Multiphase Process Bypass via Forced Browsing
Also Known As:
Flow Bypass, Insufficient Process Validation
Process Flow Enforcement
Vector Operation Method:
Attackers can bypass security restrictions of multiphase processes by skipping directly to later phases in the process. May be relevant for various types of multiphase processes, such as password recovery processes, multiphase transactions and similar processes that include a security verification.