Md Ismail Šojal Profile picture
Dec 19, 2022 8 tweets 2 min read Read on X
Insecure CORS Configuration" vulnerabilities. 🛡️⚔️

[A thread 🧵]

#infosecurity #CyberSec #bugbountytips #cybersecurity
[2/n]
What is Insecure CORS issue?

An insecure CORS configuration allows any website to trigger requests with user credentials to the target application and read the responses thus enabling attackers to perform privileged actions or to retrieve potential sensitive information
[3/n]

Basic Origin Reflection Test:

Req: Origin: evil[.]com
Res: Access-Control-Allow-Origin: evil[.]com

> In this test case check if your Origin Header is being reflected within the Access-Control-Allow-Origin Header. If yes, this may be a vulnerability.
[4/n]

Allows Wildcards:

Req: Origin: random[.]com
Res: Access-control-allow-origins:*

> If the target application reflects with * in Access-control-allow-origin response header, It means it's vulnerabile to CORS misconfiguration issue.
[5/n]

Allows Null Origin:

Req: Origin: null
Res: Access-control-allow-origins:null

> on sending Origin: header set to Null if the application reflects null is ACAO header , This is vulnerable and can be exploited using sandboxed iframes.
[6/n]

Bad Regex Validation

Req: Origin: domain[.]com[.]snapsec[.]com
Res: Access-control-allow-origins:null

Let say if the web app only looks for "domain[.]com" in the origin this can be easily bypassed using "domain[.]com[.]snapsec[.]com".
[7/n]

Allowing Subdomains

Req: Origin: sub[.]domain[.]com
Res: Access-control-allow-origins: sub[.]domain[.]com

in this case the website allows all its subdomains, This issue can be exploited by finding a valid XSS issue on any of its subdomain.
[8/n]

Support trusted by HTTP domain names

Req: Origin: http://domain[.]com
Res: Access-control-allow-origins: http://domain[.]com

In this situation, an attacker who is in a position to intercept a victim user's traffic can exploit this CORS configuration.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Md Ismail Šojal

Md Ismail Šojal Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @0x0SojalSec

Apr 13, 2023
Top free #Cybersecurity and ethical #hacking certification⚔️📓

1./Introduction to IT & Cybersecurity (Cybrary) = cybrary.it/course/introdu…

2./Mobile App Security (Cybrary) = cybrary.it/course/mobile-…

3./Introduction to Cybersecurity (edx) = edx.org/course/introdu…
4./Introduction to Cyber Security (Future Learn) = futurelearn.com/courses/introd…

5./Introduction to Encryption and Cryptography (Future Learn) = futurelearn.com/courses/encryp…

6./Fundamentals of Red Hat Linux (edx) = edx.org/course/fundame…
7./ Introduction to Cybersecurity (Codecademy) = codecademy.com/learn/introduc…

8./ Cisco Networking Academy = netacad.com/courses/all-co…

9./ SANS Cyber Aces (covers foundation areas of cybersecurity) - cyberaces.org/courses.html

10./ Opensecurity - = opensecuritytraining.info/Training.html
Read 4 tweets
Jan 9, 2023
Training/Methodology #infosec #offensivesec⚔️🛡️

- OSINT Training and Workflow (dfir.training/osint)

- Website Investigation Workflow ()

- OSINT Resources & Tutorials (aware-online.com/en/)

- Learning Overpass API (osmlab.github.io/learnoverpass/…)
- A 5-minute guide to creating a covert account for Internet Investigations (OSINT) (intelligencewithsteve.com/post/a-5-minut…)

- hat’s in a Company? Guide for investigate a company (kit.exposingtheinvisible.org/en/what/compan…)

- Osint : Comment naviguer en eaux troubles (daring-india-marten-972.medium.com/osint-comment-…)
- Amnesty International Course : Open Source Investigations for Human Rights (advocacyassembly.org/en/partners/am…)

- OSINT : Explorer l’espace informationnel Russe (docs.google.com/document/d/10a… from )
- OSINT Russia Resources (start.me/p/0PeKwy/osint…)
Read 4 tweets
Jan 9, 2023
Several people asked me about the resources I recommend for learning GraphQL and GraphQL Hacking . Here is the list:

A Thread 🧵👇

GraphQL Basics:
- GraphQL in 40 Minutes:
- GraphQL in-depth:
- Great Website all about GraphQL: howtographql.com
Read 6 tweets
Nov 26, 2022
List of 50 cybersecurity podcasts:
#infosec #cybersecurity #podcasts #infosecurity Image
1. Cyber Work
2. Click Here
3. Defrag This
4. Security Now
5. InfoSec Real
6. InfoSec Live
7. Simply Cyber
8. OWASP Podcast
9. We Talk Cyber
10. Risky Business
11. Malicious Life
12. Hacking Humans
13. What The Shell
14. Life of a CISO
15. H4unt3d Hacker
16. 2 Cyber Chicks
17. The Hacker Mind
18. Security Weekly
19. Cyberside Chats
20. Darknet Diaries
21. CyberWire Daily
22. Absolute AppSec
23. Security in Five
24. Smashing Security
25. 401 Access Denied
26. 7 Minute Security
27. 8th Layer Insights
28. Adopting Zero Trust
29. Cyber Security Sauna
Read 6 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(