이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Metadata

ID: python-flask/ldap-injection

Language: Python

Severity: Error

Category: Security

CWE: 90

Description

LDAP queries that use unsanitized inputs might allow attackers to inject unwanted elements into the query, allowing attackers to read or modify sensitive data, run code, and perform other unwanted actions.

Non-Compliant Code Examples

from flask import Flask, request

app = Flask(__name__)

@app.route("/login", methods=["POST"])
def login():
    data = request.get_json()
    username = data.get("username", "")
    password = data.get("password", "")

    # Not compliant
    ldap_filter = f"(&(uid={username})(userPassword={password}))"

    return f"Filter: {ldap_filter}"

Compliant Code Examples

from flask import request
import ldap

app = Flask(__name__)

@app.route("/login", methods=["POST"])
def login():
    data = request.get_json()
    username = ldap.filter.escape_filter_chars(data.get("username", ""))
    password = ldap.filter.escape_filter_chars(data.get("password", ""))

    ldap_filter = f"(&(uid={username})(userPassword={password}))"

    return f"Filter: {ldap_filter}"
https://static.datadoghq.com/static/images/logos/github_avatar.svg https://static.datadoghq.com/static/images/logos/vscode_avatar.svg jetbrains

Seamless integrations. Try Datadog Code Security

PREVIEWING: domalessi/docs-10584