An XSS payload was discovered to bypass some WAF & filters in Firefox. The payload is <input accesskey=X onclick="self['wind'+'ow']['one'+'rror']=alert;throw 1337;">. This vulnerability allows an attacker to execute malicious scripts in a web application protected by the specified WAF and filters. Credits to @0x0SojalSec for the discovery. #bugbounty #bugbountytips
Original tweet: https://twitter.com/RootMoksha/status/1850771191268790741