Invicti Enterprise On-Demand
This update includes changes to the internal agents. The internal scan agent’s current version is 25.9.1. The internal authentication verifier agent’s current version is 25.9.1.
New feature
- Introduced Global Client Certificates: Admins can now add client certificates to the Global Certificate section and apply them directly to Scan Profiles
Improvements
- Added “Export to CSV” functionality to several pages, including Scan Policies, Report Policies, Scan Profiles, Scheduled Scans, and Website Groups
- Updated GitHub Actions to their latest stable versions to take advantage of new features and performance improvements
Resolved issues
- Resolved an issue where clicking “Toggle Content” did not display the list of Imported Links on scan profiles
- Resolved an issue with parsing JIRA Custom Complex Fields in JSON
- Addressed SSL errors in certificate-based environments by adding support for the IgnoreSslCertificateErrors parameter
- Corrected an issue where NTLM "Test Credentials" incorrectly passed using default credentials; invalid credentials now fail as expected
- Resolved issues with previously problematic Report Policies
This update includes changes to the internal agents. The internal scan agent’s current version is 25.9.0. The internal authentication verifier agent’s current version is 25.9.0.
New feature
- Added a new setting, Page Top Warning Banner, under Settings > General > Warning Text Settings. This feature allows administrators to display a persistent, plain-text banner at the top of every page for compliance and informational purposes
Improvements
- Improved Pega version detection
- Improved page performance
- Updated the GitHub Actions plugin to address multiple security vulnerabilities by sanitizing user inputs, validating URLs, and remediating outdated dependencies to ensure compliance with secure coding standards
- Encrypted OAuth2 section in Scan Profile to maintain information security
- Updated GetTags endpoint for Asana integration
Resolved issues
- Resolved the inconsistency between the UI and reports in displaying known issue severity
- Resolved pagination issue on the Agent Group Index page
- Mend-related profiles have been hidden from the UI
- Updated the signature for Mend vulnerabilities to improve management of Mend-related issues. As a result, previously reported vulnerabilities will appear as resolved and then re-detected
- Fixed a UI filter bug where created websites could be incorrectly ignored on the Discovered Websites page
- Fixed authentication and simulation stucks due to script syntax
- Resolved zombie "Pick an app"(OpenWith.exe) processes that runs out resources on Windows servers
This update includes changes to the internal agents. The internal scan agent’s current version is 25.8.1. The internal authentication verifier agent’s current version is 25.8.1.
Improvements
- The character limit for the New Target/Target Group > Description field has been increased from 255 to 1000 characters. This change has also been implemented on the API side
- The character limit for the Scan Profile > Comments field has been increased from 500 to 1000 characters. This change has also been implemented on the API side
- Starting September 1, 2025, HTTP Request/Response data for vulnerabilities older than 180 days will be removed (except for the most recent occurrence). Read more
Resolved issues
- Other users are prevented from editing the Primary User's account
- Fixed filtering Mend SAST results for Critical and High priority vulnerabilities
- Added file size control message for imported link or API definitions files
- Fixed Tag IDs field in Asana integration
This update includes changes to the internal agents. The internal scan agent’s current version is 25.8.0. The internal authentication verifier agent’s current version is 25.8.0.
New security checks
- Added detection of Pega Infinity as a technology in the Vulnerability Database (VDB)
Improvements
- Defined the Hawk check delay in the scanning policy
- Added configurable User and Group ObjectClass settings to LDAP integration, enabling custom values (e.g., userProxy for AD LDS), updating synchronization logic, ensuring compatibility with diverse LDAP servers, maintaining backward compatibility
- Added a Maximum Cookie Count setting to manage cookie numbers when necessary
- Updated Bootstrap component
- Updated Highlight component
- Added Affected Versions field for on-prem JIRA to custom fields
Resolved issues
- Added missing Technology icons
- Fixed logging in Post-Request scripts
- Implemented fix to ensure Post-Request script is triggered for all requests in the browser context
- Fixed SCIM activity logs duplicate issue
- Fixed an issue where importing link via API to Scan Profile did not generate URL Rewrite Rule
This update includes changes to the internal agents. The internal scan agent’s current version is 25.7.1. The internal authentication verifier agent’s current version is 25.7.1.
Improvements
- Improved visibility and transparency of customer impersonation scenarios initiated by the Support Team
- Extended the Notifications (New & Update) REST API endpoints to include report configuration options, allowing finer control over alerting workflows
- Improved stability by identifying and notifying users about misconfigured Jira webhooks causing excessive and unrelated requests to the scanner
- Added tag-based filtering support to the Scheduled Scans page. Users can now filter scheduled scans by tags
- Adding Imported Links via API now generates URL Rewrite Rules automatically
Resolved issues
- Fixed false-positive reporting for Web Cache Deception vulnerability
- Implemented immutable logs for deleted users to ensure audit integrity and traceability even after user removal
- Fixed an issue where scripts defined on the Custom Script page could not be executed for testing purposes
- Resolved an issue where SSL certificate chain errors blocked UI or auto-update of Internal Verifier Agents on Linux
This update includes changes to the internal agents. The internal scan agent’s current version is 25.7.0. The internal authentication verifier agent’s current version is 25.7.0.
Security checks
- Added a new CVE check for CVE-2019-19326
- Added a new XSS attack for CVE-2024-11831
Improvements
- Improved prototype-pollution detection to reduce noise
- Improved XSS detection to reduce noise
- Increased the timeout duration for IAST responses to prevent premature failures
- Updated dependencies with known vulnerabilities
- Implemented an enhancement to capture the token information present in the response during the OAuth2 Implicit Flow
- Implemented an enhancement to enable more effective cookie management when HTTP/2 is enabled
- Updated plugin dependencies to address known security vulnerabilities and improve overall stability; upgraded Jenkins compatibility to version 2.474
- When user roles changes details are now available on Activity Logs
- Jenkins Plugin: Corrected misleading UI validation for the "Report Type" parameter within the "Netsparker Enterprise Scan" build step. The field no longer incorrectly appears as required, clarifying its optional nature
- LDAP Integration: Permanently enabled LDAP integration for on-premise WebApp installations by removing its associated feature flag. LDAP functionality is now available by default
- Shark (IAST) versions upgraded
- Agent and Verifier download names now come in a specific format
- Added new columns while exporting with All Attributes CSV
API changes
- Addresses discrepancies in global vulnerability counts between scan tasks and website issues
Resolved issues
- Corrected the MOVEit SQLi check to avoid reporting an incorrect version
- Enhanced support for using multiple secrets simultaneously within a single custom header
- Resolved an issue where duplicate X-Content-Type-Options headers triggered false missing header reports
- Addressed an issue encountered during report policy migration
- File Uploads: Added support for additional ZIP MIME types to resolve upload issues from some operating systems
- Fixed broken link issue
- Fixed integration duplication issue on Notification UI
- Fixed an issue where starting a new scan after a failed PCI scan could cause the PCI scan status to remain stuck in the "Stopping" state
This update includes changes to the internal agents. The internal scan agent’s current version is 25.6.0. The internal authentication verifier agent’s current version is 25.6.0.
Improvements
- Improved Stack Trace Disclosure (Java) detection pattern
- Added support for configuring the temp file via appsettings.json or an environment variable (Read more)
- Updated plugin dependencies to address known security vulnerabilities and improve overall stability; upgraded Jenkins compatibility to version 2.462
- Updated the Jenkins plugin script generation to use the latest GitHub Actions versions and ubuntu-latest runner for improved compatibility and security
- Updated Microsoft.OpenApi to version 2.0 preview to support OpenAPI 3.1.0 for improved API scanning
- Added API GET method to retrieve scheduled scans by ID
Resolved issues
- Added an event notification name to the logs for email notifications
- Resolved an issue where multiple versions of Next.js were not properly displayed in the Technologies dashboard and Scan Reports
This update includes changes to the internal agents. The internal scan agent’s current version is 25.5.0. The internal authentication verifier agent’s current version is 25.5.0.
New features
- Implemented webapp for secure storage and retrieval of passwords for Pre-Request scripts
- Added an integration for NTA with NGINX (Read more)
Improvements
- Implemented default limit setting to 1000 without flag for all fields except Second Level Domains
- Implemented custom field Parent option in integration with Azure Boards
- Implemented agent for secure storage and retrieval of passwords for Pre-Request scripts
Resolved issues
- Fixed an issue with Bad Request Response on Scan Summary
- Fixed naming issues of WordPress plugin Contact Form 7
- Implemented possibility to keep the report history of PCI scans with exceptions defined
- Fixed the issue of LoginRequiredUrl and Pre-Request script requests causing bottlenecks in HTTP requests
- Fixed an issue that unnecessarily included the code parameter in OAuth2 authorization requests
- The scanning engine now correctly processes merged request headers received from browser
This update includes changes to the internal agents. The internal scan agent’s current version is 25.5.1. The internal authentication verifier agent’s current version is 25.5.1.
New features
- Added Post-Request script feature (Read more)
- Integrated AI Assist Bot intoInvicti Enterprise On-Demand
Security checks
- Added a new XSS Security check
Improvements
- Updated workflows to improve reliability and security while maintaining alignment with GitHub’s best practices
- Addressed multiple versions of GitHub Actions available in the marketplace
- Added new REST API endpoint (agents/listverifiers) to retrieve AV agents data
- Restricted the Vulnerability Note field to 1000 characters
Resolved issues
- Resolved an issue causing scans to get stuck during archiving
- Resolved discrepancy between API (listByWebsite) and UI (Recent Scans) results
- Fixed an issue with verifying the existence of links in the link pool
- Improved incremental scanning
- Implemented logic to create the UserDocumentsDirectoryPath when it doesn't already exist
- Added support for defining headers and HTTP method during CSV import
This update includes changes to the internal agents. The internal scan agent’s current version is 25.4.1. The internal authentication verifier agent’s current version is 25.4.1.
Resolved issues
- Resolved an issue on the Technologies Dashboard
- The 'Tags' filter in All Issues now works correctly when using the 'Not Contains' condition
- Resolved issue where no results appeared when filtering the target list on the Target Group page. This was linked to the 'View Target List' permission
- Resolved communication issues in the TestBasicAuthCredentials process and improved HTTP connection handling
- Resolved an issue where not all attributes were exported correctly from the Issues page
This update includes changes to the internal agents. The internal scan agent’s current version is 25.4.0. The internal authentication verifier agent’s current version is 25.4.0.
New feature
- Added an option to prevent reopening Issue Tracker issues when a vulnerability is marked as False Positive and later revived (Read more).
Improvements
- Requests with empty or default values are not sent to DeepInfo
- Introduced a new setting under the Account General settings, within the Data Privacy and Security section, to modify the X-AMZ-Expires parameter while downloading the scan data
- Enhanced the "Configure New Agent" page to include additional details for auth verifier agents (Read more)
- Updated remediation details for outdated AngularJS versions
- [BREAKING CHANGE]: Updated the Docker agent's compression method and file extension; ensure any automation or scripts referencing the old format are updated accordingly.
Resolved issues
- Fixed an issue where the Issue note field could not be updated
- Fixed inefficient algorithmic complexity in DotNet IAST Sensor
- Resolved the issue where an invalid character response occurred when attempting to add a user
- Resolved the "Invalid Target URI" error that occurred when editing the Target URI to end with multiple slashes (///) on the new scan page
- Resolved the issue where the scan profile was not updating with the support account
- Fixed restrictions for JIRA integration
- Fixed an issue where pressing "Enter" instead of clicking the "Check" button during password verification triggered a full scan instead of the intended login verification
- Updated Chromium and Node.js versions, resolving Chromium-related issues, including the unexpected increase in Chromium count.
- Exclude URL rules now function correctly even when the excluded URL is the target
- Fixed an issue with retrieving OAuth2 token data from JSON responses
This update includes changes to the internal agents. The internal scan agent’s current version is 25.3.1. The internal authentication verifier agent’s current version is 25.3.1.
New feature
- Added the ability to reset the issue state to its default
Resolved issues
- Fixed an exception caused by an invalid Target URI in scheduled scans
- Fixed an issue where proxy credentials were not encrypted when launching InvictiProxy
- Fixed inconsistent styling in the report policy, ensuring uniform formatting in the vulnerability profile sections
This update includes changes to the internal agents. The internal scan agent’s current version is 25.3.0. The internal authentication verifier agent’s current version is 25.3.0.
Improvements
- Enhanced technology version identification from URI
- Improved reporting of multiple technology detections on the same file
- Scheduled group scans will be initiated in chunks when exceeding 500 websites
- Updated footer URL in Invicti Enterprise reports
- The SelfDisable command is no longer sent to the Agent when its state is updated to Disabled
- Upgraded 3rd party script libraries
- Added support for encrypting proxy credentials settings in the agent appsettings.json file
- Updated the Splunk Python SDK for the Splunk Plugin to ensure compliance with the latest Splunk Vetting Policy
Resolved issues
- Fixed issue with error occurring when sending vulnerabilities to APIHub if externalId is Null
- Fixed permission issue with unlinking API in APIHub
- Fixed the issue to enable compatibility with the latest version of GitHub Actions
- Scheduled scans now remove the URL path after ‘#’ when using the default Scan Profile
- Fixed sorting issues in the dashboard to use numerical order instead of alphabetical
- Updated OpenSSL from version 3.3.1 to 3.3.2
API changes
- The Validate Imported Links API endpoint no longer requires a Target URL when a file is uploaded
This update includes changes to the internal agents. The internal scan agent’s current version is 25.2.1. The internal authentication verifier agent’s current version is 25.2.1
Improvements
- Added a loading state for the Export CSV button to prevent multiple clicks
- Improved value filling in GraphQL queries
- Added the ability to re-scan cloned PCI scans on previously scanned targets to apply exceptions
Resolved issues
- Fixed an issue where 'LaunchInstance' errors caused GUIDs to be stored instead of AWS-generated instance IDs in the database
- Fixed an issue that caused the Mend vulnerabilities to be reported with incorrect severity
- Replaced a formatted string in a SQL statement with a prepared statement using SqlCommand and SqlParameter to prevent potential SQL injection
- Fixed the issue which was causing exports from Invicti Standard to Invicti Enterprise to fail
- The issue preventing the use of the Chromium Extension in Scanner and Verifier Agent has been resolved
This update includes changes to the internal agents. The internal scan agent’s current version is 25.2.0. The internal authentication verifier agent’s current version is 25.2.0
New features
- Added single-tab crawling for websites that do not allow multiple-tab browsing
- Upgraded the Shortcut integration API endpoint to v3
Improvements
- Added Customizations folder to the Agent Output folder
- Improved the performance of searching by profileName on the Scan-Index page
Resolved issues
- Updated APIHub npm package to the latest version
- Resolved scan authentication issues for multiple pages
- Resolved issues related to screenshots and login processes
- Fixed Dashboard Widget Active Issue is empty when selecting a specific target
- Fixed the problem of reverting vulnerability in issue update endpoint to default
- Fixed removes preferred agent group in update-scheduled API endpoint
- Fixed an auto-update issue for Verifier Agent
- Added control for URLs that should not be included in the scope
- Upgraded the Shortcut (Clubhouse) integration
- Resolved an issue caused by the Chromium version update by updating Chromium dependencies for the Linux operating system. Refer to the updated scripts to install the required dependencies for Headless Chrome. (Read more)
This update includes changes to the internal agents. The internal scan agent’s current version is 25.10.0.The internal authentication verifier agent’s current version is 25.10.0.
New features
- Added WebLogic support for JAVA Shark sensor
- The Secrets screen now supports selecting and referencing secrets from SEM integrations in addition to manually entered name–value pairs. This allows for more secure and centralized secret management
Improvements
- Replaced old POST deletion methods with standard DELETE endpoints for a more consistent API. The POST endpoints are now deprecated - please update your integrations.
Resolved issues
- Corrected a typo in the Ivanti RCE CVE-2024-21887 report template
- Improved detection of CSP directives
- Resolved containerized Agents being stuck during auto-updates
- Fixed “Unable to Load Scan Session” and “Unable to Find Scan Files” errors
- Corrected discrepancies in Roles permission counts
- Enabled Agent auto-updater to use encrypted proxy credentials from
appsettings.json
- Added RegEx validation to prevent invalid patterns causing scan failures
- Fixed Intel instance assignment issue for On-Prem Cloud Provider
This update includes changes to the internal agents. The internal scan agent’s current version is 25.1.1. The internal authentication verifier agent’s current version is 25.1.1
Improvements
- API specifications from sub-organizations in Mulesoft are now synchronized into API Inventory
Resolved issues
- Improved performance of the All Issues page
This update includes changes to the internal agents. The internal scan agent’s current version is 25.1.1. The internal authentication verifier agent’s current version is 25.1.1
New features
- Improved support for handling gRPC multiple proto imports in the Agent and in the engine
New security checks
- Added detection of cookieconsent2 as a technology in the Vulnerability Database (VDB)
Improvements
- Added pull commands for Docker and OpenShift to the New Agent page
- Added the SourceType field to the New Issues API endpoint
- Enhanced agent mode to better distinguish between verifier and scanner agents
- Added the ability to replace placeholders in the browser for Authorization Headers
- Improved report template of JWT Signature is not verified vulnerability
Resolved issues
- Resolved an issue where file upload events using LSR/BLR in React forms failed to propagate to body-level listeners
This update includes changes to the internal agents. The internal scan agent’s current version is 25.1.0. The internal authentication verifier agent’s current version is 25.1.0.
New features
- Clicking on the scheduled scan icon in the scan summary screen now redirects you to the Recent Scans page with a filtered view, improving navigation and access to relevant scan details
- Implemented an integration that automatically retrieves the latest Container security results from Mend when a DAST scan is initiated
Improvements
- Fixed an issue on the 2FA page where the code text field was not automatically focused upon page load
- Introduces a configurable retention period for HTTP log files, allowing Root users to specify the number of days before log
- Implemented a restriction to prevent the modification of the Vulnerability Signature Type
- Enhanced the UI to highlight the menu when API Hub specifications are linked to a scan profile, making it easier for users to identify associated profiles
- Updated Chromium from version 121 to version 131 for enhanced performance and compatibility
- Enhanced detection accuracy for Weak Ciphers Enabled by analyzing false positives
- Administrators can now assign Agent Groups to Teams for greater control over agents and the teams that can use them. Learn more.
Resolved issues
- Corrected OTP configuration attachment to personas, ensuring separate secrets and preventing shared changes
- Resolved issue where the internal agent service stopped after being disabled in the UI. The service now remains active even when the agent is disabled from the web application.
- Updated the SharedAssemblyInfo file to reflect the correct copyright details
- Fixed an issue where a disabled scan was inadvertently running, leading to an outage
- Fixed a bug where users were unable to update the website name longer than 40 characters
- Fixed an issue where the Invicti REST API did not return errors when importing an invalid definition file
- Resolved the “Internal Server Error” encountered on the Invicti scans/report API endpoint after enabling the “Prevent any sensitive information showing within the product” setting
- Fixed an issue where the Issue state was inadvertently removed when a user, without permission to update the state, added a note to the issue
- Fixed an issue where the "Notification Settings" hyperlink in notification emails was redirecting incorrectly
- Resolved the issue where the Agent Verifier was encountering errors when using certificates in a Linux environment
- Fixed an issue where duplicate tickets were being created in ServiceNow due to integration error
- Fixed an issue where the severity trend chart was not rendering correctly on the individual website dashboard
- Node.js v6 has reached its End of Life (EOL), and support for this version has been removed from Azure Pipelines
- Resolved a coverage issue where the login page reappeared during scans
This update includes changes to the internal agents. The internal scan agent’s current version is 24.9.1. The internal authentication verifier agent’s current version is 24.9.1.
New Feature
- Administrators can now assign Agent Groups to Teams for greater control over agents and the teams that can use them. Contact our Support team to activate this feature.
New Security Checks
- Added XWiki version disclosure vulnerability and attack patterns.
Improvements
- Added improvements to the Mend SAST integration.
- Target to Project mapping is now available via API for the Mend SAST integration.
Fixes
- Fixed the issue where tagging in the Discovery service would create a single-character tag when converted to a target.
- Fixed an issue where the encryption process remained pending and incomplete after starting encryption key generation.
- Fixed a bug in the API where '/api/1.0/issues/allissues' always returned NULL in the History field.
- The option to suspend all future scans is now available to all customers in Scans Control Settings.
- Fixed the false negative issue related to Polyfill.io.
- Fixed an issue related to creating a custom script for a web application using the OIDC method with a login pop-up.
- Fixed the issue where the scan summary page did not time out according to the settings.
This update includes changes to the internal agents. The internal scan agent’s current version is 24.9.0. The internal authentication verifier agent’s current version is 24.9.0.
New Security Checks
- Adjusted the severity of SSLv3 and TLS 1.0 vulnerabilities to reflect their security risks
- Added support for CSP frame-ancestors
- Added detection for CVE-2024-6297, affecting several WordPress plugins
Improvements
- Pre-request script now works in DOM as well
- The Azure Extension now retries connections, preventing pipeline failures
Fixes
- Remediated a high vulnerability issue on the Agent Dotnet dependency package
- Fixed an issue that was preventing the selection of configuration items during ServiceNow integration setup
- Fixed an issue with updating targets using the target group ID
- Fixed an issue where the Auth Verifier heartbeat was showing an hour behind due to daylight-saving time adjustments
- Fixed an error that was occurring when editing Report Policies
- Fixed an issue with a REST API endpoint returning alternating severity data for TLS 1.0 vulnerabilities
- Resolved an issue with a pre-request script that was affecting crawling functionality
New Feature
- Integration with Mend SAST: display Mend SAST results alongside DAST results in Invicti Enterprise so you can prioritize all your application security testing fixes in one list → Learn more
This update includes changes to the internal agents. The internal scan agent's current version is 24.8.1. The internal authentication verifier agent's current version is 24.8.1.
New Security Checks
- Added detection for Jenkins Secret as a Sensitive Data Exposure
Fixes
- Fixed the issue where the ServiceNow Integration fields were not loading while editing the integration
- Fixed the issue where clicking the clone button in the Jira integration incorrectly redirected to the create new integration page
- Fixed Chromium-related issues in the agent
- Corrected the description of the "api/1.0/scans/test-scan-profile-credentials" endpoint
- Fixed the error when selecting a custom time period in the Dashboard Date Range
- Fixed the issue where temp folders could not be deleted and Chromium instances remained open when Puppeteer encountered an error
- Fixed the display issue on the Scan Summary page
- Fixed the false positive on detection of "Stack Trace Disclosure (Java)"
- Fixed a scan authentication issue and reduced latency
- Fixed the issue that was preventing the download of detailed PCI reports
- Fixed an issue related to the Moment.js regex
- Updated the OpenSSL configuration on the Cloud AMI
- Fixed the disk space issue in the Invicti Common folder
- Fixed the automatic syncing of issues with Jira integrations
- Fixed the issue where scans were failing due to a TLS connection not being established
- Fixed the OIDC authentication issue
- Fixed the issue where the REST API endpoint returned HTTP 400 instead of HTTP 200 when sending custom values
- Fixed the issue preventing proper login to the target URL
This update includes changes to the internal agents. The internal scan agent's current version is 24.8.0. The internal authentication verifier agent's current version is 24.8.0.
New Security Checks
- Added a check for Authentication bypass in Fortra's GoAnywhere MFT (CVE-2024-0204)
- Added a check for Open SSH server RCE (CVE-2024-6387)
- Added a check for cached pages that contain sensitive data (CWE-525)
- Incorporated the reporting of sensitive information disclosures from Okta
Improvements
- Added more links from the global dashboard widgets to the corresponding sections in the UI
- Scheduled scans that repeatedly fail with the same result can now be automatically disabled
- Unlinked API specs from the scan profile automatically unlink on the API Inventory page as well
- Added the ability to navigate from the API operation vulnerability count in the API Inventory to a filtered list of vulnerabilities on the Issues page
- Reverted the fix for a problem in the JWT Engine that was intended to resolve a false positive issue
Fixes
- Fixed an issue that was causing intermittent errors in PCI reports
- Fixed the ‘Bad Request’ error that was occurring in the vulnerability details of scan reports
- Fixed an issue where the character 'ñ' was causing errors when updating or adding new users
- Fixed the issue that was preventing deletion of unused scan policies
- Fixed the issue where additional website vulnerabilities were being stored as target vulnerabilities
- Fixed the missing tooltips for source errors on the API Sources page
- Fixed the issue where the linked target URL was clickable even when the API specification was hidden
This update includes changes to the internal agents. The internal scan agent’s current version is 24.7.2. The internal authentication verifier agent’s current version is 24.7.2.
Improvements
- Added custom header support for SSRF registration
- Added a toggle to the Recent Scans widget on the Targets Dashboard to switch between displaying the target name and target URL
- Added the option to select the Agent mode when importing targets
- Added an option to filter by Agent Name on the Recent Scans screen
Fixes
- Fixed an issue related to Agent Selection and Preferred Agent Group settings
- Fixed an error occurring with valid requests to schedule a scan via the profile endpoint
- Fixed an issue where scan reports attached to emails could not be opened
- Fixed an issue where changing vulnerability details in the Report Policy deleted some information from the vulnerability
- Fixed an issue where scan summary reports were not accessible in the UI
- Fixed an issue where users were unable to remove URLs from Website Groups
- Fixed an issue where users were unable to create both HTTP and HTTPS for the same endpoint
- Fixed an issue where clients with limited access and custom roles were seeing all notifications for all users and websites in a target website’s dashboard
- Fixed an issue related to BLR links
- Fixed an issue where the scan was not displaying all the URLs in the sitemap
- Fixed an SSL Untrusted Root Certificate issue for scans conducted with the OpenShift agent
This update includes changes to the internal agents. The internal scan agent’s current version is 24.7.1. The internal authentication verifier agent’s current version is 24.7.1.
New Features
- Invicti API Security: multi-layered API discovery to enable comprehensive identification of known and undocumented APIs → Learn more
Improvements
- Renamed the 'Websites and APIs' menu to 'Targets'
This update includes changes to the internal agents. The internal scan agent’s current version is 24.7.0. The internal authentication verifier agent’s current version is 24.7.0.
New Features
- Added custom headers for communication between Agents and Invicti Hawk
- Added a warning message when creating scan targets for websites that do not have a hostname mapped to an IP address
New Security Checks
- Added detection for supply chain attacks through Polyfill JS
- Added detection for GeoServer SQLi (CVE-2023-25157)
- Added checks for various WordPress plugins
Improvements
- Improved Credit Card Disclosure Security Check
- Set the severity of 'Possible XSS' vulnerabilities to 'Informational'
- Improved various Sensitive Data Exposure security checks
- Improved detection of the Short SSL Key Length vulnerability
- Added capability to check for Sensitive Data in XML responses
Fixes
- Fixed missing Request Body content in vulnerability details
- Fixed an issue with the selection of agent groups
- Fixed an issue with the order in which internal agent scans are initiated
- Fixed an issue with the 'Ignore Certificate Errors' Agent setting for SSL Validation
- Fixed a download problem with PCI reports
- Fixed an issue with the SSO login that was causing incorrect redirects
- Removed references to 3.2 in the PCI DSS Compliance scan summary
- Fixed an issue with the Azure Boards integration reopening old vulnerabilities that do not link to active issues in Invicti Enterprise
- Fixed a timeout issue that was occurring on a prerequest script
- Fixed a problem in the JWT Engine to resolve a false positive issue
- Updated vulnerable OpenSSL libraries to secure versions
- Fixed a bug in the Checkout Logout Detection so that it now chooses the same verification agent as the verification process
- Fixed an issue related to the OTA app scan
- Fixed HTTP 413 responses resulting from nonce cookies stacking
This update includes changes to the internal agents. The internal scan agent’s current version is 24.6.0. The internal authentication verifier agent’s current version is 24.6.0.
New Features
- Added functionality for scanning gRPC API Web Services → Learn more
New Security Checks
- Added a new attack pattern for missing Open Redirection
Improvements
- Updated to the latest Chromium version to improve security and performance → Learn more
- Added an option to trigger only specified lists of events
- Added a 100MB limit to the maximum total file size for imported link files
- Added an option to the GitHub Actions CI/CD integration to fail a build if a vulnerability with a specific severity is found during the scan
- Added a Y-axis to the Severity Trend graph in the dashboard
- Updated all the IAST Sensors:
- .NET Framework and .NET Core 6.2.0
- Java 16.0.0
- Node.js 2.1.3
- PHP 8.0.1
- Adjusted the behavior of the website matching option in the Discovery Settings to remove 2nd level domain matching in order to improve the relevance of discovery results
- Added a new option to the Discovery Match Settings (enabled by default) to only show discovery results that have an IP address. This change is intended to prevent the consumption of licenses on targets that cannot be scanned due to the lack of an actual IP address.
- Updated the summary information of the PCI compliance report
Fixes
- Fixed a bug in the Service Now Integration
- Fixed the issue that was causing activity logs to display incorrect owners of failed scans
- Fixed an issue with user-agent selection in scan policies that was causing disabled security check vulnerabilities to appear in the dashboards and scan reports
- Fixed an issue that was causing the agent to not send a heartbeat and become unavailable while archiving and uploading scan results
- Fixed the issue that was preventing updates made in Azure Boards from reflecting in Invicti Enterprise
- Fixed vulnerabilities with the Invicti Scan Agent Docker image
- Fixed the disk space utilization issue that was causing the InvictiCommon folder size to increase significantly during scans
- Resolved an issue with the Business Logic Recorder
- Improved the crawling capability to allow for automatic crawling of XHR requests
- Fixed the missing technology details on the scan summary and scan report pages
- Fixed an AWS4Signer authentication issue
This update includes changes to the internal agents. The internal scan agent’s current version is 24.5.1. The internal authentication verifier agent’s current version is 24.5.1.
New Security Checks
- Added detection of Fortinet vulnerabilities (CVE-2020-12812, CVE-2019-5591, CVE-2018-13379)
Improvements
- Added a "Stop The Scan When Build is Aborted" option to the Jenkins integration
Fixes
- Fixed a bug in the user timeout session setting
- Resolved an issue with the frequency of out-of-date technology email notifications
- Removed email notifications for out-of-date technologies in failed scans
- Fixed an issue that was causing scans to be stuck in an async archiving state
- Fixed a bug in the automatic sign out functionality when the session timeout period has expired
- Fixed an issue in the detection of the 'Improper XML parsing leads to Billion Laughs Attack' vulnerability
This update includes changes to the internal agents. The internal scan agent’s current version is 24.5.0. The internal authentication verifier agent’s current version is 24.5.0.
New Security Checks
- Added detection method for Angular
- Added a new security check for Oracle EBS RCE
Improvements
- Updated all IAST sensors to support Java 17 and 21
Fixes
- Fixed an issue with the detection method for wp-admin vulnerabilities
- Fixed the issue where scan profiles could not be created through automation tools, Postman, or through the Invicti API Documentation page
- Fixed the issue with scans that were stuck in 'Delayed' or 'Archiving' status
- Fixed an issue that was occurring with the Jira Integration when the Jira URL was set as Localhost
- Fixed a scan authentication issue and a crawling issue with Cloud Agents
- Fixed an issue that was occurring when websites were added with both http and https protocols
- The scan report pdf file name now includes the time and date when it is delivered via the scan completed notification
- Fixed the 504 error that was appearing when running the Scans_NewWithProfile endpoint
- Fixed a bug that was preventing retest scans from launching
- Fixed an issue with the scan data import from Invicti Enterprise to Invicti Standard
- Fixed the HTTP 401 forbidden response form authentication error
- Fixed a scan issue that was producing 413 error responses
This update includes changes to the internal agents. The internal scan agent’s current version is 24.4.0. The internal authentication verifier agent’s current version is 24.4.0.
Improvements
- Improved AWS Secret Key ID detection security checks
- Improved Google Cloud API Key detection security checks
- Updated remediation information for Angular JS related vulnerabilities
- Improved Boolean-Based MongoDB Injection detection method
Fixes
- Fixed a validation error when validating Shark settings
- Fixed a bug in the API Access settings
- Resolved an issue with custom severity levels that were reverting to their previous level
- Fixed a bug in the API update command for scan profiles
- Removed limits on AWS Discovery port filters
- Technologies identified during failed scans are no longer displayed
- Fixed a bug in the scan retention period settings that was causing inaccurate information in the Recent Scans list
- The Last Login Date is now aligned between the UI and the API
- Fixed an issue that caused proxy usage for Chromium even when no proxy was selected from the scan policy settings
This update includes changes to the internal agents. The internal scan agent’s current version is 24.3.1. The internal authentication verifier agent’s current version is 24.3.1.
New features
- Provided a new encryption method of API Token for Agent/Verifier Agent
- The CVSS 4.0 scores are now available via API
- A new feature to make the Discovery settings more precise - ability to include/exclude main level domains - reached Early Access for selected customers
- The pre-request script will now have the capability to generate AWS signature tokens to perform authentication
New security checks
- Added a new security check for TLS/SSL certificate key size too small issue
- Added a new security check for CVE-2023-46805 / CVE-2024-21887
- Added a new signature for Stack Trace Disclosures (ASP.Net)
- Added a new security checks for Client-Side Prototype Pollution
- Added a new Security Check that allows to report two vulnerabilities: TorchServe Management API Publicly Exposed and TorchServe Management API SSRF (CVE-2023-43654)
- Command Injection in VMware Aria Operations for Networks can now be detected
Improvements
- Improved WP Config detection over backup files
- Report template of Possible XSS is updated to cover mime sniffing
- The Agent type (Arm or Intel) information is displayed on the Scan Summary page
- The Permissions on the General Settings screen are now grouped by category rather than listed without being categorised
- A feature allowing the enabling or disabling of the JavaScript Parser has been added, facilitating JavaScript parameter discovery within the JavaScript code
- Fixed the issue where the Jenkins plug-in sent requests directly to the default gateway instead of routing them through the proxy
- The Team Administrator role checkbox is now in a separate 'Limiting Permissions Role' section
Fixes
- Disabled the BREACH Security Engine
- Increased the default Severity level of Version Disclosure (Varnish) from 'Information' to 'Low'
- Fixed the issue where users were unable to load the Scan Report
- Fixed the issue where Internal Scans were not failing if their Agents were terminated
- Fixed the Azure Boards integration, which was reported to have been suspended by itself
- Fixed the issue where the customer couldn't scan their target with the additional website properly
- Fixed query optimization on the main Scans page, resulting in improved response time and query quality
- The page number in the Custom Script Editor is now correctly displayed
- When the Token is expired, the Azure Boards Integration is disabled
- Fixed concurrency exceptions occurring for the scan and website tables due to excessive update requests sent within a short timeframe
- Fixed the inability to export a scan from Invicti Standard to Invicti Enterprise
- The Issues counter on the Dashboard now displays the correct number of issues
- Fixed the inability of the custom script editor to load the form authentication fields
- Fixed an issue when Team Administrator and Account Owner role are assigned to the same user
This update includes changes to the internal agents. The internal scan agent’s current version is 24.3.0. The internal authentication verifier agent’s current version is 24.3.0.
