Invicti Enterprise On-Demand
This update includes changes to the internal agents. The internal scan agent’s current version is 24.3.1. The internal authentication verifier agent’s current version is 24.3.1.
New features
- Provided a new encryption method of API Token for Agent/Verifier Agent
- The CVSS 4.0 scores are now available via API
- A new feature to make the Discovery settings more precise - ability to include/exclude main level domains - reached Early Access for selected customers
- The pre-request script will now have the capability to generate AWS signature tokens to perform authentication
New security checks
- Added a new security check for TLS/SSL certificate key size too small issue
- Added a new security check for CVE-2023-46805 / CVE-2024-21887
- Added a new signature for Stack Trace Disclosures (ASP.Net)
- Added a new security checks for Client-Side Prototype Pollution
- Added a new Security Check that allows to report two vulnerabilities: TorchServe Management API Publicly Exposed and TorchServe Management API SSRF (CVE-2023-43654)
- Command Injection in VMware Aria Operations for Networks can now be detected
Improvements
- Improved WP Config detection over backup files
- Report template of Possible XSS is updated to cover mime sniffing
- The Agent type (Arm or Intel) information is displayed on the Scan Summary page
- The Permissions on the General Settings screen are now grouped by category rather than listed without being categorised
- A feature allowing the enabling or disabling of the JavaScript Parser has been added, facilitating JavaScript parameter discovery within the JavaScript code
- Fixed the issue where the Jenkins plug-in sent requests directly to the default gateway instead of routing them through the proxy
- The Team Administrator role checkbox is now in a separate 'Limiting Permissions Role' section
Fixes
- Disabled the BREACH Security Engine
- Increased the default Severity level of Version Disclosure (Varnish) from 'Information' to 'Low'
- Fixed the issue where users were unable to load the Scan Report
- Fixed the issue where Internal Scans were not failing if their Agents were terminated
- Fixed the Azure Boards integration, which was reported to have been suspended by itself
- Fixed the issue where the customer couldn't scan their target with the additional website properly
- Fixed query optimization on the main Scans page, resulting in improved response time and query quality
- The page number in the Custom Script Editor is now correctly displayed
- When the Token is expired, the Azure Boards Integration is disabled
- Fixed concurrency exceptions occurring for the scan and website tables due to excessive update requests sent within a short timeframe
- Fixed the inability to export a scan from Invicti Standard to Invicti Enterprise
- The Issues counter on the Dashboard now displays the correct number of issues
- Fixed the inability of the custom script editor to load the form authentication fields
- Fixed an issue when Team Administrator and Account Owner role are assigned to the same user
This update includes changes to the internal agents. The internal scan agent’s current version is 24.3.0. The internal authentication verifier agent’s current version is 24.3.0.
New features
- ServiceNow Application Vulnerability Response integration is now available in the ServiceNow store
- Added the ability to force authentication verifier agent to use incognito by default on Chromium browser
New security checks
- Added detection for ActiveMQ RCE to the OOB RCE Attack Pattern (CVE-2023-46604)
Improvements
- Improved ServiceNow Vulnerability Response integration
Fixes
- Fixed the error in the API's websites/update function
- Removed logos and brand names from the Detailed Scan Report display
- The API now correctly assigns the appropriate scan profile when updating the periods of scheduled scans
- Fixed the hyperlink to the Release Notes within the application
- Upgraded Microsoft.Owin package to version number 4.2.2
- Fixed null character error in JIRA integration when sending issues
- Fixed the system to halt subsequent tests if a scan is aborted from Jenkins
- Scan policies can now be updated with proxy passwords directly through the API
- Fixed GUI and API login dates to synchronize seamlessly
- Added Cookie Source field to the Knowledge Base Cookies screen
- The CSV export for user lists now includes all attributes that have been selected
This update includes changes to the internal agents. The internal scan agent’s current version is 24.2.0. The internal authentication verifier agent’s current version is 24.2.0.
New security checks
- Implemented a detection and reporting mechanism for the Backup Migration WordPress plugin (CVE-2023-6553)
- Added detection for TinyMCE
Improvements
- Updated the "Insecure Transportation Security Protocol Supported (TLS 1.0)" vulnerability to High Severity
- Implemented support for scanning sites with location permission pop-ups
- Implemented support for FreshService API V2
- Revised the labeling of the active vulnerabilities information on the Scan Summary page to provide greater clarity
- Removed obsolete X-Frame-Options Header security checks
Fixes
- Fixed a bug in the Request/Response tab of Version Disclosure vulnerabilities
- Corrected an issue in the technical reports where vulnerabilities identified in Korean are now reported in English
- Changed the ID parameter from 'optional' to 'required' within the Scan Policy Update API
- Removed the target URL from the scope control list
- Resolved a bug in the filtering of vulnerabilities on the Issues page
- Fixed a bug in the marking of issues as a false positive
- Resolved an issue where the agent would become unavailable after receiving a 401 error
- Fixed the issue with uploading a Swagger file into a scan profile
This update did not include changes to the internal agents.
Improvements
- Added new '/issues' endpoint to return all issues with sorting and filtering options
Fixes
- Fixed an issue that prevents Scheduled Scans to be updated and Scan results to be imported from Invicti Standard
This update includes changes to the internal agents. The internal scan agent’s current version is 24.12.1. The internal authentication verifier agent’s current version is 24.12.1.
New Features
- A connector for Mend SCA now available
Improvements
- Added new paths to forced browsing
- Updated the vulnerability template for the Internal Server Error vulnerability
- Improved Insecure HTTP Usage detection
- Improved retry operations to prevent JSONSerializer errors following archiving failures
- Removed support email addresses from the product
- Removed cancelled and failed scans after 90 days
Fixes
- Fixed an issue in Mulesoft integration where child organizations were not syncing properly
- Fixed an issue with ServiceNow integrations causing authentication errors by suspending the affected integrations
- Fixed an issue where JSON responses were incorrectly formatted
- Fixed an issue where scans failed with a "Failed - Agent is unavailable" error at the end of the scan
- Fixed an issue where Invicti detected vulnerabilities in multiple parameters of the same URL but didn't report them due to the vulnerability family mechanism
This update includes changes to the internal agents. The internal scan agent’s current version is 24.12.0. The internal authentication verifier agent’s current version is 24.12.0
New Features
- API Discovery now supports retrieving Open API/Swagger specs from Kong Konnect → Learn more
New Security Checks
- Added detection of Google Tag Manager as a technology in the Vulnerability Database (VDB)
Improvements
- Enhanced security to prevent customer login information from being written in clear text
- OpenSSL configuration (openssl.cnf) updated for Docker compatibility
- Added new filter in Recent Scans page for Agent Mode in order to distinguish between Internal and Cloud agents
- Revised field descriptions in the Swagger model documentation to accurately reflect the use of the RequiredIf attribute
- Improved analysis and remediation capabilities for [Possible] Server-Side Template Injection vulnerabilities
Fixes
- Resolved a breaking change in .NET 8's System.Net.Security.UseManagedNtlm by upgrading from Ubuntu 22.04 to Ubuntu 24.04, where the issue was addressed. The Agent was updated to .NET 8.
- Fixed an issue where Retest-type scans did not identify the same vulnerabilities detected during full scans
- Fixed high CPU usage in some agents caused by Chromium
- Scans attempting to run with Agent Group without any agents will result correctly in failure instead of queue
- Fixed an issue that was preventing users from accessing a Scan Policy
- Fixed an issue where the Misconfigured Access-Control-Allow-Origin Header vulnerability was not detected
- Improved detection of the [Possible] Password Transmitted over Query String vulnerability
This update includes changes to the internal agents. The internal scan agent’s current version is 24.11.0. The internal authentication verifier agent’s current version is 24.11.0
New Features
- API Discovery now supports working with RAML specs from Mulesoft Anypoint Exchange
New Security Checks
- Added a check for applications performing certificate name validation to prevent reading invalid memory addresses (CVE-2024-6119)
Improvements
- Updated the AuthVerificationService from .NET 6.0 to .NET 8.0
Fixes
- Fixed an issue with missing links in imported files that were sent from the API Inventory to the agent
- Fixed an issue where target names longer than 40 characters were not being truncated as expected on the Create New Target page
- Fixed an issue where the "Download HTTP Request Logs" button triggered an error while a scan was in progress
- Fixed an issue where user names containing the character "ä" could not be added
- Fixed an issue with the scan data retention period for raw scan files that was not working as expected
- Fixed missing scan completed notifications with report attachments
- Fixed an issue where adding more than one name to a Notification's Excluded Recipients would remove the other users from all other notifications
- Fixed an issue where the verifier agent could not read or apply custom proxy settings from the appsettings.json file
- Fixed an issue where uploading a .proto file caused a "No links found in the file" error
- Fixed missing request/response details for some out-of-band vulnerabilities
This update includes changes to the internal agents. The internal scan agent’s current version is 24.10.1. The internal authentication verifier agent’s current version is 24.10.1.
New Security Checks
- Added detection for multiple JavaScript libraries
- Added detection for Masa CMS (CVE-2022-47002 and CVE-2021-42183)
Improvements
- Changed the Mend integration to utilize an activation key so that the setup process is simpler
Fixes
- Vulnerability profiles that are set as hidden will now still be reported in the scan reports of scans completed prior to the vulnerability being hidden
- Fixed a bug in the editing of scan profiles with custom report policies
- Resolved an issue in the exporting of team member data with all attributes selected
- Resolved an issue with missing vulnerability profiles in custom report policies
This update includes changes to the internal agents. The internal scan agent’s current version is 24.10.0. The internal authentication verifier agent’s current version is 24.10.0.
