Invicti Enterprise On-Premises
New features
- LDAP Integration: Permanently enabled LDAP integration for on-premise WebApp installations by removing its associated feature flag. LDAP functionality is now available by default
- Added Post-Request Script feature (Read more)
- Added API GET method to retrieve scheduled scans by ID
Improvements
- Updated plugin dependencies to address known security vulnerabilities and improve overall stability; upgraded Jenkins compatibility to version 2.474
- Increased the timeout duration for IAST responses to prevent premature failures
- When user roles changes details are now available on Activity Logs
- Jenkins Plugin: Corrected misleading UI validation for the “Report Type” parameter within the “Netsparker Enterprise Scan” build step. The field no longer incorrectly appears as required, clarifying its optional nature
- Added validation to ensure base scan file existence before initiating Incremental or Retest scans, preventing potential scan failures due to missing dependencies
- Improved design of Authentication Verifier Service page
- Added support for configuring the temp file via appsettings.json or an environment variable
- Updated workflows to improve reliability and security while maintaining alignment with GitHub’s best practices
- Updated the Jenkins plugin script generation to use the latest GitHub Actions versions and ubuntu-latest runner for improved compatibility and security
- Addressed multiple versions of GitHub Actions available in the marketplace
- Improved incremental scanning
- Implemented an enhancement to capture the token information present in the response during the OAuth2 Implicit Flow
- Added new REST API endpoint (agents/listverifiers) to retrieve AV agents data
- Implemented an enhancement to enable more effective cookie management when HTTP/2 is enabled
- Updated Microsoft.OpenApi to version 2.0 preview to support OpenAPI 3.1.0 for improved API scanning
- Agent and Verifier download names now come in certain format
- Minor security patch for the Authentication Verifier service
- Improved suspend mechanism in JIRA integration
Resolved issues
- An improvement has been made to allow multiple secrets to be used simultaneously within a single custom header
- File Uploads: Expanded the allowed MIME types for ZIP file uploads to include application/zip and application/x-zip. This resolves issues where ZIP files uploaded from certain operating systems (e.g., Mac/Linux) were not recognized due to variations in reported MIME types
- Resolved an issue where duplicate X-Content-Type-Options headers triggered false missing header reports
- Resolved discrepancy between API (listByWebsite) and UI (Recent Scans) results
- Fixed an issue with verifying the existence of links in the link pool
- Resolved an issue where SSL certificate chain errors blocked UI or auto-update of Internal Verifier Agents on Linux
- Implemented logic to create the UserDocumentsDirectoryPath when it doesn't already exist
- Added support for defining headers and HTTP method during CSV import
- Resolved an issue where multiple versions of Next.js were not properly displayed in the Technologies dashboard and Scan Reports
- Added a note for values requiring wrap-around quotes in API
Notes for Verifying the Hash Value for Package Integrity in Invicti Enterprise On-Premises
The hash value for the "25.7.0.zip" file is provided below. You can verify the integrity of the file by checking its hash value using one of the outlined methods:
Release Package Hash Value: 2329F1F9F3E23D25AB8CAD4194F4CFBE0C98EBF411D9658A773D285A1931EAE4
Methods to Verify the Hash Value:
PowerShell (Windows):
Get-FileHash -Path "25.7.0.zip" -Algorithm SHA256Command Prompt (Windows):
certutil -hashfile "25.7.0.zip" SHA256Linux or macOS:
sha256sum "25.7.0.zip"
New features
- Implemented webapp for secure storage and retrieval of passwords for Pre-Request scripts
- Added an integration for NTA with NGINX (Read more)
Improvements
- Implemented default limit setting to 1000 without flag for all fields except Second Level Domains
- Implemented custom field Parent option in integration with Azure Boards
- Implemented agent for secure storage and retrieval of passwords for Pre-Request scripts
Resolved issues
- Resolved an issue on the Technologies Dashboard
- The 'Tags' filter in All Issues now works correctly when using the 'Not Contains' condition
- Resolved issue where no results appeared when filtering the target list on the Target Group page. This was linked to the 'View Target List' permission
- Resolved communication issues in the TestBasicAuthCredentials process and improved HTTP connection handling
- Resolved an issue where not all attributes were exported correctly from the Issues page
- Fixed an issue with Bad Request Response on Scan Summary
- Fixed naming issues of WordPress plugin Contact Form 7
- Fixed the issue of LoginRequiredUrl and Pre-Request script requests causing bottlenecks in HTTP requests
- Fixed an issue that unnecessarily included the code parameter in OAuth2 authorization requests
- The scanning engine now correctly processes merged request headers received from browser
- Resolved an issue where scans using cloud agents would occasionally fail after extended runtimes with an "agent unavailable" error
Notes for Verifying the Hash Value for Package Integrity in Invicti Enterprise On-Premises
The hash value for the "25.5.0.zip" file is provided below. You can verify the integrity of the file by checking its hash value using one of the methods outlined above:
Release Package Hash Value: F89BE5A51ACC8F1AC6AAE11A620B95B208FE26C9F128FCA297A65E45796E7C61
Methods to Verify the Hash Value:
PowerShell (Windows):
Get-FileHash -Path "25.5.0.zip" -Algorithm SHA256Command Prompt (Windows):
certutil -hashfile "25.5.0.zip" SHA256Linux or macOS:
sha256sum "25.5.0.zip"
New features
- Added an option to prevent reopening Issue Tracker issues when a vulnerability is marked as False Positive and later revived (Read more).
- Added the ability to reset the issue state to its default
Improvements
- Requests with empty or default values are not sent to DeepInfo
- Introduced a new setting under the Account General settings, within the Data Privacy and Security section, to modify the X-AMZ-Expires parameter while downloading the scan data
- Enhanced the "Configure New Agent" page to include additional details for auth verifier agents (Read more)
- Updated remediation details for outdated AngularJS versions
- [BREAKING CHANGE]: Updated the Docker agent's compression method and file extension; ensure any automation or scripts referencing the old format are updated accordingly.
- Enhanced the locally hosted web app in isolated networks to prevent unnecessary rerouting through Google reCAPTCHA
Resolved issues
- Fixed an issue where the Issue note field could not be updated
- Fixed inefficient algorithmic complexity in DotNet IAST Sensor
- Resolved the issue where an invalid character response occurred when attempting to add a user
- Resolved the "Invalid Target URI" error that occurred when editing the Target URI to end with multiple slashes (///) on the new scan page
- Resolved the issue where the scan profile was not updating with the support account
- Fixed restrictions for JIRA integration
- Fixed an issue where pressing "Enter" instead of clicking the "Check" button during password verification triggered a full scan instead of the intended login verification
- Updated Chromium and Node.js versions, resolving Chromium-related issues, including the unexpected increase in Chromium count
- Exclude URL rules now function correctly even when the excluded URL is the target
- Fixed an issue with retrieving OAuth2 token data from JSON responses
- Fixed an exception caused by an invalid Target URI in scheduled scans
- Fixed an issue where proxy credentials were not encrypted when launching InvictiProxy
- Fixed inconsistent styling in the report policy, ensuring uniform formatting in the vulnerability profile sections
Notes for Verifying the Hash Value for Package Integrity in Invicti Enterprise On-Premises
The hash value for the "25.4.0.zip" file is provided below. You can verify the integrity of the file by checking its hash value using one of the methods outlined above:
Release Package Hash Value: 0DA0E72DE19A6ABE85BCF9B5E659C5776F8FE11700F06D3214B1993C6334A0E5
Methods to Verify the Hash Value:
PowerShell (Windows):
Get-FileHash -Path "25.4.0.zip" -Algorithm SHA256Command Prompt (Windows):
certutil -hashfile "25.4.0.zip" SHA256Linux or macOS:
sha256sum "25.4.0.zip"
New features
- Added support for encrypting proxy credentials settings in the agent appsettings.json file
Improvements
- Improved technology version detection from URI
- Scheduled group scans will be initiated in chunks when exceeding 500 websites
- The SelfDisable command is no longer sent to the Agent when its state is updated to Disabled.
- Fixed the issue to enable compatibility with the latest version of GitHub Actions
- Scheduled scans now remove the URL path after ‘#’ when using the default Scan Profile
- Added a loading state for the Export CSV button to prevent multiple clicks
- Improved multiple technology reporting on the same location.
- Improved signatures for Axios and PrototypeJs detection.
- Upgraded 3rd party script libraries
- Updated OpenSSL from version 3.3.1 to 3.3.2
- Added AttackUsage to DOM XSS Patterns
- Updated the Splunk Python SDK for the Splunk Plugin to ensure compliance with the latest Splunk Vetting Policy
- Improved value filling in GraphQL queries
Resolved issues
- Fixed an issue where the agent was duplicated on premises when using a cloud provider
- Fixed an issue where "Test Scripts" under Form Authentication in a scan profile failed to load responses
- The Validate Imported Links API endpoint no longer requires a Target URL when a file is uploaded
- Fixed an issue where changing the website associated with a profile disrupted the settings, configurations, and scan tasks
- Fixed an issue where past scans would not load in Invicti Standard 25.1
- Fixed sorting issues in the dashboard to use numerical order instead of alphabetical
- Fixed an issue where an insecure deserialization vulnerability in Invicti scan files could allow the execution of arbitrary code upon scan import
- Fixed an issue where 'LaunchInstance' errors caused GUIDs to be stored instead of AWS-generated instance IDs in the database
- Fixed an issue that caused the Mend vulnerabilities to be reported with incorrect severity
- Fixed the issue which was causing exports from Invicti Standard to Invicti Enterprise On-Premises to fail
- Resolved an issue where LDAP synchronization would fail if a group member was missing an email address; the member is now skipped in such cases
- The issue preventing the use of the Chromium Extension in Scanner and Verifier Agent has been resolved
Notes for Verifying the Hash Value for Package Integrity in Invicti Enterprise On-Premises
The hash value for the "25.3.0.zip" file is provided below. You can verify the integrity of the file by checking its hash value using one of the methods outlined above:
Release Package Hash Value: E51A9053B751AA6247D684AC89F2F382E0029D506ECC2C0C71BB0C6BC3F81DD2
Methods to Verify the Hash Value:
PowerShell (Windows):
Get-FileHash -Path "25.3.0.zip" -Algorithm SHA256Command Prompt (Windows):
certutil -hashfile "25.3.0.zip" SHA256Linux or macOS:
sha256sum "25.3.0.zip"
New Features
- Added single-tab crawling for websites that do not allow multiple-tab browsing
- Upgraded the Shortcut integration API endpoint to v3
Improvements
- Added Customizations folder to the Agent Output folder
- Removed Feature flag and implementation for ‘INV-5855-HashiCorp-Vault-TLS-certificate-authentication-support-enabled’ flag
- Improved the performance of searching by profileName on the Scan-Index page
Resolved issues
- Updated APIHub npm package to the latest version
- Resolved scan authentication issues for multiple pages
- Resolved issues related to screenshots and login processes
- Fixed Dashboard Widget Active Issue is empty when selecting a specific target
- Fixed the problem of reverting vulnerability in issue update endpoint to default
- Fixed removes preferred agent group in update-scheduled API endpoint
- Fixed an auto-update issue for Verifier Agent
- Added control for URLs that should not be included in the scope
- Upgraded the Shortcut (Clubhouse) integration
- Resolved an issue caused by the Chromium version update by updating Chromium dependencies for the Linux operating system. Refer to the updated scripts to install the required dependencies for Headless Chrome. (Read more)
Notes for Verifying the Hash Value for Package Integrity in Invicti Enterprise On-Premises
The hash value for the "25.2.0.zip" file is provided below. You can verify the integrity of the file by checking its hash value using one of the methods outlined above:
Release Package Hash Value: DB85D47E9796F0366B0AC8F3AA8F61FA7200C248B2D05DB6EED76BCA28C8D9F1
Methods to Verify the Hash Value:
PowerShell (Windows):
Get-FileHash -Path "25.2.0.zip" -Algorithm SHA256Command Prompt (Windows):
certutil -hashfile "25.2.0.zip" SHA256Linux or macOS:
sha256sum "25.2.0.zip"
You can use any of the above methods to verify the hash value and ensure the integrity of the "25.2.0.zip" file.
New Features
- Clicking on the scheduled scan icon in the scan summary screen now redirects you to the Recent Scans page with a filtered view, improving navigation and access to relevant scan details
- Implemented an integration that automatically retrieves the latest Container security results from Mend when a DAST scan is initiated
Improvements
- Added a feature flag for enabling unlimited scan duration in On-Premise deployments
- Fixed an issue on the 2FA page where the code text field was not automatically focused upon page load
- Introduces a configurable retention period for HTTP log files, allowing Root users to specify the number of days before log
- Implemented a restriction to prevent the modification of the Vulnerability Signature Type
- Enhanced the UI to highlight the menu when API Hub specifications are linked to a scan profile, making it easier for users to identify associated profiles
- Updated Chromium from version 121 to version 131 for enhanced performance and compatibility
- Enhanced detection accuracy for Weak Ciphers Enabled by analyzing false positives
- Administrators can now assign Agent Groups to Teams for greater control over agents and the teams that can use them. Learn more.
Resolved issues
- Corrected OTP configuration attachment to personas, ensuring separate secrets and preventing shared changes
- Resolved issue where the internal agent service stopped after being disabled in the UI. The service now remains active even when the agent is disabled from the web application
- Resolved an issue where statistics were not displaying correctly after v24.11.0 update.
- Updated the SharedAssemblyInfo file to reflect the correct copyright details
- Fixed an issue where a disabled scan was inadvertently running, leading to an outage
- Fixed a bug where users were unable to update the website name longer than 40 characters
- Fixed an issue where the Invicti REST API did not return errors when importing an invalid definition file
- Resolved the “Internal Server Error” encountered on the Invicti scans/report API endpoint after enabling the “Prevent any sensitive information showing within the product” setting
- Fixed an issue where the issue state was inadvertently removed when a user, without permission to update the state, added a note to the issue
- Fixed an issue where the "Notification Settings" hyperlink in notification emails was redirecting incorrectly
- Resolved the issue where the Agent Verifier was encountering errors when using certificates in a Linux environment
- Fixed an issue where duplicate tickets were being created in ServiceNow due to integration error
- Fixed an issue where the severity trend chart was not rendering correctly on the individual website dashboard
- Node.js v6 has reached its End of Life (EOL), and support for this version has been removed from Azure Pipelines
- Resolved a coverage issue where the login page reappeared during scans
Notes for Verifying the Hash Value for Package Integrity in Invicti Enterprise On-Premises
The hash value for the "25.1.0.zip" file is provided below. You can verify the integrity of the file by checking its hash value using one of the methods outlined above:
Release Package Hash Value: D4ADFE2A0CBA752C87234DB3F3608D6F7DC9365CA2005684087A328991CB2F0D
Methods to Verify the Hash Value:
PowerShell (Windows):
Get-FileHash -Path "25.1.0.zip" -Algorithm SHA256Command Prompt (Windows):
certutil -hashfile "25.1.0.zip" SHA256Linux or macOS:
sha256sum "25.1.0.zip"
You can use any of the above methods to verify the hash value and ensure the integrity of the "25.1.0.zip" file.
New Security Checks
- Added detection for Jenkins Secret as a Sensitive Data Exposure
Improvements
- API Discovery: changes to the setup configuration for the Invicti Network Traffic Analyzer
Fixes
- Fixed an error that was occurring when editing Report Policies
- Fixed the WMI spiking issue that was causing CPU 100% problems
- API Discovery: in certain cases, discovered APIs from Apigee were not properly shown
- Fixed the issue where the ServiceNow Integration fields were not loading while editing the integration
- Fixed the issue where clicking the clone button in the Jira integration incorrectly redirected to the create new integration page
- Fixed Chromium related issues in the agent
- Corrected the description of the "api/1.0/scans/test-scan-profile-credentials" endpoint
- Fixed the error when selecting a custom time period in the Dashboard Date Range
- Fixed the issue where temp folders could not be deleted and Chromium instances remained open when Puppeteer encountered an error
- Fixed the display issue on the Scan Summary page
- Fixed the false positive on detection of "Stack Trace Disclosure (Java)"
- Fixed a scan authentication issue and reduced latency
- Fixed the issue that was preventing the download of detailed PCI reports
- Fixed an issue related to the Moment.js regex
- Updated the OpenSSL configuration on the Cloud AMI
- Fixed the disk space issue in the Invicti Common folder
- Fixed the automatic syncing of issues with Jira integrations
- Fixed the issue where scans were failing due to a TLS connection not being established
- Fixed the OIDC authentication issue
- Fixed the issue where the REST API endpoint returned HTTP 400 instead of HTTP 200 when sending custom values
- Fixed the issue preventing proper login to the target URL
This release is currently only available on request.
New Features
- Invicti API Security: multi-layered API discovery to enable comprehensive identification of known and undocumented APIs → Learn more
New Security Checks
- Added a check for Authentication bypass in Fortra’s GoAnywhere MFT (CVE-2024-0204)
- Added a check for Open SSH server RCE (CVE-2024-6387)
- Added a check for cached pages that contain sensitive data (CWE-525)
- Incorporated the reporting of sensitive information disclosures from Okta
Improvements
- Added custom header support for SSRF registration
- Added a toggle to the Recent Scans widget on the Targets Dashboard to switch between displaying the target name and target URL
- Added the option to select the Agent mode when importing targets
- Added an option to filter by Agent Name on the Recent Scans screen
- Added more links from the global dashboard widgets to the corresponding sections in the UI
- Scheduled scans that repeatedly fail with the same result can now be automatically disabled
- Unlinked API specs from the scan profile automatically unlink on the API Inventory page as well
- Added the ability to navigate from the API operation vulnerability count in the API Inventory to a filtered list of vulnerabilities on the Issues page
- Reverted the fix for a problem in the JWT Engine that was intended to resolve a false positive issue
Fixes
- Fixed an issue related to Agent Selection and Preferred Agent Group settings
- Fixed an error occurring with valid requests to schedule a scan via the profile endpoint
- Fixed an issue where scan reports attached to emails could not be opened
- Fixed an issue where changing vulnerability details in the Report Policy deleted some information from the vulnerability
- Fixed an issue where scan summary reports were not accessible in the UI
- Fixed an issue where users were unable to remove URLs from Website Groups
- Fixed an issue where users were unable to create both HTTP and HTTPS for the same endpoint
- Fixed an issue where clients with limited access and custom roles were seeing all notifications for all users and websites in a target website’s dashboard
- Fixed an issue related to BLR links
- Fixed an issue where the scan was not displaying all the URLs in the sitemap
- Fixed an SSL Untrusted Root Certificate issue for scans conducted with the OpenShift agent
- Fixed an issue that was causing intermittent errors in PCI reports
- Fixed the ‘Bad Request’ error that was occurring in the vulnerability details of scan reports
- Fixed an issue where the character ‘ñ’ was causing errors when updating or adding new users
- Fixed the issue that was preventing the deletion of unused scan policies
- Fixed the issue where additional website vulnerabilities were being stored as target vulnerabilities
- Fixed the missing tooltips for source errors on the API Discovery Sources page
- Fixed the issue where the linked target URL was clickable even when the API specification was hidden
New Features
- Share Usage Analytics: New option to share anonymous diagnostics and usage data with Invicti and our analytics partner, Pendo
- LDAP Service: New settings enable administrators to manage LDAP server configurations (available for select customers)
- Added custom headers for communication between Agents and Invicti Hawk
- Added a warning message when creating scan targets for websites that do not have a hostname mapped to an IP address
New Security Checks
- Added detection for supply chain attacks through Polyfill JS
- Added detection for GeoServer SQLi (CVE-2023-25157)
- Added checks for various WordPress plugins
Improvements
- Renamed the ‘Websites and APIs’ menu to ‘Targets’
- Improved Credit Card Disclosure Security Check
- Set the severity of ‘Possible XSS’ vulnerabilities to ‘Informational’
- Improved various Sensitive Data Exposure security checks
- Improved detection of the Short SSL Key Length vulnerability
- Added capability to check for Sensitive Data in XML responses
Fixes
- Added OpenShift certificate permission to resolve an SSL/TLS untrusted root certificate vulnerability issue with Docker/Kubernetes agents
- Fixed a timeout issue on the global dashboard
- Fixed missing Request Body content in vulnerability details
- Fixed an issue with the selection of agent groups
- Fixed an issue with the order in which internal agent scans are initiated
- Fixed an issue with the ‘Ignore Certificate Errors’ Agent setting for SSL Validation
- Fixed a download problem with PCI reports
- Fixed an issue with the SSO login that was causing incorrect redirects
- Removed references to 3.2 in the PCI DSS Compliance scan summary
- Fixed an issue with the Azure Boards integration reopening old vulnerabilities that do not link to active issues in Invicti Enterprise
- Fixed a timeout issue that was occurring on a pre-request script
- Fixed a problem in the JWT Engine to resolve a false positive issue
- Updated vulnerable OpenSSL libraries to secure versions
- Fixed a bug in the Checkout Logout Detection so that it now chooses the same verification agent as the verification process
- Fixed an issue related to the OTA app scan
- Fixed HTTP 413 responses resulting from nonce cookies stacking
New Features
- Added functionality for scanning gRPC API Web Services → Learn more
New Security Checks
- Added detection of Fortinet vulnerabilities (CVE-2020-12812, CVE-2019-5591, CVE-2018-13379)
- Added a new attack pattern for missing Open Redirection
Improvements
- Added a "Stop The Scan When Build is Aborted" option to the Jenkins integration
- Added an option to trigger only specified lists of events
- Added a 100MB limit to the maximum total file size for imported link files
- Added an option to the GitHub Actions CI/CD integration to fail a build if a vulnerability with a specific severity is found during the scan
- Added a Y-axis to the Severity Trend graph in the dashboard
- Updated all the IAST Sensors: .NET Framework and .NET Core 6.2.0, Java 16.0.0, Node.js 2.1.3, PHP 8.0.1
- Adjusted the behavior of the website matching option in the Discovery Settings to remove 2nd level domain matching in order to improve the relevance of discovery results
- Added a new option to the Discovery Match Settings (enabled by default) to only show discovery results that have an IP address. This change is intended to prevent the consumption of licenses on targets that cannot be scanned due to the lack of an actual IP address.
- Updated to the latest Chromium version to improve security and performance → Learn more
- Updated the summary information of the PCI compliance report
- Added the OpenShift Docker Agent to the public repository
Fixes
- Fixed a bug in the user timeout session setting
- Resolved an issue with the frequency of out-of-date technology email notifications
- Removed email notifications for out-of-date technologies in failed scans
- Fixed an issue that was causing scans to be stuck in an async archiving state
- Fixed a bug in the automatic sign-out functionality when the session timeout period has expired
- Fixed an issue in the detection of the 'Improper XML parsing leads to Billion Laughs Attack' vulnerability
- Fixed a bug in the Service Now Integration
- Fixed the issue that was causing activity logs to display incorrect owners of failed scans
- Fixed an issue with user-agent selection in scan policies that was causing disabled security check vulnerabilities to appear in the dashboards and scan reports
- Fixed an issue that was causing the agent to not send a heartbeat and become unavailable while archiving and uploading scan results
- Fixed the issue that was preventing updates made in Azure Boards from reflecting in Invicti Enterprise
- Fixed vulnerabilities with the Invicti Scan Agent Docker image
- Fixed the disk space utilization issue that was causing the InvictiCommon folder size to increase significantly during scans
- Resolved an issue with the Business Logic Recorder
- Improved the crawling capability to allow for automatic crawling of XHR requests
- Fixed the missing technology details on the scan summary and scan report pages
- Fixed an AWS4Signer authentication issue
- Fixed the screenshot error on Linux Agents
- Updated the advanced installer files to fix an issue with scanners and verifiers disappearing during the update process
- Fixed an error that was preventing PDF reports from opening
- Updated the installation wizard
New features
- Predictive Risk Scoring – prioritize your web asset discovery results according to their potential risk before you scan them. Learn more in our Introduction to Predictive Risk Scoring and guide to Utilizing Predictive Risk Scoring
- Enabled Korean language support
- A new API Token encryption method for Agents/Verifier Agents
- Added a pre-request script to generate AWS Signature tokens to perform authentication
- CVSS 4.0 scores are now available via API
- Added the ability to include/exclude main-level domains in the Discovery settings
New security checks
- Added detection method for Angular
- Added a new security check for Oracle EBS RCE
- Added a new security check for TLS/SSL certificate key size too small issue
- Improved WP Config detection over backup files
- Added a new security check for authentication bypass and command injection in Ivanti ICS and Ivanti Policy Secure (CVE-2023-46805 and CVE-2024-21887)
- Added detection for exposed WordPress configuration files
- Added a new security check that reports two vulnerabilities: TorchServe Management API Publicly Exposed and TorchServe Management API SSRF (CVE-2023-43654)
- Command Injection in VMware Aria Operations for Networks can now be detected
- Added a new signature for Stack Trace Disclosures (ASP.Net)
- Added a new security check for Client-Side Prototype Pollution
Improvements
- Improved AWS Secret Key ID detection security checks
- Improved Google Cloud API Key detection security checks
- Updated remediation information for Angular JS-related vulnerabilities
- Improved Boolean-Based MongoDB Injection detection method
- Updated all IAST sensors to support Java 17 and 21
- Added highlighting and verification of response status codes to the BREACH engine
- Updated the notes section of the [Possible] Cross-Site Scripting issue detail to cover MIME sniffing
- Increased the default severity level of Version Disclosure (Varnish) from 'Information' to 'Low'
- Improved WordPress Config detection over backup files
- The Agent type (Arm or Intel) information is now displayed on the Scan Summary page
- Permissions on the General Settings screen are now grouped by category rather than listed without being categorized
- Added an option to enable or disable the JavaScript Parser, facilitating JavaScript parameter discovery within the JavaScript code
- The Jenkins plugin now routes requests through the proxy
- The Team Administrator role checkbox is now in a separate Limiting Permissions Role section of the UI
Fixes
- Adjusted the settings for SSL certificate errors to resolve a scan failure 'target link timeout error'
- Fixed a bug in the automatic sign out functionality when the session timeout period has expired
- Resolved an issue with downloading HTTP request logs
- Fixed a validation error when validating Shark settings
- Fixed an issue with duplicate custom user agents that was preventing scanning
- Fixed an issue where authentication would fail when started with an Authentication profile
- Fixed an issue that caused proxy usage for Chromium even when no proxy was selected from the scan policy settings
- Fixed a scan authentication issue and a crawling issue with Cloud Agents
- Fixed the HTTP 401 forbidden response form authentication error
- Fixed an issue with the detection method for wp-admin vulnerabilities
- Fixed an error that was occurring when generating knowledge base reports
- Updated the extraction algorithm for downloaded scan files from Invicti Enterprise
- Fixed a scan issue that was producing 413 error responses
- Fixed a bug in the API Access settings
- Resolved an issue with custom severity levels that were reverting to their previous level
- Fixed a bug in the API update command for scan profiles
- Removed limits on AWS Discovery port filters
- Technologies identified during failed scans are no longer displayed
- Fixed a bug in the scan retention period settings that was causing inaccurate information in the Recent Scans list
- The Last Login Date is now aligned between the UI and the API
- Fixed an issue with the detection method for wp-admin vulnerabilities
- Fixed the issue where scan profiles could not be created through automation tools, Postman, or through the Invicti API Documentation page
- Fixed the issue with scans that were stuck in ‘Delayed’ or ‘Archiving’ status
- Fixed an issue that was occurring with the Jira Integration when the Jira URL was set as Localhost
- Fixed a scan authentication issue and a crawling issue with Cloud Agents
- Fixed an issue that was occurring when websites were added with both http and https protocols
- The scan report pdf file name now includes the time and date when it is delivered via the scan completed notification
- Fixed the 504 error that was appearing when running the Scans_NewWithProfile endpoint
- Fixed a bug that was preventing retest scans from launching
- Fixed an issue with the scan data import from Invicti Enterprise to Invicti Standard
- Fixed the HTTP 401 forbidden response form authentication error
- Fixed a scan issue that was producing 413 error responses
- Resolved a cookie use on subdomains issue that was causing a scan authentication and crawling issue
- Fixed an issue that was causing a memory issue in JavaScript Parser
- Fixed an issue with the custom script editor that was stopping it from loading the form authentication fields
- Disabled BREACH attack from the default security checks policy
- Fixed the issue where users were unable to load the Scan Report
- Fixed the issue where internal scans were not failing if their Agents were terminated
- Fixed the Azure Boards integration, which was reported to have been suspended by itself
- Fixed query optimization on the main Scans page, resulting in improved response time and query quality
- The page number in the Custom Script Editor is now correctly displayed
- When the personal access token has expired, the Azure Boards Integration is now disabled
- Fixed concurrency exceptions occurring for the scan and website tables due to excessive update requests sent within a short timeframe
- Fixed the inability to export a scan from Invicti Standard to Invicti Enterprise
- The issues counter on the Dashboard now displays the correct number of issues
- Fixed an issue when Team Administrator and Account Owner roles are assigned to the same user
New features
- Added the option to remove Request/Response details from the detailed template to avoid the character limit error when sending vulnerabilities
- Added the option to enable enhanced logging of failed logins
- Added functionality to the UI for users to obtain logs from failed scans (previously only system administrators were able to do that)
- ServiceNow Application Vulnerability Response integration is now available in the ServiceNow store
New security checks
- Added a check for dotCMS (CVE-2022-26352)
- Added a check for the Ultimate Member WordPress plugin (CVE-2023-3460)
- Added a new mXSS pattern
- Added new signatures to detect JWKs
- Implemented a detection and reporting mechanism for the Backup Migration WordPress plugin (CVE-2023-6553)
- Added detection for TinyMCE
- Added detection for ActiveMQ RCE to the OOB RCE Attack Pattern (CVE-2023-46604)
Improvements
- Improved the recommendations for the Weak Ciphers Enabled vulnerability
- Improved detection of swagger.json vulnerabilities
- Updated the "Insecure Transportation Security Protocol Supported (TLS 1.0)" vulnerability to High Severity
- Implemented support for scanning sites with location permission pop-ups
- Implemented support for FreshService API V2
- Revised the labeling of the active vulnerabilities information on the Scan Summary page to provide greater clarity
- Removed obsolete X-Frame-Options Header security checks
- Improved ServiceNow Vulnerability Response integration
Fixes
- Fixed a bug in the cloning report policies functionality
- Fixed an error that was occurring with the API endpoint: list-scheduled
- Fixed a bug with the Jira integration
- Fixed a bug with custom scheduled scans that were not updating the Next Execution Time field correctly
- Fixed an issue with the HashiCorp Vault integration token validation path
- Fixed the missing 'Known Issues' tab from scan summary issue details
- Fixed an issue with the severity trend chart on the Dashboard
- Fixed a problem with importing WDSL files
- Fixed a bug in the Request/Response tab of Version Disclosure vulnerabilities
- Corrected an issue in the technical reports where vulnerabilities identified in Korean are now reported in English
- Changed the ID parameter from 'optional' to 'required' within the Scan Policy Update API
- Removed the target URL from the scope control list
- Resolved a bug in the filtering of vulnerabilities on the Issues page
- Fixed a bug in the marking of issues as a false positive
- Resolved an issue where the agent would become unavailable after receiving a 401 error
- Fixed the issue with uploading a Swagger file into a scan profile
- Fixed the system to halt subsequent tests if a scan is aborted from Jenkins
- Upgraded Microsoft.Owin package to version number 4.2.2
New features
- Added notifications about agent disk full issues for easier navigation and to prevent scan errors
- Added an option to the Jenkins integration that stops the scan when the Jenkins build is aborted
New security checks
- RCE for Backup Migration WP plugin (CVE-2023-6553)
Improvements
- Improved reporting of DOM XSS vulnerabilities
Fixes
- Fixed an issue with removing the client certificate via API
- Fixed an inconsistency for PCI results between the Invicti UI and the PCI DSS detailed report
- Fixed a bug that was causing scan session files to fail when loading
- Fixed inconsistencies with the 'average time to fix' table on the dashboard
- Fixed an issue with the import of scan data from Invicti Enterprise to Invicti Standard
- Fixed an issue with the form verifier not using the new scan policy until the scan profile is saved
- Added a custom detailed scan report
- Fixed a bug in the importing of links
- Fixed an error that was occurring when setting an issue as Accepted Risk
- Resolved issues with importing API documentation from a link
- Resolved issues with the Authentication Verifier and Agent.db file corrupting after update
- Fixed a bug in the Jenkins plugin that was causing the 'Stop The Scan When Build Fails' option to not work correctly
Fixes
- Fixed Sqlite exception in verifier
Notes for Verifying the Hash Value for Package Integrity in Invicti Enterprise On-Premises
The hash value for the "24.12.1.zip" file is provided below. You can verify the integrity of the file by checking its hash value using one of the methods outlined above:
Hash Value: 186C51B2F5D7B6D5C1DC5B863773B49C6C5FD3F7798F52A60E325EEBB2204633
Methods to Verify the Hash Value:
PowerShell (Windows):
Get-FileHash -Path "24.12.1.zip" -Algorithm SHA256Command Prompt (Windows):
certutil -hashfile "24.12.1.zip" SHA256Linux or macOS:
sha256sum "24.12.1.zip"
You can use any of the above methods to verify the hash value and ensure the integrity of the "24.12.1.zip" file.
