You are on page 1of 6

Offensive Approach to Hunt

Bugs

Exploitation of Insecure CORS 1/6


Exploitation of Insecure CORS

POORLY IMPLEMENTED, BEST CASE FOR ATTACK:
Access-Control-Allow-Origin: https://attacker.com
Access-Control-Allow-Credentials: true

2/6
Exploitation of Insecure CORS

POORLY IMPLEMENTED, EXPLOITABLE:
Access-Control-Allow-Origin: null
Access-Control-Allow-Credentials: true

3/6
Another way to check Insecure
CORS Vulnerability

curl http://any.com -H “Origin:
http://hackersera.com” -I

4/6
Targets


www.invisionapp.com

Hackersera.in

Foundation.eccouncil.org

5/6
Server May Respond with

Access-Control-Allow-Origin: http://www.evil.com
Access-Control-Allow-Origin: http://www.evil.com

Access-Control-Allow-Origin: *
Access-Control-Allow-Origin: *

Request Blocked

6/6

You might also like