CORS Exploit
>> YOUR LINK HERE: ___ http://youtube.com/watch?v=M-eYbd-b7Hw
Summary(What is CORS): Cross-origin resource sharing (CORS) is a browser mechanism that enables controlled access to resources located outside of a given domain. However, it also provides the potential for cross-domain-based attacks, if a website's CORS policy is poorly configured and implemented. CORS can be exploited to trust any arbitrary domain attacker-controlled domain name and send the data to it. Attackers can make an exploit and ask the domain to send data of the victim to the attacker domain. • Severity: High • Impact: An Adversary can carry out CORS attack to exfiltrate the sensitive details of a victim • Recommendations: All the REST Api's should be authenticated and the domain should not trust any other domains. Allow only selected, trusted domains in the Access-Control-Allow-Origin header. • Commands: curl https://Domain -I -H Origin:evil.com • โ โ โ Contact me โ โ โ • ๐Medium: / karandarjishack • ๐ Instagram: / karandarjishack • ๐Twitter: / karandarjishack • ๐Github: https://github.com/karandarjishack
#############################