New Features
- API Discovery now supports working with RAML specs from Mulesoft Anypoint Exchange
- API Discovery now supports retrieving Open API/Swagger specs from Kong Konnect → Learn more
- Verifying the Hash Value for Package Integrity in Acunetix 360 On-Premises - see notes below
New Security Checks
- Added detection for multiple JavaScript libraries
- Added detection for Masa CMS (CVE-2022-47002 and CVE-2021-42183)
- Added a check for applications performing certificate name validation to prevent reading invalid memory addresses (CVE-2024-6119)
- Added detection of Google Tag Manager as a technology in the Vulnerability Database (VDB)
Improvements
- Changed the Mend integration to utilize an activation key so that the setup process is simpler
- Updated the AuthVerificationService from .NET 6.0 to .NET 8.0
- Enhanced security to prevent customer login information from being written in clear text
- OpenSSL configuration (openssl.cnf) updated for Docker compatibility
- Added new filter in Recent Scans page for Agent Mode in order to distinguish between Internal and Cloud agents
- Revised field descriptions in the Swagger model documentation to accurately reflect the use of the RequiredIf attribute
- Improved analysis and remediation capabilities for [Possible] Server-Side Template Injection vulnerabilities
- Fixed an issue with the implementation of AWS Lambda integration for HTML to PDF conversion in WebApp
- Updated field descriptions in the Swagger model documentation to reflect the use of the RequiredIf attribute
Fixes
- Vulnerability profiles that are set as hidden will now still be reported in the scan reports of scans completed prior to the vulnerability being hidden
- Fixed a bug in the editing of scan profiles with custom report policies
- Resolved an issue in the exporting of team member data with all attributes selected
- Resolved an issue with missing vulnerability profiles in custom report policies
- Fixed an issue with missing links in imported files that were sent from the API Inventory to the agent
- Fixed an issue where target names longer than 40 characters were not being truncated as expected on the Create New Target page
- Fixed an issue where the "Download HTTP Request Logs" button triggered an error while a scan was in progress
- Fixed an issue where user names containing the character "ä" could not be added
- Fixed an issue with the scan data retention period for raw scan files that was not working as expected
- Fixed missing scan completed notifications with report attachments
- Fixed an issue where adding more than one name to a Notification's Excluded Recipients would remove the other users from all other notifications
- Fixed an issue where the verifier agent could not read or apply custom proxy settings from the appsettings.json file
- Fixed an issue where uploading a .proto file caused a "No links found in the file" error
- Fixed missing request/response details for some out-of-band vulnerabilities
- Resolved a breaking change in .NET 8's System.Net.Security.UseManagedNtlm by upgrading from Ubuntu 22.04 to Ubuntu 24.04, where the issue was addressed. The Agent was updated to .NET 8.
- Fixed an issue where Retest-type scans did not identify the same vulnerabilities detected during full scans
- Fixed high CPU usage in some agents caused by Chromium
- Scans attempting to run with Agent Group without any agents will result correctly in failure instead of queue
- Fixed an issue that was preventing users from accessing a Scan Policy
- Fixed an issue where the Misconfigured Access-Control-Allow-Origin Header vulnerability was not detected
- Improved detection of the [Possible] Password Transmitted over Query String vulnerability.
- Fixed an issue with URL and port validation for the IAST Bridge on WebApp OnPrem
- Fixed a minor typo in the Slack integration documentation
Notes for IE Upgrade: .NET 6 to .NET 8
Impact
With the 24.12.0 release, Invicti Enterprise upgraded from .NET 6 to .NET 8. This upgrade may affect customers using agents on certain Linux distributions due to changes in operating system dependencies.
As a result, agents might not function correctly on unsupported versions of Linux after the upgrade.
Why Is This Happening?
Microsoft has deprecated .NET 6, and upgrading to .NET 8 is mandatory for Invicti Enterprise to maintain compatibility and support.
Solution (Customer Action Required)
Customers must verify the Linux version on which they are running Invicti Agents:
- If using Ubuntu 24.04 or higher: No action is required.
- If using RHEL 8 or higher: No action is required.
- If using an older version (Ubuntu <24.04 or RHEL <8):
- Option 1: Upgrade to Ubuntu 24.04 or RHEL 8 (or higher).
- Option 2: Disable auto-upgrade until the system is updated to a supported version.
Note
We will automatically disable auto-upgrade for affected agents. Customers should not re-enable auto-upgrade until they have upgraded to a supported version of Linux.
Notes for Verifying the Hash Value for Package Integrity in Invicti Enterprise On-Premises
The hash value for the "24.12.0.zip" file is provided below. You can verify the integrity of the file by checking its hash value using one of the methods outlined above:
Hash Value: 96320BC9F49A4851BD307ED23DE6FA6C256F967CBF1A416096382E97D4B3E8FA
Methods to Verify the Hash Value:
PowerShell (Windows):
Get-FileHash -Path "24.12.0.zip" -Algorithm SHA256Command Prompt (Windows):
certutil -hashfile "24.12.0.zip" SHA256Linux or macOS:
sha256sum "24.12.0.zip"
You can use any of the above methods to verify the hash value and ensure the integrity of the "24.12.0.zip" file.
New Features
- Integration with Mend SAST: display Mend SAST results alongside DAST results in Invicti Enterprise so you can prioritize all your application security testing fixes in one list → Learn more
- API Security: Added integration with Azure API Management to fetch Swagger2 and OpenAPI3 specification files → Learn more
- API Security now supports working with RAML specs from MuleSoft Anypoint Exchange
New Security Checks
- Updated detection for ActiveMQ - Remote Code Execution (CVE-2023-46604) and TorchServe Management API SSRF (CVE-2023-43654)
- Added detection for multiple JavaScript libraries
- Added detection for Masa CMS (CVE-2022-47002 and CVE-2021-42183)
Improvements
- Database optimizations
- Reporting improvements for the “Unknown Option Used In Referrer-Policy” vulnerability
- Improved the behavior of the 'Recent Scans' button group on the global dashboard when using the mobile view
Fixes
- Fixed a timeout bug in zero-configuration API discovery
- Fixed some wording inconsistencies and other minor improvements to the user interface
- Removal of sitemap data when a scan is canceled, failed, or aborted
- Resolved an issue in the General Settings page configuration
- Resolved an issue with user sessions not timing out in compliance with the specified configuration
- Fixed a false positive issue with Boolean Based MongoDB Injection detection
- Out-of-date version for Boolean Based MongoDB Injection is now reported correctly
- Vulnerability profiles that are set as hidden will now still be reported in the scan reports of scans completed prior to the vulnerability being hidden
- Fixed a bug in the editing of scan profiles with custom report policies
- Resolved an issue in the exporting of team member data with all attributes selected
- Resolved an issue with missing vulnerability profiles in custom report policies
New Features
- Administrators can now assign Agent Groups to Teams for greater control over agents and the teams that can use them. Contact our Support team to activate this feature
New Security Checks
- Adjusted the severity of SSLv3 and TLS 1.0 vulnerabilities to reflect their security risks
- Added support for CSP frame-ancestors
- Added detection for CVE-2024-6297, affecting several WordPress plugins
- Added XWiki version disclosure vulnerability and attack patterns
Improvements
- Pre-request script now works in DOM as well
- The Azure Extension now retries connections, preventing pipeline failures
- Anonymous sharing of diagnostics and user data with our analytics partner, Pendo, is now opt-out only
Fixes
- Remediated a high vulnerability issue on the Agent Dotnet dependency package
- Fixed an issue that was preventing the selection of configuration items during ServiceNow integration setup
- Fixed an issue with updating targets using the target group ID
- Fixed an issue where the Auth Verifier heartbeat was showing an hour behind due to daylight saving time adjustments
- Fixed an error that was occurring when editing Report Policies
- Fixed an issue with a REST API endpoint returning alternating severity data for TLS 1.0 vulnerabilities
- Resolved an issue with a pre-request script that was affecting crawling functionality
- Fixed the issue where tagging in the Discovery service would create a single-character tag when converted to a target
- Fixed an issue where the encryption process remained pending and incomplete after starting encryption key generation
- Fixed a bug in the API where '/api/1.0/issues/allissues' always returned NULL in the History field
- The option to suspend all future scans is now available to all customers in Scans Control Settings
- Fixed the false negative issue related to Polyfill.io
- Fixed an issue related to creating a custom script for a web application using the OIDC method with a login pop-up
- Fixed the issue where the scan summary page did not time out according to the settings
- Resolved an issue where the AV agent failed to install during the installation process
- Resolved an issue where modifying the settings triggered an error
- Resolved an issue that was blocking the loading of issue details
New features
- Added CVSS 4.0 categorization of vulnerabilities
- Added support for PCI DSS 4.0
New security checks
Improvements
- Added descriptions to the agent warning messages on the Scan Summary page
- Updated messaging around the functionality of the Team Administrator role
- Improved the request body rating algorithm
- Improved the Postman collection parsing algorithm
- Improved the vulnerability calculator for Boolean MongoDB
- Resolved an issue with adding a client certificate to set up a scan
Fixes
- Fixed a bug that was preventing customers from adding back previously deleted targets
- Increased character length for the Jira and Snow integration URL validation regex to ensure it accommodates Top-Level Domains (TLDs)
- Paused scheduled scans that were resuming automatically will now remain paused until manually resumed
- Removed the previous limit on the number of supported second-level domains in the Discovery feature
- Fixed an error that was occurring when updating an issue from Fixed (confirmed) to Accepted Risk status
- Fixed discrepancies in the numbers displayed on the Dashboard
- Fixed an issue with the agent auto-updater
- Added a missing control for SSO users while editing members
- Fixed a bug in the communication between Invicti and ServiceNow
- Fixed a bug that was preventing administrators from creating new notifications or editing built-in notifications
- Fixed an issue that was causing verifiers to not use scan policy proxy settings
- Fixed an auth verifier client certificate authentication path error
- Fixed the Invicti crawler that wasn't getting JS endpoints correctly
- Resolved issues with importing API documentation from a link
- Fixed a bug in the Jenkins plugin that was causing the 'Stop The Scan When Build Fails' option to not work correctly
- Fixed insecure Windows service permissions that were vulnerable to privilege escalation attacks
Important note
- Customers currently using version 23.7.0 on Windows running internal agents will need to perform additional steps in order for this update to run successfully in their environment. Affected customers have been contacted directly with more information.
New features
- [Closed beta] Added the Team Administrator default role
- Changed compression tool from 7zip to Tar
- Added Diana.jl support for GraphQL Library Detection
- Added Hot Chocolate support for GraphQL Library Detection
- Added Zero Day Vulnerability for MOVEit Software
Improvements
- Improved the scan deletion process
- Improved the authentication agent to carry out any stepped authentication, such as first Form Authentication then OAuth2
- Added filter for discovered websites via AWS connection
- Enabled regex case sensitivity for attack payloads
- Updated Boolean NoSQL / SQL Injection attack payloads
- Expanded scenarios for Discovery Service with AWS Connections
- Improved performance when updating vulnerability lookups
- Improved performance of database indexes
- Improved added API endpoints for Custom Scripts
- Improved performance for Issues Report API endpoint
- Improved detection of IT Hit WebDav Server .Net versions
- Improved Internal Path Disclosure detection
- Improved Remediation Advice for Autocomplete Enabled vulnerability
- Improved detection logic for LFI vulnerability
- Improved identification and version disclosure for PopperJS, CanvasJS, and Next.js
- Improved WAF Detection for F5 BIG IP
Fixes
- Fixed PCI Report generation error when selecting a specific group
- Fixed the issue that prevents users from saving the scan profile when the Is Regex checkbox next to the Excluded Path field is selected on the URL Rewrite page
- Fixed the timezone problem on the Knowledge Base Reports
- Fixed issue with scans stopping with the Find & Follow New Links option enabled
- Fixed issue with agent compression of chromium and node files
- Fixed null value exception with REST API
- Fixed InvalidCastException with REST API
- Fixed ArgumentNullException with Custom Security Checks
- Fixed Access Denied error when attempting to delete scan files which were already previously deleted
- Fixed cannot login to web app after changing database password
- Fixed unclear results with PCI reports with edge date ranges
- Fixed BLR cannot fill address fields
- Fixed licensing issue when adding a previously-deleted website
- Fixed adding some MongoDB vulnerabilities to Knowledge Base report
- Fixed importing Swagger/OpenAPI links
- Fixed Discovery Service issue with AWS Connection throttling
- Fixed authentication failure with MFA recovery codes
- Fixed license file corruption issue during version upgrade
- Fixed scans unauthenticated after successful authentication verification
- Fixed Linux agent update issue
- Fixed the data type detection when importing Swagger schemas
New security checks
- Added new security check for LDAP injection for IAST.
- Added new security check for MongoDB injection.
- Added new security check for Server-side Template Injection for IAST.
- Added new security check for XPath injection for IAST.
- Implemented security check for Sensitive Data Exposure.
- Added the check for Boolean-based MongoDB injection.
- Added the check for MongoDB Operator Injector.
- Implemented the XML external entity check for IAST.
- Added the ISO/IEC27001:2022 Classification.
- Added the report template and attack pattern to the Out-of-band RCE.
- Added passive check for Lua.
- Added a security check to detect public Docker files.
- Implemented a new engine to identify WordPress themes and Plugins.
- Added new security checks for SAML.
- Added security check for IT Hit WebDAV Server .Net Version Disclosure.
- Added security check for MS Exchange Version Disclosure.
- Added new payloads for Command Injection.
- Added support for PopperJS.
- Added support for CanvasJS.
- Added new security check for the SQLite Database Detection.
- Added new payloads for Header Injection.
- Added new security check for Spring Boot Actuator Detection.
- Added security check for NodeJS Stack Trace Disclosure.
- Added security check for SailsJS and ActionHero Identified.
- Added security check for JetBrains .idea Detected.
- Added security check for GraphQL Stack Trace Disclosure.
- Added security checks for Javascript Libraries.
- Added security checks for Web Application Fingerprinter Engine.
- Added new security checks for WordPress Hello Elementor Theme Detection.
- Added new security checks for WordPress Twenty Twenty-Three Theme Detection.
- Added new security checks for WordPress Twenty Twenty-Two Theme Detection.
- Added new security checks for WordPress Astra Theme Detection.
- Added new security checks for WordPress Twenty Twenty-One Theme Detection.
- Added new security checks for WordPress Twenty Twenty Theme Detection.
- Added new security checks for WordPress OceanWP Theme Detection.
- Added new security checks for WordPress Twenty Seventeen Theme Detection.
- Added new security checks for WordPress Kadence Theme Detection.
- Added new security checks for WordPress Twenty-Sixteen Theme Detection.
- Added new security checks for WordPress Twenty Nineteen Theme Detection.
- Added new security checks for WordPress PopularFX Theme Detection.
- Added new security checks for WordPress GeneratePress Theme Detection.
- Added new security checks for WordPress Inspiro Theme Detection.
- Added new security checks for WordPress Go Theme Detection.
- Added new security checks for WordPress Smash Balloon Social Photo Feed Plugin Detection.
- Added new security checks for WordPress Contact Form 7 Plugin Detection.
- Added new security checks for WordPress Yoast SEO Plugin Detection.
- Added new security checks for WordPress Elementor Website Builder Plugin Detection.
- Added new security checks for WordPress Classic Editor Plugin Detection.
- Added new security checks for WordPress Akismet Spam Protection Plugin Detection.
- Added new security checks for WordPress WooCommerce Plugin Detection.
- Added new security checks for WordPress Contact Form by WPForms Plugin Detection.
- Added new security checks for WordPress Really Simple SSL Plugin Detection.
- Added new security checks for WordPress Jetpack Plugin Detection.
- Added new security checks for WordPress All-in-One WP Migration Plugin Detection.
- Added new security checks for WordPress Wordfence Security Plugin Detection.
- Added new security checks for WordPress Yoast Duplicate Post Plugin Detection.
- Added new security checks for WordPress WordPress Importer Plugin Detection.
- Added new security checks for WordPress LiteSpeed Cache Plugin Detection.
- Added new security checks for WordPress UpdraftPlus WordPress Backup Plugin Plugin Detection.
- Added new security check for EZProxy Identified.
Improvements
- Updated the Java sensor for more stability in the sensor.
- Added the Response Receiver information event to remove waiting time for requests.
- Improved the discovery service for email, website, and main website matching.
- Improved the Not Contains filter for tags.
- Added the EC2 Instance ID column to the default columns on the Discovered Websites page.
- Updated API documentation for outdated ApiFileModel JSON example.
- Added an information message to the report policy page in case the custom report policy cannot be found.
- Improved the agent assignment process to prevent performance issues.
- Changed the Launch Scan button to the New Scan button on the dashboard.
- Added an account ID control when querying the website with the root URL.
- Improved the website importing when the CSV file has more than 1000 entries.
- Added an information message for adding an AWS connection that appears when there is no running instance.
- Improved the health check of websites discovered via the AWS connection.
- Changed the Jira webhook settings, making the Exclude Body checkbox selection mandatory.
- Fixed the importing website issue that threw an error when a user tries to add the website deleted from Invicti previously.
- Improved the scan data by moving some information like attack and knowledge base data to the storage.
- Improved the AWS discovery that can find private IPs in addition to the public IPs when the Include Unreachable Discovered Websites checkbox is selected.
- Improved the user interface for the website's menu.
- Improved the user interface for the crawling options on the New Scan page.
- Improved the business logic recorder to play the authenticated record.
- Updated the Signature Detection pattern.
- Improved the wordlist for Forced Browsing checks.
- Changed the Session Cookie not marked as Secure severity from High to Medium.
- Improved the performance of downloading the discovery data via the API endpoint.
- [Acunetix 360] Improved the silent installation JSON document for AcuMonitor.
- Increased the delay control for max scan duration to 12 hours. After 12 hours of the maximum scan time set by the customer, the web application fails the scan.
- Improved Drupal and Joomla detection.
- Improved the Next.js version detection.
- Improved Django debug mode enabled.
- Updated the SSL/TLS report template.
Fixes
- Fixed the date-time issue in the Authentication Verifier Service that prevents verifier agents from being listed on the verifier page.
- Fixed the typo on the filter options on the Discovered Webpages page.
- Fixed the proxy settings on the scan policy, so it can be applicable for agents as well.
- Fixed the agent selection issue that prevents users from launching scans.
- Fixed an issue that caused a bad CSRF token when confirming Cross-site Scripting.
- Fixed the issue that is filling out the login form on the logout page during the login verification.
- Fixed the issue of changing the order of API parameters while importing the JSON file.
- Fixed the vulnerability signature types for Cloudflare and Cdnjs.
- Fixed the custom script information on the 3-Legged Authorization in the scan summary.
- Fixed the issue that prevented empty website groups from being deleted.
- Fixed the issue that resulted in the scanning of the target URL instead of the GraphQL endpoint.
- Fixed the token detection issue although the Detect Bearer Authorization Token function is disabled.
- Fixed the case-sensitive parameter name that caused issues when migrating the database.
- Fixed the ServiceNow integration issue that failed to export the issue information.
- Fixed the issue that allowed a user with permission to add/edit a website group the ability to view all account websites.
- Fixed the permission issue that a user can add and edit discovery connection via an API endpoint although the user does not have that permission.
- Fixed the logo issue that the Knowledge Base report was showing the old Invicti logo.
- Fixed issues encountered during scan deletion and canceling to improve performance.
- Fixed the issue in which a team’s name is deleted during the editing process.
- Fixed the validation issue for the Kafta integration.
- Fixed the password update issue for the authentication verifier process that failed to obtain the new password.
- Improved report generation via API endpoints.
- Fixed the login failures when the Authentication Profile is selected as the Use matched profile.
- Fixed the issue that caused the flashing custom script screen.
- Fixed the issue with cascading combo box by fixing the query.
- Fixed an internal server error while exporting from the Invicti Standard to the Invicti Enterprise.
- Fixed the issue with the “#” sign that can appear in the target URL.
- Fixed the issue with choosing the All option from the website group drop-down on the Reporting page.
- Fixed an issue about HTTP Status codes on the crawler performance in the Knowledge Base Report.
- Fixed the importing GraphQL introspection issue.
- Fixed the weak Nonce detection in Content Security Policy.
New security checks
- Added new patterns for GrapQL attack usage.
- Added new attack pattern to CommandInjection.xml.
- Implemented Bootstrap Libraries Detection.
- Added Out-of-Date vulnerability for mod_ssl.
- Added a report template and vulnerability type for Spring Framework Identified.
- Added JavaMelody Interface Detected Signature.
- Added the support for Nested objects for GraphQL attacks.
Improvements
- Added the discovery source option to filters on the discovered websites page.
- Added the AWS badge to the Discovery Service to identify the assets identified via the AWS connection.
- Improved the Linux agents to work in the FIPS-enabled environment.
- Updated the IAST Bridge to improve the communication between the bridge and the scanner agent.
- Added a null check for HAR files imported.
- Added the Retest All Subitems in the Sitemap to prevent non-retestable issues from being retested.
- Improved the agent and web application communication to end it after three attempts if the internal agent has wrong information.
- Updated IAST NuGet PHP package.
- Updated StaticDetection.xml & StaticResourceFinder.xml.
- Changed WAF Identification Signature for F5 Big IP.
- Added service worker request support for authentication, login simulation, and crawling.
Fixes
- Fixed the AWS connection issue to let customers add internal EC2 instances.
- Fixed an issue that caused high memory usage while collecting form values.
- Fixed the issue that caused the change in the date and time format during the Postman file importing.
- Fixed the next scheduled scan execution time information on the user interface.
- Fixed the issue that displayed "vulnerability not found" on the user interface although the vulnerability is identified.
- Fixed the control issue that threw an “internal server error” when exporting a scan from Invicti Standard to the Enterprise.
- Fixed the issue that allowed a user with permission to add/edit a website group the ability to view all account websites.
- Fixed the logo issue that the Knowledge Base report was showing the old Invicti logo.
- Fixed the untrusted certificate error for internal proxies.
New security checks
- Added package.json Configuration File attack pattern.
- Added new File Upload Injection pattern.
- Added SSRF (Equinix) vulnerability.
- Added Swagger user interface Out-of-Date vulnerability.
- Added a file upload injection pattern.
- Added StackPath CDN Identified vulnerability.
- Added Insecure Usage of Version 1 GUID vulnerability.
- Added JBoss Web Console JMX Invoker check.
- Added Windows Server check.
- Added Windows CE check.
