Home / Vulnerability Database / PHP : LDAP injection
PHP
PHP : LDAP injection
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
PCI DSS 4.0
Overview
LDAP query injection is possible. This can lead to data confidentiality loss or to data modification.
Injection vulnerabilities take the first place in the “OWASP Top 10 2017” web-application vulnerabilities ranking.
LDAP is an application-level protocol for accessing and maintaining distributed directory information services (X.500 directory service). If LDAP query is based on data from an untrusted source (e.g., user input) and the data do not pass validation, an attacker can modify the query and execute it with the application rights.
The application creates an LDAP query generated based on data from an untrusted source that has not been validated. This allows an attacker to change the semantics of the query.
References
MEDIUM
DerScanner Severity Score
Do you want to fix PHP : LDAP injection in your application?
See also
PHP
PHP : Null salt
PHP
PHP : Empty password
PHP
