https://evil.com is allowed to read this response,
and yes, send the user's cookies with the request." Any attacker-controlled website can read authenticated responses.
null origin is exploitable via sandboxed iframes (<iframe sandbox="allow-scripts">),
data: URIs, and certain redirect chains — no external hosting required.
/arcgis-portal/sharing/rest/* (Portal) and /arcgis/rest/* (Server)
are affected — the entire GIS API surface reflects arbitrary origins with credentials.
callback parameter. An attacker can steal authenticated data
using a simple <script src="...?callback=steal"> tag — bypasses CORS entirely and works even with strict browser extensions.