About 5,950 results
Open links in new tab
  1. LDAP Injection - OWASP Foundation

    LDAP Injection is an attack used to exploit web based applications that construct LDAP statements based on user input. When an application fails to properly sanitize user input, it’s possible to modify …

  2. LDAP Injection Guide: Types, Examples, Prevention

    Jun 2, 2021 · Understand how LDAP injection attacks work and their impact, see examples of attacks and payloads, and learn to protect your application.

  3. What Is LDAP Injection and How Does It Work? | Black Duck

    What is LDAP injection? LDAP injection is a vulnerability in which queries are constructed from untrusted input without prior validation or sanitization. LDAP uses queries constructed from …

  4. LDAP Injection - HackTricks

    It occurs when the application fails to properly sanitize input, allowing attackers to manipulate LDAP statements through a local proxy, potentially leading to unauthorized access or data manipulation.

  5. LDAP Injection: The Forgotten Injection Attack on Enterprise

    Nov 1, 2025 · LDAP injection is a code injection attack that exploits web-based applications constructing LDAP statements from unsanitized user input.

  6. What is LDAP injection? | Tutorial & examples | Snyk Learn

    Learn about LDAP injection, and how to mitigate and remediate the vulnerability with real-world examples from security experts.

  7. LDAP injection - Wikipedia

    LDAP injection occurs when user input is not properly sanitized and then used as part of a dynamically generated LDAP filter. This results in potential manipulation of the LDAP statements performed on …

  8. LDAP injection - PortSwigger

    LDAP injection arises when user-controllable data is copied in an unsafe way into an LDAP query that is performed by the application. If an attacker can inject LDAP metacharacters into the query, then they …

  9. What is LDAP Injection | Examples & Prevention | Imperva

    Oct 28, 2025 · When LDAP directories are used for website authentication purposes, threat actors can inject malicious code into user input fields. The actor can then gain unauthorized access to the LDAP …

  10. What Is an LDAP Injection? Types and Prevention

    LDAP injection inserts malicious input into a user-facing field, like a login form or search box. The application passes that input into an LDAP query, allowing the attacker to change what the query …