- Added Cloudflare Identified, Cloudflare Bot Management, Cloudflare Browser Insights, and cdnjs checks.
- Added Varnish Version Disclosure vulnerability check.
- Added Stack Trace Disclosure (Apache Shiro) vulnerability check.
- Added Java Servlet Ouf-of-Date vulnerability check.
- Added AEM Detected vulnerability check.
- Added CDN Detected(JsDelivr) vulnerability check.
Improvements
- Updated Invicti Enterprise with the new brand logo.
- Added external schema import to solve a WSDL file importing another WSDL file.
- Added the Hawk URL configuration to the silent installation document.
- Improved the Authentication Verifier settings in the silent installation document to skip or not the verifier.
- Improved the On-Premises installation package to run as 64-bit if the platform support 64-bit.
- Improved the settings page for admins to change the Hawk URL.
- Improved the bulk update of those issues with the Fixed(Can’t Retest) status.
- Added a column on the Issues page to show users whether an issue is retestable.
- Improved the scan compression algorithm to lower the size of the scan data.
- Added a tooltip to show the full scan report name when it is too long.
- Added a progress indication while exporting a PCI scan report.
- Added an option to delete the stuck agents' commands.
- Fixed the business logic recorder issue while using the Basic, NTLM/Kerberos Configurations.
- Improved the descriptions for /api/1.0/issues/report endpoint and the integration parameter on the Allissues endpoint.
- Improved WS_FTP Log vulnerability test pattern.
- Improved X-XSS-Protection Header Issue vulnerability template.
- Improved MySQL Database Error Message attack pattern.
- Improved XML External Entity Injection vulnerability test pattern.
- Improved Forced Browsing List.
- Added CWE classification for Insecure HTTP Usage.
- Added GraphQL Attack Usage to existing test patterns by default.
- Added an option to ignore events that can break the JavaScript simulation script.
- Added version number information to internal agents on the Configure New Agent page.
- Added an option to set a timeout value for agents to be set as Unavailable if they are stuck.
- Improved Invicti Enterprise to clear all login files upon signing out of the application.
- Improved the Authentication Verifier settings in the silent installation document to skip or not the verifier.
- Created a queue to store scan results and register results asynchronously.
- Added the vulnerability database to the installation package.
Fixes
- Fixed Out-of-memory reason at CDPSession.
- Fixed the issue with the DefectDojo report submission.
- Fixed the Client Secret in raw text appearing in the scan report for OAuth2.
- Fixed the time zone issue for the authentication verifier agent.
- Fixed the IAST Bridge installation issue that ended prematurely.
- Fixed the issue that displayed "vulnerability not found" on the user interface although the vulnerability is identified.
- Fixed the scan duration limit issue that crashed the application.
- Fixed the issue with a folder name with blanks to prevent the Unquoted Service Path vulnerability.
- Fixed the control issue that threw an “internal server error” when exporting a scan from Invicti Standard to the Enterprise.
- Fixed the update issue in the Proof node in the Knowledge Base panel.
- Fixed the scan profile issue when exported from Invicti Standard to Invicti Enterprise.
- Fixed the API token reset issue for team members.
- Fixed the API documentation’s website that failed to show descriptions.
- Fixed the business logic recorder issue where the session is dropped because of a cookie.
- Fixed the default email address that appeared on the login page during the custom script window.
- Fixed the Out-of-Memory issue caused by the Text Parser when adding any extension to the parser.
- Fixed the Client Secret in raw text appearing in the scan report for OAuth2.
- Fixed the Hawk validation issue.
- Fixed the scan flow with different logic for incremental scans that are launched via CI/CD integrations and the user interface.
- Fixed the custom vulnerability deletion problem on the custom report policy.
- Fixed the vulnerability database issue that occurred because of a URL redirect problem.
- Fixed the internal server error on the Audit logs' list endpoint.
- Fixed the issue of email notifications when a new scan is launched.
- Fixed the typo on the OAuth2 settings page.
- Fixed the issue updating timeout issue.
- Fixed the issues API endpoint on the updating and sorting.
- Fixed the tagging issue with the Azure Boards integration that the tag appeared on the Azure board although there is no tag entered on the Invicti side.
- Improved the web app and agent communication.
- Updated the docker agent package for the 64-bit process.
- Fixed the bug that threw an object reference error while trying to end the scans that exceeded the max scan duration.
- Fixed the Classless Inter-Domain Routing (CIDR) transformation issue for the discovery service.
- Fixed the discovery service crawling issue.
- Fixed issues that caused erroneous reports.
New features
- Added the Maximum 404 Signatures field to scan policies.
- Added an option to exclude issues’ history from reports.
- Added an option to set a timeout value for agents to be set as Unavailable if they are stuck
New security checks
- Added the JSON Web Tokens detected check.
- Added JWT Token Forgery through Kid by using static files.
Improvements
- Improved the JSON Web Tokens' vulnerability logic.
- Updated JWT Token Forgery check condition.
- Extended excluded header names with new headers.
- Improved the JWT Token Finder Regex in the JWT engine.
- Updated the embedded Chromium browser.
- Added the permission check to download reports.
- Added a parameter (ImportedLinks) for imported links to the /scanprofiles/new API endpoint.
- Improved the global dashboard performance.
- Added records limit to avoid Out-of-Memory exceptions on reports.
- Added the link scope check for the user-controllable cookie vulnerability.
- Improved the default browser settings to be reflected in the business logic recorder (BLR).
- [Early Access] Created a queue to store scan results and register results asynchronously.
- Improved the web app and agent communication.
- Improved the performance of the scan report API endpoint.
Fixes
- Fixed an issue that caused unhandled exceptions when there is no service endpoint definition in the WSDL file.
- Fixed accessibility issue in the scan optimizer pop-up.
- Fixed special character problems in Crawled and Scanned URLs reports.
- Fixed "file in use error" while archiving scan logs.
- Fixed the OAuth 2.0 authentication problem caused by the failure to get code information and certification validation in out-of-scope links. Fixed missing cookies for the JSON Web Tokens attack requests.
- Fixed the text parser extension issue that caused agents stuck.
- Fixed the vulnerability family issue that caused the Hawk not to detect issues.
- Fixed the bug that threw an error when the Require SAML assertions to be encrypted checkbox is not selected on the Single Sign-on page.
- Fixed a bug that caused scans to be canceled unexpectedly.
- Fixed a bug that caused scans to terminate prematurely due to incorrect time settings.
- Fixed the exception issue for the internal authentication verifier.
- Fixed the cloud agent issue that was stuck in the launching stage.
- Fixed the host unavailable issue that was thrown for sub-target URLs.
- Updated the docker agent package for the 64-bit process.
Improvements
- Improved the Technologies page for detailed version information of technologies identified.
- Improved the target website deletion process to prevent any errors because of instantaneous action.
- Improved the scan compression algorithm.
- Add a new API endpoint (
api/1.0/issues/summary) for better issue reporting. - Added
/api/1.0/scans/validate-imported-links-fileto retrieve errors in the imported links. - Added the last revived date parameter to the All Issues API endpoint.
- Improved the API endpoint to create team members and update their information.
- Improved the maximum scan duration to stop only those scans with the Scanning status.
- Added a token matching rule when it is required to get the token from a website other than the target URL.
- Added secure attribution for cookies.
- Added interval for Update Agents' list on the installation wizard.
- Added the GUID control before getting the integration id to prevent any issue in the flow.
- Updated the scan control center to drop the difference between the unsuccessful resuming and pausing status.
- Improved the detection of whether the Jira instance is on the cloud or on-premises.
- Improved the ServiceNow Incident Management integration.
- Added active scan check when deleting an authentication profile.
- Improved the Invicti web application performance.
- Improved the website deletion process to block access to the associated file of the deleted website.
- Improved the Jira integration to add the Affected Versions as an option.
- Updated the TeamCity plugin that requires the Server URL and Domain URL to be the same.
- Improved the vulnerability report in which any credit card information is masked.
- Added the Authentication Verifier Service’s IP address to the setting to prevent it from being affected by the IP Restrictions.
- Improved the agent’s configuration file to specify a folder where the agent’s scan data is to be saved.
- Fixed case sensitivity when checking HTTP headers for JSON Web Tokens.
- Fixed missing CSP 3 Directive.
- Changed the Second Level Domain option on the Discovery Service to disabled by default.
- Improved the scanning of Burp files that are without XML extensions.
Fixes
- Fixed the scanner agent issue where the Linux agents failed because of TLS as a result of breaking changes in .NET 5.
- Fixed the configuration issue in a Docker scanner agent.
- Fixed the Hawk validation issue.
- Fixed the issue in the IAST installer that threw an error message despite successful installation.
- Fixed the basic authentication issue that threw an error although the credentials are correct in the scan profile.
- Fixed the business logic recorder issue that prevented the recorder to play recorded steps during a scan.
- Fixed the inconsistent number of vulnerability counts by severity information on the scan report page.
- Fixed the vulnerability serialization issue that caused the out-of-memory error.
- Fixed the scan scope issue that does not load the scan scope correctly on the first try.
- Fixed the scan profile issue that failed to register the database selected on the scan optimization page.
- Fixed the corrupted scan data ZIP file downloaded via an API endpoint.
- Fixed the silent installation issue in which the installation path cannot be located.
- Fixed the business logic recorder issue where the session is dropped because of a cookie.
- Fixed the sitemap issue that fails to show the site map after the scan.
- Fixed the null reference exception thrown in the new installation.
- Fixed the issue that fails to render the API document’s index page.
- Fixed the bug that threw an error when exporting a report.
- Fixed a bug that prevents the scanner from attacking to login and logout pages.
- Fixed the synchronization issue for the Discovery Service.
- Fixed an issue about header encoding that cause false positive CSP reporting.
- Fixed an issue that caused unhandled exceptions when there is no service endpoint definition in the WSDL file.
- Fixed null reference error during the SCIM User creation.
- Fixed the user interface issue to reflect the agent information on the Installed Framework accurately.
- Fixed the Hawk URL issue that is changed after the scan policy update via an API endpoint.
- Fixed the bug that throws a null reference exception at the authentication.
- Fixed the inconsistent risk level on the generated reports.
- Fixed the bug that throws a null reference exception at the authentication.
- Fixed the IPv6 registered website resolution issue thrown before scanning.
- Improved the maximum scan duration detection.
- Fixed the scheduled scans not being exported issue from Invicti Standard to Invicti Enterprise.
- Fixed the bug in which OAuth2 settings were not transferred properly from the web application to the agent.
- Fixed the bug that throws a null reference exception at the authentication.
- Increased the time out for the cloud PDF converter to prevent timeout-related errors.
Removed
- Removed the PCI DSS scan option on the New Scan page.
New features
- Added a scan control center to suspend all scans, and pause and resume all scans when needed.
- Added a feature to generate a report for vulnerabilities identified across a website group.
- Added an API parameter to choose among agent groups to launch an incremental scan. [API-only]
- Added an option to determine how long Invicti stores scan data.
- Added auto-GraphQL test after endpoint is detected.
New Security Checks
- Added MongoDB Time-based (Blind) Injection.
- Added SQLite Boolean SQL Injection.
- Added MongoDB Error-based Injection.
- Added the Text4Shell (CVE-2022-42889) check.
Improvements
- Improved the Jira integration.
- Improved the ServiceNow Incident Management.
- Added the report option to the Jenkins integration.
- Improved the notification rule scope.
- Updated embedded Chromium browser.
- Updated the docker scanner agent.
- Added an option to block navigation on SPAs pages.
- Added an option to export the PCI DSS scan report even if it fails the scan.
- Improved the scan report page’s performance.
- Upgraded the TeamCity plugin.
- Added an option to include the IAM Role to the Cloud Provider settings.
- Improved the SSO to inform users about the expired SAML certificate.
- Removed the target URL health check that lets the scan continue despite getting error messages such as 403.
- Added URL validation check for the authentication verifier settings.
- Added the information message when users want to delete the preferred agent configured to a scan.
- Improved the scan profile to edit Basic, Digest, NTLM/Kerberos, and Negotiate Authentication while starting a new scan.
- Updated the text on the GraphQL Instropection pop-up.
- Updated the Basic Authentication message for the internal authentication verifier agent.
- Improved the scan profile feature, so any updates on a scan profile are to be reflected on the scheduled scans, incremental scans, and retests.
- Added information for stuck agents where the scan failed because of the agent’s deletion.
- Improved the Activity Log page to list any changes on the general settings.
- Improved the user agent to add custom user agents.
- Improved the Basic, Digest, NTLM/Kerberos, Negotiate Authentication to inform users on the test credentials page whether this authentication is required or not.
- Improved the required information for the Kafka integration.
- Improved the raw scan file expired information message.
- Added notification to warn users if they are creating a vulnerability profile that exists on the report policy.
- Added content and return type to the scans/report and scans/downloadscanfile API endpoint.
- Added the .gql to the supported file types for the import link.
- Improved the Trend Matrix Report exporting to include the severity information as well.
- Improved the HashiCorp integration to authenticate with user tokens, too.
- Added a name validation for adding a new member’s name and editing a member’s name.
- Improved the global dashboard performance.
- Added an active scan check before deleting a scan profile related to that active scan.
- Improved the importing link to parse the complex example value for RAML.
- Added the support for browser flag.
- Improved the website dashboard performance.
- Added the attack option for Cross-site Request Forgery (CSRF).
- Added the required tooltip for the Value field of the Kafka integration.
- Added an explanation for the failed requests error.
- Added name variable support for Passive and Singular Custom Security Checks.
- Added auto responder for images to escape the onerror issue.
Fixes
- Fixed the business logic recorder issue that prevented the recorder to play recorded steps during a scan.
- Fixed the internal agent update issue that is stuck in the updating process.
- Fixed the deserialization problem when importing the scan session.
- Fixed the CSP analyzer Regex enumeration problem.
- Fixed the stateless link uncrawled that is waiting for the resource finder.
- Fixed the issue with updating Linux agents from versions older than 2.0.2.155.
- Fixed the SQL timeout issue when the reporting date page is too large.
- Fixed the retest issue.
- Fixed the Shark validation issue that threw exceptions while validating.
- Fixed the issue of adding emails with special characters to the Notification.
- Fixed a bug that caused the scan session failure when the scan is paused and resumed.
- Fixed a bug that causes server error when expired integration is cloned.
- Fixed an issue where the Due Days for FreshService integration is displayed as required despite being optional.
- Fixed an issue that prevented the Authentication Verifier Server from communicating with the web application when the IP Restriction is enabled.
- Fixed a bug that disabled the Send To button on the All Issues page when users select edit but navigate back to the page.
- Fixed a bug where DefectDojo automatic issue import is not working.
- Fixed timeout issues during website DNS checking.
- Fixed an issue where a JavaScript Setting option blocks inputs for the single-page applications to be reported in the Web Pages with Inputs node.
- Fixed the improper path parsing when a postman collection file is imported.
- Fixed a bug that caused the browse section to continue appearing on the Links/API definition page after the import process is canceled.
- Fixed the null return upon the "GET /scans/list-scheduled" API call.
- Fixed the late formation folder size issue.
- Fixed a bug that does not show the status change drop-down on the scan report page when zoomed in.
- Updated the Unfuddle Integration where optional fields have "required" text.
- Improved the IP Restriction Infrastructure.
- Fixed failed scans where the Target URL is IPv6 and starting with ::1
- Fixed the null reference problem issue while using the 3-legged flow type for OAuth2.
- Fixed the Chrome version number on the custom script editor while using an internal authentication agent.
- Fixed the GraphQL retest bug that showed a different request count.
- Fixed the single sign-on issue that prevented users from using SSO.
- Fixed the Jenkins plug-in integration so that it can work after the Log4j update.
- Fixed the maximum scan duration bug when set in the user interface and API endpoint.
- Fixed the tooltip color on the scan status page.
- Fixed the ServiceNow API endpoint issue.
- Fixed the Nuget package version issue.
- Fixed the required attribute for the category on the ServiceNow Incident Management integration.
- Fixed the website's exporting to CSV issue when sorted by description.
- Improved the scan status that running scans will be set as Failed if their Scanner Agent is Not Available or Terminated.
- Fixed the deleted vulnerability issue while creating a scan report.
- Improved the site map and vulnerability synchronization.
- Fixed the Exclude Authentication Pages option on the scan scope when configuring an authentication profile.
- Fixed a bug that corrupts the header authentication credentials after updating the scheduled scan.
- Fixed the status information showing different data on the Discovered Webpages page.
- Fixed the Docker Agent build fail because of the compiler package.
- Fixed the Total Elapsed and Average Time values displaying 00:00:00 on the Scan Performance tab of the Technical Report.
- Fixed the time values displaying 00:00:00 on the Crawling Performance node of the Technical Report.
- Improved the GraphQL scanning to include the separated comment lines in GraphQL files.
- Fixed the Authentication Verifier Agent’s time zone bug.
- Fixed an issue that results in false positive Cross-site Scripting (DOM-based).
- Fixed the bug that duplicates the login page when users try to revalidate the login form.
- Improved the Authentication Verifier Agent to work with self-signed SSL.
- Fixed the bug on the user interface of ServiceNow Incident Management integration that caused issues with the On Hold status.
- Fixed the bug on the user interface of ServiceNow Incident Management integration that caused issues with the Closed status.
- Improved the Azure Pipeline Extension to generate a scan report on the release pipeline.
- Fixed the Single Sign-on - encryption certification issue.
- Fixed the web security issue for the origin header problem.
- Fixed the sitemap bug that caused missing information when imported.
- Fixed the bug that threw an error, as HTTP Requester deletes the whole body part of the request which contains the login credentials.
- Fixed highlighting CSP Directives in different header issues.
- Fixed duplicate bearer tokens for some requests.
- Updated Liferay Portal signature & added a mapping for version conversion.
- Fixed an issue that resulted in false positive Cross-site Scripting (DOM-based).
- Fixed the bug that shows the previous version of VDB.
- Updated Vulnerability Detection Logic in the JWT engine.
- Fixed parseable false attack patterns place.
- Fixed the comma issue that appeared when the scan is launched with the Header Authentication.
- Fixed the internal agent issue in which the scan is stuck after the scan is canceled.
- Fixed the issue that showed the wrong country flags for country phone codes.
- Fixed the product name in lowercase for those customers using Turkish Windows OS.
- Fixed the issue in which the authentication verifier agent is not listed after the time zone is changed.
- Improved the authentication verifier configuration file to support using the plus (+) for space encoding.
- Improved the log for the knowledge base report.
- Fixed the mistaken information on the retestable vulnerabilities.
- Fixed the fix calculation bug in the Issues API endpoint that occurred when scan(s) are deleted.
- Fixed the issue that deleted the customization folder in the agent’s folder after the update.
- Fixed the bug that displayed different method icons on the technical report page.
- Fixed the bug in sending issues to Mattermost.
- Fixed the Slack integration issue that failed to send notifications.
- Fixed the inconsistent discovered website result by handling null values.
- Fixed a bug that prevented the PCI scan from running ever again if any previous PCI scan failed to start.
- Fixed the Business Logic Recorder issue that prevents login when there is a custom script for the form authentication.
- Improved the creation of websites via the Discovery Service to include the port numbers and the URL.
- Fixed a bug that displayed vulnerabilities without their id on the website and global dashboard page.
- Fixed WSDL parse issue for non-defined object types.
- Fixed the null reference exception on HTTP Requester.
- Fixed the internal agent update issue that is stuck in the updating process.
- Fixed the attribute issue that prevented the Discovery Service from running the discovery properly.
- Fixed the agent stuck issue when the target link scan timeout is detected.
- Fixed an issue that overwrote TLS settings available in the scan policy when the Ignore SSL Certificate Errors is set to True in the Appsetting.json file.
New features
- Added the ability to pull a PCI Report from the CloneSystem itself by using API endpoints
- Added the option for customers to define a namespace for their HashiCorp integration
- Enhanced reporting capabilities with more attributes available in .csv exports and the option to do a .csv export in more places in the UI
- Added an option under New Scan Policy > Ignored Parameters to allow customers to set 'Cookie' as a type of ignored parameter
- Added a setting for administrators to enable internal agents to get VDB updates from the WebApp to avoid routing and proxy issues
- Added the option for administrators to hide sensitive data (passwords, tokens, session IDs, etc.) from the UI
- Added functionality to the Dashboard so that you can drill down to view more information when clicking on the Severities and Securities Overview section
- Added an option under General > Settings to require a password for edit access to custom scripts
- Added an option under General > Settings to set a session timeout limit for all users
- We now support AWS IAM Roles as an authentication method
New security checks
- Added new checks for the WordPress Login with Phone Number Plugin: CVE-2023-23492
- Added new checks for the WordPress JupiterX Core Plugin: CVE-2023-38389, CVE-2023-38388
Improvements
- Added support for custom authentication tokens without token type
- Improved LFI attack patterns for better accuracy
- Fixed some vulnerabilities in the Docker image
- Stricter sensitive data rules
- Improved bot detection bypass scenarios
- Added a warning message when selecting or assigning the Team Administrator role
Fixes
- Fixed a sensitive data issue when uploading a pre-request script
- Fixed a bug that was preventing scheduling group scans using API
- Fixed custom header values in scan profiles so that they are masked
- Docker Cloud Stack check has been updated to reduce noise
- SSL/TLS classification updated from CWE-311 to CWE-319
- Fixed a bug in scheduling group scans with API
- Removed 401 to 500 status code conversion for internal agent requests
- Changed the IP range limitation for excluded IPs in Discovery Settings to fix the Invalid IP address error
- Fixed an issue with scheduled scans not following the scan time window
- Fixed the problem with scan failed logs not appearing in activity logs
- Fixed the broken verify login and logout function in scan profiles
- Updated the vulnerability severity ranking so that issues are correctly sent to integrated issue tracking systems
- Changed the Active Issue count on the dashboard so that it is consistent with the number when you click on it
- Fixed an issue with accessing a scan profile
- Fixed an issue related to having multiple integrations with the same project but with different issue types
- Fixed an issue in the 'Basic, Digest, NTLM/Kerberos, Negotiate Authentication' settings for scans
- Fixed the Jira Server integration issue that was causing only some Jira users to display when configuring Jira Field Mappings
- Fixed a bug that was causing URL rewrite rules to not be included in the Export Knowledge Base report
- Fixed a problem with the internal agent not sending a heartbeat to the web app when in archiving state
- Fixed an issue with Jira-related integration information being removed from the issue history when a previous scan is deleted
- Fixed an internal agent issue that was causing an exception when registering a vulnerability
- Fixed an issue that was causing the Knowledgebase, Crawled URLs, and Scanned URLs to fail when there is no content
- Fixed the missing mapping for Proxy Bypass On Local that was not saving when a scan policy was saved
- Fixed a bug that was duplicating roles when a Team Administrator modified another Team Administrator direct role assignment
- Fixed a bug that was preventing the import of WSDL files to Invicti Enterprise
- Fixed version information reported in Web App Fingerprint Vulnerabilities
New features
- Added a new Team Administrator role that gives you the flexibility to designate an administrator for oversight across specific web applications, and assign certain roles and website groups to specific Teams or Team Members
- Added an option under General > Settings to set a session timeout limit for all users
- Added new options to the dashboard for selecting date ranges, including creating custom time periods
- Added a notification to the scan results page to show the VDB update version and Invicti Hawk connectivity status for the agent used in the scan
- Added a sensitive data (password, session cookie, token, etc.) encoder
New security checks
- Added JQuery placeholder detection methods
- Added a new security check for the Missing X-Content-Type-Options vulnerability
Improvements
- Improved the JS Delivery CDN disclosure check to increase stability
- Improved the remediation part for the Weak Ciphers Enabled vulnerability
- Reduced the certainty value to 90 for the Robot Attack Detected vulnerability
- Improved the detection method for CSP
- Improved the detection method for the Dockerignore File Detected vulnerability
- Improved the detection method for the Docker Cloud Stack File Detected vulnerability
Fixes
- Fixed an issue with imported links in the API
- Fixed a bug in the scan URL rewrite rules
- Fixed a bug that was preventing retest scans from starting correctly when the vulnerability states were changed from 'Reviewed' to 'Fixed (Unconfirmed)'
- Fixed a bug with disabling the scheduled scans list
- Fixed an issue with viewing the Account Edit page
- Added the missing CVE to the issue details for the "Out-of-date Version (jQuery Validation)" vulnerability
- Fixed some bugs that were affecting BLR
- Encrypted proxy password details when used in the Agent
- Fixed a custom proxy bypass list issue
- Fixed a unique analyzer bug for the WSDL importer
- Improved our XSS capabilities
- Fixed an NTLM login issue
- Fixed an issue that was causing the license file to become empty after upgrading the product
- Fixed several bugs that were impacting some agent proxy settings, synchronization of the vulnerabilities database, and saving scan policies when the proxy bypass feature is used
- Other miscellaneous bug fixes
NEW FEATURES
- Added support for creating Teams and Roles.
- Added SCIM 2.0 API support for improved SSO integration which supports user and group synchronization with popular Identity Providers.
- Added IBM ALM (Jazz Team Server).
IMPROVEMENTS
- Improved access control by introducing new more granular permissions
- Improved role assignment for website groups while inviting new members
- Improved the performance of issues/allissues API endpoint.
- Added alternate email address field (if available) to the account/me API endpoint.
- Added the Account Owner role instead of the Application Administrator role.
- Added email and SMS filter to the notification.
- Added an option to fail GitLab CI/CD build for only confirmed vulnerabilities.
- Added Organization field to GitHub issue tracking integration.
- Added an option to fail Azure Pipelines build for only confirmed vulnerabilities.
- Prettified the outputs printed by Azure Pipelines, GitLab, and UrbanCode deploy CI/CD integrations.
- Added support for committing changes on the tag editors with the TAB key.
- Updated YouTrack issue tracker integration to use the new API.
- Improved Splunk integration by sending the issue updates without requiring a new scan.
- Improved the performance of the Technology Dashboard.
- Improved the performance of the scans/report endpoint.
- Updated the look and feel of emails sent.
- Added Known Issues information to issues while sending to Kenna.
- Improved the performance of PCI scan reports.
- Added links to CVE IDs on reports.
- Issue notes are added to reports which are exported.
- Added an option to trigger user-defined notifications even for cases in which a user who configured the notification did not launch the scan.
- Improved the statusCode and errorMessage returned from members/deleteinvitation API endpoint on cases when the invitation is missing.
- Changed roles/update API endpoint response status code from 201 to 200 to better comply with REST best practices.
- Added “Override Version Vulnerability Severities” option to Scan Policy > Attacking settings.
- Improved the error message displayed when a Website Group cannot be deleted due to it being referenced by a notification.
- Extended the range of digits that can be entered for HOTP and TOTP configuration.
- Improved data validation for email addresses.
- Added the Web Storage Exclusion to Ignored Parameters in the Scan Policy.
Deprecated APIs
- The following APIs have been deprecated:
Deprecated APIsWhat to use instead/api/1.0/teammembers/newRenamed to /api/1.0/members/newinvitation/api/1.0/teammembers/listRenamed to /api/1.0/members/listThe request model has not changed, but the UserListApiResult response model has been replaced with MemberApiModelListApiResult./api/1.0/teammembers/getRenamed to /api/1.0/members/getThe request model has not changed but UserApiModel response model has been replaced with MemberApiModel/api/1.0/teammembers/getbyemailRenamed to /api/1.0/members/getbyemailThe request model has not changed but UserApiModel response model has been replaced with MemberApiModel/api/1.0/teammembers/updateRenamed to /api/1.0/members/updateThe request model has changed slightly; the response model is different./api/1.0/teammembers/deleteRenamed to /api/1.0/members/delete Only the endpoint is changed; request and response are the same./api/1.0/teammembers/gettimezonesRenamed to /api/1.0/members/gettimezones Only the endpoint is changed; request and response are the same/api/1.0/teammembers/getapitokenRenamed to /api/1.0/members/getapitoken Only the endpoint is changed; request and response are the same
FIXES
- Fixed an unhandled error that occurs while deleting scans.
