diff --git a/ql/src/experimental/CWE-090/LDAPinjection.qhelp b/ql/src/experimental/CWE-090/LDAPinjection.qhelp index 3d2eff5cde4..053f0ea3828 100644 --- a/ql/src/experimental/CWE-090/LDAPinjection.qhelp +++ b/ql/src/experimental/CWE-090/LDAPinjection.qhelp @@ -11,7 +11,7 @@ is likely to be able to run malicious LDAP queries.

If user input must be included in an LDAP query or DN, it should be escaped to avoid a malicious user providing special characters that change the meaning -of the query. In Go, user input should be escaped with EscapeFilter +of the query. In Go, user input should be escaped with EscapeFilter. A good practice is to escape filter characters that could change the meaning of the query (https://tools.ietf.org/search/rfc4515#section-3).