New features
- ServiceNow Application Vulnerability Response integration is now available in the ServiceNow store
- Added the ability to force authentication verifier agent to use incognito by default on Chromium browser
New security checks
- Added detection for ActiveMQ RCE to the OOB RCE Attack Pattern (CVE-2023-46604)
Improvements
- Improved ServiceNow Vulnerability Response integration
Fixes
- Fixed the error in the API's websites/update function
- Removed logos and brand names from the Detailed Scan Report display
- The API now correctly assigns the appropriate scan profile when updating the periods of scheduled scans
- Fixed the hyperlink to the Release Notes within the application
- Upgraded Microsoft.Owin package to version number 4.2.2
- Fixed null character error in JIRA integration when sending issues
- Fixed the system to halt subsequent tests if a scan is aborted from Jenkins
- Scan policies can now be updated with proxy passwords directly through the API
- Fixed GUI and API login dates to synchronize seamlessly
- Added Cookie Source field to the Knowledge Base Cookies screen
- The CSV export for user lists now includes all attributes that have been selected
This update includes changes to the internal agents. The internal scan agent’s current version is 24.2.0. The internal authentication verifier agent’s current version is 24.2.0.
New security checks
- Implemented a detection and reporting mechanism for the Backup Migration WordPress plugin (CVE-2023-6553)
- Added detection for TinyMCE
Improvements
- Updated the "Insecure Transportation Security Protocol Supported (TLS 1.0)" vulnerability to High Severity
- Implemented support for scanning sites with location permission pop-ups
- Implemented support for FreshService API V2
- Revised the labeling of the active vulnerabilities information on the Scan Summary page to provide greater clarity
- Removed obsolete X-Frame-Options Header security checks
Fixes
- Fixed a bug in the Request/Response tab of Version Disclosure vulnerabilities
- Corrected an issue in the technical reports where vulnerabilities identified in Korean are now reported in English
- Changed the ID parameter from 'optional' to 'required' within the Scan Policy Update API
- Removed the target URL from the scope control list
- Resolved a bug in the filtering of vulnerabilities on the Issues page
- Fixed a bug in the marking of issues as a false positive
- Resolved an issue where the agent would become unavailable after receiving a 401 error
- Fixed the issue with uploading a Swagger file into a scan profile
This update includes changes to the internal agents. The internal scan agent’s current version is 24.12.1. The internal authentication verifier agent’s current version is 24.12.1.
New Features
- A connector for Mend SCA now available
Improvements
- Added new paths to forced browsing
- Updated the vulnerability template for the Internal Server Error vulnerability
- Improved Insecure HTTP Usage detection
- Improved retry operations to prevent JSONSerializer errors following archiving failures
- Removed support email addresses from the product
- Removed cancelled and failed scans after 90 days
Fixes
- Fixed an issue in Mulesoft integration where child organizations were not syncing properly
- Fixed an issue with ServiceNow integrations causing authentication errors by suspending the affected integrations
- Fixed an issue where JSON responses were incorrectly formatted
- Fixed an issue where scans failed with a "Failed - Agent is unavailable" error at the end of the scan
- Fixed an issue where Invicti detected vulnerabilities in multiple parameters of the same URL but didn't report them due to the vulnerability family mechanism
This update did not include changes to the internal agents.
Improvements
- Added new '/issues' endpoint to return all issues with sorting and filtering options
Fixes
- Fixed an issue that prevents Scheduled Scans to be updated and Scan results to be imported from Invicti Standard
This update includes changes to the internal agents. The internal scan agent’s current version is 24.12.0. The internal authentication verifier agent’s current version is 24.12.0
New Features
- API Discovery now supports retrieving Open API/Swagger specs from Kong Konnect → Learn more
New Security Checks
- Added detection of Google Tag Manager as a technology in the Vulnerability Database (VDB)
Improvements
- Enhanced security to prevent customer login information from being written in clear text
- OpenSSL configuration (openssl.cnf) updated for Docker compatibility
- Added new filter in Recent Scans page for Agent Mode in order to distinguish between Internal and Cloud agents
- Revised field descriptions in the Swagger model documentation to accurately reflect the use of the RequiredIf attribute
- Improved analysis and remediation capabilities for [Possible] Server-Side Template Injection vulnerabilities
Fixes
- Resolved a breaking change in .NET 8's System.Net.Security.UseManagedNtlm by upgrading from Ubuntu 22.04 to Ubuntu 24.04, where the issue was addressed. The Agent was updated to .NET 8.
- Fixed an issue where Retest-type scans did not identify the same vulnerabilities detected during full scans
- Fixed high CPU usage in some agents caused by Chromium
- Scans attempting to run with Agent Group without any agents will result correctly in failure instead of queue
- Fixed an issue that was preventing users from accessing a Scan Policy
- Fixed an issue where the Misconfigured Access-Control-Allow-Origin Header vulnerability was not detected
- Improved detection of the [Possible] Password Transmitted over Query String vulnerability
This update includes changes to the internal agents. The internal scan agent’s current version is 24.11.0. The internal authentication verifier agent’s current version is 24.11.0
New Features
- API Discovery now supports working with RAML specs from Mulesoft Anypoint Exchange
New Security Checks
- Added a check for applications performing certificate name validation to prevent reading invalid memory addresses (CVE-2024-6119)
Improvements
- Updated the AuthVerificationService from .NET 6.0 to .NET 8.0
Fixes
- Fixed an issue with missing links in imported files that were sent from the API Inventory to the agent
- Fixed an issue where target names longer than 40 characters were not being truncated as expected on the Create New Target page
- Fixed an issue where the "Download HTTP Request Logs" button triggered an error while a scan was in progress
- Fixed an issue where user names containing the character "ä" could not be added
- Fixed an issue with the scan data retention period for raw scan files that was not working as expected
- Fixed missing scan completed notifications with report attachments
- Fixed an issue where adding more than one name to a Notification's Excluded Recipients would remove the other users from all other notifications
- Fixed an issue where the verifier agent could not read or apply custom proxy settings from the appsettings.json file
- Fixed an issue where uploading a .proto file caused a "No links found in the file" error
- Fixed missing request/response details for some out-of-band vulnerabilities
This update includes changes to the internal agents. The internal scan agent’s current version is 24.10.1. The internal authentication verifier agent’s current version is 24.10.1.
New Security Checks
- Added detection for multiple JavaScript libraries
- Added detection for Masa CMS (CVE-2022-47002 and CVE-2021-42183)
Improvements
- Changed the Mend integration to utilize an activation key so that the setup process is simpler
Fixes
- Vulnerability profiles that are set as hidden will now still be reported in the scan reports of scans completed prior to the vulnerability being hidden
- Fixed a bug in the editing of scan profiles with custom report policies
- Resolved an issue in the exporting of team member data with all attributes selected
- Resolved an issue with missing vulnerability profiles in custom report policies
This update includes changes to the internal agents. The internal scan agent’s current version is 24.10.0. The internal authentication verifier agent’s current version is 24.10.0.
New Features
- API Security: Added integration with Azure API Management to fetch Swagger2 and OpenAPI3 specification files → Learn more
New Security Checks
- Updated detection for ActiveMQ - Remote Code Execution (CVE-2023-46604) and TorchServe Management API SSRF (CVE-2023-43654)
Improvements
- Database optimizations
- Changed scanning without a duration limit to a customer support request-only option
- Reporting improvements for the “Unknown Option Used In Referrer-Policy” vulnerability
- Improved the behavior of the 'Recent Scans' button group on the global dashboard when using the mobile view
Fixes
- Fixed a timeout bug in zero-configuration API discovery
- Fixed some wording inconsistencies and other minor improvements to the user interface
- Removal of sitemap data when a scan is canceled, failed, or aborted
- Resolved an issue in the General Settings page configuration
- Resolved an issue with user sessions not timing out in compliance with the specified configuration
- Fixed a false positive issue with Boolean Based MongoDB Injection detection
- Out-of-date version for Boolean Based MongoDB Injection is now reported correctly
- Fixed missing API validation for Scan Profile updates, which caused data conflicts during website deletion
This update includes changes to the internal agents. The internal scan agent’s current version is 24.1.1. The internal authentication verifier agent’s current version is 24.1.1.
New features
- Added the option to remove Request/Response details from the detailed template to avoid the character limit error when sending vulnerabilities
- Added the option for customers to display their company name on the PCI report (new scan settings field under General settings)
- Enabled the ability to re-scan a previously scanned target which allows the application of previous exclusions on the scan and helps avoid false positives on the PCI ASV scan
- Added the option to enable enhanced logging of failed logins
- Added functionality to the UI for users to obtain logs from failed scans (previously only system administrators were able to do that)
New security checks
- Added a check for dotCMS
- Added a check for the Ultimate Member WordPress plugin
- Added a new mXSS pattern
- Added new signatures to detect JWKs
Improvements
- Improved the recommendations for the Weak Ciphers Enabled vulnerability
- Improved detection of swagger.json vulnerabilities
Fixes
- Fixed a bug in the cloning report policies functionality
- Fixed an error that was occurring with the API endpoint: list-scheduled
- Fixed a bug with the Jira integration
- Fixed a bug with custom scheduled scans that were not updating the Next Execution Time field correctly
- Fixed an issue with the HashiCorp Vault integration token validation path
- Fixed the missing 'Known Issues' tab from scan summary issue details
- Fixed an issue with the severity trend chart on the Dashboard
- Fixed a problem with importing WDSL files
This update includes changes to the internal agents. The internal scan agent’s current version is 24.1.0. The internal authentication verifier agent’s current version is 24.1.0.
New features
- Added notifications about agent disk full issues for easier navigation and to prevent scan errors
- Added an option to the Jenkins plugin to cancel the scan started by the plugin if the Jenkins build is aborted
Improvements
- Improved reporting of DOM XSS vulnerabilities
Fixes
- Fixed an issue with removing the client certificate via API
- Fixed an inconsistency for PCI results between the Invicti UI and the PCI DSS detailed report
- Fixed a bug that was causing scan session files to fail when loading
- Fixed inconsistencies with the 'average time to fix' table on the dashboard
- Fixed an issue with the import of scan data from Invicti Enterprise to Invicti Standard
- Fixed an issue with the form verifier not using the new scan policy until the scan profile is saved
- Added a custom detailed scan report
- Fixed a bug in the importing of links
- Fixed an error that was occurring when setting an issue as Accepted Risk
- Resolved issues with importing API documentation from a link
- Resolved issues with the Authentication Verifier and Agent.db file corrupting after update
- Fixed a bug in the Jenkins plugin that was causing the 'Stop The Scan When Build Fails' option to not work correctly
Important note
- Customers currently using version 23.7.0 on Windows running internal agents will need to perform additional steps in order for this update to run successfully in their environment. Affected customers have been contacted directly with more information.
New features
- Added the option to set a Custom HTTP Authorization Header under Scan policy > HTTP > Request
- Adjusted agent download parameters to allow installation of internal scanner agents using docker client via Invicti registry service
- Changed compression tool from 7zip to Tar
New security checks
- Added new patterns to detect XSS
Improvements
- Improved detection and reporting of File Inclusion vulnerabilities
- Improved detection and reporting of Sensitive Data Exposure vulnerabilities
- Improved detection and reporting of Dockerfiles
Fixes
- Fixed incorrect reporting of outdated technology versions
- Fixed a bug that was preventing reports from being saved
- Fixed an issue that can cause too much browser user data to be left in the temp folder
This update includes changes to the internal agents. The internal scan agent’s current version is 23.12.0. The internal authentication verifier agent’s current version is 23.12.0.
New features
- Added CVSS 4.0 categorization of vulnerabilities
- Added support for PCI DSS 4.0
Improvements
- Added descriptions to the agent warning messages on the Scan Summary page
- Updated messaging around the functionality of the Team Administrator role
- Improved the request body rating algorithm
- Improved the Postman collection parsing algorithm
- Resolved an issue with adding a client certificate to set up a scan
- Improved the vulnerability calculator for Boolean MongoDB
Fixes
- Fixed an issue with the agent auto-updater
- Added a missing control for SSO users while editing members
- Fixed a bug in the communication between Invicti and ServiceNow
- Fixed a bug that was preventing administrators from creating new notifications or editing built-in notifications
- Fixed an issue that was causing verifiers to not use scan policy proxy settings
- Fixed an auth verifier client certificate authentication path error
- Fixed the Invicti crawler that wasn't getting JS endpoints correctly
New security checks
Fixes
- Fixed a bug that was preventing customers from adding back previously deleted targets
- Increased character length for the Jira and Snow integration URL validation regex to ensure it accommodates Top-Level Domains (TLDs)
- Paused scheduled scans that were resuming automatically will now remain paused until manually resumed
- Removed the previous limit on the number of supported second-level domains in the Discovery feature
- Fixed an error that was occurring when updating an issue from Fixed (confirmed) to Accepted Risk status
- Fixed discrepancies in the numbers displayed on the Dashboard
This update includes changes to the internal agents. The internal scan agent’s current version is 23.11.0. The internal authentication verifier agent’s current version is 23.11.0.
New features
- Added the ability to pull a PCI Report from the CloneSystem itself by using API endpoints
- Added the option for customers to define a namespace for their HashiCorp integration
- Enhanced reporting capabilities with more attributes available in .csv exports and the option to do a .csv export in more places in the UI
- Added an option under New Scan Policy > Ignored Parameters to allow customers to set 'Cookie' as a type of ignored parameter
New security checks
- Added new checks for the WordPress Login with Phone Number Plugin: CVE-2023-23492
- Added new checks for the WordPress JupiterX Core Plugin: CVE-2023-38389, CVE-2023-38388
Improvements
- Added support for custom authentication tokens without token type
- Improved LFI attack patterns for better accuracy
- Fixed some vulnerabilities in the Docker image
- Stricter sensitive data rules
- Improved bot detection bypass scenarios
Fixes
- Fixed a sensitive data issue when uploading a pre-request script
- Fixed a bug that was preventing scheduling group scans using API
- Fixed custom header values in scan profiles so that they are masked
- Docker Cloud Stack check has been updated to reduce noise
- SSL/TLS classification updated from CWE-311 to CWE-319
New features
- Added a setting for administrators to enable internal agents to get VDB updates from the WebApp to avoid routing and proxy issues
- Added the option for administrators to hide sensitive data (passwords, tokens, session IDs, etc) from the UI
- Added functionality to the Dashboard so that you can drill down to view more information when clicking on the Severities and Securities Overview section
Fixes
- Fixed a bug in scheduling group scans with API
- Removed 401 to 500 status code conversion for internal agent requests
- Changed the IP range limitation for excluded IPs in Discovery Settings to fix the Invalid IP address error
- Fixed an issue with scheduled scans not following the scan time window
- Fixed the problem with scan failed logs not appearing in activity logs
- Fixed the broken verify login and logout function in scan profiles
- Updated the vulnerability severity ranking so that issues are correctly sent to integrated issue tracking systems
- Changed the Active Issue count on the dashboard so that it is consistent with the number when you click on it
- Fixed an issue with accessing a scan profile
New features
- Added an option under General > Settings to require a password for edit access to custom scripts
- Added an option under General > Settings to set a session timeout limit for all users
Fixes
- Fixed an issue related to having multiple integrations with the same project but with different issue types
- Fixed an issue in the 'Basic, Digest, NTLM/Kerberos, Negotiate Authentication' settings for scans
- Fixed the Jira Server integration issue that was causing only some Jira users to display when configuring Jira Field Mappings
- Fixed a bug that was causing URL rewrite rules to not be included in the Export Knowledge Base report
- Fixed a problem with the internal agent not sending a heartbeat to the web app when in archiving state
- Fixed an issue with Jira-related integration information being removed from the issue history when a previous scan is deleted
- Fixed an internal agent issue that was causing an exception when registering a vulnerability
- Fixed an issue that was causing the Knowledgebase, Crawled URLs, and Scanned URLs to fail when there is no content
- Fixed the missing mapping for Proxy Bypass On Local that was not saving when a scan policy was saved
- Fixed a bug that was duplicating roles when a Team Administrator modified another Team Administrator direct role assignment
- Fixed a bug that was preventing the import of WSDL files
- Fixed version information reported in Web App Fingerprint Vulnerabilities
This update includes changes to Internal Agents. The internal agent’s current version is 2.0.2.123.
FEATURES
- Introduced a login banner warning. The banner displays security and legal notices to users accessing the system.
- Added pre-scan validations so that Invicti can automatically choose TLS protocol.
IMPROVEMENTS
- Added the tag filtering to the Recent Scans page.
- Added the tag limitation. Users cannot add more than 20 tags.
- Added the date range filter to the global dashboard. Thanks to this improvement, users can filter scan data according to the selected time range.
- Added website and website groups information to Jira integration. When users send an issue to Jira via Invicti Enterprise, website and website groups information, if any, appears in that ticket.
- Added a check for the Trend Matrix Report to ignore null records in the database.
- Improved the method to query known vulnerabilities in Invicti Enterprise.
- Changed SCIM response status code from 400 to 409 when the same email address is submitted twice.
- Added a 400 Error message in the SCIM response status code when a user tries to change its email to a username.
- Updated the error message when deleting the website during a PCI scan.
- Added the severity level icons to the websites listed on the Websites' page.
FIXES
- Fixed the retest retry limit if the base scan is not loaded.
- Fixed an email notification error sent to guest users which showed "Failed - Unable to load scan session" error in the scheduled scans although the scan was successful.
- Fixed a NullReferenceException thrown while checking target URL in the New Scan page.
- Fixed password autocomplete issue in the form authentication saved in a scan profile.
- Fixed an error that prevents the URL Rewrite rule from being updated in the saved scan profile.
- Fixed an error that prevents scan tags from being shown while creating a scheduling scan.
- [INTERNAL AGENT] Fixed the Ignore SSL Certificate issue that prevents internal agents from being auto-updated.
- [INTERNAL AGENT] Improved the performance of security check on cases when multiple checks are running concurrently.
This update includes changes to Internal Agents. The internal agent’s current version is 2.0.2.127.
NEW FEATURES
- Added Node.js sensor for Invicti Shark (IAST).
NEW SECURITY CHECKS
- Added signature matching to Web app fingerprint checker.
- Added patterns for Base64 encoded DOM Cross-site Scripting.
- Added phpMyAdmin Version Disclosure security check.
- Added Atlassian Confluence Version disclosure and Out-of-date security checks.
- Added exclusion feature to JavaScript Library detection.
- Added PHP Version Detection via phpinfo() call.
- Added the Shopify Identified security check.
IMPROVEMENTS
- Added the Bridge URL and Shark token support for Invicti Shark (IAST).
- Added the "not contains" filter to exclude specific titles, such as Out-of-Date.
- Added the notification on the Reporting page when the time start predates the time end.
- Added setting to configure Session Cookie Names.
- Updated CWE classification category orders for Out-of-date templates.
- Improved Cross-site Scripting attack pattern.
- Added support for exploiting local storage and session storage in the DOM XSS security checks.
- Added highlighting support for custom scripts.
- Added Web Application Firewall to the site profile.
- Changed the default ignored parameter comparison to case insensitive.
- Added 'Is Encoded' option to OAuth2 parameters.
- Added JWT Token pre-request script template.
- Added the CSP Not Implemented that will be reported as confirmed.
- Added the Subresource integrity not implemented that will be reported as confirmed.
- Marked weak TLS ciphers.
FIXES
- Fixed the issue that Content-Type header missing was reported when there was no content in the response.
- Fixed the issue that false positive JSON Web Token (JWT) was reported in a not found response.
- Fixed the issue possible and confirmed vulnerabilities reported in the same URL.
- Fixed the issue proof that was generated even when the proof generation option was disabled in the scan policy.
- Fixed FP Waf Identified.
- Fixed the issue vulnerability count in root node is not updated when a vulnerability is removed and Blind XSS was prioritized over the Reflected Cross-site Scripting.
- Fixed the issue source code disclosure is reported in binary responses.
- Fixed the issue JWT JKU vulnerabilities are not reported in Invicti Enterprise because of Null Reference Exception.
- Fixed the issue fingerprint checker crashes when an applications file could not be found.
- Fixed the issue object-src missing was reported when default-src is provided in CSP security checks.
- Fixed the issue that some cipher suites are not reported as weak.
- Fixed the issue classification links were not rendered correctly when there are multiple values.
- Fixed the issue proof prefix was added when there were no more characters to be found.
IMPROVEMENTS
- Added Scan Profile Name column to Recent Scans page.
- Added Website URL as a filter field to Scheduled Scans page.
- Removed encrypted authentication credentials from API responses.
FIXES
- Fixed an issue where the scans launched from CI/CD without a Scan Profile were creating redundant Scan Groups on the Website dashboard.
- Fixed an issue where pressing the TAB key was not committing the entered email address on email input fields.
- Fixed an issue where some settings are not saved when you save a cloned Scan Policy for the first time.
- Fixed an issue where the View Scan Reports and Manage Issues (Restricted) options under Scan Permission are not saved while creating new members.
- Fixed an issue where the modified Scan Profile settings are not saved when another profile is selected from the dropdown.
This update includes changes to the internal agents. The internal scan agent's current version is 2.0.2.148. The internal authentication verifier agent's current version is 2.0.2.148.
IMPROVEMENTS
- Improved the web app to store the agent file’s version to prevent unnecessary updates.
- Improved the internal agent not to start without updating itself when there is an update.
- Improved the internal agent not to display the “Update Agent” button when the agent has the latest version.
FIXES
- Fixed the bug that prevents the internal agent from being auto-updated.
This update includes changes to the internal agents. The internal scan agent's current version is 2.0.2.156. The internal authentication verifier agent's current version is 2.0.2.156.
New security check
- Added the Text4Shell (CVE-2022-42889) check.
Improvements
- Updated the docker scanner agent.
- Added an active scan check before deleting a scan profile related to that active scan.
- Improved the importing link to parse the complex example value for RAML.
Fixes
- Fixed the issue in which the authentication verifier agent is not listed after the time zone is changed.
- Improved the authentication verifier configuration file to support using the plus (+) for space encoding.
- Improved the log for the knowledge base report.
- Fixed the mistaken information on the retestable vulnerabilities.
- Fixed the fix calculation bug in the Issues API endpoint that occurred when scan(s) are deleted.
- Fixed the issue that deleted the customization folder in the agent’s folder after the update.
- Fixed the bug that displayed different method icons on the technical report page.
This update includes changes to internal scan and authentication verifier agents. The internal scan agent's current version is 2.0.2.138. The internal authentication verifier agent's current version is 2.0.2.138.
IMPROVEMENT
- Netsparker Enterprise now Invicti Enterprise.
- Updated the Bamboo plug-in to the version 1.8.
- Added the OWASP API Top Ten 2019 scan policy.
- Added a check to prevent from entering special characters to the optimized scan policy.
- Added the DeleteById field when a website is deleted.
- Added validation of the URLs entered by a user in the ImportedLink section while saving the database.
- Improved the SCIM error message when a user filters users/groups with mistaken syntax.
FIXES
- Fixed null exception error while mapping imported links in API.
- Fixed a bug that causes the Issues page to be crashed when the state filter is selected.
- Fixed a bug in which the new scan page is stuck although a new scan has been launched.
- Fixed a bug that causes an error when you want to delete a scheduled scan that has a website with tags which were included into a scan profile.
- Fixed a bug that generates a blank scan report when a vulnerability has a null name value.
- Fix a bug that does not show imported links in scheduled scans.
- [Internal Authentication Verifier Agent] Fixed OAuth2 verification that fails due to the OTP settings model being null.
- [Internal Scan Agent ] Fixed a bug that prevents the WSDL files from being imported.
This update includes changes to Internal Agents.
FEATURE
- Added Authentication Verifier for Internal Agents.
- Added State filter to notifications which you can use issue states like Fixed, Revived, New, etc. as filtering options.
IMPROVEMENT
- Removed the scan report selection from notification events that do not produce any reports.
- Added account-based option to display authentication credentials on API responses.
