This tweet highlights a bypass of Web Application Firewalls (WAFs) from vendors like Cloudflare, Cloudfront, Akamai, and Incapsula. It suggests that these popular WAF solutions can be circumvented using certain special characters, specifically the backslash (\) and the semicolon (;). These characters may be used in various injection attacks such as SQL injection, Cross-Site Scripting (XSS), or other code injection vulnerabilities, allowing attackers to bypass WAF filters. The tweet uses informal language and metaphorical expressions to emphasize that trusting these WAF vendors entirely for security might be misguided. To summarize, even well-known WAFs have flaws and can be bypassed using relatively simple payloads involving backslash and semicolon characters. Always test and verify your WAF implementation and consider additional security measures.
For more details, check out the original tweet here: https://twitter.com/Shabosec/status/2037775501352108119
Subscribe for the latest news: