CAPEC-136: LDAP Injection

Standard Draft 严重程度: High 攻击可能性: High

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An attacker manipulates or crafts an LDAP query for the purpose of undermining the security of the target. Some applications use user input to create LDAP queries that are processed by an LDAP server. For example, a user might provide their username during authentication and the username might be inserted in an LDAP query during the authentication process. An attacker could use this input to inject additional commands into an LDAP query that could disclose sensitive information. For example, entering a * in the aforementioned query might return information about all users on the system. This attack is very similar to an SQL injection attack in that it manipulates a query to gather additional information or coerce a particular return value.

执行流程

步骤 1 Explore

[Survey application] The attacker takes an inventory of the entry points of the application.

技术:
  • Spider web sites for all available links
  • Sniff network communications with application using a utility such as WireShark.
步骤 2 Experiment

[Determine user-controllable input susceptible to LDAP injection] For each user-controllable input that the attacker suspects is vulnerable to LDAP injection, attempt to inject characters that have special meaning in LDAP (such as a single quote character, etc.). The goal is to create a LDAP query with an invalid syntax

技术:
  • Use web browser to inject input through text fields or through HTTP GET parameters
  • Use a web application debugging tool such as Tamper Data, TamperIE, WebScarab,etc. to modify HTTP POST parameters, hidden fields, non-freeform fields, or other HTTP header.
  • Use modified client (modified by reverse engineering) to inject input.
步骤 3 Experiment

[Try to exploit the LDAP injection vulnerability] After determining that a given input is vulnerable to LDAP Injection, hypothesize what the underlying query looks like. Possibly using a tool, iteratively try to add logic to the query to extract information from the LDAP, or to modify or delete information in the LDAP.

技术:
  • Add logic to the LDAP query to change the meaning of that command. Automated tools could be used to generate the LDAP injection strings.
  • Use a web application debugging tool such as Tamper Data, TamperIE, WebScarab,etc. to modify HTTP POST parameters, hidden fields, non-freeform fields, or other HTTP header.

前提条件

  • The target application must accept a string as user input, fail to sanitize characters that have a special meaning in LDAP queries in the user input, and insert the user-supplied string in an LDAP query which is then processed.

所需技能

Medium The attacker needs to have knowledge of LDAP, especially its query syntax.

后果影响

影响范围: Availability

技术影响: Unreliable Execution

影响范围: Integrity

技术影响: Modify Data

影响范围: Confidentiality

技术影响: Read Data

影响范围: Authorization

技术影响: Execute Unauthorized Commands

说明: Run Arbitrary Code

影响范围: Accountability Authentication Authorization Non-Repudiation

技术影响: Gain Privileges

影响范围: Access Control Authorization

技术影响: Bypass Protection Mechanism

缓解措施

Strong input validation - All user-controllable input must be validated and filtered for illegal characters as well as LDAP content.

Use of custom error pages - Attackers can glean information about the nature of queries from descriptive error messages. Input validation must be coupled with customized error pages that inform about an error without disclosing information about the LDAP or application.

示例实例

PowerDNS before 2.9.18, when running with an LDAP backend, does not properly escape LDAP queries, which allows remote attackers to cause a denial of service (failure to answer ldap questions) and possibly conduct an LDAP injection attack. See also: CVE-2005-2301

分类映射

分类名称 条目ID 条目名称
WASC 29 LDAP Injection
OWASP Attacks - LDAP Injection
关键信息

CAPEC ID: CAPEC-136

抽象级别: Standard

状态: Draft

典型严重程度: High

攻击可能性: High

相关攻击模式