├── .gitignore ├── JavaWeb-Secure-Coding.postman_collection.json ├── README.md ├── mvnw ├── mvnw.cmd ├── pom.xml └── src └── main ├── java └── org │ └── javaweb │ └── code │ ├── config │ ├── JPAConfig.java │ └── JavaWebCodeApplication.java │ ├── controller │ ├── CMDController.java │ ├── ExpressionController.java │ ├── SQLInjectionController.java │ ├── SSRFController.java │ ├── SSTIController.java │ ├── XPathController.java │ └── XXEController.java │ ├── entity │ └── SysUser.java │ ├── mapper │ └── SysUserMapper.java │ └── repository │ ├── SysUserCustomRepository.java │ ├── SysUserRepository.java │ └── impl │ └── SysUserCustomRepositoryImpl.java └── resources ├── application.properties ├── javaweb-bbs.db ├── mapper └── SysUser.xml └── static └── xxe.xml /.gitignore: -------------------------------------------------------------------------------- 1 | HELP.md 2 | target/ 3 | !.mvn/wrapper/maven-wrapper.jar 4 | !**/src/main/**/target/ 5 | !**/src/test/**/target/ 6 | 7 | ### STS ### 8 | .apt_generated 9 | .classpath 10 | .factorypath 11 | .project 12 | .settings 13 | .springBeans 14 | .sts4-cache 15 | 16 | ### IntelliJ IDEA ### 17 | .idea 18 | *.iws 19 | *.iml 20 | *.ipr 21 | 22 | ### NetBeans ### 23 | /nbproject/private/ 24 | /nbbuild/ 25 | /dist/ 26 | /nbdist/ 27 | /.nb-gradle/ 28 | build/ 29 | !**/src/main/**/build/ 30 | !**/src/test/**/build/ 31 | 32 | ### VS Code ### 33 | .vscode/ 34 | 35 | .mvn -------------------------------------------------------------------------------- /JavaWeb-Secure-Coding.postman_collection.json: -------------------------------------------------------------------------------- 1 | { 2 | "info": { 3 | "_postman_id": "f2a21800-535d-4f1b-a79d-6606c9d0be80", 4 | "name": "JavaWeb-Secure-Coding", 5 | "schema": "https://schema.getpostman.com/json/collection/v2.1.0/collection.json", 6 | "_exporter_id": "21653536" 7 | }, 8 | "item": [ 9 | { 10 | "name": "SQL", 11 | "item": [ 12 | { 13 | "name": "MyBatis", 14 | "item": [ 15 | { 16 | "name": "mybatisStringQuery", 17 | "request": { 18 | "method": "GET", 19 | "header": [], 20 | "url": { 21 | "raw": "http://{{base_url}}/SQL/Mybatis/mybatisStringQuery.do?username=admin", 22 | "protocol": "http", 23 | "host": [ 24 | "{{base_url}}" 25 | ], 26 | "path": [ 27 | "SQL", 28 | "Mybatis", 29 | "mybatisStringQuery.do" 30 | ], 31 | "query": [ 32 | { 33 | "key": "username", 34 | "value": "admin" 35 | } 36 | ] 37 | } 38 | }, 39 | "response": [] 40 | }, 41 | { 42 | "name": "mybatisStringInjection", 43 | "request": { 44 | "method": "GET", 45 | "header": [], 46 | "url": { 47 | "raw": "http://{{base_url}}/SQL/Mybatis/mybatisStringInjection.do?username=admin", 48 | "protocol": "http", 49 | "host": [ 50 | "{{base_url}}" 51 | ], 52 | "path": [ 53 | "SQL", 54 | "Mybatis", 55 | "mybatisStringInjection.do" 56 | ], 57 | "query": [ 58 | { 59 | "key": "username", 60 | "value": "admin" 61 | } 62 | ] 63 | } 64 | }, 65 | "response": [] 66 | }, 67 | { 68 | "name": "mybatisLikeQuery", 69 | "request": { 70 | "method": "GET", 71 | "header": [], 72 | "url": { 73 | "raw": "http://{{base_url}}/SQL/Mybatis/mybatisLikeQuery.do?username=a", 74 | "protocol": "http", 75 | "host": [ 76 | "{{base_url}}" 77 | ], 78 | "path": [ 79 | "SQL", 80 | "Mybatis", 81 | "mybatisLikeQuery.do" 82 | ], 83 | "query": [ 84 | { 85 | "key": "username", 86 | "value": "a" 87 | } 88 | ] 89 | } 90 | }, 91 | "response": [] 92 | }, 93 | { 94 | "name": "mybatisLikeInjection", 95 | "request": { 96 | "method": "GET", 97 | "header": [], 98 | "url": { 99 | "raw": "http://{{base_url}}/SQL/Mybatis/mybatisLikeInjection.do?username=a", 100 | "protocol": "http", 101 | "host": [ 102 | "{{base_url}}" 103 | ], 104 | "path": [ 105 | "SQL", 106 | "Mybatis", 107 | "mybatisLikeInjection.do" 108 | ], 109 | "query": [ 110 | { 111 | "key": "username", 112 | "value": "a" 113 | } 114 | ] 115 | } 116 | }, 117 | "response": [] 118 | }, 119 | { 120 | "name": "mybatisWhereInQuery", 121 | "request": { 122 | "method": "GET", 123 | "header": [], 124 | "url": { 125 | "raw": "http://{{base_url}}/SQL/Mybatis/mybatisWhereInQuery.do?ids=1,2", 126 | "protocol": "http", 127 | "host": [ 128 | "{{base_url}}" 129 | ], 130 | "path": [ 131 | "SQL", 132 | "Mybatis", 133 | "mybatisWhereInQuery.do" 134 | ], 135 | "query": [ 136 | { 137 | "key": "ids", 138 | "value": "1,2" 139 | } 140 | ] 141 | } 142 | }, 143 | "response": [] 144 | }, 145 | { 146 | "name": "mybatisWhereInInjection", 147 | "request": { 148 | "method": "GET", 149 | "header": [], 150 | "url": { 151 | "raw": "http://{{base_url}}/SQL/Mybatis/mybatisWhereInInjection.do?ids=1,2", 152 | "protocol": "http", 153 | "host": [ 154 | "{{base_url}}" 155 | ], 156 | "path": [ 157 | "SQL", 158 | "Mybatis", 159 | "mybatisWhereInInjection.do" 160 | ], 161 | "query": [ 162 | { 163 | "key": "ids", 164 | "value": "1,2" 165 | } 166 | ] 167 | } 168 | }, 169 | "response": [] 170 | }, 171 | { 172 | "name": "mybatisOrderByQuery", 173 | "request": { 174 | "method": "GET", 175 | "header": [], 176 | "url": { 177 | "raw": "http://{{base_url}}/SQL/Mybatis/mybatisOrderByQuery.do?order=id&orderType=desc", 178 | "protocol": "http", 179 | "host": [ 180 | "{{base_url}}" 181 | ], 182 | "path": [ 183 | "SQL", 184 | "Mybatis", 185 | "mybatisOrderByQuery.do" 186 | ], 187 | "query": [ 188 | { 189 | "key": "order", 190 | "value": "id" 191 | }, 192 | { 193 | "key": "orderType", 194 | "value": "desc" 195 | } 196 | ] 197 | } 198 | }, 199 | "response": [] 200 | }, 201 | { 202 | "name": "mybatisOrderByInjection", 203 | "request": { 204 | "method": "GET", 205 | "header": [], 206 | "url": { 207 | "raw": "http://{{base_url}}/SQL/Mybatis/mybatisOrderByInjection.do?order=id&orderType=desc", 208 | "protocol": "http", 209 | "host": [ 210 | "{{base_url}}" 211 | ], 212 | "path": [ 213 | "SQL", 214 | "Mybatis", 215 | "mybatisOrderByInjection.do" 216 | ], 217 | "query": [ 218 | { 219 | "key": "order", 220 | "value": "id" 221 | }, 222 | { 223 | "key": "orderType", 224 | "value": "desc" 225 | } 226 | ] 227 | } 228 | }, 229 | "response": [] 230 | } 231 | ] 232 | }, 233 | { 234 | "name": "Spring", 235 | "item": [ 236 | { 237 | "name": "jdbcTemplateSQLInjectionTest", 238 | "request": { 239 | "method": "GET", 240 | "header": [], 241 | "url": { 242 | "raw": "http://{{base_url}}/SQL/Spring/jdbcTemplateStringInjection.do?username=admin' and 1=2 union select 1,2,sqlite_version(),4,5,6,'7", 243 | "protocol": "http", 244 | "host": [ 245 | "{{base_url}}" 246 | ], 247 | "path": [ 248 | "SQL", 249 | "Spring", 250 | "jdbcTemplateStringInjection.do" 251 | ], 252 | "query": [ 253 | { 254 | "key": "username", 255 | "value": "admin' and 1=2 union select 1,2,sqlite_version(),4,5,6,'7" 256 | } 257 | ] 258 | } 259 | }, 260 | "response": [] 261 | }, 262 | { 263 | "name": "jdbcTemplateStringInjection", 264 | "request": { 265 | "method": "GET", 266 | "header": [], 267 | "url": { 268 | "raw": "http://{{base_url}}/SQL/Spring/jdbcTemplateStringInjection.do?username=admin", 269 | "protocol": "http", 270 | "host": [ 271 | "{{base_url}}" 272 | ], 273 | "path": [ 274 | "SQL", 275 | "Spring", 276 | "jdbcTemplateStringInjection.do" 277 | ], 278 | "query": [ 279 | { 280 | "key": "username", 281 | "value": "admin" 282 | } 283 | ] 284 | } 285 | }, 286 | "response": [] 287 | }, 288 | { 289 | "name": "jdbcTemplateStringQuery", 290 | "request": { 291 | "method": "GET", 292 | "header": [], 293 | "url": { 294 | "raw": "http://{{base_url}}/SQL/Spring/jdbcTemplateStringQuery.do?username=admin", 295 | "protocol": "http", 296 | "host": [ 297 | "{{base_url}}" 298 | ], 299 | "path": [ 300 | "SQL", 301 | "Spring", 302 | "jdbcTemplateStringQuery.do" 303 | ], 304 | "query": [ 305 | { 306 | "key": "username", 307 | "value": "admin" 308 | } 309 | ] 310 | } 311 | }, 312 | "response": [] 313 | }, 314 | { 315 | "name": "jdbcTemplateLikeQuery", 316 | "request": { 317 | "method": "GET", 318 | "header": [], 319 | "url": { 320 | "raw": "http://{{base_url}}/SQL/Spring/jdbcTemplateLikeQuery.do?username=a", 321 | "protocol": "http", 322 | "host": [ 323 | "{{base_url}}" 324 | ], 325 | "path": [ 326 | "SQL", 327 | "Spring", 328 | "jdbcTemplateLikeQuery.do" 329 | ], 330 | "query": [ 331 | { 332 | "key": "username", 333 | "value": "a" 334 | } 335 | ] 336 | } 337 | }, 338 | "response": [] 339 | }, 340 | { 341 | "name": "jdbcTemplateLikeInjection", 342 | "request": { 343 | "method": "GET", 344 | "header": [], 345 | "url": { 346 | "raw": "http://{{base_url}}/SQL/Spring/jdbcTemplateLikeInjection.do?username=a", 347 | "protocol": "http", 348 | "host": [ 349 | "{{base_url}}" 350 | ], 351 | "path": [ 352 | "SQL", 353 | "Spring", 354 | "jdbcTemplateLikeInjection.do" 355 | ], 356 | "query": [ 357 | { 358 | "key": "username", 359 | "value": "a" 360 | } 361 | ] 362 | } 363 | }, 364 | "response": [] 365 | }, 366 | { 367 | "name": "jdbcTemplateOrderByQuery", 368 | "request": { 369 | "method": "GET", 370 | "header": [], 371 | "url": { 372 | "raw": "http://{{base_url}}/SQL/Spring/jdbcTemplateOrderByQuery.do?order=id&orderType=desc", 373 | "protocol": "http", 374 | "host": [ 375 | "{{base_url}}" 376 | ], 377 | "path": [ 378 | "SQL", 379 | "Spring", 380 | "jdbcTemplateOrderByQuery.do" 381 | ], 382 | "query": [ 383 | { 384 | "key": "order", 385 | "value": "id" 386 | }, 387 | { 388 | "key": "orderType", 389 | "value": "desc" 390 | } 391 | ] 392 | } 393 | }, 394 | "response": [] 395 | }, 396 | { 397 | "name": "jdbcTemplateOrderByInjection", 398 | "request": { 399 | "method": "GET", 400 | "header": [], 401 | "url": { 402 | "raw": "http://{{base_url}}/SQL/Spring/jdbcTemplateOrderByInjection.do?order=id&orderType=desc", 403 | "protocol": "http", 404 | "host": [ 405 | "{{base_url}}" 406 | ], 407 | "path": [ 408 | "SQL", 409 | "Spring", 410 | "jdbcTemplateOrderByInjection.do" 411 | ], 412 | "query": [ 413 | { 414 | "key": "order", 415 | "value": "id" 416 | }, 417 | { 418 | "key": "orderType", 419 | "value": "desc" 420 | } 421 | ] 422 | } 423 | }, 424 | "response": [] 425 | }, 426 | { 427 | "name": "jdbcTemplateOrderByAppendQuery", 428 | "request": { 429 | "method": "GET", 430 | "header": [], 431 | "url": { 432 | "raw": "http://{{base_url}}/SQL/Spring/jdbcTemplateOrderByAppendQuery.do?order=id&orderType=desc", 433 | "protocol": "http", 434 | "host": [ 435 | "{{base_url}}" 436 | ], 437 | "path": [ 438 | "SQL", 439 | "Spring", 440 | "jdbcTemplateOrderByAppendQuery.do" 441 | ], 442 | "query": [ 443 | { 444 | "key": "order", 445 | "value": "id" 446 | }, 447 | { 448 | "key": "orderType", 449 | "value": "desc" 450 | } 451 | ] 452 | } 453 | }, 454 | "response": [] 455 | }, 456 | { 457 | "name": "jdbcTemplateWhereInQuery", 458 | "request": { 459 | "method": "GET", 460 | "header": [], 461 | "url": { 462 | "raw": "http://{{base_url}}/SQL/Spring/jdbcTemplateWhereInQuery.do?ids=1", 463 | "protocol": "http", 464 | "host": [ 465 | "{{base_url}}" 466 | ], 467 | "path": [ 468 | "SQL", 469 | "Spring", 470 | "jdbcTemplateWhereInQuery.do" 471 | ], 472 | "query": [ 473 | { 474 | "key": "ids", 475 | "value": "1" 476 | } 477 | ] 478 | } 479 | }, 480 | "response": [] 481 | }, 482 | { 483 | "name": "jdbcTemplateWhereInInjection", 484 | "request": { 485 | "method": "GET", 486 | "header": [], 487 | "url": { 488 | "raw": "http://{{base_url}}/SQL/Spring/jdbcTemplateWhereInInjection.do?ids=1", 489 | "protocol": "http", 490 | "host": [ 491 | "{{base_url}}" 492 | ], 493 | "path": [ 494 | "SQL", 495 | "Spring", 496 | "jdbcTemplateWhereInInjection.do" 497 | ], 498 | "query": [ 499 | { 500 | "key": "ids", 501 | "value": "1" 502 | } 503 | ] 504 | } 505 | }, 506 | "response": [] 507 | } 508 | ] 509 | }, 510 | { 511 | "name": "JDBC", 512 | "item": [ 513 | { 514 | "name": "findById", 515 | "request": { 516 | "method": "GET", 517 | "header": [], 518 | "url": { 519 | "raw": "http://{{base_url}}/JDBC/findById.do?id=1", 520 | "protocol": "http", 521 | "host": [ 522 | "{{base_url}}" 523 | ], 524 | "path": [ 525 | "JDBC", 526 | "findById.do" 527 | ], 528 | "query": [ 529 | { 530 | "key": "id", 531 | "value": "1" 532 | } 533 | ] 534 | } 535 | }, 536 | "response": [] 537 | }, 538 | { 539 | "name": "findSysUserById", 540 | "request": { 541 | "method": "GET", 542 | "header": [], 543 | "url": { 544 | "raw": "http://{{base_url}}/JDBC/findSysUserById.do?id=1", 545 | "protocol": "http", 546 | "host": [ 547 | "{{base_url}}" 548 | ], 549 | "path": [ 550 | "JDBC", 551 | "findSysUserById.do" 552 | ], 553 | "query": [ 554 | { 555 | "key": "id", 556 | "value": "1" 557 | } 558 | ] 559 | } 560 | }, 561 | "response": [] 562 | } 563 | ] 564 | }, 565 | { 566 | "name": "JPA", 567 | "item": [ 568 | { 569 | "name": "jpaWhereInQuery", 570 | "request": { 571 | "method": "GET", 572 | "header": [], 573 | "url": { 574 | "raw": "http://{{base_url}}/SQL/JPA/jpaWhereInQuery.do?users=root&users=admin", 575 | "protocol": "http", 576 | "host": [ 577 | "{{base_url}}" 578 | ], 579 | "path": [ 580 | "SQL", 581 | "JPA", 582 | "jpaWhereInQuery.do" 583 | ], 584 | "query": [ 585 | { 586 | "key": "users", 587 | "value": "root" 588 | }, 589 | { 590 | "key": "users", 591 | "value": "admin" 592 | } 593 | ] 594 | } 595 | }, 596 | "response": [] 597 | }, 598 | { 599 | "name": "jpaLikeQuery", 600 | "request": { 601 | "method": "GET", 602 | "header": [], 603 | "url": { 604 | "raw": "http://{{base_url}}/SQL/JPA/jpaLikeQuery.do?username=root", 605 | "protocol": "http", 606 | "host": [ 607 | "{{base_url}}" 608 | ], 609 | "path": [ 610 | "SQL", 611 | "JPA", 612 | "jpaLikeQuery.do" 613 | ], 614 | "query": [ 615 | { 616 | "key": "username", 617 | "value": "root" 618 | } 619 | ] 620 | } 621 | }, 622 | "response": [] 623 | }, 624 | { 625 | "name": "jpaLikeAndOrderByQuery", 626 | "request": { 627 | "method": "GET", 628 | "header": [], 629 | "url": { 630 | "raw": "http://{{base_url}}/SQL/JPA/jpaLikeAndOrderByQuery.do?username=a", 631 | "protocol": "http", 632 | "host": [ 633 | "{{base_url}}" 634 | ], 635 | "path": [ 636 | "SQL", 637 | "JPA", 638 | "jpaLikeAndOrderByQuery.do" 639 | ], 640 | "query": [ 641 | { 642 | "key": "username", 643 | "value": "a" 644 | } 645 | ] 646 | } 647 | }, 648 | "response": [] 649 | }, 650 | { 651 | "name": "jpaUsernameBindTest", 652 | "request": { 653 | "method": "GET", 654 | "header": [], 655 | "url": { 656 | "raw": "http://{{base_url}}/SQL/JPA/jpaUsernameBindTest.do?username=admin", 657 | "protocol": "http", 658 | "host": [ 659 | "{{base_url}}" 660 | ], 661 | "path": [ 662 | "SQL", 663 | "JPA", 664 | "jpaUsernameBindTest.do" 665 | ], 666 | "query": [ 667 | { 668 | "key": "username", 669 | "value": "admin" 670 | } 671 | ] 672 | } 673 | }, 674 | "response": [] 675 | }, 676 | { 677 | "name": "jpaEmailBindTest", 678 | "request": { 679 | "method": "GET", 680 | "header": [], 681 | "url": { 682 | "raw": "http://{{base_url}}/SQL/JPA/jpaEmailBindTest.do?username=admin@baidu.com", 683 | "protocol": "http", 684 | "host": [ 685 | "{{base_url}}" 686 | ], 687 | "path": [ 688 | "SQL", 689 | "JPA", 690 | "jpaEmailBindTest.do" 691 | ], 692 | "query": [ 693 | { 694 | "key": "username", 695 | "value": "admin@baidu.com" 696 | } 697 | ] 698 | } 699 | }, 700 | "response": [] 701 | }, 702 | { 703 | "name": "jpaIdBindTest", 704 | "request": { 705 | "method": "GET", 706 | "header": [], 707 | "url": { 708 | "raw": "http://{{base_url}}/SQL/JPA/jpaIdBindTest.do?id=1", 709 | "protocol": "http", 710 | "host": [ 711 | "{{base_url}}" 712 | ], 713 | "path": [ 714 | "SQL", 715 | "JPA", 716 | "jpaIdBindTest.do" 717 | ], 718 | "query": [ 719 | { 720 | "key": "id", 721 | "value": "1" 722 | } 723 | ] 724 | } 725 | }, 726 | "response": [] 727 | }, 728 | { 729 | "name": "jpqlQuery", 730 | "request": { 731 | "method": "GET", 732 | "header": [], 733 | "url": { 734 | "raw": "http://{{base_url}}/SQL/JPA/jpqlQuery.do?username=admin", 735 | "protocol": "http", 736 | "host": [ 737 | "{{base_url}}" 738 | ], 739 | "path": [ 740 | "SQL", 741 | "JPA", 742 | "jpqlQuery.do" 743 | ], 744 | "query": [ 745 | { 746 | "key": "username", 747 | "value": "admin" 748 | } 749 | ] 750 | } 751 | }, 752 | "response": [] 753 | }, 754 | { 755 | "name": "jpqlInjection", 756 | "request": { 757 | "method": "GET", 758 | "header": [], 759 | "url": { 760 | "raw": "http://{{base_url}}/SQL/JPA/jpqlInjection.do?username=admin", 761 | "protocol": "http", 762 | "host": [ 763 | "{{base_url}}" 764 | ], 765 | "path": [ 766 | "SQL", 767 | "JPA", 768 | "jpqlInjection.do" 769 | ], 770 | "query": [ 771 | { 772 | "key": "username", 773 | "value": "admin" 774 | } 775 | ] 776 | } 777 | }, 778 | "response": [] 779 | }, 780 | { 781 | "name": "nativeQuery", 782 | "request": { 783 | "method": "GET", 784 | "header": [], 785 | "url": { 786 | "raw": "http://{{base_url}}/SQL/JPA/nativeQuery.do?username=admin", 787 | "protocol": "http", 788 | "host": [ 789 | "{{base_url}}" 790 | ], 791 | "path": [ 792 | "SQL", 793 | "JPA", 794 | "nativeQuery.do" 795 | ], 796 | "query": [ 797 | { 798 | "key": "username", 799 | "value": "admin" 800 | } 801 | ] 802 | } 803 | }, 804 | "response": [] 805 | }, 806 | { 807 | "name": "nativeInjection", 808 | "request": { 809 | "method": "GET", 810 | "header": [], 811 | "url": { 812 | "raw": "http://{{base_url}}/SQL/JPA/nativeInjection.do?username=admin", 813 | "protocol": "http", 814 | "host": [ 815 | "{{base_url}}" 816 | ], 817 | "path": [ 818 | "SQL", 819 | "JPA", 820 | "nativeInjection.do" 821 | ], 822 | "query": [ 823 | { 824 | "key": "username", 825 | "value": "admin" 826 | } 827 | ] 828 | } 829 | }, 830 | "response": [] 831 | }, 832 | { 833 | "name": "namedQuery", 834 | "request": { 835 | "method": "GET", 836 | "header": [], 837 | "url": { 838 | "raw": "http://{{base_url}}/SQL/JPA/namedQuery.do?username=admin", 839 | "protocol": "http", 840 | "host": [ 841 | "{{base_url}}" 842 | ], 843 | "path": [ 844 | "SQL", 845 | "JPA", 846 | "namedQuery.do" 847 | ], 848 | "query": [ 849 | { 850 | "key": "username", 851 | "value": "admin" 852 | } 853 | ] 854 | } 855 | }, 856 | "response": [] 857 | }, 858 | { 859 | "name": "criteriaQuery", 860 | "request": { 861 | "method": "GET", 862 | "header": [], 863 | "url": { 864 | "raw": "http://{{base_url}}/SQL/JPA/criteriaQuery.do?email=admin@baidu.com", 865 | "protocol": "http", 866 | "host": [ 867 | "{{base_url}}" 868 | ], 869 | "path": [ 870 | "SQL", 871 | "JPA", 872 | "criteriaQuery.do" 873 | ], 874 | "query": [ 875 | { 876 | "key": "email", 877 | "value": "admin@baidu.com" 878 | } 879 | ] 880 | } 881 | }, 882 | "response": [] 883 | } 884 | ] 885 | } 886 | ] 887 | }, 888 | { 889 | "name": "SSRF", 890 | "item": [ 891 | { 892 | "name": "urlConnection", 893 | "request": { 894 | "method": "GET", 895 | "header": [], 896 | "url": { 897 | "raw": "http://{{base_url}}/SSRF/urlConnection.do?url=https://www.baidu.com", 898 | "protocol": "http", 899 | "host": [ 900 | "{{base_url}}" 901 | ], 902 | "path": [ 903 | "SSRF", 904 | "urlConnection.do" 905 | ], 906 | "query": [ 907 | { 908 | "key": "url", 909 | "value": "https://www.baidu.com" 910 | } 911 | ] 912 | } 913 | }, 914 | "response": [] 915 | }, 916 | { 917 | "name": "urlFilterConnection", 918 | "request": { 919 | "method": "GET", 920 | "header": [], 921 | "url": { 922 | "raw": "http://{{base_url}}/SSRF/urlFilterConnection.do?url=https://www.baidu.com", 923 | "protocol": "http", 924 | "host": [ 925 | "{{base_url}}" 926 | ], 927 | "path": [ 928 | "SSRF", 929 | "urlFilterConnection.do" 930 | ], 931 | "query": [ 932 | { 933 | "key": "url", 934 | "value": "https://www.baidu.com" 935 | } 936 | ] 937 | } 938 | }, 939 | "response": [] 940 | } 941 | ] 942 | }, 943 | { 944 | "name": "XXE", 945 | "item": [ 946 | { 947 | "name": "dom4jSAXReaderXXE", 948 | "request": { 949 | "method": "POST", 950 | "header": [], 951 | "body": { 952 | "mode": "raw", 953 | "raw": "\r\n \r\n \r\n \r\n \r\n]>\r\n
