Skip to content

Commit 71a8e10

Browse files
committed
CS: added extra guidance in recommendation section for LDAPInjection
1 parent c475bed commit 71a8e10

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

csharp/ql/src/Security Features/CWE-090/LDAPInjection.qhelp

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ is likely to be able to run malicious LDAP queries.</p>
1212
<p>If user input must be included in an LDAP query, it should be escaped to
1313
avoid a malicious user providing special characters that change the meaning
1414
of the query. If possible, use an existing library, such as the AntiXSS
15-
library.</p>
15+
library. One may also make their own encoder filter <code>`LdapEncode`</code> following RFC 4515 standards.</p>
1616
</recommendation>
1717

1818
<example>
@@ -35,5 +35,6 @@ the query cannot be changed by a malicious user.</p>
3535
<references>
3636
<li>OWASP: <a href="https://cheatsheetseries.owasp.org/cheatsheets/LDAP_Injection_Prevention_Cheat_Sheet.html">LDAP Injection Prevention Cheat Sheet</a>.</li>
3737
<li>OWASP: <a href="https://www.owasp.org/index.php/Preventing_LDAP_Injection_in_Java">Preventing LDAP Injection in Java</a>.</li>
38+
<li>RFC 4515: <a href="https://datatracker.ietf.org/doc/html/rfc4515#section-3">String Search Filter Definition</a>.</li>
3839
</references>
3940
</qhelp>

0 commit comments

Comments
 (0)