Description: Business logic vulnerabilities often arise due to the flawed assumptions about how users will interact with the application. These bad assumptions can lead to inadequate validation of user input. 1.From date to date .
Suggested Remediation: '1. Avoid making implicit assumptions about user behaviour or the behaviour of other functions of the application2. Identify what assumptions have been made about the server-side state and implement the necessary logic to verify that these assumptions are met. This includes making sure that the value of any input is sensible before proceeding
Assigned To: glenn.v.garcia;
Assessor: s.shankarayya.mathad;
Description: Business logic vulnerabilities often arise due to the flawed assumptions about how users will interact with the application. These bad assumptions can lead to inadequate validation of user input. 1.From date to date .
Suggested Remediation: '1. Avoid making implicit assumptions about user behaviour or the behaviour of other functions of the application2. Identify what assumptions have been made about the server-side state and implement the necessary logic to verify that these assumptions are met. This includes making sure that the value of any input is sensible before proceeding
Link to Actual Report: https://egrc.accenture.com/default.aspx?requestUrl=..%2fGenericContent%2fRecord.aspx%3fid%3d31313158%26moduleId%3d167
Ticket: VIT0590096
Link to Service Now: https://support.accenture.com/sn_vul_vulnerable_item.do?sys_id=38523dbbc3613954033d016dc00131b6
Vulnerability Category: Application Security Assessment
Target Remediation Date:
Azdo Link - https://dev.azure.com/accenturecio26/WebContentDigAssetMgmt_PR1093/_workitems/edit/374172