- Fixed an issue where the check state is reset when the search keyword is modified on the Report Policy Editor security checklist.
- Fixed an issue where multiple Common Weakness Enumeration values were being sent to Kenna Integration.
- Fixed the incorrect API documentation of roles/listpermissions endpoint.
- Fixed an issue where form authentication may fail because of credentials being modified when the scan profile is updated.
- Fixed missing state field on the member API endpoint.
- Fixed the incorrect email displayed on the audit log when a failed login attempt is logged.
- Fixed a bug where a team with the same name tried to be provisioned when SCIM integration is used with SSO providers.
- Fixed the team member APIs by adding the missing CreatedAt field.
- Fixed an issue where some users with the default View Reports rule cannot see the global dashboard page.
- Fixed a memory leak happens while generating PDF reports.
- Fixed a bug preventing sending PDF and HTML reports via notifications.
- Fixed a NullReferenceException thrown while calling the scans/new API endpoint.
- Fixed an error occurs when a website that has tagged issue is deleted.
- Fixed a page loading issue on the authentication verifier.
- Fixed the clipped user interface elements on the New User Mapping page when the page widths get narrow.
- Fixed an issue where the Exclude Authentication Page checkbox does not get updated.
- Fixed the overlapping logo on reports.
- Fixed an issue where incremental scans started from CI/CD integrations are using the default profile if there are no scans performed to that website previously.
- Fixed the Not Found error displayed while testing notifications for Azure Boards integration.
- Fixed the empty PCI report issue.
- Fixed random HTTP 500 error thrown from scans/report API endpoint.
- Fixed missing agent groups when queried using agentgroups/list API endpoint.
- Fixed an issue where old VDB results are displayed on the known issues tab.
- Fixed a NullReferenceException.
- Fixed connection timeout issues.
- Fixed an issue where an exception was thrown if the agent Helper Service is set to use a different port on Linux machines.
- Fixed an issue where the issues of a custom security check are incorrectly listed under a different vulnerability on reports.
- Fixed a scan stuck issue.
- Fixed scans failing on some systems while scanning TLS 1.3 websites.
- Fixed an issue where incorrect scan profiles and policies were used while performing group scans.
- Fixed an issue where the State field of an issue is converted to a numeric value when the state of a revived issue is set to some other state through API.
- Fixed an issue where an incorrect Affected Version value is reported for an out-of-date vulnerability.
- Fixed an issue where editing a scheduled scan displays incorrect scan policy, report policy, and agent data.
- Fixed an issue where a custom vulnerability profile data of a report policy is not retrieved correctly when called from vulnerability/template API endpoint.
- Fixed the missing LastLoginDate field by adding it back to member API call responses.
- Fixed pipeline script in Jenkins where two installed scripts do not work together.
- Fixed notification grouping for persons that are outside of the organization.
- Fixed integration links under the Continous Integration System in the New Integration page.
- Fixed the Linux Auto Updater Version Checking.
- Fixed SSO login conditions.
- Fixed a bug that prevents editing report policies.
- Fixed a bug that the SSO email field appears although the Alternate Email is not selected.
- Fixed a bug that prevents some users from tagging issues.
Update to the new version
If you want to update the latest version of Netsparker Enterprise On-Premises, see Updating Netsparker Enterprise On-Premises.
NEW FEATURES
- Added GitHub Actions CI/CD integration.
- Added Authentication Profiles feature to be able to define shared authentication once and utilize them on many scans without explicitly configuring Form Authentication for websites utilizing the same authentication procedure.
- Added UrbanCode Deploy
- Added Azure Pipeline Extensions
- Added the ability to tag issues
- Added a new Scope option for Scan Groups of Websites while configuring notifications to be able to better scope notifications for web applications/APIs under a website.
- Added State filter to notifications which you can use issue states like Fixed, Revived, New, etc. as filtering options.
- Added Choose Scan Profile while scheduling from API
- Added support for TLS 1.3 protocol
IMPROVEMENTS
- Removed the scan report selection from notification events that do not produce any reports.
- Added account-based option to display authentication credentials on API responses.
- Improved time zone calculations to handle new time zones.
- Improved configuration validation error messages for Privileged Access Management integrations.
- Added an option to specify a scan profile while scheduling scans through API.
- Added support for Form Authentication Custom Scripts for cases when a Privileged Access Management integration is used.
- Added support for 11 digit phone numbers while inviting a new member.
- Added a field to specify the user’s Single Sign-On email address while creating a new team member using the API.
- Improved configuration options for Jenkins.
- Added the option to fail Jenkins build for only confirmed vulnerabilities
- The login process redirects the Single Sign-On users to their providers
- Added NIST, DISA STIG, and ASVS classifications to Report Policy
- Added support for importing links from multiple RAML files from a ZIP file (include directive support).
- Improved Azure AD Single Sign-On in-app help text.
- Removed the Current Password field for admin users (logged in with Single Sign-On) while editing a member.
- Added “Maximum URL Rewrite Signature” Scan Policy Crawling option.
- Improved role assignment for website groups while inviting new members
- Added IgnoreSslCertificateErrors option to Docker agent.
- Improved GitLab CI/CD script failure conditions.
FIXES
- Adding a title to the API field in the edit team member page
- Fixed an issue that occurs with updating scan profile
- Fixed an issue with Imported Links getting updated to Null while using Update ScanProfiles API
- Fixed the validation problem
- Fixed some bugs for the Sitemap
- Fixed an issue that getting an error which caused by connection problem with authentication verification hub on scheduled scan
- Fixed the problem of not being able to delete the scan with a profile
- Fixed the forgot password issue for Single Sign-On
- Fixed an issue where the Launch button does not get enabled on the New Scan page after you enable the IAST scanning and download the sensor files.
- Fixed an issue where a notification that is sent to an external email address was not displayed on the audit logs.
- Fixed an issue where starting a PCI scan via using API could not start the scan.
- Fixed an issue where a new notification created via API does not add the specified integration(s) to the new notification.
- Fixed an issue where a team member was not created in API if the auto-generated password is enabled.
- Fixed an issue where the custom value of FormAuthPageLoadTimeout was being overridden by its default value.
- Fixed validation error messages on the Email Settings page.
- Fixed some of the swagger API validation errors reported for the REST API
- Fixed an agent scan stuck issue while archiving
- Fixed a retest problem where some issues could not be retested
- Fixed an agent auto-update issue
- Fixed an issue with the GitLab integration script where builds were not failing when they were supposed to fail
- Fixed an issue where the “Add Attachment Report” section was missing while adding a new notification
- Fixed a mismatching type issue on /scanprofiles/list API response model
- Fixed an issue where a failed scan sends an excessive amount of email notifications
- Fixed an issue where Exclude Authentication Page configuration resets when another scan is performed
- Fixed agent auto-update issues
- Fixed an unhandled ArgumentNullException which causes some authenticated scans to fail
- Fixed an error that occurs while trying to mark an issue as false positive
- Fixed an internal server error that happens while using the /api/1.0/scanprofiles/update API endpoint for some profiles
- Fixed an issue where a deleted issue tracker integration was still keeping the old issues IDs referenced
- Fixed an issue where the helper NHS service is unexpectedly terminated on environments with multiple agents running
New Features
- A wizard to assist first time users add a new website and setup a web security scan
- Late confirmation of vulnerabilities (vulnerabilities can be confirmed after the scan has finished with Invicti Hawk)
New Security Checks
- New security check that detects insecure targets in Content Security Policy.
- Added checks for exposure of trace.axd in ASP.NET applications.
- New security check for Time Based Server-Side Request Forgery.
- Added Markdown Injection attack pattern to XSS engine.
- Added a Code Evaluation check for Apache Struts framework.
Improvements
- Improved Boolean SQL Injection detection.
- Updated the Local File Inclusion vulnerability classifications.
- Improved Trace/Track security checks.
- Improved coverage of XSS engine in redirects.
- Added policy optimization support for SSRF security checks.
- Added exploit generation support for "Cross-site Scripting via Remote File Inclusion" vulnerability.
- Added a specialized parser to parse JavaScript responses better to reduce discovering incorrect links.
- Improved form authentication logout detection by ignoring the responses of some attacks to prevent incorrect logout detections.
- Added VDB support to Blind & Boolean SQLi post exploitation.
- Added support for checking Open Redirection vulnerability on Refresh response header.
- Added the XPath information of the element that causes the DOM XSS vulnerability.
- Added "Sub Path Max Dynamic Signatures" setting for Heuristic URL Rewrite detection.
- Added a JavaScript scan policy option to reduce triggered event count during the simulation.
- Added a JavaScript scan policy option to exclude HTML elements such as logout buttons from event simulation by CSS selectors.
- Added checks for vulnerabilities which sink into window.name capability for DOM XSS security checks.
- Improved the coverage of the Local File Inclusion engine so the vulnerability can be found in a full url attack.
- Changed severity numbers' style on scan result pages.
- Added support for editing scan time window settings for running scans.
- Highlighted special fields of vulnerability notes on the scan report page.
- Settings of completed scans are automatically applied to new scans when a user launches a new scan from the recent scans page or scan report page.
- Improved notifications email templates.
- Improved help text by adding netsparker.com article links to relevant sections.
- Improved input validation for request rate limit settings on the scan policy page.
- Added support for remembering previously entered filters on list pages.
- Allowing users to select CSV separator while export scan reports.
- Added support to allow users to re-verify logout settings on the form authentication verification dialog.
Bug Fixes
- Fixed several issues related to DOM parsing and simulation.
- Fixed a NullReferenceException thrown by HTTP Methods checks.
- Fixed a StackOverflowException caused by JSON responses with too many nested elements.
- Fixed Proof of Concept generation during post exploitation for time based SQLi checks.
- Fixed a NullReferenceException while confirming a Boolean SQLi vulnerability.
- Fixed an issue where scan is paused when an additional host is unreachable.
- Fixed typos in CSP vulnerability templates.
- Fixed an issue where ignored emails are still reported as knowledge base issue.
- Fixed an issue where source code disclosure is reported in JS and CSS files.
- Fixed an SQL exploitation issue where executing a SQL query which expected an integer result is no longer giving failure for PostgreSQL database.
- Fixed a Text Parser issue where single quote characters were being captured as part of links.
- Fixed the incorrect path disclosure caused by the Shellshock attack.
- Fixed missing SSRF proofs under Proofs knowledge base.
- Fixed incorrect encoded parameter names for multipart/form-data forms.
- Fixed the performance recrawling for DOM XSS checks on websites with lots of links.
- Fixed the incorrect CR LF encoding issues on proof URLs.
- Fixed DOM Parser clearInterval JavaScript function simulation.
- Fixed an issue where stored XSS vulnerability is reported in an XHR response rather than in the page itself which makes XHR request.
- Fixed an issue where Boolean SQL Injection vulnerability is missed due to crawled parameter value.
- Fixed an issue where reflected XSS vulnerability is missed because the reflected payload is HTML encoded in an attribute.
- Fixed an issue where Text Parser does not handle the same referenced JavaScript in different files.
- Fixed an issue where timezone is not being set correctly when a validation error occurs on the signup page.
- Fixed a filtering issue on the Manage Team page.
IMPROVEMENTS
- Improved audit logs' contents.
BUG FIXES
- Fixed an issue in "/scans/new" API endpoint.
- Fixed an issue where SMTP settings was not persisted as expected.
- Fixed an issue in IP restriction settings.
- Fixed an issue where vulnerabilities' request/response details were not displayed properly.
NEW FEATURES
- Added the Stop the Scan if the Build fails option in GitLab CI/CD
- Added the Fail the Build if one of the selected scan severity is detected option in GitLab CI/CD
- Upgraded the Invicti scanning engine to version 5.9.1.27722.
NEW SECURITY CHECKS
- Added Oracle WebLogic Server Remote Code Execution (CVE-2020-14882)
- Added Oracle WebLogic Server Authentication Bypass (CVE-2020-14883)
IMPROVEMENTS
- Added the Scan Group selection combo box to Trend Matrix Report
- Added WASC Threat Classification Report
- Added the Export Unconfirmed option in the report generation screen
- Added the info box to Custom Scripts window for the Form Authentication
- Added URL Rewrite Rules while a file is being imported
- Added Uniqueness Controls on the new integration wizard
- Added validations of new integration wizard
- Added Swagger JSON link API document's index
- Added the Exclude Authentication Pages checkbox when the Form Authentication option is enabled
- Improved the Discovery Page’s performance
- Improved the performance of generating reports that contain a large number of vulnerabilities
- Improved the custom script’s performance
- Improved the website preview image resolution on the Verify Login & Logout screen
- Refactored the Report Policy Migrator
- Disabled auto-complete in the login page inputs.
- Changed the data protection policy link
- Changed the issue email template's website URL
- Admin users can now set the maximum number of websites a member can add
- Excluded usage tracker list can now be added from the new scan page
FIXES
- Fixed a bug when scheduled scan with an imported file is edited by a different user
- Fixed a bug in the Custom Cookie process
- Fixed imported file bug on scan profile saving
- Added minimum agent selection control for Agent Group
- Fixed Agents Scanning tooltip
- Fixed the auto-scaling problem that occurred while using Cloud Provider in Invicti Enterprise On-Premises
- Fixed the First Seen Date parameter in the Kenna integration
- Fixed Burp XML file import problem. Users can import Burp XML file
- Fixed report validation export problem. Users will not get an empty file
- Fixed the error related to exporting for customers who have many websites.
- The websites belonging to the filtered website group have been provided to be exported.
- Users can now add a new URL Rewrite Rule without losing the existing ones
NEW FEATURES
- New plugin for integration with TeamCity
- New plugin for integration with Jenkins
- Added IP Address Restrictions
IMPROVEMENTS
- Improved XML and date samples displayed in API documentation.
- Improved input validation in the reporting page.
- Improved on-premises installation document for customers using load balancer.
- Renamed FogBugz integration to Manuscript.
- Improved validation of custom cookies.
- New scans launched outside scan window will be automatically queued
- Increased character limit for website name.
- Added more details to scanner agent's startup log.
- Improved installation error message of internal scanner agent.
- Improved vulnerability request/response data page performance.
- Improved the navigation of issues and scans.
- Improved validation of custom 404 settings in the Scan Policy.
- Added a "Copy to Clipboard" button for cURL samples in API documentation.
- Improved API documentation to show request details.
- Changed date/time format from 24-hour clock to 12-hour clock.
BUG FIXES
- Fixed HTTP response data that was not displayed correctly for stored XSS vulnerability.
- Fixed the Github integration which ws not working due to TLS 1.2 connectivity problem.
- Fixed an issue where loading icon does not rendering correctly in IE11.
- Fixed a font size problem in the PCI DSS reports.
- Fixed the info messages that were not fitting in the screen on small resolutions.
- Fixed an issue in which scan profiles could be created with same name.
- Fixed a bug with website verification emails which were not being sent.
- Fixed a bug with vulnerability counts in HIPAA and PCI DSS compliance reports.
NEW SECURITY CHECKS
- Detection of a Remote Code Execution via File Upload in ImageMagick (aka ImageTragick)
NEW FEATURES
- Added support for merging accounts (On-Premises only). This will move all resources (Users, Websites, etc.) into the selected master account and delete all other accounts.
IMPROVEMENTS
- Account Owner or users with Administrator permission can now delete other Team Members' policies.
- Updated some third-party libraries to the latest version.
- Added OWASP 2017 classification data to the Executive Summary report.
- SSO Enforcement has been disabled for users with Administrator permission (On-Premises only).
BUG FIXES
- Fixed an issue where a JavaScript setting was not set as expected on the New Scan Policy page.
- Fixed an issue that was thrown when deleting an account.
- Fixed a bug where it was not possible to configure country code top-level domain (co.uk, com.tr, etc.) on the Discovery Settings page.
New Features
- Ability to export the scanners' findings as ModSecurity web application firewall rules.
- Scan Time Window that allows you to specify when the scanner can scan your website or not.
NEW SECURITY CHECKS
- Detection of SQLite Database files.
- Detection of Microsoft Outlook Personal Folders File (.pst) files.
- Detection of DS_Store files.
- Detection of SVN files, supporting the latest version of SVN.
IMPROVEMENTS
- Improved LFI "Long attack - boot.ini" attack.
- Added Internet Explorer 10, 11 and Microsoft Edge browser user agent values.
- Improved the performance of the scan session auto saves.
- Improved link importing to better handle relative URLs.
- Improved the "MIME Types" knowledge base list by ordering items alphabetically.
- Added "Extract static resources" option to JavaScript scan policy settings.
- Improved coverage of XML External Entity engine.
FIXES
- Fixed an attacking issue that occurs when retesting a vulnerability in an incremental scan.
- Fixed a link parsing issue in the text parser where links were incorrectly split.
- Fixed a form authentication "Override Target URL with authenticated page" issue which caused a wrong URL to be identified as the "Target URL".
- Fixed a highlighting issue where the URL for "Insecure Frame (External)" vulnerability is partially highlighted.
- Fixed an incorrect "Source Code Disclosure" vulnerability report when the response contained an ASP.NET event validation code sample.
- Fixed a broken link in XSS vulnerability templates.
NEW FEATURES
- Support and Scanning of RESTful web services.
- Auto Heuristic URL Rewrite Rules can be used with Custom URL Rewrite rules during a website security scan.
- New Reporting utility.
- Added the new option "Crawl & Attack at the Same Time" setting to new scan page.
NEW SECURITY CHECKS
- Added Samesite cookie attribute check.
- Added Reverse Tabnabbing check.
- Added Subresource Integrity (SRI) Not Implemented check.
- Added Subresource Integrity (SRI) Hash Invalid check.
IMPROVEMENTS
- Various memory usage improvements to better handle large websites.
- Improved vulnerability templates by adding product information when a 3rd party web application (WordPress, Drupal, Joomla, etc.) is discovered.
- Improved DOM simulation by supporting HTTP responses that is translated to HTML web pages using XSLT.
- Improved coverage of Local File Inclusion security check engine.
- Improved the automatic form authentication script to click the "button" HTML elements if no suitable button is found.
- Improved the "HTML Base Tag Hijacking" vulnerability template.
- Improved the long-term memory usage of the DOM simulation and cross-site scripting (XSS) scanning.
- DOM simulation smart filtering now prunes unnecessary DOM branches.
- Improved the detection of "Redirect Body Too Large" vulnerability.
BUG FIXES
- Fixed the "Cross-site Scripting via Remote File Inclusion" vulnerability, which was not being confirmed automatically.
- Fixed the incorrect form value issue when the #DEFAULT# form value is removed.
- Fixed an HTTP Archive Importer issue during which the POST method was parsed as GET when postData is empty.
- Fixed a bug in which a GWT parameter that contained a Base64 encoded value was not detected.
- Fixed a time span parsing bug in Knowledge base report templates.
- Fixed an issue in which some vulnerabilities are treated as fixed while retesting.
- Fixed an issue in which XSS proof URL was missing alert function call.
- Fixed the broken "Generate Debug Info" function of JavaScript simulation feature.
- Fixed a NullReferenceException that can be thrown by the Subresource integrity security checks.
- Fixed cURL login sample in API documentation.
New Technical Check
- Added "Cookie Header Contains Multiple Cookies" check
Improvements
- Improved the Content Security Policy (CSP) and "Misconfigured Access-Control-Allow-Origin Header" vulnerability templates.
- Improved CSP vulnerability detection by only reporting vulnerabilities on HTML resources.
- Improved the coverage of the boolean SQL injection vulnerability engine.
Fixes
- Fixed an issue which was preventing the deletion of multiple websites.
- Fixed the External CSS, Script and Frame Knowledge Base items which were not considering the port during checks.
- Fixed an issue in the Open Redirect detection where incorrect URLs may also be reported.
- Fixed an issue related to the form authentication which prevents logout detection during attacking phase.
- Fixed an Local File Inclusion (LFI) vulnerability detection issue when attacked with a FullUrl payload.
- Fixed an incorrect retest result which occurs when the target website is not reachable.
- Fixed a CSP vulnerability issue for deprecated CSP header name on meta tags.
NEW FEATURES
- Added agent grouping support which allows to launch scans in specified agent group. This feature is only available for on-premises standard agents.
- New API endpoints for getting website and website group details.
IMPROVEMENTS
- Changed Netpsparker Enterprise application's loading icon.
- Added an icon to indicate external links.
BUG FIXES
- Fixed an issue where scans are not launched on on-premises AWS scanner agents.
- Fixed an issue where realtime scan results are not displayed correctly in IE11.
- Fixed an issue where proofs are not displayed correctly on vulnerability details section.
New Feature
- Email and SMS notifications allowing you to be instantly alerted about scan progress, results and identified vulnerabilities.
Improvements
- Description in Scan Status have been improved to give a better overview.
- Added a new crawling option Find and Follow New Links. Previously it was hidden and always enabled.
- Improved the names of the exported reports by adding the report type as prefix in filename.
Bug Fixes
- Fixed an issue where the target website screenshot was not being captured.
- Fixed the CSS styles in some knowledge base items in the scan report page.
- Fixed an issue where the Upload client certificate button was not working.
NEW FEATURES
- Added SSO (Single Sign-On) support (onpremises only)
- Added an option to "Scan Policy > HTTP Request" settings to capture HTTP Requests
- Added installation wizard for onpremises installation (onpremises only)
- New plugin for integration with Bamboo
- Added code highlighting support for vulnerability request and response
- Added "Scans per Website Group" report type to Reporting page
- Added an option to general settings to configure retention period for raw scan files (onpremises only)
- Invicti Desktop integration: ability to import and export scans between the scanners.
- Added Server-Side Template Injection (SSTI) vulnerability checks.
- Added the OWASP 2017 Top Ten classifications report template.
NEW SECURITY CHECKS
- Expect-CT security checks.
- Added various new web applications in the application version database.
- Added out of date checks for Hammer.JS., Phaser., Chart.js., Ramda., reveal.js., Fabric.js., Semantic UI., Leaflet., Foundation., three.js., PDF.js., Polymer.
IMPROVEMENTS
- Added elapsed time information for ongoing scans
- Added an option to scan reports page for hiding addressed issues
- Improved Agents page to display configured agents' versions (onpremises only)
- Added CVSS score to JSON vulnerabilities report
- Improved user profile to display trial expiration date
- Improved response status messages on the API documentation
- Added Invicti Enterprise issue link to created tickets for supported issue tracking systems (JIRA, TFS, GitHub and FogBugz)
- Improved help text for schedule scan's license errors
- Allowed team members to manage their own notification settings
- Added "Copy to Clipboard" functionality for API settings
- Improved Incremental Scan page to configure maximum scan duration
- Added an icon for scans launched by continuous integration systems
- Added "LookupId" unique identifier for vulnerabilities to "/scans/report" API endpoint
- Added "FirstSeenDate" and "LastSeenDate" fields for vulnerabilities to "/scans/report" API endpoint
- Added "CreatedAt" and "UpdatedAt" fields for "/websites/list" API endpoint
- Added "/vulnerability/list" API endpoint to list vulnerability templates
- Improved logs for client certificate validation errors
- Crawler can now parse multiple sitemaps in a robots.txt file.
- Added support for parsing swagger documents in yaml format.
- Added support for parsing relative meta refresh URLs.
- Improved parsing of websites using React framework.
- Content-Security-Policy-Report-Only header is not reported as an interesting header.
- Variations are retested before starting an incremental scan.
- Improved JavaScript content check performance while detecting out of date versions.
- Renamed FogBugz send to action to its new name Manuscript.
- GitHub Send to action now works with organization accounts and private repositories.
- Added support for handling HTTP 307 redirects.
- DS_STORE files are discovered and parsed.
- Added WAF (Mod Security) rule generation support for out of band vulnerabilities.
- Improved MySQL double encoded string attacks.
- New Extensions scan policy settings to specify which extensions should be crawled and attacked.
- Added "Disallowed HTTP Methods" settings to scope options on the new scan page.
BUG FIXES
- Fixed an issue where empty value was not accepted for Excluded URLs
- Fixed an issue where invitation was not deleted after an account deleted
- Fixed font size for highlighted fields on vulnerability details
- Fixed an issue where validation was not working as expected for Invicti Hawk settings
- Fixed an issue where VDB update date was not persisted as expected
- Fixed some possible vulnerabilities missing [Possible] indicator in title.
- Fixed highlighting problem for "Password Transmitted over HTTP" vulnerability.
- Fixed the incorrect Possible LFI caused by the persisted OOB RCE pattern on the page response.
- Fixed incorrect "[Possible] WS_FTP Log File Detected" vulnerability.
- Fixed Hawk validation error by not following redirects.
- Fixed the issue where a vulnerability is not reported when the cookie contains a CSRF token.
- Fixed the issue where static detection vulnerabilities are treated as fixed after a retest even though they are not.
- Fixed the issue where CSRF token in the cookie is not reported when token is in the form action.
- Fixed the issue on GitHub send to action where the test passed but vulnerability issue cannot be created.
- Fixed the SSL check hang on HTTP only hosts.
- Fixed LFI engine by not analyzing source code disclosure on binary responses.
- Fixed a validation issue for some Swagger documents.
- Fixed the issue where CSP keywords are not reported when used without single quotes.
- Fixed mailto: and javascript: links which were incorrectly reported as mixed content.
- Fixed incorrect source code disclosures reported in binary responses.
- Fixed incorrect UNC Server And Share Disclosure vulnerability reports.
- Fixed out of date version reporting behavior when no ordinal is found in version database.
- Fixed Lighttpd version disclosure detection signatures.
- Fixed a Swagger parsing issue.
