SlideShare a Scribd company logo
Logical Vulnerabilities in Web
Applications
Nilanjan De, CTO, iViZ Security Inc.

Nov 2013

© iViZ Security Inc

0
Introduction
• iViZ - Cloud based Application Penetration
testing
– Zero False positive guarantee
– Business logic testing along with 100% WASC class
coverage

• 3000+ applications tested till date
• Average number of logical Vulnerabilities per
non-trivial and critical app ~ 2-3
Nov 2013

© iViZ Security Inc

1
Logical Vulnerabilities

Nov 2013

© iViZ Security Inc

2
Logical vs Technical Flaws
Logical Flaws

Technical Flaws

Occurs due to logical design weakness
and not due to wrong coding. These flaws
exploit legitimate processing flow of an
application to cause a negative
consequence to the application owner or
user.

Most often occurs due to wrong or
insecure coding or missing security
controls.

Finding logical vulnerabilities is an
Automated scanners can largely find
Undecidable problem. Hence it is difficult these vulnerabilities
for automated scanners to find them in all
cases.
Typically testing or exploiting these
require multi-step operations and hence
makes it more difficult for automated
scanners to find them.
Nov 2013

These flaws typically have well known and
reliable test-cases.

© iViZ Security Inc

3
Common Logical Vulnerabilities

Nov 2013

© iViZ Security Inc

4
Payment gateway price manipulation
• Manipulation of price when the request is
transferred to payment gateway and back.
• Attacker can purchase at a different price than
actual(usually lower or zero price). Especially
dangerous for items where the fulfillment or
delivery is immediate, e.g., digital downloads,
e-tickets, phone recharge, etc.

Nov 2013

© iViZ Security Inc

5
Discount coupon abuse
• Apply discount coupon on large number of
items and then cancel the items but retain the
discount
• Use same coupon multiple times or use
multiple coupons on the same order.
• Use single time use coupons in multiple orders
by initiating the orders simultaneously.
• Use expired coupons
• Predictable coupon codes
Nov 2013

© iViZ Security Inc

6
Password Recovery
• Weak “Do not have access to registered email?”
functionality.
• Guessable secret questions
–
–
–
–

When is your birthday/anniversary?
Where were you born?
Mother’s maiden name?
Where did you go on honeymoon?

• Multi-step password recovery process bypass.
• Pre-authenticated password change functionality
abuse
Nov 2013

© iViZ Security Inc

7
Negative Transfer
• Transfer negative amount from your account and increase
your bank balance and decrease your victims balance.
– Only client side validation and lack of server side validation
leads to such flaws
– Relatively less common these days but we still find such flaws

• Transfer a very large positive amount from your account
and obtain the same result as above
– Positive amount bypasses client side and server side validation
– Backend legacy code cannot handle above 32-bit integers,
therefore due to integer overflow, treats them as negative
integers

Nov 2013

© iViZ Security Inc

8
Denial of Service
• Lock out legitimate user
– Abuse of legitimate functionality to lock user on
repeated failed logins.
– Can be misused by attackers to lock victim’s
account.

• Lock resources without completing
transaction
– Eg, bus tickets, movie tickets
– Deduct charges before fulfillment of order.
Nov 2013

© iViZ Security Inc

9
Resources
• List of common Logical Vulnerabilities
– http://www.ivizsecurity.com/50-common-logicalvulnerabilities.html

• OWASP
– https://www.owasp.org/index.php/Business_logic
_vulnerability
– https://www.owasp.org/index.php/Testing_for_b
usiness_logic_(OWASP- BL-001)

Nov 2013

© iViZ Security Inc

10
Questions?

Nov 2013

© iViZ Security Inc

11
Thank You
nilanjan@ivizsecurity.com
http://www.ivizsecurity.com/

Nov 2013

© iViZ Security Inc

12

More Related Content

PDF
The Non-Advanced Persistent Threat
PPTX
Building better security for your API platform using Azure API Management
PPTX
Data-driven Security: Protect APIs from Adaptive Threats
PPTX
Empathy in Monitoring
PPTX
API Days Paris - When RESTful may be considered harmful
PDF
MuleSoft Meetup Dubai Anypoint security with api-led Connectivity
PPTX
SplunkLive! Utrecht - Splunk for Security - Monzy Merza
PPTX
Be the Hunter
The Non-Advanced Persistent Threat
Building better security for your API platform using Azure API Management
Data-driven Security: Protect APIs from Adaptive Threats
Empathy in Monitoring
API Days Paris - When RESTful may be considered harmful
MuleSoft Meetup Dubai Anypoint security with api-led Connectivity
SplunkLive! Utrecht - Splunk for Security - Monzy Merza
Be the Hunter

What's hot (19)

PPTX
Understanding Web Bots and How They Hurt Your Business
PDF
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
PPTX
SplunkLive! Utrecht - Splunk for IT Operations - Rick Fitz
PPTX
Detecting and Blocking Suspicious Internal Network Traffic
PPTX
Tervela Streaming for Web & Mobile
PDF
Hacker vs AI
PDF
Republic Services Customer Presentation
PDF
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
PPTX
Design, Build and Map IT and Business Services in Splunk
PDF
Applying API Security at Scale
PPTX
Managing Identities in the World of APIs
PPTX
Security as an Enabler for the Digital World - CISO Perspective
PPTX
apidays LIVE India - 10 steps to secure your API by Pabitra Kumar Sahoo, Qual...
PDF
Two-factor Authentication
PDF
Hacking A Bluetooth-Enabled Medical Device Is Too Easy
PDF
SACON - Connected cars (Aditya Kakrania)
PDF
Compliance in the mobile enterprise: 5 tips to prepare for your next audit
PDF
Developing Web Applications Securely - How to Fix Common Code Vulnerabilities...
PDF
SplunkLive! Stockholm 2017 - ABN AMRO Customer Presentation
Understanding Web Bots and How They Hurt Your Business
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
SplunkLive! Utrecht - Splunk for IT Operations - Rick Fitz
Detecting and Blocking Suspicious Internal Network Traffic
Tervela Streaming for Web & Mobile
Hacker vs AI
Republic Services Customer Presentation
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Design, Build and Map IT and Business Services in Splunk
Applying API Security at Scale
Managing Identities in the World of APIs
Security as an Enabler for the Digital World - CISO Perspective
apidays LIVE India - 10 steps to secure your API by Pabitra Kumar Sahoo, Qual...
Two-factor Authentication
Hacking A Bluetooth-Enabled Medical Device Is Too Easy
SACON - Connected cars (Aditya Kakrania)
Compliance in the mobile enterprise: 5 tips to prepare for your next audit
Developing Web Applications Securely - How to Fix Common Code Vulnerabilities...
SplunkLive! Stockholm 2017 - ABN AMRO Customer Presentation
Ad

Viewers also liked (19)

DOC
Mohit_Jain_Resume
PPT
nostalgia pix
PPTX
PSICOLOGIA DE LA SALUD
DOC
Solicitud de alta como socio de acedc
PDF
Oer prezi
PDF
Ciso bitcoin tx_mallability-pdf
PDF
Bachelor in History
PDF
ciso-platform-annual-summit-2013-IT risk as business risk
PPTX
RAB Lighting
PDF
447.теория и история литературы проблемы фольклоризма и мифотворчества
PDF
Notorious 9 ciso platform moshe
PDF
197.«основные положения гражданского права» часть 2 «договоры, направленные н...
PDF
El coordinator meeting 11.5.15
PPTX
Nielson_Samaj in Bhutanese Culture
PPTX
Nanotechnology in surgery
PDF
Performance Arts Awards Graded Examinations in Musical Theatre | RSL
PDF
Information Visualization Project
PDF
AHMED HAMDI%27S PORTFOLIO
Mohit_Jain_Resume
nostalgia pix
PSICOLOGIA DE LA SALUD
Solicitud de alta como socio de acedc
Oer prezi
Ciso bitcoin tx_mallability-pdf
Bachelor in History
ciso-platform-annual-summit-2013-IT risk as business risk
RAB Lighting
447.теория и история литературы проблемы фольклоризма и мифотворчества
Notorious 9 ciso platform moshe
197.«основные положения гражданского права» часть 2 «договоры, направленные н...
El coordinator meeting 11.5.15
Nielson_Samaj in Bhutanese Culture
Nanotechnology in surgery
Performance Arts Awards Graded Examinations in Musical Theatre | RSL
Information Visualization Project
AHMED HAMDI%27S PORTFOLIO
Ad

Similar to Ciso-platform-annual-summit-2013_logical vulnerabilities_(nilanjan_iviz) (20)

PPTX
Anatomy of business logic vulnerabilities
PPTX
Using 80 20 rule in application security management
PDF
Securing a Moving Target
PPT
Insecurity in security products 2013
PPT
Why current security solutions fail
PPTX
Mike Spaulding - Building an Application Security Program
PPTX
Building an AppSec Team Extended Cut
PPTX
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
PDF
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
PDF
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
PDF
Web Application Security For Small and Medium Businesses
PPTX
Introduction Sebyde BV | Security Testing | Security Awareness | Secure Devel...
PPTX
Cyber security - It starts with the embedded system
PDF
Securing the Future of Applications Meetup 18092024
PPTX
Andrew Useckas Csa presentation hacking custom webapps 4 3
PDF
Oh, WASP! Security Essentials for Web Apps
PPTX
[CB19] Integration of Cyber Insurance Into A Risk Management Program by Jake ...
PPTX
Securing Privileged Access “Inside the Perimeter”
PPTX
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
KEY
Application Security Done Right
Anatomy of business logic vulnerabilities
Using 80 20 rule in application security management
Securing a Moving Target
Insecurity in security products 2013
Why current security solutions fail
Mike Spaulding - Building an Application Security Program
Building an AppSec Team Extended Cut
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Web Application Security For Small and Medium Businesses
Introduction Sebyde BV | Security Testing | Security Awareness | Secure Devel...
Cyber security - It starts with the embedded system
Securing the Future of Applications Meetup 18092024
Andrew Useckas Csa presentation hacking custom webapps 4 3
Oh, WASP! Security Essentials for Web Apps
[CB19] Integration of Cyber Insurance Into A Risk Management Program by Jake ...
Securing Privileged Access “Inside the Perimeter”
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Application Security Done Right

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Hybrid model detection and classification of lung cancer
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
A Presentation on Touch Screen Technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Approach and Philosophy of On baking technology
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
1. Introduction to Computer Programming.pptx
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
project resource management chapter-09.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Hybrid model detection and classification of lung cancer
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Web App vs Mobile App What Should You Build First.pdf
A comparative analysis of optical character recognition models for extracting...
SOPHOS-XG Firewall Administrator PPT.pptx
A comparative study of natural language inference in Swahili using monolingua...
A Presentation on Touch Screen Technology
Unlocking AI with Model Context Protocol (MCP)
Group 1 Presentation -Planning and Decision Making .pptx
Enhancing emotion recognition model for a student engagement use case through...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Encapsulation theory and applications.pdf
Approach and Philosophy of On baking technology
gpt5_lecture_notes_comprehensive_20250812015547.pdf
1. Introduction to Computer Programming.pptx
OMC Textile Division Presentation 2021.pptx
project resource management chapter-09.pdf

Ciso-platform-annual-summit-2013_logical vulnerabilities_(nilanjan_iviz)

  • 1. Logical Vulnerabilities in Web Applications Nilanjan De, CTO, iViZ Security Inc. Nov 2013 © iViZ Security Inc 0
  • 2. Introduction • iViZ - Cloud based Application Penetration testing – Zero False positive guarantee – Business logic testing along with 100% WASC class coverage • 3000+ applications tested till date • Average number of logical Vulnerabilities per non-trivial and critical app ~ 2-3 Nov 2013 © iViZ Security Inc 1
  • 4. Logical vs Technical Flaws Logical Flaws Technical Flaws Occurs due to logical design weakness and not due to wrong coding. These flaws exploit legitimate processing flow of an application to cause a negative consequence to the application owner or user. Most often occurs due to wrong or insecure coding or missing security controls. Finding logical vulnerabilities is an Automated scanners can largely find Undecidable problem. Hence it is difficult these vulnerabilities for automated scanners to find them in all cases. Typically testing or exploiting these require multi-step operations and hence makes it more difficult for automated scanners to find them. Nov 2013 These flaws typically have well known and reliable test-cases. © iViZ Security Inc 3
  • 5. Common Logical Vulnerabilities Nov 2013 © iViZ Security Inc 4
  • 6. Payment gateway price manipulation • Manipulation of price when the request is transferred to payment gateway and back. • Attacker can purchase at a different price than actual(usually lower or zero price). Especially dangerous for items where the fulfillment or delivery is immediate, e.g., digital downloads, e-tickets, phone recharge, etc. Nov 2013 © iViZ Security Inc 5
  • 7. Discount coupon abuse • Apply discount coupon on large number of items and then cancel the items but retain the discount • Use same coupon multiple times or use multiple coupons on the same order. • Use single time use coupons in multiple orders by initiating the orders simultaneously. • Use expired coupons • Predictable coupon codes Nov 2013 © iViZ Security Inc 6
  • 8. Password Recovery • Weak “Do not have access to registered email?” functionality. • Guessable secret questions – – – – When is your birthday/anniversary? Where were you born? Mother’s maiden name? Where did you go on honeymoon? • Multi-step password recovery process bypass. • Pre-authenticated password change functionality abuse Nov 2013 © iViZ Security Inc 7
  • 9. Negative Transfer • Transfer negative amount from your account and increase your bank balance and decrease your victims balance. – Only client side validation and lack of server side validation leads to such flaws – Relatively less common these days but we still find such flaws • Transfer a very large positive amount from your account and obtain the same result as above – Positive amount bypasses client side and server side validation – Backend legacy code cannot handle above 32-bit integers, therefore due to integer overflow, treats them as negative integers Nov 2013 © iViZ Security Inc 8
  • 10. Denial of Service • Lock out legitimate user – Abuse of legitimate functionality to lock user on repeated failed logins. – Can be misused by attackers to lock victim’s account. • Lock resources without completing transaction – Eg, bus tickets, movie tickets – Deduct charges before fulfillment of order. Nov 2013 © iViZ Security Inc 9
  • 11. Resources • List of common Logical Vulnerabilities – http://www.ivizsecurity.com/50-common-logicalvulnerabilities.html • OWASP – https://www.owasp.org/index.php/Business_logic _vulnerability – https://www.owasp.org/index.php/Testing_for_b usiness_logic_(OWASP- BL-001) Nov 2013 © iViZ Security Inc 10
  • 12. Questions? Nov 2013 © iViZ Security Inc 11