CORS
CORS
1
G TTP/1.1 200 OK
H
Host: vulnerable-website.com Access-Control-Allow-Origin: https://malicious-website.com
Origin: https://malicious-website.com Access-Control-Allow-Credentials: true
ACAO Cookie: sessionid=... ...
ET /sensitive-victim-data
G TTP/1.1 200 OK
H
Host: vulnerable-website.com Access-Control-Allow-Origin: null
Origin: null Access-Control-Allow-Credentials: true
Cross-origin redirects
ET /reader?url=doc1.pdf
G
Host: intranet.normal-website.com TTP/1.1 200 OK
H
Origin: https://normal-website.com Access-Control-Allow-Origin: *
Intranets and CORS without credentials he application server is trusting resource requests from any origin without
T
credentials. If users within the private IP address space access the public
internet then a CORS-based attack can be performed from the external site
that uses the victim's browser as a proxy for accessing intranet resources.