\r\n &content;&end;\r\n
", 954 | "options": { 955 | "raw": { 956 | "language": "xml" 957 | } 958 | } 959 | }, 960 | "url": { 961 | "raw": "http://{{base_url}}/XXE/dom4jSAXReaderXXE.do", 962 | "protocol": "http", 963 | "host": [ 964 | "{{base_url}}" 965 | ], 966 | "path": [ 967 | "XXE", 968 | "dom4jSAXReaderXXE.do" 969 | ] 970 | } 971 | }, 972 | "response": [] 973 | }, 974 | { 975 | "name": "dom4jSAXReader", 976 | "request": { 977 | "method": "POST", 978 | "header": [], 979 | "body": { 980 | "mode": "raw", 981 | "raw": "\r\n \r\n \r\n \r\n \r\n]>\r\n
\r\n &content;&end;\r\n
", 982 | "options": { 983 | "raw": { 984 | "language": "xml" 985 | } 986 | } 987 | }, 988 | "url": { 989 | "raw": "http://{{base_url}}/XXE/dom4jSAXReader.do", 990 | "protocol": "http", 991 | "host": [ 992 | "{{base_url}}" 993 | ], 994 | "path": [ 995 | "XXE", 996 | "dom4jSAXReader.do" 997 | ] 998 | } 999 | }, 1000 | "response": [] 1001 | }, 1002 | { 1003 | "name": "jaxpSAXParserFactoryXXE", 1004 | "request": { 1005 | "method": "POST", 1006 | "header": [], 1007 | "body": { 1008 | "mode": "raw", 1009 | "raw": "\r\n \r\n \r\n \r\n \r\n]>\r\n
\r\n &content;&end;\r\n
", 1010 | "options": { 1011 | "raw": { 1012 | "language": "xml" 1013 | } 1014 | } 1015 | }, 1016 | "url": { 1017 | "raw": "http://{{base_url}}/XXE/jaxpSAXParserFactoryXXE.do", 1018 | "protocol": "http", 1019 | "host": [ 1020 | "{{base_url}}" 1021 | ], 1022 | "path": [ 1023 | "XXE", 1024 | "jaxpSAXParserFactoryXXE.do" 1025 | ] 1026 | } 1027 | }, 1028 | "response": [] 1029 | }, 1030 | { 1031 | "name": "jaxpSAXParserFactory", 1032 | "request": { 1033 | "method": "POST", 1034 | "header": [], 1035 | "body": { 1036 | "mode": "raw", 1037 | "raw": "\r\n \r\n \r\n \r\n \r\n]>\r\n
\r\n &content;&end;\r\n
", 1038 | "options": { 1039 | "raw": { 1040 | "language": "xml" 1041 | } 1042 | } 1043 | }, 1044 | "url": { 1045 | "raw": "http://{{base_url}}/XXE/jaxpSAXParserFactory.do", 1046 | "protocol": "http", 1047 | "host": [ 1048 | "{{base_url}}" 1049 | ], 1050 | "path": [ 1051 | "XXE", 1052 | "jaxpSAXParserFactory.do" 1053 | ] 1054 | } 1055 | }, 1056 | "response": [] 1057 | }, 1058 | { 1059 | "name": "saxBuilderXXE", 1060 | "request": { 1061 | "method": "POST", 1062 | "header": [], 1063 | "body": { 1064 | "mode": "raw", 1065 | "raw": "\r\n \r\n \r\n \r\n \r\n]>\r\n
\r\n &content;&end;\r\n
", 1066 | "options": { 1067 | "raw": { 1068 | "language": "xml" 1069 | } 1070 | } 1071 | }, 1072 | "url": { 1073 | "raw": "http://{{base_url}}/XXE/saxBuilderXXE.do", 1074 | "protocol": "http", 1075 | "host": [ 1076 | "{{base_url}}" 1077 | ], 1078 | "path": [ 1079 | "XXE", 1080 | "saxBuilderXXE.do" 1081 | ] 1082 | } 1083 | }, 1084 | "response": [] 1085 | }, 1086 | { 1087 | "name": "saxBuilder", 1088 | "request": { 1089 | "method": "POST", 1090 | "header": [], 1091 | "body": { 1092 | "mode": "raw", 1093 | "raw": "\r\n \r\n \r\n \r\n \r\n]>\r\n
\r\n &content;&end;\r\n
", 1094 | "options": { 1095 | "raw": { 1096 | "language": "xml" 1097 | } 1098 | } 1099 | }, 1100 | "url": { 1101 | "raw": "http://{{base_url}}/XXE/saxBuilder.do", 1102 | "protocol": "http", 1103 | "host": [ 1104 | "{{base_url}}" 1105 | ], 1106 | "path": [ 1107 | "XXE", 1108 | "saxBuilder.do" 1109 | ] 1110 | } 1111 | }, 1112 | "response": [] 1113 | }, 1114 | { 1115 | "name": "xmlReaderXXE", 1116 | "request": { 1117 | "method": "POST", 1118 | "header": [], 1119 | "body": { 1120 | "mode": "raw", 1121 | "raw": "\r\n \r\n \r\n \r\n \r\n]>\r\n
\r\n &content;&end;\r\n
", 1122 | "options": { 1123 | "raw": { 1124 | "language": "xml" 1125 | } 1126 | } 1127 | }, 1128 | "url": { 1129 | "raw": "http://{{base_url}}/XXE/xmlReaderXXE.do", 1130 | "protocol": "http", 1131 | "host": [ 1132 | "{{base_url}}" 1133 | ], 1134 | "path": [ 1135 | "XXE", 1136 | "xmlReaderXXE.do" 1137 | ] 1138 | } 1139 | }, 1140 | "response": [] 1141 | }, 1142 | { 1143 | "name": "documentBuilderFactoryXXE", 1144 | "request": { 1145 | "method": "POST", 1146 | "header": [], 1147 | "body": { 1148 | "mode": "raw", 1149 | "raw": "\r\n \r\n \r\n \r\n \r\n]>\r\n
\r\n &content;&end;\r\n
", 1150 | "options": { 1151 | "raw": { 1152 | "language": "xml" 1153 | } 1154 | } 1155 | }, 1156 | "url": { 1157 | "raw": "http://{{base_url}}/XXE/documentBuilderFactoryXXE.do", 1158 | "protocol": "http", 1159 | "host": [ 1160 | "{{base_url}}" 1161 | ], 1162 | "path": [ 1163 | "XXE", 1164 | "documentBuilderFactoryXXE.do" 1165 | ] 1166 | } 1167 | }, 1168 | "response": [] 1169 | }, 1170 | { 1171 | "name": "documentBuilderFactory", 1172 | "request": { 1173 | "method": "POST", 1174 | "header": [], 1175 | "body": { 1176 | "mode": "raw", 1177 | "raw": "\r\n \r\n \r\n \r\n \r\n]>\r\n
\r\n &content;&end;\r\n
", 1178 | "options": { 1179 | "raw": { 1180 | "language": "xml" 1181 | } 1182 | } 1183 | }, 1184 | "url": { 1185 | "raw": "http://{{base_url}}/XXE/documentBuilderFactory.do", 1186 | "protocol": "http", 1187 | "host": [ 1188 | "{{base_url}}" 1189 | ], 1190 | "path": [ 1191 | "XXE", 1192 | "documentBuilderFactory.do" 1193 | ] 1194 | } 1195 | }, 1196 | "response": [] 1197 | }, 1198 | { 1199 | "name": "jaxbContext", 1200 | "request": { 1201 | "method": "POST", 1202 | "header": [], 1203 | "body": { 1204 | "mode": "raw", 1205 | "raw": "\r\n
\r\n 1\r\n
", 1206 | "options": { 1207 | "raw": { 1208 | "language": "xml" 1209 | } 1210 | } 1211 | }, 1212 | "url": { 1213 | "raw": "http://{{base_url}}/XXE/jaxbContext.do", 1214 | "protocol": "http", 1215 | "host": [ 1216 | "{{base_url}}" 1217 | ], 1218 | "path": [ 1219 | "XXE", 1220 | "jaxbContext.do" 1221 | ] 1222 | } 1223 | }, 1224 | "response": [] 1225 | } 1226 | ] 1227 | }, 1228 | { 1229 | "name": "XPath", 1230 | "item": [ 1231 | { 1232 | "name": "xpathInjection", 1233 | "request": { 1234 | "method": "GET", 1235 | "header": [], 1236 | "url": { 1237 | "raw": "http://{{base_url}}/XPath/xpathInjection.do?username=admin' or '", 1238 | "protocol": "http", 1239 | "host": [ 1240 | "{{base_url}}" 1241 | ], 1242 | "path": [ 1243 | "XPath", 1244 | "xpathInjection.do" 1245 | ], 1246 | "query": [ 1247 | { 1248 | "key": "username", 1249 | "value": "admin' or '" 1250 | } 1251 | ] 1252 | } 1253 | }, 1254 | "response": [] 1255 | }, 1256 | { 1257 | "name": "xpathQuery", 1258 | "request": { 1259 | "method": "GET", 1260 | "header": [], 1261 | "url": { 1262 | "raw": "http://{{base_url}}/XPath/xpathQuery.do?username=admin&password=admin123", 1263 | "protocol": "http", 1264 | "host": [ 1265 | "{{base_url}}" 1266 | ], 1267 | "path": [ 1268 | "XPath", 1269 | "xpathQuery.do" 1270 | ], 1271 | "query": [ 1272 | { 1273 | "key": "username", 1274 | "value": "admin" 1275 | }, 1276 | { 1277 | "key": "password", 1278 | "value": "admin123" 1279 | } 1280 | ] 1281 | } 1282 | }, 1283 | "response": [] 1284 | } 1285 | ] 1286 | }, 1287 | { 1288 | "name": "Expression", 1289 | "item": [ 1290 | { 1291 | "name": "Ognl", 1292 | "request": { 1293 | "method": "GET", 1294 | "header": [], 1295 | "url": { 1296 | "raw": "http://{{base_url}}/Expression/ognl.do?exp=@java.lang.Runtime@getRuntime().exec('calc')", 1297 | "protocol": "http", 1298 | "host": [ 1299 | "{{base_url}}" 1300 | ], 1301 | "path": [ 1302 | "Expression", 1303 | "ognl.do" 1304 | ], 1305 | "query": [ 1306 | { 1307 | "key": "exp", 1308 | "value": "@java.lang.Runtime@getRuntime().exec('calc')" 1309 | } 1310 | ] 1311 | } 1312 | }, 1313 | "response": [] 1314 | }, 1315 | { 1316 | "name": "SpEL", 1317 | "request": { 1318 | "method": "GET", 1319 | "header": [], 1320 | "url": { 1321 | "raw": "http://{{base_url}}/Expression/spEL.do?exp=new java.lang.ProcessBuilder('calc').start()", 1322 | "protocol": "http", 1323 | "host": [ 1324 | "{{base_url}}" 1325 | ], 1326 | "path": [ 1327 | "Expression", 1328 | "spEL.do" 1329 | ], 1330 | "query": [ 1331 | { 1332 | "key": "exp", 1333 | "value": "new java.lang.ProcessBuilder('calc').start()" 1334 | } 1335 | ] 1336 | } 1337 | }, 1338 | "response": [] 1339 | }, 1340 | { 1341 | "name": "MVEL2", 1342 | "request": { 1343 | "method": "GET", 1344 | "header": [], 1345 | "url": { 1346 | "raw": "http://{{base_url}}/Expression/mvel.do?exp=new java.lang.String(new java.lang.ProcessBuilder('whoami').start().getInputStream().readAllBytes())", 1347 | "protocol": "http", 1348 | "host": [ 1349 | "{{base_url}}" 1350 | ], 1351 | "path": [ 1352 | "Expression", 1353 | "mvel.do" 1354 | ], 1355 | "query": [ 1356 | { 1357 | "key": "exp", 1358 | "value": "new java.lang.String(new java.lang.ProcessBuilder('whoami').start().getInputStream().readAllBytes())" 1359 | } 1360 | ] 1361 | } 1362 | }, 1363 | "response": [] 1364 | }, 1365 | { 1366 | "name": "ScriptEngine", 1367 | "request": { 1368 | "method": "GET", 1369 | "header": [], 1370 | "url": { 1371 | "raw": "http://{{base_url}}/Expression/scriptEngine.do?exp=new java.lang.String(new java.lang.ProcessBuilder('whoami').start().getInputStream().readAllBytes())", 1372 | "protocol": "http", 1373 | "host": [ 1374 | "{{base_url}}" 1375 | ], 1376 | "path": [ 1377 | "Expression", 1378 | "scriptEngine.do" 1379 | ], 1380 | "query": [ 1381 | { 1382 | "key": "exp", 1383 | "value": "new java.lang.String(new java.lang.ProcessBuilder('whoami').start().getInputStream().readAllBytes())" 1384 | } 1385 | ] 1386 | } 1387 | }, 1388 | "response": [] 1389 | } 1390 | ] 1391 | }, 1392 | { 1393 | "name": "SSTI", 1394 | "item": [ 1395 | { 1396 | "name": "Velocity", 1397 | "request": { 1398 | "method": "GET", 1399 | "header": [], 1400 | "url": { 1401 | "raw": "http://{{base_url}}/SSTI/velocity.do?tpl=%23set($e='e')%23set($c=$e.getClass().forName('org.apache.commons.io.IOUtils'))$c.getMethod('toString',$e.getClass().forName('java.io.InputStream')).invoke(null, $e.getClass().forName('java.lang.Runtime').getMethod('exec', $e.getClass().forName('java.lang.String')).invoke($e.getClass().forName('java.lang.Runtime').getMethod('getRuntime').invoke(null),'whoami').getInputStream())", 1402 | "protocol": "http", 1403 | "host": [ 1404 | "{{base_url}}" 1405 | ], 1406 | "path": [ 1407 | "SSTI", 1408 | "velocity.do" 1409 | ], 1410 | "query": [ 1411 | { 1412 | "key": "tpl", 1413 | "value": "%23set($e='e')%23set($c=$e.getClass().forName('org.apache.commons.io.IOUtils'))$c.getMethod('toString',$e.getClass().forName('java.io.InputStream')).invoke(null, $e.getClass().forName('java.lang.Runtime').getMethod('exec', $e.getClass().forName('java.lang.String')).invoke($e.getClass().forName('java.lang.Runtime').getMethod('getRuntime').invoke(null),'whoami').getInputStream())" 1414 | } 1415 | ] 1416 | } 1417 | }, 1418 | "response": [] 1419 | }, 1420 | { 1421 | "name": "Freemarker", 1422 | "request": { 1423 | "method": "GET", 1424 | "header": [], 1425 | "url": { 1426 | "raw": "http://{{base_url}}/SSTI/freemarker.do?tpl=<%23assign ob='freemarker.template.utility.ObjectConstructor'?new()><%23assign value='freemarker.template.utility.Execute'?new()>$%7Bvalue('calc')%7D", 1427 | "protocol": "http", 1428 | "host": [ 1429 | "{{base_url}}" 1430 | ], 1431 | "path": [ 1432 | "SSTI", 1433 | "freemarker.do" 1434 | ], 1435 | "query": [ 1436 | { 1437 | "key": "tpl", 1438 | "value": "<%23assign ob='freemarker.template.utility.ObjectConstructor'?new()><%23assign value='freemarker.template.utility.Execute'?new()>$%7Bvalue('calc')%7D" 1439 | } 1440 | ] 1441 | } 1442 | }, 1443 | "response": [] 1444 | } 1445 | ] 1446 | }, 1447 | { 1448 | "name": "CMD", 1449 | "item": [ 1450 | { 1451 | "name": "Ping", 1452 | "request": { 1453 | "method": "GET", 1454 | "header": [], 1455 | "url": { 1456 | "raw": "http://{{base_url}}/CMD/ping.do?host=baidu.com", 1457 | "protocol": "http", 1458 | "host": [ 1459 | "{{base_url}}" 1460 | ], 1461 | "path": [ 1462 | "CMD", 1463 | "ping.do" 1464 | ], 1465 | "query": [ 1466 | { 1467 | "key": "host", 1468 | "value": "baidu.com" 1469 | } 1470 | ] 1471 | } 1472 | }, 1473 | "response": [] 1474 | }, 1475 | { 1476 | "name": "PingRCE", 1477 | "request": { 1478 | "method": "GET", 1479 | "header": [], 1480 | "url": { 1481 | "raw": "http://{{base_url}}/CMD/pingRCE.do?host=baidu.com %26%26 whoami", 1482 | "protocol": "http", 1483 | "host": [ 1484 | "{{base_url}}" 1485 | ], 1486 | "path": [ 1487 | "CMD", 1488 | "pingRCE.do" 1489 | ], 1490 | "query": [ 1491 | { 1492 | "key": "host", 1493 | "value": "baidu.com %26%26 whoami" 1494 | } 1495 | ] 1496 | } 1497 | }, 1498 | "response": [] 1499 | } 1500 | ] 1501 | } 1502 | ], 1503 | "event": [ 1504 | { 1505 | "listen": "prerequest", 1506 | "script": { 1507 | "type": "text/javascript", 1508 | "exec": [ 1509 | "" 1510 | ] 1511 | } 1512 | }, 1513 | { 1514 | "listen": "test", 1515 | "script": { 1516 | "type": "text/javascript", 1517 | "exec": [ 1518 | "" 1519 | ] 1520 | } 1521 | } 1522 | ], 1523 | "variable": [ 1524 | { 1525 | "key": "base_url", 1526 | "value": "localhost:8080", 1527 | "type": "string" 1528 | } 1529 | ] 1530 | } -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Java安全开发规范 2 | 3 | 随着数字化时代的到来,我们的生活日益依赖Web服务和Web应用,它们为我们提供了便捷的办公、交易和生活方式。然而,Web服务在为人们提供着更加便捷的生活方式的同时也面临着网络安全风险的巨大威胁,Web应用成为了黑客攻击的首要目标。 4 | 5 | 根据中国国家互联网应急中心(CNCERT/CC)和国际权威安全监测机构Gartner的数据,75%以上的攻击针对Web应用,而约2/3的Web站点存在着相当严重的安全漏洞。这些数据清晰地展示了网络安全问题的紧迫性和严重性。 6 | 7 | 为了保护数据免受窃取、网站免受篡改等安全威胁,程序开发者在开发便捷、强大的Web应用的同时,还要确保程序自身的安全性。其中尤为重要的是开发者需密切关注Web安全、遵循安全编码规范。 8 | 9 | Github:[javaweb-secure-coding](https://github.com/javaweb-rasp/javaweb-secure-coding) 10 | 11 | PostMan:[JavaWeb-Secure-Coding.postman_collection.json](https://github.com/javaweb-rasp/javaweb-secure-coding/blob/master/JavaWeb-Secure-Coding.postman_collection.json) 12 | 13 | 14 | 15 | ## 1. 防御性编程 16 | 17 | 防御性编程(Defensive Programming)是一种软件开发方法,旨在最大程度地减少软件缺陷、漏洞和安全风险的产生。防御性编程的核心思想是通过编码和设计技巧来防止和减轻错误和异常,编写代码时要进行输入验证、数据验证和错误处理,以减少漏洞的可能性。 18 | 19 | 防御性编程要求开发者应当始终假定攻击者会尝试利用漏洞来攻击应用程序,也不能因为网络隔离、登录验证登限制而忽视安全,因为攻击者通常会使用非常规手段入侵到内部系统。 20 | 21 | 22 | 23 | ### 1.1 输入验证 24 | 25 | 一切来源于外部请求的参数都可能是恶意的,服务端应当谨慎处理所有来自于请求中的数据,包括但不限于: 26 | 27 | 1. HTTP的请求消息体(表单请求、JSON、XML等); 28 | 2. HTTP的请求参数(GET/POST/DELETE/UPDATE等); 29 | 3. HTTP请求的URL(URL传参,如:RESTful、Matrix请求); 30 | 4. HTTP请求中的Header信息(Cookie、X-Forwarded-For、Referer等); 31 | 5. 文件上传请求中的文件名、文件内容、表单域; 32 | 6. RPC/RESTful请求中的JSON/XML、反序列化对象等; 33 | 7. 客户端传入的加密消息(如:Android、JavaScript加密算法可逆或可构造参数); 34 | 8. 不可信的外部资源文件(如:HTML加载了不安全的外部JS或图片); 35 | 36 | 37 | 38 | ### 1.2 最小权限原则 39 | 40 | 最小权限原则(Principle of Least Privilege,简称PoLP)是计算机安全和信息安全领域的一项核心原则。该原则强调只为执行任务所需的最低权限赋予用户、程序或系统组件。这有助于减少潜在的风险和攻击面,提高系统的安全性。以下是最小权限原则的关键概念和原则: 41 | 42 | 1. **最小权限原则核心观点:** 用户、程序或系统组件应该仅在执行其任务所需的最低权限下运行。这意味着不应授予超出必需权限的额外权限。 43 | 2. **权限分类:** 最小权限原则涉及到对不同类型的权限进行分类。通常包括读取权限、写入权限、执行权限和管理权限等。 44 | 3. **降低攻击面:** 通过限制权限,可以减少潜在攻击者利用的机会。攻击者可能会试图滥用赋予的权限来入侵系统或获取敏感信息。 45 | 4. **最小化数据访问:** 在数据库和应用程序中,最小权限原则还包括限制对数据的访问。用户只应能够访问其需要的数据,而不是整个数据库。 46 | 5. **安全角色和分隔:** 为不同的任务和角色创建安全角色,并授予这些角色所需的最低权限。这有助于将权限管理简化为角色管理。 47 | 6. **特权分离:** 将系统的特权分离,确保只有经过授权的管理员才能执行敏感操作,如系统配置、用户管理等。 48 | 7. **授权控制:** 使用访问控制机制(如访问控制列表(ACL)或基于角色的访问控制(RBAC))来管理和强制权限。 49 | 8. **日志和监控:** 监控和记录权限的使用,以便检测异常行为和未经授权的访问尝试。 50 | 9. **敏感数据保护:** 特别关注对敏感数据的权限控制。确保只有经过授权的用户能够访问和处理敏感数据。 51 | 10. **持续评估:** 定期评估和审查权限,以确保其仍然符合实际需求,并根据需要进行调整。 52 | 53 | 最小权限原则是一项关键的安全实践,有助于减轻内部和外部威胁,并提高系统的安全性。它应该在设计和实施系统、应用程序和网络时得到广泛应用,以确保敏感信息和资源受到适当的保护。同时,最小权限原则也有助于降低人为错误和不当操作的风险,提高系统的可靠性和可维护性。 54 | 55 | 56 | 57 | ### 1.3 单元测试规范 58 | 59 | 单元测试规范是确保代码质量和可维护性的关键组成部分,因此强烈建议启用单元测试,以下是部分单元测试的开发规范: 60 | 61 | 1. 测试用例(Test Case)和测试类(Test Class)应当使用明确的、描述性的名称,以便于理解测试的目的。可以使用约定俗成的命名方式,如在被测试的类名后加上"Test"; 62 | 2. 单一职责原则,每个测试用例应该专注于测试一个特定的行为、方法或函数。不要在一个测试用例中尝试覆盖太多功能; 63 | 3. 代码覆盖率测试,确保测试覆盖代码的不同路径和分支,以尽可能提高代码覆盖率; 64 | 4. 安全测试,某些可能存在安全风险的业务需编写安全测试用例,以确保代码没有潜在的安全漏洞; 65 | 5. 使用断言(Assertions)来检查预期结果和实际结果是否匹配,断言应该是清晰和有意义的,以便在测试失败时快速定位问题; 66 | 6. 性能测试,对于一些有性能要求的业务应当编写性能测试用例,以确保代码在高负载情况下仍然具有良好的性能; 67 | 68 | 69 | 70 | ### 1.4 异常处理规范 71 | 72 | 1. 使用自定义的错误页面,在Web应用程序中,使用自定义错误页面来代替默认的错误消息,从而减少信息泄露风险,同时提供更友好的用户体验; 73 | 2. 使用全局异常处理方案,禁止直接将服务端的异常直接输出到客户端; 74 | 3. 使用合适的日志工具记录异常信息,如:Log4j、Logback等,需要特别注意不要使用存在漏洞的Log4j版本(<=2.14.1); 75 | 4. 使用准确的异常类型,以便能够更精确地识别问题和处理异常; 76 | 5. 准确描述自定义类异常信息,在抛出和捕获异常时,必须提供有意义的异常消息,以便在日志中记录或在错误页面上显示; 77 | 6. 合理记录异常信息,以便在出现问题时能够进行故障排除; 78 | 7. 明确的异常声明,在方法签名和JavaDoc中清晰地说明可能抛出的异常,以便他人能够正确地处理; 79 | 8. 禁止滥用异常机制,避免在正常业务控制流中使用异常来进行流程控制。异常应该用于处理异常情况,而不是预期的业务逻辑; 80 | 9. 合理的忽略异常,不要随意的忽略异常(例如,使用空的catch块),这会导致问题被忽略或难以调试; 81 | 10. 合理的异常日志归类,按照业务或异常类型单独记录异常信息; 82 | 11. 在处理用户输入时,进行恶意输入检查,以防止攻击,如:跨站脚本或SQL注入; 83 | 84 | 85 | 86 | ### 1.5 日志存储规范 87 | 88 | 按照信息安全等级保护(等保)的要求,日志存储应遵循一系列规范和最佳实践,以确保敏感信息的保密性、完整性和可用性。以下是针对日志存储的等保部分要求: 89 | 90 | 1. **保密性(C):** 91 | - 加密:对存储的日志数据进行加密,以防止未经授权的访问。 92 | - 访问控制:实施适当的访问控制措施,只有授权用户能够访问和查看日志文件。 93 | - 脱敏:对于包含敏感信息的日志,进行脱敏处理,以隐藏真实的敏感信息。 94 | - 安全传输:确保在日志数据从源传输到存储位置的过程中也是加密的,以避免窃听。 95 | 2. **完整性(I):** 96 | - 整体性保护:使用哈希值或数字签名等技术来验证日志文件的完整性,确保文件在存储过程中未被篡改。 97 | - 访问审计:记录和监控对日志存储的访问,包括读取、写入和修改操作。 98 | 3. **可用性(A):** 99 | - 容灾备份:实施容灾备份策略,确保即使在系统故障或灾难发生时,日志数据仍然可用。 100 | - 定期备份:定期备份日志数据,以防止数据丢失,并确保数据可以恢复。 101 | - 存储容量管理:确保足够的存储容量,以满足日志数据的增长需求,防止因存储不足而丢失日志。 102 | 4. **可追溯性(T):** 103 | - 记录详细信息:在日志中记录详细的事件信息,包括时间戳、事件类型、事件源等,以便进行调查和审计。 104 | - 安全审计:建立安全审计日志,记录关键事件和安全违规行为。 105 | - 有效期:采取监测、记录网络运行状态、网络安全事件的技术措施,并按照规定留存相关的网络日志不少于六个月; 106 | 107 | 108 | 109 | ## 2. C/S交互规范 110 | 111 | ### 2.1 服务端请求处理规范 112 | 113 | 1. 优先启动HTTPS访问,防止`中间人劫持攻击`; 114 | 2. 明确请求方式,原则上禁用`@RequestMapping`,改为具体的请求方式,如:`@GetMapping、@PostMapping`,防止`参数污染和请求方式不当风险`; 115 | 3. 合理的权限访问控制,API接口访问应做好严格的权限校验,防止`越权攻击`; 116 | 4. 重要业务需访问频率、次数限制,防止`数据泄露和密码爆破`; 117 | 5. 核心业务需限制访问IP; 118 | 6. 重要数据访问必须加密,如:账号、密码、手机号,防止`数据泄露`; 119 | 7. API请求参数应当添加CRC校验,保护数据完整性、防止`中间人劫持和请求重放攻击`; 120 | 8. 减少使用弱加密算法:`DES、RC4、MD5、SHA-1`,如:`MD5`加密时必须加上随机的`SALT`;推荐:`RSA、AES、SM(国密)`,请勿将:`Hex、URL、Base64`等编码方式当做加密算法; 121 | 9. 良好的数据格式校验,使用内置的验证框架(如:`Hibernate Validator`)来验证输入数据; 122 | 10. 正确使用`正则表达式`,防止`检测绕过回溯攻击`; 123 | 11. 生产环境应做好敏感信息保护减少暴露面,如:禁用`Swagger-UI、ElasticSearch、Weblogic/WebSphere/Tomcat/TongWeb控制台`等对外访问; 124 | 12. 启用自定义的`404、500`页面,禁止直接输出堆栈信息,防止`敏感信息泄露`; 125 | 13. 