Invicti Enterprise On-Premises
New features
- Added the option to remove Request/Response details from the detailed template to avoid the character limit error when sending vulnerabilities
- Added the option to enable enhanced logging of failed logins
- Added functionality to the UI for users to obtain logs from failed scans (previously only system administrators were able to do that)
- ServiceNow Application Vulnerability Response integration is now available in the ServiceNow store
New security checks
- Added a check for dotCMS (CVE-2022-26352)
- Added a check for the Ultimate Member WordPress plugin (CVE-2023-3460)
- Added a new mXSS pattern
- Added new signatures to detect JWKs
- Implemented a detection and reporting mechanism for the Backup Migration WordPress plugin (CVE-2023-6553)
- Added detection for TinyMCE
- Added detection for ActiveMQ RCE to the OOB RCE Attack Pattern (CVE-2023-46604)
Improvements
- Improved the recommendations for the Weak Ciphers Enabled vulnerability
- Improved detection of swagger.json vulnerabilities
- Updated the "Insecure Transportation Security Protocol Supported (TLS 1.0)" vulnerability to High Severity
- Implemented support for scanning sites with location permission pop-ups
- Implemented support for FreshService API V2
- Revised the labeling of the active vulnerabilities information on the Scan Summary page to provide greater clarity
- Removed obsolete X-Frame-Options Header security checks
- Improved ServiceNow Vulnerability Response integration
Fixes
- Fixed a bug in the cloning report policies functionality
- Fixed an error that was occurring with the API endpoint: list-scheduled
- Fixed a bug with the Jira integration
- Fixed a bug with custom scheduled scans that were not updating the Next Execution Time field correctly
- Fixed an issue with the HashiCorp Vault integration token validation path
- Fixed the missing 'Known Issues' tab from scan summary issue details
- Fixed an issue with the severity trend chart on the Dashboard
- Fixed a problem with importing WDSL files
- Fixed a bug in the Request/Response tab of Version Disclosure vulnerabilities
- Corrected an issue in the technical reports where vulnerabilities identified in Korean are now reported in English
- Changed the ID parameter from 'optional' to 'required' within the Scan Policy Update API
- Removed the target URL from the scope control list
- Resolved a bug in the filtering of vulnerabilities on the Issues page
- Fixed a bug in the marking of issues as a false positive
- Resolved an issue where the agent would become unavailable after receiving a 401 error
- Fixed the issue with uploading a Swagger file into a scan profile
- Fixed the system to halt subsequent tests if a scan is aborted from Jenkins
- Upgraded Microsoft.Owin package to version number 4.2.2
New features
- Added notifications about agent disk full issues for easier navigation and to prevent scan errors
- Added an option to the Jenkins integration that stops the scan when the Jenkins build is aborted
New security checks
- RCE for Backup Migration WP plugin (CVE-2023-6553)
Improvements
- Improved reporting of DOM XSS vulnerabilities
Fixes
- Fixed an issue with removing the client certificate via API
- Fixed an inconsistency for PCI results between the Invicti UI and the PCI DSS detailed report
- Fixed a bug that was causing scan session files to fail when loading
- Fixed inconsistencies with the 'average time to fix' table on the dashboard
- Fixed an issue with the import of scan data from Invicti Enterprise to Invicti Standard
- Fixed an issue with the form verifier not using the new scan policy until the scan profile is saved
- Added a custom detailed scan report
- Fixed a bug in the importing of links
- Fixed an error that was occurring when setting an issue as Accepted Risk
- Resolved issues with importing API documentation from a link
- Resolved issues with the Authentication Verifier and Agent.db file corrupting after update
- Fixed a bug in the Jenkins plugin that was causing the 'Stop The Scan When Build Fails' option to not work correctly
Fixes
- Fixed Sqlite exception in verifier
Notes for Verifying the Hash Value for Package Integrity in Invicti Enterprise On-Premises
The hash value for the "24.12.1.zip" file is provided below. You can verify the integrity of the file by checking its hash value using one of the methods outlined above:
Hash Value: 186C51B2F5D7B6D5C1DC5B863773B49C6C5FD3F7798F52A60E325EEBB2204633
Methods to Verify the Hash Value:
PowerShell (Windows):
Get-FileHash -Path "24.12.1.zip" -Algorithm SHA256Command Prompt (Windows):
certutil -hashfile "24.12.1.zip" SHA256Linux or macOS:
sha256sum "24.12.1.zip"
You can use any of the above methods to verify the hash value and ensure the integrity of the "24.12.1.zip" file.
