v24.5.0 - 23 May 2024
This release includes new features, new security checks, improvements, and bug fixes.
New features
- Predictive Risk Scoring – prioritize your web asset discovery results according to their potential risk before you scan them. Learn more in our Introduction to Predictive Risk Scoring and guide to Utilizing Predictive Risk Scoring
- Enabled Korean language support
- A new API Token encryption method for Agents/Verifier Agents
- Added a pre-request script to generate AWS Signature tokens to perform authentication
- CVSS 4.0 scores are now available via API
- Added the ability to include/exclude main-level domains in the Discovery settings
New security checks
- Added detection method for Angular
- Added a new security check for Oracle EBS RCE
- Added a new security check for TLS/SSL certificate key size too small issue
- Improved WP Config detection over backup files
- Added a new security check for authentication bypass and command injection in Ivanti ICS and Ivanti Policy Secure (CVE-2023-46805 and CVE-2024-21887)
- Added detection for exposed WordPress configuration files
- Added a new security check that reports two vulnerabilities: TorchServe Management API Publicly Exposed and TorchServe Management API SSRF (CVE-2023-43654)
- Command Injection in VMware Aria Operations for Networks can now be detected
- Added a new signature for Stack Trace Disclosures (ASP.Net)
- Added a new security check for Client-Side Prototype Pollution
Improvements
- Improved AWS Secret Key ID detection security checks
- Improved Google Cloud API Key detection security checks
- Updated remediation information for Angular JS-related vulnerabilities
- Improved Boolean-Based MongoDB Injection detection method
- Updated all IAST sensors to support Java 17 and 21
- Added highlighting and verification of response status codes to the BREACH engine
- Updated the notes section of the [Possible] Cross-Site Scripting issue detail to cover MIME sniffing
- Increased the default severity level of Version Disclosure (Varnish) from ‘Information’ to ‘Low’
- Improved WordPress Config detection over backup files
- The Agent type (Arm or Intel) information is now displayed on the Scan Summary page
- Permissions on the General Settings screen are now grouped by category rather than listed without being categorized
- Added an option to enable or disable the JavaScript Parser, facilitating JavaScript parameter discovery within the JavaScript code
- The Jenkins plugin now routes requests through the proxy
- The Team Administrator role checkbox is now in a separate Limiting Permissions Role section of the UI
Fixes
- Adjusted the settings for SSL certificate errors to resolve a scan failure ‘target link timeout error’
- Fixed a bug in the automatic sign out functionality when the session timeout period has expired
- Resolved an issue with downloading HTTP request logs
- Fixed a validation error when validating Shark settings
- Fixed an issue with duplicate custom user agents that was preventing scanning
- Fixed an issue where authentication would fail when started with an Authentication profile
- Fixed an issue that caused proxy usage for Chromium even when no proxy was selected from the scan policy settings
- Fixed a scan authentication issue and a crawling issue with Cloud Agents
- Fixed the HTTP 401 forbidden response form authentication error
- Fixed an issue with the detection method for wp-admin vulnerabilities
- Fixed an error that was occurring when generating knowledge base reports
- Updated the extraction algorithm for downloaded scan files from Invicti Enterprise
- Fixed a scan issue that was producing 413 error responses
- Fixed a bug in the API Access settings
- Resolved an issue with custom severity levels that were reverting to their previous level
- Fixed a bug in the API update command for scan profiles
- Removed limits on AWS Discovery port filters
- Technologies identified during failed scans are no longer displayed
- Fixed a bug in the scan retention period settings that was causing inaccurate information in the Recent Scans list
- The Last Login Date is now aligned between the UI and the API
- Fixed an issue with the detection method for wp-admin vulnerabilities
- Fixed the issue where scan profiles could not be created through automation tools, Postman, or through the Invicti API Documentation page
- Fixed the issue with scans that were stuck in ‘Delayed’ or ‘Archiving’ status
- Fixed an issue that was occurring with the Jira Integration when the Jira URL was set as Localhost
- Fixed a scan authentication issue and a crawling issue with Cloud Agents
- Fixed an issue that was occurring when websites were added with both http and https protocols
- The scan report pdf file name now includes the time and date when it is delivered via the scan completed notification
- Fixed the 504 error that was appearing when running the Scans_NewWithProfile endpoint
- Fixed a bug that was preventing retest scans from launching
- Fixed an issue with the scan data import from Invicti Enterprise to Invicti Standard
- Fixed the HTTP 401 forbidden response form authentication error
- Fixed a scan issue that was producing 413 error responses
- Resolved a cookie use on subdomains issue that was causing a scan authentication and crawling issue
- Fixed an issue that was causing a memory issue in JavaScript Parser
- Fixed an issue with the custom script editor that was stopping it from loading the form authentication fields
- Disabled BREACH attack from the default security checks policy
- Fixed the issue where users were unable to load the Scan Report
- Fixed the issue where internal scans were not failing if their Agents were terminated
- Fixed the Azure Boards integration, which was reported to have been suspended by itself
- Fixed query optimization on the main Scans page, resulting in improved response time and query quality
- The page number in the Custom Script Editor is now correctly displayed
- When the personal access token has expired, the Azure Boards Integration is now disabled
- Fixed concurrency exceptions occurring for the scan and website tables due to excessive update requests sent within a short timeframe
- Fixed the inability to export a scan from Invicti Standard to Invicti Enterprise
- The issues counter on the Dashboard now displays the correct number of issues
- Fixed an issue when Team Administrator and Account Owner roles are assigned to the same user
v24.3.0 - 14 Mar 2024
This release includes new features and security checks, along with many improvements and bug fixes.
New features
- Added the option to remove Request/Response details from the detailed template to avoid the character limit error when sending vulnerabilities
- Added the option to enable enhanced logging of failed logins
- Added functionality to the UI for users to obtain logs from failed scans (previously only system administrators were able to do that)
- ServiceNow Application Vulnerability Response integration is now available in the ServiceNow store
New security checks
- Added a check for dotCMS (CVE-2022-26352)
- Added a check for the Ultimate Member WordPress plugin (CVE-2023-3460)
- Added a new mXSS pattern
- Added new signatures to detect JWKs
- Implemented a detection and reporting mechanism for the Backup Migration WordPress plugin (CVE-2023-6553)
- Added detection for TinyMCE
- Added detection for ActiveMQ RCE to the OOB RCE Attack Pattern (CVE-2023-46604)
Improvements
- Improved the recommendations for the Weak Ciphers Enabled vulnerability
- Improved detection of swagger.json vulnerabilities
- Updated the “Insecure Transportation Security Protocol Supported (TLS 1.0)” vulnerability to High Severity
- Implemented support for scanning sites with location permission pop-ups
- Implemented support for FreshService API V2
- Revised the labeling of the active vulnerabilities information on the Scan Summary page to provide greater clarity
- Removed obsolete X-Frame-Options Header security checks
- Improved ServiceNow Vulnerability Response integration
Fixes
- Fixed a bug in the cloning report policies functionality
- Fixed an error that was occurring with the API endpoint: list-scheduled
- Fixed a bug with the Jira integration
- Fixed a bug with custom scheduled scans that were not updating the Next Execution Time field correctly
- Fixed an issue with the HashiCorp Vault integration token validation path
- Fixed the missing ‘Known Issues’ tab from scan summary issue details
- Fixed an issue with the severity trend chart on the Dashboard
- Fixed a problem with importing WDSL files
- Fixed a bug in the Request/Response tab of Version Disclosure vulnerabilities
- Corrected an issue in the technical reports where vulnerabilities identified in Korean are now reported in English
- Changed the ID parameter from ‘optional’ to ‘required’ within the Scan Policy Update API
- Removed the target URL from the scope control list
- Resolved a bug in the filtering of vulnerabilities on the Issues page
- Fixed a bug in the marking of issues as a false positive
- Resolved an issue where the agent would become unavailable after receiving a 401 error
- Fixed the issue with uploading a Swagger file into a scan profile
- Fixed the system to halt subsequent tests if a scan is aborted from Jenkins
- Upgraded Microsoft.Owin package to version number 4.2.2
v24.2.0 - 06 Feb 2024
This release includes new features and security checks, along with many improvements and bug fixes.