FIXES
- Fixed an issue where the Launch button does not get enabled on the New Scan page after you enable the IAST scanning and download the sensor files.
- Fixed an issue where a notification that is sent to an external email address was not displayed on the audit logs.
- Fixed an issue where starting a PCI scan via using API could not start the scan.
- Fixed an issue where a new notification created via API does not add the specified integration(s) to the new notification.
- Fixed an issue where a team member was not created in API if the auto-generated password is enabled.
- [INTERNAL AGENT] Fixed an issue where the custom value of FormAuthPageLoadTimeout was being overridden by its default value.
FEATURE
- Added support for creating Teams and Roles.
- Added SCIM 2.0 API support for improved SSO integration which supports user and group synchronization with popular Identity Providers
IMPROVEMENT
- Improved access control by introducing new more granular permissions
- Improved role assignment for website groups while inviting new members
This update includes changes to the internal agents. The internal scan agent's current version is 2.0.2.157. The internal authentication verifier agent's current version is 2.0.2.157.
New features
- Added a feature to generate an excel report for vulnerabilities identified across a website group.
- Added an API parameter to choose among agent groups to launch an incremental scan. [API-only]
- Added an option to determine how long Invicti stores scan data.
Improvements
- Improved the ServiceNow Incident Management.
- Improved the Jira integration to export a vulnerability’s details to the Jira ticket.
- Improved the SSO to inform users about the expired SAML certificate.
- Added an explanation for the failed requests error.
- Added name variable support for Passive and Singular Custom Security Checks.
Fixes
- Fixed the Business Logic Recorder issue that prevents login when there is a custom script for the form authentication.
- Improved the creation of websites via the Discovery Service to include the port numbers and the URL.
- Fixed a bug that displayed vulnerabilities without their id on the website and global dashboard page.
- Fixed WSDL parse issue for non-defined object types.
- Fixed the null reference exception on HTTP Requester.
- Fixed the internal agent update issue that is stuck in the updating process.
- Fixed the deserialization problem when importing the scan session to Invicti Standard.
Removed
- Removed the .NET installation requirement for internal agents.
New security checks
- Added the check for Boolean-based MongoDB injection.
- Added the check for MongoDB Operator Injector.
- Implemented the XML external entity check for IAST.
- Added the ISO/IEC27001:2022 Classification.
- Added the report template and attack pattern to the Out-of-band RCE.
- Added passive check for Lua.
- Added a security check to detect public Docker files.
- Implemented a new engine to identify WordPress themes and Plugins.
- Added new security checks for SAML.
- Added security check for IT Hit WebDAV Server .Net Version Disclosure.
- Added security check for MS Exchange Version Disclosure.
- Added new payloads for Command Injection.
- Added support for PopperJS.
- Added support for CanvasJS.
- Added new security check for the SQLite Database Detection.
- Added new payloads for Header Injection.
- Added new security check for Spring Boot Actuator Detection.
- Added security check for NodeJS Stack Trace Disclosure.
- Added security check for SailsJS and ActionHero Identified.
- Added security check for JetBrains .idea Detected.
- Added security check for GraphQL Stack Trace Disclosure.
- Added security checks for Javascript Libraries.
- Added security checks for Web Application Fingerprinter Engine.
- Added new security checks for WordPress Hello Elementor Theme Detection.
- Added new security checks for WordPress Twenty Twenty-Three Theme Detection.
- Added new security checks for WordPress Twenty Twenty-Two Theme Detection.
- Added new security checks for WordPress Astra Theme Detection.
- Added new security checks for WordPress Twenty Twenty-One Theme Detection.
- Added new security checks for WordPress Twenty Twenty Theme Detection.
- Added new security checks for WordPress OceanWP Theme Detection.
- Added new security checks for WordPress Twenty Seventeen Theme Detection.
- Added new security checks for WordPress Kadence Theme Detection.
- Added new security checks for WordPress Twenty-Sixteen Theme Detection.
- Added new security checks for WordPress Twenty Nineteen Theme Detection.
- Added new security checks for WordPress PopularFX Theme Detection.
- Added new security checks for WordPress GeneratePress Theme Detection.
- Added new security checks for WordPress Inspiro Theme Detection.
- Added new security checks for WordPress Go Theme Detection.
- Added new security checks for WordPress Smash Balloon Social Photo Feed Plugin Detection.
- Added new security checks for WordPress Contact Form 7 Plugin Detection.
- Added new security checks for WordPress Yoast SEO Plugin Detection.
- Added new security checks for WordPress Elementor Website Builder Plugin Detection.
- Added new security checks for WordPress Classic Editor Plugin Detection.
- Added new security checks for WordPress Akismet Spam Protection Plugin Detection.
- Added new security checks for WordPress WooCommerce Plugin Detection.
- Added new security checks for WordPress Contact Form by WPForms Plugin Detection.
- Added new security checks for WordPress Really Simple SSL Plugin Detection.
- Added new security checks for WordPress Jetpack Plugin Detection.
- Added new security checks for WordPress All-in-One WP Migration Plugin Detection.
- Added new security checks for WordPress Wordfence Security Plugin Detection.
- Added new security checks for WordPress Yoast Duplicate Post Plugin Detection.
- Added new security checks for WordPress WordPress Importer Plugin Detection.
- Added new security checks for WordPress LiteSpeed Cache Plugin Detection.
- Added new security checks for WordPress UpdraftPlus WordPress Backup Plugin Plugin Detection.
- Added new security check for EZProxy Identified.
Improvements
- Improved the user interface for the website's menu for API.
- Improved the user interface for the crawling options on the New Scan page.
- Improved the business logic recorder to play the authenticated record.
- Updated the Signature Detection pattern.
- Improved the wordlist for Forced Browsing checks.
- Changed the Session Cookie not marked as Secure severity from High to Medium.
- Improved the performance of downloading the discovery data via the API endpoint.
- Increased the delay control for max scan duration to 12 hours. After 12 hours of the maximum scan time set by the customer, the web application fails the scan.
- Improved Drupal and Joomla detection.
- Improved the Next.js version detection.
- Improved Django debug mode enabled.
- Updated the SSL/TLS report template.
Fixes
- Improved report generation via API endpoints.
- Fixed the login failures when the Authentication Profile is selected as the Use matched profile.
- Fixed the issue that caused the flashing custom script screen.
- Fixed the issue with cascading combo box by fixing the query.
- Fixed an internal server error while exporting from the Invicti Standard to the Invicti Enterprise.
- Fixed the issue with the “#” sign that can appear in the target URL.
- Fixed the issue with choosing the All option from the website group drop-down on the Reporting page.
- Fixed an issue about HTTP Status codes on the crawler performance in the Knowledge Base Report.
- Fixed the importing GraphQL introspection issue.
- Fixed the weak Nonce detection in Content Security Policy.
This update includes changes to Internal Agents. The internal agent’s current version is 2.0.2.125.
IMPROVEMENTS
- Improved the Login Banner Warning feature so that users cannot access any resources on Invicti Enterprise until they select the Accept, Continue button.
- Add the Environment field to the DefectDojo integration.
- Added the Export to CSV button on the Manage Members page so that you can download all your team members to your environment.
FIXES
- Fixed a bug that prevented the scan profile of a deleted website from being removed. Now, when users delete a website, the related scans, including scan profile, are also deleted.
- Fixed an issue that prevent the scan from being canceled.
- Fixed the missing ScanTaskProfile field by adding it back to scan API call responses.
- Fixed a bug that prevents members and teams from being deleted if they have been assigned to website groups.
- Fixed a bug that allows the API member edit endpoint which accepts less than 15 characters for the administrator's password.
- Changed the permission to view reports from Add/Edit Scan to the View Report.
- [INTERNAL AGENTS] Changed Agent request time interval to 60 seconds.
- [INTERNAL AGENTS] Fixed a bug that prevents an agent from scanning a new website if the previous scan was canceled.
This update includes changes to the internal agents. The internal scan agent's current version is 2.0.2.145. The internal authentication verifier agent's current version is 2.0.2.145.
IMPROVEMENT
- Improved the scan agent to continue scanning in case of getting HTTP status errors like Forbidden, Unauthorized, and ProxyAuthenticationRequired for websites supporting TLS 1.3.
New features
- Now you can enter multiple IP addresses and IP ranges into the IP Address Restrictions setting. Previously, only single-entry IP addresses were permitted.
- Added TLS certificate authentication as an option when integrating with HashiCorp Vault. Previously, we only supported token authentications.
- The default compression format for log files is now .tar instead of 7zip
Improvements
- Disabled caching from the boolean-based MongoDB security engine to avoid possible false positives
- Improved the content-type exemption for non-HTML content types in the CSP engine
- Improved the typehead.js check to increase stability
- Removed the X-XSS-Protection header check because it is deprecated by modern browsers
- Added functionalities to prevent bot detection and fixed an issue that was causing cookie loss after authentication
- Improved the remediation part for the JetBrains .idea detected vulnerability
Fixes
- Fixed a bug that was stopping the certificate authentication process from working correctly for Authverifiers
- Fixed a boolean-based MongoDB Injection that was causing false positives in scan reports
- Fixed the incorrect display of vulnerabilities when importing scan results from Invicti Standard to Invicti Enterprise
- Fixed a bug that was preventing the editing of internal website URLs
- Fixed the character validity issue so that user names with Danish characters can now be edited in the UI
- Fixed a bug that was allowing access to the UI via the back button after the user had signed out
- Fixed the Discovery Main Domains Filter Expression that was not working properly for some domains
- Fixed an issue that was causing tags to be duplicated when a website was imported using a CSV file
- Fixed the update agent command that was not working correctly
- Fixed the internal Linux v23.7 AV agent that wasn’t sending header configurations
- Encrypted the proxy password used in the scan policy file
- Fixed a scan coverage issue
- Fixed the external SOAP web service import problem
- Fixed a custom script issue so that now passwords written to the logs are encrypted
- Fixed an issue where vulnerabilities could not be generated as CloudFlare WAF rules via API
- Fixed a problem that was causing default values to be filled incorrectly, resulting in false negatives
This update includes changes to internal scan agent. The internal scan agent's current version is 2.0.2.140.
NEW SECURITY CHECKS
- Added Remote Code Execution (CVE-2022-22965) a.k.a. Spring4Shell detection support.
This update includes changes to Internal Agents.
IMPROVEMENTS
- Prevented deletion of system notifications.
- Forced Browsing wordlist made editable.
- Added tooltips displaying the full issue title on the Issues tree when the titles are clipped due to length.
FIXES
- Fixed /notifications/ update API endpoint which was not updating recipient emails before.
- Fixed a Scan Policy Optimizer issue where the Resource Finder settings are not captured when the selection tree is collapsed.
- Fixed an issue where the Custom Script cannot be created when 3-Legged Authentication is selected while configuring OAuth2.
- Fixed an issue where the ISO Compliance report cannot be exported for some of the scans.
- [INTERNAL AGENT] Fixed runtime exceptions thrown on systems that are missing ClamAV.
This update includes changes to the internal agents. The internal scan agent's current version is 2.0.2.151. The internal authentication verifier agent's current version is 2.0.2.151.
IMPROVEMENTS
- [Early Access] Improved the scan profile feature, so any updates on a scan profile are to be reflected on the scheduled scans, incremental scans, and retests.
- Improved the Activity Log page to list any changes on the general settings.
- Improved the user agent to add custom user agents.
- Improved the Basic, Digest, NTLM/Kerberos, Negotiate Authentication to inform users on test credentials page whether this authentication is required or not.
- Improved the required information for the Kafka integration.
- Improved the raw scan file expired information message.
FIXES
- Fixed a bug that does not show the status change drop-down on the scan report page when zoomed in.
- Updated the Unfuddle Integration where optional fields have "required" text.
- Improved the IP Restriction Infrastructure.
- Fixed failed scans where the Target URL is IPv6 and starting with ::1
- Fixed the null reference problem issue while using the 3-legged flow type for OAuth2.
