Http Cors Wildcard Origin
Description
This detector identifies CORS (Cross-Origin Resource Sharing) configurations that use a wildcard (*) value for the Access-Control-Allow-Origin header. This misconfiguration allows any domain to make cross-origin requests to the application, potentially exposing sensitive data or functionality to malicious websites.
Detection Strategy
• The detector examines HTTP response headers from web application endpoints
• A vulnerability is reported when the Access-Control-Allow-Origin header is present and contains exactly '*' as its value
• The detection triggers on any HTTP response where this wildcard CORS policy is found, regardless of the specific endpoint or request method
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.