Hacker News new | past | comments | ask | show | jobs | submit login

Initially JavaScript was being escaped with their WAF.

The second POC demonstrated the ability to evade both their WAF and XSS_Auditor.

Their development team then verified the ability to execute arbitrary JavaScript from any *.cloudfront.net host.

That's pretty much the whole story.




Could you make an alert(1) or not?

If you couldn't, it's plausible the non-security developers incorrectly speculated it was possible?


Now I'm starting to wonder the same thing, *.cloudfront.net is not Uber.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: