|
|
| (25 intermediate revisions by 2 users not shown) |
| Line 2: |
Line 2: |
| | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:Cheatsheets-header.jpg|link=]]</div> | | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:Cheatsheets-header.jpg|link=]]</div> |
| | | | |
| − | *WORK IN PROGRESS*
| + | The Cheat Sheet Series project has been moved to [https://github.com/OWASP/CheatSheetSeries GitHub]! |
| | | | |
| − | Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''
| + | Please visit [https://cheatsheetseries.owasp.org/cheatsheets/LDAP_Injection_Prevention_Cheat_Sheet.html LDAP Injection Prevention Cheat Sheet] to see the latest version of the cheat sheet. |
| − | = Introduction =
| |
| − | __TOC__{{TOC hidden}}
| |
| − | | |
| − | This article is focused on providing clear, simple, actionable guidance for preventing LDAP Injection flaws in your applications. [[LDAP Injection]] attacks are somewhat common, and this is due to two factors:
| |
| − | | |
| − | # the lack of safer, parameterized LDAP query interfaces, and
| |
| − | # the widespread use of LDAP to authenticate users to systems.
| |
| − | | |
| − | TBA
| |
| − | | |
| − | Primary Defenses:
| |
| − | * TBA
| |
| − | | |
| − | Additional Defenses:
| |
| − | * TBA
| |
| − | | |
| − | =Primary Defenses=
| |
| − | | |
| − | ==Defense Option 1: TBA==
| |
| − | | |
| − | TBA
| |
| − | | |
| − | ;Safe Java TBA Example
| |
| − | | |
| − | TBA
| |
| − | | |
| − | ;Safe C# .NET TBA Example
| |
| − | | |
| − | TBA
| |
| − | | |
| − | ==Defense Option 2: TBA==
| |
| − | | |
| − | TBA
| |
| − | | |
| − | ;Safe Java TBA Example
| |
| − | | |
| − | TBA
| |
| − | | |
| − | ;Safe C# .NET TBA Example
| |
| − | | |
| − | TBA
| |
| − | | |
| − | ==Defense Option 3: Escaping All User Supplied Input==
| |
| − | | |
| − | TBA
| |
| − | | |
| − | = Additional Defenses =
| |
| − | | |
| − | Beyond adopting one of the three primary defenses, we also recommend adopting all of these additional defenses in order to provide defense in depth. These additional defenses are:
| |
| − | | |
| − | * '''Least Privilege'''
| |
| − | * '''White List Input Validation'''
| |
| − | | |
| − | == Least Privilege ==
| |
| − | | |
| − | To minimize the potential damage of a successful LDAP injection attack, you should minimize the privileges assigned to the LDAP binding account in your environment.
| |
| − | | |
| − | TBA
| |
| − | | |
| − | == White List Input Validation ==
| |
| − | | |
| − | Input validation can be used to detect unauthorized input before it is passed to the SQL query. For more information please see the [[Input Validation Cheat Sheet]].
| |
| − | | |
| − | =Related Articles=
| |
| − | | |
| − | '''Description of LDAP Injection Vulnerabilities'''
| |
| − | | |
| − | * OWASP article on [[LDAP Injection]] Vulnerabilities
| |
| − | | |
| − | '''How to Avoid SQL Injection Vulnerabilities'''
| |
| − | | |
| − | * [[:Category:OWASP Guide Project|OWASP Developers Guide]] article on how to [[Guide to LDAP Injection | Avoid LDAP Injection]] Vulnerabilities
| |
| − | * OWASP article on [[Preventing LDAP Injection in Java]]
| |
| − | | |
| − | | |
| − | '''How to Review Code for LDAP Injection Vulnerabilities'''
| |
| − | | |
| − | * [[:Category:OWASP Code Review Project|OWASP Code Review Guide]] article on how to [[Reviewing Code for LDAP Injection|Review Code for LDAP Injection]] Vulnerabilities
| |
| − | | |
| − | '''How to Test for LDAP Injection Vulnerabilities'''
| |
| − | | |
| − | * [[:Category:OWASP Testing Project|OWASP Testing Guide]] article on how to [[Testing for LDAP Injection (OTG-INPVAL-006)|Test for LDAP Injection]] Vulnerabilities
| |
| − | | |
| − | = Authors and Primary Editors =
| |
| − | | |
| − | Jim Manico - jim[at]owasp.org<br/>
| |
| − | | |
| − | | |
| − | == Other Cheatsheets ==
| |
| − | | |
| − | {{Cheatsheet_Navigation_Body}}
| |
| − | | |
| − | [[Category:Cheatsheets]]
| |
| − | [[Category:Popular]]
| |