XMLHttpRequest cannot load XXX No 'Access-Control-Allow-Origin' header












60














tl;dr; About the Same Origin Policy



I have a Grunt process which initiates an instance of express.js server. This was working absolutely fine up until just now when it started serving a blank page with the following appearing in the error log in the developer's console in Chrome (latest version):




XMLHttpRequest cannot load https://www.example.com/
No 'Access-Control-Allow-Origin' header is present on the requested
resource. Origin 'http://localhost:4300' is therefore not allowed access.




What is stopping me from accessing the page?










share|improve this question
























  • I'm working on the website and it was fine five minutes ago.
    – Peter David Carter
    Feb 22 '16 at 12:25






  • 1




    does it issue CORS headers? perhaps if you shared some code it would be easier to see
    – Jaromanda X
    Feb 22 '16 at 12:25










  • Plausibly. Which department should I ask to find out? I just do the backbone.marionette stuff mostly...
    – Peter David Carter
    Feb 22 '16 at 12:26








  • 1




    You should have enough with what I provided you - yes ... it's a CORS issue
    – Jaromanda X
    Feb 22 '16 at 12:30










  • Yeah. I suppose the organisations of departments isn't always uniform anyway, so it is possibly a nebulous question but I would like to know a bit of the backend/routing/sys-admin stuff at my company and this seemed like a good excuse to familiarise myself so if there are problems in future I can help out.
    – Peter David Carter
    Feb 22 '16 at 12:32


















60














tl;dr; About the Same Origin Policy



I have a Grunt process which initiates an instance of express.js server. This was working absolutely fine up until just now when it started serving a blank page with the following appearing in the error log in the developer's console in Chrome (latest version):




XMLHttpRequest cannot load https://www.example.com/
No 'Access-Control-Allow-Origin' header is present on the requested
resource. Origin 'http://localhost:4300' is therefore not allowed access.




What is stopping me from accessing the page?










share|improve this question
























  • I'm working on the website and it was fine five minutes ago.
    – Peter David Carter
    Feb 22 '16 at 12:25






  • 1




    does it issue CORS headers? perhaps if you shared some code it would be easier to see
    – Jaromanda X
    Feb 22 '16 at 12:25










  • Plausibly. Which department should I ask to find out? I just do the backbone.marionette stuff mostly...
    – Peter David Carter
    Feb 22 '16 at 12:26








  • 1




    You should have enough with what I provided you - yes ... it's a CORS issue
    – Jaromanda X
    Feb 22 '16 at 12:30










  • Yeah. I suppose the organisations of departments isn't always uniform anyway, so it is possibly a nebulous question but I would like to know a bit of the backend/routing/sys-admin stuff at my company and this seemed like a good excuse to familiarise myself so if there are problems in future I can help out.
    – Peter David Carter
    Feb 22 '16 at 12:32
















60












60








60


28





tl;dr; About the Same Origin Policy



I have a Grunt process which initiates an instance of express.js server. This was working absolutely fine up until just now when it started serving a blank page with the following appearing in the error log in the developer's console in Chrome (latest version):




XMLHttpRequest cannot load https://www.example.com/
No 'Access-Control-Allow-Origin' header is present on the requested
resource. Origin 'http://localhost:4300' is therefore not allowed access.




What is stopping me from accessing the page?










share|improve this question















tl;dr; About the Same Origin Policy



I have a Grunt process which initiates an instance of express.js server. This was working absolutely fine up until just now when it started serving a blank page with the following appearing in the error log in the developer's console in Chrome (latest version):




XMLHttpRequest cannot load https://www.example.com/
No 'Access-Control-Allow-Origin' header is present on the requested
resource. Origin 'http://localhost:4300' is therefore not allowed access.




What is stopping me from accessing the page?







javascript cors same-origin-policy






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Aug 6 '18 at 16:20









georgeawg

32.8k104967




32.8k104967










asked Feb 22 '16 at 12:19









Peter David CarterPeter David Carter

430159




430159












  • I'm working on the website and it was fine five minutes ago.
    – Peter David Carter
    Feb 22 '16 at 12:25






  • 1




    does it issue CORS headers? perhaps if you shared some code it would be easier to see
    – Jaromanda X
    Feb 22 '16 at 12:25










  • Plausibly. Which department should I ask to find out? I just do the backbone.marionette stuff mostly...
    – Peter David Carter
    Feb 22 '16 at 12:26








  • 1




    You should have enough with what I provided you - yes ... it's a CORS issue
    – Jaromanda X
    Feb 22 '16 at 12:30










  • Yeah. I suppose the organisations of departments isn't always uniform anyway, so it is possibly a nebulous question but I would like to know a bit of the backend/routing/sys-admin stuff at my company and this seemed like a good excuse to familiarise myself so if there are problems in future I can help out.
    – Peter David Carter
    Feb 22 '16 at 12:32




















  • I'm working on the website and it was fine five minutes ago.
    – Peter David Carter
    Feb 22 '16 at 12:25






  • 1




    does it issue CORS headers? perhaps if you shared some code it would be easier to see
    – Jaromanda X
    Feb 22 '16 at 12:25










  • Plausibly. Which department should I ask to find out? I just do the backbone.marionette stuff mostly...
    – Peter David Carter
    Feb 22 '16 at 12:26








  • 1




    You should have enough with what I provided you - yes ... it's a CORS issue
    – Jaromanda X
    Feb 22 '16 at 12:30










  • Yeah. I suppose the organisations of departments isn't always uniform anyway, so it is possibly a nebulous question but I would like to know a bit of the backend/routing/sys-admin stuff at my company and this seemed like a good excuse to familiarise myself so if there are problems in future I can help out.
    – Peter David Carter
    Feb 22 '16 at 12:32


















I'm working on the website and it was fine five minutes ago.
– Peter David Carter
Feb 22 '16 at 12:25




I'm working on the website and it was fine five minutes ago.
– Peter David Carter
Feb 22 '16 at 12:25




1




1




does it issue CORS headers? perhaps if you shared some code it would be easier to see
– Jaromanda X
Feb 22 '16 at 12:25




does it issue CORS headers? perhaps if you shared some code it would be easier to see
– Jaromanda X
Feb 22 '16 at 12:25












Plausibly. Which department should I ask to find out? I just do the backbone.marionette stuff mostly...
– Peter David Carter
Feb 22 '16 at 12:26






Plausibly. Which department should I ask to find out? I just do the backbone.marionette stuff mostly...
– Peter David Carter
Feb 22 '16 at 12:26






1




1




You should have enough with what I provided you - yes ... it's a CORS issue
– Jaromanda X
Feb 22 '16 at 12:30




You should have enough with what I provided you - yes ... it's a CORS issue
– Jaromanda X
Feb 22 '16 at 12:30












Yeah. I suppose the organisations of departments isn't always uniform anyway, so it is possibly a nebulous question but I would like to know a bit of the backend/routing/sys-admin stuff at my company and this seemed like a good excuse to familiarise myself so if there are problems in future I can help out.
– Peter David Carter
Feb 22 '16 at 12:32






Yeah. I suppose the organisations of departments isn't always uniform anyway, so it is possibly a nebulous question but I would like to know a bit of the backend/routing/sys-admin stuff at my company and this seemed like a good excuse to familiarise myself so if there are problems in future I can help out.
– Peter David Carter
Feb 22 '16 at 12:32














6 Answers
6






active

oldest

votes


















90














About the Same Origin Policy



This is the Same Origin Policy. It is a security feature implemented by browsers.



Your particular case is showing how it is implemented for XMLHttpRequest (and you'll get identical results if you were to use fetch), but it also applies to other things (such as images loaded onto a <canvas> or documents loaded into an <iframe>), just with slightly different implementations.



(Weirdly, it also applies to CSS fonts, but that is because found foundries insisted on DRM and not for the security issues that the Same Origin Policy usually covers).



The standard scenario that demonstrates the need for the SOP can be demonstrated with three characters:




  • Alice is a person with a web browser

  • Bob runs a website (https://www.[website].com/ in your example)

  • Mallory runs a website (http://localhost:4300 in your example)


Alice is logged into Bob's site and has some confidential data there. Perhaps it is a company intranet (accessible only to browsers on the LAN), or her online banking (accessible only with a cookie you get after entering a username and password).