New features
- Added notifications about agent disk full issues for easier navigation and to prevent scan errors
- Added an option to the Jenkins integration that stops the scan when the Jenkins build is aborted
New security checks
- RCE for Backup Migration WP plugin (CVE-2023-6553)
Improvements
- Improved reporting of DOM XSS vulnerabilities
Fixes
- Fixed an issue with removing the client certificate via API
- Fixed an inconsistency for PCI results between the Invicti UI and the PCI DSS detailed report
- Fixed a bug that was causing scan session files to fail when loading
- Fixed inconsistencies with the ‘average time to fix’ table on the dashboard
- Fixed an issue with the import of scan data from Invicti Enterprise to Invicti Standard
- Fixed an issue with the form verifier not using the new scan policy until the scan profile is saved
- Added a custom detailed scan report
- Fixed a bug in the importing of links
- Fixed an error that was occurring when setting an issue as Accepted Risk
- Resolved issues with importing API documentation from a link
- Resolved issues with the Authentication Verifier and Agent.db file corrupting after update
- Fixed a bug in the Jenkins plugin that was causing the ‘Stop The Scan When Build Fails’ option to not work correctly
v24.1.0 - 09 Jan 2024
This release includes new features and security checks, along with many improvements and bug fixes.
New features
- Added CVSS 4.0 categorization of vulnerabilities
- Added support for PCI DSS 4.0
New security checks
Improvements
- Added descriptions to the agent warning messages on the Scan Summary page
- Updated messaging around the functionality of the Team Administrator role
- Improved the request body rating algorithm
- Improved the Postman collection parsing algorithm
- Improved the vulnerability calculator for Boolean MongoDB
- Resolved an issue with adding a client certificate to set up a scan
Fixes
- Fixed a bug that was preventing customers from adding back previously deleted targets
- Increased character length for the Jira and Snow integration URL validation regex to ensure it accommodates Top-Level Domains (TLDs)
- Paused scheduled scans that were resuming automatically will now remain paused until manually resumed
- Removed the previous limit on the number of supported second-level domains in the Discovery feature
- Fixed an error that was occurring when updating an issue from Fixed (confirmed) to Accepted Risk status
- Fixed discrepancies in the numbers displayed on the Dashboard
- Fixed an issue with the agent auto-updater
- Added a missing control for SSO users while editing members
- Fixed a bug in the communication between Invicti and ServiceNow
- Fixed a bug that was preventing administrators from creating new notifications or editing built-in notifications
- Fixed an issue that was causing verifiers to not use scan policy proxy settings
- Fixed an auth verifier client certificate authentication path error
- Fixed the Invicti crawler that wasn’t getting JS endpoints correctly
- Resolved issues with importing API documentation from a link
- Fixed a bug in the Jenkins plugin that was causing the ‘Stop The Scan When Build Fails’ option to not work correctly
- Fixed insecure Windows service permissions that were vulnerable to privilege escalation attacks
v23.12.1 - 19 Dec 2023
This release contains fixes for custom report policies.
Fixes
- Fixed errors that were occurring with custom report policies
- Fixed “The given key was not present in the dictionary” error that was occurring in Issues, Reports, and Scans
v23.12.0 - 08 Dec 2023
This release includes two new security checks along with many new features, improvements, and bug fixes.
