https://www.youtube.com/watch?v=wgkj4ZgxI4c
Exploiting trust: Weaponizing permissive CORS configurations
…
To complement this methodology, I have created a Burp extension that will check for all the bypasses mentioned in this research, as well as those included in PortSwigger’s recently released URL validation bypass cheat sheet. Additionally, the extension can be used to quickly check if any given endpoint has a hidden trusted domain. If any domains appear to be trusted, the extension will automatically attempt to use the previously mentioned bypasses to check for permissive CORS issues.
Alternatively, you can check for trusted domains manually using intruder:
Origin: https://§outpost24.com§Once you have a list of trusted domains that respond with “Access-Control-Allow-Origin” headers, you can test the normal “Origin” header bypasses to attempt to gain arbitrary domain reflection.