Alice visits Mallory's website which has some JavaScript that causes Alice's browser to make an HTTP request to Bob's website (from her IP address with her cookies, etc). This could be as simple as using XMLHttpRequest and reading the responseText.



The browser's Same Origin Policy prevents that JavaScript from reading the data returned by Bob's website (which Bob and Alice don't want Mallory to access). (Note that you can, for example, display an image using an <img> element across origins because the content of the image is not exposed to JavaScript (or Mallory) … unless you throw canvas into the mix in which case you will generate a same-origin violation error).





Why the Same Origin Policy applies when you don't think it should



For any given URL it is possible that the SOP is not needed. A couple of common scenarios where this is the case are:




  • Alice, Bob and Mallory are the same person.

  • Bob is providing entirely public information


… but the browser has no way of knowing if either of the above are true, so trust is not automatic and the SOP is applied. Permission has to be granted explicitly before the browser will give the data it was given to a different website.





Why the Same Origin Policy only applies to JavaScript in a web page



Browser extensions, the Network tab in browser developer tools and applications like Postman are installed software. They aren't passing data from one website to the JavaScript belonging to a different website just because you visited that different website. Installing software usually takes a more conscious choice.



There isn't a third party (Mallory) who is considered a risk.





Why you can display data in the page without reading it with JS



There are a number of circumstances where Mallory's site can cause a browser to fetch data from a third party and display it (e.g. by adding an <img> element to display an image). It isn't possible for Mallory's JavaScript to read the data in that resource though, only Alice's browser and Bob's server can do that, so it is still secure.





CORS



The Access-Control-Allow-Origin header referred to in the error message is part of the CORS standard which allows Bob to explicitly grant permission to Mallory's site to access the data via Alice's browser.



A basic implementation would just include:



Access-Control-Allow-Origin: *


… to permit any website to read the data.



Access-Control-Allow-Origin: http://example.com/


… would allow only a specific site to access it, and you can dynamically generate that based on the Origin request header to permit multiple, but not all, sites to access it.



The specifics of how you set that response header depend on Bob's HTTP server and/or server-side programming language. There is a collection of guides for various common configurations that might help.



Model of where CORS rules are applied



NB: Some requests are complex and send a preflight OPTIONS request that the server will have to respond to before the browser will send the GET/POST/PUT/Whatever request that the JS wants to make. Implementations of CORS that only add Access-Control-Allow-Origin to specific URLs often get tripped up by this.





Obviously granting permission via CORS is something Bob would only do only if either:




  • The data was not private or

  • Mallory was trusted


If you are also Bob in this scenario, then the specifics of how you add CORS permission headers will depend on some combination of your choice of HTTP server software and what language you are using for server-side programming (if any).



Mallory can't add this header because she has to get permission from Bob's site and it would be silly (to the point of rendering the SOP useless) for her to be able to grant herself permission.





Error messages which mention "Response for preflight"



Some cross origin requests are preflighted.



This happens when (roughly speaking) you try to make a cross-origin request that:




  • Includes credentials like cookies

  • Couldn't be generated with a regular HTML form (e.g. has custom headers or a Content-Type that you couldn't use in a form's enctype).


Note that "custom headers" include Access-Control-Allow-Origin and other CORS response headers. These don't belong on the request, don't do anything helpful (what would be the point of a permissions system where you could grant yourself permission?), and must appear only on the response.



In these cases then the rest of this answer still applies but you also need to make sure that the server can listen for the preflight request (which will be OPTIONS (and not GET, POST or whatever you were trying to send) and respond to it with the right Access-Control-Allow-Origin header but also Access-Control-Allow-Methods and Access-Control-Allow-Headers to allow your specific HTTP methods or headers.





Alternatives to CORS



JSONP



Bob could also provide the data using a hack like JSONP which is how people did cross-origin Ajax before CORS came along.



It works by presenting the data in the form of a JavaScript program which injects the data into Mallory's page.



It requires that Mallory trust Bob not to provide malicious code.



Note the common theme: The site providing the data has to tell the browser that it is OK for a third party site to access the data it is sending to the browser.



Move the two resources to a single Origin



If the HTML document the JS runs in and the URL being requested are on the same origin (sharing the same scheme, hostname, and port) then they Same Origin Policy grants permission by default. CORS is not needed.



A Proxy



Mallory could use server-side code to fetch the data (which she could then pass from her server to Alice's browser through HTTP as usual).



It will either:




  • add CORS headers

  • convert the response to JSONP

  • exist on the same origin as the HTML document


That server-side code could be hosted by a third party (such as YQL).



Bob wouldn't need to grant any permissions for that to happen.



This would be fine since that is just between Mallory and Bob. There is no way for Bob to think that Mallory is Alice and to provide Mallory with data that should be kept confidential between Alice and Bob.



Consequently, Mallory can only use this technique to read public data.



Writing something other than a web app



As noted in the section "Why the Same Origin Policy only applies to JavaScript in a web page", you can avoid the SOP by not writing JavaScript in a webpage.



That doesn't mean you can't continue to use JavaScript and HTML, but you could distribute it using some other mechanism, such as Node-WebKit or PhoneGap.



Browser extensions



It is possible for a browser extension to inject the CORS headers in the response before the Same Origin Policy is applied.



These can be useful for development, but are not practical for a production site (asking every user of your site to install a browser extension that disables a security feature of their browser is unreasonable).



They also tend to work only with simple requests (failing when handling preflight OPTIONS requests).



Having a proper development environment with a local development server
is usually a better approach.





Other security risks



Note that SOP / CORS do not mitigate XSS, CSRF, or SQL Injection attacks which need to be handled independently.





Summary




  • There is nothing you can do in your client-side code that will enable CORS access to someone else's server.

  • If you control the server the request is being made to: Add CORS permissions to it.

  • If you are friendly with the person who controls it: Get them to add CORS permissions to it.

  • If it is a public service: Read their API documentation to see what they say about accessing it with client-side JavaScript. They might tell you to use specific URLs or to use JSONP (or they might not support it at all).

  • If none of the above apply: Get the browser to talk to your server instead, and then have your server fetch the data from the other server and pass it on. (There are also third-party hosted services which attach CORS headers to publically accessible resources that you could use).






share|improve this answer























  • If I run local LAN a web server and try to do ajax load from the IP/URL will that work ? I havent tried that yet. as my web server returing json data would be a MCU
    – Ciasto piekarz
    Dec 23 '16 at 5:09










  • @Ciastopiekarz — Normal same origin / different origin rules apply. Normal network routing rules apply.
    – Quentin
    Dec 23 '16 at 12:25






  • 9




    Most complete answer I ve ever read, instead of just a link about cors..
    – pungggi
    Apr 22 '17 at 18:12










  • @Quentin - Wow! +1! So what I'm to understand is if Alice uses the CORS extension, the server thinks that her http calls are not from javascript but from a browser extension and treats it like a normal same origin request?
    – snippetkid
    May 11 '17 at 11:51










  • @snippetkid — No. In the usual case, the server will send CORS headers in ever response and not care where the request came from. It is the responsibility of the browser to allow or deny access to the data to the JS based on the CORS headers on the response. (Things get a /little/ more complex on the server when it comes to preflight requests)
    – Quentin
    May 11 '17 at 11:54





















2














This is happening because of the CORS error. CORS stands for Cross Origin Resource Sharing. In simple words, this error occurs when we try to access a domain/resource from another domain.



Read More about it here: CORS error with jquery



To fix this, if you have access to the other domain, you will have to allow Access-Control-Allow-Origin in the server. This can be added in the headers. You can enable this for all the requests/domains or a specific domain.



How to get a cross-origin resource sharing (CORS) post request working



These links may help






share|improve this answer































    2














    Target server must allowed cross-origin request. In order to allow it through express, simply handle http options request :



    app.options('/url...', function(req, res, next){
    res.header('Access-Control-Allow-Origin', "*");
    res.header('Access-Control-Allow-Methods', 'POST');
    res.header("Access-Control-Allow-Headers", "accept, content-type");
    res.header("Access-Control-Max-Age", "1728000");
    return res.sendStatus(200);
    });





    share|improve this answer





























      2














      As this isn't mentioned in the accepted answer.