- Fixed the Chrome version number on the custom script editor while using an internal authentication agent.
- Fixed the GraphQL retest bug that showed a different request count.
Improvements
- Improved notification delivery with integration services
- [Closed Beta] Protected visibility of passwords within custom scripts
Fixes
- Fixed Vulnerabilities visible from UI but not via API in certain failed scan situations
- Fixed inconsistent Scan State in rare Deleted Scan scenario
- Fixed missing Next Execution Time for certain scheduled scans
- Fixed cannot save scheduled scans in some scenarios
- Fixed inconsistencies in the Resource Finder with certain hidden files and backup files
- Fixed improved updating of groups in Azure Provisioning scenario
- Fixed cannot convert scan data while CloudProvider Settings page is open
- Fixed database update exception with a large number of simultaneous scans launched
This update includes changes to the internal agents. The internal scan agent’s current version is 2.0.2.160. The internal authentication verifier agent’s current version is 2.0.2.160.
Improvements
- Improved the Technologies page for detailed version information of technologies identified.
- Improved the target website deletion process to prevent any errors because of instantaneous action.
- Add a new API endpoint (api/1.0/issues/summary) for better issue reporting.
- Improved the maximum scan duration to stop only those scans with the Scanning status.
- Added default SSL Configuration to docker agents.
- Added a token matching rule when it is required to get the token from a website other than the target URL.
Fixes
- Fixed the scanner agent issue where the Linux agents failed because of TLS as a result of breaking changes in .NET 5.
- Fixed the basic authentication issue that threw an error although the credentials are correct in the scan profile.
- Fixed the business logic recorder issue that prevented the recorder to play recorded steps during a scan.
- Fixed the inconsistent number of vulnerability counts by severity information on the scan report page.
- Fixed the vulnerability serialization issue that caused the out-of-memory error.
- Fixed the scan scope issue that does not load the scan scope correctly on the first try.
- Fixed the scan profile issue that failed to register the database selected on the scan optimization page.
- Fixed the corrupted scan data ZIP file downloaded via an API endpoint.
This update includes changes to Internal Agents. The internal agent’s current version is 2.0.2.129.
NEW FEATURES
- Added support for scanning GraphQL APIs.
- Added OWASP API Top Ten Report.
IMPROVEMENTS
- Improved the paragraph style of the login warning banner.
- Changed the brand name of Clubhouse to Shortcut.
- [INTERNAL AGENT] Added the error messages to the Login Simulation Pages.
FIXES
- Fixed the Jolokia version disclosure report to properly highlight the related lines.
- Fixed a bug that threw an error when users update a vulnerability's status as False Positive on the Technical Report page.
- [INTERNAL AGENT] Fixed a bug that prevented subprocesses of agent from being shutdown during the update process.
This update includes changes to Internal Agents.
FEATURE
- Added extension for Azure DevOps Pipelines.
IMPROVEMENT
- Improved the error messages returned from the notification API endpoint.
FIXES
- Fixed missing nodes on the sitemap tree.
- Fixed an issue where links imported from a Burp file are incorrectly parsed as HTTP, not HTTPS.
- [INTERNAL AGENT] Fixed an issue where an HSTS issue keeps reviving when the website is scanned again.
- [INTERNAL AGENT] Fixed a scan failed issue that occurs during archiving scan files.
- [INTERNAL AGENT] Fixed an issue where WSDL importing fails while trying to locate the external schema.
- [INTERNAL AGENT] Fixed an InvalidOperationException.
FEATURE
- Added an issue tracker integration to IBM ALM (Jazz Team Server).
IMPROVEMENTS
- Prettified the outputs printed by Azure Pipelines, GitLab and UrbanCode deploy CI/CD integrations.
- Added support for committing changes on the tag editors with the TAB key.
- Added Organization field to GitHub issue tracking integration.
- Updated YouTrack issue tracker integration to use the new API.
- Improved the performance of issues/allissues API endpoint.
- Added alternate mail address field (if available) to the account/me API endpoint.
- Improved Splunk integration by sending the issue updates without requiring a new scan.
- Improved the performance of the Technology Dashboard.
- Improved the performance of the scans/report endpoint.
- Updated the look and feel of emails sent.
- Added Known Issues information to issues while sending to Kenna.
- Improved the performance of PCI scan reports.
- Added links to CVE IDs on reports.
FIXES
- Fixed the incorrect email displayed on the audit log when a failed login attempt is logged.
- Fixed a bug where a team with the same name tried to be provisioned when SCIM integration is used with SSO providers.
- Fixed the team member APIs by adding the missing CreatedAt field.
- Fixed an issue where some users with the default View Reports rule cannot see the global dashboard page.
- Fixed a memory leak happens while generating PDF reports.
- Fixed a NullReferenceException thrown while calling the scans/new API endpoint.
- Fixed an error occurs when a website which has tagged issue is deleted.
- Fixed a page loading issue on authentication verifier.
- Fixed the clipped user interface elements on the New User Mapping page when the page widths get narrow.
- Fixed an issue where the Exclude Authentication Page checkbox does not get updated.
- Fixed the overlapping logo on reports.
- Fixed an issue where incremental scans started from CI/CD integrations are using the default profile if there are no scans performed to that website previously.
- Fixed the Not Found error displayed while testing notifications for Azure Boards integration.
- Fixed the empty PCI report issue.
- Fixed random HTTP 500 error thrown from scans/report API endpoint.
- Fixed missing agent groups when queried using agentgroups/list API endpoint.
- Fixed an issue where old VDB results are displayed on the known issues tab.
- Fixed a NullReferenceException.
- Fixed connection timeout issues.
- Fixed an issue where an exception was thrown if the agent Helper Service is set to use a different port on Linux machines.
- Fixed an issue where the issues of a custom security check are incorrectly listed under a different vulnerability on reports.
- Fixed a scan stuck issue.
- Fixed scans failing on some systems while scanning TLS 1.3 websites.
This update includes changes to the internal scan agent. The internal scan agent's current version is 2.0.2.141.
NEW FEATURES
- Added the feature to tag discovered websites.
IMPROVEMENTS
- Updated embedded chromium browser
- Added integration failed status for the Secrets and Encryption Management services.
- [Internal scan agent] Updated the scan agent update workflow. When there is a new update and users have more than one scan agent, the new version will be downloaded only once. Other scan agents will rely on this new package to update themselves.
- Added a drop-down to determine how many results are to be displayed on a page. The options are 20/50/100/200.
- Added a new explanation for the api/1.0/scans/unschedule endpoint to clear any ambiguity
- Added a filter that checks the number of issues being displayed on the global dashboard.
- Updated the scan profile to include the verified form authentication.
- Improved the IP filtering on the discovered websites' page.
FIXES
- Fixed a bug that caused a broken website-scan relationship as a result of the inconsistent update.
- Fixed the inconsistent vulnerabilities listed in XML and CVS reports.
- Added the OnlySsoLogin parameter for SCIM so that users can determine if they want members to log in with SSO or not.
- Fixed the bug that caused the issues' status to stay the same in the case of bulk editing.
- Fixed the SCIM API schema that showed incorrect responses for the group.
- Fixed a bug on the user interface that showed incorrect scan status.
- Fixed an issue with global servers in imported Swagger files.
- Fixed a bug that add duplicated users to a team when added using SCIM.
- Fixed the Azure board integration webhook issue caused by the status codes.
REMOVED
- Removed the agent platform selection option for the internal agents from the user interface.
This update includes changes to Internal Agents.
IMPROVEMENT
- Added an option to specify a scan profile while scheduling scans through API.
- Added support for Form Authentication Custom Scripts for cases when a Privileged Access Management integration is used.
- Added support for 11 digit phone numbers while inviting a new member.
- Added a field to specify the user’s SSO email address while creating a new team member using the API.
- [INTERNAL AGENT] Added IgnoreSslCertificateErrors option to Docker agent.
FIXES
- Fixed an issue with the GitLab integration script where builds were not failing when they were supposed to fail.
- Fixed an issue where the “Add Attachment Report” section was missing while adding a new notification.
- Fixed a mismatching type issue on /scanprofiles/list API response model.
- Fixed an issue where a failed scan sends an excessive amount of email notifications.
- Fixed an issue where Exclude Authentication Page configuration resets when another scan is performed.
- [INTERNAL AGENT] Fixed agent auto-update issues.
New features
- Added new options to the dashboard for selecting date ranges, including creating custom time periods
- Added a notification to the scan results page to show the VDB update version and Invicti Hawk connectivity status for the agent used in the scan
- Added a sensitive data (password, session cookie, token etc.) encoder
New security checks
- Added JQuery placeholder detection methods
- Added a new security check for the Missing X-Content-Type-Options vulnerability
Improvements
- Improved the JS Delivery CDN disclosure check to increase stability
- Improved the remediation part for the Weak Ciphers Enabled vulnerability
- Reduced the certainty value to 90 for the Robot Attack Detected vulnerability
- Improved the detection method for CSP
- Improved the detection method for the Dockerignore File Detected vulnerability
- Improved the detection method for the Docker Cloud Stack File Detected vulnerability
Fixes
- Fixed an issue with imported links in the API
- Fixed a bug in the scan URL rewrite rules
- Fixed a bug that was preventing retest scans from starting correctly when the vulnerability states were changed from 'Reviewed' to 'Fixed (Unconfirmed)'
- Fixed a bug with disabling the scheduled scans list
- Fixed an issue with viewing the Account Edit page
- Added the missing CVE to the issue details for the "Out-of-date Version (jQuery Validation)" vulnerability
- Fixed some bugs that were affecting BLR
- Encrypted proxy password details when used in the Agent
- Fixed a custom proxy bypass list issue
- Fixed a unique analyzer bug for the WSDL importer
- Improved our XSS capabilities
- Fixed an NTLM login issue
Improvements
- Added an option to ignore events that can break the JavaScript simulation script.
- Added version number information to internal agents on the Configure New Agent page.
- Improved the agent and web application communication to end it after three attempts if the internal agent has wrong information.
- Improved Invicti Enterprise to clear all login files upon signing out of the application.
- [Early Access] Created a queue to store scan results and register results asynchronously.
Fixes
- Fixed the issues API endpoint on the updating and sorting.
- Fixed the tagging issue with the Azure Boards integration that the tag appeared on the Azure board although there is no tag entered on the Invicti side.
- Improved the web app and agent communication.
- Updated the docker agent package for the 64-bit process.
- Fixed the bug that threw an object reference error while trying to end the scans that exceeded the max scan duration.
- Fixed the Classless Inter-Domain Routing (CIDR) transformation issue for the discovery service.
- Fixed the discovery service crawling issue.
- Fixed issues that caused erroneous reports.
This update includes changes to the internal agents. The internal scan agent's current version is 2.0.2.153. The internal authentication verifier agent's current version is 2.0.2.153.
IMPROVEMENTS
- Added the .gql to the supported file types for the import link.
- [Early Release] Deselected the Include Unreachable Discovered Website checkbox by default.
- Improved the site map and vulnerability synchronization.
FIXES
- Fixed the website's exporting to CSV issue when sorted by description.
- Improved the scan status that running scans will be set as Failed if their Scanner Agent is Not Available or Terminated.
- Fixed the deleted vulnerability issue while creating a scan report.
- Fixed the Exclude Authentication Pages option on the scan scope when configuring an authentication profile.
IMPROVEMENTS
- Improved an agent auto-update procedure to support updates for minor version changes.
- All credential information on API responses is encrypted.
- Prevented agent log file names to be renamed by the browser according to the user’s regional settings.
FIXES
- Fixed an issue where the scan and report policies are not preserved while scheduling group scans.
- Fixed several issues on the sitemap tree and improved the performance.
- Fixed a hanging scan issue that occurs while the scan state is changing.
- Fixed an issue where setting an already deleted scan profile name to a new scan profile gives an error.
- Fixed the incorrect VDB version displayed on the agent.
- Fixed an issue where Download Scan Data and Download HttpRequest Logs were not working previously.
