- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`ID: python-flask/ldap-injection
Language: Python
Severity: Error
Category: Security
CWE: 90
LDAP queries that use unsanitized inputs might allow attackers to inject unwanted elements into the query, allowing attackers to read or modify sensitive data, run code, and perform other unwanted actions.
from flask import Flask, request
app = Flask(__name__)
@app.route("/login", methods=["POST"])
def login():
data = request.get_json()
username = data.get("username", "")
password = data.get("password", "")
# Not compliant
ldap_filter = f"(&(uid={username})(userPassword={password}))"
return f"Filter: {ldap_filter}"
from flask import request
import ldap
app = Flask(__name__)
@app.route("/login", methods=["POST"])
def login():
data = request.get_json()
username = ldap.filter.escape_filter_chars(data.get("username", ""))
password = ldap.filter.escape_filter_chars(data.get("password", ""))
ldap_filter = f"(&(uid={username})(userPassword={password}))"
return f"Filter: {ldap_filter}"