In this article, we’ll explain to you how to permit CORS requests for multiple origins in PHP.
To get the response from a simple cross-origin POST request, we need to include the header Access-Control-Allow-Origin. The specification of Access-Control-Allow-Origin allows for multiple origins, or the value null, or the wildcard *.
This article explores the challenges and solutions of using third-party APIs in web applications while maintaining security. Browsers have a same-origin policy in place to prevent unauthorized data exchange between different domains. However, this policy can sometimes hinder the transfer of data between websites that have different origins. CORS, JSONP, and XHR proxies are three commonly used approaches to bypass this policy while still maintaining security.
CORS, or Cross-Origin Resource Sharing, is a standard that enables requests and responses to bypass their origins by placing information with the HTTP message header. CORS requires the server hosting the resource to include an Access-Control-Allow-Origin header in the HTTP message it sends to the requesting site. This header specifies that the server can access data from the requesting site. CORS is widely used and supports both XMLHttpRequest objects and the Fetch API.
JSONP, or JSON with Padding, is a legacy approach that uses the script element to return JSON data from a server running on a different origin. The data is returned within the script element as the parameter for a callback function, allowing developers to access the data without invoking the same-origin policy. However, JSONP brings executable code into the website, making it vulnerable to malicious attacks. JSONP only works with data in the JSON format, and there is no easy way to determine whether a request has failed and for what reason.
XHR proxies, or XMLHttpRequest proxies, route requests through trusted domains to bypass same-origin policies. This approach requires making requests to a proxy server that can then pass the information onto the web application. The app can use an AJAX request object or Fetch to make the request to the proxy server and include parameters indicating the API that will manage the response. CORS-Anywhere is an example of a proxy server that can manage requests, but developers must set up an account to utilize its features.
Each approach has its advantages and disadvantages, and developers must choose the one that best suits their security needs. CORS is widely used and straightforward, but it does not work with older browsers. JSONP is simple but has security risks and limited data format support. XHR proxies are a more flexible and secure solution, but they require additional configuration and management. In conclusion, developers must carefully evaluate their security requirements before using third-party APIs in their web applications.
EXAMPLES
Here are programming examples for each of the three approaches:
CORS Example:
To enable CORS, the server hosting the resource needs to include an Access-Control-Allow-Origin header in the HTTP response message sent to the requesting site. Here’s an example code snippet that demonstrates how to use CORS with the Fetch API to make a cross-origin request to a server:
In this example, the fetch function is used to make a GET request to the https://example.com/api/data endpoint. The mode property is set to cors to indicate that a cross-origin request is being made. The server hosting the https://example.com/api/data endpoint needs to include the following header in the response for the request to be successful:
Access-Control-Allow-Origin: *
Or if the request is done from www.domainXYZ.com then if you like to be the only website that can make this API request this should be:
Access-Control-Allow-Origin: www.domainXYZ.com
For doing this in PHP but only for some domains e.g. only for 4 domains see here:
To use JSONP, you need to create a script element that calls an API running on a server from a different origin. The server returns the requested content in JSON format, which is treated as the parameter for a callback function. Here’s an example code snippet that demonstrates how to use JSONP to make a cross-origin request to the Giphy API:
function getGiphyData(callback) {
const script = document.createElement('script');
script.src = `https://api.giphy.com/v1/gifs/random?api_key=YOUR_API_KEY&callback=${callback}`;
document.head.appendChild(script);
}
function handleGiphyData(data) {
console.log(data);
}
getGiphyData('handleGiphyData');
In this example, the getGiphyData function creates a script element that calls the Giphy API with an API key and a callback function name. The callback function handleGiphyData is defined to receive the JSON data returned by the API. The getGiphyData function appends the script element to the head element of the document. Finally, the getGiphyData function is called with the callback function name as an argument.
XHR Proxy Example:
To use an XHR proxy, you need to make a request to a trusted proxy server that can handle the cross-origin request on behalf of your app. Here’s an example code snippet that demonstrates how to use an XHR proxy with the XMLHttpRequest object to make a cross-origin request to the GitHub API:
In this example, the XMLHttpRequest object is used to make a GET request to the GitHub API through the https://cors-anywhere.herokuapp.com proxy server. The setRequestHeader method is used to set the Content-Type header to application/json. The onreadystatechange event is used to handle the response from the server. If the response has a status code of 200 and a ready state of 4, the JSON.parse method is used to parse the JSON data returned by the server. Finally, the parsed data is logged into the console.
