This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "LDAP Injection Prevention Cheat Sheet"
(→Least Privilege) |
(→Authors and Primary Editors) |
||
Line 100: | Line 100: | ||
= Authors and Primary Editors = | = Authors and Primary Editors = | ||
− | |||
Jim Manico - jim[at]owasp.org<br/> | Jim Manico - jim[at]owasp.org<br/> | ||
− | + | ||
== Other Cheatsheets == | == Other Cheatsheets == |
Revision as of 08:12, 28 May 2015
Last revision (mm/dd/yy): 05/28/2015
Introduction
This article is focused on providing clear, simple, actionable guidance for preventing LDAP Injection flaws in your applications. LDAP Injection attacks are somewhat common, and this is due to two factors:
- the lack of safer, parameterized LDAP query interfaces, and
- the widespread use of LDAP to authenticate users to systems.
TBA
Primary Defenses:
- TBA
Additional Defenses:
- TBA
Primary Defenses
Defense Option 1: TBA
TBA
- Safe Java TBA Example
TBA
- Safe C# .NET TBA Example
TBA
Defense Option 2: TBA
TBA
- Safe Java TBA Example
TBA
- Safe C# .NET TBA Example
TBA
Defense Option 3: Escaping All User Supplied Input
TBA
Additional Defenses
Beyond adopting one of the three primary defenses, we also recommend adopting all of these additional defenses in order to provide defense in depth. These additional defenses are:
- Least Privilege
- White List Input Validation
Least Privilege
To minimize the potential damage of a successful LDAP injection attack, you should minimize the privileges assigned to the LDAP binding account in your environment.
TBA
White List Input Validation
Input validation can be used to detect unauthorized input before it is passed to the SQL query. For more information please see the Input Validation Cheat Sheet.
Related Articles
SQL Injection Attack Cheat Sheets
The following articles describe how to exploit different kinds of SQL Injection Vulnerabilities on various platforms that this article was created to help you avoid:
- Ferruh Mavituna : "SQL Injection Cheat Sheet" - http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/
- RSnake : "SQL Injection Cheat Sheet-Esp: for filter evasion" - http://ha.ckers.org/sqlinjection/
Description of SQL Injection Vulnerabilities
- OWASP article on SQL Injection Vulnerabilities
- OWASP article on Blind_SQL_Injection Vulnerabilities
How to Avoid SQL Injection Vulnerabilities
- OWASP Developers Guide article on how to Avoid SQL Injection Vulnerabilities
- OWASP article on Preventing SQL Injection in Java
- OWASP Cheat Sheet that provides numerous language specific examples of parameterized queries using both Prepared Statements and Stored Procedures
- The Bobby Tables site (inspired by the XKCD webcomic) has numerous examples in different languages of parameterized Prepared Statements and Stored Procedures
How to Review Code for SQL Injection Vulnerabilities
- OWASP Code Review Guide article on how to Review Code for SQL Injection Vulnerabilities
How to Test for SQL Injection Vulnerabilities
- OWASP Testing Guide article on how to Test for SQL Injection Vulnerabilities
Authors and Primary Editors
Jim Manico - jim[at]owasp.org