Business Logic Flaws

Business logic flaws allow attackers to abuse legitimate transactions or application flows. The main challenge with these flaws is that they are typically missed by scanners or other automated tools.

MITRE assigns CWE-840 to business logic flaws, more information about this can be found here. Examples of business logic flaws include:

  • Unverified Ownership

  • Authentication Bypass Using an Alternate Path or Channel

  • Authorisation Bypass through User-Controlled Key

  • Weak Password Recovery Mechanism for Forgotten Password

  • Incorrect Ownership Assignment

  • Allocation of Resources without Limits or Throttling

  • Premature Release of Resource During Expected Lifetime

  • Improper Enforcement of a Single, Unique Action

  • Improper Enforcement of a Behavioral Workflow

Last updated