Understanding CORS & Misconfiguration Vulnerabilities
August 24, 2022
Cross-Origin Resource Sharing (CORS) is a useful tool to carefully relax the security precautions that Same Origin Policy (SOP) provides. It allows you to share your resources with other origins, but it can also introduce new security vulnerabilities into your web app.
In this series of posts, you can learn more about how to implement CORS on your web server and understand the potential vulnerabilities that can occur.
Prerequisites
Before you start learning about CORS, you should have a basic understanding of:
CORS headers & potential vulnerabilities
Once you understand those basic concepts, you can learn more about:
- Basic CORS headers for your web server
- Learn about the
Access-Control-Allow-Origin
andAccess-Control-Allow-Credentials
response headers in depth
- Learn about the
- CORS configuration vulnerabilities - part 1
- Learn what can go wrong when you dynamically generate the
Access-Control-Allow-Origin
using theOrigin
request value
- Learn what can go wrong when you dynamically generate the
- CORS configuration vulnerabilities - part 2
- Learn about all the other vulnerabilities and risks associated with using CORS headers in your web app