This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
LDAP Injection Prevention Cheat Sheet
WORK IN PROGRESS
Last revision (mm/dd/yy): 10/29/2015
Introduction
This cheatsheet is focused on providing clear, simple, actionable guidance for preventing LDAP Injection flaws in your applications.
LDAP Injection is an attack used to exploit web based applications that construct LDAP statements based on user input. When an application fails to properly sanitize user input, it’s possible to modify LDAP statements through techniques similar to SQL Injection. LDAP injection attacks could result in the granting of permissions to unauthorized queries, and content modification inside the LDAP tree. For more information on LDAP Injection attacks, visit LDAP injection.
LDAP injection attacks are common due to two factors:
- The lack of safer, parameterized LDAP query interfaces
- The widespread use of LDAP to authenticate users to systems.
Primary Defenses:
- Escape all variables using the right LDAP encoding function
Additional Defenses:
- Use a framework (like LINQtoAD) that escapes automatically
Primary Defenses
Defense Option 1: Escape All Variables
- Safe Java TBA Example
https://blogs.oracle.com/shankar/entry/what_is_ldap_injection
ESAPI for Java has two encoding functions for LDAP injection protection. http://owasp-esapi-java.googlecode.com/svn/trunk_doc/latest/org/owasp/esapi/Encoder.html
/** * Encode data for use in LDAP queries. * * @param input the text to encode for LDAP * * @return input encoded for use in LDAP */ String encodeForLDAP(String input);
/** * Encode data for use in an LDAP distinguished name. * * @param input the text to encode for an LDAP distinguished name * * @return input encoded for use in an LDAP distinguished name */ String encodeForDN(String input);
- Safe C# .NET TBA Example
LINQ to Active Directory: https://linqtoad.codeplex.com/
.NET AntiXSS (now the Encoder class) has LDAP encoding functions including Encoder.LdapFilterEncode(string), Encoder.LdapDistinguishedNameEncode(string) and Encoder.LdapDistinguishedNameEncode(string, bool, bool). http://blogs.msdn.com/b/securitytools/archive/2010/09/30/antixss_2d00_4_2d00_0_2d00_release_2d00_notes.aspx
Encoder.LdapFilterEncode encodes input according to RFC4515 where unsafe values are converted to \XX where XX is the representation of the unsafe character.
Encoder.LdapDistinguishedNameEncode encodes input according to RFC 2253 where unsafe characters are converted to #XX where XX is the representation of the unsafe character and the comma, plus, quote, slash, less than and great than signs are escaped using slash notation (\X). In addition to this a space or octothorpe (#) at the beginning of the input string is \ escaped as is a space at the end of a string.
LdapDistinguishedNameEncode(string, bool, bool) is also provided so you may turn off the initial or final character escaping rules, for example if you are concatenating the escaped distinguished name fragment into the midst of a complete distinguished name.
Defense Option 2: TBA
TBA
- Safe Java TBA Example
TBA
- Safe C# .NET TBA Example
TBA
Defense Option 3: Escaping All User Supplied Input
TBA
Additional Defenses
Beyond adopting one of the three primary defenses, we also recommend adopting all of these additional defenses in order to provide defense in depth. These additional defenses are:
- Least Privilege
- White List Input Validation
Least Privilege
To minimize the potential damage of a successful LDAP injection attack, you should minimize the privileges assigned to the LDAP binding account in your environment.
TBA
White List Input Validation
Input validation can be used to detect unauthorized input before it is passed to the SQL query. For more information please see the Input Validation Cheat Sheet.
Related Articles
Description of LDAP Injection Vulnerabilities
- OWASP article on LDAP Injection Vulnerabilities
How to Avoid SQL Injection Vulnerabilities
- OWASP Developers Guide article on how to Avoid LDAP Injection Vulnerabilities
- OWASP article on Preventing LDAP Injection in Java
How to Review Code for LDAP Injection Vulnerabilities
- OWASP Code Review Guide article on how to Review Code for LDAP Injection Vulnerabilities
How to Test for LDAP Injection Vulnerabilities
- OWASP Testing Guide article on how to Test for LDAP Injection Vulnerabilities
Authors and Primary Editors
Jim Manico - jim[at]owasp.org