JDBC的SQL注入漏洞分析和解决

1.1.1 SQL注入漏洞分析sql

JDBC的SQL注入漏洞分析和解决
1.1.2 SQL注入漏洞解决ide

须要采用PreparedStatement对象解决SQL注入漏洞。这个对象将SQL预先进行编译,使用?做为占位符。?所表明内容是SQL所固定。再次传入变量(包含SQL的关键字)。这个时候也不会识别这些关键字。code

public class UserDao {

         

        public boolean login(String username,String password){

                Connection conn = null;

                PreparedStatement pstmt = null;

                ResultSet rs = null;

                // 定义一个变量:

                boolean flag = false;

                try{

                        // 得到链接:

                        conn = JDBCUtils.getConnection();

                        // 编写SQL语句:

                        String sql = "select * from user where username = ? and password = ?";

                        // 预编译SQL

                        pstmt = conn.prepareStatement(sql);

                        // 设置参数:

                        pstmt.setString(1, username);

                        pstmt.setString(2, password);

                        // 执行SQL语句:

                        rs = pstmt.executeQuery();

                        if(rs.next()){

                                // 说明根据用户名和密码能够查询到这条记录

                                flag = true;

                        }

                }catch(Exception e){

                        e.printStackTrace();

                }finally{

                        JDBCUtils.release(rs, pstmt, conn);

                }

                return flag;

        }
相关文章
相关标签/搜索