Cross Origin Resource Sharing Misconfiguration
Medium
A
Acronis
Submitted None
Actions:
Reported by
parshwa_21
Vulnerability Details
Technical details and impact analysis
## Description :-
Cross-Origin Resource Sharing (CORS) is a mechanism that uses additional HTTP headers to tell browsers to give a web application running at one origin, access to selected resources from a different origin. The CORS mechanism supports secure cross-origin requests and data transfers between browsers and servers.
## Remediation :-
To mitigate the risk of CORS, we always recommend whitelisting your Access-Control-Allow-Origin instead of wildcarding. Using a
wildcard prefix such as *.yoursite.com makes it more difficult for the attackers given they would need to find a vulnerability (such as
cross-site scripting or cross-site request forgery) to issue the cross-origin request. However, it is frowned upon because it does not
provide the critical need-to-know security control. With whitelisting, the scope of your Access-Control-Allow-Origin will be limited to
only the sites that deal directly with your primary site or API and exclude any of your sites that do not.
##Steps to Reproduce :-
1. Open the Vulnerable URL : https://motorsport.tech/wp-json
2. Now intercept the request using burp suite or CURL and add one header like following :
Origin: https://evil.com (You can use anything as website.)
3. In response headers you will notice following headers :
"
```Access-Control-Allow-Origin: https://evil.com ```
```Access-Control-Allow-Methods: OPTIONS,GET,POST,PATCH,DELETE ```
```Access-Control-Allow-Credential: true ```
"
4. A malicious user can put his own domain or localhost as origin and capture the request.
## Impact
A CORS misconfiguration can leave the application at a high-risk of compromise resulting in an impact on the confidentiality and
integrity of data by allowing third-party sites to carry out privileged requests through your web site’s authenticated users such as
retrieving user setting information or saved payment card data.
On the other hand, the risk is low for applications that deal with public data and require that resources are sent to other origins.
The configuration could be expected behaviour and it would need to be up to the penetration tester to identify the appropriate risk and
the organization to understand and mitigate, or accept the risk.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Improper Access Control - Generic