Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')

Draft Base
Structure: Simple
Description

The product constructs all or part of an LDAP query using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended LDAP query when it is sent to a downstream component.

Common Consequences 1
Scope: ConfidentialityIntegrityAvailability

Impact: Execute Unauthorized Code or CommandsRead Application DataModify Application Data

An attacker could include input that changes the LDAP query which allows unintended commands or code to be executed, allows sensitive data to be read or modified or causes other unintended behavior.

Detection Methods 1
Automated Static AnalysisHigh
Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)
Potential Mitigations 1
Phase: Implementation

Strategy: Input Validation

Assume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range of acceptable values, missing or extra inputs, syntax, consistency across related fields, and conformance to business rules. As an example of business rule logic, "boat" may be syntactically valid because it only contains alphanumeric characters, but it is not valid if the input is only expected to contain colors such as "red" or "blue." Do not rely exclusively on looking for malicious or malformed inputs. This is likely to miss at least one undesirable input, especially if the code's environment changes. This can give attackers enough room to bypass the intended validation. However, denylists can be useful for detecting potential attacks or determining which inputs are so malformed that they should be rejected outright.
Demonstrative Examples 1

ID : DX-210

The code below constructs an LDAP query using user input address data:

Code Example:

Bad
Java
java
Because the code fails to neutralize the address string used to construct the query, an attacker can supply an address that includes additional LDAP queries.
Observed Examples 2
CVE-2021-41232Chain: authentication routine in Go-based agile development product does not escape user name (Improper Encoding or Escaping of Output), allowing LDAP injection (Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection'))
CVE-2005-2301Server does not properly escape LDAP queries, which allows remote attackers to cause a DoS and possibly conduct an LDAP injection attack.
References 1
Web Applications and LDAP Injection
SPI Dynamics
ID: REF-879
Applicable Platforms
Languages:
Not Language-Specific : Undetermined
Technologies:
Database Server : Undetermined
Modes of Introduction
Implementation
Related Attack Patterns
Taxonomy Mapping
  • PLOVER
  • OWASP Top Ten 2007
  • WASC
  • Software Fault Patterns
Notes
RelationshipFactors: resultant to special character mismanagement, MAID, or denylist/allowlist problems. Can be primary to authentication and verification errors.