You might have noticed throughout this book that there is a common attack theme when user data is used as part of an applications logic. For example, Chapter 10 discusses HTML scripting attacks in which attacker-supplied data is able to inject script in an applications HTML. As a tester, you should think about how your application uses data and ways that malicious data can be injected. SQL injection is just another type of attack that is caused by mixing user data with application logic, and there are other similar examples. By no means are these the only technologies that are vulnerable to injection attacks:
XPath injection XPath is a language that allows querying data from an XML document instead of a database.
Chapter 11, XML Issues, discusses XPath injection. You can also read more about XPath injection at http://www.webappsec.org/projects/threat/classes/xpath_injection.shtml .
LDAP injection Lightweight Directory Access Protocol (LDAP) is used for accessing information directories and provides a method of querying and modifying the data. Refer to http://www.spidynamics.com/whitepapers/LDAPinjection.pdf for more information about LDAP injection.