Replies: 2 comments
-
Thank you for the issue, @legrego! That’s a great idea and definitely fits into the “Web Security” suite!
Ugh, I didn’t realize it needed to be explicitly allowed. It’s fixed now, and I’ll move this to discussions. Thanks for flagging it.
Are you essentially looking to see the CORS-related headers your app returns whenever a specific endpoint is “preflighted” (input: remote endpoint, output: CORS response headers)? Or are you looking for something that allows you to fully specify the details of a cross-origin request (origin, method, headers, etc.) and get a simple yes/no answer, with an explanation when the answer is no (e.g., which CORS directive is violated)? It'd still be possible to see the raw CORS response headers. Or would you prefer something more flexible and advanced, such as an HTML editor that allows you to fully craft your “foreign-origin” page and directly interact with your app’s endpoint (possibly with a set of ready-to-use JS helper utilities)? It’ll probably require the same amount of effort from the user as crafting a local page themselves... Or do you have something else in mind? |
Beta Was this translation helpful? Give feedback.
-
@azasypkin I could imagine a combination of these two features being useful. For a user who is unfamiliar with CORS, it might be useful to see, for a given resource:
For my specific needs, I am more interested in quickly testing a CORS request, and getting a quick yes/no answer.
I don't have a real need for this. |
Beta Was this translation helpful? Give feedback.
-
I know discussions are preferred here for feature requests, but GitHub did not allow me to create a new Discussion.
I was looking for a quick way to verify CORS for my web application. I wanted to see how my application would respond to various requests made from a different origin, to ensure that my resources were adequately protected.
For my specific use case, I wanted to see if it was possible for a cross-origin request to be made which included a custom header. This custom header provides a defense against CSRF attacks when properly configured (https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html#employing-custom-request-headers-for-ajaxapi)
Beta Was this translation helpful? Give feedback.
All reactions