🚀 Invicti Acquires Kondukto to Deliver Proof-Based Application Security Posture Management

100% Signal 0% Noise
Platform
Platform Overview
Features
Solutions
CAPABILITIES
Web Application Security
ASPM
API Security
DAST
SAST
SCA
Container Security
AI-Powered AppSec
ROLE + TEAM
CTO and CISO
Engineering Manager
Security Engineer
DevSecOps
INDUSTRY
Banking and Finance
Healthcare
Government
Education
Pricing
Why Invicti
About Us
Scanner Comparison
Case Studies
Contact Us
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Case Studies
Invicti Learn
Live Training
Partners
Support
Web Vulnerability Scanner
Get a demo
Home
/
Documentation
/
Invicti Enterprise On-Premises Release Notes
Invicti Product Release Notes
Invicti Enterprise On-Demand
Invicti Enterprise On-Premises
Invicti Standard
Invicti Application Security Platform
Release Notes

Invicti Enterprise On-Premises

RSS FEED
21-Jan-2016
COPY LINK

First Official Release

20-Feb-2019
COPY LINK

BUG FIXES

  • Fixed an issue with setting up a new Team Member when SSO was enforced.
  • Fixed an issue which was occurring during re-installing previously terminated agent.
2.4
COPY LINK

NEW FEATURES

  • Added the Business Logic Recorder feature in Invicti Enterprise, so you can scan web applications without extensive manual work or additional non-automated tools.
  • Added support for Azure Key Vault.
  • Added GraphQL Libraries detection support.
  • Added built-in DVWA policies to scan policies.
  • Added the feature to tag discovered websites.
  • Added Invicti Shark (IAST) to the Knowledge Base.

IMPROVEMENTS

  • Improved the Authentication Verifier to work with .NET 6.0.
  • [Breaking Change] Added support for on-premises versions of CyberArk, HashiCorp Vault, and Azure Key Vault. This requires an authentication verifier agent.
  • Improved the Late-Confirmation Storage Mechanism to lower disc usage.
  • Improved the rate limit for the All Issues API endpoint.
  • Improved the Cloud Provider setting to enable the Linux ID Image.
  • Added an API endpoint to better understand how many websites each user scanned.
  • Added raw scan file expired status to the Scan Failure Reasons.
  • Added the IsEnabled API endpoint for the OAuth2 setting.
  • Updated the icons on the Trend Matrix page.
  • Added logs to scheduled scans to identify the license issue when the scan couldn't be launched.
  • Improved the internal agent to check whether OAuth2 is enabled or not.
  • Improved the agent’s language setting to prevent non-English texts from appearing on the scan results.
  • Improved the Activity Log to include information on vulnerability profile changes.
  • Improved the Scan Profiles API endpoint to include information on the imported URLs.
  • Added integration failed status for the Secrets and Encryption Management services.
  • Updated the scan agent update workflow. When there is a new update and users have more than one scan agent, the new version will be downloaded only once. Other scan agents will rely on this new package to update themselves.
  • Added a drop-down to determine how many results to be displayed on a page.
  • Added a new explanation for the api/1.0/scans/unschedule endpoint to clear any ambiguity
  • Added a filter that checks the number of issues being displayed on the global dashboard.
  • Improved the IP filtering on the discovered websites' page.
  • Updated the Splunk plug-in to prevent exporting unnecessary HTML information to the Splunk ticket.
  • Added 'Is Encoded' option to OAuth2 parameters.
  • Adding the Connection Timeout option to the scan policy.
  • Improved the Knowledge Base tab in the technical report section for accessibility.
  • Added the Browser Settings to scan policy.
  • Added report policy migration process while relaunching scan session to prevent launch scan issue.
  • Added a discovered date column for websites detected by the Discovery Service.
  • Updated the Invicti Hawk’s redirection while validating the certificate.
  • Added a timeout for website import. The default value for timeout is 400 ms.
  • Improved the tooltip for security checks on the scan policy page to properly reflect the security policy selections.
  • Updated the SCIM integration for provisioning on Azure Active Directory’s marketplace.
  • Added the ability to bulk edit issues.
  • Added the scan policy header to the OAuth2 requests.
  • Improved JWT confirmation to avoid false positives.
  • Added a new IAST vulnerability: Overly Long Session Timeout.
  • Added new config vulnerabilities for the IAST Node.js sensor.
  • Added new config vulnerabilities for the IAST Java sensor.
  • Added support for detecting SQL Injections on HSQLDB.
  • Added support for detecting XSS through file upload.
  • Updated DISA STIG Classifications.
  • Updated Java and Node.js IAST sensors.
  • Improved the Content Security Policy Engine.
  • Updated XSS via File Upload vulnerability template.
  • Added Extract Resource default property to DOM simulation.
  • Added an option to discard certificate validation errors on the Enterprise Integration window during SSL/TLS connections.
  • Added the agent mode to the authentication request.
  • Added a default behavior to scan the login page.
  • Added a default behavior to disable TLS1.3.