New Features
- API Discovery now supports working with RAML specs from Mulesoft Anypoint Exchange
- API Discovery now supports retrieving Open API/Swagger specs from Kong Konnect → Learn more
- Verifying the Hash Value for Package Integrity in Acunetix 360 On-Premises - see notes below
New Security Checks
- Added detection for multiple JavaScript libraries
- Added detection for Masa CMS (CVE-2022-47002 and CVE-2021-42183)
- Added a check for applications performing certificate name validation to prevent reading invalid memory addresses (CVE-2024-6119)
- Added detection of Google Tag Manager as a technology in the Vulnerability Database (VDB)
Improvements
- Changed the Mend integration to utilize an activation key so that the setup process is simpler
- Updated the AuthVerificationService from .NET 6.0 to .NET 8.0
- Enhanced security to prevent customer login information from being written in clear text
- OpenSSL configuration (openssl.cnf) updated for Docker compatibility
- Added new filter in Recent Scans page for Agent Mode in order to distinguish between Internal and Cloud agents
- Revised field descriptions in the Swagger model documentation to accurately reflect the use of the RequiredIf attribute
- Improved analysis and remediation capabilities for [Possible] Server-Side Template Injection vulnerabilities
- Fixed an issue with the implementation of AWS Lambda integration for HTML to PDF conversion in WebApp
- Updated field descriptions in the Swagger model documentation to reflect the use of the RequiredIf attribute
Fixes
- Vulnerability profiles that are set as hidden will now still be reported in the scan reports of scans completed prior to the vulnerability being hidden
- Fixed a bug in the editing of scan profiles with custom report policies
- Resolved an issue in the exporting of team member data with all attributes selected
- Resolved an issue with missing vulnerability profiles in custom report policies
- Fixed an issue with missing links in imported files that were sent from the API Inventory to the agent
- Fixed an issue where target names longer than 40 characters were not being truncated as expected on the Create New Target page
- Fixed an issue where the "Download HTTP Request Logs" button triggered an error while a scan was in progress
- Fixed an issue where user names containing the character "ä" could not be added
- Fixed an issue with the scan data retention period for raw scan files that was not working as expected
- Fixed missing scan completed notifications with report attachments
- Fixed an issue where adding more than one name to a Notification's Excluded Recipients would remove the other users from all other notifications
- Fixed an issue where the verifier agent could not read or apply custom proxy settings from the appsettings.json file
- Fixed an issue where uploading a .proto file caused a "No links found in the file" error
- Fixed missing request/response details for some out-of-band vulnerabilities
- Resolved a breaking change in .NET 8's System.Net.Security.UseManagedNtlm by upgrading from Ubuntu 22.04 to Ubuntu 24.04, where the issue was addressed. The Agent was updated to .NET 8.
- Fixed an issue where Retest-type scans did not identify the same vulnerabilities detected during full scans
- Fixed high CPU usage in some agents caused by Chromium
- Scans attempting to run with Agent Group without any agents will result correctly in failure instead of queue
- Fixed an issue that was preventing users from accessing a Scan Policy
- Fixed an issue where the Misconfigured Access-Control-Allow-Origin Header vulnerability was not detected
- Improved detection of the [Possible] Password Transmitted over Query String vulnerability.
- Fixed an issue with URL and port validation for the IAST Bridge on WebApp OnPrem
- Fixed a minor typo in the Slack integration documentation
Notes for IE Upgrade: .NET 6 to .NET 8
Impact
With the 24.12.0 release, Invicti Enterprise upgraded from .NET 6 to .NET 8. This upgrade may affect customers using agents on certain Linux distributions due to changes in operating system dependencies.
As a result, agents might not function correctly on unsupported versions of Linux after the upgrade.
Why Is This Happening?
Microsoft has deprecated .NET 6, and upgrading to .NET 8 is mandatory for Invicti Enterprise to maintain compatibility and support.
Solution (Customer Action Required)
Customers must verify the Linux version on which they are running Invicti Agents:
- If using Ubuntu 24.04 or higher: No action is required.
- If using RHEL 8 or higher: No action is required.