New Features
- Added "Fixed Vulnerabilities" chart to website and global dashboard
- Added vulnerability list to website dashboard
Improvements
- Improved support for Single Page Applications (SPA) and dynamic web applications by rewriting the DOM parser
- Improved DOM Parser and DOM XSS performance
- Added trend report support for all scan groups
- Improved cookie validation on the new scan page
- Removed web application fingerprint step from the Scan Policy Optimizer wizard
- Added tooltips for URL rewrite settings on the new scan page
- Added automatic exploitation for Boolean and Blind SQL Injection vulnerabilities
- Added proof of concept for the blind SQLi vulnerabilities
- Added "Proofs" knowledge base nodes
- Improved "Remember Me" functionality on the login page
- Removed out of scope links from URL rewrite report
- Added HTTP response status code 308 to list of redirect status codes
- Added Crawling and Scan Performance knowledge base nodes
- Eliminated web application fingerprinter's meta tag requests by re-using crawled link response
- Improved performance of the email disclosure detection pattern significantly
- Added .svg to default set of ignored extensions on the policy settings
Bug Fixes
- Fixed documentation of conditionally required fields in API
- Fixed editing issues on collective editor of vulnerability tasks
- Disabled website verification for on-premises installations
- Fixed a bug which could occur while taking a screenshot during the scan
- Fixed a bug that occurs when a proof of concept is empty
- Fixed a FileNotFoundException occurs while caching DOM requests
- Fixed the explanation text for Entered Path and Below scope
- Fixed the SSL/TLS fall back code to cover more HTTPS web sites
- Fixed an out of date JavaScript library version issue where identified version was bigger than Invicti’s latest version
- Fixed the slow performance issue which occurs when "Automatically Detect Settings" proxy setting is enabled
- Fixed an out of date JavaScript library version issue where version value cannot be captured
- Fixed a not found detection issue where redirect analysis fails on redirect cases
IMPROVEMENTS
- Added a 'Generate optimized CSS code path' feature to the Authentication Verifier
- Improved the Minimum Security Level area on the Reporting page
- HIPAA will be displayed instead of OWASP in the scan summary
- Added scan folder path change option for internal agents
FIXES
- Fixed the issue where the IP addresses of websites listed on the Discovered Website page were ignored
- Fixed the issue where SAML files failed to download on MAC devices
- Fixed the problem that occurred during verification of the form authentication API endpoint where it returned the same result after the first request
- Fixed the problem that occurred while configuring email notifications
- Fixed the problem that occurred while canceling stalled scans
- Fixed the connection problem that occurred while using a proxy in internal agents
- Fixed the autoscale problem in internal agents
NEW FEATURES
- Added support for U2F (Universal 2nd Factor Authentication)
- Added support for disabling API Access for a Team Member
- Added issue synchronization support for Azure DevOps
- Added a new Form Validation Errors node to the Knowledge Base panel, and to scan reports
- Added CVSS 3.1 support, to help with vulnerability scores
- Added a new Query Parameters checkbox to the Parameter-Based Navigation section of the Crawling tab in the Scan Policy Editor
- Added support for sending scan reports as email attachments on scan completed notification
- Upgraded the Invicti scanning engine to version 5.7.2.27798
IMPROVEMENTS
- Improved Integration categories and New Integration pages to provide a better user experience
- Added support for Windows Authentication (Integrated Security) for database connections (On-Premises only)
- Updated the Terms of Service page
- Added Technical Contact information to the 'websites/list' API endpoint
- Added start-end date filters to the '/scans/listbystate' and '/auditlogs/export' API endpoints
- Added an 'excludeAddressedIssues' filter to the '/scans/report/' API endpoint
- Added a Failure Reason option to the Reason filter for failed scans
- Added additional help text to the Issues' Detail window for groupable issues
- Added support for Admin users to manage their Team Member's Report Policies
- Added Profile ID information to the response of the '/scans/detail' API endpoint
NEW SECURITY CHECKS
- Added a Login Page Identifier security check
- Added a Content Delivery Networks (CDN) security check
- Added a Reverse Proxies security check
BUG FIXES
- Fixed a bug where issue counts were not returned for ongoing scans on the '/scans/detail' API endpoint
- Fixed an issue where validation errors were shown for custom cookies
- Fixed an issue where Technologies were not reported if a scan was completed in a short time
- Fixed a browser compatibility issue that occurred while testing OAuth2 credentials
- Fixed a bug where the Scan Time Window settings were not applied in Scheduled Incremental scans
- Fixed an issue where pre-request scripts were not being sent to the scanner as expected
- Fixed an issue where preferred Agent Group was not populated in the New Scan window
- Fixed a bug where JavaScript settings were not set as expected for optimized Scan Policies
New features
- Added the option to set a Custom HTTP Authorization Header under Scan policy > HTTP > Request
- Adjusted agent download parameters to allow installation of internal scanner agents using the Docker client via the Invicti registry service
- Changed the compression tool and default compression format for log files from 7zip to Tar
- Added functionality to enable entering of multiple IP addresses and IP ranges into the IP Address Restrictions setting. Previously, only single-entry IP addresses were permitted.
- Added TLS certificate authentication as an option when integrating with HashiCorp Vault. Previously, we only supported token authentications.
New security checks
- Added new patterns to detect XSS
Improvements
- Improved notification delivery with integration services
- [Closed Beta] Protected visibility of passwords within custom scripts
- Improved detection and reporting of File Inclusion vulnerabilities
- Improved detection and reporting of Sensitive Data Exposure vulnerabilities
- Improved detection and reporting of Dockerfiles
- Disabled caching from the boolean-based MongoDB security engine to avoid possible false positives
- Improved the content-type exemption for non-HTML content types in the CSP engine
- Improved the typehead.js check to increase stability
- Removed the X-XSS-Protection header check because it is deprecated by modern browsers
- Added functionalities to prevent bot detection and fixed an issue that was causing cookie loss after authentication
- Improved the remediation part for the JetBrains .idea detected vulnerability
- Added information to the UI about the functionality of the 'Edit My Team's Role' permission
- Added bypass list functionality for scan policies
Fixes
- Fixed a bug in the date filter that was causing incorrect information to display on the dashboard
- Fixed the external SOAP web service import problem
- Fixed a problem that was causing default values to be filled incorrectly, resulting in false negatives
- Fixed Vulnerabilities visible from the UI but not via API in certain failed scan situations
- Fixed inconsistent scan states in rare deleted scan scenarios
- Fixed missing Next Execution Time for certain scheduled scans
- Fixed an issue that prevented saving scheduled scans in some scenarios
- Fixed inconsistencies in the Resource Finder with certain hidden files and backup files
- Improved updating of groups in Azure Provisioning scenarios
- Fixed a problem with converting scan data while the CloudProvider Settings page is open
- Fixed a database update exception when a large number of scans are launched simultaneously
- Fixed the incorrect reporting of outdated technology versions
- Fixed a bug that was preventing reports from being saved
- Fixed a bug that can cause too much browser user data to be left in the temp folder
- Fixed a bug that was stopping the certificate authentication process from working correctly for Authverifiers
- Fixed a boolean-based MongoDB Injection that was causing false positives in scan reports
- Fixed the incorrect display of vulnerabilities when importing scan results from Invicti Standard to Invicti Enterprise
- Fixed a bug that was preventing the editing of internal website URLs
- Fixed a character validity issue so that user names with Danish characters can now be edited in the UI
- Fixed a bug that was allowing access to the UI via the back button after the user had signed out
- Fixed the Discovery Main Domains Filter Expression that was not working properly for some domains
- Fixed an issue that was causing tags to be duplicated when a website was imported using a CSV file
- Fixed the update agent command that was not working correctly
- Fixed the internal Linux v23.7 AV agent that wasn’t sending header configurations
- Encrypted the proxy password used in the scan policy file
- Fixed a scan coverage issue
- Fixed a custom script issue so that now passwords written to the logs are encrypted
- Fixed an issue where vulnerabilities could not be generated as CloudFlare WAF rules via API
NEW FEATURES
- Added Application/Service Discovery feature
- Added out of the box integration for GitLab CI
- Added custom recurrence options to Scheduled Scans to support advanced scheduling scenarios
- Added support for downloading internal scanner agents on Manage Agents page (On-Demand only)
- Added raw text option to Import Websites page
IMPROVEMENTS
- Improved colors for the app menu to follow WCAG guidelines
- New scheduled scans are not added to the queue if a delayed one already exists
- Improved validatation for SSO configuration pages
- Updated EULA and TOS pages
- Added support for deleting agents on the Manage Agents page
- Readjusted API rate limits
- Added a Data Protection Policy page
- Account admins can now disable other team members' 2FA settings
- Improved the wording on several pages
- Improved JIRA integration to prevent reopening the same issue twice in JIRA
- Added support for running concurrent scans on a single Enterprise computing instance (ondemand only)
- Attack Pattern' renamed as 'Payload' in the Send To integration templates
- Added tooltip for Scan and Report Policies options on the New Scan page
BUG FIXES
- Fixed the problem where Severity Trends displayed global severity numbers even if a Scan Group was selected on the Website Dashboard page
- Fixed an issue where the Manage Websites page, where the Last Scanned column was displaying the last scan's initiation time
- Fixed a bug where the severity order was wrong for the Retest Summary section on the Scan Report page
New Features
- Authentication & session verification for form based authentication.
- Credentials test for Basic and NTLM/Kerberos authentication mechanisms.
- Support for the Invicti Hawk infrastructure, used for detecting SSRF and out-of-band vulnerabilities.
- Added HTTP request rate limiting options to Scan Policy.
- Added "Ignored Email Addresses" section in Scan Policy.
- Added accept and reject options for untrusted SSL certificates.
- Added an option to disable automatic detection of 404 error pages.
- Support for importation of Postman files.
New Security Checks
- New security checks for Server Side Request Forgery (SSRF) vulnerability
- New security checks for out-of-band vulnerabilities such as OOB SQL Injection, OOB XXE, Blind XSS, OOB RCE, OOB RFI etc.
- New security check for Stored DOM based XSS
- Added "Missing object-src in CSP Declaration" vulnerability detection.
- Added "Apache Multiple Choices" vulnerability detection.
Improvements
- Improved the performance of several link importers.
- Added "Bearer Token" support for form authentication.
- Added confirmation for Frame Injection vulnerabilities.
- Added http: and https: checks for CSP vulnerability detection.
- Improved link importers - redundant CONNECT requests are now excluded.
- Optimized attacker performance for links containing single parameter.
- Optimized crawling parser by skipping DOM simulation on pages with static content.
- Improved coverage of CORS security check with extra attacks.
- Removed GWT attacks from file upload security checks.
- Improved DOM simulation performance.
- Improved CSS parsing which now follows CSS import directives.
- Improved coverage of open redirect security checks by adding/updating attacks patterns.
- Improved logout detection by skipping JavaScript responses.
- Added support for "HTTP 410 Gone" and "HTTP 451 Unavailable For Legal Reasons" response status codes.
- Added CVSS information to more vulnerabilities.
- Updated vulnerability database.
- Added URL Rewrite mode to Detailed Scan Report.
- Added support for configuring websites on manage groups page.
- Improved the UI & UX of several pages.
Bug Fixes
- Fixed an issue where a “multiple cookies issue” should not be reported.
- Fixed a JSON parsing issue with text parser.
- Fixed an HTTP response issue where the response could not be read because only BOM bytes are sent on first read attempt.
- Fixed an issue where a false positive file upload vulnerability might be reported.
- Fixed several DOM simulation issues on pages that have many iframe elements.
- Fixed a NullReferenceException while performing an internal MD5 encoding operation.
- Fixed an encoding issue on a proof URL of an XSS vulnerability.
- Fixed an issue where "Shell Script Identified" vulnerability is not found when retested.
- Fixed URL parsing on pages where the URLs were containing whitespace characters like carriage return and line feeds.
- Fixed a text parsing issue where absolute URLs were converted to invalid relative URLs.
- Fixed incorrect protocol detection for protocol-relative URLs.
- Fixed an issue which occurs during importing websites with unix line endings.
- Fixed a retest issue which occurs if vulnerable URL contains a dash character.
- Fixed an issue where SSL details were not shown properly on knowledge base report.
IMPROVEMENT
- Updated terms of services document
BUG FIXES
- Fixed a bug where XML reports can not be exported
- Fixed a bug where Jenkins integration was not working as expected
- Fixed an issue where "Check for Updates" was not displaying correct result for team member users
- Fixed a bug where sorting was not working on Scheduled Scans page
NEW FEATURES
- Added a new Sitemap section to scan reports which shows crawled URLs and identified issues
- Added a new in-app notification section called What's New which informs for important announcements
- Added out of the box issue tracking integration for Freshservice, YouTrack, and Splunk
- Added facility to send New Scan notifications using the Microsoft Teams integration
- Added Pre-Request Script feature which helps to configure HMAC Authentication on New Scan page (On-Premises only)
- Added new API endpoints for managing technologies
- Upgraded the Invicti scanning engine to version 5.6.3.27318
IMPROVEMENTS
- Redesigned Scan Summary section on Scan Report page
- Improved scan queue scheduling process which prevents multiple scans with same settings to be queued
- Improved Out-of-Date technologies email template for mobile clients
- Improved rendering for large fields on the scan report template
- Improved help text for Enable/Disable Agent actions on Manage Agents page
- Security Check Groups are now arranged into sub-groups in the New Scan Policy
- Set current user as the default technical contact on New Website page
NEW SECURITY CHECKS
- Added version disclosure and out-of-date checks for Telerik Web UI
- Added detection and out-of-date checks for Java and GlassFish
BUG FIXES
- Fixed a bug where filtering is not working as expected on the Report Policies page
- Fixed an error that was thrown during generating the Mod Security WAF Rules Report
- Fixed an issue where testing basic authentication credentials were not working as expected
NEW FEATURE
- Added SSO (Single Sign-On) support for Netparker Enterprise On-Demand
IMPROVEMENTS
- Improved text shown after deleting a website
- Improved text shown on Authentication Verifier Settings page
- Improved help text for Recaptcha setting shown on Service Settings page
- Removed 2FA disable button for users who do not have required access permission (previously displayed as disabled)
- Improved timer behaviour of validation code shown on SMS Settings page
- Improved order of vulnerabilities in several reports
- Response content will not be rendered if it's higher than 10MB, instead response data can be downloaded from scan results page
- Refactored and improved performance of reports which can be exported from Scan Results page
- Added market place links for Jenkins, TeamCity and Bamboo plugins shown on Integrations page
- Improved validation messages for JIRA integration
- Improved samples for new website API documentation
- Changed wording on General Settings page
- Simplified endpoint format for Authentication Verifier settings
BUG FIXES
- Fixed a bug where if previous scan failed with domain resolution error, subsequent scans failed unexpectedly with the same error
- Fixed a bug where imported Swagger file was not parsed during scanning
- Fixed a bug where multiple SAML configurations might be configured with same configuration identifier
- Fixed an issue where Agent could not be disabled on Manage Agents page
- Fixed an issue where Jenkins icon was not displaying properly on IE
- Fixed a bug where sorting was not working for Next Execution Time on Scheduled Scans page
- Fixed a bug where product update links were not displaying correctly
- Fixed a bug where configured Scan Policies' user agent was not used in Authentication Verifier
- Fixed documentation links for SSO providers
- Fixed API authorization error thrown on notification endpoints for Team Members
- Fixed an issue where custom reports were not displayed on Scan Results page
- Fixed an issue where Knowledge Base data was not saved properly
New Features
- Completely revamped the Invicti Enterprise vulnerability tracking system.
Improvements
- Improved the users' permissions as explained in Understanding and configuring Invicti Enterprise users permissions.
- Added several tooltips in the UI.
Bug Fixes
- Fixed wrong websites threat levels (they were just representing the last scan's threat level).
- Fixed the security overview chart which was showing only the last scan's threat level for each website.
NEW FEATURES
- Added the Business Logic Recorder feature in Invicti Enterprise, so you can scan web applications without extensive manual work or additional non-automated tools.
- Added support for Azure Key Vault.
- Added GraphQL Libraries detection support.
- Added built-in DVWA policies to scan policies.
- Added the feature to tag discovered websites.
- Added Invicti Shark (IAST) to the Knowledge Base.
IMPROVEMENTS
- Improved the Authentication Verifier to work with .NET 6.0.
- [Breaking Change] Added support for on-premises versions of CyberArk, HashiCorp Vault, and Azure Key Vault. This requires an authentication verifier agent.
- Improved the Late-Confirmation Storage Mechanism to lower disc usage.
- Improved the rate limit for the All Issues API endpoint.
- Improved the Cloud Provider setting to enable the Linux ID Image.
- Added an API endpoint to better understand how many websites each user scanned.
- Added raw scan file expired status to the Scan Failure Reasons.
- Added the IsEnabled API endpoint for the OAuth2 setting.
- Updated the icons on the Trend Matrix page.
- Added logs to scheduled scans to identify the license issue when the scan couldn't be launched.
- Improved the internal agent to check whether OAuth2 is enabled or not.
- Improved the agent’s language setting to prevent non-English texts from appearing on the scan results.
- Improved the Activity Log to include information on vulnerability profile changes.
- Improved the Scan Profiles API endpoint to include information on the imported URLs.
- Added integration failed status for the Secrets and Encryption Management services.
- Updated the scan agent update workflow. When there is a new update and users have more than one scan agent, the new version will be downloaded only once. Other scan agents will rely on this new package to update themselves.
- Added a drop-down to determine how many results to be displayed on a page.
- Added a new explanation for the api/1.0/scans/unschedule endpoint to clear any ambiguity
- Added a filter that checks the number of issues being displayed on the global dashboard.
- Improved the IP filtering on the discovered websites' page.
- Updated the Splunk plug-in to prevent exporting unnecessary HTML information to the Splunk ticket.
- Added 'Is Encoded' option to OAuth2 parameters.
- Adding the Connection Timeout option to the scan policy.
- Improved the Knowledge Base tab in the technical report section for accessibility.
- Added the Browser Settings to scan policy.
- Added report policy migration process while relaunching scan session to prevent launch scan issue.
- Added a discovered date column for websites detected by the Discovery Service.
- Updated the Invicti Hawk’s redirection while validating the certificate.
- Added a timeout for website import. The default value for timeout is 400 ms.
- Improved the tooltip for security checks on the scan policy page to properly reflect the security policy selections.
- Updated the SCIM integration for provisioning on Azure Active Directory’s marketplace.
- Added the ability to bulk edit issues.
- Added the scan policy header to the OAuth2 requests.
- Improved JWT confirmation to avoid false positives.
- Added a new IAST vulnerability: Overly Long Session Timeout.
- Added new config vulnerabilities for the IAST Node.js sensor.
- Added new config vulnerabilities for the IAST Java sensor.
- Added support for detecting SQL Injections on HSQLDB.
- Added support for detecting XSS through file upload.
- Updated DISA STIG Classifications.
- Updated Java and Node.js IAST sensors.
- Improved the Content Security Policy Engine.
- Updated XSS via File Upload vulnerability template.
- Added Extract Resource default property to DOM simulation.
- Added an option to discard certificate validation errors on the Enterprise Integration window during SSL/TLS connections.
- Added the agent mode to the authentication request.
- Added a default behavior to scan the login page.
- Added a default behavior to disable TLS1.3.
FIXES
- Fixed the issue that the advanced installer enabled the Windows authentication.
- Fixed a bug with displaying cookie names in the scan policy.
- Fixed a Globally Unique Identifier bug that assigned zero to a custom vulnerability when identified.
- Fixed a bug that prevents editing an internal website.
- Fixed a bug that caused a broken website-scan relationship as a result of an inconsistent update.
- Fixed the inconsistent vulnerabilities listed in XML and CVS reports.
- Fixed the bug that caused the issues' status to stay the same in the case of bulk editing.
- Fixed a bug on the user interface that showed incorrect scan status.
- Fixed an issue with global servers in imported Swagger files.
- Fixed a bug that adds duplicated users to a team when added using SCIM.
- Fixed the Azure board integration webhook issue caused by the status codes.
- Fixed a bug that prevents members with user-defined roles from being deleted.
- Fixed a bug that prevents the information displayed when users select Jira on the user mapping.
- Fixed a bug that prevents a notification from being sent to users when users filter the state.
- Fixed a bug that does not request to verify website ownership when the website's agent mode is changed from internal to Cloud.
- Fixed a bug that causes showing an outdated vulnerability database version of an agent on the user interface.
- Fixed a bug that shows different information between Invicti Standard and Invicti Enterprise on the Known Issues of the Out-of-Date Node when the software composition analysis is run.
- Fixed a bug that does not show the website thumbnail when the scan is completed.
- Fixed an issue that causes custom vulnerabilities not to be added to the Vulnerability Lookup table.
- Changed filter for Groupable Custom vulnerabilities when creating vulnerability model.
- Fixed a bug that prevents a scan profile from being updated when users add a client certificate.
- Fixed a bug that threw an error when users tried to delete a scan policy.
- Fix a bug that prevents exporting a vulnerability list report in CSV or XML when Invicti Shark (IAST) is enabled.
- Fixed a bug while excluding cookies during the scan.
- Fixed a bug that prevents websites from being deleted.
- Fixed the Jazz Team Server multiple category issue.
- Fixed a bug that occurs when a detailed scan report does not report the CVSS scores for custom vulnerabilities.
- Fixed a bug that prevents editing the FreshService integration.
- Fixed the link that throws an error on the SCIM API documentation page.
- Fixed a bug that throws an exception when the agent is started in debug mode on IDE.
- Removed the space on CVSS Scores that caused incorrect values to show up.
- Fixed the parsing problem encountered when Burp and Postman files are imported via the Links/API Definition page.
- Fixed imported links DLL mismatch problem for GraphQL.
- Improved the scan agent to continue scanning in case of getting HTTP status errors like Forbidden, Unauthorized, and ProxyAuthenticationRequired for websites supporting TLS 1.3.
- Fixed a bug that causes scan failures if the scan profile name includes the “/” character.
- Fixed a bug that was caused by special characters that affected the Out of Scope node.
- Fixed a bug that caused the OAuth2 settings to disappear after being saved in a scan profile following enabling and disabling operations.
- Fixed a bug that throws errors on the summary page for technologies links.
- Fixed the issue that IP Address Restriction is not working on API access.
- Fixed an issue that shows the same vulnerabilities more than once in the scan summary reports.
- Fixed a bug that shows the soft-deleted scan policies when their URL is entered.
- Fixed a bug while excluding cookies during the scan.
- Fixed a bug that prevents notifications from appearing on the user interface when data size is exceeded.
- Fixed imported links DLL mismatch problem for Postman and GraphQL.
- Fixed a bug that shows the empty list of possible GraphQL endpoints in the Security Checks list.
- Fixed a bug that throws 500 Internal Server Error returns upon "GET issues/addressedissues" API call.
- Fixed a bug that throws 500 Internal Server Error returns upon "GET /issues/todo" API call.
- Fixed an issue that passive vulnerabilities were reported at out-of-scope links.
- Fixed an issue that imports global servers at Swagger files.
- Fixed an issue where the OK button disappears during interactive login.
- Fixed an issue that adds interactive login buttons to iframes.
- Fixed a null reference exception at the LFI exploit panel.
- Fixed basic authorization over HTTP bug.
- Fixed SQL Injection Vulnerability Family Reporting Bug.
- Fixed a bug in that the custom script throws a null reference exception when a script is added to the paused scan.
- Fixed a bug that deletes an authentication password when a new scan is started with a copied profile.
- Fixed a bug that causes the Sitemap to disappear during scanning with IAST.
- Fixed a bug that caused missing tables and values when a report policy is exported as an SQL file.
- Fixed an issue that causes the attack process not to be completed for a security check when there is an error occurred while attacking a parameter with an attack pattern.
- Fixed the LFI Exploiter null reference.
- Fixed a bug that occurs when a detailed scan report does not report the CVSS scores for custom vulnerabilities.
- Fixed a bug when the Log4J vulnerability profile is not migrated with the report policy migration.
- Fixed a bug that prevents the WSDL files from being imported.
- Fixed reporting "SSL/TLS not implemented" when scanning only TLS 1.3 supported site.
- Fixed a bug that throws an error for NTML authentication when the custom username and password credentials are provided when the system proxy is entered into the appsetting.json
- Fixed the bug that the passive vulnerabilities were reported from out-of-scope links.
- Fixed the issue that does not terminate the Chromium instances although the max scan duration is exceeded.
- Fixed the issue that automatically enables “Exclude Authentication Pages” after enabling form authentication.
- Fixed the bug that throws a null reference exception at the link pool.
- Fixed the bug that resulted in running many Chromium instances when a new scan is started.
REMOVED
- Removed the agent platform selection option for the internal agents from the user interface.
- Removed the Ignore these extensions field from the scan policies page.
NEW FEATURES
- Added support for integrating Invicti Enterprise with JIRA issue tracking system.
- (BETA) Added support for scanning internal websites in Invicti Enterprise
- Added proxy support for on-premises scanner agents.
IMPROVEMENTS
- Decreased scan results' registration time by optimazing database queries.
- Added several improvements for running Invicti Enterprise on-premises on AWS.
- Added more information (such as Total Requests and Average Speed) to the detailed scan report.
- Improved code samples used in API documentation.
- Improved help text and messages.
- Added delete button to website edit page.
- Improved scanner agent's startup script to ensure agent is started properly.
- Improved sign-in/logout flow to make user sessions more secure.
- Reviewed and fixed duplicate IDs in HTML elements.
- Improved design of the email templates.
- Updated AWS SDK to the latest version.
- Added Korean support to scan report API endpoint.
- Added support for setting preferred agent name via API.
- Added status information to preferred agent section on the new scan page.
FIXES
- Fixed an issue with the archiving of raw scan files.
- Fixed the total website count which was incorrect on manage website groups page.
- Fixed the user's date format that was not used while selecting dates on account settings page.
- Fixed the account settings page which was not displayed properly in high-DPI screens.
- Fixed a bug where issue counts were not displayed correctly on website dashboard page.
- "JavaScript - Elements To Skip" setting was is now set properly in new scan policy page.
- Expired license error is now returned properly in API endpoints.
- Fixed issues with the order of the websites in the "Websites That Have Shortest Fix Time" widget.
- Fixed an error which was being thrown when adding a website via API in Invicti Enterprise on-premises.
- Fixed CVE links in scan report page.
- Fixed a bug in website verification API endpoint.
- Fixed a NRE which was being thrown during exporting CSV reports.
- Fixed a bug where CSV comma separator is not remembered on Export to CSV pages.
- Fixed an error which was being thrown during deleting a scan profile.
- Fixed a bug in website verification API endpoint.
NEW FEATURES
- Added Mattermost integration
- Upgraded the Invicti scanning engine to version 5.8.1.27665
- Added API support for the Discovery service
NEW SECURITY CHECKS
- Added a new vulnerability for Same Site Cookies that are set to None and not marked as secure
IMPROVEMENTS
- Added support for Admin users to log in with Invicti Enterprise credentials when SSO is enforced
- Added extra information about issues to the Jira Integration
- Added control for Target Url field to disable Scan Settings if it's empty
- Added Timezone information to Scan Time Window section in the New Scan window
- The Invicti API icon has been changed on the Integrations window
- Added Manage Issues (Restricted) to the Permission Matrix
- Added a Website Groups filter to the New Team Member window
- Added a notification for Login Failed situation during scans
- Added a Website Group filter to the Recent Technologies window
FIXES
- Fixed the More information link in the New Website window
- Fixed a bug where email notifications about Technologies were not being sent as expected
- Fixed an issue where date filters were not working as expected
- Fixed a bug in the website authentication process in the GitLab integration
- Fixed an issue where the Internal Agent automatic update process was hanging
- Fixed an issue in scans that are exported from Invicti Standard into Invicti Enterprise
- Fixed an issue where Mark as Read was not working in Application Notifications
- Fixed a bug where Imported Links and files were not returned for ongoing scans on the '/scans/list-scheduled' API endpoint
- Fixed a bug that occurred when adding an internal website in the '/websites/new' API endpoint
- Fixed an issue where Excluded Path was not saved in the Scan Profile save action
- Fixed an issue where Preferred Agent was not saved in the Scan Profile save action
- Fixed an issue where issue counts were duplicated in the Annual issue chart
BUG FIXES
- Fixed an issue with setting up a new Team Member when SSO was enforced.
- Fixed an issue which was occurring during re-installing previously terminated agent.
NEW FEATURES
- Netsparker Enterprise is now Invicti Enterprise.
- Added Node.js sensor for Invicti Shark (IAST).
- Added the Bridge URL and Shark token support for Invicti Shark (IAST).
- Added Software Composition Analysis (SCA) feature.
- Added support for scanning GraphQL APIs.
- Added Authentication Verifier Service for the authentication verifier agent.
- Added OWASP API Top Ten Report.
- Added OWASP Top Ten 2021 report and classification.
- Improved the search for scan profiles on the Recent Scans page.
- Added the Scan Profile Default option to the column filters on the Recent Scans page to speed up the search for the default scan profiles.
- Improved the error messages and code returned from the updating issue API endpoint.
- Added unique IDs on the HTTP 500 Error page.
- Updated a Docker agent library to run more security checks.
- Introduced the default scan and report policy, so you can set default policies for your team.
- Added the OWASP API Top Ten 2019 scan policy.
NEW SECURITY CHECKS
- Added signature matching to Web app fingerprint checker.
- Added patterns for Base64 encoded DOM Cross-site Scripting.
- Added phpMyAdmin Version Disclosure security check.
- Added Atlassian Confluence Version disclosure and Out-of-date security checks.
- Added exclusion feature to JavaScript Library detection.
- Added PHP Version Detection via phpinfo() call.
- Added the Shopify Identified security check.
IMPROVEMENTS
- [Breaking Change] Improved the Authentication Verifier Agent. The new version supports the improved performance for single-page applications, consumes fewer resources, and comes with the auto-update feature. This improvement requires the re-installation of the Authentication Verifier Agent.
- Improved Invicti to comply with WCAG 2.1 - Level AA.
- Improved the U2F Security Key standard to the Web Authentication API.
- Updated embedded Chromium browser.
- Updated Invicti Standard .NET Framework version from 4.7.2 to 4.8.
- Improved Invicti to be compatible with FIPS 140-2.
- Changed the brand name of Clubhouse to Shortcut.
- Updated the Bamboo plug-in to version 1.8.
- Added a check to prevent entering special characters into the optimized scan policy.
- Added the DeleteById field when a website is deleted.
- Added validation of the URLs entered by a user in the ImportedLink section while saving the database.
- Improved the SCIM error message when a user filters users/groups with mistaken syntax.
- Added the "not contains" filter to exclude specific titles, such as Out-of-Date.
- Added the notification on the Reporting page when the time start predates the time end.
- Added setting to configure Session Cookie Names.
- Updated CWE classification category orders for Out-of-date templates.
- Improved Cross-site Scripting attack pattern.
- Added support for exploiting local storage and session storage in the DOM XSS security checks.
- Added highlighting support for custom scripts.
- Added Web Application Firewall to the site profile.
- Changed the default ignored parameter comparison to case insensitive.
- Added 'Is Encoded' option to OAuth2 parameters.
- Added JWT Token pre-request script template.
- Added the CSP Not Implemented that will be reported as confirmed.
- Added the Subresource integrity not implemented that will be reported as confirmed.
- Marked weak TLS ciphers.
- Added the tag filtering to the Recent Scans page.
- Added the tag limitation. Users cannot add more than 20 tags.
- Added the date range filter to the global dashboard. Thanks to this improvement, users can filter scan data according to the selected time range.
- Added website and website group information to Jira integration. When users send an issue to Jira via Invicti Enterprise, website and website groups information, if any, appears in that ticket.
- Added a check for the Trend Matrix Report to ignore null records in the database.
- Improved the method to query known vulnerabilities in Invicti Enterprise.
- Changed SCIM response status code from 400 to 409 when the same email address is submitted twice.
- Added a 400 Error message in the SCIM response status code when a user tries to change their email to a username.
- Updated the error message when deleting the website during a PCI scan.
- Added the severity level icons to the websites listed on the Websites' page.
- Improved the Login Banner Warning feature so that users cannot access any resources on Invicti Enterprise until they select the Accept, Continue button.
- Add the Environment field to the DefectDojo integration.
- Added the Export to CSV button on the Manage Members page so that you can download all your team members to your environment.
- Added a new security check to identify version disclosure and out-of-date version for Atlassian Confluence CVE-2021-26084.
- Added the tagging filtering to the Scan Profiles.
- Added the license error to the scans that were scheduled by users whose licenses are expired.
- Added the fixed confirmation date to the issues API endpoint so that you can better track your team's remediation efforts.
- Added null check for application names during comparison with the vulnerability database.
- Added a behavior that the system sets the default policies of a website group to a website for the Scheduled Group Scans and Group Scans. The system sets the default policies only if users select the default policies on the General Settings page and then assign these policies to a website group on the policies page.
- Added an information message for updating the agent's status.
- Improved the paragraph style of the login warning banner.
- Added the error messages to the Login Simulation Pages.
- Added a condition for team members when sending an email notification.
- Added a condition when sending an email notification for Out-of-Date Technologies to customers.
- Improved the importing of RAML files including other files.
- Updated the Freshservice integration not to send a user agent header.
- Improved the API responses by adding model mapping for AuthenticationProfileOption and AuthenticationProfileId.
- Added a message to the Jira integration to show that the integration is created successfully.
- Added an error message for the invalid component value of the newly created Jira integration.
- Improved the pop-up message that warns users that they share the report with a person from the outside of the organization.
- Updated CheckLicense task request timeout duration to prevent the Hangfire queue from being blocked.
- Improved the internal agent to take a screenshot to make sure that the first page loads properly.
- Updated CheckLicense task request timeout duration to prevent the Hangfire queue from being blocked.
- Updated the Lodash version.
FIXES
- Fixed the retest retry limit if the base scan is not loaded.
- Fixed an email notification error sent to guest users which showed "Failed - Unable to load scan session" error in the scheduled scans although the scan was successful.
- Fixed a NullReferenceException thrown while checking the target URL in the New Scan page.
- Fixed password autocomplete issue in the form authentication saved in a scan profile.
- Fixed an error that prevents the URL Rewrite rule from being updated in the saved scan profile.
- Fixed an error that prevents scan tags from being shown while creating a scheduling scan.
- Fixed the Ignore SSL Certificate issue that prevents internal agents from being auto-updated.
- Improved the performance of security checks on cases when multiple checks are running concurrently.
- Fixed a bug that prevents a website from being deleted if that website has tags.
- Fixed a bug that non-register users receive the Out-of-Date technology notification although these users have no website responsibility.
- Fixed a bug that shows a two-factor authentication page to some users with SSO login after their information is updated on the Team Member page.
- Fixed typo in the All Issues page filter drop-down.
- Fixed a bug returning the 500 Error when an issue is updated.
- Fixed a bug that led to duplicated records in a member's role.
- Fixed a bug that ignored a member's time zone setting while generating a vulnerability list in XML format.
- Fixed a bug that causes the private scan policies to appear in the Scan Policy drop-down at the New Scheduled Group Scan page.
- Fixed a bug that did not convert the remaining time for the Next Execution Time of a scheduled scan properly.
- Fixed a bug that prevented the scan profile of a deleted website from being removed. Now, when users delete a website, the related scans, including scan profile, are also deleted.
- Fixed an issue that prevent the scan from being canceled.
- Fixed the missing ScanTaskProfile field by adding it back to scan API call responses.
- Fixed a bug that prevents members and teams from being deleted if they have been assigned to website groups.
- Fixed a bug that allows the API member edit endpoint which accepts less than 15 characters for the administrator's password.
- Changed the permission to view reports from Add/Edit Scan to the View Report.
- Changed Agent request time interval to 60 seconds.
- Fixed a bug that prevents an agent from scanning a new website if the previous scan was canceled.
- Fixed a bug that results in missing HTTP headers of target URL when added with imported links.
- Fixed an issue that causes proof creation for SQL injection and Cross-site Scripting even if the proof generation is disabled.
- Fixed an issue that prevents cookie's same site attribute from being updated which causes the "same-site cookie is not implemented" vulnerability to be reported.
- Fixed a JSON Web Token (JWT) validation check that causes too many invalid token errors when using Bearer Authentication Tokens in the form authentication.
- Fixed an issue where host and path parameters in Postman collection were not imported when they are string instead of an array.
- Fixed a bug that returns 401 when the scanner sends HTTP headers in lowercase.
- Fixed a bug about cookie handling in the logout detection page during the form authentication verification.
- Fixed a bug that results in slow response time from the web application to the agent that causes inconsistent vulnerability reports in the Blind SQL Injection.
- Fixed the first seen date issue that appeared differently on the user interface and the scan report.
- Fixed the Url Rewrite Excluded Links API call by adding null response back to that call's responses.
- Fixed a bug that prevents serialized integration information from being decrypted in some issues.
- Fixed an issue that displays the mistaken path in the trend matrix reports when different paths are scanned.
- Fixed a bug returning the 500 Error when an issue is updated.
- Fixed the issue that the Content-Type header missing was reported when there was no content in the response.
- Fixed the issue that false-positive JSON Web Token (JWT) was reported in a not found response.
- Fixed the issue possible and confirmed vulnerabilities reported in the same URL.
- Fixed the issue proof that was generated even when the proof generation option was disabled in the scan policy.
- Fixed FP Waf Identified.
- Fixed the issue vulnerability count in root node is not updated when a vulnerability is removed and Blind XSS was prioritized over the Reflected Cross-site Scripting.
- Fixed the issue source code disclosure is reported in binary responses.
- Fixed the issue JWT JKU vulnerabilities are not reported in Invicti Enterprise because of Null Reference Exception.
- Fixed the issue fingerprint checker crashes when an application file could not be found.
- Fixed the issue object-src missing was reported when default-src is provided in CSP security checks.
- Fixed the issue that some cipher suites are not reported as weak.
- Fixed the issue classification links were not rendered correctly when there are multiple values.
- Fixed the issue proof prefix was added when there were no more characters to be found.
- Fixed an issue that set the wrong default scan and reports for the Scheduled Group Scan and Group Scan if there is a scan profile.
- Fixed an issue that prevented a user from editing the default scan policy.
- Fixed an issue that removes the client certificate from the Form Authentication page if the related scan profile is updated.
- Fixed an issue that occurred when the same vulnerability was sent to Jira's endpoint more than once.
- Fixed a mismatching type issue on /scanprofiles/list API response model.
- Fixed the Jolokia version disclosure report to properly highlight the related lines.
- Fixed a bug that threw an error when users update a vulnerability's status as False Positive on the Technical Report page.
- Fixed a bug that prevented subprocesses of agents from being shut down during the update process.
- Added workspace information for Bitbucket integration.
- Fixed a bug that threw a communication error when sending an issue to Kenna.
- Added Tags property to the Kenna integration.
- Fixed an issue that prevented keywords from being refreshed when the login required URL is changed on the Login Verification window.
- Fixed a misspelled word on the GraphQL Introspection window.
- Fixed a bug that prevented each website from using its own default scan policy when a scheduled group scan is launched.
- Fixed the issue where the client-side cookies were not excluded correctly.
- Fixed an issue with latestVulnerabilityStatePointId values that return errors on the Issues/To Do and Issues/All issues.
- Fixed an issue that shows a two-factor authentication warning message for provisioned team members with Okta.
- Fixed an information message that uses the word "notification" although the message is about the integration.
- Fixed an issue in DefectDojo, YouTrack, and TFS integration that refreshes the New Integration page when a custom field is added and the user selects the Create Sample Issue button.
- Fixed an issue that shows extra leading white space in the console of the Website page.
- Fixed the issue with the Missing XSS protection Header in the Out-of-Scope link.
- Fix the issue that prevents the built-in scan policies from being updated when there is a new update.
- Fixed a request payload when the Agent sends big scan data.
- Fixed OAuth2 verification that fails due to the OTP settings model being null.
- Fixed the scan error on completion issue because of crossthread error by moving to ConcurrentDictionary.
- Fixed an issue where the '>' symbol was displayed on the Manage Agents page.
- Fixed an issue that reports incorrect results during checking the redirect URL for Open Redirect vulnerability.
- Fixed the /scans/report/{id} API endpoint that returned empty HTML report.
- Fixed an issue that the Discovery Service keeps working for the disabled accounts and websites.
- Fixed an issue that duplicates the number of RegEx parameters when the page is refreshed.
- Fixed NHS exception errors in the Docker agent.
- Fixed an issue that prevents the Sitemap from populating correctly after a scan.
- Fixed an issue that prevents the DeleteById field in the database from being updated.
- Fixed null exception error while mapping imported links in API.
- Fixed a bug that causes the Issues page to be crashed when the state filter is selected.
- Fixed a bug in which the new scan page is stuck although a new scan has been launched.
- Fixed a bug that causes an error when you want to delete a scheduled scan that has a website with tags that were included in a scan profile.
- Fixed a bug that generates a blank scan report when a vulnerability has a null name value.
- Fix a bug that does not show imported links in scheduled scans.
- Fixed OAuth2 verification that fails due to the OTP settings model being null.
- Fixed a bug that prevents the WSDL files from being imported.
- Fixed the Database User Name's tooltip on the Installation Wizard.
- Fixed the SCIM API schema that showed incorrect responses for the group.
- Added the OnlySsoLogin parameter for SCIM so that users can determine if they want members to log in with SSO or not.
- Fixed a null reference type issue while creating JsonSerialized Kafka issues.
- Fixed a bug that prevents the visibility of the drop-down of the preferred agent on the New Scan page when the Authentication Verifier Service is not running.
- Fixed a bug that fails to redirect users to the Manage Websites page after adding a new website.
- Fixed the information message that appears on the OAuth2 settings page when there is no authentication verifier for the target URL.
- Removed the "> symbol that appears on the Creator column of the Websites' list.
- Fixed a bug on the imported links that cause duplicated entries when users select the toggle content after removing some links.
- Fixed a bug that creates duplicated team records on the teams and roles for the website groups.
- Removed Pre-request Script validation before starting a new scan.
- Fixed a bug that occurs the authentication verifier agent does not start automatically when the machine where the verifier is installed is restarted.
- Fixed several scan failure issues caused by errors that occurred while trying to open the VDB.
- Fixed the CyberArk validation problem on the New Scan page.
IMPROVEMENTS
- Added the support to download scanner and authentication verifier agents from the Configure New Agent page.
- Updated the scan profile to include the verified form authentication.
- Updated embedded Chromium browser.
- Improved the Authentication Verifier Agent to work with self-signed SSL.
FIXES
- Fixed the bug that does not show the screenshot of the scanned target URL on the scan summary page.
- Fixed the bug that does not produce any logs for the Authentication Verifier Service.
- Fixed the bug that requires the cache to be cleared so that the new authentication verifier can be listed on the Manage Agents page.
- Fixed the bug that causes the request not to be sent because of an empty referer header.
NEW SECURITY CHECKS
- Added Remote Code Execution (CVE-2022-22965) a.k.a. Spring4Shell detection support.
Update to the new version
If you want to update the latest version of Netsparker Enterprise On-Premises, see Updating Netsparker Enterprise On-Premises.
FIXES
- Fixed the More Information link that appears in the Encryption step during Netsparker Enterprise On-Premises Web Application installation process.
- Fixed an issue that threw "failed to decrypt" error for integrations.
- Improved SQL query that caused issue following update to Invicti Enterprise On-Premises 2.1
Update to the new version
If you want to update the latest version of Invicti Enterprise On-Premises, see Updating Netsparker Enterprise On-Premises.
NEW SECURITY CHECKS
- Added Out of Band Code Evaluation (Log4j CVE-2021-44228) a.k.a. Log4Shell detection support.
FEATURES
- Introduced the tagging feature for websites, website groups, and scans.
- Introduced a login banner warning. The banner displays security and legal notices to users accessing the system.
- Added DefectDojo Integration.
- Added the Encryption key.
- Added pre-scan validations so that Netsparker can automatically choose the TLS protocol.
IMPROVEMENTS
- Added the date range filter to the global dashboard. Thanks to this improvement, users can filter scan data according to the time range they selected.
- Added a new State filter on the Issues page.
- Added the Environment field to the DefectDojo integration.
- Added the Export to CSV button on the Manage Members page so that you can download all your team members to your environment.
- Added the group by parameter to the Technology dashboard.
- Added the tag limitation. Users cannot add more than 20 tags.
- Added website and website groups information to Jira integration. When users send an issue to Jira via Netsparker Enterprise, website and website groups information, if any, appears in that ticket.
- Added the missing information that was not exported to YouTrack, Asana, and Github in the case of Frame Injection vulnerability.
- Added the severity level icons to the websites listed on the Websites' page.
- Added new property to /scans/list API endpoint to distinguish between scans.
- Added paging to auditlogs/export API endpoint.
- Added a check for the Trend Matrix Report to ignore null records in the database.
- Improved the method to query known vulnerabilities in Netsparker Enterprise.
- Changed SCIM response status code from 400 to 409 when the same email address is submitted twice.
- Added a 400 Error message in the SCIM response status code when a user tries to change its email to a username.
- Updated the error message when deleting the website during a PCI scan.
- Improved the search for scan profiles on the Recent Scans page. Added the Scan Profile Default option to the column filters on the Recent Scans page to speed up the search for the default scan profiles.
- Improved the error messages and code returned from the updating issue API endpoint.
- Added unique IDs on the HTTP 500 Error page.
- Updated a Docker agent library to run more security checks.
- Added a control in the UserRoleWebsiteGroupMapping API endpoint to prevent null object reference exceptions.
- Changed the error message for members/update API endpoint for password POST requests.
- Issue notes are added to reports which are exported.
- Improved the statusCode and errorMessage returned from members/deleteinvitation API endpoint on cases when the invitation is missing.
- Changed roles/update API endpoint response status code from 201 to 200 to better comply with REST best practices.
- Added “Override Version Vulnerability Severities” option to Scan Policy > Attacking settings.
- Improved the error message displayed when a Website Group cannot be deleted due to it being referenced by a notification.
- Extended the range of digits that can be entered for HOTP and TOTP configuration.
DEPRECATED
- Removed X-Scanner request header from the default scan policies to prevent WAFs block the scans.
FIXES
- Fixed a bug that prevented the filtering by website groups on the technology dashboard.
- Fixed an unhandled error that happens while deleting scans.
- Fixed an issue where the check state is reset when the search keyword is modified on the Report Policy Editor security checklist.
- Fixed a bug that prevented updated scan profiles of the Scheduled Scans from being synchronized with these scheduled scans.
- Fixed an issue where incorrect scan profiles and policies were used while performing group scans.
- Fixed a space issue in GitLab integration that prevented integration to be completed successfully.
- Fixed the deserialization issue that threw bad requests in some scans.
- Fixed the issue of returning null response by removing WebsiteGroupId requirement from UserRoleWebsiteGroupMapping API endpoint.
- Fixed the retest retry limit if the base scan is not loaded.
- Fixed an email notification error sent to guest users which showed "Failed - Unable to load scan session" error in the scheduled scans although the scan was successful.
- Fixed a NullReferenceException thrown while checking target URL in the New Scan page.
- Fixed password autocomplete issue in the form authentication saved in a scan profile.
- Fixed an error that prevented the URL Rewrite rule from being updated in the saved scan profile.
- Fixed an error that prevented scan tags from being shown while creating a scheduling scan.
- Fixed the Ignore SSL Certificate issue that prevented internal agents from being auto-updated.
- Improved the performance of security checks on cases when multiple checks are running concurrently.
- Fixed a bug that prevented a website from being deleted if that website has tags.
- Fixed a bug that non-register users receive the Out-of-Date technology notification although these users have no website responsibility.
- Fixed a bug that shows a two-factor authentication page to some users with SSO login after their information is updated on the Team Member page.
- Fixed typo in the All Issues' page filter drop-down.
- Fixed a bug returning the 500 Error when an issue is updated.
- Fixed a bug that led to duplicate records in a member's role.
- Fixed a bug that ignored a member's time zone setting while generating a vulnerability list in XML format.
- Fixed a bug that caused the private scan policies to appear in the Scan Policy drop-down at the New Scheduled Group Scan page.
- Fixed a bug that did not convert the remaining time for the Next Execution Time of a scheduled scan properly.
- Fixed a bug that prevented the scan profile of a deleted website from being removed. Now, when users delete a website, the related scans, including scan profile, are also deleted.
- Fixed an issue that prevented the scan from being canceled.
- Fixed the missing ScanTaskProfile field by adding it back to scan API call responses.
- Fixed a bug that prevents members and teams from being deleted if they have been assigned to website groups.
- Fixed a bug that allows the API member edit endpoint which accepts less than 15 characters for the administrator's password.
- Changed the permission to view reports from Add/Edit Scan to the View Report.
- Increased the Agent request time interval to 60 seconds.
- Fixed a bug that prevents an agent from scanning a new website if the previous scan was canceled.
- Fixed a bug that returned the 500 Internal Server Error upon POST /members/newinvitation service call if the OnlySsoLogin parameter is set as true.
- Fixed the 500 Internal Server Error message for a query string to a non-existent page.
- Fixed an error preventing NIST, DISA STIG, and ASVS classifications from appearing in the Issue details.
- Fixed an issue where multiple CWE values were being sent to Kenna Integration.
- Fixed the incorrect API documentation of roles/listpermissions endpoint.
- Fixed an issue where form authentication may fail due to credentials being modified when the scan profile is updated.
- Fixed a bug that fails the installation of the On-Premises via the wizard.
- Fixed a bug that shows an erroneous issue ID on the scan results' page.
- Fixed an issue that requires an email address for SSO-enabled accounts.
Update to the new version
If you want to update the latest version of Netsparker Enterprise On-Premises, see Updating Netsparker Enterprise On-Premises.
NEW FEATURES
- Added support for alternate email for SSO login
- Added form authentication Hashicorp Vault integration (https://www.invicti.com/support/integrating-invicti-enterprise-hashicorp-vault/)
- Added technologies chart to the global dashboard and website dashboard pages
- Added test credential API endpoint for scan profiles
- Added Form Auth Custom Scripting feature to the New Scan page
- Redesigned the login page
- Redesigned the SSO help text area in the SSO settings page
- Added an API endpoint for the Updating Issue States
- Added Travis CI integration
- Jira integration now supports custom Resolved statuses
- Kenna integration now supports Asset Application Identifier
- Agents can now be installed using Linux and a Linux Agent button has been added to the Configure New Agent page (On-Demand Only)
- Upgraded the Invicti scanning engine to version 5.9.027701.
NEW SECURITY CHECKS
- Added Out-of-date security checks for the Liferay portal
- Added Version Disclosure and Out-of-date security checks for Jolokia
- Added Nested XSS security checks
- Added an ASP.NET Razor SSTI security check
- Added a Java Pebble SSTI security check
- Added a Thymeleaf SSTI security check
- Added Version Disclosure and Out-of-date security checks for Grafana
IMPROVEMENTS
- Added an Issue Update API swagger model improvement
- Docker installation link has been added to the Configure New Agent page (On-Demand Only)
- New password criterion of a minimum of 15 characters has been imposed on admin and top-level users.
- Improvements have been made to the Form Authentication Test Script screen
FIXES
- Fixed the problem of a slowVulnerable Websites per Period report on the Reporting
- Fixed the file uploading problem on Imported Links
- Fixed the Knowledge Base Report's exporting problem
- Fixed the Yukon time zone problem.
- Fixed the Imported Links problem.
- Fixed the problem where the wrong time zone was displaying in Report Templates
- Moved the Scan Profile Test Credentials API post method fields to the body element
- Fixed a db file error in the Report Policy Editor
- Fixed the issue where report policy user changes were not applied when reset.
- Fixed the Vulnerability Detail page responsiveness problem
- Fixed the Sitemap treeview responsiveness problem
- Fixed the highlighted code focus problem
- Added help text to the HashiCorp vault integration page
- Fixed the bug that occurred when another team member updated the shared profile
- Fixed a bug that occured when non-admin users updated profiles
- The Report policy Editor CVSS scores fields now accept empty values
- Fixed a server error that occured while saving a cloned Scan Policy
- Fixed the problem that occurred when reconfirming the Verify Login and Logout settings
NEW FEATURES
- Introduced Technologies feature which finds and lists the technologies used in web applications and reports on problems
- Added out of the box issue tracking integration for PagerDuty, Clubhouse, Trello, Asana, Webhook, Microsoft Teams, and CircleCI
- Added new API endpoints for managing Team Members and listing Activity Logs
- Added a new Scan Profiles page in the Scans menu
- Added a new Comments box to the New Scan window, accessible while launching scans
- Added facility to send New Scan notifications using the Slack integration
- Upgraded the Invicti scanning engine to version 5.5.1.26518
NEW SECURITY CHECKS
- Added a new Security Check – HTTP Parameter Pollution (HPP)
- Added a new Security Check – BREACH Attack Detection
- Added Out-of-Date checks for Ext JS
- Added Oracle Cloud and Packet Cloud SSRF attack patterns
- Added a Web Cache Deception engine to the list of Security Checks
- Added a new XXE pattern for detecting the Axway SecureTransport 5.x XXE vulnerability
- Added new attack patterns for DOM based XSS
- Added new attack patterns for Remote Code Execution in Ruby
- Added new attack patterns for Out-of-Band Remote Code Execution in Ruby
- Added new attack patterns for Remote Code Execution in Python
- Added new attack patterns for an Open Redirect security check
- Added an email validation bypass payload for XSS
- Added a header injection XSS pattern
- Added a security check to determine whether an HTTP website has been implemented with SSL/TLS
- Added a security check for File Content Disclosure in Ruby on Rails by exploiting an Accept header
- Added mutation XSS patterns
- Fixed the SSRF confirmation problem
- Added Apple’s App-Site Association file detection
- Added exploitation support for File Content Disclosure in Ruby On Rails, CVE-2019-5418
- Added new LFI attack patterns for the access.log file
- Added support for exploiting JSONP endpoints with the format parameter in Ruby On Rails
- Added support for detecting Python Remote Code Execution
- Added RFC compatible SSRF IPv6 patterns
- Improved the Apache Struts (CVE-2013-2251) attack pattern
- Added PHP Injection Fixed One Time Referrer attack
- Updated the attack value of the PHP Injection Fixed One Time Attack pattern to use short notation instead of the print function
- Improved the Regex pattern of the WebLogic Version Disclosure pattern
- Added a PoC pattern for Apache Struts (CVE-2013-2251)
- Added Out-of-Date checks for the Slick JavaScript library
- Added Out-of-Date checks for the ScrollReveal JavaScript library
- Added Out-of-Date checks for the MathJax JavaScript library
- Added Out-of-Date checks for the Rickshaw JavaScript library
- Added Out-of-Date checks for the Highcharts JavaScript library
- Added Out-of-Date checks for the Snap.svg JavaScript library
- Added Out-of-Date checks for the Flickity JavaScript library
- Added Out-of-Date checks for the D3.js JavaScript library
- Added Out-of-Date checks for the Google Charts JavaScript library
- Added Out-of-Date checks for the Hiawatha and Cherokee server
- Added Out-of-Date checks for the Oracle WebLogic server
- Added Out-of-Date check for IIS
- Added Version Disclosure detection for the Hiawatha Server
- Added Version Disclosure detection for the Cherokee Server
- Added Source Code Disclosure checks for Java Servlets
- Added Source Code Disclosure checks for Java Server Pages
- Added New Source Code Disclosure patterns for Java
- Added detection for .htaccess file Identified
- Added detection for Opensearch.xml files
- Added detection for SQLite error messages
- Added detection for security.txt files
- Added detection for swagger.json files
- Added detection for Open Search files
IMPROVEMENTS
- Added the ability to create custom fields for ServiceNow integration
- Added auto-detection of the Time zone during the sign up process
- Improved Jira integration to support raw values for complex custom field types
- Added a new format option to the Date and Time Format dropdown in the Change Account Settings window
- Improved the text in Email Notifications
- Improved the Category field's option names in the New ServiceNow Integration window
- Improved the Issue template for Azure DevOps integrations
- Added capability to add User Mapping for hosted Jira systems
- Added more details to the CSV report which can be generated from the Activity Logs window
- Added ongoing scan information for the target agent in the Manage Agents window
- Added the capability to disable the Maximum Scan Duration field in the New Scan window (On-Premises only)
BUG FIXES
- Fixed an inaccurate warning message that was displayed when canceling a scan
- Fixed an issue where the Technical Contact was not set as expected in the Edit Website window
- Fixed an issue where a website could not be added if the target URL contained a hyphen character
- Fixed an issue where the configured Scan Profile was not used in Azure DevOps integrations
- Fixed various browser compatibility issues with Safari
- Fixed a bug where validation was not working as expected for the Hawk settings in the Scan Policy window
BUG FIXES
- Fixed a database connectivity issue which was occurring when pool size was not sufficient (onpremises only)
- Fixed an issue where installation wizard was shown when database connectivity was lost (onpremises only)
- Fixed an issue in agent endpoint where scan file names were not set as expected (onpremises only)
NEW FEATURES
- Added support to save and re-use filters on the list pages (Recents Scans, Websites, Issues etc)
- Added out of the box integration for Slack and ServiceNow
- Introduced Report Policy Editor which allows to customize Scan Report results
- Added Russian FSTEC BDU Vulnerability Database numbers to version vulnerabilities
NEW SECURITY CHECKS
- Added Out of Band Server Side Template Injection security checks
- Added signature detection check for Caddy web server
- Added signature detection check for aah Go server
- Added signature detection check for JBoss application server
- Added CakePHP framework detection
- Added CakePHP version disclosure detection
- Added CakePHP out-of-date version detection
- Added CakePHP Stack Trace Disclosure
- Added CakePHP default page detection
- Added Out of Date checks for CKEditor 5
IMPROVEMENTS
- Configured scanner agent's service options to recover automatically if it stops
- Improved display order of vulnerabilities in several reports
- Improved the wording in OWASP and Trend Matrix reports
- Updated the licensing model
- Allowed team members to manage their IP restrictions (previously only account administrators were allowed)
- Scheduled Scans will not be queued if a delayed one already exists in scan queue
- Improved Agent List page to display unavailable agents
- Improved the wording in Website and Global Dashboard pages
- Improved '/websites/get' API endpoint to allow filtering by URL
- Improved validation messages for SSO settings
- Improved styling of Permission Matrix on New Team Member page
- Fixed error where Scheduled Scans were disabled by the system on license expiry (they're now available again on license renewal)
- Updated .NET Framework version requirement to 4.7.2
- All authentication vulnerabilities (Basic, NTLM, Digest, etc. authorization required) are merged into a single vulnerability
- Added Label field for JIRA Send To actions
- Added Tags field for Manuscript (FogBugz) Send To actions
- Improved SQL Injection proof data by stripping HTML tags
- Improved CSRF token detection in cookie values
BUG FIXES
- Fixed wrong PDF scaling issue which causes fonts to be rendered very small for Report templates
- Fixed pagination problem on Scheduled Scans and Website Group pages
- Fixed a bug where screenshots are displayed for Scans run by Internal Agents
- Fixed the incorrect Content-Type header sent during Form Authentication requests
- Fixed the WAF rule generated for TRACE/TRACK HTTP methods which were blocking the other HTTP methods too
- Fixed the URL encoding issue for vulnerabilities that are send to Manuscript (formerly FogBugz)
- Fixed the error where the ExpectCT header was reported as an interesting header
- Fixed the Content-Type header parsing when there was an extra semicolon character at the end of the value
- Fixed the incorrect response displayed for Server Side Request Forgery (SSRF) vulnerabilities when the request was redirected to another page
- Fixed an incorrect external reference for the ViewState is not Encrypted vulnerability
- Fixed an incorrect possible LFI vulnerability when the response was redirected
- Fixed an incorrect Open Redirect vulnerability reported when a regular link was followed during DOM parsing
- Fixed broken case sensitivity check for crawled links
- Fixed FormatException that occurred while parsing cookies
- Fixed a JsonReaderException that occured while trying to parse a Swagger document
- Fixed parsing URLs with encoded chars
- Fixed hanging Open Redirect checks caused by binary responses
- Fixed the issue where a Swagger YAML file cannot be imported
- Fixed the cookie jar which does not ignore the duplicated cookie based on first cookie's HttpOnly flag
- Fixed the Weak Signature Algorithm that is not reported for a self-signed root certificate
NEW FEATURES
- Added scan policy settings for CSRF security checks.
