Code example: public class JDBCDemo3 { public static void demo3_1(){ boolean flag = login("aaa' OR ' ","1651561"); //If the username is known, this method can be used to log in successfully without knowing the password if (flag) { System.out.println("Login successful"); }else{ System.out.println("Login failed"); } } public static boolean login(String username,String password){ Connection conn=null; Statement stat=null; ResultSet rs=null; boolean flag=false; try { conn = JDBCUtils.getConnection(); String sql="SELECT * FROM user WHERE username='"+username+"'AND password='"+password+"'"; //This is the key to the SQL injection vulnerability. Because it is a string concatenation, the query statement will become: SELECT * FROM user WHERE username='aaa' OR '' AND password='1651561'. This query statement can get a result set, so this vulnerability occursstat=conn.createStatement(); rs=stat.executeQuery(sql); if(rs.next()){ flag=true; }else{ flag=false; } } catch (SQLException e) { e.printStackTrace(); } return flag; } Solution, use PrepareStatment: public static void demo3_1(){ boolean flag=login1("aaa' OR ' ","1651561"); if (flag){ System.out.println("Login successful"); }else{ System.out.println("Login failed"); } } public static boolean login1(String username,String password){ Connection conn=null; PreparedStatement pstat=null; ResultSet rs=null; boolean flag=false; try { conn = JDBCUtils.getConnection(); String sql="SELECT * FROM user WHERE username=? AND password=?"; //Use ? instead of parameter, pre-set sql format, even if you enter sql keywords, sql will not recognize it pstat=conn.prepareStatement(sql); pstat.setString(1,username); //Set the value of the question mark pstat.setString(2,password); rs=pstat.executeQuery(); if(rs.next()){ flag=true; }else{ flag=false; } } catch (SQLException e) { e.printStackTrace(); } return flag; } } Using the above solution, it is impossible to successfully log in the user through the SQL injection vulnerability. The above is the full content of this article. I hope it will be helpful for everyone’s study. I also hope that everyone will support 123WORDPRESS.COM. You may also be interested in:
|
<<: Vue implements file upload and download
Table of contents 1. filter() 2. forEach() 3. som...
The JD carousel was implemented using pure HTML a...
1. Basic use <!DOCTYPE html> <html lang=...
1. Reason I just needed to reinstall MySQL on a n...
Disabling and enabling MySQL foreign key constrai...
This article shares the MySQL Workbench installat...
Why do we need permission management? 1. Computer...
Table of contents 1. Make good use of components ...
Table of contents Preface 1. Custom focus command...
Recently, I have been studying the MySQL database...
Written in front In recent years, the live stream...
Table of contents 1. Scope 1. Global scope 2. Loc...
Docker error 1. Check the cause docker logs nexus...
Let me tell you about a recent case. A game log l...
Preface Recently, part of the company's busin...