Cross Origin Resource Sharing (CORS) Vulnerability | BugBountyTraining | Bug Bounty Service

preview_player
Показать описание
This video shows how a misconfigured CORS can be leveraged to facilitate information disclosure.

Check out my courses:

1. The Ultimate Web Application Bug Bounty Hunting Course

2. Burp Suite Apprentice Web App Penetration Testing Course

3. Burp Suite Professional Web App Penetration Testing Course

4. Cyber Awareness Training
Рекомендации по теме
Комментарии
Автор

Hello martin
Your video quality and explanation is amazing.
I found a vulnerability using burp cors but the link for me ends with js and I'm not able to exploit it
Can you help me out with that?
Thank you

patehkhan
Автор

Hello,
Does CORS policy helps in preventing CSRF attack.

ashish_gupta
Автор

Have you done CORS experiments on portswigger? The first level why did I write an html+JavaScript script according to the official poc, send the request to the victim but can not get the api key?

曹曹嘉旭
Автор

what if, the response has:
Access-Control-Allow-Origin: *
but, no "allow-credentials" popped on headers response.
Is like, vulnerable in a real case scenario?

SHINDERU
Автор

if the response says status302 not 200 is a serious vulnerability, can the attacker still take advantage of this ????

nazeeralbekae
Автор

How about CORS on POST request? Is that a vulnerability as well?

musicality
Автор

I find api subdomiNS BUT most of api endpoints are not accessible .

KalkiKrivaDNA
Автор

If i find a cors bug but it's on POST request how do i exploit it???? please reply

ManavSahoo-oddl