Главная
Study mode:
on
1
Intro
2
A MORAL STORY
3
OVERVIEW
4
CORE CONCEPT
5
WILDCARDS
6
SOLUTION
7
ORIGIN REFLECTION
8
STARTSWITH
9
ENDSWITH
10
NULL ORIGIN
11
exHTTPS
12
SUBDOMAINS
13
TUNNELLING
14
CACHE POISONING: CLIENT-SIDE
15
CACHE POISONING: SERVER-SIDE
16
PENTESTER LESSONS
17
SPEC LESSONS
18
BROWSER LESSONS • Multiple origins
19
DEVELOPER LESSONS
20
TAKE-AWAYS
21
FURTHER READING
Description:
Explore the intricacies of Cross-Origin Resource Sharing (CORS) misconfigurations and their potential for exploitation in this 37-minute conference talk from AppSec EU 2017. Delve into under-appreciated subtleties within the CORS specification, illustrated through real-world attacks on websites. Learn how these vulnerabilities could be leveraged to steal bitcoins from exchanges, partially bypass Google's HTTPS implementation, and obtain API keys from various sources. Discover how CORS misconfigurations can be pivotal in crafting exploit chains across protocols, exploiting seemingly unexploitable vulnerabilities through cache poisoning, and escalating open redirects into notable security issues. Gain insights into core concepts, wildcards, origin reflection, and various attack vectors, while also exploring lessons for pentesters, developers, and browser manufacturers. Conclude with key takeaways and resources for further reading on this critical web security topic.

Exploiting CORS Misconfigurations for Bitcoins and Bounties - AppSec EU 2017

OWASP Foundation
Add to list