| Home > CAPEC List > CAPEC-136: LDAP Injection (Version 3.9) |
|
High
High
| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | Meta Attack PatternMeta Attack Pattern - A meta level attack pattern in CAPEC is a decidedly abstract characterization of a specific methodology or technique used in an attack. A meta attack pattern is often void of a specific technology or implementation and is meant to provide an understanding of a high level approach. A meta level attack pattern is a generalization of related group of standard level attack patterns. Meta level attack patterns are particularly useful for architecture and design level threat modeling exercises. | 248 | Command Injection |
| View Name | Top Level Categories |
|---|---|
| Domains of Attack | Software |
| Mechanisms of Attack | Inject Unexpected Items |
Survey application: The attacker takes an inventory of the entry points of the application.
| Techniques |
|---|
| Spider web sites for all available links |
| Sniff network communications with application using a utility such as WireShark. |
Determine user-controllable input susceptible to LDAP injection: For each user-controllable input that the attacker suspects is vulnerable to LDAP injection, attempt to inject characters that have special meaning in LDAP (such as a single quote character, etc.). The goal is to create a LDAP query with an invalid syntax
| Techniques |
|---|
| Use web browser to inject input through text fields or through HTTP GET parameters |
| Use a web application debugging tool such as Tamper Data, TamperIE, WebScarab,etc. to modify HTTP POST parameters, hidden fields, non-freeform fields, or other HTTP header. |
| Use modified client (modified by reverse engineering) to inject input. |
Try to exploit the LDAP injection vulnerability: After determining that a given input is vulnerable to LDAP Injection, hypothesize what the underlying query looks like. Possibly using a tool, iteratively try to add logic to the query to extract information from the LDAP, or to modify or delete information in the LDAP.
| Techniques |
|---|
| Add logic to the LDAP query to change the meaning of that command. Automated tools could be used to generate the LDAP injection strings. |
| Use a web application debugging tool such as Tamper Data, TamperIE, WebScarab,etc. to modify HTTP POST parameters, hidden fields, non-freeform fields, or other HTTP header. |
| Scope | Impact | Likelihood |
|---|---|---|
Availability | Unreliable Execution | |
Integrity | Modify Data | |
Confidentiality | Read Data | |
Authorization | Execute Unauthorized Commands | |
Accountability Authentication Authorization Non-Repudiation | Gain Privileges | |
Access Control Authorization | Bypass Protection Mechanism |
| CWE-ID | Weakness Name |
|---|---|
| 77 | Improper Neutralization of Special Elements used in a Command ('Command Injection') |
| 90 | Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') |
| 20 | Improper Input Validation |
| Entry ID | Entry Name |
|---|---|
| 29 | LDAP Injection |
| Entry Name |
|---|
| LDAP Injection |
| Submissions | ||
|---|---|---|
| Submission Date | Submitter | Organization |
| 2014年06月23日 (Version 2.6) | CAPEC Content Team | The MITRE Corporation |
| Modifications | ||
| Modification Date | Modifier | Organization |
| 2018年07月31日 (Version 2.12) | CAPEC Content Team | The MITRE Corporation |
| Updated Attacker_Skills_or_Knowledge_Required | ||
| 2019年04月04日 (Version 3.1) | CAPEC Content Team | The MITRE Corporation |
| Updated Consequences | ||
| 2020年12月17日 (Version 3.4) | CAPEC Content Team | The MITRE Corporation |
| Updated References, Taxonomy_Mappings | ||
|
Use of the Common Attack Pattern Enumeration and Classification (CAPEC), and the associated references from this website are subject to the Terms of Use. Copyright © 2007–2025, The MITRE Corporation. CAPEC and the CAPEC logo are trademarks of The MITRE Corporation. |
||