New Features
- API Security: Added integration with Azure API Management to fetch Swagger2 and OpenAPI3 specification files → Learn more
New Security Checks
- Updated detection for ActiveMQ - Remote Code Execution (CVE-2023-46604) and TorchServe Management API SSRF (CVE-2023-43654)
Improvements
- Database optimizations
- Changed scanning without a duration limit to a customer support request-only option
- Reporting improvements for the “Unknown Option Used In Referrer-Policy” vulnerability
- Improved the behavior of the 'Recent Scans' button group on the global dashboard when using the mobile view
Fixes
- Fixed a timeout bug in zero-configuration API discovery
- Fixed some wording inconsistencies and other minor improvements to the user interface
- Removal of sitemap data when a scan is canceled, failed, or aborted
- Resolved an issue in the General Settings page configuration
- Resolved an issue with user sessions not timing out in compliance with the specified configuration
- Fixed a false positive issue with Boolean Based MongoDB Injection detection
- Out-of-date version for Boolean Based MongoDB Injection is now reported correctly
- Fixed missing API validation for Scan Profile updates, which caused data conflicts during website deletion
This update includes changes to the internal agents. The internal scan agent’s current version is 24.1.1. The internal authentication verifier agent’s current version is 24.1.1.
New features
- Added the option to remove Request/Response details from the detailed template to avoid the character limit error when sending vulnerabilities
- Added the option for customers to display their company name on the PCI report (new scan settings field under General settings)
- Enabled the ability to re-scan a previously scanned target which allows the application of previous exclusions on the scan and helps avoid false positives on the PCI ASV scan
- Added the option to enable enhanced logging of failed logins
- Added functionality to the UI for users to obtain logs from failed scans (previously only system administrators were able to do that)
New security checks
- Added a check for dotCMS
- Added a check for the Ultimate Member WordPress plugin
- Added a new mXSS pattern
- Added new signatures to detect JWKs
Improvements
- Improved the recommendations for the Weak Ciphers Enabled vulnerability
- Improved detection of swagger.json vulnerabilities
Fixes
- Fixed a bug in the cloning report policies functionality
- Fixed an error that was occurring with the API endpoint: list-scheduled
- Fixed a bug with the Jira integration
- Fixed a bug with custom scheduled scans that were not updating the Next Execution Time field correctly
- Fixed an issue with the HashiCorp Vault integration token validation path
- Fixed the missing 'Known Issues' tab from scan summary issue details
- Fixed an issue with the severity trend chart on the Dashboard
- Fixed a problem with importing WDSL files
This update includes changes to the internal agents. The internal scan agent’s current version is 24.1.0. The internal authentication verifier agent’s current version is 24.1.0.
New features
- Added notifications about agent disk full issues for easier navigation and to prevent scan errors
- Added an option to the Jenkins plugin to cancel the scan started by the plugin if the Jenkins build is aborted
Improvements
- Improved reporting of DOM XSS vulnerabilities
Fixes
- Fixed an issue with removing the client certificate via API
- Fixed an inconsistency for PCI results between the Invicti UI and the PCI DSS detailed report
- Fixed a bug that was causing scan session files to fail when loading
- Fixed inconsistencies with the 'average time to fix' table on the dashboard
- Fixed an issue with the import of scan data from Invicti Enterprise to Invicti Standard
- Fixed an issue with the form verifier not using the new scan policy until the scan profile is saved
- Added a custom detailed scan report
- Fixed a bug in the importing of links
- Fixed an error that was occurring when setting an issue as Accepted Risk
- Resolved issues with importing API documentation from a link
- Resolved issues with the Authentication Verifier and Agent.db file corrupting after update
- Fixed a bug in the Jenkins plugin that was causing the 'Stop The Scan When Build Fails' option to not work correctly
Important note
- Customers currently using version 23.7.0 on Windows running internal agents will need to perform additional steps in order for this update to run successfully in their environment. Affected customers have been contacted directly with more information.
New features
- Added the option to set a Custom HTTP Authorization Header under Scan policy > HTTP > Request
- Adjusted agent download parameters to allow installation of internal scanner agents using docker client via Invicti registry service
- Changed compression tool from 7zip to Tar
New security checks
- Added new patterns to detect XSS
Improvements
- Improved detection and reporting of File Inclusion vulnerabilitiesÂ
- Improved detection and reporting of Sensitive Data Exposure vulnerabilities
- Improved detection and reporting of Dockerfiles
Fixes
- Fixed incorrect reporting of outdated technology versions
- Fixed a bug that was preventing reports from being savedÂ
- Fixed an issue that can cause too much browser user data to be left in the temp folder