AppSec EU 2017 Exploiting CORS Misconfigurations For Bitcoins And Bounties by James Kettle

  Переглядів 37,557

OWASP Foundation

OWASP Foundation

День тому

Cross-Origin Resource Sharing (CORS) is a mechanism for relaxing the Same Origin Policy to enable communication between websites via browsers. It's already widely understood that certain CORS configurations are dangerous. In this presentation, I'll skim over the old knowledge then coax out and share with you an array of under-appreciated but dangerous subtleties and implications buried in the CORS specification. I'll illustrate each of these with recent attacks on real websites, showing how I could have used them to steal bitcoins from two different exchanges, partially bypass Google's use of HTTPS, and requisition API keys from numerous others. I'll also show how CORS blunders can provide an invaluable link in crafting exploit chains to pivot across protocols, exploit the unexploitable via server and client-side cache poisoning, and even escalate certain open redirects into vulnerabilities that are actually notable.
-
Managed by the official OWASP Media Project www.owasp.org/index.php/OWASP...

КОМЕНТАРІ: 28
@haythamkt5607
@haythamkt5607 2 місяці тому
The more I watch this man’s videos the more I respect him.
@tayfun6378
@tayfun6378 4 роки тому
I smiled when I heard James' voice! love you man!
@RyanDewhurst
@RyanDewhurst 7 років тому
Great presentation and information!
@pat049b
@pat049b 4 роки тому
Amazing work!
@saurav2281
@saurav2281 6 років тому
Very well explained..
@ar-uh1dj
@ar-uh1dj 4 роки тому
Amazing presentation. Thumbs up
@nicoladellino8124
@nicoladellino8124 5 років тому
Nice video
@hackersguild8445
@hackersguild8445 5 років тому
Great.:)
@syedumararfeen8146
@syedumararfeen8146 6 років тому
Awesome
@yoshi5113
@yoshi5113 10 місяців тому
My favorite hacker
@smiley_1000
@smiley_1000 3 роки тому
This all seems more like an issue with the browser being all to happy to share secrets between sites rather than an issue with the sites themselves.
@8ytan
@8ytan 9 місяців тому
The browser by default does not allow cross-origin requests; these are all examples of sites specifically telling browsers that cross-origin requests should be allowed. The ability to permit certain cross-origin requests is incredibly useful and without it most services on the internet would break.
@tuandane82
@tuandane82 8 місяців тому
@@8ytan Does the CORS exploit work against the Authorization header as well, or only pass the session cookie?
@8ytan
@8ytan 8 місяців тому
@@tuandane82 in theory if you're using an authorisation header containing an access token to authenticate, then misconfigured CORS isn't a huge concern because attempts to exploit the weak CORS policy will lack a valid token and therefore fail. That said, it's still good practice to think about what origins, methods etc. will reasonably need to access your service and configure the CORS headers accordingly.
@shubham_srt
@shubham_srt 4 місяці тому
@@tuandane82 as far as i know , yes it works
@shubham_srt
@shubham_srt 4 місяці тому
what if Cookies are set to lax but Access Control Allow Credentials is being sent as true. As Lax does not allow cookies to be set in XHR requests. how will the cookies be sent?
@somebody3014
@somebody3014 Місяць тому
wondering about the same thing, did you find the answer?
@shubham_srt
@shubham_srt Місяць тому
@@somebody3014 Hey man, Lax settings are prioritised. Even if one condition is false, the cookies are not sent. So in my question cookies will not be sent as even Allow Credentials are true, Cookies are LAX (one true condition and one false) No cookies will be sent. Hope that clears the doubt.
@Shmancy_pants_69
@Shmancy_pants_69 3 роки тому
Could someone please explain to me 'the null' in this context and it what it means to not trust the null. thank you
@smiley_1000
@smiley_1000 3 роки тому
did you even watch the presentation?
@hirapirika7456
@hirapirika7456 6 років тому
WILL BITCOIN GET ATTACKED ?? IN FUTURE OR EXPLOITS ?
@jattboe8617
@jattboe8617 4 роки тому
21:47
@pranjalruhela1103
@pranjalruhela1103 10 місяців тому
Zomato didn't reply because they are an Indian company.
@shubham_srt
@shubham_srt 4 місяці тому
They have always replied to me within hours! Surprised to see James getting ghosted , kinda weird, but it was 2017, maybe suff was different back then
Same-origin policy: The core of web security @ OWASP Wellington
1:04:43
Kirk Jackson
Переглядів 31 тис.
Practical Web Cache Poisoning: Redefining 'Unexploitable'
43:55
Black Hat
Переглядів 55 тис.
Bug Bounties With Bash - VirSecCon2020 Talk
54:13
TomNomNom
Переглядів 49 тис.
Missing HTTP Security Headers - Bug Bounty Tips
15:48
LiveOverflow
Переглядів 135 тис.
How the Best Hackers Learn Their Craft
42:46
RSA Conference
Переглядів 2,5 млн
Ethical Hacking in 100 Seconds // And why do we need CORS?
11:05
Fireship
Переглядів 218 тис.
.NET 8  .🚀🔥:  Understanding CORS with ASP.NET
14:06
Mohamad Lawand
Переглядів 4,4 тис.
CORS in 100 Seconds
2:31
Fireship
Переглядів 529 тис.
DOM Vulnerabilities - DOM XSS Using Web Messages
16:16
z3nsh3ll
Переглядів 862
Airpods’un Gizli Özelliği mi var?
0:14
Safak Novruz
Переглядів 728 тис.
Вы поможете украсть ваш iPhone
0:56
Romancev768
Переглядів 98 тис.
Добавления ключа в домофон ДомРу
0:18
M4 iPad Pro Impressions: Well This is Awkward
12:51
Marques Brownlee
Переглядів 4,3 млн
Эволюция телефонов!
0:30
ТРЕНДИ ШОРТС
Переглядів 4,9 млн