🛠️CORS (Cross-Origin Resource Sharing)


Sometimes browsers need to load resources from another origin other than their own. The Same-Origin Policy mechanism (SOP) restricts access to resources on other origins.

The same-origin is defined for two URLs that have the same protocol, port (if specified), and host.

To bypass this limitation, the JSON-P technique (in JavaScript) was introduced. To retrieve information from another origin, it uses the <script> tag (which is not blocked by the SOP). Unfortunately, this technique has some issues and lacks controls in some cases. Here we introduce CORS.

Cross-Origin Resource Sharing (CORS) is a header-based mechanism. It improves security and flexibility for cross-domain resource sharing. CORS is relatively new and therefore, not very well-known. As result, misconfigurations are common and bring security concerns. The main vulnerabilities lie in the overly permissive access to credentials from non-controlled domains.


The exploitation will depend on the misconfiguration. The next image shows a path that can be followed:

Case 1


  • Access-Control-Allow-Credentials: true

  • Access-Control-Allow-Origin: regex

The origins are verified through a regex match. The misconfiguration types can be better understood with this table:

The configuration below is impossible:

  • Access-Control-Allow-Credentials: true

  • Access-Control-Allow-Origin: *

Case 2


  • Access-Control-Allow-Credentials: true

  • Access-Control-Allow-Origin: null

According to James Kettle, browsers might send the value null in the Origin header in some unusual situations:

  • Cross-site redirects.

  • Requests from serialized data.

  • Request using the file: protocol.

  • Sandboxed cross-origin requests.

The value null when the server sends credentials is the worst-case scenario. It means any origin can request credentials without limitation.

Case 3


  • Access-Control-Allow-Credentials: false

  • Access-Control-Allow-Origin is dynamically generated

  • Vary: Origin is absent

In this case, it's possible to conduct a client-side poisoning.

Check James Kettle's explanation for more information.


During a penetration test, exploiting CORS misconfigurations is difficult. The attacks may rely on manipulating a victim or even finding configuration issues on other domains (which can be out of scope).

However, it's possible to get a Proof-of-Concept using JavaScript by registring a domain (to abuse a CORS misconfiguration).


The tool CORScanner is useful in finding misconfigurations. It relies on the table shown in the misconfiguration case 1.

python cors_scan.py -u $URL

It is advised to use the verbose option -v to see the tests.

It is possible to customize the third parties origins in the file origins.json.

Proof-of-Concept (PoC)

To steal sensitive information, the victim has to be logged in the vulnerable website. From there, if the victim is redirected to the attacker's website (containing the script below), the sensitive information will be retrieved by the attacker.

var req = new XMLHttpRequest(); 
req.onload = reqListener; 
req.withCredentials = true;

function reqListener() {


Last updated