Akamai’s Internet software firewall (WAF) is meant to fend off potential assaults like distributed denial-of-service (DDoS), however a researcher found a solution to bypass its protections through the use of complicated payloads to confuse its guidelines.
The researcher, referred to as Peter H., together with Usman Mansha, mentioned Akamai has since patched in opposition to the vulnerability, which was not assigned a CVE quantity. Within the write-up, Peter H. defined how he used a susceptible model of Spring Boot to bypass WAF protections.
“We ended up capable of bypass Akamai WAF and obtain Distant Code Execution (P1) utilizing Spring Expression Language injection on an software working Spring Boot,” the GitHub rationalization of the Akamai WAF RCE discover defined. “This was the 2nd RCE by way of SSTI we discovered on this program, after the first one, this system carried out a WAF which we have been capable of bypass in a unique a part of the appliance.”