In our last article, Cross-Origin Resource Sharing (CORS) Vulnerabilities - Part 1, we discussed the vulnerabilities that can happen when you dynamically generate the Access-Control-Allow-Origin
value using the request’s Origin
value.
In this article we’ll discuss the other situations you should be aware of where using CORS can increase your application’s security risks.