- Fixed an issue where an agent was not using the correct proxy settings while communicating with the web app.
This update includes changes to Internal Agents.
NEW FEATURES
- Added IAST Scanning capabilities.
- Added CyberArk Vault Privileged Access Management integration.
IMPROVEMENTS
- HashiCorp Vault settings no more require Testing Settings as mandatory before saving the integration.
- Added search capability to the Website Group selection drop-down on the global dashboard page.
- Added the API endpoint option to create users that can only log in using Single Sign-on.
- Added the last login date information to the team member API endpoint.
- [INTERNAL AGENT] Added “Detect authentication tokens” capability for authenticated scans.
FIXES
- Fixed a reporting issue where addressed issues were included on reports generated with the Exclude Addressed Issues option.
- Fixed the “Internal Server Error While Exporting Scan” error while exporting scans from Invicti Standard.
- Fixed an issue where a Scan Policy used on a Scheduled Scan cannot be deleted.
- Fixed an issue where the Single Sign-on only users were not able to access their API tokens.
- [INTERNAL AGENT] Fixed an issue that occurs while creating the custom report policy on Linux environments.
FEATURES
- Introduced the tagging feature for websites, website groups, and scans: While this feature has been available for Issues since March, it is now available for scans, websites, and websites groups as well.
Improvements
- Added information message to the AWS Discovery Connection that the results may take some time to appear on the discovered websites page.
- Added a name validation for adding a new member’s name and editing a member’s name.
- Added an option to export the PCI DSS scan report even if the scan fails.
- Improved the global dashboard performance.
Fixes
- Fixed the issue that showed the wrong country flags for country phone codes.
- Fixed the product name in lowercase for those customers using Turkish Windows OS.
This update includes changes to Internal Agents.
FEATURE
- Introduced tagging support for Issues.
IMPROVEMENT
- Added options to specify Is Confirmed and Severity values while failing Jenkins builds.
- [INTERNAL AGENT] Added auto-update support for Linux agents.
- [INTERNAL AGENT] Added support for TLS 1.3 protocol.
- [INTERNAL AGENT] Updated Debian docker image to version 10.8.
FIXES
- Fixed the “Internal Server Error While Exporting Scan” error while exporting scans from Invicti Standard.
- Fixed missing classification editors on report policy editor for recently added classification types.
- [INTERNAL AGENT] Fixed an issue that causes the scan to stuck while trying to capture the website thumbnail image.
This update includes changes to internal scan agents. The internal scan agent's current version is 2.0.2.137.
NEW FEATURES
- Added Software Composition Analysis (SCA) feature.
FIXES
- Fixed an issue that prevents the Sitemap from populating correctly after a scan.
- Fixed an issue that prevents the DeleteById field in the database from being updated.
This update includes changes to the internal agents. The internal scan agent's current version is 23.4.0. The internal authentication verifier agent's current version is 23.4.0
New security checks
- Added new patterns for GrapQL attack usage.
- Added new attack pattern to CommandInjection.xml.
- Implemented Bootstrap Libraries Detection.
- Added Out-of-Date vulnerability for mod_ssl.
- Added a report template and vulnerability type for Spring Framework Identified.
- Added JavaMelody Interface Detected Signature.
- Added the support for Nested objects for GraphQL attacks.
Improvements
- Updated Invicti Enterprise with the new brand logo.
- Added the discovery source option to filters on the discovered websites page.
- Added the AWS badge to the Discovery Service to identify the assets identified via the AWS connection.
- Improved the Linux agents to work in the FIPS-enabled environment.
- Updated the IAST Bridge to improve the communication between the bridge and the scanner agent.
- Added a null check for HAR files imported.
- Improved the agent and web application communication to end it after three attempts if the internal agent has wrong information.
- Updated IAST NuGet PHP package.
- Updated StaticDetection.xml & StaticResourceFinder.xml.
- Changed WAF Identification Signature for F5 Big IP.
- Added external schema import to solve a WSDL file importing another WSDL file.
- Added service worker request support for authentication, login simulation, and crawling.
Fixes
- Fixed the issue with a folder name with blanks to prevent the Unquoted Service Path vulnerability.
- Fixed the AWS connection issue to let customers add internal EC2 instances.
- Fixed an issue that caused high memory usage while collecting form values.
- Fixed the issue that caused the change in the date and time format during the Postman file importing.
- Fixed the next scheduled scan execution time information on the user interface.
- Fixed the issue that displayed "vulnerability not found" on the user interface although the vulnerability is identified.
- Fixed the control issue that threw an “internal server error” when exporting a scan from Invicti Standard to the Enterprise.
- Fixed the "Catastrophic Backtracking" in Whoops Debugging detection.
Improvements
- Added an account ID control when querying the website with the root URL.
- Improved the website importing when the CSV file has more than 1000 entries.
- Added an information message for adding an AWS connection that appears when there is no running instance.
- Improved the health check of websites discovered via the AWS connection.
- Changed the Jira webhook settings, making the Exclude Body checkbox selection mandatory.
- Fixed the importing website issue that threw an error when a user tries to add the website deleted from Invicti previously.
- [Early Access] Improved the scan data by moving some information like attack and knowledge base data to the storage.
- Improved the AWS discovery that can find private IPs in addition to the public IPs when the Include Unreachable Discovered Websites checkbox is selected.
Fixes
- Fixed the issue in which a team’s name is deleted during the editing process.
- Fixed the validation issue for the Kafta integration.
- Fixed the password update issue for the authentication verifier process that failed to obtain the new password.
This update includes changes to internal scan and authentication verifier agents. The internal scan agent's current version is 2.0.2.139. The internal authentication verifier agent's current version is 2.0.2.139.
IMPROVEMENT
- Added support for on-premises versions of CyberArk and HashiCorp Vault.
- Updated the Splunk plug-in to prevent exporting unnecessary HTML information to the Splunk ticket.
- Added 'Is Encoded' option to OAuth2 parameters.
- Adding the Connection Timeout option to the scan policy.
- Improved the Knowledge Base tab in the technical report section for the accessibility.
- Added the Browser Settings to scan policy.
- [Internal scan agent] Added report policy migration process while relaunching scan session to prevent launch scan issue.
FIXES
- Fixed a bug with displaying cookie names in scan policy.
- Fixed a Globally Unique Identifier bug that assigned zero to a custom vulnerability when identified.
- Fixed a bug that prevents from editing an internal website.
Improvements
- [Early Access] Improved the AWS connection to scan only the top 10 most popular web framework ports from the AWS Security Group.
- Improved the website dashboard performance.
- Improved the discovered website page to customize columns based on your needs.
- Added the attack option for Cross-site Request Forgery (CSRF).
- Added the required tooltip for the Value field of the Kafka integration.
Fixes
- Fixed the bug in sending issues to Mattermost.
- Fixed the Slack integration issue that failed to send notifications.
- Fixed the inconsistent discovered website result by handling null values.
- Fixed a bug that prevented the PCI scan from running ever again if any previous PCI scan failed to start.
IMPROVEMENTS
- Improved the Basic, Digest, NTLM/Kerberos, Negotiate Authentication entry user interface.
- Improved the performance of Technologies pages
FIXES
- Removed the “SSO Email” field requirement for new member invitations on accounts where SSO is not enforced
- Fixed a typo on the Bugzilla integration configuration page
- Fixed the misleading error messages received when /websitegroups/update API endpoint is called with a missing or invalid “Id” values
- Fixed a UTF8 encoding issue
This update includes changes to the internal agents. The internal scan agent's current version is 23.2.0. The internal authentication verifier agent's current version is 23.2.0
New features
- Added the Maximum 404 Signatures field to scan policies.
- Added an option to exclude issues' history from reports.
New security checks
- Added the JSON Web Tokens detected check.
- Added JWT Token Forgery through Kid by using static files.
Improvements
- Improved the JSON Web Tokens' vulnerability logic.
- Updated JWT Token Forgery check condition.
- Extended excluded header names with new headers.
- Improved the JWT Token Finder Regex in the JWT engine.
- Updated embedded Chromium browser.
- Added the permission check to download reports.
- Added a parameter (ImportedLinks) for imported links to the /scanprofiles/new API endpoint.
- Improved the global dashboard performance.
- Added records limit to avoid Out-of-Memory exceptions on reports.
- Added the link scope check for the user-controllable cookie vulnerability.
- Improved the default browser settings to be reflected in the business logic recorder (BLR).
Fixes
- Fixed an issue that caused unhandled exceptions when there is no service endpoint definition in the WSDL file.
- Fixed accessibility issue in the scan optimizer pop-up.
- Fixed special character problems in Crawled and Scanned URLs reports.
- Fixed "file in use error" while archiving scan logs.
- Fixed the OAuth 2.0 authentication problem caused by the failure to get code information and certification validation in out-of-scope links.
- Fixed missing cookies for the JSON Web Tokens attack requests.
- Fixed the text parser extension issue that caused agents stuck.
- Fixed the vulnerability family issue that caused the Hawk not to detect issues.
IMPROVEMENTS
- Improved the search for scan profiles on the Recent Scans page. Added the Scan Profile Default option to the column filters on the Recent Scans page to speed up the search for the default scan profiles.
- Improved the error messages and code returned from the updating issue API endpoint.
- Added unique IDs on the HTTP 500 Error page.
- Updated a Docker agent library to run more security checks.
FIXES
- Fixed a bug that prevents a website from being deleted if that website has tags.
- Fixed a bug that non-register users receive the Out-of-Date technology notification although these users have no website responsibility.
- Fixed a bug that shows a two-factor authentication page to some users with SSO login after their information is updated on the Team Member page.
- Fixed typo in the All Issues' page filter drop-down.
- Fixed a bug returning the 500 Error when an issue is updated.
- Fixed a bug that led to duplicated records in a member's role.
- Fixed a bug that ignored a member's time zone setting while generating a vulnerability list in XML format.
- Fixed a bug that causes the private scan policies to appear in the Scan Policy drop-down at the New Scheduled Group Scan page.
- Fixed a bug that did not convert the remaining time for the Next Execution Time of a scheduled scan properly.
This update includes changes to the internal agents. The internal scan agent's current version is 2.0.2.158. The internal authentication verifier agent's current version is 2.0.2.158.
Improvements
- Added auto responder for images to escape the onerror issue.
Fixes
- Fixed the agent stuck issue when the scan timeout is detected.
- Fixed an issue that overrode TLS settings available in the scan policy when the Ignore SSL Certificate Errors is set to True in the Appsetting.json file.
Improvements
- Improved the scan deletion process.
- Improved the authentication agent to carry out any stepped authentication, such as first Form Authentication then OAuth2.
- Added filter for discovered websites via AWS connection.
- Enabled regex case sensitivity for attack payloads.
- Updated Boolean NoSQL / SQL Injection attack payloads.
Fixes
- Fixed PCI Report generation error when selecting a specific group.
- Fixed the issue that prevents users from saving the scan profile when the Is Regex checkbox next to the Excluded Path field is selected on the URL Rewrite page.
- Fixed the timezone problem on the Knowledge Base Reports.
This update includes changes to Internal Agents.
FEATURE
- Added Authentication Profiles feature to be able to define shared authentication once and utilize them on many scans without explicitly configuring Form Authentication for websites utilizing the same authentication procedure.
IMPROVEMENT
- Added support for importing links from multiple RAML files from a ZIP file (include directive support).
- Improved Azure AD Single Sign-On in-app help text.
- Removed the Current Password field for admin users (logged in with SSO) while editing a member.
- Added “Maximum URL Rewrite Signature” Scan Policy Crawling option.
FIXES
- Fixed an error that occurs while trying to mark an issue as false positive.
- Fixed an internal server error that happens while using the /api/1.0/scanprofiles/update API endpoint for some profiles.
- Fixed an issue where a deleted issue tracker integration was still keeping the old issues IDs referenced.
- [INTERNAL AGENT] Fixed an issue where the helper NHS service is unexpectedly terminated on environments with multiple agents running.