<ruby id="bdb3f"></ruby>

    <p id="bdb3f"><cite id="bdb3f"></cite></p>

      <p id="bdb3f"><cite id="bdb3f"><th id="bdb3f"></th></cite></p><p id="bdb3f"></p>
        <p id="bdb3f"><cite id="bdb3f"></cite></p>

          <pre id="bdb3f"></pre>
          <pre id="bdb3f"><del id="bdb3f"><thead id="bdb3f"></thead></del></pre>

          <ruby id="bdb3f"><mark id="bdb3f"></mark></ruby><ruby id="bdb3f"></ruby>
          <pre id="bdb3f"><pre id="bdb3f"><mark id="bdb3f"></mark></pre></pre><output id="bdb3f"></output><p id="bdb3f"></p><p id="bdb3f"></p>

          <pre id="bdb3f"><del id="bdb3f"><progress id="bdb3f"></progress></del></pre>

                <ruby id="bdb3f"></ruby>

                合規國際互聯網加速 OSASE為企業客戶提供高速穩定SD-WAN國際加速解決方案。 廣告
                **xss 漏洞大致分三種** * 反射型 XSS 漏洞 * 保存(存儲)型 XSS 漏洞 * 基于 DOM 的 XSS 漏洞 審計sql語句主要update insert 更新和插入語句 檢查內容輸入輸出沒有被過濾或者過濾不嚴! 例子 ``` 表 CREATE TABLE `book` ( `id` int(5) NOT NULL auto_increment, `title` varchar(32) NOT NULL, `con` text NOT NULL, PRIMARY KEY (`id`) ) ENGINE=MyISAM DEFAULT CHARSET=gbk AUTO_INCREMENT=1 ; ``` 未過濾的插入sql代碼 ``` <?php mysql_connect('localhost','root',''); mysql_select_db('test'); mysql_query("set names gbk"); if(isset($_POST['submit'])){ $title=$_POST['title']; $con=$_POST['con']; $sql="INSERT INTO `book` (`id` ,`title` ,`con`)VALUES (NULL , '$title', '$con');"; if(mysql_query($sql)){ echo "留言成功"; }else{ echo "留言失敗"; } }else{ $sql="select * from book"; if($row=mysql_query($sql)){ while($rows=mysql_fetch_array($row)){ echo $rows['id'].$rows['title'].$rows['con']."<br>"; } } } ``` xss代碼 ``` <html> <h1>存儲型 xss 漏洞演示</h1> <form action="?action=insert" method="post"> 標題:<input type="text" name="title"><br> 內容:<textarea name="con"> 內容。。。<script><alert(1);</script>。。。內容 </textarea> <input type="submit" name="submit" value="提交"> <form> </html> ``` 防御: htmispecialchars 函數 | 字符 | 替換后 | | --- | --- | | *&*(& 符號) | *\&amp;* | | *"*(雙引號) | *\&quot;*,除非設置了 **`ENT_NOQUOTES`** | | *'*(單引號) | 設置了 **`ENT_QUOTES`**后,*\&#039;* (如果是**`ENT_HTML401`**) ,或者 *\&apos;* (如果是 **`ENT_XML1`** 、 **`ENT_XHTML`** 或 **`ENT_HTML5`**)。 | | *<*(小于) | *\&lt;* | | *\>*(大于) | *\&gt;* |
                  <ruby id="bdb3f"></ruby>

                  <p id="bdb3f"><cite id="bdb3f"></cite></p>

                    <p id="bdb3f"><cite id="bdb3f"><th id="bdb3f"></th></cite></p><p id="bdb3f"></p>
                      <p id="bdb3f"><cite id="bdb3f"></cite></p>

                        <pre id="bdb3f"></pre>
                        <pre id="bdb3f"><del id="bdb3f"><thead id="bdb3f"></thead></del></pre>

                        <ruby id="bdb3f"><mark id="bdb3f"></mark></ruby><ruby id="bdb3f"></ruby>
                        <pre id="bdb3f"><pre id="bdb3f"><mark id="bdb3f"></mark></pre></pre><output id="bdb3f"></output><p id="bdb3f"></p><p id="bdb3f"></p>

                        <pre id="bdb3f"><del id="bdb3f"><progress id="bdb3f"></progress></del></pre>

                              <ruby id="bdb3f"></ruby>

                              哎呀哎呀视频在线观看