$$$ Bounty | Insecure CORS Misconfiguration  With Full Exploitation |  Bug Bounty  POC |

$$$ Bounty | Insecure CORS Misconfiguration With Full Exploitation | Bug Bounty POC |

Byte BloggerBase

1 год назад

7,312 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@shashikiran00
@shashikiran00 - 11.10.2023 16:03

@Byte Blogger baseHow Many Members Waiting @krishnsec Methodology And Podcast

Ответить
@Anonymous-cx7ht
@Anonymous-cx7ht - 11.10.2023 16:24

I want to ask impact of this because it is unauthenticated please reply

Ответить
@yadneshchavan5657
@yadneshchavan5657 - 11.10.2023 17:41

Osm

Ответить
@montala3380
@montala3380 - 19.10.2023 15:35

Trust me, there is no impact at all. What is he blindly trying to do is to make it look like CORS vuln without a clear understanding. There is no impact at all, cause by defautl, the URL itself is already public. What is he doing is just capture all the resonse into his browser. That's all =)) If any program rewards him for this, I think that program does not know about security =))

Ответить
@tinu-xskullx5780
@tinu-xskullx5780 - 16.12.2023 18:56

NA

Ответить
@thedarkarmy8713
@thedarkarmy8713 - 04.02.2024 17:52

I think that is just a Bad implementation, but i don't see any sensitive info. getting disclosed which I can capture in my log..

Ответить
@Hackerone1444
@Hackerone1444 - 10.02.2024 11:21

I got same cors vulnerability is this any impact and will i get any bounty ?

Ответить
@justineandreiparong589
@justineandreiparong589 - 08.03.2024 14:16

It's like an XSS it's similar to xss okay thank you for that sir.

Ответить
@Master-z6f
@Master-z6f - 17.03.2024 13:08

Bounty kitni mili or kis level ka bug hai

Ответить
@ImmortalRabbit-l5z
@ImmortalRabbit-l5z - 24.12.2024 09:06

I found same Vulnerability in /wp-json/wp/v2/users is it a valid bug. Please reply

Ответить