Invicti Standard 18 Mar 2015
Read the blog post for more details about this version
NEW WEB SECURITY TESTS
-
Scanning of parameters in URLs
-
Nginx web server Out-of-date version check
-
Perl possible source code disclosure
-
Python possible source code disclosure
-
Ruby possible source code disclosure
-
Java possible source code disclosure
-
Nginx Web Server identification
-
Apache Web Server identification
-
Java stack trace disclosure
NEW FEATURES
-
Chrome based web browser engine for DOM parsing
-
URL rewrite rules configuration wizard to scan parameters in URLs
-
“Ignore Vulnerability from Scan” option to exclude vulnerabilities from reports
IMPROVEMENTS
-
Improved the correctness and coverage of Remote Code Execution via Local File Inclusion vulnerabilities
-
Improved cross-site scripting vulnerability confirmation patterns
-
Added support for viewing JSON arrays in document roots in request/response viewers
-
Added support for Microsoft Office ACCDB database file detection
-
Improved DOM parser to exclude non-HTML files
-
Improved PHP Source Code Disclosure vulnerability detection
-
Improved Nginx Version Disclosure vulnerability template
-
Improved IIS 8 Default Page detection
-
Improved Email List knowledgebase report to include generic email addresses
-
Improved Configure Form Authentication wizard by replacing embedded record browser with a Chrome based browser
-
Improved the form authentication configuration wizard to handle cases where Basic/NTLM/Digest is used in conjunction with Form Authentication
-
Added a cross-site scripting attack pattern which constructs a valid XHTML in order to trigger the XSS
-
Added double encoded attack groups in order to reduce local file inclusion vulnerability confirmation requests
-
Added status bar label which displays current VDB version and VDB version update notifications
-
Added login activity indicator to Scan Summary Dashboard
-
Added a new knowledgebase out-of-scope reason for links which exceed maximum depth
-
Updated external references in cross-site scripting vulnerability templates
-
Improved DOM parser by providing current cookies and referer to DOM/JavaScript context
-
Added several new DOM events to simulate including keyboard events
-
Improved the parsing of “Anti-CSRF token field names” setting by trimming each individual token name pattern
-
Added support for simulating DOM events inside HTML frames/iframes
-
Consolidated XSS exploitation function name (invicti()) throughout all the areas reported
-
Removed redundant semicolon followed by waitfor delay statements from time based SQLi attack patterns to bypass more blacklistings
-
Changed default user-agent string to mimic a Chrome based browser
-
Improved LFI extraction file list to extract files from target system according to detected OS
-
Removed outdated PCI 1.2 classifications
BUG FIXES
-
Fixed indentation problem of bullets in knowledgebase reports
-
Fixed path disclosure reports in MooTools JavaScript file
-
Fixed KeyNotFoundException occurs when a node from Sitemap tree is clicked
-
Fixed NullReferenceException thrown from Boolean SQL Injection Engine
-
Fixed an issue in WebDav Engine where an extra parameter is added when requesting with Options method
-
Fixed a bug where LFI exploitation does not work for double encoded paths
-
Fixed a bug in Export file dialog where .nss extension isn’t appended if file name ends with a known file extension
-
Fixed a bug in Configure Form Authentication wizard where the number of scripts loaded shows incorrectly
-
Fixed a bug which occurs while retesting with CSRF engine
-
Fixed a bug where retest does not work after loading a saved scan session
-
Fixed a bug where Invicti reports out of date PHP even though PHP is up to date
-
Fixed a UI hang where Invicti tries to display a binary response in Browser View tab
-
Fixed an ArgumentNullException thrown when clicking Heartbleed vulnerability
-
Fixed a bug where Invicti makes requests to DTD URIs in XML documents
-
Fixed a bug in Scan Policy settings dialog where list of user agents are duplicated
-
Fixed a typo in ViewState MAC Not Enabled vulnerability template
-
Fixed a bug in auto updater where the updater doesn’t honour the AutoPilot and Silent command line switches
-
Fixed XSS exploit generation code to handle cases where input name is “submit”
-
Fixed a bug that prevents invicti.exe process from closing if you try to close Invicti immediately after starting a new scan
-
Fixed a UI hang happens when the highlighted text is huge in response source code
-
Fixed issues with decoded HTML attribute values in text parser
-
Fixed session cookie path issues according to how they are implemented in modern browsers
-
Fixed scan stuck at re-crawling issue for imported scan sessions
-
Fixed highlighting issues for possible XSS vulnerabilities
-
Fixed a crash due to empty/missing URL value for form authentication macro requests
-
Fixed a NullReferenceException in Open Redirect Engine which occurs if redirect response is missing Location header
-
Fixed an error in authentication macro sequence player happens when the request URI is wrong or missing