Cross Origin Resource Sharing (CORS) Vulnerability | BugBountyTraining | Bug Bounty Service

แชร์
ฝัง
  • เผยแพร่เมื่อ 7 ก.ย. 2024
  • This video shows how a misconfigured CORS can be leveraged to facilitate information disclosure.
    Check out my courses:
    1. The Ultimate Web Application Bug Bounty Hunting Course
    www.udemy.com/...
    2. Burp Suite Apprentice Web App Penetration Testing Course
    www.udemy.com/...
    3. Burp Suite Professional Web App Penetration Testing Course
    www.udemy.com/...
    4. Cyber Awareness Training
    www.udemy.com/...

ความคิดเห็น • 19

  • @BhushanJadhav-nm3gi
    @BhushanJadhav-nm3gi 3 หลายเดือนก่อน

    simple and crisp clear. THANKS!

    • @martinvoelk
      @martinvoelk  2 หลายเดือนก่อน

      Glad you liked it!

  • @SHINDE1RU
    @SHINDE1RU 29 วันที่ผ่านมา

    what if, the response has:
    Access-Control-Allow-Origin: *
    but, no "allow-credentials" popped on headers response.
    Is like, vulnerable in a real case scenario?

    • @martinvoelk
      @martinvoelk  29 วันที่ผ่านมา

      That totally depends. In a Penetration Test it's a finding with low CVSS score. In Bug Bounty it's usually closed as informative however I had 2 companies pay me as a low. Normally they say in the Ts and Cs. CORS with impact. To pass cookies and make it impactful you need the allow credentials. Hope that makes sense?

  • @user-fz9lu9do5m
    @user-fz9lu9do5m 6 หลายเดือนก่อน

    Great explaination

  • @musicality621
    @musicality621 4 หลายเดือนก่อน

    How about CORS on POST request? Is that a vulnerability as well?

    • @martinvoelk
      @martinvoelk  4 หลายเดือนก่อน +1

      Yes absolutely. As a matter of fact you see CORS vulnerabilities often on POST requests

  • @KalkiKrivaDNA
    @KalkiKrivaDNA 2 หลายเดือนก่อน

    I find api subdomiNS BUT most of api endpoints are not accessible .

    • @martinvoelk
      @martinvoelk  2 หลายเดือนก่อน

      They probably need authentication. Most API endpoints will require some sort of authentication.

  • @nazeeralbekae5773
    @nazeeralbekae5773 9 หลายเดือนก่อน

    if the response says status302 not 200 is a serious vulnerability, can the attacker still take advantage of this ????

    • @martinvoelk
      @martinvoelk  8 หลายเดือนก่อน

      Not necessarily. A 302 is a temporary redirect. you should check how the redirect is initiated. If it's via "Location" usually you cant pull anything meaningful of. Sometimes however it will redirect via window.location and then you might be able to introduce XSS

  • @ManavSahoo-od7dl
    @ManavSahoo-od7dl 4 หลายเดือนก่อน

    If i find a cors bug but it's on POST request how do i exploit it???? please reply

    • @martinvoelk
      @martinvoelk  4 หลายเดือนก่อน

      For Bug Bounty you often don't need to exploit it and just report the reflected headers. Some will accept it and some won't. For impact it depends. Take a look at the CORS labs from the Web Security Academy. Typically you make an Ajax call from your own host to a sensitive (behind login) function

  • @adityaalfikri6001
    @adityaalfikri6001 8 หลายเดือนก่อน +1

    Cross origin Resorce bug