Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

API CORS Header Configuration Potentially Allow Unintented Data Leakage #149

Closed
nidhi88 opened this issue Oct 12, 2023 · 1 comment
Closed
Labels
question Further information is requested

Comments

@nidhi88
Copy link

nidhi88 commented Oct 12, 2023

Summary

Hello,

During our security scan, we encountered the domain https://api2.amplitude.com/ using the access-control-allow-origin header and it is set to '*', which will allow requests from any domain to access resources being shared. This can lead to exploits where a malicious actor can request from their domain and receive a response that can contain sensitive information.

Can we have the access-control-allow-origin header with a specific whitelist of allowed domains, instead of allowing any domain?

@nidhi88 nidhi88 added the question Further information is requested label Oct 12, 2023
@izaaz
Copy link
Collaborator

izaaz commented Aug 20, 2024

@nidhi88 - Amplitude APIs are expected to be called from multiple domains to send data into Amplitude. Which is why the access control header is set to *. The API is used to push data to Amplitude and does not return any data back.

@izaaz izaaz closed this as completed Aug 20, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
question Further information is requested
Projects
None yet
Development

No branches or pull requests

2 participants