high
logic
Logic Vulnerabilities
Business logic flaws occur when application workflows can be exploited to achieve unintended outcomes. Unlike technical vulnerabilities, these exploit the design rather than the implementation.
Categories
Vulnerability
Description
Impact
Race Conditions
Exploit timing gaps in concurrent operations
Duplicate resources, bypass limits
Rate Limiting
Evade request throttling mechanisms
Brute force, enumeration
Payment Bypass
Manipulate payment flows and pricing
Financial fraud
Quick Detection Checklist
Common Patterns
Check-Then-Act (TOCTOU)
# Vulnerable: Gap between check and action
if user . balance >= amount : # CHECK
# Race window here!
user . balance -= amount # ACT
Client-Trusted Values
POST /checkout
price=9999&quantity=1&discount=0
# What if price=1 or quantity=-1?
Session State Gaps
Step 1: Login (session created)
Step 2: MFA verification (flag set)
# Race window between 1 and 2
Testing Approach
Map the workflow - Document every step and state change
Identify trust boundaries - What values come from the client?
Find race windows - Where are check-then-act patterns?
Test concurrency - Use Turbo Intruder or Burp's parallel send
Test limits - Negative values, zero, maximum integers
Test order - Skip steps, repeat steps, go backwards
Tool
Purpose
Caido Replay
"Send group in parallel" for race conditions
Turbo Intruder
HTTP/2 single-packet attacks
Custom scripts
Async request batching