慎用或不用高风险组件解析请求参数,如:`Fastjson、XMLDecoder、XStream`; 126 | 14. 解析XML参数时务必禁用外部实体解析,防止XXE攻击; 127 | 15. 请求参数禁止当做`SpEL、Ognl、MVEL2、EL、JavaScript、Groovy、SQL`表达式或脚本执行; 128 | 16. 原则上禁止对请求参数进行Java对象反序列化,防止`Shiro、Apereo-CAS`之类的`Java反序列化漏洞`; 129 | 17. 文件上传请求中应严格检测文件名、文件内容是否合法,防止`文件上传漏洞`; 130 | 18. 文件上传的文件建议按照时间或者UUID的生成规则重命名,禁止原样存储,防止`文件上传漏洞`; 131 | 19. Session有效期不宜过长,尽量保持在30分钟以内,防止`会话固定攻击`; 132 | 20. 图形验证码每次校验完成后不管是否正确都必须清除与之对应的缓存,防止`验证码绕过漏洞`; 133 | 21. 慎用Spring MVC的请求参数对象绑定,防止参数污染; 134 | 135 | 136 | 137 | ### 2.2 HTTP响应头 138 | 139 | 响应中必须包含的响应头: 140 | 141 | ```yaml 142 | X-Content-Type-Options: nosniff 143 | X-Frame-Options: DENY 144 | ``` 145 | 146 | **建议添加的响应头:** 147 | 148 | 1. **Content-Security-Policy (CSP)**:指定哪些内容可以加载到页面中,以防止跨站点脚本攻击(XSS)和其他恶意内容的注入。CSP 可以根据应用程序的需求进行定制。 149 | 2. **Strict-Transport-Security (HSTS)**:启用 HTTP 严格传输安全,强制使用 HTTPS 连接,并防止中间人攻击。 150 | 3. **X-Content-Security-Policy**:与 CSP 类似,但在较旧的浏览器中使用。不过,现代浏览器更倾向于使用 CSP。 151 | 4. **Referrer-Policy**:控制浏览器如何在请求头中包含 Referer(来源)信息。可以设置为 `strict-origin-when-cross-origin`或`no-referrer-when-downgrade`,以减少跨站点信息泄露。 152 | 5. **Server**:隐藏服务器信息,以减少攻击者获取有关服务器的信息的机会。 153 | 6. **Content-Type**:确保正确设置响应的 `Content-Type` 头,以避免浏览器执行不安全的默认操作,例如将 text文件当作可执行 html执行。 154 | 7. **Access-Control-Allow-Origin**:这是最常见的跨域响应头,用于指定允许访问资源的域名。可以设置为具体的域名或使用通配符 `*` 表示允许任何域名访问。 155 | 156 | 157 | 158 | ### 2.3 HTTP响应规范 159 | 160 | 1. 禁止未经过滤直接输出任何请求头,防止XSS攻击; 161 | 2. 禁止未经过滤直接输出任何请求参数,防止XSS攻击; 162 | 3. 响应头中包含`Location`时应当检查重定向的地址是否由用户输入,防止XSS攻击; 163 | 4. 响应头的值中应禁止换行符,防止CRLF攻击; 164 | 5. 明确MIME 类型,响应主体应指定正确的 MIME 类型(媒体类型),以告知客户端如何解释和处理响应内容。例如,HTML 内容应使用 `text/html`,JSON 数据应使用 `application/json`,图像应使用适当的图像 MIME 类型,防止XSS攻击; 165 | 6. 敏感信息应做好脱敏处理; 166 | 167 | 168 | 169 | ## 2.4 Session/Cookie规范 170 | 171 | ### 2.4.1 Session安全 172 | 173 | 1. Session必须设置有效期,建议保持30分钟以内,原则上最长不得超过1小时; 174 | 2. Session数据应该做到安全存储,如:内存、数据库或加密的持久性存储中,禁止将会话Session存储在客户端,以减少被窃取的风险; 175 | 176 | 177 | 178 | ### 2.4.2 Cookie安全 179 | 180 | 1. Cookie存储重要凭证相关的Cookie,建议开启`HttpOnly`和`Secure`机制; 181 | 182 | ```java 183 | Cookie myCookie = new Cookie("key", "value"); 184 | 185 | // 设置 HttpOnly 标志 186 | myCookie.setHttpOnly(true); 187 | 188 | // 设置 Secure 标志(仅在HTTPS连接中传输) 189 | myCookie.setSecure(true); 190 | ``` 191 | 192 | 2. 请勿滥用Cookie,存储于Cookie中的数据在客户端都有可能被恶意篡改,因此误将Cookie当Session使用,例如: 193 | - 某业务将找回密码步骤中是否通过邮件验证的标识存储于Cookie当中,服务端没有做二次校验,从而导致了攻击者只需修改Cookie中的标识即可绕过邮件认证; 194 | - 将用户密码、图形验证码存储在Cookie中导致敏感信息泄露和验证码校验绕过漏洞; 195 | 3. 合理设置Cookie的`Domain`、`Path`,防止Cookie信息泄露; 196 | 4. 做好客户端和服务端的XSS防御; 197 | - 服务端任何来源于请求参数的值输出到客户端并明确将用于HTML渲染时都应当使对输出内容进行HTML实体化; 198 | - 客户端应减少拼接HTML片段,或对拼接部分转义、过滤; 199 | 5. 如将Cookie用于广告、商品营销或其他涉及到Cookie追踪的场景时应遵循隐私政策,声明Cookie业务范围并需用户授权; 200 | 201 | 202 | 203 | ## 3. 编码/加密规范 204 | 205 | ### 3.1 加密算法强度 206 | 207 | 1. 少用或不用弱加密算法:`DES、RC4、MD5、SHA-1`; 208 | 2. `Hex、URLEncoder、Base64`是编码,不是加密算法,请勿滥用! 209 | 3. 选择强加密算法,如:RSA、AES、SM(国密); 210 | 4. 密钥长度需符合安全规范,例如,使用RSA 2048而不是RSA1024; 211 | 212 | 213 | 214 | ### 3.2 密钥存储规范 215 | 216 | 1. 禁止硬编码,避免将密钥硬编码到应用程序代码中,因为容易攻击者发现; 217 | 2. 严格控制密钥访问权限,避免直接存储于缓存服务中,可使用访问控制列表(ACLs)或身份验证和授权来限制访问; 218 | 3. 强密码保护,如果密钥需要密码,确保使用足够强的密码,并定期更改密码; 219 | 4. 定期轮换密钥,以减少密钥泄露或滥用的风险; 220 | 5. 定期备份存储的密钥,以防止丢失或损坏,备份应存储在安全的位置; 221 | 6. 禁止将密钥直接存储于Git或其他版本管理工具中,尤其是Github、Gitee等开源平台; 222 | 7. 使用密钥管理服务, 如果可能的话,使用专门的密钥管理服务(Key Management Service,KMS)来生成、存储和管理密钥。云服务提供商通常提供了这样的服务,例如AWS Key Management Service(KMS)或Google Cloud Key Management Service; 223 | 224 | 225 | 226 | ## 4. SQL查询规范 227 | 228 | SQL注入(`SQL injection`)是因为`应用程序`在执行SQL语句的时候没有正确的处理用户输入字符串,将用户输入的恶意字符串拼接到了SQL语句中执行,从而导致了SQL注入。 229 | 230 | 231 | 232 | ### 4.1 Spring JdbcTemplate 233 | 234 | #### 4.1.1 字符型 235 | 236 | 原则上禁止在SQL语句中直接拼接外部传入的字符串,因为攻击者可以通过SQL攻击闭合原始的SQL语义从而产生新的SQL查询,可导致数据库信息泄露、服务器被非法入侵等高危风险! 237 | 238 | **反例 - Spring JdbcTemplate SQL注入** 239 | 240 | ```java 241 | public Map getSysUserByUsername(String username) { 242 | String sql = "select * from sys_user where username = '" + username + "'"; 243 | 244 | return jdbcTemplate.queryForMap(sql); 245 | } 246 | ``` 247 | 248 | **示例 - Spring JdbcTemplate 预编译查询** 249 | 250 | ```java 251 | public Map findByUsername(String username) { 252 | String sql = "select * from sys_user where username = ? "; 253 | 254 | return jdbcTemplate.queryForMap(sql, username); 255 | } 256 | ``` 257 | 258 | **示例 - SQL注入攻击** 259 | 260 | ```sql 261 | http://localhost:8080/SQL/Spring/jdbcTemplateStringInjection.do?username=admin' and 1=2 union select 1,2,sqlite_version(),4,5,6,'7 262 | ``` 263 | 264 | SQL注入攻击执行结果: 265 | 266 | ```json 267 | { 268 | "id": 1, 269 | "username": 2, 270 | "password": "3.34.0", 271 | "email": 4, 272 | "user_avatar": 5, 273 | "register_time": 6, 274 | "notes": "7" 275 | } 276 | ``` 277 | 278 | 攻击者使用前后的单引号闭合了原始SQL语句,并通过添加 `and 1=2` 让原SQL语句查询空数据。然后在UNION子查询中,攻击者使用了 `sqlite_version()` 函数来探测SQLite数据库引擎的版本号(其中`3.34.0`就是服务器端使用的Sqlite的版本号)。这个过程是一种信息搜集攻击,目的是帮助攻击者更好地了解目标系统的配置和弱点。 279 | 280 | 此外,攻击者也可能构建其他类型的SQL语句,以获取服务器中的敏感信息。例如,使用数据库提供的文件读写函数(如:Mysql的`load_file、into outfile`)或执行系统命令的函数(如:SQLServer的`xp_cmdshell`,MySQL的UDF)来直接获取数据库服务器的权限。 281 | 282 | 283 | 284 | #### 4.1.2 模糊查询 285 | 286 | **反例 - Spring JdbcTemplate 模糊查询SQL注入** 287 | 288 | ```java 289 | @GetMapping("/Spring/jdbcTemplateLikeInjection.do") 290 | public List> jdbcTemplateLikeInjection(String username) { 291 | String sql = "select * from sys_user where username like '%" + username + "%'"; 292 | 293 | return jdbcTemplate.queryForList(sql); 294 | } 295 | ``` 296 | 297 | 298 | 299 | **示例 - Spring JdbcTemplate 预编译模糊查询** 300 | 301 | ```java 302 | @GetMapping("/Spring/jdbcTemplateLikeQuery.do") 303 | public List> jdbcTemplateLikeQuery(String username) { 304 | String sql = "select * from sys_user where username like ? "; 305 | 306 | return jdbcTemplate.queryForList(sql, "%" + username + "%"); 307 | } 308 | ``` 309 | 310 | 311 | 312 | #### 4.1.3 order by/group by查询 313 | 314 | order by 和 group by有着相近的语法,因此这里仅以order by 为例,JDBC中无法对`表、函数、列名`预编译,因此在开发对应的业务功能时候需要特别注意防止SQL注入。 315 | 316 | **反例 - Spring JdbcTemplate order by查询SQL注入** 317 | 318 | ```java 319 | @GetMapping("/Spring/jdbcTemplateOrderByInjection.do") 320 | public List> jdbcTemplateOrderByInjection(String order, String orderType) { 321 | String sql = "select * from sys_user order by " + order + " " + orderType; 322 | 323 | return jdbcTemplate.queryForList(sql); 324 | } 325 | ``` 326 | 327 | 动态的order by查询可使用列名和排序方式白名单的方式拼接,例如下列示例程序限制了列名必须是特定的某些值: 328 | 329 | **示例 - Spring JdbcTemplate order by查询** 330 | 331 | ```java 332 | @GetMapping("/Spring/jdbcTemplateOrderByQuery.do") 333 | public List> jdbcTemplateOrderByQuery(String order, String orderType) { 334 | // 限制order by拼接的字段 335 | final String[] cols = "id,username,register_time".split(","); 336 | final String[] types = "desc,asc".split(","); 337 | StringBuilder sql = new StringBuilder("select * from sys_user"); 338 | 339 | // 安全的拼接order by SQL 340 | if (StringUtils.isNoneEmpty(order) && StringUtils.isNoneEmpty(orderType)) { 341 | order = org.apache.commons.lang3.ArrayUtils.contains(cols, order) ? order : "id"; 342 | orderType = org.apache.commons.lang3.ArrayUtils.contains(types, orderType) ? "desc" : "asc"; 343 | 344 | sql.append(" order by ").append(order).append(" ").append(orderType); 345 | } 346 | 347 | return jdbcTemplate.queryForList(sql.toString()); 348 | } 349 | ``` 350 | 351 | 如果排序条件较少的情况可以直接用程序写`if/else`或者`switch/case`的方式拼接: 352 | 353 | ```java 354 | @GetMapping("/Spring/jdbcTemplateOrderByAppendQuery.do") 355 | public List> jdbcTemplateOrderByAppendQuery(String order, String orderType) { 356 | StringBuilder sql = new StringBuilder("select * from sys_user"); 357 | 358 | if (StringUtils.isNoneBlank(order)) { 359 | sql.append(" order by "); 360 | 361 | // 拼接排序规则 362 | if ("id".equalsIgnoreCase(order)) { 363 | sql.append("id"); 364 | } 365 | 366 | // 排序方式 367 | if ("desc".equalsIgnoreCase(orderType)) { 368 | sql.append(" desc "); 369 | } 370 | } 371 | 372 | return jdbcTemplate.queryForList(sql.toString()); 373 | } 374 | ``` 375 | 376 | 377 | 378 | #### 4.1.4 where...in查询 379 | 380 | 禁止在`where...in`查询中直接拼接SQL语句,可使用NamedParameterJdbcTemplate参数绑定的方式查询。 381 | 382 | **反例 - Spring JdbcTemplate where...in查询SQL注入** 383 | 384 | ```java 385 | @GetMapping("/Spring/jdbcTemplateWhereInInjection.do") 386 | public List> jdbcTemplateWhereInInjection(String ids) { 387 | String sql = "select * from sys_user where id in ( " + ids + " ) "; 388 | 389 | return jdbcTemplate.queryForList(sql); 390 | } 391 | ``` 392 | 393 | **示例 - Spring NamedParameterJdbcTemplate where...in预编译查询** 394 | 395 | ```java 396 | @GetMapping("/Spring/jdbcTemplateWhereInQuery.do") 397 | public List> jdbcTemplateWhereInQuery(String ids) { 398 | String sql = "select * from sys_user where id in ( :ids ) "; 399 | 400 | // ids可以直接接String[]也可以 401 | List idList = Arrays.asList(ids.split(",")); 402 | 403 | Map sqlParameter = new HashMap<>(); 404 | sqlParameter.put("ids", idList); 405 | 406 | // 使用namedParameterJdbcTemplate而不是jdbcTemplate 407 | return namedParameterJdbcTemplate.queryForList(sql, sqlParameter); 408 | } 409 | ``` 410 | 411 | 412 | 413 | ### 4.2 MyBatis 414 | 415 | 修复方案:在Mybatis中禁止使用`${}`(字符拼接),改为`#{}`(预编译)即可,基于注解和基于XML配置同理,基本原则就是不能用`${}`。 416 | 417 | #### 4.2.1 字符型 418 | 419 | **反例 - MyBatis 基于配置字符型SQL注入** 420 | 421 | ```xml 422 | 425 | ``` 426 | 427 | **示例 - MyBatis 基于配置字符型SQL查询** 428 | 429 | ```xml 430 | 433 | ``` 434 | 435 | 436 | 437 | #### 4.2.2 模糊查询 438 | 439 | **反例 - MyBatis 基于注解模糊查询SQL注入** 440 | 441 | ```java 442 | @Select("select * from sys_user where username like '%${username}%'") 443 | List mybatisLikeInjection(@Param("username") String username); 444 | ``` 445 | 446 | 需要注意的是like预编译查询需要用到数据库字符串拼接,例如:mysql的拼接是使用`concat(XX, XX)`而示例中使用的是sqlite的字符拼接(sqlite是`||`拼接),所以这里请根据实际使用的数据库修改查询语句: 447 | 448 | **示例 - MyBatis 基于注解模糊查询** 449 | 450 | ```java 451 | @Select("select * from sys_user where username like '%' || #{username} || '%'") // Sqlite 452 | // Select("select * from sys_user where username like concat('%', #{username}, '%')") // Mysql 453 | List mybatisLikeQuery(@Param("username") String username); 454 | ``` 455 | 456 | 457 | 458 | #### 4.2.3 order by/group by查询 459 | 460 | **反例 - MyBatis order by SQL注入** 461 | 462 | ```java 463 | @Select({"" 467 | }) 468 | List mybatisOrderByInjection(@Param("order") String order, @Param("orderType") String orderType); 469 | ``` 470 | 471 | **示例 - MyBatis order by预编译查询** 472 | 473 | ```java 474 | @Select("") 496 | List mybatisOrderByQuery(@Param("order") String order, @Param("orderType") String orderType); 497 | ``` 498 | 499 | 如果查询条件不多的情况下可以使用上述的`choose/when`方式,反之建议参考本文中的Spring JdbcTemplate的`order by` 查询方式。 500 | 501 | 502 | 503 | #### 4.2.4 where...in查询 504 | 505 | 禁止在`where...in`查询中使用`${}`拼接SQL语句。 506 | 507 | **反例 - Mybatis where...in查询SQL注入** 508 | 509 | ```java 510 | @GetMapping("/Mybatis/mybatisWhereInInjection.do") 511 | public List mybatisWhereInInjection(String ids) { 512 | return sysUserMapper.mybatisWhereInInjection(ids); 513 | } 514 | ``` 515 | 516 | 517 | 518 | Mybatis的SQL语句支持通过循环的方式预编译,可使用如下方式实现`where...in`查询: 519 | 520 | **示例 - Mybatis where...in预编译查询** 521 | 522 | ```java 523 | @Select({""}) 529 | List mybatisWhereInQuery(@Param("ids") List ids); 530 | ``` 531 | 532 | 533 | 534 | ### 4.3 JDBC 535 | 536 | JDBC提供了PreparedStatement和Statement,其中PreparedStatement提供了预编译查询能力,因此需要使用PreparedStatement查询。需要特别注意的是PreparedStatement中的查询语句原则上应当禁止出现任何字符串相关的拼接,否则可能会导致SQL注入攻击。 537 | 538 | **反例 - JDBC SQL注入** 539 | 540 | ```java 541 | String sql = "select * from sys_user where id = " + id; 542 | 543 | // 创建预编译对象 544 | PreparedStatement pstt = connection.prepareStatement(sql); 545 | 546 | // 执行SQL并返回结果集 547 | ResultSet rs = pstt.executeQuery(); 548 | ``` 549 | 550 | **示例 - JDBC SQL正确的预编译查询** 551 | 552 | ```java 553 | String sql = "select * from sys_user where id = ? "; 554 | 555 | // 创建预编译对象 556 | PreparedStatement pstt = connection.prepareStatement(sql); 557 | pstt.setObject(1, id); 558 | 559 | // 执行SQL并返回结果集 560 | ResultSet rs = pstt.executeQuery(); 561 | ``` 562 | 563 | 564 | 565 | ### 4.4 JPA/Hibernate 566 | 567 | 注:JPA和Hibernate实现差异较小,本文以JPA为例,Hibernate不做单独讲述。 568 | 569 | `JpaRepository`是通过命名约定和自动生成查询方法来简化JPA数据访问的操作,因此使用JPA不仅代码量少,而且不会存在SQL注入(用户自定义Repository除外)。 570 | 571 | #### 4.4.1 JpaRepository 572 | 573 | 以下是`JpaRepository`使用示例: 574 | 575 | ```java 576 | @Repository 577 | public interface SysUserRepository extends JpaRepository, 578 | PagingAndSortingRepository, JpaSpecificationExecutor, SysUserCustomRepository { 579 | 580 | SysUser findByUsername(String username); 581 | 582 | List findByUsernameIn(List username); 583 | 584 | List findByUsernameLike(String username); 585 | 586 | List findByUsernameLikeOrderByIdDesc(String username); 587 | 588 | @Query(value = "select * from sys_user where username = ?1 ", nativeQuery = true) 589 | SysUser usernameQueryTest(String username); 590 | 591 | @Query(value = "select * from sys_user where email = :email ", nativeQuery = true) 592 | SysUser emailQueryTest(String email); 593 | 594 | @Query("from SysUser where id = :id") 595 | SysUser idQueryTest(Long id); 596 | 597 | } 598 | ``` 599 | 600 | 601 | 602 | #### 4.4.2 自定义JpaRepository 603 | 604 | 在使用JPA提供的自定义Repository的时为了保证数据安全,原则上禁止拼接SQL语句,如有必须拼接的场景需严格校验数据的安全性。 605 | 606 | **SysUserCustomRepository.java** 607 | 608 | ```java 609 | package org.javaweb.code.repository; 610 | 611 | public interface SysUserCustomRepository { 612 | 613 | Object jpqlQuery(String username); 614 | 615 | Object jpqlInjection(String username); 616 | 617 | Object nativeQuery(String username); 618 | 619 | Object nativeInjection(String username); 620 | 621 | Object namedQuery(String username); 622 | 623 | Object criteriaQuery(String username, String email); 624 | 625 | } 626 | ``` 627 | 628 | **SysUserCustomRepositoryImpl.java** 629 | 630 | ```java 631 | package org.javaweb.code.repository.impl; 632 | 633 | import jakarta.persistence.EntityManager; 634 | import jakarta.persistence.PersistenceContext; 635 | import jakarta.persistence.Query; 636 | import jakarta.persistence.criteria.CriteriaBuilder; 637 | import jakarta.persistence.criteria.CriteriaQuery; 638 | import jakarta.persistence.criteria.Predicate; 639 | import jakarta.persistence.criteria.Root; 640 | import org.apache.commons.lang3.StringUtils; 641 | import org.javaweb.code.entity.SysUser; 642 | import org.javaweb.code.repository.SysUserCustomRepository; 643 | import org.springframework.stereotype.Component; 644 | 645 | import java.util.ArrayList; 646 | import java.util.List; 647 | 648 | @Component 649 | public class SysUserCustomRepositoryImpl implements SysUserCustomRepository { 650 | 651 | @PersistenceContext 652 | private EntityManager entityManager; 653 | 654 | @Override 655 | public Object jpqlQuery(String username) { 656 | // JPQL预编译查询 657 | String sql = "from SysUser where username = :username"; 658 | Query query = entityManager.createQuery(sql, SysUser.class); 659 | query.setParameter("username", username); 660 | 661 | return query.getSingleResult(); 662 | } 663 | 664 | @Override 665 | public Object jpqlInjection(String username) { 666 | // JPQL注入写法 667 | String sql = "from SysUser where username = '" + username + "'"; 668 | return entityManager.createQuery(sql, SysUser.class).getSingleResult(); 669 | } 670 | 671 | @Override 672 | public Object nativeQuery(String username) { 673 | // 原生SQL预编译查询 674 | String sql = "select * from sys_user where username = ?1 "; 675 | 676 | return entityManager.createNativeQuery(sql, SysUser.class).setParameter(1, username).getSingleResult(); 677 | } 678 | 679 | @Override 680 | public Object nativeInjection(String username) { 681 | // SQL注入写法 682 | String sql = "select * from sys_user where username = '" + username + "'"; 683 | 684 | return entityManager.createNativeQuery(sql, SysUser.class).getSingleResult(); 685 | } 686 | 687 | @Override 688 | public Object namedQuery(String username) { 689 | String sql = "SysUser.findByUsername"; 690 | return entityManager.createNamedQuery(sql, SysUser.class).setParameter(1, username).getSingleResult(); 691 | } 692 | 693 | @Override 694 | public Object criteriaQuery(String username, String email) { 695 | CriteriaBuilder criteriaBuilder = entityManager.getCriteriaBuilder(); 696 | CriteriaQuery criteriaQuery = criteriaBuilder.createQuery(SysUser.class); 697 | Root root = criteriaQuery.from(SysUser.class); 698 | 699 | // 创建一个 Predicate 列表来存储查询条件 700 | List predicates = new ArrayList<>(); 701 | 702 | if (StringUtils.isNoneEmpty(username)) { 703 | predicates.add(criteriaBuilder.equal(root.get("username"), username)); 704 | } 705 | 706 | if (StringUtils.isNoneEmpty(email)) { 707 | predicates.add(criteriaBuilder.equal(root.get("email"), email)); 708 | } 709 | 710 | // 将所有的条件合并为一个总的查询条件(AND 连接) 711 | criteriaQuery.where(criteriaBuilder.and(predicates.toArray(new Predicate[0]))); 712 | 713 | // 执行查询 714 | return entityManager.createQuery(criteriaQuery).getResultList(); 715 | } 716 | 717 | } 718 | ``` 719 | 720 | 721 | 722 | ## 5. URL/Socket请求规范 723 | 724 | 在编写服务端HTTP请求时应禁止在服务端直接访问外部传入的URL、Socket地址,所有的URL地址都必须配置访问规则(原则上是设置URL白名单),从而有效的防止SSRF攻击。 725 | 726 | SSRF(Server-Side Request Forgery,服务端请求伪造)是一种Web安全漏洞,它允许攻击者在受害服务器上执行未经授权的网络请求。这种漏洞可能会导致严重的安全问题,包括数据泄露、攻击内部系统、滥用应用程序的功能等。 727 | 728 | **反例 - 服务端直接访问外部传入的URL地址** 729 | 730 | ```java 731 | @GetMapping("/urlConnection.do") 732 | public ResponseEntity urlConnection(String url) throws Exception { 733 | // 禁止url地址未经任何检测直接请求 734 | URLConnection connection = new URL(url).openConnection(); 735 | 736 | return new ResponseEntity<>(IOUtils.toByteArray(connection.getInputStream()), OK); 737 | } 738 | ``` 739 | 740 | **示例 - 服务器访问URL前域名白名单检测** 741 | 742 | ```java 743 | @GetMapping("/urlFilterConnection.do") 744 | public ResponseEntity urlFilterConnection(String url) throws Exception { 745 | URL u = new URL(url); 746 | 747 | // URL地址的域名,发起Http请求之前需要先校验域名是否合法 748 | String domain = u.getHost(); 749 | 750 | // 设置URL白名单(可在数据库、缓存、文件中配置) 751 | String[] hostWhitelist = "localhost,127.0.0.1".split(","); 752 | 753 | // URL的域名白名单检测(此处只校验了域名,有必要同时检测请求协议类型、请求端口) 754 | if (org.apache.commons.lang3.ArrayUtils.contains(hostWhitelist, domain)) { 755 | URLConnection connection = u.openConnection(); 756 | 757 | // 输出Http请求结果 758 | return new ResponseEntity<>(IOUtils.toByteArray(connection.getInputStream()), OK); 759 | } 760 | 761 | // 输出403错误信息 762 | return new ResponseEntity<>("Forbidden".getBytes(), FORBIDDEN); 763 | } 764 | ``` 765 | 766 | 上述程序使用了`java.net.URLConnection`类,该规范同样适用于其他Http请求框架,包括但不限于:`HttpClient、HttpComponents、OkHttp、Jsoup`。 767 | 768 | 769 | 770 | ## 6. 文件读写开发规范 771 | 772 | Java文件读写应当遵循最为严格的编码规范,如若程序编码不当可直接导致服务器被非法入侵和数据泄露等,以下是文件读写编码的强制性要求: 773 | 774 | ### 6.1 文件路径和文件名规范 775 | 776 | 1. 