LDAP privilege escalation is the act of manipulating permissions or attributes in an LDAP directory to gain higher-level access than originally granted. It can occur when LDAP configurations are insecure, access control rules are lax, or input validation is absent. Attackers often chain LDAP privilege escalation with other vulnerabilities to move from limited access to full administrative control.
Common attack vectors include:
- Weak Access Control Lists (ACLs): Misconfigured ACLs allow unauthorized writes to sensitive attributes like
memberOforadminRole. - Attribute Injection: Unsafe LDAP modification operations allow attackers to add themselves to privileged groups.
- Exposed Bind Credentials: Service accounts with elevated roles stored without encryption or in client-side code.
- Privilege Creep: Over time, users accumulate roles without proper auditing, creating opportunities for lateral escalation.
Detection requires tight audit trails and real-time monitoring of LDAP changes. Focus on: