From f7c19dea711b4c6ae2d2d73200ac4762f4776dce Mon Sep 17 00:00:00 2001 From: Chris Smowton Date: Tue, 9 Nov 2021 10:05:18 +0000 Subject: [PATCH] Copyedit qhelp --- ql/src/experimental/CWE-090/LDAPinjection.qhelp | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/ql/src/experimental/CWE-090/LDAPinjection.qhelp b/ql/src/experimental/CWE-090/LDAPinjection.qhelp index 3d2eff5cde4..053f0ea3828 100644 --- a/ql/src/experimental/CWE-090/LDAPinjection.qhelp +++ b/ql/src/experimental/CWE-090/LDAPinjection.qhelp @@ -11,7 +11,7 @@ is likely to be able to run malicious LDAP queries.

If user input must be included in an LDAP query or DN, it should be escaped to avoid a malicious user providing special characters that change the meaning -of the query. In Go, user input should be escaped with EscapeFilter +of the query. In Go, user input should be escaped with EscapeFilter. A good practice is to escape filter characters that could change the meaning of the query (https://tools.ietf.org/search/rfc4515#section-3).