1 Logic Bypass Attack Patterns
Business logic flaws exploit gaps in the intended application workflow rather than technical vulnerabilities. Automated scanners often miss them because they require understanding the business context.
Price manipulation:
POST /api/checkout
{ "items": [{ "id": "laptop123", "price": 0.01, "quantity": 1 }] }
# Vulnerable server trusts client-submitted price!Negative quantity:
POST /api/cart/add
{ "item": "gift-card-100", "quantity": -10 }
# Result: $-1000 applied to cart, effectively getting paid to shopWorkflow bypass:
# Normal flow: Step 1 (add items) → Step 2 (enter payment) → Step 3 (confirm)
# Attacker goes directly to:
POST /api/orders/confirm?orderId=PENDING_ORDER_ID
# Without completing payment step — order is confirmed for freeRace conditions: Submitting two requests simultaneously to redeem the same coupon code or transfer more funds than the balance allows.