Learning CORS Is Not Difficult At All! You Just Need A Great Teacher!
What is Cross-Origin Resource Sharing
Cross-Origin Resource Sharing (CORS) is an HTTP-header-based mechanism that allows a server to indicate any origins (domain, scheme, or port) other than its own from which a browser should permit loading resources. CORS also relies on a mechanism by which browsers make a “preflight” request to the server hosting the cross-origin resource, in order to check that the server will permit the actual request. In that preflight, the browser sends headers that indicate the HTTP method and headers that will be used in the actual request.
For the sake of security, browsers started using a rule called Same-Origin Policy (SOP). A rule that is enforced at the browser level to control access to data between web applications. While SOP alone won’t stop XSS or CSRF it does help out. SOP restricts how a resource is loaded by one origin can interact with a resource from another origin.
Breaking Down Origins
For those that are unfamiliar with what an origin is, it consists of three parts. The schema (protocol), hostname (domain), and the port. Now, as long as these three are the same they pass SOP without incident. Below are a couple of scenarios to demonstrate this. For this, we will say the requests are being made from https://site.com:443
http://site.com | Different scheme fails SOP |
https://site.com/user | Same Origin Passes SOP |
https://a.site.com | Different hostname fails SOP |
https://site.com:8080 | Different port fails SOP |
SOP examples
CORS Headers Settings
CORS is a mechanism that uses HTTP Headers to define Origins that are exempt from SOP. The two headers that are used are Access-Control-Allow-Origin
and Access-Control-Allow-Credentials
. Access-Control-Allow-Origin (ACAO) syntax has three options, a wildcard *
, a single <origin>
, or null
.
- *: any site is allowed to access resources
- <origin>: allows a specific site to access resources
- null: specifies if the origin is null allow resource access
ACAO header is only valid for publicly visible resources. For session/credential resources another header must be included.
Access-Control-Allow-Credentials
allows cookies or other user credentials to be included in cross-origin requests. The only valid syntax for this header is true
.
CORS Vulnerabilities
CORS vulnerabilities arise from misconfigurations of CORS. Since ACAO only allows one site or all sites settings developers must implement dynamic generation for multiple origin whitelisting. CORS misconfiguration is caused by flaws in the day dynamic generator for whitelisting is determined. Examples of flawed dynamic generation are as follows:
- Reflected: The server just reflects the origin of the request without any other ruling. This is the same as setting ACAO to the * wildcard.
- Parsing logic errors: If the dynamic generator checks if an origin started or ends with a value it is vulnerable. e.g. Check for
bank.com
. A bypass for starting with it would be usingbank.com.evelcorp.com
. The bypass for ending string matching would beevilcorpbank.com
. - Whitelisted null Origin Value: This would be the same as setting the * wildcard but worse because ACAC can be set to
true
in this case.
Finding CORS Vulnerabilities
Finding CORS vulnerabilities are similar to any hacking process. Map the application. Check each request able path for CORS headers. Even if during normal browsing CORS headers are absent this could be due to dynamically generated CORS headers. Using something like burpsuite to change the origin could reveal the origin being reflected via the ACAO header. Checking for parsing logic is the next form of dynamic generation testing. See if you can determine a regex parsing that could be exploited from a malicious origin. And of course, you also have the null syntax to test for. If null or a vulnerable dynamic parser is present these are to see if ACAC is set to true.
When searching for CORS vulnerabilities check to see if you can change the protocol. Will the site let you make the same request with HTTP as with HTTPS? If so this can be leveraged with other attack vectors. Once a CORS vulnerability has been found review the site’s functionality to determine the impact of the finding.