LDAP Injection
Attack that exploits applications that build LDAP statements based on user input
Exploits non-validated web input that passes LDAP queries
Attacker can inject code to do all kinds of things
Attacker changes what is entered into the form field by adding characters
)(&)
after the username and then providing any passwordExample:
Last updated