- Added ability to use custom HTTP headers during scan.
- Added attacking optimization option for recurring parameters on different pages.
- Added a new knowledgebase item called Site Profile that lists information about target web site such as the web server operating system, database server, JavaScript libraries used etc.
- Redesigned the Basic, NTLM, Digest and Kerberos authentication settings which now supports multiple credentials for different URL paths.
NEW SECURITY CHECKS
- Added Referrer Policy security checks.
- Added markdown injection XSS patterns.
- Added HostIP and IPv6 patterns to MySQL and SSH SSRF security checks.
- Added Database Name Disclosure security checks for MS SQL and MySQL.
- Added Out of Date security checks for several JavaScript libraries.
- Added Remote Code Evaluation (Node.js) security checks.
- Added SSRF detection with server-status.
- Added user controllable cookie detection.
- Added Context-Aware XSS detection by generating XSS payloads based on the reflected context without breaking it.
- Added Default Page checks for IIS 7.0, 7.5, 8.5 and 10.0.
- Added IIS 10.0 Version Disclosure checks.
- Added WordPress Setup Configuration File checks.
IMPROVEMENTS
- Improved design of the group scan email template.
- Improved accessibility of several pages to follow WCAG guidelines.
- Optimized compression time while archiving the raw scan files.
- Added support for allowing users to launch scheduled scans manually.
- Disabled scheduled scans if the license is expired.
- Updated the links to several external references.
- Improved JavaScript and CSS resource parsing.
- Added DOM simulation options to scan policy optimizer wizard.
- Improved Mixed Content vulnerability reporting by separating them according to resource types.
- Improved boolean SQL injection detection for redirect responses.
- Improved WSDL parsing for files that contain optional extensions.
- Improved .sql file detection signature.
- Added extra confirmation for weak credentials detection.
- Added scan policy option to allow XHR requests during DOM simulation.
- Added form value for password input types to default scan policy.
- Increased the maximum response size limit for JavaScript resources.
- Improved the send to JIRA error message.
- Added maximum number of option elements per select element to simulate scan policy setting.
- Added filter 'colon' events scan policy option to filter events that contain colon character in its name during DOM simulation.
- Improved error based SQLi exploitation by generating prefix/suffix dynamically.
- Improved command injection vulnerability detection by prepending original parameter value to attack payload.
- Improved LFI vulnerability detection by detecting HTML and URL encoded PHP source codes.
- Improved LFI attack patterns.
- Improved DOM XSS attack patterns.
- Improved DOM/JavaScript simulation.
- Improved the performance of email address disclosure detection.
- Improved the performance of database connection string disclosure detection.
- Improved the performance of JavaScript library detection.
- Improved the performance of RoR database configuration detection.
- Improved Blind Command Injection detection on Linux systems.
- Improved resource finder to find more hidden resources.
- Improved support for simulating customized select elements.
- Improved NTLM, Digest and Kerberos authentication support.
- Improved DOM simulation stability and performance.
- Improved the default parameter name list for Parameter Based Navigation.
- Added NTLM and Digest authentication support to the generated sqlmap and cURL commands.
- Improved boolean and blind SQL injection checks for MySQL databases.
- Improved blind SQL injection checks for PostgreSQL databases.
- Improved reflected and stored XSS detection.
- HSTS checks now reports missing preload directives.
- Updated Korean translation.
- Improved JSON response parsing.
- Improved DOM based XSS payloads by prepending a URL to referer to make it practically work on web browsers.
- Improved email disclosure checks by checking host names against to public suffix list.
BUG FIXES
- Fixed a NullReferenceException which may have been thrown while editing settings of an user.
- Fixed an issue where email notifications are not sent for unconfirmed phone numbers.
- Fixed an issue which may have been thrown while deleting an account.
- Fixed an issue where error based SQLi confirmation is done based on the first seen database signature when multiple signatures appear in source code.
- Fixed the duplicate import link issue.
- Fixed an issue where XSS is missed when injected payload is not executed due to a syntax error.
- Fixed crawling of URLs on pages where base element points to some other URL.
- Fixes an issue where blacklisted Invicti attacks prevent further source code disclosures in HTML response.
- Fixed an issue where mixed content vulnerabilities are missing because DOM simulation is skipped due to missing JavaScript in HTML source.
- Fixed issues where empty POST parameter is imported and headers added as disabled for Postman files.
- Fixed an issue where signature fails to match MS SQL username in error messages.
- Fixed an issue where vulnerability is missed because of that not appending arbitrary value to extra querystring parameter name.
- Fixed the error caused by null bytes in attack patterns while sending vulnerabilities to JIRA.
- Fixed an incorrect "Password Transmitted over HTTP" issue for relative URLs on pages redirected to HTTPS addresses.
- Fixed the NullReferenceException thrown while importing certain HAR (HTTP Archive) files.
- Fixed incorrect "Interesting Header" report for Content-Security-Policy header.
- Fixed directory listing is not reported issues on some IIS versions.
- Fixed the issue where comments in CSS files are not parsed.
- Fixed the incorrect URL found in CSS comments.
- Fixed incorrect CSRF vulnerability reports by taking hidden token input into account.
- Fixed an IndexOutOfRangeException caused by CSP checks.
- Fixed the signature pattern which fails to match "Programming Error Message (PHP)" in multiple lines.
- Fixed markdown XSS attack patterns causing incorrect findings.
- Fixed incorrect "Interesting Header" reports for some headers.
- Fixed the incorrect http protocol displayed for SSL vulnerabilities.
- Fixed an issue where DOM simulation is performed for checking XSS once per XPath.
- Fixed the maximum crawled URL limit exceeded issue.
- Fixed duplicate resource finder requests.
- Fixed the WADL import issue where the operation fails for responses with no status codes.
- Fixed incorrect HttpOnly reports of XSRF-TOKEN cookies, due to its nature these cookies must be accessed from JS code.
- Fixed the incorrect missing object-src report on CSP checks.
- Fixed an issue where default crawled value is double-encoded instead of single.
- Fixed the missing content for Site Profile section of Knowledge Base report.
FEATURES
- Mobile friendly UI with a lot of design improvements
- Added support for sending notification email for canceled scans
IMPROVEMENTS
- Improved resource finder checks for websites which have custom 404 pages
- Increased the default value of Maximum 404 Signature setting to be store more signatures
- Improved timeout calculation for vulnerability checks which require late confirmation
- Replaced scan finish dates with scan urls in global dashboard
- Permissions can be entered while inviting user
- Added icon for scheduled scan items
- Optimized instance launch times for AWS agents
- Improved API documentation for scan policy and website endpoints
- Improved website address validation rules
- Improved website selection on the new scan page
- Added tooltips to scan policy and new scan pages
- Added Enable Content Type Checks setting to scan policy scope section
- Improved validation for scan profile names
- Improved notification email templates
FIXES
- Scheduled scan's target url's scheme could not be changed
- Fixed tooltip text for completed scans
- Fixed a bug where entered URL rewrite rule was overridden on focusing to regex input
- Fixed an issue where Ignore These Content Types setting was not set correctly
- Fixed an issue where scan policy names were duplicated
- Fixed an issue where form authentication settings were not initialized correctly for group scans
- Fixed DOM simulation issue where all delegated events on an elements were not being called
- Fixed a Heartbleed security check issue where it was causing the crawling phase to be stalled
FEATURES
- Added automatic configuration of URL rewrite rules
- Added the Scan Policy Optimizer
- Added automated evidence collection to several confirmed vulnerabilities
- Added sessionStorage and localStorage support
- Added URL Rewrite knowledgebase node to list the URL patterns that have been discovered
- Added support for deleting a team member permanently
- Added support for detecting outdated versions of popular JavaScript client-side libraries
- Added vulnerability tasks' todo list to dashboard
- Added "Do not expect challenge" option to basic authentication settings
- Added "Override Target URL with authenticated page" option to form authentication settings
- Added several new knowledge base nodes to report SSL and CSS issues, and one for slowest pages
- Added "Websites that have shortest fix time" and "Websites that have longest fix time" tables on global dashboard
- Added support for displaying relative dates in a friendly format
- Added import links support to new scan API endpoint
NEW SECURITY CHECKS
- Added Windows Short File Name security checks
- Added several new backup file checks
- Added web.config pattern for LFI checks
- Added boot.ini pattern for LFI checks
- Added a signature which checks against a passive backdoor affecting vBulletin 4.x and 5.x versions
- Added a signature which checks against an error message generated by regexp function at MySQL database
- Added DAws web backdoor check
- Added MOF Web Shell backdoor check
- Added RoR database configuration file detection
- Added RoR version disclosure detection
- Added RoR out-of-date version detection
- Added RoR Stack Trace Disclosure
- Added RubyGems version disclosure detection
- Added RubyGems out-of-date version detection
- Added Ruby out-of-date version detection
- Added Python out-of-date version detection
- Added Perl out-of-date version detection
- Added RoR Development Mode Enabled detection
- Added Django version disclosure detection
- Added Django out-of-date version detection
- Added Django Development Mode Enabled detection
- Added PHPLiteAdmin detection
- Added phpMoAdmin detection
- Added DbNinja detection
- Added WeakNet Post-Exploitation PHP Execution Shell (WPES) detection
- Added Adminer detection
- Added Microsoft IIS Log File detection
- Added Laravel Configuration File detection
- Added Laravel Debug Mode Enabled detection
- Added Laravel Stack Trace Disclosure
- Added S/FTP Config File detection
IMPROVEMENTS
- Improved calculating algorithm of vulnerability fix times
- Manage team permission replaced with "Admin" permission
- Added support to see website dashboard without scan group filter
- Added scan type information to "Detailed Scan Report"
- Added paging support for scan policy list
- Improved new user email template
- Increased website verification failure limit
- Changed vulnerability chart's colors on the dashboard page
- Added icons for displaying vulnerability status on the vulnerability task page
- Knowledgebase items are expanded by default if they contain a single item
- Added retestable information to vulnerability detail on the scan report page
- Users are redirected to scan group create page if no scan group is found on new scan
- Added a warning message if target path does not end with a trailing slash on the new scan
- Added first seen date information to vulnerabilities page
- Several scan performance improvements to reduce memory usage
- Improved credit card detection to eliminate false positives
- HTTP cookie handling code written from scratch to conform with the latest RFCs which modern browsers also follow
- SSL cipher support check code has been rewritten to support more cipher suites
- SSL checks are now made for target URLs even when protocol is HTTP
- Updated embedded chrome based browser engine to version 41
- Added more ignored parameters for ASP.NET web applications
- Improved scan policy versioning where new security checks are automatically included or excluded by default on existing scan policies
- Improved LFI pattern that matches win.ini files
- Improved XSS coverage by adding an attack pattern for email inputs which require an @ character
- Improved cookie vulnerability details to show all cookies that are not marked as Secure or HttpOnly
- Improved out-of-date vulnerability templates by including severity information of vulnerabilities for that version of software
- Improved out-of-date vulnerability reporting by increasing the severity of the vulnerability if that version of software has an important vulnerability
- Improved Ruby version disclosure detection
- Improved SQL injection vulnerability template by adding remedy information for more development environments
- Improved common directory checks by adding more known directory names
- Updated default user agent
- Improved the default Anti-CSRF token name list
- Improved database error messages vulnerability detection for Informix
- Added new XSS attack pattern for title tag in which JavaScript execution is not possible
- Improved XHTML attacks to check against XSS vulnerabilities
- Optimized confirmation of Boolean SQLi
- Added exploitation for Remote Code Evaluation via ASP vulnerability
- Revamped DOM based XSS vulnerability detail with a table showing XPath column
- Changed SQLi attack patterns specific to MSSQL database with shorter ones
- Improved SQLi attack pattern which causes a vulnerability in LIMIT clauses specific to MySQL database
- DOM simulation is turned off for hidden input types which causes a false-positive confirmed XSS vulnerability
- Improved the "Name" form value pattern to match more inputs
- Improved confirmation of Expression Language Injection vulnerability
- Improved Frame Injection vulnerability details
- Added .phtml extension to detect code execution via file upload
- Improved blind SQL injection detection on some INNER JOIN cases
- Improved external references section of "Remote Code Evaluation (PHP)" vulnerability
- Added retest support for several vulnerability types
- Improved Apache Tomcat detection patterns
- Increased the number of sensitive comments reported
- Improved text parser improvements
- Added separate checks in scan policy for each supported web app fingerprint application
FIXES
- Fixed an issue where imported relative links were not set correctly
- Fixed an issue where scheduled scan names were duplicated
- Fixed URL rewrite analysis to respect case sensitivity settings
- Fixed a form authentication issue which image submit elements were not clicked
- Fixed an issue occurs when the HTTP response body starts with unicode BOM
- Fixed Open Redirect security checks where it should not perform DOM based checks if DOM checks are turned off
- Fixed static resource finder where it was not following a redirect
- Fixed DOM simulation hangs if a rogue JavaScript call enters an endless loop
- Fixed slow XSS highlights on some responses
- Fixed a bug where Full-Url LFI attack which is specific to Ruby-on-Rails applications could not be confirmed
- Fixed a bug where XSS vulnerability could not be confirmed when injection occurs in the middle of a CSS style
- Fixed a bug where generated XSS exploit did not work due to incorrect encoding
- Fixed a bug where a false-positive file upload vulnerability was reported
- Fixed a bug where maximum amount of hard fails was preventing next scan making HTTP requests
- Fixed ""Missing Content-Type"" reporting issue where redirected responses should not be reported
- Fixed an issue where send failures were not being handled while making HTTP requests
- Fixed credit card reporting issue where the value specified in default form values section should not be reported
- Fixed the trimmed parameter name issue on controlled scan panel
- Fixed documentation for nginx vulnerability template that explains how to fix the issue
- Fixed HSTS support for form authentication HTTP requests
- Fixed a URI parsing issue where non-HTTP(S) protocols are ignored
- Fixed a bug where an attribute based attack could not be confirmed as XSS
- Fixed a bug where an injection with ""javascript:"" protocol for XSS attacks occurs after a new line
- Fixed a bug where exploitation goes into loop and causes an unresponsive UI for error based SQLi
- Fixed a bug where redirection happens relatively and reported as Open Redirect vulnerability
- Fixed an issue where a Groovy RCE is reported as Perl RCE
- Fixed a WSDL parsing issue where reference parameters were not handled correctly
- Fixed a WSDL parsing issue where XML types were not handled correctly
- Fixed an issue that occurs during form authentication with an HSTS site that performs redirects to an URL with http protocol
- Fixed a bug where the hash is reported incorrectly in a DOM based XSS vulnerability
- Fixed the misleading content in basic authentication over clear text vulnerability
New Features
- Added the ability to configure the scanner to scan websites which are linked from the target website.
- Added the Common Vulnerability Scoring System (CVSS) in vulnerability reports.
- Added the OWASP Proactive Guide to classification list.
New Web Security Checks
- Added security checks for Content Security Policy (CSP) web security standard.
- Added DOM based open redirection security check.
Improvements
- Improved the Cross-site Scripting (XSS) vulnerability security checks coverage.
- Renamed "Permanent XSS" vulnerability to "Stored XSS".
- Added type ahead search functionality for Scan Policy > Security Checks.
- Added HTTP methods to AJAX / XML HTTP Requests knowledge base section.
- Optimized the performance of SOAP web service parsing by skipping the WSDLs that are already parsed.
- Added Scan Policy > Crawling options to enable/disable parsing of SOAP and REST web services.
- Improved DOM simulation by simulating "contextmenu" events.
- Increased the default values for "Maximum Page Visit" and "Max. Number of Parameters to Attack on a Single Page" settings.
- Improved XML parsing during crawling by parsing empty XML elements as parameters too.
- Added the ability to attack parameter names.
- Added a note to vulnerability detail for non-exploitable frame injection.
- Added .jhtml and .jsp attacks to file upload engine.
- Improved CORS security checks.
- Improved Open Redirect engine to detect CNAME injection such as example.com.r87.com.
- Improved XSS confirmation for vulnerabilities found inside noscript tags.
- Added an attack pattern to the command injection engine to bypass whitespace filtering using $IFS environment variable.
Bug Fixes
- Fixed a form authentication issue where the last form authentication sequence requests were prematurely cancelled.
- Fixed an issue where incorrect PHP source code disclosures are reported for some binary responses.
- Fixed the broken External Reference link on Remote Code Evaluation (PHP) vulnerability.
- Fixed a file upload input DOM parsing issue which prevents some file upload attacks.
- Fixed a form authentication issue occurs on web sites that opens popups during form authentication sequence.
- Fixed a DOM simulation issue occurs when there is a form element with name "action" on target web page.
- Fixed duplicate "Email Address Disclosure" reporting issue.
- Fixed a NullReferenceException on occurs during CORS security checks.
- Fixed a CSRF exploit generation issue where the generated file is empty.
- Fixed an issue where XSS vulnerability is missed when multiple redirects occur.
- Fixed a text parsing issue where relative URLs were not supported as base href values.
- Fixed an issue where Missing X-Frame-Options Header vulnerability is reported even though ALLOW-FROM is included in the header.
- Fixed an XSS attacking issue where duplicate attacks are made for same payload.
- Fixed a Header Injection attack issue where first line of the HTTP request gets corrupted on full URL attacks.
- Fixed an issue where post exploitation does not work sometimes.
- Fixed a form authentication issue where any slash character in credentials cannot be used.
NEW FEATURES
- Added issue synchronization support for Jira and Manuscript issue trackers
- Added notification support for Fixed, Revived, False Positive and Accepted Risk Issues to Slack integration
- Upgraded the Invicti scanning engine to v5.2-hf2 (5.2.0.22027)
- Added a new Vulnerability Families feature, where similar types of vulnerabilities are no longer reported separately
- Added out of the box Issue tracking integration for GitLab, Bitbucket, Unfuddle, Zapier, and Azure DevOps
- Added support for Swagger 3/OpenAPI link import
- Added support for importing links in the IOdocs file format
- Added Retest support for several Cookie vulnerabilities
- Added a new Knowledge Base item for Not Found pages
- Added ISO 27001 vulnerability classifications and report template
- Added custom field support for Issue tracking integrations
- Added Azure DevOps Continuous Integration system integration
- Added PowerShell support to the Gitlab Continuous Integration system integration. The Gitlab page now has Integration Script Generator information for Gitlab PowerShell scripts.
- Added Pipeline Script Generation support to Jenkins Continuous Integration system informtion. The Jenkins page now has Integration Script Generation information for Jenkins Pipeline scripts.
NEW SECURITY CHECKS
- Added a new pattern for CherryPy Version Disclosure
- Added an LFI attack pattern for WEB-INF/web.xml
- Added Ruby Error Disclosure detection
- Added WP Engine Configuration File detection
- Added CherryPy Stack Trace Disclosure detection
- Added Intro.js Out-of-date Version detection
- Added Axios Out-of-date Version detection
- Added Fingerprintjs2 Out-of-date Version detection
- Added XRegExp Out-of-date Version detection
- Added DataTables Out-of-date Version detection
- Added Lazy.js Out-of-date Version detection
- Added FancyBox Out-of-date Version detection
- Added Underscore.js Out-of-date Version detection
- Added Lightbox Out-of-date Version detection
- Added JBoss application server Out-of-date Version detection
- Added SweetAlert2 Out-of-date Version detection
- Added Lodash Out-of-date Version detection
- Added Bluebird Out-of-date Version detection
- Added Polymer Out-of-date Version detection
IMPROVEMENTS
- Added Content Security Policy (CSP) to the Invicti Enterprise web application
- Changed enum values to display in alphabetical order in the Value column in the Filter popup
- Added an Audit Log for Rate Limited requests
- Highlighted selected option for JavaScript section on the New Scan Policy page
- Highlighted relevant tabs for validation errors on the New Scan Policy page
- Improved the Report Policy page to make it more responsive and added a scroll bar
- Improved help text for Application and Service Discovery pages
- Added a Check/Uncheck by Severity filtering option on the Report Policy page
- Added PHP extension attack for Nginx vulnerability to the File Upload engine
- Added File Upload patterns for the Nginx Parsing vulnerability
- Added settings to the File Upload engine for configuring upload folders
- Added errorlog.axd detection support
- Improved elmah.axd detection
- The severity of the Cookie Not Marked as Secure vulnerability was lowered for non-session cookies
- Improved SSTI PHP Smarty attack detection
- Improved the Swagger link importer to handle additional properties with integer and string value types
- Improved the Expect-CT engine by only reporting a vulnerability once for each host
- Improved RSA key confirmation by handling OpenPGP format
- Increased the HSTS Not Enabled vulnerability severity from Information to Low
- Improved HTTP 407 Proxy Authentication error handling
- Added classifications to the HSTS Not Enabled vulnerability
- Excluded unpopular JavaScript Library Out of Date checks from the default policy to improve performance
- Improved CSP security checks by analyzing empty responses, as CSP can be declared on headers instead of meta tags
- Generalized the RegEx Pattern of the trace.axd detected vulnerability to match all languages
- Improved JSON format detection
- Replaced Unicode replacement characters with question marks in responses
- Added a Scan Policy option to attack cookies
- Improved element click DOM simulation for various element types
- SRI Not Implemented will no longer be reported for localhost URLs
- Improved ASP.NET error message detection
- Added descriptions to PCI categories in the PCI Compliance Report
- Improved Boolean SQL Injection detection
- Improved the Blind Command Injection attack patterns
- Improved the representation of Report Template compilation errors
- Misconfigured X-Frame-Options Header is now reported separately
- Improved Source Code Disclosure checks to prevent the reporting of JavaScript template pages
- Status Code, Status Description and Content Length information have been added to the Slowest Pages node in the Knowledge Base
- Improved WADL document parsing by ignoring DTDs
- Improved Open Redirect DOM based confirmation performance
- Long identified source code is shortened in Possible Source Code Disclosure vulnerabilities
- Cookie vulnerabilities report where the cookie is set from
- Improved Swagger Document Format detection
- The file upload engine now detects new links in the response after the file is uploaded
BUG FIXES
- Fixed the issue where Authentication did not work when retesting
- Fixed the issue where the Swagger importer generated an invalid JSON request body
- Fixed the ArgumentException thrown while performing Heartbleed security checks
- Fixed the issue where the wrong version was identified for Drupal
- Fixed a disallowed HTTP method issue where some methods were still being allowed
- Fixed a typo in the CSP Not Implemented vulnerability details
- Fixed a Form Authentication issue that occured on some React-based websites
- Fixed signature detection for links found via the crawler
- Fixed an issue in the CSP engine where it reported an incorrect vulnerability
- Fixed a URL encoding issue in DOM simulation that was causing some vulnerabilities to be missed
- Fixed the issue where the text parser incorrectly parsed extensions in the onclick event
- Fixed duplicate parsing source field values reported for IFrame vulnerabilities
- Fixed an issue where Apache MultiViews could not be detected in the target server
- Fixed the incorrect Cookie Expire Date set during Form Authentication
- Fixed the incorrect Source Code Disclosure report caused by SSTI attacks
- Fixed a Content-Type parsing issue in Form Authentication
- Fixed the issue where cookies received via Form Authentication were not being analyzed for vulnerabilities
- Fixed the incorrect Source Code Disclosure reported when an XSS via RFI vulnerability was found
- Fixed a bug in cookie handling code during Form Authentication
- Fixed the incorrect severity reported for the Cookie not Marked as Secure vulnerability on some scans
- Fixed an ArgumentOutOfRangeException thrown on some long scans
NEW FEATURES
- Added out of the box issue tracking integration for Kenna
- Added OTP support to the Form Authentication tab in the New Scan window
- Added filtering support to the New Notification window, which means you can filter the issues that will be sent for a Scan Completed event
- Upgraded the Invicti scanning engine to version 5.5.4.26863
IMPROVEMENTS
- Added a new setting, Max Uploaded File Size, to the General Settings window (On-Premises only)
- Improved the UI design of the Scan Summary section on the Report window
- A Time Zone option has been added to the Scan Time Window tab
- Improved the Azure DevOps integration to support email addresses for the Assigned To setting
- Improved the Scan Completed event template's SMS notification text
- Added an About page to display VDB and app versions, available by clicking your name (On-Premises only)
- Added the ability to filter using Website Group names for various API endpoints
- A detailed error message is now displayed if an imported file is invalid
- Improved GitHub integration to support the GitHub Enterprise edition
BUG FIXES
- Fixed an issue where Imported Links were not being saved when the Target URL was empty
- Fixed an issue where all proofs were not displayed for Stored Cross-Site Scripting vulnerabilities
- Fixed a bug where the 'Do not stop scan when maximum logout is exceeded' setting was not working as expected
IMPROVEMENTS
- Added the option to provision a new member with SSO in the New Team Member addition screen.
- SSO Email requirement is not necessary for SSO-enabled accounts without enforcement
- Renewed PCI Compliance Report template
- Added scan profile and scan profile URL to scan report.
- Added the option to add a customized header text on the Account Settings page
- Improved issue severity sorting. Issues will be sorted as Critical, High, Medium, Low, Best Practice, Information Alerts on all pages.
