Business Logic Vulnerabilities - Complete Guide
Business Logic Vulnerabilities - Complete Guide
Agenda
Attack
A regular user submits a request to change another user’s password by
simply not supplying the existing password.
Author: Rana Khalil ( @rana__khalil)
OWASP Top 10
OWASP Top 10 - 2013 OWASP Top 10 - 2017 OWASP Top 10 - 2021
A1 – Injection A1 – Injection A1 – Broken Access Control
A2 – Broken Authentication and Session A2 – Broken Authentication A2 – Cryptographic Failures
Management
A3 – Cross-Site Scripting (XSS) A3 – Sensitive Data Exposure A3 - Injection
A4 – Insecure Direct Object References A4 – XML External Entities (XXE) A4 – Insecure Design
A5 – Security Misconfiguration A5 – Broken Access Control A5 – Security Misconfiguration
A6 – Sensitive Data Exposure A6 – Security Misconfiguration A6 – Vulnerable and Outdated
Components
A7 – Missing Function Level Access Control A7 – Cross-Site Scripting (XSS) A7 – Identification and Authentication
Failures
A8 – Cross-Site Request Forgery (CSRF) A8 – Insecure Deserialization A8 – Software and Data Integrity
Failures
A9 – Using Components with Known A9 – Using Components with A9 – Security Logging and Monitoring
Vulnerabilities Known Vulnerabilities Failures
A10 – Unvalidated Redirects and Forwards A10 – Insufficient Logging & A10 – Server-Side Request Forgery
Monitoring (SSRF)
Author: Rana Khalil ( @rana__khalil)
Resources
• Web Security Academy – Business Logic Vulnerabilities
Ø https://portswigger.net/web-security/logic-flaws
• Web Application Hacker’s Handbook
Ø Chapter 11 – Attacking Application Logic