赞
踩
考虑到富文本编辑器可以直接在源代码里面写js代码,所以本文通过java过滤器,和字符串替换来做简单的防止。
- <!-- 防止CSS跨站脚本攻击: 本参数仅对各标签库生效如spring taglib/jstl/freemarker等 -->
- <context-param>
- <param-name>defaultHtmlEscape</param-name>
- <param-value>true</param-value>
- </context-param>
- <filter>
- <filter-name>XssSqlFilter</filter-name>
- <filter-class>org.cdc.web.xss.XssFilter</filter-class>
- </filter>
- <filter-mapping>
- <filter-name>XssSqlFilter</filter-name>
- <url-patten>/*</url-patten>
- <dispatcher>REQUEST</dispatcher>
- </filter-mapping>
- <!-- 防止CSS跨站脚本攻击 -->
- private String cleanXSS(String value){
- // You'll need to remove the spaces from the html entities below
- value = value .replaceAll("<","& lt;").replaceAll(">","& gt;");
- value = value.replaceAll("\\(","& #40;").replaceAll("\\)","& #41;");
- value = value.replaceAll("'","& #39;");
- value = value.replaceAll("eval\\((.*)\\)","");
- value = value.replaceAll("[\\\"\\\'][\\s]*javascript:(.*)[\\\"\\\']","\"\"");
- value = value.replaceAll("script","");
- value = value.trim();
- return value;
- }
本文出处:https://blog.csdn.net/pdy8023/article/details/80338957
Copyright © 2003-2013 www.wpsshop.cn 版权所有,并保留所有权利。