πŸ“–
Notes
search
⌘Ctrlk
πŸ“–
Notes
  • πŸ™ŒWelcome!
  • CyberSecurity
    • Penetration Testing
      • ELearnSecurity
      • PortSwigger
        • Cross-origin resource sharing (CORS)
          • Access-Control-Allow-Origin response header
          • Vulnerabilities arising from Misconfigurations
            • Server-generated ACAO header from client-specified Origin header
            • Errors parsing Origin headers
            • Whitelisted null origin value
            • Exploiting XSS via CORS trust relationships
            • Breaking TLS with poorly configured CORS
            • Intranets and CORS without credentials
            • Mitigations
        • Sql Injection
      • TryHackMe
      • Miscellaneous
    • Blue Teaming
  • DevOps
    • Infrastructure as a Code (IaC)
    • Orchestration
  • Development
    • Blockchain
    • Backend
    • Database
    • Testing
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. CyberSecuritychevron-right
  2. Penetration Testingchevron-right
  3. PortSwiggerchevron-right
  4. Cross-origin resource sharing (CORS)

Vulnerabilities arising from Misconfigurations

Server-generated ACAO header from client-specified Origin headerchevron-rightErrors parsing Origin headerschevron-rightWhitelisted null origin valuechevron-rightExploiting XSS via CORS trust relationshipschevron-rightBreaking TLS with poorly configured CORSchevron-rightIntranets and CORS without credentialschevron-rightMitigationschevron-right
PreviousAccess-Control-Allow-Origin response headerchevron-leftNextServer-generated ACAO header from client-specified Origin headerchevron-right

Last updated 2 years ago