- Redesigned Scan Time Window
- Improved design of important information, such as email and name, in dialogs
- Updated descriptions on edit and signup web pages
- Changed "Enable Limitless Scan" option under the General Settings to "Allow scanning without a duration limit"
- Redesigned Basic Authentication Form
- Added advanced script feature for the Azure Pipelines integration
- Updated related RegEx to let users using parentheses with the website name and profile name
- Added silent mode installation for Web Application
- Added phone number confirmation countdown timer
- Added the document link for Linux Agent installation on the New Agent page.
- Improved the speed of page loading on the Custom Script screen
- Improved the agent stability to prevent scans from being stuck
- Added the possibility to add non-registered emails in notifications
- Added SANS Top 25 report
- The Target URL will be displayed instead of the website URL in the scan reports
FIXES
- Fixed JSON Serialization problem in the scan profile
- Fixed typos in Invicti Rest API Endpoint explanation
- Fixed the validation message on the password change page
- Fixed the validation message for admin password on the password change page
- Fixed the Bugzilla operating system field's name
- Fixed warning message for the Website Groups Update API
- Fixed undeleted scan files (which belong to completed scans) issue
- Disable status error fixed for Linux Agent
- Resolved Chromium's auto select certificate problem. So, the problem of not being authenticated with the client certificate was solved.
- Fixed empty exported XML issue in F5 BIG-IP ASM Rules Report
- Fixed an issue where "Password Transmitted over HTTP" issues were reported for HTTPS requests.
New Features
- Scan profiles can now be shared with all team members
- Scan profiles can be assigned as a primary scan profile for a website so whenever a new scan is being configured for a website, the default scan profile will be the primary one
New Web Security Checks
- Added security check for the new DROWN SSL/TLS vulnerability
- Added "HSTS (HTTP Strict Transport Security) Not Enabled" security checks
- Added various checks being reported with "HTTP Strict Transport Security (HSTS) Errors and Warnings"
- Added version checks for OpenCart web application
Improvements
- Improved JavaScript/DOM simulation for better DOM XSS security checks
- Added "Form Values" support for JavaScript/DOM simulation and DOM XSS attacks
- Authentication settings moved from website to scan launch screen to be included in scan profile
- Scan scheduling operations seperated from scan launch screen
- Changed the "Configure a new scan" page to a more ergonomic interface
- Users with admin permission can no longer see team member's API token
- Added endpoint type field to activity logs. (API or Web UI)
- Added a new scan policy setting section for JavaScript related settings
- Rewritten HSTS security checks
- Added evidence information to vulnerabilities list XML report
- Improved out-of-date reports for applications/libraries that have multiple active stable branches (i.e. jQuery 1.x and 2.x)
- Added the file name information for the local file inclusion evidence
- Added source code to vulnerability details for "Source Code Disclosure" vulnerabilities
- Improved Heuristic URL Rewrite implementation to detect more patterns and increase crawling efficiency
- Improved the performance of DOM simulation by aggressively caching external requests
- Improved the performance of DOM simulation by caching web page responses
- Improved the performance of DOM simulation by blocking requests to known ad networks
- Improved minlength and maxlength support for form inputs that sets a value with an appropriate length
- Added support for matching inputs by label and placeholder texts on form values
- Improved the vulnerability description on out-of-date cases where identified version is the latest version
- Added database version, name and user proof for SQL injection vulnerabilities
- Optimized the attacks with multiple parameters to reduce the number of attacks
- Added "Identified Source Code" section for "Source Code Disclosure" vulnerabilities
Bug Fixes
- Fixed an issue which fails reading cookies on form authentication verification for cases where Set-Cookie response header is empty
- Fixed an issue with client certificate authentication where the client certificate may be sent to external hosts while making HTTP requests
- Fixed cases where Invicti was making requests to addresses that are generated by its own attacks
- Fixed elapsed time stops when the current scan is exported
- Fixed an issue with JavaScript library version detection where wrong version is reported if the path to JavaScript file contains digits
- Fixed missing AJAX requests on knowledge base while doing manual crawling
- Fixed HSTS engine where an http:// request may cause to loose current session cookie
- Fixed an issue where extracted links by TextParser in a JavaScript file should be relative to the main document
- Fixed the issues of delegated events not simulated if added to the DOM after load time
- Fixed the issue where hidden resource requests made by Invicti are displayed on out of scope knowledgebase
- Fixed the issue with automatic SSL protocol fallback which attempts the fallback even if the current security protocol is same with the fallback value
- Fixed the issue of "Strict-Transport-Security" is being reported as "Interesting Header"
- Fixed the broken HIPAA classification link
FEATURES
- Policy Settings Permission Change: In order to manage Policy Settings, "Start New Scan" permission is required now
- Added Two Factor Authentication Support - Account admins can enforce 2FA to team members
- Added weekly intervals support to trend report in the website dashboards
- Added support for displaying pending tasks on the website dashboard
- Mobile-friendly UI with a lot of design improvements
IMPROVEMENTS
- Added weekly interval support to dashboard trend
- Added pending vulnerability tasks to website dashboard
- "Your account" page split into four pages
- Team member disable support
- Improved scan data cleanup to remove raw scan files
- Improved email sending process to ensure emails are sent for correct actions
- Added status change logs for vulnerability tasks
- Added an email button to Team Invitation page
- Users can resend invitations with this button
- Improved error messages when email fails to send
FIXES
- Fixed Browser Compatibility Warning shown in Chrome on iPhone.
- Fixed an error which occurs while deleting a scan policy
- Fixed target URL link on scan report page
NEW FEATURES
- Added auto update support for scanner agents
- Improved the Manage Agents page to support filtering and allow the running of commands
- Added notifications section to top bar. It displays application specific notifications such as updates and background jobs
- Added new API endpoints for managing issues
- Added a Do not differentiate HTTP and HTTPS protocols option to the Scan Scope tab's settings
- Added OAuth2 Authentication support
- Added a new Best Practice severity level for vulnerabilities that are recommended practices but not critical
- Added an option to report only confirmed issues while generating reports
- Added an option to exclude addressed issues while generating reports
- Added F5 WAF rule generation
- Added RESTful API Modeling Language (RAML) link import support
- Added the ability to exclude certain URLs from URL Rewrite Detection
- Added support for importing links from WordPress REST API files
- Added a Scan Policy for OWASP Top 10 vulnerabilities
- Added a Scan Policy for PCI vulnerabilities
NEW SECURITY CHECKS
- Added new XSS pattern that injects the attack payload into the HREF attribute
- Added support for exploiting Drupal Remote Code Execution (CVE-2019-6340)
- Added a Unicode Transformation (Best-Fit Mapping) security check
- Added detection for possible Header Injections
- Added out-of-date detection for Oracle Database Server
- Added out-of-date detection for Mithril
- Added out-of-date detection for ef.js
- Added out-of-date detection for Match.js
- Added out-of-date detection for List.js
- Added out-of-date detection for RequireJS
- Added out-of-date detection for Riot.js
- Added out-of-date detection for Inferno
- Added out-of-date detection for Marionette.js
- Added out-of-date detection for GSAP
- Added a config.json check to the Resource Finder
- Added detection support for TS Web access
- Added detection support for .travis.yml
IMPROVEMENTS
- Improved the Import Links section on the Imported Links tab on the New Scan page. Now imported links can be viewed immediately after the target file is uploaded.
- Added CreatedAt and UpdatedAt fields to WebsiteGroup API endpoints
- Improved the responsive design for several pages
- Changed some wording for vulnerability details to use same wording as Invicti Standard
- All clicked external links now open in a new window
- The Target website URL cannot also be added as an Additional Website on the New Scan page
- New logo has been added to the top bar
- Improved Resource Finder step on the Scan Policy Optimization Wizard
- Jira issues are now assigned to the person who started the scan
- Improved the queue performance for scans running on cloud scanner agents
- Improved the layout for reports where no vulnerabilities are detected
- Added a new Manage Issues (Restricted) permission, which disallows marking issues as Accepted Risk or False Positive
- Added Reporter (account id type) to the JIRA integration page
- Updated SSRF ipv6 pattern names
- Improved Scan performance by allocating computer resources better
- Added XXE, File Upload, SSL, RFI, ELI, XSS via RFI vulnerabilities into vulnerability families
- Added a description that explains why only 10 pages are reported on the Slowest Pages node in the Knowledge Base
- Updated Code Evaluation (PHP) attack patterns
- Improved DOM Simulation performance and fixed several issues
- Improved React JavaScript framework support on Form Authentication
- HTML Select elements without event listeners are simulated in DOM Simulation
- The File Upload engine searches newly discovered file names in the upload response and in the upload folders
- Improved operating system detection by the Site Profile node in the Knowledge Base
- Added support for attacking the name of POST parameters
- Improved the External References for several vulnerabilities
- Added ISO 27001 information to the Executive Summary Report
- CSP vulnerabilities will no longer display a 'certainty' value if they are already marked as Confirmed
- Fixed an issue in DOM Simulation where the change of select elements was not being properly dispatched to the underlying JavaScript framework
- Added support for exploiting XSS in text and XML content types
- Out of Date SQL vulnerabilities are reported as Confirmed
- Added a Cookie Whitepaper reference to cookie vulnerability templates
- Added External References to ExpressJS, CakePHP and Possible Stored XSS templates
- Improve grammar in Insecure Transportation Security Protocol Supported (TLS 1.0) vulnerability details
- More commands are executed in the Code Evaluation exploitation to generate proofs
- References to 'Manuscript' have been replaced with 'FogBugz'
- Improved RFI confirmation for URL Rewrite parameters
- Improved signatures of Nginx Version Disclosure patterns
- Optimized the attack speed of XSS and LFI engines
- Added extra information to Out-of-date vulnerability templates to explain the vulnerability reason
- Cookie checks will analyze session cookie names to detect platform-specific default session names
- Stored XSS and Insecure Frame Default Report Policy vulnerability descriptions have been improved
- Added a Jira Account ID field for Jira Send To Action to assign issues to a user, since the JIRA Api does not accept the username
BUG FIXES
- Notifications tab appears empty when the Target URL is not selected on the New Scan page
- Removed client side console logs from several pages
- Fix the issue where the Preferred agent was not being set as expected for the selected scan profile on the New Scan page
- Fixed an issue where the Discovery Settings page was not working properly for low resolution views
- Fixed an issue where the Authentication Verifier was not capturing authentication settings
- Fixed a bug where the default Scan Completed notification was overwriting the custom JIRA notification
- Fixed a bug where PDF reports were not generated on the tryout console on the API docs page
- Removed the Contains filter option for numeric fields
- Fixed an issue where scans configured with a Scantime Window were blocking other scans
- Removed the redundant ReportType parameter and added a ReportFormat parameter to the CustomReport API endpoint
- Fixed a bug where ordering Issues using the Last Seen column was throwing an exception on the Issues page
- Fixed a validation issue in the Header Authorization settings in the New Scan page
- Fixed an issue where DOM simulation might conflict with some JavaScript frameworks
- Fixed the garbled configuration sample in the Remedy section of the HSTS Policy Not Enabled vulnerability
- Fixed an issue where an extra ampersand was appended to the query string while generating the URL of a Swagger imported link
- Fixed an XmlException that was thrown while trying to parse a sitemap.xml response that is not found
- Fixed a GZip decoding issue that occured while decoding a compressed sitemap.xml
- Fixed a stuck scan issue on websites using the React JavaScript framework
- Fixed a Postman file importing issue where the response was not base64 encoded
- Fixed a NullReferenceException thrown while checking mutations on DOM
- Fixed the incorrect URLs that were added during the DOM simulation for forms without action attributes
- Fixed the issue where the SameSite cookie vulnerability was reported for cookies that were missing Lax or Strict attributes
- Fixed an issue where JavaScript file parsing was taking longer than expected on some occasions
- Fixed the issue where the incorrect severity was reported for the Cookie not Marked as Secure vulnerability of a non-session cookie
- Fixed HTTP 400 errors raised by the ServiceNow Send To integration
- Fixed an issue in the CSP engine where the 'strict-dynamic' directive was reported as an unsupported hash
- Fixed incorrect nonce detected without matching script block vulnerability
- Fixed a DOM simulation issue where the passed element to call the setTimeout function was being ignored
- Fixed an issue that caused FP Insecure Reflected Content to be reported
- Fixed the issue where brute-force attacks were carried out regardless of the Authentication Type
- Fixed the issue where the LFI vulnerability confirmation patterns did not match the response returned from a Linux server
- Fixed the value of double encoded null byte in LFI and XSS attack patterns
- Fixed an issue in the Swagger importer where the parameter declared on the path level was not recognized
- Fixed an issue in the LFI engine where the confirmation payload was appended to the attack payload
- Fixed the value of the double encoded null byte in the Header Injection pattern
- Fixed the encoding of the % sign in the base64 payload in XSS attacks
- Fixed the attack payload in the PHP Injection Fixed One Time Attack pattern
- Fixed the encoding issue in the SQL Injection confirmation attack
- Fixed an issue where the cookies that were set in the JavaScript context during Form Authentication were not properly captured
- Fixed an issue where the Max Simulated Elements option was causing the simulation to hang
- Fixed an uncaught TypeError that was caused by Max Option Elements checks and causing the simulation to hang
- Fixed an issue where an incorrect Subresource Integrity (SRI) Hash Invalid vulnerability was reported because of a hash miscalculation
IMPROVEMENTS
- Added scan owner information to scan results and reports
- Improved Internet Explorer support on several pages
- Added a new option for disabling the Long running scan notification to General Settings (On-Premises only)
- No longer reporting Missing X-Frame-Options header in redirect responses
- No longer reporting Missing X-XSS protection on redirect responses
- No longer reporting CSP Not Implemented for redirect responses
- No longer reporting Referrer Policy Not Implemented for redirect responses
BUG FIXES
- Fixed an issue where the Target Website could not be deleted
- Fixed an issue where the Preferred Agent in Scan Profile could not be changed
- Added several fixes for OAuth2 Authentication
- Fixed a bug where Invicti might mistakenly report some cookies as Not Secure
- Fixed an issue where connection problems on the Target Website were causing high CPU usage
NEW FEATURES
- Realtime scan results
- Added out of the box integration support for: FogBugz, Github and TFS issue tracking systems.
- Grouping of notifications so a single email or SMS alert is sent with a list of all alerts rather than multiple individual alerts.
- New API endpoint for launching group scans.
- Scheduling for incremental scans both from the web UI and API.
- New API endpoint for generating custom scan reports.
- New scan policy setting to define Web (Session and Local) Storage.
- New Header Authentication settings to manually add request headers with authentication information.
- Added support to import links from CSV files.
- Added support for parsing of gzipped sitemaps.
NEW SECURITY CHECKS
- Check for reflected Code Evaluation in Apache Struts 2 (CVE-2017-12611).
- Check for Remote Code Execution in Apache Struts (CVE-2017-5638).
IMPROVEMENTS
- Scan Time Window setting is now available to new group scans page.
- Improved scan stability and performance.
- Improved default Form Values settings.
- Updated external references for several vulnerabilities.
- Updated default User-Agent HTTP request header string.
- Changed API endpoints to return 201-Created response status code for new resources.
- Added several UI improvements for WCAG guidelines compliance.
- Improved the email template that reports issues.
- Added "Attack Parameters" information to Scanned URLs report.
- Renamed the "Important" vulnerability severity to "High".
- Added Form Authentication performance data to Scan Performance knowledge base node.
- Improved Active Mixed Content vulnerability description.
- Improved DOM simulation for events attached to document object.
- Added parsing of "Alternates", "Content-Location" and "Refresh" response headers.
- Improved CSP engine performance by checking CSP Nonce value per directory.
- Changed sqlmap payloads to start with sqlmap.py, including the .py extension.
- Added --batch argument to sqlmap payloads.
- Removed Markdown Injection XSS attack payloads.
- Added ALL parameter type option to the Ignored Parameters settings.
- Added gtm.js (Google Tag Manager JS library) to the default excluded scope patterns.
- Updated the Accept HTTP header value for default scan policy.
- Added CSS exclusion selector supports frames and iframes.
- Added embedded space parsing for JavaScript code in HTML attribute values.
- Added parsing source information to Scanned URLs List and Crawled URLs List (JSON) reports.
- Email disclosure will not be reported for email addresses used in form authentication credentials.
- Added focus and blur event simulation for form authentication set value API calls.
- Added more information about HTML forms and input for vulnerabilities found in HTML forms.
- Added a JavaScript option to specify JavaScript cookies to persist across authentication and DOM simulation.
- Added Parameter Value column to the Vulnerabilities List report in CSV format.
- Added match by HTML element id for form values.
- Added "Ignore document events" to JavaScript settings to ignore triggering events attached to document object.
- Improved Windows Short Filename vulnerability details Remedy section.
- URL Rewrite parameters are now represented as asterisks in sqlmap payloads.
BUG FIXES
- Fixed an issue where AutoSave filename is missing during resuming a scan.
- Fixed an issue where "Test" button of authentication settings does not work as expected.
- Fixed an issue where model binding does not work as expected for scan profile API endpoints.
- Fixed CSRF vulnerability reporting on change password forms.
- Fixed case sensitivity checks while matching ignored parameters, now it matches case sensitive.
- Fixed the incorrect disabled external references section in WordPress Setup Configuration File template.
- Fixed various source code disclosure issues.
- Fixed an escaping issue with CSS exclusion selectors.
- Fixed the issue where the basic authentication credentials were not being sent on logout detection phase.
- Fixed a random DOM simulation exception occurs when site creates popup windows.
- Fixed a RemotingException occurs on Form Authentication Verifier.
- Fixed a possible NullReferenceException on Form Authentication.
- Fixed the broken form authentication custom script when the last line of the script is a single line comment.
- Fixed huge parameter value deserialization memory usage.
- Fixed the wrong URLs added with only extension values.
- Fixed a NullReferenceException which may be thrown while importing a swagger file.
- Fixed form authentication not triggered on retest.
- Fixed StackOverflowException in swagger parser thrown while parsing objects containing circular references.
- Fixed a swagger file parsing issue where target URL should be used when host field is missing.
- Fixed swagger importer by ignoring any metadata properties.
- Fixed a NullReferenceException occurs during DOM simulation.
- Fixed the incorrect URLs parsed on attack responses.
- Fixed the redundant duplicate HTTP requests issued by Web App Fingerprinter.
- Fixed ignore parameter issue for parameters containing special characters.
- Fixed a NullReferenceException that occurs for select elements missing option elements on multipart requests.
- Fixed missing vulnerabilities requiring late confirmation for incremental scans.
- Fixed a NullReferenceException may occur on iframe security checks.
NEW FEATURES
- Added support for using internal agents along with AWS cloud integration (On-Premises only)
- Added out of the box Issue tracking integration for Redmine, Bugzilla and Kafka
- Added support for bulk operations on the Recent Scans page. It's now easier to cancel, pause, or delete multiple scans at the same time.
- Added new API endpoints for managing agents
- Added an option to change the Technical Contact for each website in a group in the Edit Website Group page
- Added support for exporting data on Activity Logs and Manage Team pages
- Added the ability to convert a completed scan into a Scheduled Scan
- Upgraded the Invicti scanning engine to v5.3-hf7(5.3.0.24998)
NEW SECURITY CHECKS
- Added a new security engine named Malware Analyzer which detects any web malware injected into websites (Scanner Agent's operation system should be Windows Server 2016 or above)
IMPROVEMENTS
- Improved support for scenarios where OAuth2 is used in conjunction with Basic Authentication
- Improved the status text displayed for delayed scans
- Set the account owner's Data and Time Format as the default for new team members
- Added Scan Owner information to various scan reports and API endpoints
- Improved the response message for the /scans/delete API endpoint
- Added all issue content to the /issues/allissues API endpoint
- Added a Mark all as Read option for notifications that are shown inside the application on the Application Notifications page
- Added Technical Contact information to files exported from the Websites page
- Added Vulnerability Severity Level for the selected issue in the Technical Report
- Upgraded Bootstrap, jQuery and Knockout.js dependencies to the latest versions
- Added Create Invitation (team member invitations) into the Activity Log
- Improved the API docs by adding sample values for request and response messages
- Added support for filtering by Target URL to the /scans/listbywebsite API endpoint
- Added a Clone option to the Scheduled Scans page
BUG FIXES
- Fixed a bug where agents were sometimes hanging after failed API requests
- Fixed an issue where the Technical Contact was not displayed for non-Admin users on the New Website page
- Fixed an issue where an incorrect error message was shown during the configuration of a Scheduled Scan
- Fixed a problem on the JIRA webhook where the JSON could not be serialized as expected
- Fixed an issue where a Scan Policy could not be used on a scanner agent if it had a long name
- Fixed a bug where the Authentication Verifier was sometimes hanging if an internal exception was thrown (On-Premises only)
- Fixed the default value for the Agent Data Path setting (On-Premises only)
- Fixed a bug where two-way Jira integration was not working as expected in retest scenarios
- Fixed an issue where a cancelled PCI scan could not be deleted
- Fixed an issue where a web application could not connect to a newly-created SQL Server database immediately (On-Premises only)
- Fixed a bug where scans launched via JIRA integration were sometimes not starting with the configured Scan Policy
- Fixed an issue where the temporary Scan Policy file was not deleted on scan completion on the scanner Agent
Known Issues
- Automatic updates may fail for the On-Premises scan agents with an error message in the agent's log: 'Agent couldn't find AgentAutoUpdater.exe'. To resolve this issue, first upgrade the Invicti Enterprise Web Application and copy the '[Web App Installation Folder]App_DataAgentsAgentAutoUpdater.exe' file to the folder where the target Agent is installed. If you need further help, submit a ticket through our Help Center.
New Features
- Added the functionality to pause and resume scans.
- Added support for automatic crawling and scanning of Parameter-Based Navigation websites.
- Added a new option in the Scan Policy to allow users to add new extensions for the crawler to text parse.
- Added support to allow users to select a scanning agent for a scan in an on-premises installation.
New Security Checks
- Added Missing X-XSS-Protection Header vulnerability check.
- Added Video.js JavaScript library detection.
- Added Insecure Transportation Security Protocol Supported (TLS 1.0) vulnerability check.
Improvements
- Added the Smart DFS feature to the Dom Parser which uses a similarity heuristic technology for DOM elements to avoid multiple scanning of the same or similar parameters.
- Improved "Not Found Analyzer" to better handle binary responses and long strings.
- Added a link to the proof URL for XSS vulnerabilities.
- Added link generation to Text Parser for all select element options.
- Improved DOM parser to skip redirect responses.
- Improved the DOM parser to use the input value for auto-suggest simulation when input is not in a form.
- Added support for modifying asynchronous javascript executions in order to increase DOM Parser coverage.
- Improved relative link parsing on JavaScript files.
- Improved the coverage of file upload security checks.
- Improved the coverage of XSS security checks.
- Improved UI of the scan policy optimized wizard.
- API authentication method updated for backward compatibility.
Bug Fixes
- Fixed an issue where LFI attack patterns were being reported as internal path disclosure.
- Fixed the incorrect raw response representing SSL connections.
- Fixed an issue where forms containing ignored parameters were not reported as a CSRF vulnerability.
- Fixed a case where dynamically generated HTML option elements' change event were not being triggered.
- Fixed cross-domain document access errors on DOM parser and XSS scanner.
- Fixed an issue where a JSON request's method was incorrectly recognized as POST rather than GET.
- Fixed a retest issue where a vulnerability fix is reported by mistake.
- Fixed form values target setting to use Name as the default value when a Target is not selected.
- Fixed a file extension parsing issue related with File Extension List knowledgebase item.
- Fixed a hang issue that occurs while performing JavaScript library security checks.
- Fixed a custom form authentication API issue where "ns" namespace was conflicting with a global variable on target website - auth API has been moved to "netsparker" namespace preserving the "ns" backward compatibility.
- Fixed a DOM Parser and XSS scanner bug that incorrectly followed redirects.
- Fixed a form values issue - empty form values should not set any default values for parameters.
- Fixed an issue during which the setting of the Connection request header failed.
NEW FEATURES
- Added IdP initiated SAML
- Upgraded the Invicti scanning engine to version 5.8.2.27669
- Added Pivotal Tracker integration
- Added support for SAML Assertion Encryption while configuring SSO
NEW SECURITY CHECKS
- Added an F5 Big IP LFI (CVE-2020-5902) attack pattern
- Added out of date checks for Apache Traffic Server
- Added version disclosure for Undertow Server
- Added out of date checks for Undertow Server
- Added version disclosure for Jenkins
- Added out of date checks for Jenkins
- Added signature detection for Kestrel
- Added detection for Tableau Server
- Added detection for Bomgar Remote Support Software
- Added version disclosure for Apache Traffic Server
IMPROVEMENTS
- A new Reset Agent Token button has been added to the Configure New Agent window
- The Status field has been removed from the "api/1.0/discovery/ignorebyfilter" endpoint
- Special characters (()[]#&%! " ') are now allowed in the Scan Policy name field
- Windows and Linux Agent download buttons have been added to the Configure New Agent window
- A Null check has been added for the ImporterType in the Update Scan Profile endpoint
FIXES
- Fixed the Server Error that occured during the deletion of multiple websites
- Fixed a bug where an optimized Scan Policy did not clone properly
NEW FEATURES
- Added Invicti Shark that enables Interactive Application Security Testing (IAST)
- Added the ability to execute Custom Scripts for Security Checks
- Added the ability to edit wordlist entries in the Forced Browsing
- Added the integration with CyberArk Enterprise Password Vault
- Added the Scan Profile column to the Recent Scans window
IMPROVEMENTS
- Improved the visual elements of the dashboard
- Improved the performance of the Technology Dashboard
- Added the ability to create new SSO users via API
- Added the ability to get a team member's last login timestamp via API
- Added the Website URL filter to the Scheduled Scans page
- Improved the performance of the Sitemap
- Updated the Name Id Policy value for SAML as the email
- Added the ability to delete the Website Groups with ID API Endpoint
- Added the Next Execution Time tooltip to the scheduled scan
- Added the Scan Profile Name information to the Scan Task Groups in the Website Dashboard
- Added the ability to save the Privileged Access Management integrations without testing
- Fixed the scan failed errors
- Added the title fields for Vulnerability List items
- The delete button is disabled for system notifications on the Notifications page
- Added the ability to assign scans to internal agents via scheduling
- Removed all (encrypted and cleartext) authentication credentials on the API responses
- Minor revision changes will also trigger agent auto-updates
- The downloaded agent log file is named agentlogs.zip
- Improved the stabilization of the agent state transitions
FIXES
- Added Script Engine Type to the Authentication Verifier
- Fixed the request agent logs bug
- Fixed handling authentication tokens while executing the form authentication
- Fixed the issue where the wrong vulnerability database version was displayed in the agent info
- Fixed the scan session null error
- Fixed the bug in the scan policy optimizer wizard tree
- Fixed the issue where users cannot create a custom script in a three-legged OAuth2 Authentication
- Notification events require appropriate permission
- Added Scan Profiles, Scans, and Scheduled Scans' links while deleting the scan policy
- Fixed XSS for Jira and Pivotal Tracker integrations
- Fixed NullReferenceException while exporting scans from Invicti Standard to Invicti Enterprise
- Fixed an issue about a scan that is not matching with the agent which is in the selected agent group
- Fixed the scan policy cloning bug
- Fixed an issue where the View Scan Reports and Manage Issues (Restricted) options under the Scan Permission are not saved while creating new members
- Fixed the text problem in the information of the Technologies Dashboard User Interface
- Fixed an issue where users cannot save an empty Excluded URL field
- Fixed an issue where scan policy and report policy drop-down appear blank while editing the scheduled group scan
- Fixed a bug that occurs while deleting the scan profile
- Fixed the form authentication fields encryption
- Fixed the loading problem of default scan profile selection
- Fixed the Pre-Request Script Error on Scheduling Scan
- Fixed Exclude Addressed Issues on the Export Report
- Fixed usage report page style problem