文件名中禁止出现空字节(`Unicode字符:\u0000`)、禁止`;`(英文分号); 777 | - `if (fileName.contains('\u0000') != -1 || fileName.contains(";")){...}`,防止`文件名空字节截断`和`文件路径截断`漏洞; 778 | - Windows系统应当禁止文件名以`.`(英文点)和` `(英文空格),因为会被自动系统忽略,例如:在Windows下写入的文件名为`1.jsp.`、`1.jsp/.`,最终写入到磁盘的文件是`1.jsp`; 779 | 2. 请求参数中禁止传递绝对路径,如:`dir=/data/&file=app.conf`或`dir=/data/app.conf`,防止`目录穿越/任意文件读写类漏洞`; 780 | 3. 相对路径的中禁止出现`WEB-INF`,如:`WEB-INF/web.xml`,防止`源码/配置文件泄露`; 781 | 4. 相对路径中禁止出现超过两次`../`或`..\`,如:`../../webapps/ROOT/index.jsp`,防止`目录穿越漏洞`; 782 | 5. 文件上传请求中的文件名必须须重命名,可保留原始的文件后缀,但后缀名必须符合文件名写入规则,防止`目录穿越漏洞`; 783 | 6. 文件路径检测时必须先对文件路径进行URL标准化后才能进行进一步判断, 784 | - 例如程序本身希望限制读取`images/`目录下的图片文件,程序代码判断逻辑:`fileName.StartWith("images/")`,攻击者实际上可以传入:`images/../config/db.config`; 785 | - 文件路径的URL标准化禁止使用:`java.net.URI#normalize()`、`java.nio.file.Path#normalize`,因为无法处理URL地址,例如:`./data/../../resource`,标准化后得到的URL`../resource`; 786 | - 文件路径比较推荐使用:`java.io.File#getCanonicalFile/getCanonicalPath()`,该方法会使用当前的文件系统创建一个标准化的`绝对路径`,如:`if(file.getCanonicalFile().equals(file2.getCanonicalFile())){...}`; 787 | 7. 文件目录拼接请使用:`java.io.File#separatorChar`,如:`"data" + java.io.File.separatorChar + "images"`,或者:`new File("data", "images")`; 788 | 8. `Windows的盘符`(如:`C:`)和`Linux/macOS`的区别; 789 | 9. 跨平台部署应注意文件名规范:`Windows NTFS`、`FAT文件系统`不区分文件名大小写,`Linux文件系统`严格区分文件名大小写、`macOS文件系统`分区时可选择是否区分大小写; 790 | 10. Windows系统用NTFS存储时文件名不允许包含:`:`(英文冒号),防止文件名因为NTFS交换数据流(`Alternate Data Streams`,简称ADS)而导致文件类型检测绕过。例如,在Windows+NTFS中:`new File("d:/test.jsp::$DATA")`等价于`new File("d:/test.jsp")`,参考:[Microsoft 本地文件系统 - 文件流](https://learn.microsoft.com/zh-cn/windows/win32/fileio/file-streams); 791 | 792 | 793 | 794 | ### 6.2 文件系统操作规范 795 | 796 | 1. **文件读取**:原则上不允许跨目录读取,例如:`file=../images/1.jpg`,建议读取文件时指定父级目录:`new File("images", file)`,传入参数:`file=1.jpg`,使用相对路径应当遵循本文中的`文件路径和文件名规范`; 797 | 2. **文件写入:** 798 | - 如果文件写入到了服务器本地必须限制写入的文件类型,禁止写入:`jsp/jspx/jspa/jspf/php/aspx/asp`脚本类型,强烈建议使用文件名白名单,如:`jpg/png/gif/bmp`等; 799 | - 获取文件后缀名时请使用`lastIndexOf(".")`,而不是`indexOf(".")`,防止攻击者使用`1.jpg.jsp`绕过检测; 800 | - 写入文件时应当做好必要的文件长度限制; 801 | 3. **文件删除:**文件删除时禁止使用根目录,防止误删,如:`C:`、`/`,禁止跨目录删除文件,如:`../images/`; 802 | 4. **文件复制/重命名:** 803 | - 文件复制时需要严格检查文件后缀名,例如:将`1.jpg`复制或重命名为`1.jsp`; 804 | - 文件复制时严格控制目标文件路径,禁止从请求参数中或文件名中指定目录,例如,攻击者复制带有恶意后门的war到webapps目录自动部署后门程序,从而间接的获取服务器权限:`source=1.war&dest=../webapps/1.war`; 805 | 5. **文件遍历:**文件遍历时必须指定根目录,如:`new File("images", file)`,`file`路径禁止跨目录:`../`或`..\`,同时该路径应当遵循本文中的`文件路径和文件名规范`; 806 | 6. **文件权限和安全性**:了解文件系统的权限和安全性要求,确保只有授权用户可以读取或写入文件。在安全敏感的应用程序中,遵循最小特权原则,仅赋予应用程序所需的文件系统权限; 807 | 7. **异常处理:** 808 | - 使用try-catch块来捕获和处理文件读写可能引发的异常,如:IOException; 809 | - 在方法签名中声明可能抛出的异常,以便调用者知道需要处理的异常类型,不要捕获异常后不进行任何处理,应该至少记录错误信息或者向上层抛出; 810 | 8. **关闭资源:**使用`try-with-resources`(JDK7+)自动关闭或显式关闭文件资源(例如,使用finally块关闭引用的资源)以确保在完成后释放资源; 811 | 9. 文件编码:在读取或写入文本文件时,指定正确的字符编码,以确保数据正确解释和保存; 812 | 10. NIO优先:对于大文件或需要更高性能的情况,可以考虑使用Java的NIO(New I/O)库,如:ByteBuffer和Channel,以提供更快的文件读写操作; 813 | 11. 对象存储:优先使用对象存储方式,如:`阿里云OSS`、`百度云BOS`、`腾讯云COS`,也可使用静态服务器或FTP存储文件; 814 | 815 | 816 | 817 | ## 7. JSON解析规范 818 | 819 | JSON库禁止使用存在重大安全问题的JSON库或版本,例如`FastJSON1.X`,使用主流的JSON库,如:[Jackson](https://github.com/FasterXML/jackson)、[DSL-Json](https://github.com/ngs-doo/dsl-json),[FastJSON2](https://github.com/alibaba/fastjson2)、[Gson](https://github.com/google/gson)。 820 | 821 | 822 | 823 | ### 7.1 JSON序列化规范 824 | 825 | JSON解析应当遵循以下规范: 826 | 827 | 1. 避免循环引用:当序列化对象包含循环引用时,会导致无限递归,因此需要特别小心处理循环引用情况; 828 | 2. 避免使用JSON值`'`(英文单引号),默认使用:`"`(英文双引号); 829 | 3. 正确的序列化空对象,如:List类型为空输出`[]`、String类型为空输出`""`、Number类型为空输出`0`、Boolean类型为空时输出`false`; 830 | 4. 统一JSON输出的字段风格,禁止驼峰和下划线混用、允许key为中文,但不推荐; 831 | 5. 允许使用Unicode,禁用Hex、Octal编码,因为目前就只有FastJson支持; 832 | 6. 禁用注释符:`//、#、/**/`,保证兼容性; 833 | 7. JSON字符串大小原则上不允许超过128M; 834 | 8. 正确使用基础类型,不建议使用以下值作为基础类型:`1B、1S、1L、1.0F、1.0D、+1、01、.0、-.0、+.0、+-0.1、TRUE`; 835 | 9. 不推荐使用`NULL、null、NaN`作为JSON的key或者value; 836 | 837 | 838 | 839 | ### 7.2 JSON反序列化规范 840 | 841 | 1. 禁用FastJSON的`autoType`或禁用`FastJSON1.X`; 842 | 2. 验证数据来源,谨慎处理不可信任的数据; 843 | 3. 对象反序列化时合理限制类使用黑名单; 844 | 4. 使用安全的 JSON 解析库,定期更新和维护使用的 JSON 解析库,以确保它们不受已知的漏洞或安全问题的影响; 845 | 5. 限制反序列化操作的递归深度,以防止 JSON 数据中的嵌套结构导致堆栈溢出; 846 | 6. 对象反序列化时,JSON对象中的key必须实体类中声明的一致,而不是依赖于JSON库的自动匹配;以JackSon为例,假设JSON中的`user_type`使用了下划线命名:`{"user_type": 1}`那么Java对象中就必须使用JSON的映射:`@JsonProperty("user_type") private int userType;`; 847 | 848 | 849 | 850 | ## 7.3 XML解析规范 851 | 852 | XML一种主流的数据传输和存储的文件格式,JDK自带的XML解析API默认解析XML的时候就存在XXE漏洞,因此在解析XML时必须禁用外部实体解析,从而防止XXE漏洞。 853 | 854 | 855 | 856 | ### 7.3.1 SAXReader/DocumentHelper 857 | 858 | **反例 - Dom4J XML SAX解析** 859 | 860 | ```java 861 | // 解析方式一,直接使用SAXReader解析,未禁用外部实体 862 | org.dom4j.io.SAXReader reader = new org.dom4j.io.SAXReader(); 863 | org.dom4j.Document doc = reader.read(in); 864 | 865 | // 解析方式二,使用DocumentHelper解析,间接的调用SAXReader,未禁用外部实体 866 | // org.dom4j.Document doc = DocumentHelper.parseText(IOUtils.toString(in, StandardCharsets.UTF_8)); 867 | 868 | org.dom4j.Element root = doc.getRootElement(); 869 | ``` 870 | 871 | **示例 - Dom4J SAXReader解析** 872 | 873 | ```java 874 | SAXReader reader = new org.dom4j.io.SAXReader(); 875 | 876 | // 禁止DOCTYPE 877 | reader.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true); 878 | 879 | // 禁止外部ENTITY 880 | reader.setFeature("http://xml.org/sax/features/external-general-entities", false); 881 | 882 | // 禁止外部参数实体 883 | reader.setFeature("http://xml.org/sax/features/external-parameter-entities", false); 884 | 885 | org.dom4j.Document doc = reader.read(in); 886 | ``` 887 | 888 | 除此之外,其他的XML解析库、类同理,解析外部输入的XML时应当禁止外部的DOCTYPE,即设置Feature:`http://apache.org/xml/features/disallow-doctype-decl`设置为`true`。 889 | 890 | 891 | 892 | ### 7.3.2 SAXParserFactory/XMLReader 893 | 894 | XMLReader API在Java9中已过,同SAXParserFactory,创建XMLReader后设置setFeature即可。 895 | 896 | ```java 897 | SAXParserFactory factory = SAXParserFactory.newInstance(); 898 | 899 | // 禁止DOCTYPE 900 | factory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true); 901 | 902 | // 禁止外部ENTITY 903 | factory.setFeature("http://xml.org/sax/features/external-general-entities", false); 904 | 905 | // 禁止外部参数实体 906 | factory.setFeature("http://xml.org/sax/features/external-parameter-entities", false); 907 | 908 | SAXParser parser = factory.newSAXParser(); 909 | ``` 910 | 911 | 912 | 913 | ### 7.3.3 SAXBuilder 914 | 915 | ```java 916 | SAXBuilder builder = new SAXBuilder(); 917 | 918 | // 禁止DOCTYPE 919 | builder.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true); 920 | 921 | // 禁止外部ENTITY 922 | builder.setFeature("http://xml.org/sax/features/external-general-entities", false); 923 | 924 | // 禁止外部参数实体 925 | builder.setFeature("http://xml.org/sax/features/external-parameter-entities", false); 926 | 927 | Document doc = builder.build(in); 928 | ``` 929 | 930 | 931 | 932 | ### 7.3.4 DocumentBuilderFactory 933 | 934 | ```java 935 | DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); 936 | 937 | // 禁止DOCTYPE 938 | factory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true); 939 | 940 | // 禁止外部ENTITY 941 | factory.setFeature("http://xml.org/sax/features/external-general-entities", false); 942 | 943 | // 禁止外部参数实体 944 | factory.setFeature("http://xml.org/sax/features/external-parameter-entities", false); 945 | 946 | // 创建DocumentBuilder 947 | DocumentBuilder builder = factory.newDocumentBuilder(); 948 | 949 | // 从输入流中解析XML 950 | org.w3c.dom.Document document = builder.parse(in); 951 | ``` 952 | 953 | 除了上述XML示例,在使用一些第三方库的时候也应当审计程序逻辑是否有禁用外部实体解析,例如:`Hutool v5.8.19`的`cn.hutool.core.util.XmlUtil.java#readBySax`存在XXE漏洞。 954 | 955 | 956 | 957 | ## 8. XPath规范 958 | 959 | XPath(XML Path Language)是一种用于在XML文档中定位和选择元素和数据的查询语言。XPath可用于检索和操作XML文档的内容,以及在XML文档中执行各种搜索和筛选操作。 960 | 961 | XPath注入是一种安全漏洞,类似于SQL注入,它发生在不正确处理用户提供的XPath查询字符串时。攻击者可以通过恶意构造的XPath查询来执行未授权的操作或访问敏感数据。以下是XPath注入的示例: 962 | 963 | ```xml 964 | 965 | 966 | admin 967 | admin123 968 | 969 | 970 | user1 971 | pass123 972 | 973 | 974 | ``` 975 | 976 | 如果一个应用程序使用用户提供的输入来构建XPath查询,而没有适当的过滤或转义,攻击者可以通过输入 `username=admin' or '` 来构造恶意查询,绕过身份验证。 977 | 978 | **反例 - XPath注入** 979 | 980 | ```java 981 | @GetMapping("/xpathInjection.do") 982 | public Map xpathInjection(String username, String password) { 983 | Map data = new HashMap<>(); 984 | DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); 985 | 986 | try { 987 | DocumentBuilder builder = factory.newDocumentBuilder(); 988 | InputSource inputSource = new InputSource(new StringReader(USERS_XML)); 989 | Document document = builder.parse(inputSource); 990 | XPathFactory xPathFactory = XPathFactory.newInstance(); 991 | XPath xpath = xPathFactory.newXPath(); 992 | String query = "/users/user[username='" + username + "' and password='" + password + "']"; 993 | XPathExpression expression = xpath.compile(query); 994 | 995 | // 执行XPath查询 996 | NodeList result = (NodeList) expression.evaluate(document, XPathConstants.NODESET); 997 | data.put("result", result.getLength() > 0 ? "Authentication successful." : "Authentication failed."); 998 | } catch (Exception e) { 999 | data.put("result", "Error"); 1000 | } 1001 | 1002 | return data; 1003 | } 1004 | ``` 1005 | 1006 | 为了解决XPath注入攻击,禁止直接拼接XPath查询语句,需要使用参数化的方式查询。 1007 | 1008 | **示例 - XPath参数化查询** 1009 | 1010 | ```java 1011 | @GetMapping("/xpathQuery.do") 1012 | public Map xpathQuery(String username, String password) { 1013 | Map data = new HashMap<>(); 1014 | 1015 | try { 1016 | DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); 1017 | DocumentBuilder builder = factory.newDocumentBuilder(); 1018 | Document document = builder.parse(new InputSource(new StringReader(USERS_XML))); 1019 | XPathFactory xPathFactory = XPathFactory.newInstance(); 1020 | XPath xpath = xPathFactory.newXPath(); 1021 | 1022 | // 使用参数化的XPath查询 1023 | String xPathExpression = "/users/user[username=$username and password=$password]"; 1024 | 1025 | xpath.setXPathVariableResolver(new XPathVariableResolver() { 1026 | @Override 1027 | public Object resolveVariable(QName variableName) { 1028 | if ("username".equals(variableName.getLocalPart())) { 1029 | return username; 1030 | } else if ("password".equals(variableName.getLocalPart())) { 1031 | return password; 1032 | } 1033 | return null; 1034 | } 1035 | }); 1036 | 1037 | XPathExpression expression = xpath.compile(xPathExpression); 1038 | 1039 | // 执行XPath查询 1040 | NodeList result = (NodeList) expression.evaluate(document, XPathConstants.NODESET); 1041 | data.put("result", result.getLength() > 0 ? "Authentication successful." : "Authentication failed."); 1042 | } catch (Exception e) { 1043 | data.put("result", "Error"); 1044 | } 1045 | 1046 | return data; 1047 | } 1048 | ``` 1049 | 1050 | **XPath编码建议:** 1051 | 1052 | 1. 避免手动将用户输入直接插入XPath查询中。相反,使用参数化查询或预编译的查询; 1053 | 2. 在接受用户输入之前,对其进行严格的输入验证和过滤。只接受有效的输入,拒绝不符合预期格式的输入。 1054 | 1055 | 1056 | 1057 | ## 9. 表达式规范 1058 | 1059 | 禁止在服务端执行任何用户传入的表达式(例如:`Ognl、SpEL、MVEL2、Javascript`),包括拼接的表达式在内。 1060 | 1061 | **反例 - 表达式注入漏洞** 1062 | 1063 | ```java 1064 | @GetMapping(value = "/ognl.do") 1065 | public Map ognl(String exp) throws OgnlException { 1066 | Map data = new LinkedHashMap<>(); 1067 | ognl.OgnlContext context = new OgnlContext(); 1068 | 1069 | // 执行Ognl表达式 1070 | data.put("data", ognl.Ognl.getValue(exp, context, context.getRoot())); 1071 | 1072 | return data; 1073 | } 1074 | 1075 | @GetMapping(value = "/spEL.do") 1076 | public Map spel(String exp) { 1077 | Map data = new LinkedHashMap<>(); 1078 | 1079 | // 执行SpEL表达式 1080 | data.put("data", new SpelExpressionParser().parseExpression(exp).getValue()); 1081 | 1082 | return data; 1083 | } 1084 | 1085 | @GetMapping("/mvel.do") 1086 | public Map mvel(String exp) { 1087 | Map data = new LinkedHashMap<>(); 1088 | 1089 | // 执行MVEL2表达式 1090 | data.put("data", MVEL.eval(exp)); 1091 | 1092 | return data; 1093 | } 1094 | 1095 | @GetMapping("/scriptEngine.do") 1096 | public Map scriptEngine(String exp) throws Exception { 1097 | Map data = new LinkedHashMap<>(); 1098 | 1099 | // 执行Javascript 1100 | Object eval = new ScriptEngineManager().getEngineByName("nashorn").eval(exp); 1101 | data.put("data", eval.toString()); 1102 | 1103 | return data; 1104 | } 1105 | ``` 1106 | 1107 | 表达式注入的直观的危害就是可以在服务端间接的执行攻击者构建的恶意Java代码,例如:调用`java.lang.ProcessBuilder`执行系统命令、调用`java.io.FileOutputStream`写入后门程序,从而达到控制服务器的目的。 1108 | 1109 | **示例 - scriptEngine#eval执行JavaScript脚本** 1110 | 1111 | ```java 1112 | http://localhost:8080/Expression/scriptEngine.do?exp=new java.lang.String(new java.lang.ProcessBuilder('whoami').start().getInputStream().readAllBytes()) 1113 | ``` 1114 | 1115 | **JS执行结果:** 1116 | 1117 | ```json 1118 | { 1119 | "data": "yzmm\\yzmm\r\n" 1120 | } 1121 | ``` 1122 | 1123 | 1124 | 1125 | ## 10. 本地命令执行规范 1126 | 1127 | 本地命令执行(`Local Command Execution`)是一种安全漏洞,它允许攻击者在受害者的计算机上执行任意命令。这种漏洞的危害非常严重,因为攻击者可以利用它来获取操作系统级别的控制权(例如:`RCE利用漏洞`或者`WebShell`),执行恶意操作,窃取敏感数据,或者对系统进行破坏。 1128 | 1129 | 对于程序开发者来说执行本地命令来实现某些程序功能(如:ps 进程管理、top内存管理等)是一个正常的需求,但是在执行本地系统命令时应当严格遵守安全开发规范。 1130 | 1131 | **本地命令执行应当遵循以下规范:** 1132 | 1133 | 1. 禁止直接从参数中接收并执行系统命令; 1134 | 2. 原则上禁止执行系统命令,可以考虑使用JNI或者API接口等方式调用外部程序;因此,建议禁用`java.lang.Runtime#exec、java.lang.ProcessBuilder#start`类; 1135 | 3. 如必须执行系统命令,且必须拼接系统命令,那么务必严格校验传入输入的合法性,例如,调用ping命令检测网络连接时需要传入域名或者IP:`ping baidu.com`,那么传入的就必须是一个合法的主机名、IP、域名,可使用合理的正则表达式、`java.net.InetAddress#getByName`验证; 1136 | 4. 避免使用`/bin/bash -c、/bin/sh -c、/bin/zsh -c、cmd /c `的方式拼接系统命令,防止命令注入漏洞; 1137 | 1138 | 1139 | 1140 | **反例 - 拼接并执行系统命令** 1141 | 1142 | ```java 1143 | @GetMapping("/pingRCE.do") 1144 | public String pingRCE(String host) throws Exception { 1145 | boolean isWindows = System.getProperty("os.name").startsWith("Win"); 1146 | 1147 | // ping 3次目标主机 1148 | String cmd = (isWindows ? "cmd /c ping -n 3 " : "/bin/sh ping -c 3 ") + host; 1149 | 1150 | Process process = Runtime.getRuntime().exec(cmd); 1151 | process.waitFor(); 1152 | 1153 | // 输出命令执行结果 1154 | return new String(process.getInputStream().readAllBytes(), isWindows ? "GBK" : "UTF-8"); 1155 | } 1156 | ``` 1157 | 1158 | 攻击者传入:`http://localhost:8080/CMD/pingRCE.do?host=baidu.com %26%26 whoami`,拼接后最终执行的系统命令:`cmd /c ping -n 3 baidu.com && whoami`,攻击者使用管道符`&&`实现了系统命令注入,即,在执行完ping命令成功后还执行了`whoami`,程序执行结果如下: 1159 | 1160 | ```bash 1161 | 正在 Ping baidu.com [110.242.68.66] 具有 32 字节的数据: 1162 | 来自 110.242.68.66 的回复: 字节=32 时间=11ms TTL=54 1163 | 来自 110.242.68.66 的回复: 字节=32 时间=11ms TTL=54 1164 | 来自 110.242.68.66 的回复: 字节=32 时间=11ms TTL=54 1165 | 1166 | 110.242.68.66 的 Ping 统计信息: 1167 | 数据包: 已发送 = 3,已接收 = 3,丢失 = 0 (0% 丢失), 1168 | 往返行程的估计时间(以毫秒为单位): 1169 | 最短 = 11ms,最长 = 11ms,平均 = 11ms 1170 | yzmm\yzmm 1171 | ``` 1172 | 1173 | 末尾的`yzmm\yzmm`是攻击者注入的`whoami`命令执行的结果,攻击者可以替换成任何其他恶意的系统命令。 1174 | 1175 | **示例 - 验证传入的host** 1176 | 1177 | ```java 1178 | @GetMapping("/ping.do") 1179 | public String ping(String host) throws IOException { 1180 | try { 1181 | // DNS解析传入的host,如果无法访问将会抛出UnknownHostException 1182 | InetAddress.getByName(host); 1183 | 1184 | boolean isWindows = System.getProperty("os.name").startsWith("Win"); 1185 | 1186 | // ping 3次目标主机 1187 | String cmd = (isWindows ? "cmd /c ping -n 3 " : "/bin/sh ping -c 3 ") + host; 1188 | 1189 | Process process = Runtime.getRuntime().exec(cmd); 1190 | process.waitFor(); 1191 | 1192 | // 输出命令执行结果 1193 | return new String(process.getInputStream().readAllBytes(), isWindows ? "GBK" : "UTF-8"); 1194 | } catch (UnknownHostException | InterruptedException e) { 1195 | return "主机无法访问!"; 1196 | } 1197 | } 1198 | ``` 1199 | 1200 | 这里除了可以使用DNS解析的方式验证传入的host是否合法意外,还可以通过正则表达式的方式,但由于正则表达式容易出现绕过和其他安全问题不推荐; 1201 | 1202 | 1203 | 1204 | ## 11. 模板引擎规范 1205 | 1206 | SSTI(`Server-Side Template Injection`)漏洞是一种常见的Web应用程序漏洞,发生在服务器端模板引擎处理用户输入时。这种漏洞允许攻击者在服务器上执行恶意模板代码,从而间接的控制Web应用服务器。 1207 | 1208 | 谨慎处理任何来源于请求的模板(例如:邮件、短信模板),禁止直接使用模板引擎渲染。 1209 | 1210 | **反例 - 模板注入漏洞** 1211 | 1212 | ```java 1213 | @GetMapping("/velocity.do") 1214 | public Map velocity(String tpl) { 1215 | StringWriter sw = new StringWriter(); 1216 | Velocity.evaluate(new VelocityContext(), sw, "tag", tpl); 1217 | 1218 | return new HashMap<>() {{ 1219 | put("data", sw.toString()); 1220 | }}; 1221 | } 1222 | 1223 | @GetMapping("/freemarker.do") 1224 | public Map freeMarker(String tpl) throws Exception { 1225 | StringWriter sw = new StringWriter(); 1226 | new Template(null, new StringReader(tpl), null).process(null, sw); 1227 | 1228 | return new HashMap<>() {{ 1229 | put("data", sw.toString()); 1230 | }}; 1231 | } 1232 | ``` 1233 | 1234 | **示例 - Velocity模板注入** 1235 | 1236 | ```java 1237 | http://localhost:8080/SSTI/velocity.do?tpl=%23set($e='e')%23set($c=$e.getClass().forName('org.apache.commons.io.IOUtils'))$c.getMethod('toString',$e.getClass().forName('java.io.InputStream')).invoke(null, $e.getClass().forName('java.lang.Runtime').getMethod('exec', $e.getClass().forName('java.lang.String')).invoke($e.getClass().forName('java.lang.Runtime').getMethod('getRuntime').invoke(null),'whoami').getInputStream()) 1238 | ``` 1239 | 1240 | **Velocity执行结果:** 1241 | 1242 | ```json 1243 | { 1244 | "data": "yzmm\\yzmm\r\n" 1245 | } 1246 | ``` 1247 | 1248 | 1249 | 1250 | ## 12. 验证码规范 1251 | 1252 | 强烈建议使用验证目的业务场景: 1253 | 1254 | 1. 用户登录、注册、找回密码、账号注销; 1255 | 2. 修改密码、修改安全设备、修改安全手机/邮件地址; 1256 | 3. 交易/支付、查看、删除、重置重要数据; 1257 | 1258 | 1259 | 1260 | ### 12.1 图形验证码 1261 | 1262 | 1. 验证码有效期不宜过长,必须设置有效时间; 1263 | 2. 图形验证码应考虑字符长度、字符扭曲、图像噪音、干扰线等必要因素,防止攻击者采用OCR技术识别; 1264 | 3. 确保验证码不重复使用,校验一次不管是否正确都必须清除缓存,以防止攻击者多次尝试相同的验证码; 1265 | 4. 禁止通过API接口返回验证码明文字符串,包括但不限于:Header、Cookie、JSON等; 1266 | 1267 | 1268 | 1269 | ### 12.2 短信/邮件验证码 1270 | 1271 | 1. 验证码有效期不宜过长(建议5分钟以内),必须设置有效时间; 1272 | 2. 验证码校验次数必须限制(原则上不得超过10次),防止攻击者通过API接口穷举验证码; 1273 | 3. 建议加密存储验证码,防止因为缓存泄露导致验证机制失效; 1274 | 4. 严格限制验证码发送频率,防止短信、邮件轰炸漏洞,可自行根据IP地址、用户ID、业务类型等条件限制; 1275 | 5. 验证码中应包含必要的安全提示,声明此验证码具体业务类型,防止钓鱼攻击; 1276 | 6. 选择可信赖的短信和邮件服务提供商,防止中间人劫持; 1277 | 7. 妥善保存短信、邮件平台的安全密钥信息; 1278 | 1279 | 1280 | 1281 | ## 13. Token机制 1282 | 1283 | 敏感操作都必须添加Token/Referer校验,防止CSRF攻击。 1284 | 1285 | 这里以CSRF修改用户密码为例,假设修改密码接口没有添加Token校验,并没有验证旧密码的场景,攻击者可以构建一个用于修改用户密码的URL,诱骗用户访问该URL地址,从而悄无声息的修改用户密码。 1286 | 1287 | **攻击路线如下:** 1288 | 1289 | 1. 找到修改密码的URL地址,例如:https://xx.com/user/changePassWord.do?password=A123456; 1290 | 2. 诱骗用户访问此URL地址,或者使用中间人劫持的方式迫使用户访问该URL,例如,某个论坛存在此类漏洞,那么攻击者可以在论坛发帖,图片的URL地址指向这个恶意修改密码的接口地址,用户打开帖子的时候会自动加载图片,从而间接的带着有效的Cookie访问了此接口最终实现修改了用户密码; 1291 | 3. 服务器端校验用户身份信息并修改密码,攻击者重置了目标用户的密码; 1292 | 1293 | 当然,此类攻击行为可以应用于非常多的业务场景,例如:转账、修改安全设备、重置密码、删除文章等。因此,访问敏感的业务时必须校验Token或图形验证码,参考流程如下: 1294 | 1295 | 1. 访问重要业务时服务端生成并缓存Token,返回Token到客户端; 1296 | 2. 客户端访问接口时带上Token; 1297 | 3. 服务器校验Token、Referer,并移除Token; 1298 | 1299 | 1300 | 1301 | ## 14. 正则表达式规范 1302 | 1303 | 正则表达式是一种强大的文本处理工具,但在使用时需要小心谨慎,因为正则表达式在处理输入数据时非常容易出现规则绕过或其他安全问题。 1304 | 1305 | 在编写正则表达式时应当注意以下安全问题: 1306 | 1307 | 1. 大小写绕过,`Pattern.compile("test", Pattern.CASE_INSENSITIVE)`; 1308 | 2. 多行绕过,`Pattern.DOTALL、Pattern.MULTILINE`; 1309 | 3. 匹配单词时切勿使用忘记`\b`,如:`\btest\b`; 1310 | 4. 