      • This is not the case for this exact question, but might help others that search for that problem

      • This is something you can do in your client-code to prevent CORS errors in some cases.


      You can make use of Simple Requests.

      In order to perform a 'Simple Requests' the request needs to meet several conditions. E.g. only allowing POST, GET and HEAD method, as well as only allowing some given Headers (you can find all conditions here).



      If your client code does not explicit set affected Headers (e.g. "Accept") with a fix value in the request it might occur that some clients do set these Headers automatically with some "non-standard" values causing the server to not accept it as Simple Request - which will give you a CORS error.






      share|improve this answer































        0














        This CORS issue wasn't further elaborated (for other causes).



        I'm having this issue currently under different reason.
        My front end is returning 'Access-Control-Allow-Origin' header error as well.



        Just that I've pointed the wrong URL so this header wasn't reflected properly (in which i kept presume it did). localhost (front end) -> call to non secured http (supposed to be https), make sure the API end point from front end is pointing to the correct protocol.






        share|improve this answer





























          -3














          You should enable CORS to get it working.






          share|improve this answer





















            Your Answer






            StackExchange.ifUsing("editor", function () {
            StackExchange.using("externalEditor", function () {
            StackExchange.using("snippets", function () {
            StackExchange.snippets.init();
            });
            });
            }, "code-snippets");

            StackExchange.ready(function() {
            var channelOptions = {
            tags: "".split(" "),
            id: "1"
            };
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function() {
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled) {
            StackExchange.using("snippets", function() {
            createEditor();
            });
            }
            else {
            createEditor();
            }
            });

            function createEditor() {
            StackExchange.prepareEditor({
            heartbeatType: 'answer',
            autoActivateHeartbeat: false,
            convertImagesToLinks: true,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: 10,
            bindNavPrevention: true,
            postfix: "",
            imageUploader: {
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            },
            onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            });


            }
            });














            draft saved

            draft discarded


















            StackExchange.ready(
            function () {
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f35553500%2fxmlhttprequest-cannot-load-xxx-no-access-control-allow-origin-header%23new-answer', 'question_page');
            }
            );

            Post as a guest















            Required, but never shown

























            6 Answers
            6






            active

            oldest

            votes








            6 Answers
            6






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            90














            About the Same Origin Policy



            This is the Same Origin Policy. It is a security feature implemented by browsers.



            Your particular case is showing how it is implemented for XMLHttpRequest (and you'll get identical results if you were to use fetch), but it also applies to other things (such as images loaded onto a <canvas> or documents loaded into an <iframe>), just with slightly different implementations.



            (Weirdly, it also applies to CSS fonts, but that is because found foundries insisted on DRM and not for the security issues that the Same Origin Policy usually covers).



            The standard scenario that demonstrates the need for the SOP can be demonstrated with three characters:




            • Alice is a person with a web browser

            • Bob runs a website (https://www.[website].com/ in your example)

            • Mallory runs a website (http://localhost:4300 in your example)


            Alice is logged into Bob's site and has some confidential data there. Perhaps it is a company intranet (accessible only to browsers on the LAN), or her online banking (accessible only with a cookie you get after entering a username and password).



            Alice visits Mallory's website which has some JavaScript that causes Alice's browser to make an HTTP request to Bob's website (from her IP address with her cookies, etc). This could be as simple as using XMLHttpRequest and reading the responseText.



            The browser's Same Origin Policy prevents that JavaScript from reading the data returned by Bob's website (which Bob and Alice don't want Mallory to access). (Note that you can, for example, display an image using an <img> element across origins because the content of the image is not exposed to JavaScript (or Mallory) … unless you throw canvas into the mix in which case you will generate a same-origin violation error).





            Why the Same Origin Policy applies when you don't think it should



            For any given URL it is possible that the SOP is not needed. A couple of common scenarios where this is the case are:




            • Alice, Bob and Mallory are the same person.

            • Bob is providing entirely public information


            … but the browser has no way of knowing if either of the above are true, so trust is not automatic and the SOP is applied. Permission has to be granted explicitly before the browser will give the data it was given to a different website.





            Why the Same Origin Policy only applies to JavaScript in a web page



            Browser extensions, the Network tab in browser developer tools and applications like Postman are installed software. They aren't passing data from one website to the JavaScript belonging to a different website just because you visited that different website. Installing software usually takes a more conscious choice.



            There isn't a third party (Mallory) who is considered a risk.





            Why you can display data in the page without reading it with JS



            There are a number of circumstances where Mallory's site can cause a browser to fetch data from a third party and display it (e.g. by adding an <img> element to display an image). It isn't possible for Mallory's JavaScript to read the data in that resource though, only Alice's browser and Bob's server can do that, so it is still secure.





            CORS



            The Access-Control-Allow-Origin header referred to in the error message is part of the CORS standard which allows Bob to explicitly grant permission to Mallory's site to access the data via Alice's browser.



            A basic implementation would just include:



            Access-Control-Allow-Origin: *


            … to permit any website to read the data.



            Access-Control-Allow-Origin: http://example.com/


            … would allow only a specific site to access it, and you can dynamically generate that based on the Origin request header to permit multiple, but not all, sites to access it.



            The specifics of how you set that response header depend on Bob's HTTP server and/or server-side programming language. There is a collection of guides for various common configurations that might help.



            Model of where CORS rules are applied



            NB: Some requests are complex and send a preflight OPTIONS request that the server will have to respond to before the browser will send the GET/POST/PUT/Whatever request that the JS wants to make. Implementations of CORS that only add Access-Control-Allow-Origin to specific URLs often get tripped up by this.





            Obviously granting permission via CORS is something Bob would only do only if either:




            • The data was not private or

            • Mallory was trusted


            If you are also Bob in this scenario, then the specifics of how you add CORS permission headers will depend on some combination of your choice of HTTP server software and what language you are using for server-side programming (if any).



            Mallory can't add this header because she has to get permission from Bob's site and it would be silly (to the point of rendering the SOP useless) for her to be able to grant herself permission.





            Error messages which mention "Response for preflight"



            Some cross origin requests are preflighted.



            This happens when (roughly speaking) you try to make a cross-origin request that:




            • Includes credentials like cookies

            • Couldn't be generated with a regular HTML form (e.g. has custom headers or a Content-Type that you couldn't use in a form's enctype).


            Note that "custom headers" include Access-Control-Allow-Origin and other CORS response headers. These don't belong on the request, don't do anything helpful (what would be the point of a permissions system where you could grant yourself permission?), and must appear only on the response.



            In these cases then the rest of this answer still applies but you also need to make sure that the server can listen for the preflight request (which will be OPTIONS (and not GET, POST or whatever you were trying to send) and respond to it with the right Access-Control-Allow-Origin header but also Access-Control-Allow-Methods and Access-Control-Allow-Headers to allow your specific HTTP methods or headers.





            Alternatives to CORS



            JSONP



            Bob could also provide the data using a hack like JSONP which is how people did cross-origin Ajax before CORS came along.



            It works by presenting the data in the form of a JavaScript program which injects the data into Mallory's page.



            It requires that Mallory trust Bob not to provide malicious code.



            Note the common theme: The site providing the data has to tell the browser that it is OK for a third party site to access the data it is sending to the browser.



            Move the two resources to a single Origin



            If the HTML document the JS runs in and the URL being requested are on the same origin (sharing the same scheme, hostname, and port) then they Same Origin Policy grants permission by default. CORS is not needed.



            A Proxy



            Mallory could use server-side code to fetch the data (which she could then pass from her server to Alice's browser through HTTP as usual).



            It will either:




            • add CORS headers

            • convert the response to JSONP

            • exist on the same origin as the HTML document


            That server-side code could be hosted by a third party (such as YQL).



            Bob wouldn't need to grant any permissions for that to happen.



