Professional
Trusted Domain CORS Scanner introduces more robust scan checks for Permissive CORS issues including bypasses from PortSwigger's URL validation bypass cheat sheet and the research paper, Advanced CORS Exploitation Techniques by Corben Leo. Additionally, it implements a "trusted domain scanner" which allows you to discover and exploit hidden CORS attack surfaces.
Often applications implement cross-origin resource sharing for a specific domain but not for themselves. This extension allows you to check for other trusted domains automatically and then test each of those trusted domains for URL validation bypasses in an attempt to trick the application into trusting arbitrary origins.
The extension includes an active scan check that will run once for each request sent to the scanner. This can be enabled / disabled via the main menu.
By right-clicking inside of any request editor, you can open the trusted domain scanner.
The trusted domain scanner will be pre-populated with the domain of the request you are testing. You may add additional domains that may be trusted to this list (it is recommended to include all in-scope domains from your test). You may then also enable external subdomain lookup, which will automatically include all subdomains for each of the provided domains. This is disabled by default because it uses https://columbus.elmasy.com/.
Once configured, you can run the trusted domain scan, which will first check if any of the domains included in the list are trusted by the application's CORS policy. It will then run URL validation bypass checks and report any issues that would result in vulnerabilities.
Author |
Author
Thomas Stacey |
---|---|
Version |
Version
1.0.0 |
Rating |
Rating |
Popularity |
Popularity |
Last updated |
Last updated
29 January 2025 |
Estimated system impact |
Estimated system impact
Overall impact: Empty
Memory
Empty
CPU
Empty
General
Empty
Scanner
Empty
|
You can install BApps directly within Burp, via the BApp Store feature in the Burp Extender tool. You can also download them from here, for offline installation into Burp.
|
You can view the source code for all BApp Store extensions on our GitHub page. |
|
Follow @BApp_Store on Twitter to receive notifications of all BApp releases and updates. |
Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.
Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.