Query
github/codeql#5443
Report
Constructing LDAP names or search filters directly from tainted data enables attackers to inject specially crafted values that changes the initial meaning of the name or filter itself. Successful LDAP injections attacks can read, modify or delete sensitive information from the directory service.
This query identifies cases in which a LDAP query executes user-provided input without being sanitized before.
Result(s)
Query
github/codeql#5443
Report
Constructing LDAP names or search filters directly from tainted data enables attackers to inject specially crafted values that changes the initial meaning of the name or filter itself. Successful LDAP injections attacks can read, modify or delete sensitive information from the directory service.
This query identifies cases in which a LDAP query executes user-provided input without being sanitized before.
Result(s)