The tweet mentions a WAF bypass challenge launched by Apollo for XSS. The user successfully bypassed the WAF using an SVG use href payload. However, the user did not receive any response or information from Apollo after sending the bypass. The program manager on Twitter later invited the user but also ignored them. This incident highlights the importance of timely communication and response in the context of security vulnerabilities and bypasses. It is essential for organizations to address and acknowledge such reports promptly to ensure the security of their systems.
For more insights, check out the original tweet here: https://twitter.com/RenwaX23/status/1836426568714895531. And don’t forget to follow @RenwaX23 for more exciting updates in the world of cybersecurity.
Subscribe for the latest news: