Business Logic & Abuse
Business Logic & Abuse vulnerabilities at a glance
Overview
Business logic vulnerabilities occur when application functionality can be used in ways the designers never intended, often through legitimate API calls and user actions. Unlike injection vulnerabilities that exploit technical weaknesses, business logic flaws exploit gaps in the application's rules and assumptions.
These vulnerabilities are particularly dangerous because they require understanding the specific business context and can't be detected through simple pattern matching. Attackers might purchase items at manipulated prices, skip required workflow steps, exploit timing windows between operations, or abuse features to cause financial loss.
Where it occurs
Business logic flaws occur in application workflows that lack proper state management, server-side validation, or enforcement of business rules and assumptions.
Impact
Business logic vulnerabilities directly impact the bottom line through fraudulent transactions, inventory manipulation, unauthorized discounts, and service abuse.
Prevention
The specific approach to prevent these issues depends on the exact vulnerability, but generally you will need robust validation of any user action or input and double check that those align with the underlying business logic.
Specific Vulnerabilities
Explore specific vulnerability types within this category:
Detect These Vulnerabilities in Your Code
Sourcery automatically identifies business logic & abuse and related vulnerabilities in your codebase.
Scan Your Code for Free