You already have access to these endpoints + there's no sensitive information inside them only public info, it's an informative in the best case.
@cyber_india6 ай бұрын
This vulnerability is N/A
@Adarsh.-.3 ай бұрын
Bro i got my domain reflection in request but when i add the target in HTML code and try to open it, it's giving me 403. Any idea how to bypass this?
@pra15mesh7 ай бұрын
where did you reported this vulnerability? like do they have bb program or email from website only?
@baraamansi7637 Жыл бұрын
Bro if you can access it by default ,why the need for CORS ?!
@CybeR_FrosT Жыл бұрын
We need to check is there CORS misconfiguration vulnerability or not
@baraamansi7637 Жыл бұрын
thanks for the reply dude!! So if there was proper authorization control on the endpoint you would exploit the CORS misconfiguration ,but in your case its just Sensitive Data Exposure by just navigating to the endpoint ,right??!@@CybeR_FrosT
@cinematicRecapss10 ай бұрын
is getting the /wp/v2/users/ also a vuln ?
@CybeR_FrosT9 ай бұрын
yup
@kirtimanmohanty75755 ай бұрын
But nowadays this is only informative or N/A.
@coffinplayz Жыл бұрын
can you please explain both exploit bcz i know first one but not second...also the given link of github have not that script plz paste it in comment if possoble..