Object getAttribute(String name) {        // 获取pathvalue的值        if (HandlerMapping.URI_TEMPLATE_VARIABLES_ATTRIBUTE.equals(name)) {            Map uriTemplateVars = (Map) super.getAttribute(HandlerMapping.URI_TEMPLATE_VARIABLES_ATTRIBUTE);            if (Objects.isNull(uriTemplateVars)) {                return uriTemplateVars;            }            Map newMap = new LinkedHashMap<>();            uriTemplateVars.forEach((key, value) -> {                if (value instanceof String) {                    newMap.put(key, XssUtil.cleanXSS((String) value));                } else {                    newMap.put(key, value);                }            });            return newMap;        } else {            return super.getAttribute(name);        }    }} 

  • XssStringJsonDeserializer代码实现
 /** * Created by wjy on 2020/11/5. * 基于xss的JsonDeserializer */public class XssStringJsonDeserializer extends JsonDeserializer<String> {    @Override    public Class<String> handledType() {        return String.class;    }    @Override    public String deserialize(JsonParser jsonParser, DeserializationContext deserializationContext) throws IOException {        return XssUtil.cleanXSS(jsonParser.getValueAsString());    }} 

  • XssUtil代码实现
 /** * Created by wjy on 2020/11/5. * xss工具类 */public class XssUtil {    public static String cleanXSS(String value) {        if (Objects.isNull(value)) {            return value;        }        //在这里自定义须要过滤的字符        value = value.replaceAll("<", "& lt;").replaceAll(">", "& gt;");        value = value.replaceAll("(", "& #40;").replaceAll(")", "& #41;");        value = value.replaceAll("'", "& #39;");        value = value.replaceAll("eval((.*))", "");        value = value.replaceAll("["'][s]*javascript:(.*)["']", """");        value = value.replaceAll("<script>", "");        return value;    }} 

全局过滤器实现
 @Componentpublic class SimpleCORSFilter implements Filter {    @Override    public void doFilter(ServletRequest req, ServletResponse res,            FilterChain chain) throws IOException, ServletException {        // 在这里,应用咱们实现的XSS过滤器        XssHttpServletRequestWrapper request =                new XssHttpServletRequestWrapper((HttpServletRequest) req);        HttpServletResponse response = (HttpServletResponse) res;        response.setHeader("Access-Control-Allow-Origin", "*");        response.setHeader("Access-Control-Allow-Methods",                "POST, GET, PUT, OPTIONS, DELETE");        response.setHeader("Access-Control-Max-Age", "3600");        response.setHeader("Access-Control-Allow-Headers",                "Origin, X-Requested-With, Content-Type, Accept, token");                chain.doFilter(request, response);            }    public void init(FilterConfig filterConfig) {    }    public void destroy() {    }} 

好了,以上就是对Xss破绽的解决

看完如果对你有帮忙,看到右下角的 “一键三连” 了吗,没错点它[哈哈]