FIXES

  • Fixed the issue that the advanced installer enabled the Windows authentication.
  • Fixed a bug with displaying cookie names in the scan policy.
  • Fixed a Globally Unique Identifier bug that assigned zero to a custom vulnerability when identified.
  • Fixed a bug that prevents editing an internal website.
  • Fixed a bug that caused a broken website-scan relationship as a result of an inconsistent update.
  • Fixed the inconsistent vulnerabilities listed in XML and CVS reports.
  • Fixed the bug that caused the issues' status to stay the same in the case of bulk editing.
  • Fixed a bug on the user interface that showed incorrect scan status.
  • Fixed an issue with global servers in imported Swagger files.
  • Fixed a bug that adds duplicated users to a team when added using SCIM.
  • Fixed the Azure board integration webhook issue caused by the status codes.
  • Fixed a bug that prevents members with user-defined roles from being deleted.
  • Fixed a bug that prevents the information displayed when users select Jira on the user mapping.
  • Fixed a bug that prevents a notification from being sent to users when users filter the state.
  • Fixed a bug that does not request to verify website ownership when the website's agent mode is changed from internal to Cloud.
  • Fixed a bug that causes showing an outdated vulnerability database version of an agent on the user interface.
  • Fixed a bug that shows different information between Invicti Standard and Invicti Enterprise on the Known Issues of the Out-of-Date Node when the software composition analysis is run.
  • Fixed a bug that does not show the website thumbnail when the scan is completed.
  • Fixed an issue that causes custom vulnerabilities not to be added to the Vulnerability Lookup table.
  • Changed filter for Groupable Custom vulnerabilities when creating vulnerability model.
  • Fixed a bug that prevents a scan profile from being updated when users add a client certificate.
  • Fixed a bug that threw an error when users tried to delete a scan policy.
  • Fix a bug that prevents exporting a vulnerability list report in CSV or XML when Invicti Shark (IAST) is enabled.
  • Fixed a bug while excluding cookies during the scan.
  • Fixed a bug that prevents websites from being deleted.
  • Fixed the Jazz Team Server multiple category issue.
  • Fixed a bug that occurs when a detailed scan report does not report the CVSS scores for custom vulnerabilities.
  • Fixed a bug that prevents editing the FreshService integration.
  • Fixed the link that throws an error on the SCIM API documentation page.
  • Fixed a bug that throws an exception when the agent is started in debug mode on IDE.
  • Removed the space on CVSS Scores that caused incorrect values to show up.
  • Fixed the parsing problem encountered when Burp and Postman files are imported via the Links/API Definition page.
  • Fixed imported links DLL mismatch problem for GraphQL.
  • Improved the scan agent to continue scanning in case of getting HTTP status errors like Forbidden, Unauthorized, and ProxyAuthenticationRequired for websites supporting TLS 1.3.
  • Fixed a bug that causes scan failures if the scan profile name includes the “/” character.
  • Fixed a bug that was caused by special characters that affected the Out of Scope node.
  • Fixed a bug that caused the OAuth2 settings to disappear after being saved in a scan profile following enabling and disabling operations.
  • Fixed a bug that throws errors on the summary page for technologies links.
  • Fixed the issue that IP Address Restriction is not working on API access.
  • Fixed an issue that shows the same vulnerabilities more than once in the scan summary reports.
  • Fixed a bug that shows the soft-deleted scan policies when their URL is entered.
  • Fixed a bug while excluding cookies during the scan.
  • Fixed a bug that prevents notifications from appearing on the user interface when data size is exceeded.
  • Fixed imported links DLL mismatch problem for Postman and GraphQL.
  • Fixed a bug that shows the empty list of possible GraphQL endpoints in the Security Checks list.
  • Fixed a bug that throws 500 Internal Server Error returns upon "GET issues/addressedissues" API call.
  • Fixed a bug that throws 500 Internal Server Error returns upon "GET /issues/todo" API call.
  • Fixed an issue that passive vulnerabilities were reported at out-of-scope links.
  • Fixed an issue that imports global servers at Swagger files.
  • Fixed an issue where the OK button disappears during interactive login.
  • Fixed an issue that adds interactive login buttons to iframes.
  • Fixed a null reference exception at the LFI exploit panel.
  • Fixed basic authorization over HTTP bug.
  • Fixed SQL Injection Vulnerability Family Reporting Bug.
  • Fixed a bug in that the custom script throws a null reference exception when a script is added to the paused scan.
  • Fixed a bug that deletes an authentication password when a new scan is started with a copied profile.
  • Fixed a bug that causes the Sitemap to disappear during scanning with IAST.
  • Fixed a bug that caused missing tables and values when a report policy is exported as an SQL file.
  • Fixed an issue that causes the attack process not to be completed for a security check when there is an error occurred while attacking a parameter with an attack pattern.
  • Fixed the LFI Exploiter null reference.
  • Fixed a bug that occurs when a detailed scan report does not report the CVSS scores for custom vulnerabilities.
  • Fixed a bug when the Log4J vulnerability profile is not migrated with the report policy migration.
  • Fixed a bug that prevents the WSDL files from being imported.
  • Fixed reporting "SSL/TLS not implemented" when scanning only TLS 1.3 supported site.
  • Fixed a bug that throws an error for NTML authentication when the custom username and password credentials are provided when the system proxy is entered into the appsetting.json
  • Fixed the bug that the passive vulnerabilities were reported from out-of-scope links.
  • Fixed the issue that does not terminate the Chromium instances although the max scan duration is exceeded.
  • Fixed the issue that automatically enables “Exclude Authentication Pages” after enabling form authentication.
  • Fixed the bug that throws a null reference exception at the link pool.
  • Fixed the bug that resulted in running many Chromium instances when a new scan is started.

REMOVED

  • Removed the agent platform selection option for the internal agents from the user interface.
  • Removed the Ignore these extensions field from the scan policies page.
2.3.1
COPY LINK

IMPROVEMENTS

  • Added the support to download scanner and authentication verifier agents from the Configure New Agent page.
  • Updated the scan profile to include the verified form authentication.
  • Updated embedded Chromium browser.
  • Improved the Authentication Verifier Agent to work with self-signed SSL.

FIXES

  • Fixed the bug that does not show the screenshot of the scanned target URL on the scan summary page.
  • Fixed the bug that does not produce any logs for the Authentication Verifier Service.
  • Fixed the bug that requires the cache to be cleared so that the new authentication verifier can be listed on the Manage Agents page.
  • Fixed the bug that causes the request not to be sent because of an empty referer header.
2.3
COPY LINK

NEW FEATURES

  • Netsparker Enterprise is now Invicti Enterprise.
  • Added Node.js sensor for Invicti Shark (IAST).
  • Added the Bridge URL and Shark token support for Invicti Shark (IAST).
  • Added Software Composition Analysis (SCA) feature.
  • Added support for scanning GraphQL APIs.
  • Added Authentication Verifier Service for the authentication verifier agent.
  • Added OWASP API Top Ten Report.
  • Added OWASP Top Ten 2021 report and classification.
  • Improved the search for scan profiles on the Recent Scans page.
  • Added the Scan Profile Default option to the column filters on the Recent Scans page to speed up the search for the default scan profiles.
  • Improved the error messages and code returned from the updating issue API endpoint.
  • Added unique IDs on the HTTP 500 Error page.
  • Updated a Docker agent library to run more security checks.
  • Introduced the default scan and report policy, so you can set default policies for your team.
  • Added the OWASP API Top Ten 2019 scan policy.

NEW SECURITY CHECKS

  • Added signature matching to Web app fingerprint checker.
  • Added patterns for Base64 encoded DOM Cross-site Scripting.
  • Added phpMyAdmin Version Disclosure security check.
  • Added Atlassian Confluence Version disclosure and Out-of-date security checks.
  • Added exclusion feature to JavaScript Library detection.
  • Added PHP Version Detection via phpinfo() call.
  • Added the Shopify Identified security check.

IMPROVEMENTS

  • [Breaking Change] Improved the Authentication Verifier Agent. The new version supports the improved performance for single-page applications, consumes fewer resources, and comes with the auto-update feature. This improvement requires the re-installation of the Authentication Verifier Agent.
  • Improved Invicti to comply with WCAG 2.1 - Level AA.
  • Improved the U2F Security Key standard to the Web Authentication API.
  • Updated embedded Chromium browser.
  • Updated Invicti Standard .NET Framework version from 4.7.2 to 4.8.
  • Improved Invicti to be compatible with FIPS 140-2.
  • Changed the brand name of Clubhouse to Shortcut.
  • Updated the Bamboo plug-in to version 1.8.
  • Added a check to prevent entering special characters into the optimized scan policy.
  • Added the DeleteById field when a website is deleted.
  • Added validation of the URLs entered by a user in the ImportedLink section while saving the database.
  • Improved the SCIM error message when a user filters users/groups with mistaken syntax.
  • Added the "not contains" filter to exclude specific titles, such as Out-of-Date.
  • Added the notification on the Reporting page when the time start predates the time end.
  • Added setting to configure Session Cookie Names.
  • Updated CWE classification category orders for Out-of-date templates.
  • Improved Cross-site Scripting attack pattern.
  • Added support for exploiting local storage and session storage in the DOM XSS security checks.
  • Added highlighting support for custom scripts.
  • Added Web Application Firewall to the site profile.
  • Changed the default ignored parameter comparison to case insensitive.
  • Added 'Is Encoded' option to OAuth2 parameters.
  • Added JWT Token pre-request script template.
  • Added the CSP Not Implemented that will be reported as confirmed.
  • Added the Subresource integrity not implemented that will be reported as confirmed.
  • Marked weak TLS ciphers.
  • Added the tag filtering to the Recent Scans page.
  • Added the tag limitation. Users cannot add more than 20 tags.
  • Added the date range filter to the global dashboard. Thanks to this improvement, users can filter scan data according to the selected time range.
  • Added website and website group information to Jira integration. When users send an issue to Jira via Invicti Enterprise, website and website groups information, if any, appears in that ticket.
  • Added a check for the Trend Matrix Report to ignore null records in the database.
  • Improved the method to query known vulnerabilities in Invicti Enterprise.
  • Changed SCIM response status code from 400 to 409 when the same email address is submitted twice.
  • Added a 400 Error message in the SCIM response status code when a user tries to change their email to a username.
  • Updated the error message when deleting the website during a PCI scan.
  • Added the severity level icons to the websites listed on the Websites' page.
  • Improved the Login Banner Warning feature so that users cannot access any resources on Invicti Enterprise until they select the Accept, Continue button.
  • Add the Environment field to the DefectDojo integration.
  • Added the Export to CSV button on the Manage Members page so that you can download all your team members to your environment.
  • Added a new security check to identify version disclosure and out-of-date version for Atlassian Confluence CVE-2021-26084.
  • Added the tagging filtering to the Scan Profiles.
  • Added the license error to the scans that were scheduled by users whose licenses are expired.
  • Added the fixed confirmation date to the issues API endpoint so that you can better track your team's remediation efforts.
  • Added null check for application names during comparison with the vulnerability database.
  • Added a behavior that the system sets the default policies of a website group to a website for the Scheduled Group Scans and Group Scans. The system sets the default policies only if users select the default policies on the General Settings page and then assign these policies to a website group on the policies page.
  • Added an information message for updating the agent's status.
  • Improved the paragraph style of the login warning banner.
  • Added the error messages to the Login Simulation Pages.
  • Added a condition for team members when sending an email notification.
  • Added a condition when sending an email notification for Out-of-Date Technologies to customers.
  • Improved the importing of RAML files including other files.
  • Updated the Freshservice integration not to send a user agent header.
  • Improved the API responses by adding model mapping for AuthenticationProfileOption and AuthenticationProfileId.
  • Added a message to the Jira integration to show that the integration is created successfully.
  • Added an error message for the invalid component value of the newly created Jira integration.
  • Improved the pop-up message that warns users that they share the report with a person from the outside of the organization.
  • Updated CheckLicense task request timeout duration to prevent the Hangfire queue from being blocked.
  • Improved the internal agent to take a screenshot to make sure that the first page loads properly.
  • Updated CheckLicense task request timeout duration to prevent the Hangfire queue from being blocked.
  • Updated the Lodash version.

FIXES

  • Fixed the retest retry limit if the base scan is not loaded.
  • Fixed an email notification error sent to guest users which showed "Failed - Unable to load scan session" error in the scheduled scans although the scan was successful.
  • Fixed a NullReferenceException thrown while checking the target URL in the New Scan page.
  • Fixed password autocomplete issue in the form authentication saved in a scan profile.
  • Fixed an error that prevents the URL Rewrite rule from being updated in the saved scan profile.
  • Fixed an error that prevents scan tags from being shown while creating a scheduling scan.
  • Fixed the Ignore SSL Certificate issue that prevents internal agents from being auto-updated.
  • Improved the performance of security checks on cases when multiple checks are running concurrently.
  • Fixed a bug that prevents a website from being deleted if that website has tags.
  • Fixed a bug that non-register users receive the Out-of-Date technology notification although these users have no website responsibility.
  • Fixed a bug that shows a two-factor authentication page to some users with SSO login after their information is updated on the Team Member page.
  • Fixed typo in the All Issues page filter drop-down.
  • Fixed a bug returning the 500 Error when an issue is updated.
  • Fixed a bug that led to duplicated records in a member's role.
  • Fixed a bug that ignored a member's time zone setting while generating a vulnerability list in XML format.
  • Fixed a bug that causes the private scan policies to appear in the Scan Policy drop-down at the New Scheduled Group Scan page.
  • Fixed a bug that did not convert the remaining time for the Next Execution Time of a scheduled scan properly.
  • Fixed a bug that prevented the scan profile of a deleted website from being removed. Now, when users delete a website, the related scans, including scan profile, are also deleted.
  • Fixed an issue that prevent the scan from being canceled.
  • Fixed the missing ScanTaskProfile field by adding it back to scan API call responses.
  • Fixed a bug that prevents members and teams from being deleted if they have been assigned to website groups.
  • Fixed a bug that allows the API member edit endpoint which accepts less than 15 characters for the administrator's password.
  • Changed the permission to view reports from Add/Edit Scan to the View Report.
  • Changed Agent request time interval to 60 seconds.
  • Fixed a bug that prevents an agent from scanning a new website if the previous scan was canceled.
  • Fixed a bug that results in missing HTTP headers of target URL when added with imported links.
  • Fixed an issue that causes proof creation for SQL injection and Cross-site Scripting even if the proof generation is disabled.
  • Fixed an issue that prevents cookie's same site attribute from being updated which causes the "same-site cookie is not implemented" vulnerability to be reported.
  • Fixed a JSON Web Token (JWT) validation check that causes too many invalid token errors when using Bearer Authentication Tokens in the form authentication.
  • Fixed an issue where host and path parameters in Postman collection were not imported when they are string instead of an array.
  • Fixed a bug that returns 401 when the scanner sends HTTP headers in lowercase.
  • Fixed a bug about cookie handling in the logout detection page during the form authentication verification.
  • Fixed a bug that results in slow response time from the web application to the agent that causes inconsistent vulnerability reports in the Blind SQL Injection.
  • Fixed the first seen date issue that appeared differently on the user interface and the scan report.
  • Fixed the Url Rewrite Excluded Links API call by adding null response back to that call's responses.
  • Fixed a bug that prevents serialized integration information from being decrypted in some issues.
  • Fixed an issue that displays the mistaken path in the trend matrix reports when different paths are scanned.
  • Fixed a bug returning the 500 Error when an issue is updated.
  • Fixed the issue that the Content-Type header missing was reported when there was no content in the response.
  • Fixed the issue that false-positive JSON Web Token (JWT) was reported in a not found response.
  • Fixed the issue possible and confirmed vulnerabilities reported in the same URL.
  • Fixed the issue proof that was generated even when the proof generation option was disabled in the scan policy.
  • Fixed FP Waf Identified.
  • Fixed the issue vulnerability count in root node is not updated when a vulnerability is removed and Blind XSS was prioritized over the Reflected Cross-site Scripting.
  • Fixed the issue source code disclosure is reported in binary responses.
  • Fixed the issue JWT JKU vulnerabilities are not reported in Invicti Enterprise because of Null Reference Exception.
  • Fixed the issue fingerprint checker crashes when an application file could not be found.
  • Fixed the issue object-src missing was reported when default-src is provided in CSP security checks.
  • Fixed the issue that some cipher suites are not reported as weak.
  • Fixed the issue classification links were not rendered correctly when there are multiple values.
  • Fixed the issue proof prefix was added when there were no more characters to be found.
  • Fixed an issue that set the wrong default scan and reports for the Scheduled Group Scan and Group Scan if there is a scan profile.
  • Fixed an issue that prevented a user from editing the default scan policy.
  • Fixed an issue that removes the client certificate from the Form Authentication page if the related scan profile is updated.
  • Fixed an issue that occurred when the same vulnerability was sent to Jira's endpoint more than once.
  • Fixed a mismatching type issue on /scanprofiles/list API response model.
  • Fixed the Jolokia version disclosure report to properly highlight the related lines.
  • Fixed a bug that threw an error when users update a vulnerability's status as False Positive on the Technical Report page.
  • Fixed a bug that prevented subprocesses of agents from being shut down during the update process.
  • Added workspace information for Bitbucket integration.
  • Fixed a bug that threw a communication error when sending an issue to Kenna.
  • Added Tags property to the Kenna integration.
  • Fixed an issue that prevented keywords from being refreshed when the login required URL is changed on the Login Verification window.
  • Fixed a misspelled word on the GraphQL Introspection window.
  • Fixed a bug that prevented each website from using its own default scan policy when a scheduled group scan is launched.
  • Fixed the issue where the client-side cookies were not excluded correctly.
  • Fixed an issue with latestVulnerabilityStatePointId values that return errors on the Issues/To Do and Issues/All issues.
  • Fixed an issue that shows a two-factor authentication warning message for provisioned team members with Okta.
  • Fixed an information message that uses the word "notification" although the message is about the integration.
  • Fixed an issue in DefectDojo, YouTrack, and TFS integration that refreshes the New Integration page when a custom field is added and the user selects the Create Sample Issue button.
  • Fixed an issue that shows extra leading white space in the console of the Website page.
  • Fixed the issue with the Missing XSS protection Header in the Out-of-Scope link.
  • Fix the issue that prevents the built-in scan policies from being updated when there is a new update.
  • Fixed a request payload when the Agent sends big scan data.
  • Fixed OAuth2 verification that fails due to the OTP settings model being null.
  • Fixed the scan error on completion issue because of crossthread error by moving to ConcurrentDictionary.
  • Fixed an issue where the '>' symbol was displayed on the Manage Agents page.
  • Fixed an issue that reports incorrect results during checking the redirect URL for Open Redirect vulnerability.
  • Fixed the /scans/report/{id} API endpoint that returned empty HTML report.
  • Fixed an issue that the Discovery Service keeps working for the disabled accounts and websites.
  • Fixed an issue that duplicates the number of RegEx parameters when the page is refreshed.
  • Fixed NHS exception errors in the Docker agent.
  • Fixed an issue that prevents the Sitemap from populating correctly after a scan.
  • Fixed an issue that prevents the DeleteById field in the database from being updated.
  • Fixed null exception error while mapping imported links in API.
  • Fixed a bug that causes the Issues page to be crashed when the state filter is selected.
  • Fixed a bug in which the new scan page is stuck although a new scan has been launched.
  • Fixed a bug that causes an error when you want to delete a scheduled scan that has a website with tags that were included in a scan profile.
  • Fixed a bug that generates a blank scan report when a vulnerability has a null name value.
  • Fix a bug that does not show imported links in scheduled scans.
  • Fixed OAuth2 verification that fails due to the OTP settings model being null.
  • Fixed a bug that prevents the WSDL files from being imported.
  • Fixed the Database User Name's tooltip on the Installation Wizard.
  • Fixed the SCIM API schema that showed incorrect responses for the group.
  • Added the OnlySsoLogin parameter for SCIM so that users can determine if they want members to log in with SSO or not.
  • Fixed a null reference type issue while creating JsonSerialized Kafka issues.
  • Fixed a bug that prevents the visibility of the drop-down of the preferred agent on the New Scan page when the Authentication Verifier Service is not running.
  • Fixed a bug that fails to redirect users to the Manage Websites page after adding a new website.
  • Fixed the information message that appears on the OAuth2 settings page when there is no authentication verifier for the target URL.
  • Removed the "> symbol that appears on the Creator column of the Websites' list.
  • Fixed a bug on the imported links that cause duplicated entries when users select the toggle content after removing some links.
  • Fixed a bug that creates duplicated team records on the teams and roles for the website groups.
  • Removed Pre-request Script validation before starting a new scan.
  • Fixed a bug that occurs the authentication verifier agent does not start automatically when the machine where the verifier is installed is restarted.
  • Fixed several scan failure issues caused by errors that occurred while trying to open the VDB.
  • Fixed the CyberArk validation problem on the New Scan page.
2.2.5
COPY LINK

NEW SECURITY CHECKS

  • Added Remote Code Execution (CVE-2022-22965) a.k.a. Spring4Shell detection support.

Update to the new version

If you want to update the latest version of Netsparker Enterprise On-Premises, see Updating Netsparker Enterprise On-Premises.

2.2.4
COPY LINK

FIXES

  • Fixed the More Information link that appears in the Encryption step during Netsparker Enterprise On-Premises Web Application installation process.
  • Fixed an issue that threw "failed to decrypt" error for integrations.
  • Improved SQL query that caused issue following update to Invicti Enterprise On-Premises 2.1

Update to the new version

If you want to update the latest version of Invicti Enterprise On-Premises, see Updating Netsparker Enterprise On-Premises.

2.2.3
COPY LINK

NEW SECURITY CHECKS

  • Added Out of Band Code Evaluation (Log4j CVE-2021-44228) a.k.a. Log4Shell detection support.
2.2
COPY LINK

FEATURES

  • Introduced the tagging feature for websites, website groups, and scans.
  • Introduced a login banner warning. The banner displays security and legal notices to users accessing the system.
  • Added DefectDojo Integration.
  • Added the Encryption key.
  • Added pre-scan validations so that Netsparker can automatically choose the TLS protocol.

IMPROVEMENTS

  • Added the date range filter to the global dashboard. Thanks to this improvement, users can filter scan data according to the time range they selected.
  • Added a new State filter on the Issues page.
  • Added the Environment field to the DefectDojo integration.
  • Added the Export to CSV button on the Manage Members page so that you can download all your team members to your environment.
  • Added the group by parameter to the Technology dashboard.
  • Added the tag limitation. Users cannot add more than 20 tags.
  • Added website and website groups information to Jira integration. When users send an issue to Jira via Netsparker Enterprise, website and website groups information, if any, appears in that ticket.
  • Added the missing information that was not exported to YouTrack, Asana, and Github in the case of Frame Injection vulnerability.
  • Added the severity level icons to the websites listed on the Websites' page.
  • Added new property to /scans/list API endpoint to distinguish between scans.
  • Added paging to auditlogs/export API endpoint.
  • Added a check for the Trend Matrix Report to ignore null records in the database.
  • Improved the method to query known vulnerabilities in Netsparker Enterprise.
  • Changed SCIM response status code from 400 to 409 when the same email address is submitted twice.
  • Added a 400 Error message in the SCIM response status code when a user tries to change its email to a username.
  • Updated the error message when deleting the website during a PCI scan.
  • Improved the search for scan profiles on the Recent Scans page. Added the Scan Profile Default option to the column filters on the Recent Scans page to speed up the search for the default scan profiles.
  • Improved the error messages and code returned from the updating issue API endpoint.
  • Added unique IDs on the HTTP 500 Error page.
  • Updated a Docker agent library to run more security checks.
  • Added a control in the UserRoleWebsiteGroupMapping API endpoint to prevent null object reference exceptions.
  • Changed the error message for members/update API endpoint for password POST requests.
  • Issue notes are added to reports which are exported.
  • Improved the statusCode and errorMessage returned from members/deleteinvitation API endpoint on cases when the invitation is missing.
  • Changed roles/update API endpoint response status code from 201 to 200 to better comply with REST best practices.
  • Added “Override Version Vulnerability Severities” option to Scan Policy > Attacking settings.
  • Improved the error message displayed when a Website Group cannot be deleted due to it being referenced by a notification.
  • Extended the range of digits that can be entered for HOTP and TOTP configuration.

DEPRECATED

  • Removed X-Scanner request header from the default scan policies to prevent WAFs block the scans.

FIXES

  • Fixed a bug that prevented the filtering by website groups on the technology dashboard.
  • Fixed an unhandled error that happens while deleting scans.
  • Fixed an issue where the check state is reset when the search keyword is modified on the Report Policy Editor security checklist.
  • Fixed a bug that prevented updated scan profiles of the Scheduled Scans from being synchronized with these scheduled scans.
  • Fixed an issue where incorrect scan profiles and policies were used while performing group scans.
  • Fixed a space issue in GitLab integration that prevented integration to be completed successfully.
  • Fixed the deserialization issue that threw bad requests in some scans.
  • Fixed the issue of returning null response by removing WebsiteGroupId requirement from UserRoleWebsiteGroupMapping API endpoint.
  • Fixed the retest retry limit if the base scan is not loaded.
  • Fixed an email notification error sent to guest users which showed "Failed - Unable to load scan session" error in the scheduled scans although the scan was successful.
  • Fixed a NullReferenceException thrown while checking target URL in the New Scan page.
  • Fixed password autocomplete issue in the form authentication saved in a scan profile.
  • Fixed an error that prevented the URL Rewrite rule from being updated in the saved scan profile.
  • Fixed an error that prevented scan tags from being shown while creating a scheduling scan.
  • Fixed the Ignore SSL Certificate issue that prevented internal agents from being auto-updated.
  • Improved the performance of security checks on cases when multiple checks are running concurrently.
  • Fixed a bug that prevented a website from being deleted if that website has tags.
  • Fixed a bug that non-register users receive the Out-of-Date technology notification although these users have no website responsibility.
  • Fixed a bug that shows a two-factor authentication page to some users with SSO login after their information is updated on the Team Member page.
  • Fixed typo in the All Issues' page filter drop-down.
  • Fixed a bug returning the 500 Error when an issue is updated.
  • Fixed a bug that led to duplicate records in a member's role.
  • Fixed a bug that ignored a member's time zone setting while generating a vulnerability list in XML format.
  • Fixed a bug that caused the private scan policies to appear in the Scan Policy drop-down at the New Scheduled Group Scan page.
  • Fixed a bug that did not convert the remaining time for the Next Execution Time of a scheduled scan properly.
  • Fixed a bug that prevented the scan profile of a deleted website from being removed. Now, when users delete a website, the related scans, including scan profile, are also deleted.
  • Fixed an issue that prevented the scan from being canceled.
  • Fixed the missing ScanTaskProfile field by adding it back to scan API call responses.
  • Fixed a bug that prevents members and teams from being deleted if they have been assigned to website groups.
  • Fixed a bug that allows the API member edit endpoint which accepts less than 15 characters for the administrator's password.
  • Changed the permission to view reports from Add/Edit Scan to the View Report.
  • Increased the Agent request time interval to 60 seconds.
  • Fixed a bug that prevents an agent from scanning a new website if the previous scan was canceled.
  • Fixed a bug that returned the 500 Internal Server Error upon POST /members/newinvitation service call if the OnlySsoLogin parameter is set as true.
  • Fixed the 500 Internal Server Error message for a query string to a non-existent page.
  • Fixed an error preventing NIST, DISA STIG, and ASVS classifications from appearing in the Issue details.
  • Fixed an issue where multiple CWE values were being sent to Kenna Integration.
  • Fixed the incorrect API documentation of roles/listpermissions endpoint.
  • Fixed an issue where form authentication may fail due to credentials being modified when the scan profile is updated.
  • Fixed a bug that fails the installation of the On-Premises via the wizard.
  • Fixed a bug that shows an erroneous issue ID on the scan results' page.
  • Fixed an issue that requires an email address for SSO-enabled accounts.

Update to the new version

If you want to update the latest version of Netsparker Enterprise On-Premises, see Updating Netsparker Enterprise On-Premises.

2-Oct-2020
COPY LINK

NEW FEATURES

  • Added support for alternate email for SSO login
  • Added form authentication Hashicorp Vault integration (https://www.invicti.com/support/integrating-invicti-enterprise-hashicorp-vault/)
  • Added technologies chart to the global dashboard and website dashboard pages
  • Added test credential API endpoint for scan profiles
  • Added Form Auth Custom Scripting feature to the New Scan page
  • Redesigned the login page
  • Redesigned the SSO help text area in the SSO settings page
  • Added an API endpoint for the Updating Issue States
  • Added Travis CI integration
  • Jira integration now supports custom Resolved statuses
  • Kenna integration now supports Asset Application Identifier
  • Agents can now be installed using Linux and a Linux Agent button has been added to the Configure New Agent page (On-Demand Only)
  • Upgraded the Invicti scanning engine to version 5.9.027701.

NEW SECURITY CHECKS

  • Added Out-of-date security checks for the Liferay portal
  • Added Version Disclosure and Out-of-date security checks for Jolokia
  • Added Nested XSS security checks
  • Added an ASP.NET Razor SSTI security check
  • Added a Java Pebble SSTI security check
  • Added a Thymeleaf SSTI security check
  • Added Version Disclosure and Out-of-date security checks for Grafana

IMPROVEMENTS

  • Added an Issue Update API swagger model improvement
  • Docker installation link has been added to the Configure New Agent page (On-Demand Only)
  • New password criterion of a minimum of 15 characters has been imposed on admin and top-level users.
  • Improvements have been made to the Form Authentication Test Script screen

FIXES

  • Fixed the problem of a slowVulnerable Websites per Period report on the Reporting
  • Fixed the file uploading problem on Imported Links
  • Fixed the Knowledge Base Report's exporting problem
  • Fixed the Yukon time zone problem.
  • Fixed the Imported Links problem.
  • Fixed the problem where the wrong time zone was displaying in Report Templates
  • Moved the Scan Profile Test Credentials API post method fields to the body element
  • Fixed a db file error in the Report Policy Editor
  • Fixed the issue where report policy user changes were not applied when reset.
  • Fixed the Vulnerability Detail page responsiveness problem
  • Fixed the Sitemap treeview responsiveness problem
  • Fixed the highlighted code focus problem
  • Added help text to the HashiCorp vault integration page
  • Fixed the bug that occurred when another team member updated the shared profile
  • Fixed a bug that occured when non-admin users updated profiles
  • The Report policy Editor CVSS scores fields now accept empty values
  • Fixed a server error that occured while saving a cloned Scan Policy
  • Fixed the problem that occurred when reconfirming the Verify Login and Logout settings
2-Jul-2018
COPY LINK

BUG FIXES

  • Fixed a database connectivity issue which was occurring when pool size was not sufficient (onpremises only)
  • Fixed an issue where installation wizard was shown when database connectivity was lost (onpremises only)
  • Fixed an issue in agent endpoint where scan file names were not set as expected (onpremises only)
2-Dec-2019
COPY LINK

NEW FEATURES

  • Introduced Technologies feature which finds and lists the technologies used in web applications and reports on problems
  • Added out of the box issue tracking integration for PagerDuty, Clubhouse, Trello, Asana, Webhook, Microsoft Teams, and CircleCI
  • Added new API endpoints for managing Team Members and listing Activity Logs
  • Added a new Scan Profiles page in the Scans menu
  • Added a new Comments box to the New Scan window, accessible while launching scans
  • Added facility to send New Scan notifications using the Slack integration
  • Upgraded the Invicti scanning engine to version 5.5.1.26518

NEW SECURITY CHECKS

  • Added a new Security Check – HTTP Parameter Pollution (HPP)
  • Added a new Security Check – BREACH Attack Detection
  • Added Out-of-Date checks for Ext JS
  • Added Oracle Cloud and Packet Cloud SSRF attack patterns
  • Added a Web Cache Deception engine to the list of Security Checks
  • Added a new XXE pattern for detecting the Axway SecureTransport 5.x XXE vulnerability
  • Added new attack patterns for DOM based XSS
  • Added new attack patterns for Remote Code Execution in Ruby
  • Added new attack patterns for Out-of-Band Remote Code Execution in Ruby
  • Added new attack patterns for Remote Code Execution in Python
  • Added new attack patterns for an Open Redirect security check
  • Added an email validation bypass payload for XSS
  • Added a header injection XSS pattern
  • Added a security check to determine whether an HTTP website has been implemented with SSL/TLS
  • Added a security check for File Content Disclosure in Ruby on Rails by exploiting an Accept header
  • Added mutation XSS patterns
  • Fixed the SSRF confirmation problem
  • Added Apple’s App-Site Association file detection
  • Added exploitation support for File Content Disclosure in Ruby On Rails, CVE-2019-5418
  • Added new LFI attack patterns for the access.log file
  • Added support for exploiting JSONP endpoints with the format parameter in Ruby On Rails
  • Added support for detecting Python Remote Code Execution
  • Added RFC compatible SSRF IPv6 patterns
  • Improved the Apache Struts (CVE-2013-2251) attack pattern
  • Added PHP Injection Fixed One Time Referrer attack
  • Updated the attack value of the PHP Injection Fixed One Time Attack pattern to use short notation instead of the print function
  • Improved the Regex pattern of the WebLogic Version Disclosure pattern
  • Added a PoC pattern for Apache Struts (CVE-2013-2251)
  • Added Out-of-Date checks for the Slick JavaScript library
  • Added Out-of-Date checks for the ScrollReveal JavaScript library
  • Added Out-of-Date checks for the MathJax JavaScript library
  • Added Out-of-Date checks for the Rickshaw JavaScript library
  • Added Out-of-Date checks for the Highcharts JavaScript library
  • Added Out-of-Date checks for the Snap.svg JavaScript library
  • Added Out-of-Date checks for the Flickity JavaScript library
  • Added Out-of-Date checks for the D3.js JavaScript library
  • Added Out-of-Date checks for the Google Charts JavaScript library
  • Added Out-of-Date checks for the Hiawatha and Cherokee server
  • Added Out-of-Date checks for the Oracle WebLogic server
  • Added Out-of-Date check for IIS
  • Added Version Disclosure detection for the Hiawatha Server
  • Added Version Disclosure detection for the Cherokee Server
  • Added Source Code Disclosure checks for Java Servlets
  • Added Source Code Disclosure checks for Java Server Pages
  • Added New Source Code Disclosure patterns for Java
  • Added detection for .htaccess file Identified
  • Added detection for Opensearch.xml files
  • Added detection for SQLite error messages
  • Added detection for security.txt files
  • Added detection for swagger.json files
  • Added detection for Open Search files

IMPROVEMENTS

  • Added the ability to create custom fields for ServiceNow integration
  • Added auto-detection of the Time zone during the sign up process
  • Improved Jira integration to support raw values for complex custom field types
  • Added a new format option to the Date and Time Format dropdown in the Change Account Settings window
  • Improved the text in Email Notifications
  • Improved the Category field's option names in the New ServiceNow Integration window
  • Improved the Issue template for Azure DevOps integrations
  • Added capability to add User Mapping for hosted Jira systems
  • Added more details to the CSV report which can be generated from the Activity Logs window
  • Added ongoing scan information for the target agent in the Manage Agents window
  • Added the capability to disable the Maximum Scan Duration field in the New Scan window (On-Premises only)

BUG FIXES

  • Fixed an inaccurate warning message that was displayed when canceling a scan
  • Fixed an issue where the Technical Contact was not set as expected in the Edit Website window
  • Fixed an issue where a website could not be added if the target URL contained a hyphen character
  • Fixed an issue where the configured Scan Profile was not used in Azure DevOps integrations
  • Fixed various browser compatibility issues with Safari
  • Fixed a bug where validation was not working as expected for the Hawk settings in the Scan Policy window
Previous
1
...
Next
Invicti Security Corp
1000 N Lamar Blvd Suite 300
Austin, TX 78703, US
© Invicti {year}
Resources
FeaturesIntegrationsPlansCase StudiesRelease NotesInvicti Learn
Use Cases
Penetration Testing SoftwareWebsite Security ScannerEthical Hacking SoftwareWeb Vulnerability ScannerComparisonsOnline Application Scanner
Web Security
The Problem with False PositivesWhy Pay for Web ScannersSQL Injection Cheat SheetGetting Started with Web SecurityVulnerability IndexUsing Content Security Policy to Secure Web Applications
Comparison
Acunetix vs. InvictiBurp Suite vs. InvictiCheckmarx vs. InvictiProbely vs. InvictiQualys vs. InvictiTenable Nessus vs. Invicti
Company
About UsContact UsSupportCareersResourcesPartners

Invicti Security is changing the way web applications are secured. Invicti’s dynamic and interactive application security products help organizations in every industry scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.

LegalPrivacy PolicyCalifornia Privacy RightsTerms of UseAccessibilitySitemap
Privacy Policy