A groundbreaking safety analysis has revealed that parameter air pollution strategies mixed with JavaScript injection can bypass 70% of contemporary Net Utility Firewalls (WAFs), elevating critical considerations in regards to the effectiveness of present internet safety defenses.
Safety researchers conducting autonomous penetration testing found a classy technique to bypass WAF protections by exploiting elementary variations in how internet functions and safety techniques parse HTTP parameters.
The vulnerability was initially recognized in an ASP.NET software protected by a extremely restrictive WAF configuration.
The assault method leverages HTTP Parameter Air pollution, a technique that exploits inconsistent dealing with of duplicate HTTP parameters throughout completely different internet applied sciences.
When a number of parameters with the identical identify are current in a request, varied frameworks course of them in a different way – some concatenate values, others take solely the primary or final incidence.
How the Assault Works
The researchers discovered that ASP.NET’s particular habits of concatenating duplicate parameters with commas creates a harmful alternative for JavaScript injection.
When processing a question string like /?q=1’&q=alert(1)&q=’2, ASP.NET combines these values into 1′,alert(1),’2, which turns into legitimate JavaScript code when inserted right into a string context.

This method transforms seemingly innocuous parameter mixtures into executable malicious code that bypasses conventional WAF detection strategies.
JavaScript’s comma operator permits a number of statements to be executed in sequence, making the ensuing code each syntactically legitimate and functionally harmful.

The analysis workforce examined 17 completely different WAF configurations from main cloud suppliers and safety distributors, together with AWS WAF, Google Cloud Armor, Azure WAF, Cloudflare, and others. The outcomes have been alarming:
- Easy injection payloads achieved a 17.6% bypass price
- Complicated parameter air pollution payloads bypassed 70.6% of examined configurations
- Solely 5 WAF configurations efficiently blocked all take a look at payloads: Google Cloud Armor, Azure WAF, and three open-appsec configurations
- Three AWS WAF rule units have been fully bypassed by each payload examined
The examine revealed that machine learning-based WAFs considerably outperformed signature-based techniques.
Conventional WAFs counting on sample matching struggled to detect assaults that exploit framework-specific parsing behaviors, whereas ML-powered options demonstrated superior defensive capabilities.
Nonetheless, even superior techniques confirmed vulnerabilities. The researchers’ autonomous “hackbot” found extra bypasses, together with a surprisingly easy payload that defeated Azure WAF: take a look at’;alert(1);//.
These findings spotlight a crucial hole in internet software safety methods.
Organizations investing in costly WAF applied sciences could stay weak to assaults exploiting fundamental implementation variations between safety techniques and internet functions.
The analysis emphasizes that WAFs shouldn’t be thought-about an entire resolution for insecure code and that complete safety methods should handle vulnerabilities at a number of layers.
Discover this Information Attention-grabbing! Comply with us on Google Information, LinkedIn, and X to Get Instantaneous Updates!