            This would be fine since that is just between Mallory and Bob. There is no way for Bob to think that Mallory is Alice and to provide Mallory with data that should be kept confidential between Alice and Bob.



            Consequently, Mallory can only use this technique to read public data.



            Writing something other than a web app



            As noted in the section "Why the Same Origin Policy only applies to JavaScript in a web page", you can avoid the SOP by not writing JavaScript in a webpage.



            That doesn't mean you can't continue to use JavaScript and HTML, but you could distribute it using some other mechanism, such as Node-WebKit or PhoneGap.



            Browser extensions



            It is possible for a browser extension to inject the CORS headers in the response before the Same Origin Policy is applied.



            These can be useful for development, but are not practical for a production site (asking every user of your site to install a browser extension that disables a security feature of their browser is unreasonable).



            They also tend to work only with simple requests (failing when handling preflight OPTIONS requests).



            Having a proper development environment with a local development server
            is usually a better approach.





            Other security risks



            Note that SOP / CORS do not mitigate XSS, CSRF, or SQL Injection attacks which need to be handled independently.





            Summary




            • There is nothing you can do in your client-side code that will enable CORS access to someone else's server.

            • If you control the server the request is being made to: Add CORS permissions to it.

            • If you are friendly with the person who controls it: Get them to add CORS permissions to it.

            • If it is a public service: Read their API documentation to see what they say about accessing it with client-side JavaScript. They might tell you to use specific URLs or to use JSONP (or they might not support it at all).

            • If none of the above apply: Get the browser to talk to your server instead, and then have your server fetch the data from the other server and pass it on. (There are also third-party hosted services which attach CORS headers to publically accessible resources that you could use).






            share|improve this answer























            • If I run local LAN a web server and try to do ajax load from the IP/URL will that work ? I havent tried that yet. as my web server returing json data would be a MCU
              – Ciasto piekarz
              Dec 23 '16 at 5:09










            • @Ciastopiekarz — Normal same origin / different origin rules apply. Normal network routing rules apply.
              – Quentin
              Dec 23 '16 at 12:25






            • 9




              Most complete answer I ve ever read, instead of just a link about cors..
              – pungggi
              Apr 22 '17 at 18:12










            • @Quentin - Wow! +1! So what I'm to understand is if Alice uses the CORS extension, the server thinks that her http calls are not from javascript but from a browser extension and treats it like a normal same origin request?
              – snippetkid
              May 11 '17 at 11:51










            • @snippetkid — No. In the usual case, the server will send CORS headers in ever response and not care where the request came from. It is the responsibility of the browser to allow or deny access to the data to the JS based on the CORS headers on the response. (Things get a /little/ more complex on the server when it comes to preflight requests)
              – Quentin
              May 11 '17 at 11:54


















            90














            About the Same Origin Policy



            This is the Same Origin Policy. It is a security feature implemented by browsers.



            Your particular case is showing how it is implemented for XMLHttpRequest (and you'll get identical results if you were to use fetch), but it also applies to other things (such as images loaded onto a <canvas> or documents loaded into an <iframe>), just with slightly different implementations.



            (Weirdly, it also applies to CSS fonts, but that is because found foundries insisted on DRM and not for the security issues that the Same Origin Policy usually covers).



            The standard scenario that demonstrates the need for the SOP can be demonstrated with three characters:




            • Alice is a person with a web browser

            • Bob runs a website (https://www.[website].com/ in your example)

            • Mallory runs a website (http://localhost:4300 in your example)


            Alice is logged into Bob's site and has some confidential data there. Perhaps it is a company intranet (accessible only to browsers on the LAN), or her online banking (accessible only with a cookie you get after entering a username and password).



            Alice visits Mallory's website which has some JavaScript that causes Alice's browser to make an HTTP request to Bob's website (from her IP address with her cookies, etc). This could be as simple as using XMLHttpRequest and reading the responseText.



            The browser's Same Origin Policy prevents that JavaScript from reading the data returned by Bob's website (which Bob and Alice don't want Mallory to access). (Note that you can, for example, display an image using an <img> element across origins because the content of the image is not exposed to JavaScript (or Mallory) … unless you throw canvas into the mix in which case you will generate a same-origin violation error).





            Why the Same Origin Policy applies when you don't think it should



            For any given URL it is possible that the SOP is not needed. A couple of common scenarios where this is the case are:




            • Alice, Bob and Mallory are the same person.

            • Bob is providing entirely public information


            … but the browser has no way of knowing if either of the above are true, so trust is not automatic and the SOP is applied. Permission has to be granted explicitly before the browser will give the data it was given to a different website.





            Why the Same Origin Policy only applies to JavaScript in a web page



            Browser extensions, the Network tab in browser developer tools and applications like Postman are installed software. They aren't passing data from one website to the JavaScript belonging to a different website just because you visited that different website. Installing software usually takes a more conscious choice.



            There isn't a third party (Mallory) who is considered a risk.





            Why you can display data in the page without reading it with JS



            There are a number of circumstances where Mallory's site can cause a browser to fetch data from a third party and display it (e.g. by adding an <img> element to display an image). It isn't possible for Mallory's JavaScript to read the data in that resource though, only Alice's browser and Bob's server can do that, so it is still secure.





            CORS



            The Access-Control-Allow-Origin header referred to in the error message is part of the CORS standard which allows Bob to explicitly grant permission to Mallory's site to access the data via Alice's browser.



            A basic implementation would just include:



            Access-Control-Allow-Origin: *


            … to permit any website to read the data.



            Access-Control-Allow-Origin: http://example.com/


            … would allow only a specific site to access it, and you can dynamically generate that based on the Origin request header to permit multiple, but not all, sites to access it.



            The specifics of how you set that response header depend on Bob's HTTP server and/or server-side programming language. There is a collection of guides for various common configurations that might help.



            Model of where CORS rules are applied



            NB: Some requests are complex and send a preflight OPTIONS request that the server will have to respond to before the browser will send the GET/POST/PUT/Whatever request that the JS wants to make. Implementations of CORS that only add Access-Control-Allow-Origin to specific URLs often get tripped up by this.





            Obviously granting permission via CORS is something Bob would only do only if either:




            • The data was not private or

            • Mallory was trusted


            If you are also Bob in this scenario, then the specifics of how you add CORS permission headers will depend on some combination of your choice of HTTP server software and what language you are using for server-side programming (if any).



            Mallory can't add this header because she has to get permission from Bob's site and it would be silly (to the point of rendering the SOP useless) for her to be able to grant herself permission.





            Error messages which mention "Response for preflight"



            Some cross origin requests are preflighted.



            This happens when (roughly speaking) you try to make a cross-origin request that:




            • Includes credentials like cookies

            • Couldn't be generated with a regular HTML form (e.g. has custom headers or a Content-Type that you couldn't use in a form's enctype).


            Note that "custom headers" include Access-Control-Allow-Origin and other CORS response headers. These don't belong on the request, don't do anything helpful (what would be the point of a permissions system where you could grant yourself permission?), and must appear only on the response.



            In these cases then the rest of this answer still applies but you also need to make sure that the server can listen for the preflight request (which will be OPTIONS (and not GET, POST or whatever you were trying to send) and respond to it with the right Access-Control-Allow-Origin header but also Access-Control-Allow-Methods and Access-Control-Allow-Headers to allow your specific HTTP methods or headers.





            Alternatives to CORS



            JSONP



            Bob could also provide the data using a hack like JSONP which is how people did cross-origin Ajax before CORS came along.



            It works by presenting the data in the form of a JavaScript program which injects the data into Mallory's page.



            It requires that Mallory trust Bob not to provide malicious code.



            Note the common theme: The site providing the data has to tell the browser that it is OK for a third party site to access the data it is sending to the browser.



            Move the two resources to a single Origin



            If the HTML document the JS runs in and the URL being requested are on the same origin (sharing the same scheme, hostname, and port) then they Same Origin Policy grants permission by default. CORS is not needed.



            A Proxy



            Mallory could use server-side code to fetch the data (which she could then pass from her server to Alice's browser through HTTP as usual).