单行匹配时应明确匹配的范围,例如,完整匹配文本为:`test`,那么应该加上`^test$`,防止匹配范围绕过; 1311 | 5. 空白符、换行符和空格绕过,合理利用`\s`,例如,匹配文本:`id=123`,可能`id`或者`=`号后边可以有换行符或者空格; 1312 | 6. ReDOS正则回溯攻击; 1313 | 1314 | 1315 | 1316 | ### 14.1 ReDOS 1317 | 1318 | ReDoS(`Regular Expression Denial of Service`)正则表达式拒绝服务攻击,攻击者试图利用正则表达式引擎的特性来导致性能下降或拒绝服务攻击。ReDoS攻击的本质是通过构造恶意的正则表达式模式和输入数据,来使正则表达式引擎在匹配时执行大量回溯操作,从而耗尽计算资源或导致服务器不可用。 1319 | 1320 | 1321 | 1322 | **攻击原理:** 1323 | 1324 | ReDoS攻击的核心原理是正则表达式引擎的回溯机制。正则表达式通常使用回溯算法来寻找匹配的子串,而恶意构造的正则表达式模式和输入可以导致引擎在搜索匹配时不断回溯和尝试不同的路径。如果正则表达式模式允许大量的回溯,攻击者可以构造输入,使引擎在匹配时需要执行指数级别的回溯操作,导致性能下降或拒绝服务攻击。 1325 | 1326 | **示例 - ReDoS攻击** 1327 | 1328 | 正则表达式:`^(a+)+$` ,攻击者输入:`aaaaaaaaaa!` 1329 | 1330 | **匹配的过程如下:** 1331 | 1332 | 1. `(a+)` 匹配 `a`(1 次尝试); 1333 | 2. `(a+)` 匹配 `aa`(2 次尝试); 1334 | 3. `(a+)` 匹配 `aaa`(3 次尝试; 1335 | 4. ... 1336 | 5. `(a+)` 匹配 `aaaaaaaaaa`(10 次尝试); 1337 | 1338 | 对于正则表达式 `^(a+)+$` 和输入字符串 "aaaaaaaaaa!",匹配的次数应该是`2^10`次方次(即 1024 次尝试),而不是只匹配一次。这是因为正则表达式中的 `(a+)+` 允许多次回溯,以尝试不同的匹配路径,如果攻击者填充的数据过长就能实现拒绝服务攻击。 1339 | 1340 | **示例 - 存在ReDOS的正则表达式** 1341 | 1342 | ```js 1343 | – 英文名 1344 | 正则表达式: ^[a-zA-Z]+(([\'\,\.\- ][a-zA-Z ])? [a-zA-Z]*)*$ 1345 | Payload: aaaaaaaaaaaaaaaaaaa! 1346 | – Java 类名 1347 | 正则表达式: ^(([a-z])+.)+[A-Z]([a-z])+$ 1348 | Payload: aaaaaaaaaaaaaaaaaaa! 1349 | – 邮箱 1350 | 正则表达式: ^([a-zA-Z0-9]+)([\._-]?[a-zA-Z0-9]+)*@([a-zA-Z0- 1351 | 9]+)([\._-]?[a-zA-Z0-9]+)*([\.]{1}[a-zA-Z0-9]{2,})+$ 1352 | Payload: a@aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa! 1353 | 1354 | ``` 1355 | 1356 | 1357 | 1358 | ## 15. 多线程开发规范 1359 | 1360 | 在开发多线程、分布式业务时应当注意以下问题: 1361 | 1362 | 1. 竞态条件,多个线程同时访问共享资源或对象时可能导致条件竞争,破坏数据的一致性,因此需要使用锁、同步块或使用线程安全的数据结构等机制规避此类问题; 1363 | 2. 死锁, 当多个线程相互等待对方释放资源时可能导致死锁,需要设计合理的资源释放方案,如:避免循环等待条件、使用超时机制、按顺序获取锁等; 1364 | 3. 合理限制线程数、CPU、内存资源, 多线程应用程序可能耗尽系统资源,如:内存、CPU 和文件句柄等,因此需要限制线程数量; 1365 | 4. 使用线程安全的数据结构, 尽量使用线程安全的`Java.util.concurrent(JUC)`提供的对象,如:`java.util.concurrent.ConcurrentHashMap`,以避免在多线程环境中出现数据竞争和不一致性; 1366 | 5. 合理使用线程池,应当优先使用线程池管理线程而不是Thread类,JUC 提供了 `java.util.concurrent.ThreadPoolExecutor`类,用于创建和管理线程池。线程池可以有效地管理线程的生命周期,提高线程的复用,以及限制并发线程数量,从而提高应用程序的性能; 1367 | 6. 正确理解`Synchronized、ReentrantLock、ReadWriteLock、StampedLock、Condition`机制,搞清楚锁的类型、范围、使用场景等; 1368 | 1369 | 1370 | 1371 | ## 16. 开源框架/组件/中间件使用规范 1372 | 1373 | 开源产品在为程序开发提供便利的同时也带来了一些潜在的安全风险,早年的Struts2框架是最为流行的MVC框架,曾一度因为安全问题严重的影响了整个互联网安全。 1374 | 1375 | 除此之外,JBoss、Weblogic、FastJson、Log4j2等诸多漏洞犹如洪水猛兽疯狂的威胁着业务系统安全。为了避免因使用第三方的产品和技术带来的安全问题,在技术选型时应当优先选择安全性高、易用性强的技术或产品。 1376 | 1377 | 以下列举一些技术选型方案: 1378 | 1379 | 1. 所选择的任何框架、中间件、组件都需严格确认没有已知的安全问题,例如`Maven/Gradle`依赖可使用`MurphySec Code Scan、Checkmarx`等检测后不存在安全风险方可使用,可借助CNVD、CVE的漏洞库确认所使用的版本是否存在安全问题; 1380 | 2. 慎用或不用高风险组件解析请求参数,如:`Fastjson、XMLDecoder、XStream、Shiro`,全面禁用`Fastjson1`; 1381 | 3. 中间件需修改默认口令、有默认密钥的必须重置,有未授权访问的服务应当修改绑定地址到`127.0.0.1`,禁止在内网或公网提供服务,例如:`ElasticSearch、Apache Solr、Spring Actuator、Redis`; 1382 | 4. 禁止在生产环境中使用Swagger、Tomcat/Java等远程调试模式,防止信息泄露和远程代码执行漏洞; 1383 | 5. 新项目禁用或不用一些已过时或存在非常多安全问题的技术,如:`Struts2、JDK<=1.6、Apache Axis、JSP、JSF、DWR、Java Applets`等; 1384 | 6. 禁用有开源协议风险的组件,如:GPL(`GNU General Public License`,GNU通用公共许可证)、LGPL(`GNU Lesser General Public License`,GNU较宽松通用公共许可证)等; 1385 | 7. 禁用盗版、破解类或其他侵害他人著作权的产品; 1386 | 8. 禁用活跃度过低的开源产品; 1387 | 1388 | 1389 | 1390 | ## 17. 版本管理规范 1391 | 1392 | 版本管理规范是一个重要的开发实践,可以确保团队在代码的版本控制和协作方面具有一致性。以下是一些关于版本管理规范的最佳实践: 1393 | 1394 | 1. 严厉禁止将涉密或内部产品源码提交到Github或者其他开源平台; 1395 | 2. 妥善保管版本管理工具的Key或密码,严禁以任何形式公开访问权限; 1396 | 3. 禁止外借个人凭证、窃取他人账号; 1397 | 4. 版本库应当采取严格的权限控制,遵循最小权限原则; 1398 | 5. Git尽可能使用SSH Key而不是使用密码访问; 1399 | 6. 原则上禁止强制推送(`Force Push`)操作,因为会破坏Git仓库的历史记录,应该限制其使用,或者只允许管理员执行; 1400 | 7. 如果使用Gitlab应当强制开启2FA验证; 1401 | 8. 提交代码时应当清楚的记录修改信息; 1402 | 9. 主分支保护机制,禁止低权限的开发者将Dev分支的代码合并到Master; 1403 | 10. 禁止提交敏感信息,例如:API密钥、个人密码等,可使用`.gitignore`来排除敏感文件; 1404 | 11. 定期更新版本管理工具,建议启用版本库自动更新、安全检查和代码审计插件; 1405 | 12. 版本库应当定期全量备份,备份文件必须加密存储并将文件同步到专用的备份服务器; 1406 | 13. 代码提交时务必自行审计,建议项目组内交叉审计,尤其是合并他人代码时应当谨慎操作; 1407 | 1408 | 1409 | 1410 | ## 18. Java反序列化规范 1411 | 1412 | Java序列化对象因其可以方便的将对象转换成字节数组,又可以方便快速的将字节数组反序列化成Java对象而被非常频繁的被用于`Socket`传输。 在`RMI(Java远程方法调用-Java Remote Method Invocation)`和`JMX(Java管理扩展-Java Management Extensions)`服务中对象反序列化机制被强制性使用。在Http请求中也时常会被用到反序列化机制,如:直接接收序列化请求的后端服务、使用Base编码序列化字节字符串的方式传递等。 1413 | 1414 | 自从2015年[Apache Commons Collections反序列化漏洞](https://issues.apache.org/jira/browse/COLLECTIONS-580)利用方式被公开后无数的使用了反序列化机制的Java应用系统惨遭黑客疯狂的攻击,为企业安全甚至是国家安全带来了沉重的打击! 1415 | 1416 | Java反序列化应当遵循以下规范: 1417 | 1418 | 1. 原则上禁止使用RMI技术; 1419 | 2. 建议禁用JNDI中的:`iiop://、iiopname://、corbaname://、ldap://、rmi://`协议; 1420 | 3. 原则上禁止使用Java对象反序列化(`java.io.ObjectInputStream#readObject`),如必须使用应当自行重写`java.io.ObjectInputStream#resolveClass/resolveProxyClass`添加禁止反序列化的类黑名单,或使用RASP防御Web业务系统; 1421 | 4. 使用高版本的JDK,JDK 8u191以上; 1422 | 5. 限制外部网络访问,原则上生产环境禁止访问外网服务,防止外部JNDI注入攻击; 1423 | 6. 慎用使用了Java对象反序列化的框架或服务,例如:`Weblogic、Shiro、Hessian`等; 1424 | 1425 | 1426 | 1427 | ## 19. 安全工具链 1428 | 1429 | 在开发阶段应当借助一些安全开发工具链来完善Web安全,合理的使用安全开发工具可以将安全问题扼杀于编码阶段。 1430 | 1431 | **SAST** 1432 | 1433 | SAST(`Static Application Security Testing`,静态应用程序安全测试),SAST工具通过扫描并分析程序源代码或编译后的代码,检查潜在的安全问题,如漏洞、弱点和缺陷。 1434 | 1435 | 1436 | 1437 | **DAST** 1438 | 1439 | DAST(`Dynamic Application Security Testing`,动态应用程序安全测试)是一种应用程序安全测试技术,用于检测和评估正在运行的应用程序的安全性。DAST与SAST不同,它不关注应用程序的源代码,而是专注于应用程序的运行时行为。 1440 | 1441 | 1442 | 1443 | **RASP** 1444 | 1445 | 运行时应用程序自我保护(`Runtime application self-protection`,简称`RASP`)使用Java Agent技术在应用程序运行时候动态编辑类字节码,将自身防御逻辑注入到Java底层API和Web应用程序当中,从而与应用程序融为一体,能实时分析和检测Web攻击,使应用程序具备自我保护能力。 1446 | 1447 | RASP技术作为新兴的WEB防御方案,不但能够有效的防御传统WAF无法实现的攻击类型,更能够大幅提升对攻击者攻击行为的检测精准度。RASP是传统WAF的坚实后盾,能够弥补WAF无法获取Web应用`运行时`环境的缺陷,同时也是传统Web应用服务最重要的不可或缺的一道安全防线。 1448 | 1449 | 1450 | 1451 | **IAST** 1452 | 1453 | IAST(`Interactive Application Security Testing`,交互式应用程序安全测试)结合了SAST和DAST的特点技术原理同RASP,它在应用程序运行时监控应用程序的行为,同时也分析应用程序的源代码和配置。IAST能够在实际执行应用程序时检测漏洞,提供更精确的漏洞报告。 1454 | 1455 | 1456 | 1457 | **SCA** 1458 | 1459 | SCA(`Software Composition Analysis`,软件构成分析),SCA工具通过分析应用程序的依赖关系,特别是开源库和组件,来检测已知的漏洞和安全问题。它们会扫描项目中使用的各种依赖项,并与已知漏洞数据库进行比对,以识别潜在的风险。 1460 | 1461 | SCA解决了使用开源库和组件时的安全风险。它们有助于防止已知漏洞的利用,确保依赖项的版本是最新且没有已知的安全问题。这可以降低应用程序受到依赖项漏洞攻击的风险,提高应用程序的整体安全性。 1462 | 1463 | [MurphySec Code Scan](https://plugins.jetbrains.com/plugin/18274-murphysec-code-scan)是墨菲安全推出的一款免费的JetBrains IDE插件,让开发者在 IDE 中即可检测代码依赖的安全问题,轻松识别代码中使用了哪些存在安全缺陷的开源组件,通过准确的修复方案和一键修复功能,快速解决安全问题; 1464 | 1465 | 1466 | 1467 | 1468 | 1469 | -------------------------------------------------------------------------------- /mvnw: -------------------------------------------------------------------------------- 1 | #!/bin/sh 2 | # ---------------------------------------------------------------------------- 3 | # Licensed to the Apache Software Foundation (ASF) under one 4 | # or more contributor license agreements. See the NOTICE file 5 | # distributed with this work for additional information 6 | # regarding copyright ownership. The ASF licenses this file 7 | # to you under the Apache License, Version 2.0 (the 8 | # "License"); you may not use this file except in compliance 9 | # with the License. You may obtain a copy of the License at 10 | # 11 | # https://www.apache.org/licenses/LICENSE-2.0 12 | # 13 | # Unless required by applicable law or agreed to in writing, 14 | # software distributed under the License is distributed on an 15 | # "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY 16 | # KIND, either express or implied. See the License for the 17 | # specific language governing permissions and limitations 18 | # under the License. 19 | # ---------------------------------------------------------------------------- 20 | 21 | # ---------------------------------------------------------------------------- 22 | # Apache Maven Wrapper startup batch script, version 3.2.0 23 | # 24 | # Required ENV vars: 25 | # ------------------ 26 | # JAVA_HOME - location of a JDK home dir 27 | # 28 | # Optional ENV vars 29 | # ----------------- 30 | # MAVEN_OPTS - parameters passed to the Java VM when running Maven 31 | # e.g. to debug Maven itself, use 32 | # set MAVEN_OPTS=-Xdebug -Xrunjdwp:transport=dt_socket,server=y,suspend=y,address=8000 33 | # MAVEN_SKIP_RC - flag to disable loading of mavenrc files 34 | # ---------------------------------------------------------------------------- 35 | 36 | if [ -z "$MAVEN_SKIP_RC" ] ; then 37 | 38 | if [ -f /usr/local/etc/mavenrc ] ; then 39 | . /usr/local/etc/mavenrc 40 | fi 41 | 42 | if [ -f /etc/mavenrc ] ; then 43 | . /etc/mavenrc 44 | fi 45 | 46 | if [ -f "$HOME/.mavenrc" ] ; then 47 | . "$HOME/.mavenrc" 48 | fi 49 | 50 | fi 51 | 52 | # OS specific support. $var _must_ be set to either true or false. 53 | cygwin=false; 54 | darwin=false; 55 | mingw=false 56 | case "$(uname)" in 57 | CYGWIN*) cygwin=true ;; 58 | MINGW*) mingw=true;; 59 | Darwin*) darwin=true 60 | # Use /usr/libexec/java_home if available, otherwise fall back to /Library/Java/Home 61 | # See https://developer.apple.com/library/mac/qa/qa1170/_index.html 62 | if [ -z "$JAVA_HOME" ]; then 63 | if [ -x "/usr/libexec/java_home" ]; then 64 | JAVA_HOME="$(/usr/libexec/java_home)"; export JAVA_HOME 65 | else 66 | JAVA_HOME="/Library/Java/Home"; export JAVA_HOME 67 | fi 68 | fi 69 | ;; 70 | esac 71 | 72 | if [ -z "$JAVA_HOME" ] ; then 73 | if [ -r /etc/gentoo-release ] ; then 74 | JAVA_HOME=$(java-config --jre-home) 75 | fi 76 | fi 77 | 78 | # For Cygwin, ensure paths are in UNIX format before anything is touched 79 | if $cygwin ; then 80 | [ -n "$JAVA_HOME" ] && 81 | JAVA_HOME=$(cygpath --unix "$JAVA_HOME") 82 | [ -n "$CLASSPATH" ] && 83 | CLASSPATH=$(cygpath --path --unix "$CLASSPATH") 84 | fi 85 | 86 | # For Mingw, ensure paths are in UNIX format before anything is touched 87 | if $mingw ; then 88 | [ -n "$JAVA_HOME" ] && [ -d "$JAVA_HOME" ] && 89 | JAVA_HOME="$(cd "$JAVA_HOME" || (echo "cannot cd into $JAVA_HOME."; exit 1); pwd)" 90 | fi 91 | 92 | if [ -z "$JAVA_HOME" ]; then 93 | javaExecutable="$(which javac)" 94 | if [ -n "$javaExecutable" ] && ! [ "$(expr "\"$javaExecutable\"" : '\([^ ]*\)')" = "no" ]; then 95 | # readlink(1) is not available as standard on Solaris 10. 96 | readLink=$(which readlink) 97 | if [ ! "$(expr "$readLink" : '\([^ ]*\)')" = "no" ]; then 98 | if $darwin ; then 99 | javaHome="$(dirname "\"$javaExecutable\"")" 100 | javaExecutable="$(cd "\"$javaHome\"" && pwd -P)/javac" 101 | else 102 | javaExecutable="$(readlink -f "\"$javaExecutable\"")" 103 | fi 104 | javaHome="$(dirname "\"$javaExecutable\"")" 105 | javaHome=$(expr "$javaHome" : '\(.*\)/bin') 106 | JAVA_HOME="$javaHome" 107 | export JAVA_HOME 108 | fi 109 | fi 110 | fi 111 | 112 | if [ -z "$JAVACMD" ] ; then 113 | if [ -n "$JAVA_HOME" ] ; then 114 | if [ -x "$JAVA_HOME/jre/sh/java" ] ; then 115 | # IBM's JDK on AIX uses strange locations for the executables 116 | JAVACMD="$JAVA_HOME/jre/sh/java" 117 | else 118 | JAVACMD="$JAVA_HOME/bin/java" 119 | fi 120 | else 121 | JAVACMD="$(\unset -f command 2>/dev/null; \command -v java)" 122 | fi 123 | fi 124 | 125 | if [ ! -x "$JAVACMD" ] ; then 126 | echo "Error: JAVA_HOME is not defined correctly." >&2 127 | echo " We cannot execute $JAVACMD" >&2 128 | exit 1 129 | fi 130 | 131 | if [ -z "$JAVA_HOME" ] ; then 132 | echo "Warning: JAVA_HOME environment variable is not set." 133 | fi 134 | 135 | # traverses directory structure from process work directory to filesystem root 136 | # first directory with .mvn subdirectory is considered project base directory 137 | find_maven_basedir() { 138 | if [ -z "$1" ] 139 | then 140 | echo "Path not specified to find_maven_basedir" 141 | return 1 142 | fi 143 | 144 | basedir="$1" 145 | wdir="$1" 146 | while [ "$wdir" != '/' ] ; do 147 | if [ -d "$wdir"/.mvn ] ; then 148 | basedir=$wdir 149 | break 150 | fi 151 | # workaround for JBEAP-8937 (on Solaris 10/Sparc) 152 | if [ -d "${wdir}" ]; then 153 | wdir=$(cd "$wdir/.." || exit 1; pwd) 154 | fi 155 | # end of workaround 156 | done 157 | printf '%s' "$(cd "$basedir" || exit 1; pwd)" 158 | } 159 | 160 | # concatenates all lines of a file 161 | concat_lines() { 162 | if [ -f "$1" ]; then 163 | # Remove \r in case we run on Windows within Git Bash 164 | # and check out the repository with auto CRLF management 165 | # enabled. Otherwise, we may read lines that are delimited with 166 | # \r\n and produce $'-Xarg\r' rather than -Xarg due to word 167 | # splitting rules. 168 | tr -s '\r\n' ' ' < "$1" 169 | fi 170 | } 171 | 172 | log() { 173 | if [ "$MVNW_VERBOSE" = true ]; then 174 | printf '%s\n' "$1" 175 | fi 176 | } 177 | 178 | BASE_DIR=$(find_maven_basedir "$(dirname "$0")") 179 | if [ -z "$BASE_DIR" ]; then 180 | exit 1; 181 | fi 182 | 183 | MAVEN_PROJECTBASEDIR=${MAVEN_BASEDIR:-"$BASE_DIR"}; export MAVEN_PROJECTBASEDIR 184 | log "$MAVEN_PROJECTBASEDIR" 185 | 186 | ########################################################################################## 187 | # Extension to allow automatically downloading the maven-wrapper.jar from Maven-central 188 | # This allows using the maven wrapper in projects that prohibit checking in binary data. 189 | ########################################################################################## 190 | wrapperJarPath="$MAVEN_PROJECTBASEDIR/.mvn/wrapper/maven-wrapper.jar" 191 | if [ -r "$wrapperJarPath" ]; then 192 | log "Found $wrapperJarPath" 193 | else 194 | log "Couldn't find $wrapperJarPath, downloading it ..." 195 | 196 | if [ -n "$MVNW_REPOURL" ]; then 197 | wrapperUrl="$MVNW_REPOURL/org/apache/maven/wrapper/maven-wrapper/3.2.0/maven-wrapper-3.2.0.jar" 198 | else 199 | wrapperUrl="https://repo.maven.apache.org/maven2/org/apache/maven/wrapper/maven-wrapper/3.2.0/maven-wrapper-3.2.0.jar" 200 | fi 201 | while IFS="=" read -r key value; do 202 | # Remove '\r' from value to allow usage on windows as IFS does not consider '\r' as a separator ( considers space, tab, new line ('\n'), and custom '=' ) 203 | safeValue=$(echo "$value" | tr -d '\r') 204 | case "$key" in (wrapperUrl) wrapperUrl="$safeValue"; break ;; 205 | esac 206 | done < "$MAVEN_PROJECTBASEDIR/.mvn/wrapper/maven-wrapper.properties" 207 | log "Downloading from: $wrapperUrl" 208 | 209 | if $cygwin; then 210 | wrapperJarPath=$(cygpath --path --windows "$wrapperJarPath") 211 | fi 212 | 213 | if command -v wget > /dev/null; then 214 | log "Found wget ... using wget" 215 | [ "$MVNW_VERBOSE" = true ] && QUIET="" || QUIET="--quiet" 216 | if [ -z "$MVNW_USERNAME" ] || [ -z "$MVNW_PASSWORD" ]; then 217 | wget $QUIET "$wrapperUrl" -O "$wrapperJarPath" || rm -f "$wrapperJarPath" 218 | else 219 | wget $QUIET --http-user="$MVNW_USERNAME" --http-password="$MVNW_PASSWORD" "$wrapperUrl" -O "$wrapperJarPath" || rm -f "$wrapperJarPath" 220 | fi 221 | elif command -v curl > /dev/null; then 222 | log "Found curl ... using curl" 223 | [ "$MVNW_VERBOSE" = true ] && QUIET="" || QUIET="--silent" 224 | if [ -z "$MVNW_USERNAME" ] || [ -z "$MVNW_PASSWORD" ]; then 225 | curl $QUIET -o "$wrapperJarPath" "$wrapperUrl" -f -L || rm -f "$wrapperJarPath" 226 | else 227 | curl $QUIET --user "$MVNW_USERNAME:$MVNW_PASSWORD" -o "$wrapperJarPath" "$wrapperUrl" -f -L || rm -f "$wrapperJarPath" 228 | fi 229 | else 230 | log "Falling back to using Java to download" 231 | javaSource="$MAVEN_PROJECTBASEDIR/.mvn/wrapper/MavenWrapperDownloader.java" 232 | javaClass="$MAVEN_PROJECTBASEDIR/.mvn/wrapper/MavenWrapperDownloader.class" 233 | # For Cygwin, switch paths to Windows format before running javac 234 | if $cygwin; then 235 | javaSource=$(cygpath --path --windows "$javaSource") 236 | javaClass=$(cygpath --path --windows "$javaClass") 237 | fi 238 | if [ -e "$javaSource" ]; then 239 | if [ ! -e "$javaClass" ]; then 240 | log " - Compiling MavenWrapperDownloader.java ..." 241 | ("$JAVA_HOME/bin/javac" "$javaSource") 242 | fi 243 | if [ -e "$javaClass" ]; then 244 | log " - Running MavenWrapperDownloader.java ..." 245 | ("$JAVA_HOME/bin/java" -cp .mvn/wrapper MavenWrapperDownloader "$wrapperUrl" "$wrapperJarPath") || rm -f "$wrapperJarPath" 246 | fi 247 | fi 248 | fi 249 | fi 250 | ########################################################################################## 251 | # End of extension 252 | ########################################################################################## 253 | 254 | # If specified, validate the SHA-256 sum of the Maven wrapper jar file 255 | wrapperSha256Sum="" 256 | while IFS="=" read -r key value; do 257 | case "$key" in (wrapperSha256Sum) wrapperSha256Sum=$value; break ;; 258 | esac 259 | done < "$MAVEN_PROJECTBASEDIR/.mvn/wrapper/maven-wrapper.properties" 260 | if [ -n "$wrapperSha256Sum" ]; then 261 | wrapperSha256Result=false 262 | if command -v sha256sum > /dev/null; then 263 | if echo "$wrapperSha256Sum $wrapperJarPath" | sha256sum -c > /dev/null 2>&1; then 264 | wrapperSha256Result=true 265 | fi 266 | elif command -v shasum > /dev/null; then 267 | if echo "$wrapperSha256Sum $wrapperJarPath" | shasum -a 256 -c > /dev/null 2>&1; then 268 | wrapperSha256Result=true 269 | fi 270 | else 271 | echo "Checksum validation was requested but neither 'sha256sum' or 'shasum' are available." 272 | echo "Please install either command, or disable validation by removing 'wrapperSha256Sum' from your maven-wrapper.properties." 273 | exit 1 274 | fi 275 | if [ $wrapperSha256Result = false ]; then 276 | echo "Error: Failed to validate Maven wrapper SHA-256, your Maven wrapper might be compromised." >&2 277 | echo "Investigate or delete $wrapperJarPath to attempt a clean download." >&2 278 | echo "If you updated your Maven version, you need to update the specified wrapperSha256Sum property." >&2 279 | exit 1 280 | fi 281 | fi 282 | 283 | MAVEN_OPTS="$(concat_lines "$MAVEN_PROJECTBASEDIR/.mvn/jvm.config") $MAVEN_OPTS" 284 | 285 | # For Cygwin, switch paths to Windows format before running java 286 | if $cygwin; then 287 | [ -n "$JAVA_HOME" ] && 288 | JAVA_HOME=$(cygpath --path --windows "$JAVA_HOME") 289 | [ -n "$CLASSPATH" ] && 290 | CLASSPATH=$(cygpath --path --windows "$CLASSPATH") 291 | [ -n "$MAVEN_PROJECTBASEDIR" ] && 292 | MAVEN_PROJECTBASEDIR=$(cygpath --path --windows "$MAVEN_PROJECTBASEDIR") 293 | fi 294 | 295 | # Provide a "standardized" way to retrieve the CLI args that will 296 | # work with both Windows and non-Windows executions. 297 | MAVEN_CMD_LINE_ARGS="$MAVEN_CONFIG $*" 298 | export MAVEN_CMD_LINE_ARGS 299 | 300 | WRAPPER_LAUNCHER=org.apache.maven.wrapper.MavenWrapperMain 301 | 302 | # shellcheck disable=SC2086 # safe args 303 | exec "$JAVACMD" \ 304 | $MAVEN_OPTS \ 305 | $MAVEN_DEBUG_OPTS \ 306 | -classpath "$MAVEN_PROJECTBASEDIR/.mvn/wrapper/maven-wrapper.jar" \ 307 | "-Dmaven.multiModuleProjectDirectory=${MAVEN_PROJECTBASEDIR}" \ 308 | ${WRAPPER_LAUNCHER} $MAVEN_CONFIG "$@" 309 | -------------------------------------------------------------------------------- /mvnw.cmd: -------------------------------------------------------------------------------- 1 | @REM ---------------------------------------------------------------------------- 2 | @REM Licensed to the Apache Software Foundation (ASF) under one 3 | @REM or more contributor license agreements. See the NOTICE file 4 | @REM distributed with this work for additional information 5 | @REM regarding copyright ownership. The ASF licenses this file 6 | @REM to you under the Apache License, Version 2.0 (the 7 | @REM "License"); you may not use this file except in compliance 8 | @REM with the License. You may obtain a copy of the License at 9 | @REM 10 | @REM https://www.apache.org/licenses/LICENSE-2.0 11 | @REM 12 | @REM Unless required by applicable law or agreed to in writing, 13 | @REM software distributed under the License is distributed on an 14 | @REM "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY 15 | @REM KIND, either express or implied. See the License for the 16 | @REM specific language governing permissions and limitations 17 | @REM under the License. 18 | @REM ---------------------------------------------------------------------------- 19 | 20 | @REM ---------------------------------------------------------------------------- 21 | @REM Apache Maven Wrapper startup batch script, version 3.2.0 22 | @REM 23 | @REM Required ENV vars: 24 | @REM JAVA_HOME - location of a JDK home dir 25 | @REM 26 | @REM Optional ENV vars 27 | @REM MAVEN_BATCH_ECHO - set to 'on' to enable the echoing of the batch commands 28 | @REM MAVEN_BATCH_PAUSE - set to 'on' to wait for a keystroke before ending 29 | @REM MAVEN_OPTS - parameters passed to the Java VM when running Maven 30 | @REM e.g. to debug Maven itself, use 31 | @REM set MAVEN_OPTS=-Xdebug -Xrunjdwp:transport=dt_socket,server=y,suspend=y,address=8000 32 | @REM MAVEN_SKIP_RC - flag to disable loading of mavenrc files 33 | @REM ---------------------------------------------------------------------------- 34 | 35 | @REM Begin all REM lines with '@' in case MAVEN_BATCH_ECHO is 'on' 36 | @echo off 37 | @REM set title of command window 38 | title %0 39 | @REM enable echoing by setting MAVEN_BATCH_ECHO to 'on' 40 | @if "%MAVEN_BATCH_ECHO%" == "on" echo %MAVEN_BATCH_ECHO% 41 | 42 | @REM set %HOME% to equivalent of $HOME 43 | if "%HOME%" == "" (set "HOME=%HOMEDRIVE%%HOMEPATH%") 44 | 45 | @REM Execute a user defined script before this one 46 | if not "%MAVEN_SKIP_RC%" == "" goto skipRcPre 47 | @REM check for pre script, once with legacy .bat ending and once with .cmd ending 48 | if exist "%USERPROFILE%\mavenrc_pre.bat" call "%USERPROFILE%\mavenrc_pre.bat" %* 49 | if exist "%USERPROFILE%\mavenrc_pre.cmd" call "%USERPROFILE%\mavenrc_pre.cmd" %* 50 | :skipRcPre 51 | 52 | @setlocal 53 | 54 | set ERROR_CODE=0 55 | 56 | @REM To isolate internal variables from possible post scripts, we use another setlocal 57 | @setlocal 58 | 59 | @REM ==== START VALIDATION ==== 60 | if not "%JAVA_HOME%" == "" goto OkJHome 61 | 62 | echo. 63 | echo Error: JAVA_HOME not found in your environment. >&2 64 | echo Please set the JAVA_HOME variable in your environment to match the >&2 65 | echo location of your Java installation. >&2 66 | echo. 67 | goto error 68 | 69 | :OkJHome 70 | if exist "%JAVA_HOME%\bin\java.exe" goto init 71 | 72 | echo. 73 | echo Error: JAVA_HOME is set to an invalid directory. >&2 74 | echo JAVA_HOME = "%JAVA_HOME%" >&2 75 | echo Please set the JAVA_HOME variable in your environment to match the >&2 76 | echo location of your Java installation. >&2 77 | echo. 78 | goto error 79 | 80 | @REM ==== END VALIDATION ==== 81 | 82 | :init 83 | 84 | @REM Find the project base dir, i.e. the directory that contains the folder ".mvn". 85 | @REM Fallback to current working directory if not found. 86 | 87 | set MAVEN_PROJECTBASEDIR=%MAVEN_BASEDIR% 88 | IF NOT "%MAVEN_PROJECTBASEDIR%"=="" goto endDetectBaseDir 89 | 90 | set EXEC_DIR=%CD% 91 | set WDIR=%EXEC_DIR% 92 | :findBaseDir 93 | IF EXIST "%WDIR%"\.mvn goto baseDirFound 94 | cd .. 95 | IF "%WDIR%"=="%CD%" goto baseDirNotFound 96 | set WDIR=%CD% 97 | goto findBaseDir 98 | 99 | :baseDirFound 100 | set MAVEN_PROJECTBASEDIR=%WDIR% 101 | cd "%EXEC_DIR%" 102 | goto endDetectBaseDir 103 | 104 | :baseDirNotFound 105 | set MAVEN_PROJECTBASEDIR=%EXEC_DIR% 106 | cd "%EXEC_DIR%" 107 | 108 | :endDetectBaseDir 109 | 110 | IF NOT EXIST "%MAVEN_PROJECTBASEDIR%\.mvn\jvm.config" goto endReadAdditionalConfig 111 | 112 | @setlocal EnableExtensions EnableDelayedExpansion 113 | for /F "usebackq delims=" %%a in ("%MAVEN_PROJECTBASEDIR%\.mvn\jvm.config") do set JVM_CONFIG_MAVEN_PROPS=!JVM_CONFIG_MAVEN_PROPS! %%a 114 | @endlocal & set JVM_CONFIG_MAVEN_PROPS=%JVM_CONFIG_MAVEN_PROPS% 115 | 116 | :endReadAdditionalConfig 117 | 118 | SET MAVEN_JAVA_EXE="%JAVA_HOME%\bin\java.exe" 119 | set WRAPPER_JAR="%MAVEN_PROJECTBASEDIR%\.mvn\wrapper\maven-wrapper.jar" 120 | set WRAPPER_LAUNCHER=org.apache.maven.wrapper.MavenWrapperMain 121 | 122 | set WRAPPER_URL="https://repo.maven.apache.org/maven2/org/apache/maven/wrapper/maven-wrapper/3.2.0/maven-wrapper-3.2.0.jar" 123 | 124 | FOR /F "usebackq tokens=1,2 delims==" %%A IN ("%MAVEN_PROJECTBASEDIR%\.mvn\wrapper\maven-wrapper.properties") DO ( 125 | IF "%%A"=="wrapperUrl" SET WRAPPER_URL=%%B 126 | ) 127 | 128 | @REM Extension to allow automatically downloading the maven-wrapper.jar from Maven-central 129 | @REM This allows using the maven wrapper in projects that prohibit checking in binary data. 130 | if exist %WRAPPER_JAR% ( 131 | if "%MVNW_VERBOSE%" == "true" ( 132 | echo Found %WRAPPER_JAR% 133 | ) 134 | ) else ( 135 | if not "%MVNW_REPOURL%" == "" ( 136 | SET WRAPPER_URL="%MVNW_REPOURL%/org/apache/maven/wrapper/maven-wrapper/3.2.0/maven-wrapper-3.2.0.jar" 137 | ) 138 | if "%MVNW_VERBOSE%" == "true" ( 139 | echo Couldn't find %WRAPPER_JAR%, downloading it ... 140 | echo Downloading from: %WRAPPER_URL% 141 | ) 142 | 143 | powershell -Command "&{"^ 144 | "$webclient = new-object System.Net.WebClient;"^ 145 | "if (-not ([string]::IsNullOrEmpty('%MVNW_USERNAME%') -and [string]::IsNullOrEmpty('%MVNW_PASSWORD%'))) {"^ 146 | "$webclient.Credentials = new-object System.Net.NetworkCredential('%MVNW_USERNAME%', '%MVNW_PASSWORD%');"^ 147 | "}"^ 148 | "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; $webclient.DownloadFile('%WRAPPER_URL%', '%WRAPPER_JAR%')"^ 149 | "}" 150 | if "%MVNW_VERBOSE%" == "true" ( 151 | echo Finished downloading %WRAPPER_JAR% 152 | ) 153 | ) 154 | @REM End of extension 155 | 156 | @REM If specified, validate the SHA-256 sum of the Maven wrapper jar file 157 | SET WRAPPER_SHA_256_SUM="" 158 | FOR /F "usebackq tokens=1,2 delims==" %%A IN ("%MAVEN_PROJECTBASEDIR%\.mvn\wrapper\maven-wrapper.properties") DO ( 159 | IF "%%A"=="wrapperSha256Sum" SET WRAPPER_SHA_256_SUM=%%B 160 | ) 161 | IF NOT %WRAPPER_SHA_256_SUM%=="" ( 162 | powershell -Command "&{"^ 163 | "$hash = (Get-FileHash \"%WRAPPER_JAR%\" -Algorithm SHA256).Hash.ToLower();"^ 164 | "If('%WRAPPER_SHA_256_SUM%' -ne $hash){"^ 165 | " Write-Output 'Error: Failed to validate Maven wrapper SHA-256, your Maven wrapper might be compromised.';"^ 166 | " Write-Output 'Investigate or delete %WRAPPER_JAR% to attempt a clean download.';"^ 167 | " Write-Output 'If you updated your Maven version, you need to update the specified wrapperSha256Sum property.';"^ 168 | " exit 1;"^ 169 | "}"^ 170 | "}" 171 | if ERRORLEVEL 1 goto error 172 | ) 173 | 174 | @REM Provide a "standardized" way to retrieve the CLI args that will 175 | @REM work with both Windows and non-Windows executions. 176 | set MAVEN_CMD_LINE_ARGS=%* 177 | 178 | %MAVEN_JAVA_EXE% ^ 179 | %JVM_CONFIG_MAVEN_PROPS% ^ 180 | %MAVEN_OPTS% ^ 181 | %MAVEN_DEBUG_OPTS% ^ 182 | -classpath %WRAPPER_JAR% ^ 183 | "-Dmaven.multiModuleProjectDirectory=%MAVEN_PROJECTBASEDIR%" ^ 184 | %WRAPPER_LAUNCHER% %MAVEN_CONFIG% %* 185 | if ERRORLEVEL 1 goto error 186 | goto end 187 | 188 | :error 189 | set ERROR_CODE=1 190 | 191 | :end 192 | @endlocal & set ERROR_CODE=%ERROR_CODE% 193 | 194 | if not "%MAVEN_SKIP_RC%"=="" goto skipRcPost 195 | @REM check for post script, once with legacy .bat ending and once with .cmd ending 196 | if exist "%USERPROFILE%\mavenrc_post.bat" call "%USERPROFILE%\mavenrc_post.bat" 197 | if exist "%USERPROFILE%\mavenrc_post.cmd" call "%USERPROFILE%\mavenrc_post.cmd" 198 | :skipRcPost 199 | 200 | @REM pause the script if MAVEN_BATCH_PAUSE is set to 'on' 201 | if "%MAVEN_BATCH_PAUSE%"=="on" pause 202 | 203 | if "%MAVEN_TERMINATE_CMD%"=="on" exit %ERROR_CODE% 204 | 205 | cmd /C exit /B %ERROR_CODE% 206 | -------------------------------------------------------------------------------- /pom.xml: -------------------------------------------------------------------------------- 1 | 2 | 4 | 5 | 6 | org.springframework.boot 7 | spring-boot-starter-parent 8 | 3.1.4 9 | 10 | 11 | 12 | org.javaweb 13 | javaweb-secure-coding 14 | 1.0.0 15 | javaweb-code 16 | 4.0.0 17 | 18 | 19 | 17 20 | 2.7.3 21 | 1.6.1 22 | 2.9.1 23 | 2.0.6.1 24 | 15.4 25 | 3.43.0.0 26 | 1.7 27 | 2.4.0.Final 28 | 2.11.0 29 | 3.13.0 30 | 3.0.2 31 | 4.0.1 32 | 33 | 34 | 35 | 36 | org.springframework.boot 37 | spring-boot-starter-web 38 | 39 | 40 | 41 | org.springframework.boot 42 | spring-boot-starter-jdbc 43 | 44 | 45 | 46 | org.springframework.boot 47 | spring-boot-starter-data-jpa 48 | 49 | 50 | 51 | org.hibernate.orm 52 | hibernate-community-dialects 53 | 54 | 55 | 56 | org.mybatis.spring.boot 57 | mybatis-spring-boot-starter 58 | ${mybatis-spring.version} 59 | 60 | 61 | 62 | org.apache.commons 63 | commons-lang3 64 | ${commons-lang3.version} 65 | 66 | 67 | 68 | commons-io 69 | commons-io 70 | ${commons-io.version} 71 | 72 | 73 | 74 | org.xerial 75 | sqlite-jdbc 76 | ${sqlite.version} 77 | 78 | 79 | 80 | dom4j 81 | dom4j 82 | ${dom4j.version} 83 | 84 | 85 | 86 | xerces 87 | xercesImpl 88 | ${xerces.version} 89 | 90 | 91 | 92 | org.jdom 93 | jdom2 94 | ${jdom2.version} 95 | 96 | 97 | 98 | jakarta.xml.bind 99 | jakarta.xml.bind-api 100 | ${jakarta.xml.bind.version} 101 | 102 | 103 | 104 | ognl 105 | ognl 106 | ${ognl.version} 107 | 108 | 109 | 110 | org.mvel 111 | mvel2 112 | ${mvel2.version} 113 | 114 | 115 | 116 | org.openjdk.nashorn 117 | nashorn-core 118 | ${nashorn.version} 119 | 120 | 121 | 122 | org.apache.velocity 123 | velocity 124 | ${velocity.version} 125 | 126 | 127 | 128 | org.freemarker 129 | freemarker 130 | ${freemarker.version} 131 | 132 | 133 | 134 | 135 | 136 | 137 | org.springframework.boot 138 | spring-boot-maven-plugin 139 | 140 | 141 | 142 | 143 | 144 | -------------------------------------------------------------------------------- /src/main/java/org/javaweb/code/config/JPAConfig.java: -------------------------------------------------------------------------------- 1 | package org.javaweb.code.config; 2 | 3 | import org.springframework.boot.autoconfigure.domain.EntityScan; 4 | import org.springframework.context.annotation.Configuration; 5 | import org.springframework.data.jpa.repository.config.EnableJpaRepositories; 6 | import org.springframework.transaction.annotation.EnableTransactionManagement; 7 | 8 | /** 9 | * Created by yz on 2017/4/7. 10 | */ 11 | @Configuration 12 | @EnableTransactionManagement 13 | @EntityScan(basePackages = "org.javaweb.code.entity") 14 | @EnableJpaRepositories(basePackages = "org.javaweb.code.repository") 15 | public class JPAConfig { 16 | 17 | } -------------------------------------------------------------------------------- /src/main/java/org/javaweb/code/config/JavaWebCodeApplication.java: -------------------------------------------------------------------------------- 1 | package org.javaweb.code.config; 2 | 3 | import org.mybatis.spring.annotation.MapperScan; 4 | import org.springframework.boot.SpringApplication; 5 | import org.springframework.boot.autoconfigure.SpringBootApplication; 6 | import org.springframework.scheduling.annotation.EnableAsync; 7 | 8 | @EnableAsync 9 | @MapperScan("org.javaweb.code.mapper") 10 | @SpringBootApplication(scanBasePackages = "org.javaweb.code.*") 11 | public class JavaWebCodeApplication { 12 | 13 | public static void main(String[] args) { 14 | SpringApplication.run(JavaWebCodeApplication.class, args); 15 | } 16 | 17 | } 18 | -------------------------------------------------------------------------------- /src/main/java/org/javaweb/code/controller/CMDController.java: -------------------------------------------------------------------------------- 1 | package org.javaweb.code.controller; 2 | 3 | import org.springframework.web.bind.annotation.GetMapping; 4 | import org.springframework.web.bind.annotation.RequestMapping; 5 | import org.springframework.web.bind.annotation.RestController; 6 | 7 | import java.io.IOException; 8 | import java.net.InetAddress; 9 | import java.net.UnknownHostException; 10 | import java.util.regex.Pattern; 11 | 12 | @RestController 13 | @RequestMapping("/CMD/") 14 | public class CMDController { 15 | 16 | @GetMapping("/ping.do") 17 | public String ping(String host) throws IOException { 18 | try { 19 | // DNS解析传入的host,如果无法访问将会抛出UnknownHostException 20 | InetAddress.getByName(host); 21 | 22 | boolean isWindows = System.getProperty("os.name").startsWith("Win"); 23 | 24 | // ping 3次目标主机 25 | String cmd = (isWindows ? "cmd /c ping -n 3 " : "/bin/sh ping -c 3 ") + host; 26 | 27 | Process process = Runtime.getRuntime().exec(cmd); 28 | process.waitFor(); 29 | 30 | // 输出命令执行结果 31 | return new String(process.getInputStream().readAllBytes(), isWindows ? "GBK" : "UTF-8"); 32 | } catch (UnknownHostException | InterruptedException e) { 33 | return "主机无法访问!"; 34 | } 35 | } 36 | 37 | @GetMapping("/pingRCE.do") 38 | public String pingRCE(String host) throws Exception { 39 | boolean isWindows = System.getProperty("os.name").startsWith("Win"); 40 | 41 | // ping 3次目标主机 42 | String cmd = (isWindows ? "cmd /c ping -n 3 " : "/bin/sh ping -c 3 ") + host; 43 | 44 | Process process = Runtime.getRuntime().exec(cmd); 45 | process.waitFor(); 46 | 47 | // 输出命令执行结果 48 | return new String(process.getInputStream().readAllBytes(), isWindows ? "GBK" : "UTF-8"); 49 | } 50 | 51 | public static void main(String[] args) { 52 | System.out.println(Pattern.compile("test\\s?spring",Pattern.MULTILINE).matcher("test\nspring").find()); 53 | } 54 | 55 | } 56 | -------------------------------------------------------------------------------- /src/main/java/org/javaweb/code/controller/ExpressionController.java: -------------------------------------------------------------------------------- 1 | package org.javaweb.code.controller; 2 | 3 | import ognl.OgnlContext; 4 | import ognl.OgnlException; 5 | import org.mvel2.MVEL; 6 | import org.springframework.expression.spel.standard.SpelExpressionParser; 7 | import org.springframework.web.bind.annotation.GetMapping; 8 | import org.springframework.web.bind.annotation.RequestMapping; 9 | import org.springframework.web.bind.annotation.RestController; 10 | 11 | import javax.script.ScriptEngineManager; 12 | import java.util.LinkedHashMap; 13 | import java.util.Map; 14 | 15 | @RestController 16 | @RequestMapping("/Expression/") 17 | public class ExpressionController { 18 | 19 | @GetMapping(value = "/ognl.do") 20 | public Map ognl(String exp) throws OgnlException { 21 | Map data = new LinkedHashMap<>(); 22 | ognl.OgnlContext context = new OgnlContext(); 23 | 24 | // 执行Ognl表达式 25 | data.put("data", ognl.Ognl.getValue(exp, context, context.getRoot())); 26 | 27 | return data; 28 | } 29 | 30 | @GetMapping(value = "/spEL.do") 31 | public Map spel(String exp) { 32 | Map data = new LinkedHashMap<>(); 33 | 34 | // 执行SpEL表达式 35 | data.put("data", new SpelExpressionParser().parseExpression(exp).getValue()); 36 | 37 | return data; 38 | } 39 | 40 | @GetMapping("/mvel.do") 41 | public Map mvel(String exp) { 42 | Map data = new LinkedHashMap<>(); 43 | 44 | // 执行MVEL2表达式 45 | data.put("data", MVEL.eval(exp)); 46 | 47 | return data; 48 | } 49 | 50 | @GetMapping("/scriptEngine.do") 51 | public Map scriptEngine(String exp) throws Exception { 52 | Map data = new LinkedHashMap<>(); 53 | 54 | // 执行Javascript 55 | Object eval = new ScriptEngineManager().getEngineByName("nashorn").eval(exp); 56 | data.put("data", eval.toString()); 57 | 58 | return data; 59 | } 60 | 61 | } 62 | -------------------------------------------------------------------------------- /src/main/java/org/javaweb/code/controller/SQLInjectionController.java: -------------------------------------------------------------------------------- 1 | package org.javaweb.code.controller; 2 | 3 | import jakarta.annotation.Resource; 4 | import org.apache.commons.io.FileUtils; 5 | import org.apache.commons.lang3.StringUtils; 6 | import org.javaweb.code.entity.SysUser; 7 | import org.javaweb.code.mapper.SysUserMapper; 8 | import org.javaweb.code.repository.SysUserRepository; 9 | import org.springframework.jdbc.core.JdbcTemplate; 10 | import org.springframework.jdbc.core.namedparam.NamedParameterJdbcTemplate; 11 | import org.springframework.web.bind.annotation.GetMapping; 12 | import org.springframework.web.bind.annotation.RequestMapping; 13 | import org.springframework.web.bind.annotation.RestController; 14 | 15 | import javax.sql.DataSource; 16 | import java.io.File; 17 | import java.sql.Connection; 18 | import java.sql.PreparedStatement; 19 | import java.sql.ResultSet; 20 | import java.sql.SQLException; 21 | import java.util.Arrays; 22 | import java.util.HashMap; 23 | import java.util.List; 24 | import java.util.Map; 25 | 26 | @RestController 27 | @RequestMapping("/SQL") 28 | public class SQLInjectionController { 29 | 30 | @Resource 31 | private SysUserMapper sysUserMapper; 32 | 33 | @Resource 34 | private JdbcTemplate jdbcTemplate; 35 | 36 | @Resource 37 | private NamedParameterJdbcTemplate namedParameterJdbcTemplate; 38 | 39 | @Resource 40 | private DataSource dataSource; 41 | 42 | @Resource 43 | private SysUserRepository sysUserRepository; 44 | 45 | @GetMapping("/Mybatis/mybatisStringQuery.do") 46 | public SysUser mybatisStringQuery(String username) { 47 | return sysUserMapper.mybatisStringQuery(username); 48 | } 49 | 50 | @GetMapping("/Mybatis/mybatisStringInjection.do") 51 | public SysUser mybatisStringInjection(String username) { 52 | return sysUserMapper.mybatisStringInjection(username); 53 | } 54 | 55 | @GetMapping("/Mybatis/mybatisOrderByQuery.do") 56 | public List mybatisOrderByQuery(String order, String orderType) { 57 | return sysUserMapper.mybatisOrderByQuery(order, orderType); 58 | } 59 | 60 | @GetMapping("/Mybatis/mybatisOrderByInjection.do") 61 | public List mybatisOrderByInjection(String order, String orderType) { 62 | return sysUserMapper.mybatisOrderByInjection(order, orderType); 63 | } 64 | 65 | @GetMapping("/Mybatis/mybatisLikeQuery.do") 66 | public List mybatisLikeQuery(String username) { 67 | return sysUserMapper.mybatisLikeQuery(username); 68 | } 69 | 70 | @GetMapping("/Mybatis/mybatisLikeInjection.do") 71 | public List mybatisLikeInjection(String username) { 72 | return sysUserMapper.mybatisLikeInjection(username); 73 | } 74 | 75 | @GetMapping("/Mybatis/mybatisWhereInQuery.do") 76 | public List mybatisWhereInQuery(String ids) { 77 | List idList = Arrays.asList(ids.split(",")); 78 | 79 | return sysUserMapper.mybatisWhereInQuery(idList); 80 | } 81 | 82 | @GetMapping("/Mybatis/mybatisWhereInInjection.do") 83 | public List mybatisWhereInInjection(String ids) { 84 | return sysUserMapper.mybatisWhereInInjection(ids); 85 | } 86 | 87 | @GetMapping("/JDBC/jdbcStringInjection.do") 88 | public SysUser jdbcStringInjection(String id) throws SQLException { 89 | // 获取数据库连接对象 90 | Connection connection = dataSource.getConnection(); 91 | 92 | String sql = "select * from sys_user where id = " + id; 93 | 94 | // 创建预编译对象 95 | PreparedStatement pstt = connection.prepareStatement(sql); 96 | 97 | // 提取查询结果集 98 | return extractResultSet(pstt); 99 | } 100 | 101 | @GetMapping("/JDBC/jdbcStringQuery.do") 102 | public SysUser jdbcStringQuery(String id) throws SQLException { 103 | // 获取数据库连接对象 104 | Connection connection = dataSource.getConnection(); 105 | 106 | String sql = "select * from sys_user where id = ? "; 107 | 108 | // SQL参数编译对象 109 | PreparedStatement pstt = connection.prepareStatement(sql); 110 | pstt.setObject(1, id); 111 | 112 | // 提取查询结果集 113 | return extractResultSet(pstt); 114 | } 115 | 116 | private SysUser extractResultSet(PreparedStatement pstt) throws SQLException { 117 | // 执行SQL并返回结果集 118 | ResultSet rs = pstt.executeQuery(); 119 | 120 | SysUser user = new SysUser(); 121 | 122 | while (rs.next()) { 123 | user.setId(rs.getLong("id")); 124 | user.setUsername(rs.getString("username")); 125 | user.setPassword(rs.getString("password")); 126 | user.setEmail(rs.getString("email")); 127 | user.setUserAvatar(rs.getString("user_avatar")); 128 | user.setRegisterTime(rs.getString("register_time")); 129 | user.setNotes(rs.getString("notes")); 130 | } 131 | 132 | return user; 133 | } 134 | 135 | @GetMapping("/Spring/jdbcTemplateStringInjection.do") 136 | public Map jdbcTemplateStringInjection(String username) { 137 | String sql = "select * from sys_user where username = '" + username + "'"; 138 | 139 | return jdbcTemplate.queryForMap(sql); 140 | } 141 | 142 | @GetMapping("/Spring/jdbcTemplateOrderByQuery.do") 143 | public List> jdbcTemplateOrderByQuery(String order, String orderType) { 144 | // 限制order by拼接的字段 145 | final String[] cols = "id,username,register_time".split(","); 146 | final String[] types = "desc,asc".split(","); 147 | StringBuilder sql = new StringBuilder("select * from sys_user"); 148 | 149 | // 安全的拼接order by SQL 150 | if (StringUtils.isNoneEmpty(order) && StringUtils.isNoneEmpty(orderType)) { 151 | order = org.apache.commons.lang3.ArrayUtils.contains(cols, order) ? order : "id"; 152 | orderType = org.apache.commons.lang3.ArrayUtils.contains(types, orderType) ? "desc" : "asc"; 153 | 154 | sql.append(" order by ").append(order).append(" ").append(orderType); 155 | } 156 | 157 | return jdbcTemplate.queryForList(sql.toString()); 158 | } 159 | 160 | @GetMapping("/Spring/jdbcTemplateOrderByAppendQuery.do") 161 | public List> jdbcTemplateOrderByAppendQuery(String order, String orderType) { 162 | StringBuilder sql = new StringBuilder("select * from sys_user"); 163 | 164 | if (StringUtils.isNoneEmpty(order)) { 165 | sql.append(" order by "); 166 | 167 | // 拼接排序规则 168 | if ("id".equalsIgnoreCase(order)) { 169 | sql.append("id"); 170 | } 171 | 172 | // 排序方式 173 | if ("desc".equalsIgnoreCase(orderType)) { 174 | sql.append(" desc "); 175 | } 176 | } 177 | 178 | return jdbcTemplate.queryForList(sql.toString()); 179 | } 180 | 181 | @GetMapping("/Spring/jdbcTemplateOrderByInjection.do") 182 | public List> jdbcTemplateOrderByInjection(String order, String orderType) { 183 | String sql = "select * from sys_user order by " + order + " " + orderType; 184 | 185 | return jdbcTemplate.queryForList(sql); 186 | } 187 | 188 | @GetMapping("/Spring/jdbcTemplateLikeQuery.do") 189 | public List> jdbcTemplateLikeQuery(String username) { 190 | String sql = "select * from sys_user where username like ? "; 191 | 192 | return jdbcTemplate.queryForList(sql, "%" + username + "%"); 193 | } 194 | 195 | @GetMapping("/Spring/jdbcTemplateLikeInjection.do") 196 | public List> jdbcTemplateLikeInjection(String username) { 197 | String sql = "select * from sys_user where username like '%" + username + "%'"; 198 | 199 | return jdbcTemplate.queryForList(sql); 200 | } 201 | 202 | @GetMapping("/Spring/jdbcTemplateWhereInInjection.do") 203 | public List> jdbcTemplateWhereInInjection(String ids) { 204 | String sql = "select * from sys_user where id in ( " + ids + " ) "; 205 | 206 | return jdbcTemplate.queryForList(sql); 207 | } 208 | 209 | @GetMapping("/Spring/jdbcTemplateWhereInQuery.do") 210 | public List> jdbcTemplateWhereInQuery(String ids) { 211 | String sql = "select * from sys_user where id in ( :ids ) "; 212 | 213 | // ids可以直接接String[]也可以 214 | List idList = Arrays.asList(ids.split(",")); 215 | 216 | Map sqlParameter = new HashMap<>(); 217 | sqlParameter.put("ids", idList); 218 | 219 | // 使用namedParameterJdbcTemplate而不是jdbcTemplate 220 | return namedParameterJdbcTemplate.queryForList(sql, sqlParameter); 221 | } 222 | 223 | @GetMapping("/JPA/jpaWhereInQuery.do") 224 | public List jpaWhereInQuery(String[] users) { 225 | return sysUserRepository.findByUsernameIn(Arrays.asList(users)); 226 | } 227 | 228 | @GetMapping("/JPA/jpaLikeQuery.do") 229 | public List jpaLikeQuery(String username) { 230 | return sysUserRepository.findByUsernameLike("%" + username + "%"); 231 | } 232 | 233 | @GetMapping("/JPA/jpaStringQuery.do") 234 | public SysUser jpaStringQuery(String username) { 235 | return sysUserRepository.findByUsername(username); 236 | } 237 | 238 | @GetMapping("/JPA/jpaLikeAndOrderByQuery.do") 239 | public List jpaLikeAndOrderByQuery(String username) { 240 | return sysUserRepository.findByUsernameLikeOrderByIdDesc("%" + username + "%"); 241 | } 242 | 243 | @GetMapping("/JPA/jpaUsernameBindTest.do") 244 | public SysUser jpaUsernameBindTest(String username) { 245 | return sysUserRepository.usernameQueryTest(username); 246 | } 247 | 248 | @GetMapping("/JPA/jpaEmailBindTest.do") 249 | public SysUser jpaEmailBindTest(String username) { 250 | return sysUserRepository.emailQueryTest(username); 251 | } 252 | 253 | @GetMapping("/JPA/jpaIdBindTest.do") 254 | public SysUser jpaIdBindTest(Long id) { 255 | return sysUserRepository.idQueryTest(id); 256 | } 257 | 258 | @GetMapping("/JPA/jpqlQuery.do") 259 | public Object jpqlQuery(String username) { 260 | return sysUserRepository.jpqlQuery(username); 261 | } 262 | 263 | @GetMapping("/JPA/jpqlInjection.do") 264 | public Object jpqlInjection(String username) { 265 | return sysUserRepository.jpqlInjection(username); 266 | } 267 | 268 | @GetMapping("/JPA/nativeQuery.do") 269 | public Object nativeQuery(String username) { 270 | return sysUserRepository.nativeQuery(username); 271 | } 272 | 273 | @GetMapping("/JPA/nativeInjection.do") 274 | public Object nativeInjection(String username) { 275 | return sysUserRepository.nativeInjection(username); 276 | } 277 | 278 | @GetMapping("/JPA/namedQuery.do") 279 | public Object namedQuery(String username) { 280 | return sysUserRepository.namedQuery(username); 281 | } 282 | 283 | @GetMapping("/JPA/criteriaQuery.do") 284 | public Object criteriaQuery(String username, String email) { 285 | return sysUserRepository.criteriaQuery(username, email); 286 | } 287 | 288 | public static void main(String[] args) throws Exception { 289 | // File f = new File("d:/323.txt/"); 290 | // FileUtils.writeStringToFile(f, "test5"); 291 | 292 | File file = new File("D:\\Documents\\Servers\\apache-tomcat-8.5.83\\conf\\catalina.properties..././"); 293 | System.out.println(FileUtils.readFileToString(file)); 294 | } 295 | 296 | } 297 | -------------------------------------------------------------------------------- /src/main/java/org/javaweb/code/controller/SSRFController.java: -------------------------------------------------------------------------------- 1 | package org.javaweb.code.controller; 2 | 3 | import org.apache.commons.io.IOUtils; 4 | import org.springframework.http.ResponseEntity; 5 | import org.springframework.web.bind.annotation.*; 6 | 7 | import java.net.URL; 8 | import java.net.URLConnection; 9 | 10 | import static org.springframework.http.HttpStatus.*; 11 | 12 | @RestController 13 | @RequestMapping("/SSRF/") 14 | public class SSRFController { 15 | 16 | @GetMapping("/urlConnection.do") 17 | public ResponseEntity urlConnection(String url) throws Exception { 18 | // 禁止url地址未经任何检测直接请求 19 | URLConnection connection = new URL(url).openConnection(); 20 | 21 | return new ResponseEntity<>(IOUtils.toByteArray(connection.getInputStream()), OK); 22 | } 23 | 24 | @GetMapping("/urlFilterConnection.do") 25 | public ResponseEntity urlFilterConnection(String url) throws Exception { 26 | URL u = new URL(url); 27 | 28 | // URL地址的域名,发起Http请求之前需要先校验域名是否合法 29 | String domain = u.getHost(); 30 | 31 | // 设置URL白名单(可在数据库、缓存、文件中配置) 32 | String[] hostWhitelist = "localhost,127.0.0.1".split(","); 33 | 34 | // URL的域名白名单检测(此处只校验了域名,有必要同时检测请求协议类型、请求端口) 35 | if (org.apache.commons.lang3.ArrayUtils.contains(hostWhitelist, domain)) { 36 | URLConnection connection = u.openConnection(); 37 | 38 | // 输出Http请求结果 39 | return new ResponseEntity<>(IOUtils.toByteArray(connection.getInputStream()), OK); 40 | } 41 | 42 | // 输出403错误信息 43 | return new ResponseEntity<>("Forbidden".getBytes(), FORBIDDEN); 44 | } 45 | 46 | } 47 | -------------------------------------------------------------------------------- /src/main/java/org/javaweb/code/controller/SSTIController.java: -------------------------------------------------------------------------------- 1 | package org.javaweb.code.controller; 2 | 3 | import freemarker.template.Template; 4 | import org.apache.velocity.VelocityContext; 5 | import org.apache.velocity.app.Velocity; 6 | import org.springframework.web.bind.annotation.GetMapping; 7 | import org.springframework.web.bind.annotation.RequestMapping; 8 | import org.springframework.web.bind.annotation.RestController; 9 | 10 | import java.io.StringReader; 11 | import java.io.StringWriter; 12 | import java.util.HashMap; 13 | import java.util.Map; 14 | 15 | @RestController 16 | @RequestMapping("/SSTI/") 17 | public class SSTIController { 18 | 19 | @GetMapping("/velocity.do") 20 | public Map velocity(String tpl) { 21 | StringWriter sw = new StringWriter(); 22 | Velocity.evaluate(new VelocityContext(), sw, "tag", tpl); 23 | 24 | return new HashMap<>() {{ 25 | put("data", sw.toString()); 26 | }}; 27 | } 28 | 29 | @GetMapping("/freemarker.do") 30 | public Map freeMarker(String tpl) throws Exception { 31 | StringWriter sw = new StringWriter(); 32 | new Template(null, new StringReader(tpl), null).process(null, sw); 33 | 34 | return new HashMap<>() {{ 35 | put("data", sw.toString()); 36 | }}; 37 | } 38 | 39 | } -------------------------------------------------------------------------------- /src/main/java/org/javaweb/code/controller/XPathController.java: -------------------------------------------------------------------------------- 1 | package org.javaweb.code.controller; 2 | 3 | import org.springframework.web.bind.annotation.GetMapping; 4 | import org.springframework.web.bind.annotation.RequestMapping; 5 | import org.springframework.web.bind.annotation.RestController; 6 | import org.w3c.dom.Document; 7 | import org.w3c.dom.NodeList; 8 | import org.xml.sax.InputSource; 9 | 10 | import javax.xml.namespace.QName; 11 | import javax.xml.parsers.DocumentBuilder; 12 | import javax.xml.parsers.DocumentBuilderFactory; 13 | import javax.xml.xpath.*; 14 | import java.io.StringReader; 15 | import java.util.HashMap; 16 | import java.util.Map; 17 | 18 | @RestController 19 | @RequestMapping("/XPath/") 20 | public class XPathController { 21 | 22 | private static final String USERS_XML = "" + 23 | " " + 24 | " admin" + 25 | " admin123" + 26 | " " + 27 | " " + 28 | " user1" + 29 | " pass123" + 30 | " " + 31 | ""; 32 | 33 | @GetMapping("/xpathInjection.do") 34 | public Map xpathInjection(String username, String password) { 35 | Map data = new HashMap<>(); 36 | DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); 37 | 38 | try { 39 | DocumentBuilder builder = factory.newDocumentBuilder(); 40 | InputSource inputSource = new InputSource(new StringReader(USERS_XML)); 41 | Document document = builder.parse(inputSource); 42 | XPathFactory xPathFactory = XPathFactory.newInstance(); 43 | XPath xpath = xPathFactory.newXPath(); 44 | String query = "/users/user[username='" + username + "' and password='" + password + "']"; 45 | XPathExpression expression = xpath.compile(query); 46 | 47 | // 执行XPath查询 48 | NodeList result = (NodeList) expression.evaluate(document, XPathConstants.NODESET); 49 | data.put("result", result.getLength() > 0 ? "Authentication successful." : "Authentication failed."); 50 | } catch (Exception e) { 51 | data.put("result", "Error"); 52 | } 53 | 54 | return data; 55 | } 56 | 57 | @GetMapping("/xpathQuery.do") 58 | public Map xpathQuery(String username, String password) { 59 | Map data = new HashMap<>(); 60 | 61 | try { 62 | DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); 63 | DocumentBuilder builder = factory.newDocumentBuilder(); 64 | Document document = builder.parse(new InputSource(new StringReader(USERS_XML))); 65 | XPathFactory xPathFactory = XPathFactory.newInstance(); 66 | XPath xpath = xPathFactory.newXPath(); 67 | 68 | // 使用参数化的XPath查询 69 | String xPathExpression = "/users/user[username=$username and password=$password]"; 70 | 71 | xpath.setXPathVariableResolver(new XPathVariableResolver() { 72 | @Override 73 | public Object resolveVariable(QName variableName) { 74 | if ("username".equals(variableName.getLocalPart())) { 75 | return username; 76 | } else if ("password".equals(variableName.getLocalPart())) { 77 | return password; 78 | } 79 | return null; 80 | } 81 | }); 82 | 83 | XPathExpression expression = xpath.compile(xPathExpression); 84 | 85 | // 执行XPath查询 86 | NodeList result = (NodeList) expression.evaluate(document, XPathConstants.NODESET); 87 | data.put("result", result.getLength() > 0 ? "Authentication successful." : "Authentication failed."); 88 | } catch (Exception e) { 89 | data.put("result", "Error"); 90 | } 91 | 92 | return data; 93 | } 94 | 95 | } 96 | -------------------------------------------------------------------------------- /src/main/java/org/javaweb/code/controller/XXEController.java: -------------------------------------------------------------------------------- 1 | package org.javaweb.code.controller; 2 | 3 | import org.jdom2.Document; 4 | import org.jdom2.Element; 5 | import org.jdom2.input.SAXBuilder; 6 | import org.springframework.web.bind.annotation.PostMapping; 7 | import org.springframework.web.bind.annotation.RequestMapping; 8 | import org.springframework.web.bind.annotation.RestController; 9 | import org.w3c.dom.NodeList; 10 | import org.xml.sax.Attributes; 11 | import org.xml.sax.InputSource; 12 | import org.xml.sax.XMLReader; 13 | import org.xml.sax.helpers.DefaultHandler; 14 | import org.xml.sax.helpers.XMLReaderFactory; 15 | 16 | import javax.xml.parsers.DocumentBuilder; 17 | import javax.xml.parsers.DocumentBuilderFactory; 18 | import javax.xml.parsers.SAXParser; 19 | import javax.xml.parsers.SAXParserFactory; 20 | import java.io.InputStream; 21 | import java.util.HashMap; 22 | import java.util.Map; 23 | 24 | /** 25 | * https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html 26 | */ 27 | @RestController 28 | @RequestMapping("/XXE/") 29 | public class XXEController { 30 | 31 | @PostMapping("/dom4jSAXReaderXXE.do") 32 | public Map dom4jSAXReaderXXE(InputStream in) throws Exception { 33 | Map data = new HashMap<>(); 34 | 35 | if (in != null) { 36 | // 解析方式一,直接使用SAXReader解析,未禁用外部实体 37 | org.dom4j.io.SAXReader reader = new org.dom4j.io.SAXReader(); 38 | org.dom4j.Document doc = reader.read(in); 39 | 40 | // 解析方式二,使用DocumentHelper解析,间接的调用SAXReader,未禁用外部实体 41 | // org.dom4j.Document doc = DocumentHelper.parseText(IOUtils.toString(in, StandardCharsets.UTF_8)); 42 | 43 | org.dom4j.Element root = doc.getRootElement(); 44 | 45 | // 输出title 46 | data.put("title", root.element("title").getText()); 47 | } 48 | 49 | return data; 50 | } 51 | 52 | @PostMapping("/dom4jSAXReader.do") 53 | public Map dom4jSAXReader(InputStream in) throws Exception { 54 | Map data = new HashMap<>(); 55 | 56 | if (in != null) { 57 | // 解析方式一,直接使用SAXReader解析,未禁用外部实体 58 | org.dom4j.io.SAXReader reader = new org.dom4j.io.SAXReader(); 59 | 60 | // 禁止DOCTYPE 61 | reader.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true); 62 | 63 | // 禁止外部ENTITY 64 | reader.setFeature("http://xml.org/sax/features/external-general-entities", false); 65 | 66 | // 禁止外部参数实体 67 | reader.setFeature("http://xml.org/sax/features/external-parameter-entities", false); 68 | 69 | org.dom4j.Document doc = reader.read(in); 70 | org.dom4j.Element root = doc.getRootElement(); 71 | 72 | // 输出title 73 | data.put("title", root.element("title").getText()); 74 | } 75 | 76 | return data; 77 | } 78 | 79 | @PostMapping("/jaxpSAXParserFactoryXXE.do") 80 | public Map jaxpSAXParserFactoryXXE(InputStream in) throws Exception { 81 | Map data = new HashMap<>(); 82 | 83 | if (in != null) { 84 | SAXParserFactory factory = SAXParserFactory.newInstance(); 85 | SAXParser parser = factory.newSAXParser(); 86 | StringBuilder title = new StringBuilder(); 87 | parser.parse(in, createDefaultHandler(title)); 88 | 89 | // 输出title 90 | data.put("title", title); 91 | } 92 | 93 | return data; 94 | } 95 | 96 | @PostMapping("/jaxpSAXParserFactory.do") 97 | public Map jaxpSAXParserFactory(InputStream in) throws Exception { 98 | Map data = new HashMap<>(); 99 | 100 | if (in != null) { 101 | SAXParserFactory factory = SAXParserFactory.newInstance(); 102 | 103 | // 禁止DOCTYPE 104 | factory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true); 105 | 106 | // 禁止外部ENTITY 107 | factory.setFeature("http://xml.org/sax/features/external-general-entities", false); 108 | 109 | // 禁止外部参数实体 110 | factory.setFeature("http://xml.org/sax/features/external-parameter-entities", false); 111 | 112 | SAXParser parser = factory.newSAXParser(); 113 | StringBuilder title = new StringBuilder(); 114 | parser.parse(in, createDefaultHandler(title)); 115 | 116 | // 输出title 117 | data.put("title", title); 118 | } 119 | 120 | return data; 121 | } 122 | 123 | public DefaultHandler createDefaultHandler(StringBuilder title) { 124 | return new DefaultHandler() { 125 | 126 | private boolean inTitle = false; 127 | 128 | @Override 129 | public void startElement(String uri, String localName, String qName, Attributes attributes) { 130 | if (qName.equalsIgnoreCase("title")) { 131 | inTitle = true; 132 | } 133 | } 134 | 135 | @Override 136 | public void endElement(String uri, String localName, String qName) { 137 | if (qName.equalsIgnoreCase("title")) { 138 | inTitle = false; 139 | } 140 | } 141 | 142 | @Override 143 | public void characters(char[] ch, int start, int length) { 144 | if (inTitle) { 145 | title.append(new String(ch, start, length)); 146 | } 147 | } 148 | }; 149 | } 150 | 151 | @PostMapping("/saxBuilderXXE.do") 152 | public Map saxBuilderXXE(InputStream in) throws Exception { 153 | Map data = new HashMap<>(); 154 | 155 | if (in != null) { 156 | SAXBuilder builder = new org.jdom2.input.SAXBuilder(); 157 | org.jdom2.Document doc = builder.build(in); 158 | 159 | // 输出title 160 | org.jdom2.Element root = doc.getRootElement(); 161 | 162 | // 输出title 163 | data.put("title", root.getChild("title").getText()); 164 | } 165 | 166 | return data; 167 | } 168 | 169 | @PostMapping("/saxBuilder.do") 170 | public Map saxBuilder(InputStream in) throws Exception { 171 | Map data = new HashMap<>(); 172 | 173 | if (in != null) { 174 | SAXBuilder builder = new SAXBuilder(); 175 | 176 | // 禁止DOCTYPE 177 | builder.