bug-bounty433
google352
xss348
microsoft280
facebook245
apple171
exploit160
rce156
malware97
account-takeover94
cve88
csrf82
writeup80
bragging-post78
browser77
privilege-escalation67
react59
authentication-bypass57
cloudflare54
dos53
docker51
ssrf51
node50
access-control47
aws47
phishing46
smart-contract45
oauth45
ethereum43
supply-chain43
web342
defi42
sql-injection41
lfi37
idor34
smart-contract-vulnerability32
clickjacking31
web-application31
race-condition31
reverse-engineering31
wordpress30
info-disclosure30
vulnerability-disclosure29
cloud28
burp-suite28
information-disclosure28
solidity27
web-security27
ctf26
responsible-disclosure26
0
6/10
vulnerability
Article demonstrates a CORS bypass technique by exploiting improper Origin header validation that uses simple string matching. An attacker can craft a malicious origin like "redact.com.attacker.com" to bypass validation checking if the origin contains the legitimate domain, allowing credential-based requests to steal user account data.
cors-bypass
origin-header-validation
subdomain-takeover-variant
csrf
web-security
string-matching-bypass
account-takeover
Saad Ahmed