CORS
Insecure configurations
Access allowed from any domain
Request
Response
Payload
Place this script on a controlled website. When a user hits the website the script sends a request and stores the response including cookies and tokens at <listener url>/log. By navigating to this url an attacker is able to read the full content of the response
Allowed NULL Origin
Request
Response
Payload
Include the script in an iframe so that the Origin is set to null
CORS Headers parsing error
To attempt to bypass CORS Origin whitelist it is possible to modify the server's name to include part of the target subdomain in order to spoof detection for instance:
Last updated