- If using an older version (Ubuntu <24.04 or RHEL <8):
- Option 1: Upgrade to Ubuntu 24.04 or RHEL 8 (or higher).
- Option 2: Disable auto-upgrade until the system is updated to a supported version.
Note
We will automatically disable auto-upgrade for affected agents. Customers should not re-enable auto-upgrade until they have upgraded to a supported version of Linux.
Notes for Verifying the Hash Value for Package Integrity in Invicti Enterprise On-Premises
The hash value for the "24.12.0.zip" file is provided below. You can verify the integrity of the file by checking its hash value using one of the methods outlined above:
Hash Value: 96320BC9F49A4851BD307ED23DE6FA6C256F967CBF1A416096382E97D4B3E8FA
Methods to Verify the Hash Value:
PowerShell (Windows):
Get-FileHash -Path "24.12.0.zip" -Algorithm SHA256Command Prompt (Windows):
certutil -hashfile "24.12.0.zip" SHA256Linux or macOS:
sha256sum "24.12.0.zip"
You can use any of the above methods to verify the hash value and ensure the integrity of the "24.12.0.zip" file.
New Features
- Integration with Mend SAST: display Mend SAST results alongside DAST results in Invicti Enterprise so you can prioritize all your application security testing fixes in one list → Learn more
- API Security: Added integration with Azure API Management to fetch Swagger2 and OpenAPI3 specification files → Learn more
- API Security now supports working with RAML specs from MuleSoft Anypoint Exchange
New Security Checks
- Updated detection for ActiveMQ - Remote Code Execution (CVE-2023-46604) and TorchServe Management API SSRF (CVE-2023-43654)
- Added detection for multiple JavaScript libraries
- Added detection for Masa CMS (CVE-2022-47002 and CVE-2021-42183)
Improvements
- Database optimizations
- Reporting improvements for the “Unknown Option Used In Referrer-Policy” vulnerability
- Improved the behavior of the 'Recent Scans' button group on the global dashboard when using the mobile view
Fixes
- Fixed a timeout bug in zero-configuration API discovery
- Fixed some wording inconsistencies and other minor improvements to the user interface
- Removal of sitemap data when a scan is canceled, failed, or aborted
- Resolved an issue in the General Settings page configuration
- Resolved an issue with user sessions not timing out in compliance with the specified configuration
- Fixed a false positive issue with Boolean Based MongoDB Injection detection
- Out-of-date version for Boolean Based MongoDB Injection is now reported correctly
- Vulnerability profiles that are set as hidden will now still be reported in the scan reports of scans completed prior to the vulnerability being hidden
- Fixed a bug in the editing of scan profiles with custom report policies
- Resolved an issue in the exporting of team member data with all attributes selected
- Resolved an issue with missing vulnerability profiles in custom report policies
New Features
- Administrators can now assign Agent Groups to Teams for greater control over agents and the teams that can use them. Contact our Support team to activate this feature
New Security Checks
- Adjusted the severity of SSLv3 and TLS 1.0 vulnerabilities to reflect their security risks
- Added support for CSP frame-ancestors
- Added detection for CVE-2024-6297, affecting several WordPress plugins
- Added XWiki version disclosure vulnerability and attack patterns
Improvements
- Pre-request script now works in DOM as well
- The Azure Extension now retries connections, preventing pipeline failures
- Anonymous sharing of diagnostics and user data with our analytics partner, Pendo, is now opt-out only
Fixes
- Remediated a high vulnerability issue on the Agent Dotnet dependency package
- Fixed an issue that was preventing the selection of configuration items during ServiceNow integration setup
- Fixed an issue with updating targets using the target group ID
- Fixed an issue where the Auth Verifier heartbeat was showing an hour behind due to daylight saving time adjustments
- Fixed an error that was occurring when editing Report Policies
- Fixed an issue with a REST API endpoint returning alternating severity data for TLS 1.0 vulnerabilities
- Resolved an issue with a pre-request script that was affecting crawling functionality
- Fixed the issue where tagging in the Discovery service would create a single-character tag when converted to a target
- Fixed an issue where the encryption process remained pending and incomplete after starting encryption key generation
- Fixed a bug in the API where '/api/1.0/issues/allissues' always returned NULL in the History field
- The option to suspend all future scans is now available to all customers in Scans Control Settings
- Fixed the false negative issue related to Polyfill.io
- Fixed an issue related to creating a custom script for a web application using the OIDC method with a login pop-up
- Fixed the issue where the scan summary page did not time out according to the settings
- Resolved an issue where the AV agent failed to install during the installation process
