Java

玩转MyBatis(四):MyBatis的模糊查询和SQL注入

2021-07-17  本文已影响0人  废柴程序员

一、模糊查询

image.png

1.1、抽象接口

List<Map<String,Object>> selectLIKEUser(Map<String,Object> parmsMap);

1.2、xml

    <select id="selectLIKEUser" resultType="map" parameterType="map">
        select
               *
        from
             user
        where
            name like "%"#{name}"%"

    </select>

1.3、测试类

    @Test
    public void selectLIKEUser() {
        SqlSession session = MybatisUtils.getSession();
        UserMapper mapper = session.getMapper(UserMapper.class);
        Map<String,Object> parmsMap = new HashMap<>();
        parmsMap.put("name","面");
        List<Map<String,Object>> resultList = mapper.selectLIKEUser(parmsMap);

        for (Map map: resultList){
            System.out.println(map);
        }
        session.close();
    }

1.4、执行结果

image.png image.png

二、SQL注入

2.1、#和$的区别

2.2、#和$验证

①我们使用log4j来将SQL执行语句打印在控制台上。

        <dependency>
            <groupId>org.apache.logging.log4j</groupId>
            <artifactId>log4j-core</artifactId>
            <version>2.6.1</version>
        </dependency>
log4j.rootLogger=DEBUG,console,file

log4j.appender.console = org.apache.log4j.ConsoleAppender
log4j.appender.console.Target = System.out
log4j.appender.console.Threshold=DEBUG
log4j.appender.console.layout = org.apache.log4j.PatternLayout
log4j.appender.console.layout.ConversionPattern=[%c]-%m%n

log4j.appender.file = org.apache.log4j.RollingFileAppender

log4j.appender.file.File=log/tibet.log

log4j.appender.file.MaxFileSize=10mb
log4j.appender.file.Threshold=ERROR
log4j.appender.file.layout=org.apache.log4j.PatternLayout
log4j.appender.file.layout.ConversionPattern=[%p][%d{yy-MM-dd}][%c]%m%n

log4j.logger.org.mybatis=DEBUG
log4j.logger.java.sql=DEBUG
log4j.logger.java.sql.Statement=DEBUG
log4j.logger.java.sql.ResultSet=DEBUG
log4j.logger.java.sql.PreparedStatement=INFO
    <settings>
        <setting name="logImpl" value="STDOUT_LOGGING"></setting>
    </settings>

②SQL-xml

    <select id="getUserInfoById" resultType="com.dbright.pojo.User">
        select * from user where id = #{id}
    </select>
    <select id="getUserInfoById" resultType="com.dbright.pojo.User">
        select * from user where id = ${id}
    </select>

③分别执行结果

image.png

$

image.png

2.3、如何模拟sql注入?

image.png

结果:查出了所有的数据,不安全

image.png

如何解决呢?

上一篇下一篇

猜你喜欢

热点阅读