CORS Exploit
IntermediateMisconfigured CORS headers can allow attackers to steal user data from any origin. Identify the flaw, exploit it, and fix the configuration.
Progress:
1
Spot the Misconfiguration2
Craft the Exploit3
Fix the Configapi.victim.com — Response Headers
HTTP/1.1 200 OK
Access-Control-Allow-Origin: *
Access-Control-Allow-Credentials: true
Access-Control-Allow-Methods: GET, POST, PUT
Content-Type: application/json
// Response body
{
"name": "Alice Johnson",
"email": "alice@company.com",
"ssn": "123-45-6789",
"role": "admin"
}
Challenge 1 — Identify the misconfiguration