๐Ÿšจ Inspectorio CORS Vulnerability PoC

โš ๏ธ PROOF OF CONCEPT - CORS MISCONFIGURATION EXPLOITATION โš ๏ธ
This page demonstrates a critical CORS vulnerability in api.stg.inspectorio.com
Attacker Domain:
Target API: https://api.stg.inspectorio.com
Vulnerability: Access-Control-Allow-Origin: *
Impact: Cross-origin authenticated data exfiltration

๐Ÿ”ง Configuration

Step 1: Authentication Token Key

Check localStorage/sessionStorage in Inspectorio for tokens like: accessToken

Step 2: Target API Endpoint

Find endpoints that return sensitive user data from Network tab

Step 3: HTTP Method

๐ŸŽฏ Attack Results:
Click "Scan for Tokens" first, then "Execute CORS Attack" to demonstrate the vulnerability.