[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

Business Logic Errors

ID: 840Date: (C)2012-05-14   (M)2022-10-10
Type: categoryStatus: INCOMPLETE





Description

Weaknesses in this category identify some of the underlying problems that commonly allow attackers to manipulate the business logic of an application.

Extended Description

Errors in business logic can be devastating to an entire application. They can be difficult to find automatically, since they typically involve legitimate use of the application's functionality. However, many business logic errors can exhibit patterns that are similar to well-understood implementation and design weaknesses.

Applicable Platforms
None

Common Consequences
None

Detection Methods
None

Potential Mitigations
None

Relationships

Related CWETypeViewChain
CWE-840 ChildOf CWE-438 Category CWE-699  

Demonstrative Examples
None

Observed Examples

  1. CVE-2010-4624 : Bulletin board applies restrictions on number of images during post creation, but does not enforce this on editing.

For more examples, refer to CVE relations in the bottom box.

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings

TaxynomyIdNameFit
WASC 42
 
Abuse of Functionality
 
 

References:

  1. Jeremiah Grossman .Business Logic Flaws and Yahoo Games. 2006-12-08. Published on October 2007.
  2. Jeremiah Grossman .Seven Business Logic Flaws That Put Your Website At Risk. Published on October 2007.
  3. WhiteHat Security .Business Logic Flaws.
  4. WASC .Abuse of Functionality.
  5. Rafal Los Prajakta Jagdale .Defying Logic: Theory, Design, and Implementation of Complex Systems for Testing Application Logic. Published on 2011.
  6. Rafal Los .Real-Life Example of a 'Business Logic Defect' (Screen Shots!). Published on 2011.
  7. Viktoria Felmetsger Ludovico Cavedon Christopher Kruegel Giovanni Vigna .Toward Automated Detection of Logic Vulnerabilities in Web Applications. USENIX Security Symposium 2010. Published on August 2010.
  8. Faisal Nabi .Designing a Framework Method for Secure Business Application Logic Integrity in e-Commerce Systems. International Journal of Network Security, Vol.12, No.1. Section:'pages 29 - 41'. Published on 2011.
CVE    7
CVE-2021-36012
CVE-2021-4111
CVE-2021-4117
CVE-2022-0596
...

© SecPod Technologies