← Back to context

Comment by asimovDev

5 days ago

Embarrassed to say that I wasn't aware of this practice. Are there malicious uses for this beyond fingerprinting?

Yes. Facebook was using this trick on Android. Meta's android apps would host a server on localhost, and their sites would communicate with this local server to pass tracking information that would otherwise be blocked by all browser protection methods on Android. I guess it is still fingerprinting, but at the most extreme end.

https://news.ycombinator.com/item?id=44169115

Routers with vulnerable URLs. You can search for: "router" "authentication bypass".

  • Isn't CORS supposed to prevent this?

    • CORS doesn’t prevent requests (i.e. GET requests from IMG tags, or XHR preflight requests), it only prevents web apps from processing the response if the responding server doesn’t agree. And a simple GET or even OPTIONS request can be enough to exploit vulnerabilities in routers and other local devices.