Category-840: 业务逻辑错误

ID: 840 Status: Incomplete

Summary

Weaknesses in this category identify some of the underlying problems that commonly allow attackers to manipulate the business logic of an application. Errors in business logic can be devastating to an entire application. They can be difficult to find automatically, since they typically involve legitimate use of the application's functionality. However, many business logic errors can exhibit patterns that are similar to well-understood implementation and design weaknesses.

Membership

ID NAME
CWE-200 信息暴露
CWE-282 属主管理不恰当
CWE-285 授权机制不恰当
CWE-288 使用候选路径或通道进行的认证绕过
CWE-408 不正确的行为次序:早期放大攻击
CWE-639 通过用户控制密钥绕过授权机制
CWE-640 忘记口令恢复机制弱
CWE-666 在生命周期错误阶段对资源进行操作
CWE-696 不正确的行为次序
CWE-732 关键资源的不正确权限授予
CWE-754 对因果或异常条件的不恰当检查
CWE-770 不加限制或调节的资源分配
CWE-799 交互频率的控制不恰当
CWE-841 行为工作流的不恰当实施

Notes

Research Gap

References

REF-795 Business Logic Flaws and Yahoo Games REF-796 Seven Business Logic Flaws That Put Your Website At Risk REF-797 Business Logic Flaws REF-798 Abuse of Functionality REF-799 Defying Logic: Theory, Design, and Implementation of Complex Systems for Testing Application Logic REF-667 Real-Life Example of a 'Business Logic Defect' (Screen Shots!) REF-801 Toward Automated Detection of Logic Vulnerabilities in Web Applications REF-802 Designing a Framework Method for Secure Business Application Logic Integrity in e-Commerce Systems