            It will either:




            • add CORS headers

            • convert the response to JSONP

            • exist on the same origin as the HTML document


            That server-side code could be hosted by a third party (such as YQL).



            Bob wouldn't need to grant any permissions for that to happen.



            This would be fine since that is just between Mallory and Bob. There is no way for Bob to think that Mallory is Alice and to provide Mallory with data that should be kept confidential between Alice and Bob.



            Consequently, Mallory can only use this technique to read public data.



            Writing something other than a web app



            As noted in the section "Why the Same Origin Policy only applies to JavaScript in a web page", you can avoid the SOP by not writing JavaScript in a webpage.



            That doesn't mean you can't continue to use JavaScript and HTML, but you could distribute it using some other mechanism, such as Node-WebKit or PhoneGap.



            Browser extensions



            It is possible for a browser extension to inject the CORS headers in the response before the Same Origin Policy is applied.



            These can be useful for development, but are not practical for a production site (asking every user of your site to install a browser extension that disables a security feature of their browser is unreasonable).



            They also tend to work only with simple requests (failing when handling preflight OPTIONS requests).



            Having a proper development environment with a local development server
            is usually a better approach.





            Other security risks



            Note that SOP / CORS do not mitigate XSS, CSRF, or SQL Injection attacks which need to be handled independently.





            Summary




            • There is nothing you can do in your client-side code that will enable CORS access to someone else's server.

            • If you control the server the request is being made to: Add CORS permissions to it.

            • If you are friendly with the person who controls it: Get them to add CORS permissions to it.

            • If it is a public service: Read their API documentation to see what they say about accessing it with client-side JavaScript. They might tell you to use specific URLs or to use JSONP (or they might not support it at all).

            • If none of the above apply: Get the browser to talk to your server instead, and then have your server fetch the data from the other server and pass it on. (There are also third-party hosted services which attach CORS headers to publically accessible resources that you could use).






            share|improve this answer























            • If I run local LAN a web server and try to do ajax load from the IP/URL will that work ? I havent tried that yet. as my web server returing json data would be a MCU
              – Ciasto piekarz
              Dec 23 '16 at 5:09










            • @Ciastopiekarz — Normal same origin / different origin rules apply. Normal network routing rules apply.
              – Quentin
              Dec 23 '16 at 12:25






            • 9




              Most complete answer I ve ever read, instead of just a link about cors..
              – pungggi
              Apr 22 '17 at 18:12










            • @Quentin - Wow! +1! So what I'm to understand is if Alice uses the CORS extension, the server thinks that her http calls are not from javascript but from a browser extension and treats it like a normal same origin request?
              – snippetkid
              May 11 '17 at 11:51










            • @snippetkid — No. In the usual case, the server will send CORS headers in ever response and not care where the request came from. It is the responsibility of the browser to allow or deny access to the data to the JS based on the CORS headers on the response. (Things get a /little/ more complex on the server when it comes to preflight requests)
              – Quentin
              May 11 '17 at 11:54
















            90












            90








            90






            About the Same Origin Policy



            This is the Same Origin Policy. It is a security feature implemented by browsers.



            Your particular case is showing how it is implemented for XMLHttpRequest (and you'll get identical results if you were to use fetch), but it also applies to other things (such as images loaded onto a <canvas> or documents loaded into an <iframe>), just with slightly different implementations.



            (Weirdly, it also applies to CSS fonts, but that is because found foundries insisted on DRM and not for the security issues that the Same Origin Policy usually covers).



            The standard scenario that demonstrates the need for the SOP can be demonstrated with three characters:




            • Alice is a person with a web browser

            • Bob runs a website (https://www.[website].com/ in your example)

            • Mallory runs a website (http://localhost:4300 in your example)


            Alice is logged into Bob's site and has some confidential data there. Perhaps it is a company intranet (accessible only to browsers on the LAN), or her online banking (accessible only with a cookie you get after entering a username and password).



            Alice visits Mallory's website which has some JavaScript that causes Alice's browser to make an HTTP request to Bob's website (from her IP address with her cookies, etc). This could be as simple as using XMLHttpRequest and reading the responseText.



            The browser's Same Origin Policy prevents that JavaScript from reading the data returned by Bob's website (which Bob and Alice don't want Mallory to access). (Note that you can, for example, display an image using an <img> element across origins because the content of the image is not exposed to JavaScript (or Mallory) … unless you throw canvas into the mix in which case you will generate a same-origin violation error).





            Why the Same Origin Policy applies when you don't think it should



            For any given URL it is possible that the SOP is not needed. A couple of common scenarios where this is the case are:




            • Alice, Bob and Mallory are the same person.

            • Bob is providing entirely public information


            … but the browser has no way of knowing if either of the above are true, so trust is not automatic and the SOP is applied. Permission has to be granted explicitly before the browser will give the data it was given to a different website.





            Why the Same Origin Policy only applies to JavaScript in a web page



            Browser extensions, the Network tab in browser developer tools and applications like Postman are installed software. They aren't passing data from one website to the JavaScript belonging to a different website just because you visited that different website. Installing software usually takes a more conscious choice.



            There isn't a third party (Mallory) who is considered a risk.





            Why you can display data in the page without reading it with JS



            There are a number of circumstances where Mallory's site can cause a browser to fetch data from a third party and display it (e.g. by adding an <img> element to display an image). It isn't possible for Mallory's JavaScript to read the data in that resource though, only Alice's browser and Bob's server can do that, so it is still secure.





            CORS



            The Access-Control-Allow-Origin header referred to in the error message is part of the CORS standard which allows Bob to explicitly grant permission to Mallory's site to access the data via Alice's browser.



            A basic implementation would just include:



            Access-Control-Allow-Origin: *


            … to permit any website to read the data.



            Access-Control-Allow-Origin: http://example.com/


            … would allow only a specific site to access it, and you can dynamically generate that based on the Origin request header to permit multiple, but not all, sites to access it.



            The specifics of how you set that response header depend on Bob's HTTP server and/or server-side programming language. There is a collection of guides for various common configurations that might help.



            Model of where CORS rules are applied



            NB: Some requests are complex and send a preflight OPTIONS request that the server will have to respond to before the browser will send the GET/POST/PUT/Whatever request that the JS wants to make. Implementations of CORS that only add Access-Control-Allow-Origin to specific URLs often get tripped up by this.





            Obviously granting permission via CORS is something Bob would only do only if either:




            • The data was not private or

            • Mallory was trusted


            If you are also Bob in this scenario, then the specifics of how you add CORS permission headers will depend on some combination of your choice of HTTP server software and what language you are using for server-side programming (if any).



            Mallory can't add this header because she has to get permission from Bob's site and it would be silly (to the point of rendering the SOP useless) for her to be able to grant herself permission.





            Error messages which mention "Response for preflight"



            Some cross origin requests are preflighted.



            This happens when (roughly speaking) you try to make a cross-origin request that:




            • Includes credentials like cookies

            • Couldn't be generated with a regular HTML form (e.g. has custom headers or a Content-Type that you couldn't use in a form's enctype).


            Note that "custom headers" include Access-Control-Allow-Origin and other CORS response headers. These don't belong on the request, don't do anything helpful (what would be the point of a permissions system where you could grant yourself permission?), and must appear only on the response.



            In these cases then the rest of this answer still applies but you also need to make sure that the server can listen for the preflight request (which will be OPTIONS (and not GET, POST or whatever you were trying to send) and respond to it with the right Access-Control-Allow-Origin header but also Access-Control-Allow-Methods and Access-Control-Allow-Headers to allow your specific HTTP methods or headers.





            Alternatives to CORS



            JSONP



            Bob could also provide the data using a hack like JSONP which is how people did cross-origin Ajax before CORS came along.



            It works by presenting the data in the form of a JavaScript program which injects the data into Mallory's page.



            It requires that Mallory trust Bob not to provide malicious code.



            Note the common theme: The site providing the data has to tell the browser that it is OK for a third party site to access the data it is sending to the browser.



            Move the two resources to a single Origin



            If the HTML document the JS runs in and the URL being requested are on the same origin (sharing the same scheme, hostname, and port) then they Same Origin Policy grants permission by default. CORS is not needed.



