A bypass for XSS vulnerability has been discovered in Akamai WAF. The payload used for the bypass is <input id=b value=javascrip><input id=c value=t:aler><input id=d value=t(1)><lol contenteditable onbeforeinput='location=b.value+c.value+d.value'>click and write here! Security researchers have found a way to bypass Akamai WAF's protection against XSS attacks. This vulnerability allows an attacker to execute malicious scripts on a target website. Website owners using Akamai WAF should patch their systems immediately to prevent exploitation of this bypass.
For more insights, check out the original tweet here: https://twitter.com/HackingTeam777/status/1901888414145732637. And don’t forget to follow @HackingTeam777 for more exciting updates in the world of cybersecurity.
Subscribe for the latest news: