Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Researchers Bypassed Web Application Firewall With JS Injection with Parameter Pollution

Researchers Bypassed Web Application Firewall With JS Injection with Parameter Pollution

Posted on September 8, 2025September 8, 2025 By CWS

Cybersecurity researchers have demonstrated a classy approach for bypassing Net Software Firewalls (WAFs) utilizing JavaScript injection mixed with HTTP parameter air pollution, exposing essential vulnerabilities in fashionable internet safety infrastructure.

The analysis, carried out throughout an autonomous penetration take a look at, revealed how attackers can exploit parsing variations between WAF engines and internet software frameworks to execute malicious code regardless of strict safety configurations.

The vulnerability emerged throughout testing of an ASP.NET software protected by a extremely restrictive WAF.

Whereas the underlying Cross-Web site Scripting (XSS) vulnerability was easy, involving breaking out of a JavaScript string delimited by single quotes, standard XSS payloads have been successfully blocked by the safety system.

This state of affairs introduced researchers with a traditional problem: demonstrating exploitability when defensive mechanisms actively forestall conventional exploitation strategies.

The breakthrough got here by way of understanding ASP.NET’s distinctive parameter dealing with habits. When a number of HTTP parameters share the identical identify, ASP.NET concatenates their values utilizing commas by way of the HttpUtility.ParseQueryString() technique.

This documented Microsoft habits states that “a number of occurrences of the identical question string parameter are listed as a single entry with a comma separating every worth.”

Ethiack analysts recognized this parsing discrepancy as the important thing to bypassing WAF detection whereas sustaining legitimate JavaScript execution.

The assault leverages JavaScript’s comma operator, which permits a number of expressions to execute sequentially inside a single assertion.

By distributing malicious code throughout a number of parameters, researchers might assemble payloads that seem benign individually however mix to type executable JavaScript.

As an illustration, the question string /?q=1’&q=alert(1)&q=’2 turns into 1′,alert(1),’2 after ASP.NET processing, creating syntactically legitimate JavaScript that executes the alert perform when inserted into weak contexts.

Technical Evaluation and WAF Evasion Mechanisms

The analysis methodology concerned testing 17 totally different WAF configurations throughout main cloud suppliers and safety distributors, revealing vital disparities in detection capabilities.

Azure WAF (Supply – Ethiack)

The testing employed three distinct payload sorts, every demonstrating rising sophistication in evasion strategies.

Framework parameter air pollution habits:-

FrameworkInput ExampleOutput ResultASP.NETparam=val1&param=val2param=val1,val2ASPparam=val1&param=val2param=val1,val2Golang web/httpparam=val1&param=val2param=[‘val1′,’val2’]Python – Zopeparam=val1&param=val2param=[‘val1′,’val2’]Node.jsparam=val1&param=val2param=val1,val2

Probably the most revealing discovering emerged from payload complexity evaluation. Easy injection makes an attempt achieved solely a 17.6% bypass fee in opposition to examined WAFs, whereas refined parameter air pollution strategies reached 70.6% success charges.

The analysis recognized three main causes for WAF vulnerability: particular person parameter evaluation with out relationship understanding, lack of framework-specific parsing simulation, and reliance on conventional XSS signatures that miss functionally equal however structurally totally different payloads.

Google Cloud Armor (Supply – Ethiack)

Payload effectiveness evaluation:-

Payload TypeExampleSuccess RateSimple Injectionq=’;alert(1),’17.6percentPollution + Semicolonq=1’+1;let+asd=window&q=def=”al”+’ert’52.9percentPollution + Line Breaksq=1’%0aasd=window&q=def=”al”+”ert”70.6%

Autonomous testing techniques demonstrated outstanding adaptability, discovering beforehand unknown bypasses for supposedly safe configurations.

Notably, Azure WAF was defeated utilizing the payload take a look at’;alert(1);//, which exploits parsing discrepancies in escaped character dealing with between WAF sample matching and JavaScript interpretation.

The analysis underscores the essential want for WAFs to implement framework-specific parsing logic and context-aware evaluation capabilities, although such enhancements would considerably affect efficiency in manufacturing environments.

Enhance your SOC and assist your workforce defend what you are promoting with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Application, Bypassed, Firewall, Injection, Parameter, Pollution, Researchers, Web

Post navigation

Previous Post: PgAdmin Vulnerability Lets Attackers Gain Unauthorised Account Access
Next Post: Salesloft GitHub Account Compromised Months Before Salesforce Attack

Related Posts

New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control Cyber Security News
Canon Allegedly Breached by Clop Ransomware via Oracle E-Business Suite 0-Day Hack Canon Allegedly Breached by Clop Ransomware via Oracle E-Business Suite 0-Day Hack Cyber Security News
How Adversary-In-The-Middle (AiTM) Attack Bypasses MFA and EDR? How Adversary-In-The-Middle (AiTM) Attack Bypasses MFA and EDR? Cyber Security News
Jetflicks Illegal Paid Streaming Service Operators Jailed for 7 Years Jetflicks Illegal Paid Streaming Service Operators Jailed for 7 Years Cyber Security News
Hackers Accessed Email Account Contains Valid Credentials Hackers Accessed Email Account Contains Valid Credentials Cyber Security News
Microsoft Anti-Spam Bug Blocks Users From Opening URLs in Exchange Online and Teams Microsoft Anti-Spam Bug Blocks Users From Opening URLs in Exchange Online and Teams Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News