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true); 178 | 179 | // 禁止外部ENTITY 180 | builder.setFeature("http://xml.org/sax/features/external-general-entities", false); 181 | 182 | // 禁止外部参数实体 183 | builder.setFeature("http://xml.org/sax/features/external-parameter-entities", false); 184 | 185 | Document doc = builder.build(in); 186 | 187 | // 输出title 188 | Element root = doc.getRootElement(); 189 | 190 | // 输出title 191 | data.put("title", root.getChild("title").getText()); 192 | } 193 | 194 | return data; 195 | } 196 | 197 | @PostMapping("/xmlReaderXXE.do") 198 | public Map xmlReaderXXE(InputStream in) throws Exception { 199 | Map data = new HashMap<>(); 200 | 201 | if (in != null) { 202 | XMLReader xmlReader = XMLReaderFactory.createXMLReader(); 203 | StringBuilder title = new StringBuilder(); 204 | xmlReader.setDTDHandler(createDefaultHandler(title)); 205 | xmlReader.parse(new InputSource(in)); 206 | 207 | // 输出title 208 | data.put("title", title); 209 | } 210 | 211 | return data; 212 | } 213 | 214 | @PostMapping("/xmlReader.do") 215 | public Map xmlReader(InputStream in) throws Exception { 216 | Map data = new HashMap<>(); 217 | 218 | if (in != null) { 219 | XMLReader xmlReader = XMLReaderFactory.createXMLReader(); 220 | 221 | // 禁止DOCTYPE 222 | xmlReader.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true); 223 | 224 | // 禁止外部ENTITY 225 | xmlReader.setFeature("http://xml.org/sax/features/external-general-entities", false); 226 | 227 | // 禁止外部参数实体 228 | xmlReader.setFeature("http://xml.org/sax/features/external-parameter-entities", false); 229 | 230 | StringBuilder title = new StringBuilder(); 231 | xmlReader.setDTDHandler(createDefaultHandler(title)); 232 | xmlReader.parse(new InputSource(in)); 233 | 234 | // 输出title 235 | data.put("title", title); 236 | } 237 | 238 | return data; 239 | } 240 | 241 | @PostMapping("/documentBuilderFactoryXXE.do") 242 | public Map documentBuilderFactoryXXE(InputStream in) throws Exception { 243 | Map data = new HashMap<>(); 244 | 245 | if (in != null) { 246 | DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); 247 | 248 | // 创建DocumentBuilder 249 | DocumentBuilder builder = factory.newDocumentBuilder(); 250 | 251 | // 从输入流中解析XML 252 | org.w3c.dom.Document document = builder.parse(in); 253 | 254 | // 获取根元素 255 | org.w3c.dom.Element rootElement = document.getDocumentElement(); 256 | 257 | // 获取元素 258 | NodeList titleElements = rootElement.getElementsByTagName("title"); 259 | 260 | // 输出title 261 | data.put("title", titleElements.item(0).getTextContent()); 262 | } 263 | 264 | return data; 265 | } 266 | 267 | @PostMapping("/documentBuilderFactory.do") 268 | public Map<String, Object> documentBuilderFactory(InputStream in) throws Exception { 269 | Map<String, Object> data = new HashMap<>(); 270 | 271 | if (in != null) { 272 | DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); 273 | 274 | // 禁止DOCTYPE 275 | factory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true); 276 | 277 | // 禁止外部ENTITY 278 | factory.setFeature("http://xml.org/sax/features/external-general-entities", false); 279 | 280 | // 禁止外部参数实体 281 | factory.setFeature("http://xml.org/sax/features/external-parameter-entities", false); 282 | 283 | // 创建DocumentBuilder 284 | DocumentBuilder builder = factory.newDocumentBuilder(); 285 | 286 | // 从输入流中解析XML 287 | org.w3c.dom.Document document = builder.parse(in); 288 | 289 | // 获取根元素 290 | org.w3c.dom.Element rootElement = document.getDocumentElement(); 291 | 292 | // 获取<title>元素 293 | NodeList titleElements = rootElement.getElementsByTagName("title"); 294 | 295 | // 输出title 296 | data.put("title", titleElements.item(0).getTextContent()); 297 | } 298 | 299 | return data; 300 | } 301 | 302 | } 303 | -------------------------------------------------------------------------------- /src/main/java/org/javaweb/code/entity/SysUser.java: -------------------------------------------------------------------------------- 1 | package org.javaweb.code.entity; 2 | 3 | import jakarta.persistence.*; 4 | import org.hibernate.annotations.GenericGenerator; 5 | 6 | /** 7 | * Creator: yz 8 | * Date: 2020-05-05 9 | */ 10 | @Entity 11 | @Table(name = "sys_user") 12 | @NamedQuery(name = "SysUser.findByUsername", query = "select u from SysUser u where u.username = ?1") 13 | @NamedQuery(name = "SysUser.findByEmail", query = "select u from SysUser u where u.email = ?1") 14 | public class SysUser { 15 | 16 | @Id 17 | @GenericGenerator(name = "jpa-uuid") 18 | @GeneratedValue(generator = "jpa-uuid") 19 | @Column(name = "id", length = 32) 20 | private Long id; 21 | 22 | private String username; 23 | 24 | private String password; 25 | 26 | private String email; 27 | 28 | private String userAvatar; 29 | 30 | private String registerTime; 31 | 32 | private Object notes; 33 | 34 | public Long getId() { 35 | return id; 36 | } 37 | 38 | public void setId(Long id) { 39 | this.id = id; 40 | } 41 | 42 | public String getUsername() { 43 | return username; 44 | } 45 | 46 | public void setUsername(String username) { 47 | this.username = username; 48 | } 49 | 50 | public String getPassword() { 51 | return password; 52 | } 53 | 54 | public void setPassword(String password) { 55 | this.password = password; 56 | } 57 | 58 | public String getEmail() { 59 | return email; 60 | } 61 | 62 | public void setEmail(String email) { 63 | this.email = email; 64 | } 65 | 66 | public String getUserAvatar() { 67 | return userAvatar; 68 | } 69 | 70 | public void setUserAvatar(String userAvatar) { 71 | this.userAvatar = userAvatar; 72 | } 73 | 74 | public String getRegisterTime() { 75 | return registerTime; 76 | } 77 | 78 | public void setRegisterTime(String registerTime) { 79 | this.registerTime = registerTime; 80 | } 81 | 82 | public Object getNotes() { 83 | return notes; 84 | } 85 | 86 | public void setNotes(Object notes) { 87 | this.notes = notes; 88 | } 89 | 90 | } 91 | -------------------------------------------------------------------------------- /src/main/java/org/javaweb/code/mapper/SysUserMapper.java: -------------------------------------------------------------------------------- 1 | package org.javaweb.code.mapper; 2 | 3 | import org.apache.ibatis.annotations.Mapper; 4 | import org.apache.ibatis.annotations.Param; 5 | import org.apache.ibatis.annotations.Select; 6 | import org.javaweb.code.entity.SysUser; 7 | 8 | import java.util.List; 9 | 10 | /** 11 | * <a href="https://mybatis.org/mybatis-3/zh/dynamic-sql.html">Mybatis动态SQL</a> 12 | */ 13 | @Mapper 14 | public interface SysUserMapper { 15 | 16 | SysUser mybatisStringQuery(@Param("username") String username); 17 | 18 | SysUser mybatisStringInjection(@Param("username") String username); 19 | 20 | // @Select({"<script>" + 21 | // "select * from sys_user " + 22 | // " <if test='order != null'>order by #{order} #{orderType}</if>" + 23 | // "</script>" 24 | // }) 25 | 26 | @Select("<script>" + 27 | "select * from sys_user" + 28 | "<choose>" + 29 | " <when test='order == \"id\"'> " + 30 | " order by id" + 31 | " </when >" + 32 | " <when test='order == \"username\"'> " + 33 | " order by username" + 34 | " </when >" + 35 | " <otherwise> " + 36 | " order by register_time " + 37 | " </otherwise>" + 38 | "</choose>" + 39 | "<choose>" + 40 | " <when test='orderType == \"desc\"'> " + 41 | " desc" + 42 | " </when>" + 43 | " <otherwise> " + 44 | " asc" + 45 | " </otherwise>" + 46 | "</choose>" + 47 | "</script>") 48 | List<SysUser> mybatisOrderByQuery(@Param("order") String order, @Param("orderType") String orderType); 49 | 50 | @Select({"<script>" + 51 | "select * from sys_user " + 52 | " <if test='order != null'>order by ${order} ${orderType}</if>" + 53 | "</script>" 54 | }) 55 | List<SysUser> mybatisOrderByInjection(@Param("order") String order, @Param("orderType") String orderType); 56 | 57 | @Select("select * from sys_user where username like '%' || #{username} || '%'") 58 | // Select("select * from sys_user where username like concat('%', #{username}, '%')") // Mysql 59 | List<SysUser> mybatisLikeQuery(@Param("username") String username); 60 | 61 | @Select("select * from sys_user where username like '%${username}%'") 62 | List<SysUser> mybatisLikeInjection(@Param("username") String username); 63 | 64 | @Select({"<script>", 65 | "select * from sys_user where id in ", 66 | "<foreach item='id' collection='ids' open='(' separator=', ' close=')'>", 67 | " #{id}", 68 | "</foreach>", 69 | "</script>"}) 70 | List<SysUser> mybatisWhereInQuery(@Param("ids") List<String> ids); 71 | 72 | @Select("select * from sys_user where id in ( ${ids} )") 73 | List<SysUser> mybatisWhereInInjection(@Param("ids") String ids); 74 | 75 | 76 | } 77 | -------------------------------------------------------------------------------- /src/main/java/org/javaweb/code/repository/SysUserCustomRepository.java: -------------------------------------------------------------------------------- 1 | package org.javaweb.code.repository; 2 | 3 | public interface SysUserCustomRepository { 4 | 5 | Object jpqlQuery(String username); 6 | 7 | Object jpqlInjection(String username); 8 | 9 | Object nativeQuery(String username); 10 | 11 | Object nativeInjection(String username); 12 | 13 | Object namedQuery(String username); 14 | 15 | Object criteriaQuery(String username, String email); 16 | 17 | } 18 | -------------------------------------------------------------------------------- /src/main/java/org/javaweb/code/repository/SysUserRepository.java: -------------------------------------------------------------------------------- 1 | package org.javaweb.code.repository; 2 | 3 | import org.javaweb.code.entity.SysUser; 4 | import org.springframework.data.jpa.repository.JpaRepository; 5 | import org.springframework.data.jpa.repository.JpaSpecificationExecutor; 6 | import org.springframework.data.jpa.repository.Query; 7 | import org.springframework.data.repository.PagingAndSortingRepository; 8 | import org.springframework.stereotype.Repository; 9 | 10 | import java.util.List; 11 | 12 | @Repository 13 | public interface SysUserRepository extends JpaRepository<SysUser, String>, 14 | PagingAndSortingRepository<SysUser, String>, JpaSpecificationExecutor<SysUser>, SysUserCustomRepository { 15 | 16 | SysUser findByUsername(String username); 17 | 18 | List<SysUser> findByUsernameIn(List<String> username); 19 | 20 | List<SysUser> findByUsernameLike(String username); 21 | 22 | List<SysUser> findByUsernameLikeOrderByIdDesc(String username); 23 | 24 | @Query(value = "select * from sys_user where username = ?1 ", nativeQuery = true) 25 | SysUser usernameQueryTest(String username); 26 | 27 | @Query(value = "select * from sys_user where email = :email ", nativeQuery = true) 28 | SysUser emailQueryTest(String email); 29 | 30 | @Query("from SysUser where id = :id") 31 | SysUser idQueryTest(Long id); 32 | 33 | } 34 | -------------------------------------------------------------------------------- /src/main/java/org/javaweb/code/repository/impl/SysUserCustomRepositoryImpl.java: -------------------------------------------------------------------------------- 1 | package org.javaweb.code.repository.impl; 2 | 3 | import jakarta.persistence.EntityManager; 4 | import jakarta.persistence.PersistenceContext; 5 | import jakarta.persistence.Query; 6 | import jakarta.persistence.criteria.CriteriaBuilder; 7 | import jakarta.persistence.criteria.CriteriaQuery; 8 | import jakarta.persistence.criteria.Predicate; 9 | import jakarta.persistence.criteria.Root; 10 | import org.apache.commons.lang3.StringUtils; 11 | import org.javaweb.code.entity.SysUser; 12 | import org.javaweb.code.repository.SysUserCustomRepository; 13 | import org.springframework.stereotype.Component; 14 | 15 | import java.util.ArrayList; 16 | import java.util.List; 17 | 18 | @Component 19 | public class SysUserCustomRepositoryImpl implements SysUserCustomRepository { 20 | 21 | @PersistenceContext 22 | private EntityManager entityManager; 23 | 24 | @Override 25 | public Object jpqlQuery(String username) { 26 | // JPQL预编译查询 27 | String sql = "from SysUser where username = :username"; 28 | Query query = entityManager.createQuery(sql, SysUser.class); 29 | query.setParameter("username", username); 30 | 31 | return query.getSingleResult(); 32 | } 33 | 34 | @Override 35 | public Object jpqlInjection(String username) { 36 | // JPQL注入写法 37 | String sql = "from SysUser where username = '" + username + "'"; 38 | return entityManager.createQuery(sql, SysUser.class).getSingleResult(); 39 | } 40 | 41 | @Override 42 | public Object nativeQuery(String username) { 43 | // 原生SQL预编译查询 44 | String sql = "select * from sys_user where username = ?1 "; 45 | 46 | return entityManager.createNativeQuery(sql, SysUser.class).setParameter(1, username).getSingleResult(); 47 | } 48 | 49 | @Override 50 | public Object nativeInjection(String username) { 51 | // SQL注入写法 52 | String sql = "select * from sys_user where username = '" + username + "'"; 53 | 54 | return entityManager.createNativeQuery(sql, SysUser.class).getSingleResult(); 55 | } 56 | 57 | @Override 58 | public Object namedQuery(String username) { 59 | String sql = "SysUser.findByUsername"; 60 | return entityManager.createNamedQuery(sql, SysUser.class).setParameter(1, username).getSingleResult(); 61 | } 62 | 63 | @Override 64 | public Object criteriaQuery(String username, String email) { 65 | CriteriaBuilder criteriaBuilder = entityManager.getCriteriaBuilder(); 66 | CriteriaQuery<SysUser> criteriaQuery = criteriaBuilder.createQuery(SysUser.class); 67 | Root<SysUser> root = criteriaQuery.from(SysUser.class); 68 | 69 | // 创建一个 Predicate 列表来存储查询条件 70 | List<Predicate> predicates = new ArrayList<>(); 71 | 72 | if (StringUtils.isNoneEmpty(username)) { 73 | predicates.add(criteriaBuilder.equal(root.get("username"), username)); 74 | } 75 | 76 | if (StringUtils.isNoneEmpty(email)) { 77 | predicates.add(criteriaBuilder.equal(root.get("email"), email)); 78 | } 79 | 80 | // 将所有的条件合并为一个总的查询条件(AND 连接) 81 | criteriaQuery.where(criteriaBuilder.and(predicates.toArray(new Predicate[0]))); 82 | 83 | // 执行查询 84 | return entityManager.createQuery(criteriaQuery).getResultList(); 85 | } 86 | 87 | } -------------------------------------------------------------------------------- /src/main/resources/application.properties: -------------------------------------------------------------------------------- 1 | server.port=8080 2 | # 3 | # Spring JPA 4 | # 5 | spring.jpa.database=default 6 | spring.jpa.show-sql=true 7 | spring.jpa.hibernate.ddl-auto=none 8 | spring.jpa.properties.hibernate.jdbc.lob.non_contextual_creation=true 9 | 10 | # SQLiteDialect 11 | spring.jpa.properties.hibernate.dialect=org.hibernate.community.dialect.SQLiteDialect 12 | # 13 | # MySQLDialect 14 | #spring.jpa.properties.hibernate.dialect=org.hibernate.dialect.MySQLDialect 15 | # 16 | # SQLite DataSource 17 | spring.datasource.driver-class-name=org.sqlite.JDBC 18 | spring.datasource.url=jdbc:sqlite::resource:javaweb-bbs.db 19 | spring.datasource.username= 20 | spring.datasource.password= 21 | # 22 | # Mysql DataSource 23 | #spring.datasource.driver-class-name=com.mysql.jdbc.Driver 24 | #spring.datasource.url=jdbc:mysql://localhost:3306/mysql?autoReconnect=true&zeroDateTimeBehavior=round&useUnicode=true&characterEncoding=UTF-8&useSSL=false 25 | #spring.datasource.username=root 26 | #spring.datasource.password=root 27 | 28 | mybatis.mapper-locations=classpath:mapper/*.xml 29 | logging.level.org.mybatis=DEBUG 30 | -------------------------------------------------------------------------------- /src/main/resources/javaweb-bbs.db: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/javaweb-rasp/javaweb-secure-coding/aee0719ec8503d35b45c190e46fbf94379b84a93/src/main/resources/javaweb-bbs.db -------------------------------------------------------------------------------- /src/main/resources/mapper/SysUser.xml: -------------------------------------------------------------------------------- 1 | <?xml version="1.0" encoding="UTF-8" ?> 2 | <!DOCTYPE mapper PUBLIC "-//mybatis.org//DTD Mapper 3.0//EN" 3 | "http://mybatis.org/dtd/mybatis-3-mapper.dtd"> 4 | 5 | <mapper namespace="org.javaweb.code.mapper.SysUserMapper"> 6 | 7 | <resultMap id="sysUserResultMap" type="org.javaweb.code.entity.SysUser"> 8 | <id property="id" column="id" /> 9 | <result property="username" column="username" /> 10 | <result property="password" column="password" /> 11 | <result property="email" column="email" /> 12 | <result property="userAvatar" column="user_avatar" /> 13 | <result property="registerTime" column="register_time" /> 14 | <result property="notes" column="notes" /> 15 | </resultMap> 16 | 17 | <select id="mybatisStringQuery" parameterType="string" resultMap="sysUserResultMap"> 18 | SELECT * FROM sys_user WHERE username = '${username}' 19 | </select> 20 | 21 | <select id="mybatisStringInjection" parameterType="string" resultMap="sysUserResultMap"> 22 | SELECT * FROM sys_user WHERE username = #{username} 23 | </select> 24 | 25 | </mapper> 26 | -------------------------------------------------------------------------------- /src/main/resources/static/xxe.xml: -------------------------------------------------------------------------------- 1 | <!ENTITY all "%start;%stuff;%end;"> --------------------------------------------------------------------------------