            A Proxy



            Mallory could use server-side code to fetch the data (which she could then pass from her server to Alice's browser through HTTP as usual).



            It will either:




            • add CORS headers

            • convert the response to JSONP

            • exist on the same origin as the HTML document


            That server-side code could be hosted by a third party (such as YQL).



            Bob wouldn't need to grant any permissions for that to happen.



            This would be fine since that is just between Mallory and Bob. There is no way for Bob to think that Mallory is Alice and to provide Mallory with data that should be kept confidential between Alice and Bob.



            Consequently, Mallory can only use this technique to read public data.



            Writing something other than a web app



            As noted in the section "Why the Same Origin Policy only applies to JavaScript in a web page", you can avoid the SOP by not writing JavaScript in a webpage.



            That doesn't mean you can't continue to use JavaScript and HTML, but you could distribute it using some other mechanism, such as Node-WebKit or PhoneGap.



            Browser extensions



            It is possible for a browser extension to inject the CORS headers in the response before the Same Origin Policy is applied.



            These can be useful for development, but are not practical for a production site (asking every user of your site to install a browser extension that disables a security feature of their browser is unreasonable).



            They also tend to work only with simple requests (failing when handling preflight OPTIONS requests).



            Having a proper development environment with a local development server
            is usually a better approach.





            Other security risks



            Note that SOP / CORS do not mitigate XSS, CSRF, or SQL Injection attacks which need to be handled independently.





            Summary




            • There is nothing you can do in your client-side code that will enable CORS access to someone else's server.

            • If you control the server the request is being made to: Add CORS permissions to it.

            • If you are friendly with the person who controls it: Get them to add CORS permissions to it.

            • If it is a public service: Read their API documentation to see what they say about accessing it with client-side JavaScript. They might tell you to use specific URLs or to use JSONP (or they might not support it at all).

            • If none of the above apply: Get the browser to talk to your server instead, and then have your server fetch the data from the other server and pass it on. (There are also third-party hosted services which attach CORS headers to publically accessible resources that you could use).






            share|improve this answer














            About the Same Origin Policy



            This is the Same Origin Policy. It is a security feature implemented by browsers.



            Your particular case is showing how it is implemented for XMLHttpRequest (and you'll get identical results if you were to use fetch), but it also applies to other things (such as images loaded onto a <canvas> or documents loaded into an <iframe>), just with slightly different implementations.



            (Weirdly, it also applies to CSS fonts, but that is because found foundries insisted on DRM and not for the security issues that the Same Origin Policy usually covers).



            The standard scenario that demonstrates the need for the SOP can be demonstrated with three characters:




            • Alice is a person with a web browser

            • Bob runs a website (https://www.[website].com/ in your example)

            • Mallory runs a website (http://localhost:4300 in your example)


            Alice is logged into Bob's site and has some confidential data there. Perhaps it is a company intranet (accessible only to browsers on the LAN), or her online banking (accessible only with a cookie you get after entering a username and password).



            Alice visits Mallory's website which has some JavaScript that causes Alice's browser to make an HTTP request to Bob's website (from her IP address with her cookies, etc). This could be as simple as using XMLHttpRequest and reading the responseText.



            The browser's Same Origin Policy prevents that JavaScript from reading the data returned by Bob's website (which Bob and Alice don't want Mallory to access). (Note that you can, for example, display an image using an <img> element across origins because the content of the image is not exposed to JavaScript (or Mallory) … unless you throw canvas into the mix in which case you will generate a same-origin violation error).





            Why the Same Origin Policy applies when you don't think it should



            For any given URL it is possible that the SOP is not needed. A couple of common scenarios where this is the case are:




            • Alice, Bob and Mallory are the same person.

            • Bob is providing entirely public information


            … but the browser has no way of knowing if either of the above are true, so trust is not automatic and the SOP is applied. Permission has to be granted explicitly before the browser will give the data it was given to a different website.





            Why the Same Origin Policy only applies to JavaScript in a web page



            Browser extensions, the Network tab in browser developer tools and applications like Postman are installed software. They aren't passing data from one website to the JavaScript belonging to a different website just because you visited that different website. Installing software usually takes a more conscious choice.



            There isn't a third party (Mallory) who is considered a risk.





            Why you can display data in the page without reading it with JS



            There are a number of circumstances where Mallory's site can cause a browser to fetch data from a third party and display it (e.g. by adding an <img> element to display an image). It isn't possible for Mallory's JavaScript to read the data in that resource though, only Alice's browser and Bob's server can do that, so it is still secure.





            CORS



            The Access-Control-Allow-Origin header referred to in the error message is part of the CORS standard which allows Bob to explicitly grant permission to Mallory's site to access the data via Alice's browser.



            A basic implementation would just include:



            Access-Control-Allow-Origin: *


            … to permit any website to read the data.



            Access-Control-Allow-Origin: http://example.com/


            … would allow only a specific site to access it, and you can dynamically generate that based on the Origin request header to permit multiple, but not all, sites to access it.



            The specifics of how you set that response header depend on Bob's HTTP server and/or server-side programming language. There is a collection of guides for various common configurations that might help.



            Model of where CORS rules are applied



            NB: Some requests are complex and send a preflight OPTIONS request that the server will have to respond to before the browser will send the GET/POST/PUT/Whatever request that the JS wants to make. Implementations of CORS that only add Access-Control-Allow-Origin to specific URLs often get tripped up by this.





            Obviously granting permission via CORS is something Bob would only do only if either:




            • The data was not private or

            • Mallory was trusted


            If you are also Bob in this scenario, then the specifics of how you add CORS permission headers will depend on some combination of your choice of HTTP server software and what language you are using for server-side programming (if any).



            Mallory can't add this header because she has to get permission from Bob's site and it would be silly (to the point of rendering the SOP useless) for her to be able to grant herself permission.





            Error messages which mention "Response for preflight"



            Some cross origin requests are preflighted.



            This happens when (roughly speaking) you try to make a cross-origin request that:




            • Includes credentials like cookies

            • Couldn't be generated with a regular HTML form (e.g. has custom headers or a Content-Type that you couldn't use in a form's enctype).


            Note that "custom headers" include Access-Control-Allow-Origin and other CORS response headers. These don't belong on the request, don't do anything helpful (what would be the point of a permissions system where you could grant yourself permission?), and must appear only on the response.



            In these cases then the rest of this answer still applies but you also need to make sure that the server can listen for the preflight request (which will be OPTIONS (and not GET, POST or whatever you were trying to send) and respond to it with the right Access-Control-Allow-Origin header but also Access-Control-Allow-Methods and Access-Control-Allow-Headers to allow your specific HTTP methods or headers.





            Alternatives to CORS



            JSONP



            Bob could also provide the data using a hack like JSONP which is how people did cross-origin Ajax before CORS came along.



            It works by presenting the data in the form of a JavaScript program which injects the data into Mallory's page.



            It requires that Mallory trust Bob not to provide malicious code.



            Note the common theme: The site providing the data has to tell the browser that it is OK for a third party site to access the data it is sending to the browser.



            Move the two resources to a single Origin



            If the HTML document the JS runs in and the URL being requested are on the same origin (sharing the same scheme, hostname, and port) then they Same Origin Policy grants permission by default. CORS is not needed.



            A Proxy



            Mallory could use server-side code to fetch the data (which she could then pass from her server to Alice's browser through HTTP as usual).



            It will either:




            • add CORS headers

            • convert the response to JSONP

            • exist on the same origin as the HTML document


            That server-side code could be hosted by a third party (such as YQL).



            Bob wouldn't need to grant any permissions for that to happen.



            This would be fine since that is just between Mallory and Bob. There is no way for Bob to think that Mallory is Alice and to provide Mallory with data that should be kept confidential between Alice and Bob.



            Consequently, Mallory can only use this technique to read public data.



            Writing something other than a web app



            As noted in the section "Why the Same Origin Policy only applies to JavaScript in a web page", you can avoid the SOP by not writing JavaScript in a webpage.



