CWE - CWE-840 - Business Logic Errors (4.15)
CWE - CWE-840 - Business Logic Errors (4.15)
CWE - CWE-840 - Business Logic Errors (4.15)
Home About ▼ CWE List ▼ Mapping ▼ Top-N Lists ▼ Community ▼ News ▼ Search
Summary
Weaknesses in this category identify some of the underlying problems that commonly allow attackers to manipulate the
business logic of an application. Errors in business logic can be devastating to an entire application. They can be difficult to
find automatically, since they typically involve legitimate use of the application's functionality. However, many business logic
errors can exhibit patterns that are similar to well-understood implementation and design weaknesses.
Membership
Usage: PROHIBITED (this CWE ID must not be used to map to real-world vulnerabilities)
Reason: Category
Rationale:
This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal
organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing.
However, they are not weaknesses in themselves.
Comments:
[REF-795] Jeremiah Grossman. "Business Logic Flaws and Yahoo Games". 2006-12-08.
<https://blog.jeremiahgrossman.com/2006/12/business-logic-flaws.html>. URL validated: 2023-04-07.
[REF-796] Jeremiah Grossman. "Seven Business Logic Flaws That Put Your Website At Risk". 2007-10.
<https://docplayer.net/10021793-Seven-business-logic-flaws-that-put-your-website-at-risk.html>. URL validated: 2023-04-
07.
Submissions
Submission Date Submitter Organization
2011-03-24 CWE Content Team MITRE
(CWE 1.12, 2011-03-30)
Modifications