Educational PoC to demonstrate CORS misconfigurations.
Parameters for the exploitation script running on the attacker’s server:
This button simulates the victim clicking on the malicious link that redirects him/her to the attacker's server. The CORS exploitation script then runs by sending a request to the Target URL and retrieves the information normally displayed for the victim on this site:
⚠️ For the demo to work with cookies, make sure you are logged into the target site using the same browser where this PoC page is open.
This is what the attacker’s page would receive after the victim clicked: