20 Jan 2022
This update includes changes to internal scan agents. The internal scan agent’s current version is 2.0.2.135.
IMPROVEMENTS
- Added a condition for team members when sending an email notification.
- Added a condition when sending an email notification for Out-of-Date Technologies to customers.
- Improved the importing of RAML files includes other files.
- Updated the Freshservice integration not to send a user agent header.
- Improved the API responses by adding model mapping for AuthenticationProfileOption and AuthenticationProfileId.
- Added a message to the Jira integration to show that the integration is created successfully.
- Added an error message for invalid component value of newly created Jira integration.
- Improved the pop-up message that warns users that they share the report with a person from the outside of the organization.
FIXES
- Fixed an issue that prevented keywords from being refreshed when the login required URL is changed on the Login Verification window.
- Fixed a misspelled word on the GraphQL Introspection window.
- Fixed a bug that prevented each website using its own default scan policy when a scheduled group scan is launched.
- Fixed the issue where the client-side cookies were not excluded correctly.
- Fixed an issue with latestVulnerabilityStatePointId values that return errors on the Issues/To Do and Issues/All issues.
- Fixed an issue that shows a two-factor authentication warning message for provisioned team members with Okta.
- Fixed an information message that uses the word “notification” although the message is about the integration.
- Fixed an issue in DefectDojo, YouTrack, and TFS integration that refreshes the New Integration page when a custom field is added and the user selects the Create Sample Issue button.
- Fixed an issue that shows extra leading white space in the console of the Website page.
- Fixed the issue with the Missing XSS protection Header in the Out-of-Scope link.
- Fix the issue that prevents the built-in scan policies from being updated when there is a new update for the On-Demand version.
- [INTERNAL AGENTS] Fixed a request payload when the Agent sends big scan data.
- [INTERNAL AGENTS] Fixed OAuth2 verification that fails due to the OTP settings model being null.
- [INTERNAL AGENTS] Fixed the scan error on completion issue because of crossthread error by moving to ConcurrentDictionary.
11 Jan 2022
This update includes changes to Internal Agents. The internal agent’s current version is 2.0.2.134.
NEW FEATURES
- Added OWASP Top Ten 2021 report and classification.
IMPROVEMENTS
- Improved the Authentication Verifier Agent. The new version supports the improved performance for single page applications, consumes less resources, and comes with the auto update feature.
FIXES
- Added workspace information for Bitbucket integration.
- Fixed a bug that threw a communication error when sending an issue to Kenna.
- Added Tags property to the Kenna integration.
15 Dec 2021
The internal agent’s current version is 2.0.2.131.
NEW SECURITY CHECKS
- Added Out of Band Code Evaluation (Log4j CVE-2021-44228) a.k.a. Log4Shell detection support.
30 Nov 2021
This update includes changes to Internal Agents. The internal agent’s current version is 2.0.2.129.
NEW FEATURES
- Added support for scanning GraphQL APIs.
- Added OWASP API Top Ten Report.
IMPROVEMENTS
- Improved the paragraph style of the login warning banner.
- Changed the brand name of Clubhouse to Shortcut.
- [INTERNAL AGENT] Added the error messages to the Login Simulation Pages.
FIXES
- Fixed the Jolokia version disclosure report to properly highlight the related lines.
- Fixed a bug that threw an error when users update a vulnerability’s status as False Positive on the Technical Report page.
- [INTERNAL AGENT] Fixed a bug that prevented subprocesses of agent from being shutdown during the update process.
17 Nov 2021
The internal agent’s current version is 2.0.2.128.
IMPROVEMENTS
- Added a behavior that the system sets the default policies of a website group to a website for the Scheduled Group Scans and Group Scans. The system sets the default policies only if users select the default policies on the General Settings page and then assign these policies to a website group on the policies page.
- Added an information message for updating the agent’s status.
FIXES
- Fixed an issue that set the wrong default scan and report for the Scheduled Group Scan and Group Scan if there is a scan profile.
- Fixed an issue that prevented a user from editing the default scan policy.
- Fixed an issue that removes the client certificate from the Form Authentication page if the related scan profile is updated.
- Fixed an issue that occured when the same vulnerability was sent to Jira’s endpoint more than once.
- Fixed a mismatching type issue on /scanprofiles/list API response model.
09 Nov 2021
This update includes changes to Internal Agents. The internal agent’s current version is 2.0.2.127.
NEW FEATURES
- Added Node.js sensor for Invicti Shark (IAST).
NEW SECURITY CHECKS
- Added signature matching to Web app fingerprint checker.
- Added patterns for Base64 encoded DOM Cross-site Scripting.
- Added phpMyAdmin Version Disclosure security check.
- Added Atlassian Confluence Version disclosure and Out-of-date security checks.
- Added exclusion feature to JavaScript Library detection.
- Added PHP Version Detection via phpinfo() call.
- Added the Shopify Identified security check.
IMPROVEMENTS
- Added the Bridge URL and Shark token support for Invicti Shark (IAST).
- Added the “not contains” filter to exclude specific titles, such as Out-of-Date.
- Added the notification on the Reporting page when the time start predates the time end.
- Added setting to configure Session Cookie Names.
- Updated CWE classification category orders for Out-of-date templates.
- Improved Cross-site Scripting attack pattern.
- Added support for exploiting local storage and session storage in the DOM XSS security checks.
- Added highlighting support for custom scripts.
- Added Web Application Firewall to the site profile.
- Changed the default ignored parameter comparison to case insensitive.
- Added ‘Is Encoded’ option to OAuth2 parameters.
- Added JWT Token pre-request script template.
- Added the CSP Not Implemented that will be reported as confirmed.
- Added the Subresource integrity not implemented that will be reported as confirmed.
- Marked weak TLS ciphers.
FIXES
- Fixed the issue that Content-Type header missing was reported when there was no content in the response.
- Fixed the issue that false positive JSON Web Token (JWT) was reported in a not found response.
- Fixed the issue possible and confirmed vulnerabilities reported in the same URL.
- Fixed the issue proof that was generated even when the proof generation option was disabled in the scan policy.
- Fixed FP Waf Identified.
- Fixed the issue vulnerability count in root node is not updated when a vulnerability is removed and Blind XSS was prioritized over the Reflected Cross-site Scripting.
- Fixed the issue source code disclosure is reported in binary responses.
- Fixed the issue JWT JKU vulnerabilities are not reported in Invicti Enterprise because of Null Reference Exception.
- Fixed the issue fingerprint checker crashes when an applications file could not be found.
- Fixed the issue object-src missing was reported when default-src is provided in CSP security checks.
- Fixed the issue that some cipher suites are not reported as weak.
- Fixed the issue classification links were not rendered correctly when there are multiple values.
- Fixed the issue proof prefix was added when there were no more characters to be found.
19 Oct 2021
FEATURES
IMPROVEMENTS
- Added the tagging filtering to the Scan Profiles.
- Added the license error to the scans that were scheduled by users whose licenses are expired.
- Added the fixed confirmation date to the issues API endpoint so that you can better track your team’s remediation efforts.
- Added null check for application names during comparison with the vulnerability database.
FIXES
- Fixed the first seen date issue that appeared differently on the user interface and the scan report.
- Fixed the Url Rewrite Excluded Links API call by adding null response back to that call’s responses.
- Fixed a bug that prevents serialized integration information from being decrypted in some issues.
- Fixed an issue that displays the mistaken path in the trend matrix reports when different paths are scanned.
- Fixed a bug returning the 500 Error when an issue is updated.
13 Oct 2021
This update includes changes to Internal Agents. The internal agent’s current version is 2.0.2.125.
IMPROVEMENTS
- Added a new security check to identify version disclosure and out-of-date version for Atlassian Confluence CVE-2021-26084.
FIXES
- Fixed a bug that results in missing HTTP headers of target URL when added with imported links.
- Fixed an issue that causes proof creation for SQL injection and Cross-site Scripting even if the proof generation is disabled.
- Fixed an issue that prevents cookie’s same site attribute from being updated which causes “same-site cookie is not implemented” vulnerability to be reported.
- Fixed a JSON Web Token (JWT) validation check that causes too many invalid token errors when using Bearer Authentication Tokens in the form authentication.
- Fixed an issue where host and path parameters in Postman collection were not imported when they are string instead of an array.
- Fixed a bug that returns 401 when the scanner sends HTTP headers in lowercase.
- Fixed a bug about cookie handling in the logout detection page during the form authentication verification.
- [INTERNAL AGENTS] Fixed a bug that results in slow response time from the web application to the agent that causes inconsistent vulnerability reports in the Blind SQL Injection.
06 Oct 2021
This update includes changes to Internal Agents. The internal agent’s current version is 2.0.2.125.
IMPROVEMENTS
- Improved the Login Banner Warning feature so that users cannot access any resources on Invicti Enterprise until they select the Accept, Continue button.
- Add the Environment field to the DefectDojo integration.
- Added the Export to CSV button on the Manage Members page so that you can download all your team members to your environment.
FIXES
- Fixed a bug that prevented the scan profile of a deleted website from being removed. Now, when users delete a website, the related scans, including scan profile, are also deleted.
- Fixed an issue that prevent the scan from being canceled.
- Fixed the missing ScanTaskProfile field by adding it back to scan API call responses.
- Fixed a bug that prevents members and teams from being deleted if they have been assigned to website groups.
- Fixed a bug that allows the API member edit endpoint which accepts less than 15 characters for the administrator’s password.
- Changed the permission to view reports from Add/Edit Scan to the View Report.
- [INTERNAL AGENTS] Changed Agent request time interval to 60 seconds.
- [INTERNAL AGENTS] Fixed a bug that prevents an agent from scanning a new website if the previous scan was canceled.
21 Sep 2021
IMPROVEMENTS
- Improved the search for scan profiles on the Recent Scans page. Added the Scan Profile Default option to the column filters on the Recent Scans page to speed up the search for the default scan profiles.
- Improved the error messages and code returned from the updating issue API endpoint.
- Added unique IDs on the HTTP 500 Error page.
- Updated a Docker agent library to run more security checks.
FIXES
- Fixed a bug that prevents a website from being deleted if that website has tags.
- Fixed a bug that non-register users receive the Out-of-Date technology notification although these users have no website responsibility.
- Fixed a bug that shows a two-factor authentication page to some users with SSO login after their information is updated on the Team Member page.
- Fixed typo in the All Issues’ page filter drop-down.
- Fixed a bug returning the 500 Error when an issue is updated.
- Fixed a bug that led to duplicated records in a member’s role.
- Fixed a bug that ignored a member’s time zone setting while generating a vulnerability list in XML format.
- Fixed a bug that causes the private scan policies to appear in the Scan Policy drop-down at the New Scheduled Group Scan page.
- Fixed a bug that did not convert the remaining time for the Next Execution Time of a scheduled scan properly.
09 Sep 2021
This update includes changes to Internal Agents. The internal agent’s current version is 2.0.2.123.
FEATURES
- Introduced a login banner warning. The banner displays security and legal notices to users accessing the system.
- Added pre-scan validations so that Invicti can automatically choose TLS protocol.
IMPROVEMENTS
- Added the tag filtering to the Recent Scans page.
- Added the tag limitation. Users cannot add more than 20 tags.
- Added the date range filter to the global dashboard. Thanks to this improvement, users can filter scan data according to the selected time range.
- Added website and website groups information to Jira integration. When users send an issue to Jira via Invicti Enterprise, website and website groups information, if any, appears in that ticket.
- Added a check for the Trend Matrix Report to ignore null records in the database.
- Improved the method to query known vulnerabilities in Invicti Enterprise.
- Changed SCIM response status code from 400 to 409 when the same email address is submitted twice.
- Added a 400 Error message in the SCIM response status code when a user tries to change its email to a username.
- Updated the error message when deleting the website during a PCI scan.
- Added the severity level icons to the websites listed on the Websites’ page.
FIXES
- Fixed the retest retry limit if the base scan is not loaded.
- Fixed an email notification error sent to guest users which showed “Failed – Unable to load scan session” error in the scheduled scans although the scan was successful.
- Fixed a NullReferenceException thrown while checking target URL in the New Scan page.
- Fixed password autocomplete issue in the form authentication saved in a scan profile.
- Fixed an error that prevents the URL Rewrite rule from being updated in the saved scan profile.
- Fixed an error that prevents scan tags from being shown while creating a scheduling scan.
- [INTERNAL AGENT] Fixed the Ignore SSL Certificate issue that prevents internal agents from being auto-updated.
- [INTERNAL AGENT] Improved the performance of security check on cases when multiple checks are running concurrently.
26 Aug 2021
FEATURES
- Introduced the tagging feature for websites, website groups, and scans: While this feature has been available for Issues since March, it is now available for scans, websites, and websites groups as well.