            That doesn't mean you can't continue to use JavaScript and HTML, but you could distribute it using some other mechanism, such as Node-WebKit or PhoneGap.



            Browser extensions



            It is possible for a browser extension to inject the CORS headers in the response before the Same Origin Policy is applied.



            These can be useful for development, but are not practical for a production site (asking every user of your site to install a browser extension that disables a security feature of their browser is unreasonable).



            They also tend to work only with simple requests (failing when handling preflight OPTIONS requests).



            Having a proper development environment with a local development server
            is usually a better approach.





            Other security risks



            Note that SOP / CORS do not mitigate XSS, CSRF, or SQL Injection attacks which need to be handled independently.





            Summary




            • There is nothing you can do in your client-side code that will enable CORS access to someone else's server.

            • If you control the server the request is being made to: Add CORS permissions to it.

            • If you are friendly with the person who controls it: Get them to add CORS permissions to it.

            • If it is a public service: Read their API documentation to see what they say about accessing it with client-side JavaScript. They might tell you to use specific URLs or to use JSONP (or they might not support it at all).

            • If none of the above apply: Get the browser to talk to your server instead, and then have your server fetch the data from the other server and pass it on. (There are also third-party hosted services which attach CORS headers to publically accessible resources that you could use).







            share|improve this answer














            share|improve this answer



            share|improve this answer








            edited 2 days ago

























            answered Feb 22 '16 at 12:26









            QuentinQuentin

            640k718631033




            640k718631033












            • If I run local LAN a web server and try to do ajax load from the IP/URL will that work ? I havent tried that yet. as my web server returing json data would be a MCU
              – Ciasto piekarz
              Dec 23 '16 at 5:09










            • @Ciastopiekarz — Normal same origin / different origin rules apply. Normal network routing rules apply.
              – Quentin
              Dec 23 '16 at 12:25






            • 9




              Most complete answer I ve ever read, instead of just a link about cors..
              – pungggi
              Apr 22 '17 at 18:12










            • @Quentin - Wow! +1! So what I'm to understand is if Alice uses the CORS extension, the server thinks that her http calls are not from javascript but from a browser extension and treats it like a normal same origin request?
              – snippetkid
              May 11 '17 at 11:51










            • @snippetkid — No. In the usual case, the server will send CORS headers in ever response and not care where the request came from. It is the responsibility of the browser to allow or deny access to the data to the JS based on the CORS headers on the response. (Things get a /little/ more complex on the server when it comes to preflight requests)
              – Quentin
              May 11 '17 at 11:54




















            • If I run local LAN a web server and try to do ajax load from the IP/URL will that work ? I havent tried that yet. as my web server returing json data would be a MCU
              – Ciasto piekarz
              Dec 23 '16 at 5:09










            • @Ciastopiekarz — Normal same origin / different origin rules apply. Normal network routing rules apply.
              – Quentin
              Dec 23 '16 at 12:25






            • 9




              Most complete answer I ve ever read, instead of just a link about cors..
              – pungggi
              Apr 22 '17 at 18:12










            • @Quentin - Wow! +1! So what I'm to understand is if Alice uses the CORS extension, the server thinks that her http calls are not from javascript but from a browser extension and treats it like a normal same origin request?
              – snippetkid
              May 11 '17 at 11:51










            • @snippetkid — No. In the usual case, the server will send CORS headers in ever response and not care where the request came from. It is the responsibility of the browser to allow or deny access to the data to the JS based on the CORS headers on the response. (Things get a /little/ more complex on the server when it comes to preflight requests)
              – Quentin
              May 11 '17 at 11:54


















            If I run local LAN a web server and try to do ajax load from the IP/URL will that work ? I havent tried that yet. as my web server returing json data would be a MCU
            – Ciasto piekarz
            Dec 23 '16 at 5:09




            If I run local LAN a web server and try to do ajax load from the IP/URL will that work ? I havent tried that yet. as my web server returing json data would be a MCU
            – Ciasto piekarz
            Dec 23 '16 at 5:09












            @Ciastopiekarz — Normal same origin / different origin rules apply. Normal network routing rules apply.
            – Quentin
            Dec 23 '16 at 12:25




            @Ciastopiekarz — Normal same origin / different origin rules apply. Normal network routing rules apply.
            – Quentin
            Dec 23 '16 at 12:25




            9




            9




            Most complete answer I ve ever read, instead of just a link about cors..
            – pungggi
            Apr 22 '17 at 18:12




            Most complete answer I ve ever read, instead of just a link about cors..
            – pungggi
            Apr 22 '17 at 18:12












            @Quentin - Wow! +1! So what I'm to understand is if Alice uses the CORS extension, the server thinks that her http calls are not from javascript but from a browser extension and treats it like a normal same origin request?
            – snippetkid
            May 11 '17 at 11:51




            @Quentin - Wow! +1! So what I'm to understand is if Alice uses the CORS extension, the server thinks that her http calls are not from javascript but from a browser extension and treats it like a normal same origin request?
            – snippetkid
            May 11 '17 at 11:51












            @snippetkid — No. In the usual case, the server will send CORS headers in ever response and not care where the request came from. It is the responsibility of the browser to allow or deny access to the data to the JS based on the CORS headers on the response. (Things get a /little/ more complex on the server when it comes to preflight requests)
            – Quentin
            May 11 '17 at 11:54






            @snippetkid — No. In the usual case, the server will send CORS headers in ever response and not care where the request came from. It is the responsibility of the browser to allow or deny access to the data to the JS based on the CORS headers on the response. (Things get a /little/ more complex on the server when it comes to preflight requests)
            – Quentin
            May 11 '17 at 11:54















            2














            This is happening because of the CORS error. CORS stands for Cross Origin Resource Sharing. In simple words, this error occurs when we try to access a domain/resource from another domain.



            Read More about it here: CORS error with jquery



            To fix this, if you have access to the other domain, you will have to allow Access-Control-Allow-Origin in the server. This can be added in the headers. You can enable this for all the requests/domains or a specific domain.



            How to get a cross-origin resource sharing (CORS) post request working



            These links may help






            share|improve this answer




























              2














              This is happening because of the CORS error. CORS stands for Cross Origin Resource Sharing. In simple words, this error occurs when we try to access a domain/resource from another domain.



              Read More about it here: CORS error with jquery



              To fix this, if you have access to the other domain, you will have to allow Access-Control-Allow-Origin in the server. This can be added in the headers. You can enable this for all the requests/domains or a specific domain.



              How to get a cross-origin resource sharing (CORS) post request working



              These links may help






              share|improve this answer


























                2












                2








                2






                This is happening because of the CORS error. CORS stands for Cross Origin Resource Sharing. In simple words, this error occurs when we try to access a domain/resource from another domain.



                Read More about it here: CORS error with jquery



                To fix this, if you have access to the other domain, you will have to allow Access-Control-Allow-Origin in the server. This can be added in the headers. You can enable this for all the requests/domains or a specific domain.



                How to get a cross-origin resource sharing (CORS) post request working



                These links may help






                share|improve this answer














                This is happening because of the CORS error. CORS stands for Cross Origin Resource Sharing. In simple words, this error occurs when we try to access a domain/resource from another domain.



                Read More about it here: CORS error with jquery



                To fix this, if you have access to the other domain, you will have to allow Access-Control-Allow-Origin in the server. This can be added in the headers. You can enable this for all the requests/domains or a specific domain.



