This tweet discusses findings related to web security vulnerabilities found during exploration without bypassing any Web Application Firewall (WAF) or using special payloads. The vulnerabilities include 3 instances of DOM-based Cross-Site Scripting (DOM XSS) with the payload `javascript:alert(origin)`, critical Cross-Site Request Forgery (CSRF) due to CSPT and parameter pollution, and HTML Injection that leaks URLs equipped with tokens. The tweet suggests carefully reading JavaScript files to better understand the security issues instead of rushing to find bugs. Although there is no mention of a specific WAF vendor or bypass method, the insights can help security researchers understand the importance of thorough analysis beyond WAF bypass techniques.
For more details, check out the original tweet here: https://twitter.com/YShahinzadeh/status/1959977987362681234
Subscribe for the latest news: