An XSS validation bypass was discovered when the application blocks parenthesis. The payload used for the bypass is ” ><img onerror=alert`23` src=a>. This bypass can potentially affect various WAF vendors. It is recommended to review and update the security measures in place to prevent such bypasses. #XSS #Security #WAF #bugbountytips #bugbountyconference
Check out the original tweet here: https://twitter.com/sapienshack/status/1765954029291765859