CodeAnt AI home pagelight logodark logo
  • Dashboard
  • Dashboard
  • Documentation
  • Demo Call with CEO
  • Blog
  • Slack
  • Get Started
    • CodeAnt AI
    • Setup
    • Control Center
    • Pull Request Review
    • IDE
    • Compliance
    • Anti-Patterns
    • Code Governance
    • Infrastructure Security Database
    • Application Security Database
      • Apex
      • Bash
      • C
      • Clojure
      • Cpp
        • Lang
          • Correctness
          • Security
            • Containers
            • Crypto
            • Filesystem
            • Format-string
            • Ldap
              • Ldap-injection-dn
                • Ldap injection dn
              • Ldap-injection-filter
            • Libraries
            • Memory
            • Misc
            • Rng
            • Sql
            • Strings
            • System-command
            • Uri
            • Use-after-free
        • Libxml2
      • Csharp
      • Dockerfile
      • Elixir
      • Fingerprints
      • Generic
      • Go
      • Html
      • Java
      • Javascript
      • Json
      • Kotlin
      • Ocaml
      • Php
      • Problem-based-packs
      • Python
      • Ruby
      • Rust
      • Scala
      • Solidity
      • Swift
      • Terraform
      • Typescript
      • Yaml
    Ldap-injection-dn

    Ldap injection dn

    Untrusted input might be used to build an LDAP query, which can allow attackers to run arbitrary LDAP queries. If an LDAP query must contain untrusted input then it must be escaped.
    Likelihood: MEDIUM
    Confidence: HIGH
    CWE:
    - CWE-90: Improper Neutralization of Special Elements used in an LDAP Query (‘LDAP Injection’)
    OWASP:
    - A01:2017 - Injection
    - A03:2021 - Injection

    Format string injectionLdap injection filter
    twitterlinkedin
    Powered by Mintlify