                How to get a cross-origin resource sharing (CORS) post request working



                These links may help







                share|improve this answer














                share|improve this answer



                share|improve this answer








                edited May 23 '17 at 12:18









                Community

                11




                11










                answered Feb 22 '16 at 12:32









                VishnuVishnu

                1,098714




                1,098714























                    2














                    Target server must allowed cross-origin request. In order to allow it through express, simply handle http options request :



                    app.options('/url...', function(req, res, next){
                    res.header('Access-Control-Allow-Origin', "*");
                    res.header('Access-Control-Allow-Methods', 'POST');
                    res.header("Access-Control-Allow-Headers", "accept, content-type");
                    res.header("Access-Control-Max-Age", "1728000");
                    return res.sendStatus(200);
                    });





                    share|improve this answer


























                      2














                      Target server must allowed cross-origin request. In order to allow it through express, simply handle http options request :



                      app.options('/url...', function(req, res, next){
                      res.header('Access-Control-Allow-Origin', "*");
                      res.header('Access-Control-Allow-Methods', 'POST');
                      res.header("Access-Control-Allow-Headers", "accept, content-type");
                      res.header("Access-Control-Max-Age", "1728000");
                      return res.sendStatus(200);
                      });





                      share|improve this answer
























                        2












                        2








                        2






                        Target server must allowed cross-origin request. In order to allow it through express, simply handle http options request :



                        app.options('/url...', function(req, res, next){
                        res.header('Access-Control-Allow-Origin', "*");
                        res.header('Access-Control-Allow-Methods', 'POST');
                        res.header("Access-Control-Allow-Headers", "accept, content-type");
                        res.header("Access-Control-Max-Age", "1728000");
                        return res.sendStatus(200);
                        });





                        share|improve this answer












                        Target server must allowed cross-origin request. In order to allow it through express, simply handle http options request :



                        app.options('/url...', function(req, res, next){
                        res.header('Access-Control-Allow-Origin', "*");
                        res.header('Access-Control-Allow-Methods', 'POST');
                        res.header("Access-Control-Allow-Headers", "accept, content-type");
                        res.header("Access-Control-Max-Age", "1728000");
                        return res.sendStatus(200);
                        });






                        share|improve this answer












                        share|improve this answer



                        share|improve this answer










                        answered Sep 9 '16 at 10:45









                        DaphoqueDaphoque

                        1,8521513




                        1,8521513























                            2














                            As this isn't mentioned in the accepted answer.




                            • This is not the case for this exact question, but might help others that search for that problem

                            • This is something you can do in your client-code to prevent CORS errors in some cases.


                            You can make use of Simple Requests.

                            In order to perform a 'Simple Requests' the request needs to meet several conditions. E.g. only allowing POST, GET and HEAD method, as well as only allowing some given Headers (you can find all conditions here).



                            If your client code does not explicit set affected Headers (e.g. "Accept") with a fix value in the request it might occur that some clients do set these Headers automatically with some "non-standard" values causing the server to not accept it as Simple Request - which will give you a CORS error.






                            share|improve this answer




























                              2














                              As this isn't mentioned in the accepted answer.




                              • This is not the case for this exact question, but might help others that search for that problem

                              • This is something you can do in your client-code to prevent CORS errors in some cases.


                              You can make use of Simple Requests.

                              In order to perform a 'Simple Requests' the request needs to meet several conditions. E.g. only allowing POST, GET and HEAD method, as well as only allowing some given Headers (you can find all conditions here).



                              If your client code does not explicit set affected Headers (e.g. "Accept") with a fix value in the request it might occur that some clients do set these Headers automatically with some "non-standard" values causing the server to not accept it as Simple Request - which will give you a CORS error.






                              share|improve this answer


























                                2












                                2








                                2






                                As this isn't mentioned in the accepted answer.




                                • This is not the case for this exact question, but might help others that search for that problem

                                • This is something you can do in your client-code to prevent CORS errors in some cases.


                                You can make use of Simple Requests.

                                In order to perform a 'Simple Requests' the request needs to meet several conditions. E.g. only allowing POST, GET and HEAD method, as well as only allowing some given Headers (you can find all conditions here).



                                If your client code does not explicit set affected Headers (e.g. "Accept") with a fix value in the request it might occur that some clients do set these Headers automatically with some "non-standard" values causing the server to not accept it as Simple Request - which will give you a CORS error.






                                share|improve this answer














                                As this isn't mentioned in the accepted answer.




                                • This is not the case for this exact question, but might help others that search for that problem

                                • This is something you can do in your client-code to prevent CORS errors in some cases.


                                You can make use of Simple Requests.

                                In order to perform a 'Simple Requests' the request needs to meet several conditions. E.g. only allowing POST, GET and HEAD method, as well as only allowing some given Headers (you can find all conditions here).



                                If your client code does not explicit set affected Headers (e.g. "Accept") with a fix value in the request it might occur that some clients do set these Headers automatically with some "non-standard" values causing the server to not accept it as Simple Request - which will give you a CORS error.







                                share|improve this answer














                                share|improve this answer



                                share|improve this answer








                                edited Dec 18 '18 at 8:03

























                                answered Nov 9 '17 at 11:37









                                zwifzwif

                                10510




                                10510























                                    0














                                    This CORS issue wasn't further elaborated (for other causes).



                                    I'm having this issue currently under different reason.
                                    My front end is returning 'Access-Control-Allow-Origin' header error as well.



                                    Just that I've pointed the wrong URL so this header wasn't reflected properly (in which i kept presume it did). localhost (front end) -> call to non secured http (supposed to be https), make sure the API end point from front end is pointing to the correct protocol.






                                    share|improve this answer


























                                      0














                                      This CORS issue wasn't further elaborated (for other causes).



                                      I'm having this issue currently under different reason.
                                      My front end is returning 'Access-Control-Allow-Origin' header error as well.



                                      Just that I've pointed the wrong URL so this header wasn't reflected properly (in which i kept presume it did). localhost (front end) -> call to non secured http (supposed to be https), make sure the API end point from front end is pointing to the correct protocol.






                                      share|improve this answer
























                                        0












                                        0








                                        0






                                        This CORS issue wasn't further elaborated (for other causes).



                                        I'm having this issue currently under different reason.
                                        My front end is returning 'Access-Control-Allow-Origin' header error as well.



                                        Just that I've pointed the wrong URL so this header wasn't reflected properly (in which i kept presume it did). localhost (front end) -> call to non secured http (supposed to be https), make sure the API end point from front end is pointing to the correct protocol.






                                        share|improve this answer












                                        This CORS issue wasn't further elaborated (for other causes).



                                        I'm having this issue currently under different reason.
                                        My front end is returning 'Access-Control-Allow-Origin' header error as well.



                                        Just that I've pointed the wrong URL so this header wasn't reflected properly (in which i kept presume it did). localhost (front end) -> call to non secured http (supposed to be https), make sure the API end point from front end is pointing to the correct protocol.







                                        share|improve this answer












                                        share|improve this answer



                                        share|improve this answer










                                        answered Dec 17 '18 at 6:40









                                        morph85morph85

                                        692818




                                        692818























                                            -3














                                            You should enable CORS to get it working.






                                            share|improve this answer


























                                              -3














                                              You should enable CORS to get it working.






                                              share|improve this answer
























                                                -3












                                                -3








                                                -3






                                                You should enable CORS to get it working.






                                                share|improve this answer












                                                You should enable CORS to get it working.







                                                share|improve this answer












                                                share|improve this answer



                                                share|improve this answer










                                                answered Apr 17 '17 at 11:13









                                                Perostek BalvedaPerostek Balveda

                                                1175




                                                1175






























                                                    draft saved

                                                    draft discarded




















































                                                    Thanks for contributing an answer to Stack Overflow!


                                                    • Please be sure to answer the question. Provide details and share your research!

                                                    But avoid



                                                    • Asking for help, clarification, or responding to other answers.

                                                    • Making statements based on opinion; back them up with references or personal experience.


                                                    To learn more, see our tips on writing great answers.




                                                    draft saved


                                                    draft discarded














                                                    StackExchange.ready(
                                                    function () {
                                                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f35553500%2fxmlhttprequest-cannot-load-xxx-no-access-control-allow-origin-header%23new-answer', 'question_page');
                                                    }
                                                    );

                                                    Post as a guest















                                                    Required, but never shown





















































                                                    Required, but never shown














                                                    Required, but never shown












                                                    Required, but never shown







                                                    Required, but never shown

































                                                    Required, but never shown














                                                    Required, but never shown












                                                    Required, but never shown







                                                    Required, but never shown







                                                    Popular posts from this blog

                                                    MongoDB - Not Authorized To Execute Command

                                                    Npm cannot find a required file even through it is in the searched directory

                                                    in spring boot 2.1 many test slices are not allowed anymore due to multiple @BootstrapWith