New features
- Added the ability to pull a PCI Report from the CloneSystem itself by using API endpoints
- Added the option for customers to define a namespace for their HashiCorp integration
- Enhanced reporting capabilities with more attributes available in .csv exports and the option to do a .csv export in more places in the UI
- Added an option under New Scan Policy > Ignored Parameters to allow customers to set ‘Cookie’ as a type of ignored parameter
- Added a setting for administrators to enable internal agents to get VDB updates from the WebApp to avoid routing and proxy issues
- Added the option for administrators to hide sensitive data (passwords, tokens, session IDs, etc.) from the UI
- Added functionality to the Dashboard so that you can drill down to view more information when clicking on the Severities and Securities Overview section
- Added an option under General > Settings to require a password for edit access to custom scripts
- Added an option under General > Settings to set a session timeout limit for all users
- We now support AWS IAM Roles as an authentication method
New security checks
- Added new checks for the WordPress Login with Phone Number Plugin: CVE-2023-23492
- Added new checks for the WordPress JupiterX Core Plugin: CVE-2023-38389, CVE-2023-38388
Improvements
- Added support for custom authentication tokens without token type
- Improved LFI attack patterns for better accuracy
- Fixed some vulnerabilities in the Docker image
- Stricter sensitive data rules
- Improved bot detection bypass scenarios
- Added a warning message when selecting or assigning the Team Administrator role
Fixes
- Fixed a sensitive data issue when uploading a pre-request script
- Fixed a bug that was preventing scheduling group scans using API
- Fixed custom header values in scan profiles so that they are masked
- Docker Cloud Stack check has been updated to reduce noise
- SSL/TLS classification updated from CWE-311 to CWE-319
- Fixed a bug in scheduling group scans with API
- Removed 401 to 500 status code conversion for internal agent requests
- Changed the IP range limitation for excluded IPs in Discovery Settings to fix the Invalid IP address error
- Fixed an issue with scheduled scans not following the scan time window
- Fixed the problem with scan failed logs not appearing in activity logs
- Fixed the broken verify login and logout function in scan profiles
- Updated the vulnerability severity ranking so that issues are correctly sent to integrated issue tracking systems
- Changed the Active Issue count on the dashboard so that it is consistent with the number when you click on it
- Fixed an issue with accessing a scan profile
- Fixed an issue related to having multiple integrations with the same project but with different issue types
- Fixed an issue in the ‘Basic, Digest, NTLM/Kerberos, Negotiate Authentication’ settings for scans
- Fixed the Jira Server integration issue that was causing only some Jira users to display when configuring Jira Field Mappings
- Fixed a bug that was causing URL rewrite rules to not be included in the Export Knowledge Base report
- Fixed a problem with the internal agent not sending a heartbeat to the web app when in archiving state
- Fixed an issue with Jira-related integration information being removed from the issue history when a previous scan is deleted
- Fixed an internal agent issue that was causing an exception when registering a vulnerability
- Fixed an issue that was causing the Knowledgebase, Crawled URLs, and Scanned URLs to fail when there is no content
- Fixed the missing mapping for Proxy Bypass On Local that was not saving when a scan policy was saved
- Fixed a bug that was duplicating roles when a Team Administrator modified another Team Administrator direct role assignment
- Fixed a bug that was preventing the import of WSDL files to Invicti Enterprise
- Fixed version information reported in Web App Fingerprint Vulnerabilities
v23.10.0 - 26 Oct 2023
This release contains several new features, including a new Team Administrator role function. There are also two new security checks, as well as improvements and bug fixes.
New features
- Added a new Team Administrator role that gives you the flexibility to designate an administrator for oversight across specific web applications, and assign certain roles and website groups to specific Teams or Team Members
- Added an option under General > Settings to set a session timeout limit for all users
- Added new options to the dashboard for selecting date ranges, including creating custom time periods
- Added a notification to the scan results page to show the VDB update version and Invicti Hawk connectivity status for the agent used in the scan
- Added a sensitive data (password, session cookie, token, etc.) encoder
New security checks
- Added JQuery placeholder detection methods
- Added a new security check for the Missing X-Content-Type-Options vulnerability
Improvements
- Improved the JS Delivery CDN disclosure check to increase stability
- Improved the remediation part for the Weak Ciphers Enabled vulnerability
- Reduced the certainty value to 90 for the Robot Attack Detected vulnerability
- Improved the detection method for CSP
- Improved the detection method for the Dockerignore File Detected vulnerability
- Improved the detection method for the Docker Cloud Stack File Detected vulnerability
Fixes
- Fixed an issue with imported links in the API
- Fixed a bug in the scan URL rewrite rules
- Fixed a bug that was preventing retest scans from starting correctly when the vulnerability states were changed from ‘Reviewed’ to ‘Fixed (Unconfirmed)’
- Fixed a bug with disabling the scheduled scans list
- Fixed an issue with viewing the Account Edit page
- Added the missing CVE to the issue details for the “Out-of-date Version (jQuery Validation)” vulnerability
- Fixed some bugs that were affecting BLR
- Encrypted proxy password details when used in the Agent
- Fixed a custom proxy bypass list issue
- Fixed a unique analyzer bug for the WSDL importer
- Improved our XSS capabilities
- Fixed an NTLM login issue
- Fixed an issue that was causing the license file to become empty after upgrading the product
- Fixed several bugs that were impacting some agent proxy settings, synchronization of the vulnerabilities database, and saving scan policies when the proxy bypass feature is used
- Other miscellaneous bug fixes
v23.9.0 - 28 Sep 2023
This release includes several new features and new patterns to detect XSS, as well as many improvements and bug fixes.
New features
- Added the option to set a Custom HTTP Authorization Header under Scan policy > HTTP > Request
- Adjusted agent download parameters to allow installation of internal scanner agents using the Docker client via the Invicti registry service
- Changed the compression tool and default compression format for log files from 7zip to Tar
- Added functionality to enable entering of multiple IP addresses and IP ranges into the IP Address Restrictions setting. Previously, only single-entry IP addresses were permitted.
- Added TLS certificate authentication as an option when integrating with HashiCorp Vault. Previously, we only supported token authentications.
New security checks
- Added new patterns to detect XSS
Improvements
- Improved notification delivery with integration services
- [Closed Beta] Protected visibility of passwords within custom scripts
- Improved detection and reporting of File Inclusion vulnerabilities
- Improved detection and reporting of Sensitive Data Exposure vulnerabilities
- Improved detection and reporting of Dockerfiles
- Disabled caching from the boolean-based MongoDB security engine to avoid possible false positives
- Improved the content-type exemption for non-HTML content types in the CSP engine
- Improved the typehead.js check to increase stability
- Removed the X-XSS-Protection header check because it is deprecated by modern browsers
- Added functionalities to prevent bot detection and fixed an issue that was causing cookie loss after authentication
- Improved the remediation part for the JetBrains .idea detected vulnerability
- Added information to the UI about the functionality of the ‘Edit My Team’s Role’ permission
- Added bypass list functionality for scan policies
Fixes
- Fixed a bug in the date filter that was causing incorrect information to display on the dashboard
- Fixed the external SOAP web service import problem
- Fixed a problem that was causing default values to be filled incorrectly, resulting in false negatives
- Fixed Vulnerabilities visible from the UI but not via API in certain failed scan situations
- Fixed inconsistent scan states in rare deleted scan scenarios
- Fixed missing Next Execution Time for certain scheduled scans
- Fixed an issue that prevented saving scheduled scans in some scenarios
- Fixed inconsistencies in the Resource Finder with certain hidden files and backup files
- Improved updating of groups in Azure Provisioning scenarios
- Fixed a problem with converting scan data while the CloudProvider Settings page is open
- Fixed a database update exception when a large number of scans are launched simultaneously
- Fixed the incorrect reporting of outdated technology versions
- Fixed a bug that was preventing reports from being saved
- Fixed a bug that can cause too much browser user data to be left in the temp folder
- Fixed a bug that was stopping the certificate authentication process from working correctly for Authverifiers
- Fixed a boolean-based MongoDB Injection that was causing false positives in scan reports
- Fixed the incorrect display of vulnerabilities when importing scan results from Invicti Standard to Invicti Enterprise
- Fixed a bug that was preventing the editing of internal website URLs
- Fixed a character validity issue so that user names with Danish characters can now be edited in the UI
- Fixed a bug that was allowing access to the UI via the back button after the user had signed out
- Fixed the Discovery Main Domains Filter Expression that was not working properly for some domains
- Fixed an issue that was causing tags to be duplicated when a website was imported using a CSV file
- Fixed the update agent command that was not working correctly
- Fixed the internal Linux v23.7 AV agent that wasn’t sending header configurations
- Encrypted the proxy password used in the scan policy file
- Fixed a scan coverage issue
- Fixed a custom script issue so that now passwords written to the logs are encrypted
- Fixed an issue where vulnerabilities could not be generated as CloudFlare WAF rules via API
v23.8.0 - 17 Aug 2023
This release includes several new features, and many improvements and fixes.
Important note
- Customers currently using version 23.7.0 on Windows running internal agents will need to perform additional steps in order for this update to run successfully in their environment. Affected customers have been contacted directly with more information.
New features
- [Closed beta] Added the Team Administrator default role
- Changed compression tool from 7zip to Tar
- Added Diana.jl support for GraphQL Library Detection
- Added Hot Chocolate support for GraphQL Library Detection
- Added Zero Day Vulnerability for MOVEit Software
Improvements
- Improved the scan deletion process
- Improved the authentication agent to carry out any stepped authentication, such as first Form Authentication then OAuth2
- Added filter for discovered websites via AWS connection
- Enabled regex case sensitivity for attack payloads
- Updated Boolean NoSQL / SQL Injection attack payloads
- Expanded scenarios for Discovery Service with AWS Connections
- Improved performance when updating vulnerability lookups
- Improved performance of database indexes
- Improved added API endpoints for Custom Scripts
- Improved performance for Issues Report API endpoint
- Improved detection of IT Hit WebDav Server .Net versions
- Improved Internal Path Disclosure detection
- Improved Remediation Advice for Autocomplete Enabled vulnerability
- Improved detection logic for LFI vulnerability
- Improved identification and version disclosure for PopperJS, CanvasJS, and Next.js
- Improved WAF Detection for F5 BIG IP
Fixes
- Fixed PCI Report generation error when selecting a specific group
- Fixed the issue that prevents users from saving the scan profile when the Is Regex checkbox next to the Excluded Path field is selected on the URL Rewrite page
- Fixed the timezone problem on the Knowledge Base Reports
- Fixed issue with scans stopping with the Find & Follow New Links option enabled
- Fixed issue with agent compression of chromium and node files
- Fixed null value exception with REST API
- Fixed InvalidCastException with REST API
- Fixed ArgumentNullException with Custom Security Checks
- Fixed Access Denied error when attempting to delete scan files which were already previously deleted
- Fixed cannot login to web app after changing database password
- Fixed unclear results with PCI reports with edge date ranges
- Fixed BLR cannot fill address fields
- Fixed licensing issue when adding a previously-deleted website
- Fixed adding some MongoDB vulnerabilities to Knowledge Base report
- Fixed importing Swagger/OpenAPI links
- Fixed Discovery Service issue with AWS Connection throttling
- Fixed authentication failure with MFA recovery codes
- Fixed license file corruption issue during version upgrade
- Fixed scans unauthenticated after successful authentication verification
- Fixed Linux agent update issue
- Fixed the data type detection when importing Swagger schemas
v23.7.0 - 11 Jul 2023
This release contains fixes and a change to the compression tool.
Improvements
- Changed compression tool from 7zip to Tar
Fixes
- Fixed lost license information in unstable network conditions
v23.6.0 - 21 Jun 2023
This release includes many new security checks, improvements, and fixes.
New security checks
- Added new security check for LDAP injection for IAST.
- Added new security check for MongoDB injection.
- Added new security check for Server-side Template Injection for IAST.
- Added new security check for XPath injection for IAST.
- Implemented security check for Sensitive Data Exposure.
- Added the check for Boolean-based MongoDB injection.
- Added the check for MongoDB Operator Injector.
- Implemented the XML external entity check for IAST.
- Added the ISO/IEC27001:2022 Classification.
- Added the report template and attack pattern to the Out-of-band RCE.
- Added passive check for Lua.
- Added a security check to detect public Docker files.
- Implemented a new engine to identify WordPress themes and Plugins.
- Added new security checks for SAML.
- Added security check for IT Hit WebDAV Server .Net Version Disclosure.
- Added security check for MS Exchange Version Disclosure.
- Added new payloads for Command Injection.
- Added support for PopperJS.
- Added support for CanvasJS.
- Added new security check for the SQLite Database Detection.
- Added new payloads for Header Injection.
- Added new security check for Spring Boot Actuator Detection.
- Added security check for NodeJS Stack Trace Disclosure.
- Added security check for SailsJS and ActionHero Identified.
- Added security check for JetBrains .idea Detected.
- Added security check for GraphQL Stack Trace Disclosure.
- Added security checks for Javascript Libraries.
- Added security checks for Web Application Fingerprinter Engine.
- Added new security checks for WordPress Hello Elementor Theme Detection.
- Added new security checks for WordPress Twenty Twenty-Three Theme Detection.
- Added new security checks for WordPress Twenty Twenty-Two Theme Detection.
- Added new security checks for WordPress Astra Theme Detection.
- Added new security checks for WordPress Twenty Twenty-One Theme Detection.
- Added new security checks for WordPress Twenty Twenty Theme Detection.
- Added new security checks for WordPress OceanWP Theme Detection.
- Added new security checks for WordPress Twenty Seventeen Theme Detection.
- Added new security checks for WordPress Kadence Theme Detection.
- Added new security checks for WordPress Twenty-Sixteen Theme Detection.
- Added new security checks for WordPress Twenty Nineteen Theme Detection.
- Added new security checks for WordPress PopularFX Theme Detection.
- Added new security checks for WordPress GeneratePress Theme Detection.
- Added new security checks for WordPress Inspiro Theme Detection.
- Added new security checks for WordPress Go Theme Detection.
- Added new security checks for WordPress Smash Balloon Social Photo Feed Plugin Detection.
- Added new security checks for WordPress Contact Form 7 Plugin Detection.
- Added new security checks for WordPress Yoast SEO Plugin Detection.
- Added new security checks for WordPress Elementor Website Builder Plugin Detection.
- Added new security checks for WordPress Classic Editor Plugin Detection.
- Added new security checks for WordPress Akismet Spam Protection Plugin Detection.
- Added new security checks for WordPress WooCommerce Plugin Detection.
- Added new security checks for WordPress Contact Form by WPForms Plugin Detection.
- Added new security checks for WordPress Really Simple SSL Plugin Detection.
- Added new security checks for WordPress Jetpack Plugin Detection.
- Added new security checks for WordPress All-in-One WP Migration Plugin Detection.
- Added new security checks for WordPress Wordfence Security Plugin Detection.
- Added new security checks for WordPress Yoast Duplicate Post Plugin Detection.
- Added new security checks for WordPress WordPress Importer Plugin Detection.
- Added new security checks for WordPress LiteSpeed Cache Plugin Detection.
- Added new security checks for WordPress UpdraftPlus WordPress Backup Plugin Plugin Detection.
- Added new security check for EZProxy Identified.
Improvements
- Updated the Java sensor for more stability in the sensor.
- Added the Response Receiver information event to remove waiting time for requests.
- Improved the discovery service for email, website, and main website matching.
- Improved the Not Contains filter for tags.
- Added the EC2 Instance ID column to the default columns on the Discovered Websites page.
- Updated API documentation for outdated ApiFileModel JSON example.
- Added an information message to the report policy page in case the custom report policy cannot be found.
- Improved the agent assignment process to prevent performance issues.
- Changed the Launch Scan button to the New Scan button on the dashboard.
- Added an account ID control when querying the website with the root URL.
- Improved the website importing when the CSV file has more than 1000 entries.
- Added an information message for adding an AWS connection that appears when there is no running instance.
- Improved the health check of websites discovered via the AWS connection.
- Changed the Jira webhook settings, making the Exclude Body checkbox selection mandatory.
- Fixed the importing website issue that threw an error when a user tries to add the website deleted from Invicti previously.
- Improved the scan data by moving some information like attack and knowledge base data to the storage.
- Improved the AWS discovery that can find private IPs in addition to the public IPs when the Include Unreachable Discovered Websites checkbox is selected.
- Improved the user interface for the website’s menu.
- Improved the user interface for the crawling options on the New Scan page.
- Improved the business logic recorder to play the authenticated record.
- Updated the Signature Detection pattern.
- Improved the wordlist for Forced Browsing checks.
- Changed the Session Cookie not marked as Secure severity from High to Medium.
- Improved the performance of downloading the discovery data via the API endpoint.
- [Acunetix 360] Improved the silent installation JSON document for AcuMonitor.
- Increased the delay control for max scan duration to 12 hours. After 12 hours of the maximum scan time set by the customer, the web application fails the scan.
- Improved Drupal and Joomla detection.
- Improved the Next.js version detection.
- Improved Django debug mode enabled.
- Updated the SSL/TLS report template.
Fixes
- Fixed the date-time issue in the Authentication Verifier Service that prevents verifier agents from being listed on the verifier page.
- Fixed the typo on the filter options on the Discovered Webpages page.
- Fixed the proxy settings on the scan policy, so it can be applicable for agents as well.
- Fixed the agent selection issue that prevents users from launching scans.
- Fixed an issue that caused a bad CSRF token when confirming Cross-site Scripting.
- Fixed the issue that is filling out the login form on the logout page during the login verification.
- Fixed the issue of changing the order of API parameters while importing the JSON file.
- Fixed the vulnerability signature types for Cloudflare and Cdnjs.
- Fixed the custom script information on the 3-Legged Authorization in the scan summary.
- Fixed the issue that prevented empty website groups from being deleted.
- Fixed the issue that resulted in the scanning of the target URL instead of the GraphQL endpoint.
- Fixed the token detection issue although the Detect Bearer Authorization Token function is disabled.
- Fixed the case-sensitive parameter name that caused issues when migrating the database.
- Fixed the ServiceNow integration issue that failed to export the issue information.
- Fixed the issue that allowed a user with permission to add/edit a website group the ability to view all account websites.
- Fixed the permission issue that a user can add and edit discovery connection via an API endpoint although the user does not have that permission.
- Fixed the logo issue that the Knowledge Base report was showing the old Invicti logo.
- Fixed issues encountered during scan deletion and canceling to improve performance.
- Fixed the issue in which a team’s name is deleted during the editing process.
- Fixed the validation issue for the Kafta integration.
- Fixed the password update issue for the authentication verifier process that failed to obtain the new password.
- Improved report generation via API endpoints.
- Fixed the login failures when the Authentication Profile is selected as the Use matched profile.
- Fixed the issue that caused the flashing custom script screen.
- Fixed the issue with cascading combo box by fixing the query.
- Fixed an internal server error while exporting from the Invicti Standard to the Invicti Enterprise.
- Fixed the issue with the “#” sign that can appear in the target URL.
- Fixed the issue with choosing the All option from the website group drop-down on the Reporting page.
- Fixed an issue about HTTP Status codes on the crawler performance in the Knowledge Base Report.
- Fixed the importing GraphQL introspection issue.
- Fixed the weak Nonce detection in Content Security Policy.
v23.5.0 - 25 May 2023
This release includes security checks, improvements, and fixes. We added new checks for GraphQL. We improved our Linux agents to be compatible with FIPS-enabled environments and improved the IAST Bridge. We also fixed some bugs.
New security checks
- Added new patterns for GrapQL attack usage.
- Added new attack pattern to CommandInjection.xml.
- Implemented Bootstrap Libraries Detection.
- Added Out-of-Date vulnerability for mod_ssl.
- Added a report template and vulnerability type for Spring Framework Identified.
- Added JavaMelody Interface Detected Signature.
- Added the support for Nested objects for GraphQL attacks.
Improvements
- Added the discovery source option to filters on the discovered websites page.
- Added the AWS badge to the Discovery Service to identify the assets identified via the AWS connection.
- Improved the Linux agents to work in the FIPS-enabled environment.
- Updated the IAST Bridge to improve the communication between the bridge and the scanner agent.
- Added a null check for HAR files imported.
- Added the Retest All Subitems in the Sitemap to prevent non-retestable issues from being retested.
- Improved the agent and web application communication to end it after three attempts if the internal agent has wrong information.
- Updated IAST NuGet PHP package.
- Updated StaticDetection.xml & StaticResourceFinder.xml.
- Changed WAF Identification Signature for F5 Big IP.
- Added service worker request support for authentication, login simulation, and crawling.
Fixes
- Fixed the AWS connection issue to let customers add internal EC2 instances.
- Fixed an issue that caused high memory usage while collecting form values.
- Fixed the issue that caused the change in the date and time format during the Postman file importing.
- Fixed the next scheduled scan execution time information on the user interface.
- Fixed the issue that displayed “vulnerability not found” on the user interface although the vulnerability is identified.
- Fixed the control issue that threw an “internal server error” when exporting a scan from Invicti Standard to the Enterprise.
- Fixed the issue that allowed a user with permission to add/edit a website group the ability to view all account websites.
- Fixed the logo issue that the Knowledge Base report was showing the old Invicti logo.
- Fixed the untrusted certificate error for internal proxies.