subdomain-takeover-variant

1 article
sort: new top best
clear filter
0 6/10
vulnerability

Article demonstrates a CORS bypass technique by exploiting improper Origin header validation that uses simple string matching. An attacker can craft a malicious origin like "redact.com.attacker.com" to bypass validation checking if the origin contains the legitimate domain, allowing credential-based requests to steal user account data.

Saad Ahmed
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 19 hours ago · details