T 5.167 Errors in the logic of web applications

To ensure that business processes can be mapped by a web application, individual functions are usually summarized in a complex application logic. In this respect, it is critical to a process in which order the individual functions or process steps are called up.

If such logical sequences are used for security-relevant functions of the web application, for example for user authentication, they can be manipulated unexpectedly (e.g. by bypassing individual steps) and thus controlled. Under certain circumstances, an attacker is able to bypass the security mechanism.

In addition, malicious actions can also be triggered when functions of the web application can be used for purposes other than those intended. For example, a contact form of a web application can be misused for sending SPAM when the specified contact address in the form can be changed.

Other examples: