Тёмный

Cross Origin Resource Sharing (CORS) Vulnerability | BugBountyTraining | Bug Bounty Service 

Martin Voelk
Подписаться 2,3 тыс.
Просмотров 10 тыс.
50% 1

Опубликовано:

 

19 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 22   
@BhushanJadhav-nm3gi
@BhushanJadhav-nm3gi 3 месяца назад
simple and crisp clear. THANKS!
@martinvoelk
@martinvoelk 2 месяца назад
Glad you liked it!
@SHINDE1RU
@SHINDE1RU Месяц назад
what if, the response has: Access-Control-Allow-Origin: * but, no "allow-credentials" popped on headers response. Is like, vulnerable in a real case scenario?
@martinvoelk
@martinvoelk Месяц назад
That totally depends. In a Penetration Test it's a finding with low CVSS score. In Bug Bounty it's usually closed as informative however I had 2 companies pay me as a low. Normally they say in the Ts and Cs. CORS with impact. To pass cookies and make it impactful you need the allow credentials. Hope that makes sense?
@digital-g3h
@digital-g3h 6 месяцев назад
Great explaination
@martinvoelk
@martinvoelk 5 месяцев назад
Thanks
@martinvoelk
@martinvoelk 5 месяцев назад
Thank you
@KalkiKrivaDNA
@KalkiKrivaDNA 3 месяца назад
I find api subdomiNS BUT most of api endpoints are not accessible .
@martinvoelk
@martinvoelk 2 месяца назад
They probably need authentication. Most API endpoints will require some sort of authentication.
@nazeeralbekae5773
@nazeeralbekae5773 10 месяцев назад
if the response says status302 not 200 is a serious vulnerability, can the attacker still take advantage of this ????
@martinvoelk
@martinvoelk 8 месяцев назад
Not necessarily. A 302 is a temporary redirect. you should check how the redirect is initiated. If it's via "Location" usually you cant pull anything meaningful of. Sometimes however it will redirect via window.location and then you might be able to introduce XSS
@musicality621
@musicality621 4 месяца назад
How about CORS on POST request? Is that a vulnerability as well?
@martinvoelk
@martinvoelk 4 месяца назад
Yes absolutely. As a matter of fact you see CORS vulnerabilities often on POST requests
@ManavSahoo-od7dl
@ManavSahoo-od7dl 4 месяца назад
If i find a cors bug but it's on POST request how do i exploit it???? please reply
@martinvoelk
@martinvoelk 4 месяца назад
For Bug Bounty you often don't need to exploit it and just report the reflected headers. Some will accept it and some won't. For impact it depends. Take a look at the CORS labs from the Web Security Academy. Typically you make an Ajax call from your own host to a sensitive (behind login) function
@adityaalfikri6001
@adityaalfikri6001 8 месяцев назад
Cross origin Resorce bug
@martinvoelk
@martinvoelk 8 месяцев назад
yes
@popovanatoliy4736
@popovanatoliy4736 3 дня назад
HOW TO PROTECT FROM THIS FFS?!
@popovanatoliy4736
@popovanatoliy4736 3 дня назад
sorry, i listened for few minutes but you just repeated how this vulnerability works.
@martinvoelk
@martinvoelk 3 дня назад
Ensure that the server only allows trusted origins to make cross-origin requests by properly configuring the Access-Control-Allow-Origin header. Additionally, use proper authentication and authorization mechanisms to prevent unauthorized access to sensitive resources.
Далее
Cross-Origin Resource Sharing (CORS) | Complete Guide
52:17
Добрая весть 😂
00:21
Просмотров 590 тыс.
WHO IS MORE GREEDY?!
00:18
Просмотров 1,1 млн
What is CORS?
13:22
Просмотров 66 тыс.
$200 Bug Bounty PoC Worth | Full API Key Recon
14:28
Просмотров 11 тыс.
Running Nuclei On All My Bug Bounty Programs
10:45
Просмотров 16 тыс.
CORS с нуля. Основы
12:43
Просмотров 17 тыс.