- Resolved an issue where modifying the settings triggered an error
- Resolved an issue that was blocking the loading of issue details
New features
- Added CVSS 4.0 categorization of vulnerabilities
- Added support for PCI DSS 4.0
New security checks
Improvements
- Added descriptions to the agent warning messages on the Scan Summary page
- Updated messaging around the functionality of the Team Administrator role
- Improved the request body rating algorithm
- Improved the Postman collection parsing algorithm
- Improved the vulnerability calculator for Boolean MongoDB
- Resolved an issue with adding a client certificate to set up a scan
Fixes
- Fixed a bug that was preventing customers from adding back previously deleted targets
- Increased character length for the Jira and Snow integration URL validation regex to ensure it accommodates Top-Level Domains (TLDs)
- Paused scheduled scans that were resuming automatically will now remain paused until manually resumed
- Removed the previous limit on the number of supported second-level domains in the Discovery feature
- Fixed an error that was occurring when updating an issue from Fixed (confirmed) to Accepted Risk status
- Fixed discrepancies in the numbers displayed on the Dashboard
- Fixed an issue with the agent auto-updater
- Added a missing control for SSO users while editing members
- Fixed a bug in the communication between Invicti and ServiceNow
- Fixed a bug that was preventing administrators from creating new notifications or editing built-in notifications
- Fixed an issue that was causing verifiers to not use scan policy proxy settings
- Fixed an auth verifier client certificate authentication path error
- Fixed the Invicti crawler that wasn't getting JS endpoints correctly
- Resolved issues with importing API documentation from a link
- Fixed a bug in the Jenkins plugin that was causing the 'Stop The Scan When Build Fails' option to not work correctly
- Fixed insecure Windows service permissions that were vulnerable to privilege escalation attacks
Important note
- Customers currently using version 23.7.0 on Windows running internal agents will need to perform additional steps in order for this update to run successfully in their environment. Affected customers have been contacted directly with more information.
New features
- [Closed beta] Added the Team Administrator default role
- Changed compression tool from 7zip to Tar
- Added Diana.jl support for GraphQL Library Detection
- Added Hot Chocolate support for GraphQL Library Detection
- Added Zero Day Vulnerability for MOVEit Software
Improvements
- Improved the scan deletion process
- Improved the authentication agent to carry out any stepped authentication, such as first Form Authentication then OAuth2Â
- Added filter for discovered websites via AWS connectionÂ
- Enabled regex case sensitivity for attack payloads
- Updated Boolean NoSQL / SQL Injection attack payloads
- Expanded scenarios for Discovery Service with AWS Connections
- Improved performance when updating vulnerability lookups
- Improved performance of database indexes
- Improved added API endpoints for Custom Scripts
- Improved performance for Issues Report API endpoint
- Improved detection of IT Hit WebDav Server .Net versions
- Improved Internal Path Disclosure detection
- Improved Remediation Advice for Autocomplete Enabled vulnerability
- Improved detection logic for LFI vulnerability
- Improved identification and version disclosure for PopperJS, CanvasJS, and Next.js
- Improved WAF Detection for F5 BIG IP
Fixes
- Fixed PCI Report generation error when selecting a specific group
- Fixed the issue that prevents users from saving the scan profile when the Is Regex checkbox next to the Excluded Path field is selected on the URL Rewrite page
- Fixed the timezone problem on the Knowledge Base Reports
- Fixed issue with scans stopping with the Find & Follow New Links option enabled
- Fixed issue with agent compression of chromium and node files
- Fixed null value exception with REST API
- Fixed InvalidCastException with REST API
- Fixed ArgumentNullException with Custom Security Checks
- Fixed Access Denied error when attempting to delete scan files which were already previously deleted
- Fixed cannot login to web app after changing database password
- Fixed unclear results with PCI reports with edge date ranges
- Fixed BLR cannot fill address fields
- Fixed licensing issue when adding a previously-deleted website
- Fixed adding some MongoDB vulnerabilities to Knowledge Base report
- Fixed importing Swagger/OpenAPI links
- Fixed Discovery Service issue with AWS Connection throttling
- Fixed authentication failure with MFA recovery codes
- Fixed license file corruption issue during version upgrade
- Fixed scans unauthenticated after successful authentication verification
- Fixed Linux agent update issue
- Fixed the data type detection when importing Swagger schemas
New security checks
- Added new security check for LDAP injection for IAST.
- Added new security check for MongoDB injection.
- Added new security check for Server-side Template Injection for IAST.
- Added new security check for XPath injection for IAST.
- Implemented security check for Sensitive Data Exposure.
- Added the check for Boolean-based MongoDB injection.
- Added the check for MongoDB Operator Injector.
- Implemented the XML external entity check for IAST.
- Added the ISO/IEC27001:2022 Classification.
- Added the report template and attack pattern to the Out-of-band RCE.
- Added passive check for Lua.
- Added a security check to detect public Docker files.
- Implemented a new engine to identify WordPress themes and Plugins.
- Added new security checks for SAML.
- Added security check for IT Hit WebDAV Server .Net Version Disclosure.
- Added security check for MS Exchange Version Disclosure.
- Added new payloads for Command Injection.
- Added support for PopperJS.
- Added support for CanvasJS.
- Added new security check for the SQLite Database Detection.
- Added new payloads for Header Injection.
- Added new security check for Spring Boot Actuator Detection.
- Added security check for NodeJS Stack Trace Disclosure.
- Added security check for SailsJS and ActionHero Identified.
- Added security check for JetBrains .idea Detected.
- Added security check for GraphQL Stack Trace Disclosure.
- Added security checks for Javascript Libraries.
- Added security checks for Web Application Fingerprinter Engine.
- Added new security checks for WordPress Hello Elementor Theme Detection.
- Added new security checks for WordPress Twenty Twenty-Three Theme Detection.
- Added new security checks for WordPress Twenty Twenty-Two Theme Detection.
- Added new security checks for WordPress Astra Theme Detection.
- Added new security checks for WordPress Twenty Twenty-One Theme Detection.
- Added new security checks for WordPress Twenty Twenty Theme Detection.
- Added new security checks for WordPress OceanWP Theme Detection.
- Added new security checks for WordPress Twenty Seventeen Theme Detection.
- Added new security checks for WordPress Kadence Theme Detection.
- Added new security checks for WordPress Twenty-Sixteen Theme Detection.
- Added new security checks for WordPress Twenty Nineteen Theme Detection.
- Added new security checks for WordPress PopularFX Theme Detection.
- Added new security checks for WordPress GeneratePress Theme Detection.
- Added new security checks for WordPress Inspiro Theme Detection.
- Added new security checks for WordPress Go Theme Detection.
- Added new security checks for WordPress Smash Balloon Social Photo Feed Plugin Detection.
- Added new security checks for WordPress Contact Form 7 Plugin Detection.
- Added new security checks for WordPress Yoast SEO Plugin Detection.
- Added new security checks for WordPress Elementor Website Builder Plugin Detection.
- Added new security checks for WordPress Classic Editor Plugin Detection.
- Added new security checks for WordPress Akismet Spam Protection Plugin Detection.
- Added new security checks for WordPress WooCommerce Plugin Detection.
- Added new security checks for WordPress Contact Form by WPForms Plugin Detection.
- Added new security checks for WordPress Really Simple SSL Plugin Detection.
- Added new security checks for WordPress Jetpack Plugin Detection.
- Added new security checks for WordPress All-in-One WP Migration Plugin Detection.
- Added new security checks for WordPress Wordfence Security Plugin Detection.
- Added new security checks for WordPress Yoast Duplicate Post Plugin Detection.
- Added new security checks for WordPress WordPress Importer Plugin Detection.
- Added new security checks for WordPress LiteSpeed Cache Plugin Detection.
- Added new security checks for WordPress UpdraftPlus WordPress Backup Plugin Plugin Detection.
- Added new security check for EZProxy Identified.
Improvements
- Updated the Java sensor for more stability in the sensor.
- Added the Response Receiver information event to remove waiting time for requests.
- Improved the discovery service for email, website, and main website matching.
- Improved the Not Contains filter for tags.
- Added the EC2 Instance ID column to the default columns on the Discovered Websites page.
- Updated API documentation for outdated ApiFileModel JSON example.
- Added an information message to the report policy page in case the custom report policy cannot be found.
- Improved the agent assignment process to prevent performance issues.
- Changed the Launch Scan button to the New Scan button on the dashboard.
- Added an account ID control when querying the website with the root URL.
- Improved the website importing when the CSV file has more than 1000 entries.
- Added an information message for adding an AWS connection that appears when there is no running instance.
- Improved the health check of websites discovered via the AWS connection.
- Changed the Jira webhook settings, making the Exclude Body checkbox selection mandatory.
- Fixed the importing website issue that threw an error when a user tries to add the website deleted from Invicti previously.
- Improved the scan data by moving some information like attack and knowledge base data to the storage.
- Improved the AWS discovery that can find private IPs in addition to the public IPs when the Include Unreachable Discovered Websites checkbox is selected.
- Improved the user interface for the website's menu.
- Improved the user interface for the crawling options on the New Scan page.
- Improved the business logic recorder to play the authenticated record.
- Updated the Signature Detection pattern.
- Improved the wordlist for Forced Browsing checks.
- Changed the Session Cookie not marked as Secure severity from High to Medium.
- Improved the performance of downloading the discovery data via the API endpoint.
- [Acunetix 360] Improved the silent installation JSON document for AcuMonitor.
- Increased the delay control for max scan duration to 12 hours. After 12 hours of the maximum scan time set by the customer, the web application fails the scan.
- Improved Drupal and Joomla detection.
- Improved the Next.js version detection.
- Improved Django debug mode enabled.
- Updated the SSL/TLS report template.
Fixes
- Fixed the date-time issue in the Authentication Verifier Service that prevents verifier agents from being listed on the verifier page.
- Fixed the typo on the filter options on the Discovered Webpages page.
- Fixed the proxy settings on the scan policy, so it can be applicable for agents as well.
- Fixed the agent selection issue that prevents users from launching scans.
- Fixed an issue that caused a bad CSRF token when confirming Cross-site Scripting.
- Fixed the issue that is filling out the login form on the logout page during the login verification.
- Fixed the issue of changing the order of API parameters while importing the JSON file.
- Fixed the vulnerability signature types for Cloudflare and Cdnjs.
- Fixed the custom script information on the 3-Legged Authorization in the scan summary.
- Fixed the issue that prevented empty website groups from being deleted.
- Fixed the issue that resulted in the scanning of the target URL instead of the GraphQL endpoint.
- Fixed the token detection issue although the Detect Bearer Authorization Token function is disabled.
- Fixed the case-sensitive parameter name that caused issues when migrating the database.
- Fixed the ServiceNow integration issue that failed to export the issue information.
- Fixed the issue that allowed a user with permission to add/edit a website group the ability to view all account websites.
- Fixed the permission issue that a user can add and edit discovery connection via an API endpoint although the user does not have that permission.
- Fixed the logo issue that the Knowledge Base report was showing the old Invicti logo.
- Fixed issues encountered during scan deletion and canceling to improve performance.
- Fixed the issue in which a team’s name is deleted during the editing process.
- Fixed the validation issue for the Kafta integration.
- Fixed the password update issue for the authentication verifier process that failed to obtain the new password.
- Improved report generation via API endpoints.
- Fixed the login failures when the Authentication Profile is selected as the Use matched profile.
- Fixed the issue that caused the flashing custom script screen.
- Fixed the issue with cascading combo box by fixing the query.
- Fixed an internal server error while exporting from the Invicti Standard to the Invicti Enterprise.
- Fixed the issue with the “#” sign that can appear in the target URL.
- Fixed the issue with choosing the All option from the website group drop-down on the Reporting page.
- Fixed an issue about HTTP Status codes on the crawler performance in the Knowledge Base Report.
- Fixed the importing GraphQL introspection issue.
- Fixed the weak Nonce detection in Content Security Policy.
New security checks
- Added new patterns for GrapQL attack usage.
- Added new attack pattern to CommandInjection.xml.
- Implemented Bootstrap Libraries Detection.
- Added Out-of-Date vulnerability for mod_ssl.
- Added a report template and vulnerability type for Spring Framework Identified.
- Added JavaMelody Interface Detected Signature.
- Added the support for Nested objects for GraphQL attacks.
Improvements
- Added the discovery source option to filters on the discovered websites page.
- Added the AWS badge to the Discovery Service to identify the assets identified via the AWS connection.
- Improved the Linux agents to work in the FIPS-enabled environment.
- Updated the IAST Bridge to improve the communication between the bridge and the scanner agent.
- Added a null check for HAR files imported.
- Added the Retest All Subitems in the Sitemap to prevent non-retestable issues from being retested.
- Improved the agent and web application communication to end it after three attempts if the internal agent has wrong information.
- Updated IAST NuGet PHP package.
- Updated StaticDetection.xml & StaticResourceFinder.xml.
- Changed WAF Identification Signature for F5 Big IP.
- Added service worker request support for authentication, login simulation, and crawling.
Fixes
- Fixed the AWS connection issue to let customers add internal EC2 instances.
- Fixed an issue that caused high memory usage while collecting form values.
- Fixed the issue that caused the change in the date and time format during the Postman file importing.Â
- Fixed the next scheduled scan execution time information on the user interface.
- Fixed the issue that displayed "vulnerability not found" on the user interface although the vulnerability is identified.Â
- Fixed the control issue that threw an “internal server error” when exporting a scan from Invicti Standard to the Enterprise.
- Fixed the issue that allowed a user with permission to add/edit a website group the ability to view all account websites.
- Fixed the logo issue that the Knowledge Base report was showing the old Invicti logo.
- Fixed the untrusted certificate error for internal proxies.
New security checks
- Added package.json Configuration File attack pattern.
- Added new File Upload Injection pattern.
- Added SSRF (Equinix) vulnerability.Â
- Added Swagger user interface Out-of-Date vulnerability.
- Added a file upload injection pattern.
- Added StackPath CDN Identified vulnerability.
- Added Insecure Usage of Version 1 GUID vulnerability.
- Added JBoss Web Console JMX Invoker check.
- Added Windows Server check.Â
- Added Windows CE check.
- Added Cloudflare Identified, Cloudflare Bot Management, Cloudflare Browser Insights, and cdnjs checks.Â
- Added Varnish Version Disclosure vulnerability check.
- Added Stack Trace Disclosure (Apache Shiro) vulnerability check.
- Added Java Servlet Ouf-of-Date vulnerability check.
- Added AEM Detected vulnerability check.
- Added CDN Detected(JsDelivr) vulnerability check.
Improvements
- Updated Invicti Enterprise with the new brand logo.
- Added external schema import to solve a WSDL file importing another WSDL file.
- Added the Hawk URL configuration to the silent installation document.
- Improved the Authentication Verifier settings in the silent installation document to skip or not the verifier.
- Improved the On-Premises installation package to run as 64-bit if the platform support 64-bit.Â
- Improved the settings page for admins to change the Hawk URL.
- Improved the bulk update of those issues with the Fixed(Can’t Retest) status.
- Added a column on the Issues page to show users whether an issue is retestable.
- Improved the scan compression algorithm to lower the size of the scan data.
- Added a tooltip to show the full scan report name when it is too long.
- Added a progress indication while exporting a PCI scan report.
- Added an option to delete the stuck agents' commands.
- Fixed the business logic recorder issue while using the Basic, NTLM/Kerberos Configurations.
- Improved the descriptions for /api/1.0/issues/report endpoint and the integration parameter on the Allissues endpoint.Â
- Improved WS_FTP Log vulnerability test pattern.
- Improved X-XSS-Protection Header Issue vulnerability template.
- Improved MySQL Database Error Message attack pattern.
- Improved XML External Entity Injection vulnerability test pattern.
- Improved Forced Browsing List.Â
- Added CWE classification for Insecure HTTP Usage.
- Added GraphQL Attack Usage to existing test patterns by default.
- Added an option to ignore events that can break the JavaScript simulation script.
- Added version number information to internal agents on the Configure New Agent page.
- Added an option to set a timeout value for agents to be set as Unavailable if they are stuck.Â
- Improved Invicti Enterprise to clear all login files upon signing out of the application.
- Improved the Authentication Verifier settings in the silent installation document to skip or not the verifier.
- Created a queue to store scan results and register results asynchronously.
- Added the vulnerability database to the installation package.
Fixes
- Fixed Out-of-memory reason at CDPSession.
- Fixed the issue with the DefectDojo report submission.
- Fixed the Client Secret in raw text appearing in the scan report for OAuth2.
- Fixed the time zone issue for the authentication verifier agent.
- Fixed the IAST Bridge installation issue that ended prematurely.
- Fixed the issue that displayed "vulnerability not found" on the user interface although the vulnerability is identified.
- Fixed the scan duration limit issue that crashed the application.
- Fixed the issue with a folder name with blanks to prevent the Unquoted Service Path vulnerability.
- Fixed the control issue that threw an “internal server error” when exporting a scan from Invicti Standard to the Enterprise.
- Fixed the update issue in the Proof node in the Knowledge Base panel.Â
- Fixed the scan profile issue when exported from Invicti Standard to Invicti Enterprise.
- Fixed the API token reset issue for team members.
- Fixed the API documentation’s website that failed to show descriptions.
- Fixed the business logic recorder issue where the session is dropped because of a cookie.
- Fixed the default email address that appeared on the login page during the custom script window.Â
- Fixed the Out-of-Memory issue caused by the Text Parser when adding any extension to the parser.
- Fixed the Client Secret in raw text appearing in the scan report for OAuth2.Â
- Fixed the Hawk validation issue.
- Fixed the scan flow with different logic for incremental scans that are launched via CI/CD integrations and the user interface.
- Fixed the custom vulnerability deletion problem on the custom report policy.
- Fixed the vulnerability database issue that occurred because of a URL redirect problem.
- Fixed the internal server error on the Audit logs' list endpoint.Â
- Fixed the issue of email notifications when a new scan is launched.Â
- Fixed the typo on the OAuth2 settings page.
- Fixed the issue updating timeout issue.Â
- Fixed the issues API endpoint on the updating and sorting.
- Fixed the tagging issue with the Azure Boards integration that the tag appeared on the Azure board although there is no tag entered on the Invicti side.
- Improved the web app and agent communication.
- Updated the docker agent package for the 64-bit process.
- Fixed the bug that threw an object reference error while trying to end the scans that exceeded the max scan duration.
- Fixed the Classless Inter-Domain Routing (CIDR) transformation issue for the discovery service.
- Fixed the discovery service crawling issue.
- Fixed issues that caused erroneous reports.
New features
- Added the Maximum 404 Signatures field to scan policies.
- Added an option to exclude issues’ history from reports.
- Added an option to set a timeout value for agents to be set as Unavailable if they are stuck
New security checks
- Added the JSON Web Tokens detected check.
- Added JWT Token Forgery through Kid by using static files.
Improvements
- Improved the JSON Web Tokens' vulnerability logic.
- Updated JWT Token Forgery check condition.
- Extended excluded header names with new headers.
- Improved the JWT Token Finder Regex in the JWT engine.
- Updated the embedded Chromium browser.
- Added the permission check to download reports.
- Added a parameter (ImportedLinks) for imported links to the /scanprofiles/new API endpoint.
- Improved the global dashboard performance.
- Added records limit to avoid Out-of-Memory exceptions on reports.
- Added the link scope check for the user-controllable cookie vulnerability.
- Improved the default browser settings to be reflected in the business logic recorder (BLR).
- [Early Access] Created a queue to store scan results and register results asynchronously.
- Improved the web app and agent communication.
- Improved the performance of the scan report API endpoint.
Fixes
- Fixed an issue that caused unhandled exceptions when there is no service endpoint definition in the WSDL file.
- Fixed accessibility issue in the scan optimizer pop-up.
- Fixed special character problems in Crawled and Scanned URLs reports.
- Fixed "file in use error" while archiving scan logs.
- Fixed the OAuth 2.0 authentication problem caused by the failure to get code information and certification validation in out-of-scope links. Fixed missing cookies for the JSON Web Tokens attack requests.
- Fixed the text parser extension issue that caused agents stuck.
- Fixed the vulnerability family issue that caused the Hawk not to detect issues.
- Fixed the bug that threw an error when the Require SAML assertions to be encrypted checkbox is not selected on the Single Sign-on page.
- Fixed a bug that caused scans to be canceled unexpectedly.
- Fixed a bug that caused scans to terminate prematurely due to incorrect time settings.
- Fixed the exception issue for the internal authentication verifier.
- Fixed the cloud agent issue that was stuck in the launching stage.
- Fixed the host unavailable issue that was thrown for sub-target URLs.
- Updated the docker agent package for the 64-bit process.