You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Apr 20, 2023. It is now read-only.
Summary:
Sites including the raw content of the distribution zip will be susceptible to a CORS attack due to the default cors/index.html file containing an open whitelist regex.
Copy file name to clipboardExpand all lines: src/cors/index.html
+1-1
Original file line number
Diff line number
Diff line change
@@ -59,7 +59,7 @@
59
59
// this file is by default set up to use Access Control - this means that it will use the headers set by the server to decide whether or not to allow the call to return
60
60
varuseAccessControl=true;
61
61
// always trusted origins, can be exact strings or regular expressions
0 commit comments