Api Permissive Cors Policy
Description
This detector identifies APIs with overly permissive Cross-Origin Resource Sharing (CORS) policies that allow requests from any origin. Such configurations can enable malicious websites to make unauthorized requests to the API from users' browsers, potentially leading to data theft or unauthorized actions.
Detection Strategy
• Sends an HTTP request to the target API endpoint with a custom 'Origin' header set to a test value
• Checks if the API responds with a successful status code (not 4xx or 5xx error)
• Analyzes the response headers to determine if the CORS policy permits the test origin
• Reports a vulnerability when the API allows cross-origin requests from the arbitrary test origin, indicating an overly permissive CORS configuration
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.