Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Common Business Logic Flaws Compromising Application Security

There is a class of complex vulnerabilities that are difficult to test for, are exploited in clever, stealthy attacks and can cost enterprises millions of dollars in losses. Think zero-day bugs are being described? Think again.

Business logic attacks are the topic of the description above, as well as a new whitepaper from Web application security vendor NT OBJECTives. In the report, the company details 10 of the most common business logic attack vectors and offers advice to developers on closing the door on abuses.

There is a class of complex vulnerabilities that are difficult to test for, are exploited in clever, stealthy attacks and can cost enterprises millions of dollars in losses. Think zero-day bugs are being described? Think again.

Business logic attacks are the topic of the description above, as well as a new whitepaper from Web application security vendor NT OBJECTives. In the report, the company details 10 of the most common business logic attack vectors and offers advice to developers on closing the door on abuses.

“Business logic is the intended behavior of the application,” explained Dan Kuykendall, co-CEO and CTO of NT OBJECTives. “It’s the functionality that governs the core of what the application does, for example, which users are allowed to see what, how much users are charged for various items, etc. Business logic attacks are things you can do to exploit the logic and cheat the application…(they) are hard to test for because they require both an understanding of the application and of security. In many cases, QA teams know the business logic, but they aren’t security experts and haven’t been trained on the clever attack techniques.”

The common most business logic flaws include: authentication flags and privilege escalations; critical parameter manipulation and access to unauthorized information/content; developer’s cookie tampering and business process/logic bypass; LDAP parameter identification and critical infrastructure access; and business constraint exploitation. Other logic flaws on the company’s list include business flow bypass; exploiting clients side business routines embedded in JavaScript, Flash or Silverlight; identity or profile extraction; file or unauthorized URL access & business information extraction and Denial of Services (DoS) with business logic.

The cost of these types of flaws can be significant. Just recently, two brothers pleaded guilty to federal charges involving their use of business logic attacks against Nordstrom’s e-commerce system to defraud the company out of $1.4 million. According to the U.S. Attorney’s office, the two schemed to defraud the store after being barred from placing orders through Nordstrom.com. As part of their plot, the brothers – who were members FatWallet.com, an online coupon and shopping site that offers cash back incentives for purchases – made purchases through Nordstrom’s online ordering system knowing they would be blocked. However, because of a flaw they exploited, Nordstrom would compensate FatWallet for the order and the brothers would receive cash back credit.

Because exploiting these flaws means the attacker is abusing the natural functionality of the app, business logic flaws will always need to be tested for manually.

“The fact that it is complex is the reason it’s tough to automate,” Kuykendall told SecurityWeek. “The complexity and lack of repeatable pattern is the problem. These vulnerabilities are different in every situation and require human thought, deductive reasoning and clever thought to successfully attack.”

“The good news is that experienced pen testers understand these vulnerabilities and know what to look for,” he continued. “The automated scanners can automate the repeatable aspects that can be more mundane and error prone for human testers. Then the complex aspects that require human intervention, understanding of the business and an ability to cheat the application logic can be left to the penetration testers.”

Advertisement. Scroll to continue reading.
Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.