Radware Cloud Web Application Firewall is vulnerable to filter bypass when HTTP GET method with random data in the request body and special characters are added to the request. This vulnerability allows attackers to potentially bypass the WAF protection. For more details, refer to VU#722229.
For more insights, check out the original tweet here: https://twitter.com/ntsuji/status/1920457625163952586
Subscribe for the latest news: