LDAP Injection: From a Developer’s Perspective
Introduction
We all are familiar with injection such as SQL Injection, HTML Injection and many more. In the same way, we have an LDAP injection vulnerability that exists in application security and its severity can be very high as it can be used to do the authentication bypass.
A successful LDAP injection vulnerability can provide so much sensitive…