In this article I demonstrate how to create a fresh/free-of-malware Ventura ISO without Mac, using a Ventura VM in the free VMware Player 17.x in Windows 11… the full process will cost 0.00 USD.
To run a Guest VM OS MacOS e.g., Ventura, as a VM with VMware or VirtualBox or Parallels hypervisors, in either MacOS or Windows 11 or Linux (hypervisor-patch run required in Windows or Linux) the hardest part is to obtain the Ventura ISO. Of course, you can download it from tutorials in blogs or vlogs on YouTube, but you will never know if malicious software or virus exist inside the ISO, so by hardest part mean to create the ISO by yourself on a Mac 🖥️ computer or another MacOS 🖥️ VM. The latter, I have tested it myself successfully in a MacOS VM in VMware Player 17.x in Windows 11, I have created a Ventura fresh ISO and this WITHOUT a Mac 🖥️ … or any cost!!! Here is the process:
NOTE-1: THIS ISO IS NOT SECURE — BECAUSE THE PERSON WHO CREATED IT MAY INFECT IT WITH A VIRUS ON PURPOSE.
NOTE-2: WE WILL USE THIS TO CREATE VENTURA ISO BECAUSE WE DO NOT HAVE ACCESS TO A MACOS VENTURA Mac MACHINE. DURING THE PROCESS NEVER USE ANY LOGIN TO SENSITIVE ACCOUNT INSIDE THIS VM, TILL WE CREATE THE FRESH ISO AND RUN ANOTHER VM FROM THIS FRESH NEW CREATED VENTURA ISO.
I – Open VMware and run the MacOS Ventura VM or Startup your Mac Ventura Computer.
II – Go to Mac App Store and search & download the: “macOS Ventura.” 1 The macOS Ventura page will open, Click on Get. 2 System Settings will then open, and it will check for the update. And you will see a popup screen to download macOS Ventura. Click on Download. 3 The macOS Ventura download process will get started. The macOS Ventura file size is around 12.25 GB. So, the download process will take some time. 4 When the download process gets completed. The macOS Ventura installer will open. 5 Click on the menu: “Install macOS Ventura” from the menu bar and click on the sub-menu “Quit Install macOS”. 6 Setup will ask for confirmation, click on Quit.
III –
After you have to go to the Mac Terminal and run the BOLD commands below:
In the end, you will have a fresh and clean of infections: Ventura ISO on your Mac VM Desktop. Please type only BOLD – other characters are the Terminal output and must NOT get typed. >>>
Now, AFTER COPY the Ventura ISO TO A USB STICK – Or backup otherwise – do type the final command to clean up all files Not needed except ISO File:
rm -fv /tmp/Ventura.dmg
========================== End Of Terminal ==========================
Final Notes:
1 If you want to COPY the Ventura ISO to a USB Stick, please insert an EXFAT FORMATED USB 3 STICK, While the VM is running, Hypervisor then asks if opens in the Host OS or in the Guest OS, choose Guest OS and COPY the ISO to this USB Stick.
PLEASE SHUTDOWN HYPERVISOR e.g. VMware Player, then the USB will mount in the Windows 11 host OS, you can shut down Windows 11 to remove the USB Stick or Safety Remove the USB Stick otherwise.
2 With the FRESH-CLEAN-FREE-OF-INFECTIONS Ventura ISO, you can create a VM in Windows 11 or 10, in Linux OS, or in macOS even MacOS Not support Ventura.
3 Important! MARK THE JUST CREATED ISO VENTURA AS CLEAN VM e.g., “Ventura13_2_clean_myself.iso” AND ALSO, MARK VMs you will create with this as Clean ISO. THEN YOU CAN DELETE VM created from NOT TRUSTED ISO FROM THE INTERNET.
If I get requests, I can upload my fresh generated Ventura 13.2.iso to Google Drive for public download.