v23.9.0 - 28 Sep 2023
This release includes several new features and new patterns to detect XSS, as well as many improvements and bug fixes.
New features
- Added the option to set a Custom HTTP Authorization Header under Scan policy > HTTP > Request
- Adjusted agent download parameters to allow installation of internal scanner agents using the Docker client via the Invicti registry service
- Changed the compression tool and default compression format for log files from 7zip to Tar
- Added functionality to enable entering of multiple IP addresses and IP ranges into the IP Address Restrictions setting. Previously, only single-entry IP addresses were permitted.
- Added TLS certificate authentication as an option when integrating with HashiCorp Vault. Previously, we only supported token authentications.
New security checks
- Added new patterns to detect XSS
Improvements
- Improved notification delivery with integration services
- [Closed Beta] Protected visibility of passwords within custom scripts
- Improved detection and reporting of File Inclusion vulnerabilities
- Improved detection and reporting of Sensitive Data Exposure vulnerabilities
- Improved detection and reporting of Dockerfiles
- Disabled caching from the boolean-based MongoDB security engine to avoid possible false positives
- Improved the content-type exemption for non-HTML content types in the CSP engine
- Improved the typehead.js check to increase stability
- Removed the X-XSS-Protection header check because it is deprecated by modern browsers
- Added functionalities to prevent bot detection and fixed an issue that was causing cookie loss after authentication
- Improved the remediation part for the JetBrains .idea detected vulnerability
- Added information to the UI about the functionality of the ‘Edit My Team’s Role’ permission
- Added bypass list functionality for scan policies
Fixes
- Fixed a bug in the date filter that was causing incorrect information to display on the dashboard
- Fixed the external SOAP web service import problem
- Fixed a problem that was causing default values to be filled incorrectly, resulting in false negatives
- Fixed Vulnerabilities visible from the UI but not via API in certain failed scan situations
- Fixed inconsistent scan states in rare deleted scan scenarios
- Fixed missing Next Execution Time for certain scheduled scans
- Fixed an issue that prevented saving scheduled scans in some scenarios
- Fixed inconsistencies in the Resource Finder with certain hidden files and backup files
- Improved updating of groups in Azure Provisioning scenarios
- Fixed a problem with converting scan data while the CloudProvider Settings page is open
- Fixed a database update exception when a large number of scans are launched simultaneously
- Fixed the incorrect reporting of outdated technology versions
- Fixed a bug that was preventing reports from being saved
- Fixed a bug that can cause too much browser user data to be left in the temp folder
- Fixed a bug that was stopping the certificate authentication process from working correctly for Authverifiers
- Fixed a boolean-based MongoDB Injection that was causing false positives in scan reports
- Fixed the incorrect display of vulnerabilities when importing scan results from Invicti Standard to Invicti Enterprise
- Fixed a bug that was preventing the editing of internal website URLs
- Fixed a character validity issue so that user names with Danish characters can now be edited in the UI
- Fixed a bug that was allowing access to the UI via the back button after the user had signed out
- Fixed the Discovery Main Domains Filter Expression that was not working properly for some domains
- Fixed an issue that was causing tags to be duplicated when a website was imported using a CSV file
- Fixed the update agent command that was not working correctly
- Fixed the internal Linux v23.7 AV agent that wasn’t sending header configurations
- Encrypted the proxy password used in the scan policy file
- Fixed a scan coverage issue
- Fixed a custom script issue so that now passwords written to the logs are encrypted
- Fixed an issue where vulnerabilities could not be generated as CloudFlare WAF rules via API
v23.8.0 - 17 Aug 2023
This release includes several new features, and many improvements and fixes.
Important note
- Customers currently using version 23.7.0 on Windows running internal agents will need to perform additional steps in order for this update to run successfully in their environment. Affected customers have been contacted directly with more information.
New features
- [Closed beta] Added the Team Administrator default role
- Changed compression tool from 7zip to Tar
- Added Diana.jl support for GraphQL Library Detection
- Added Hot Chocolate support for GraphQL Library Detection
- Added Zero Day Vulnerability for MOVEit Software
Improvements
- Improved the scan deletion process
- Improved the authentication agent to carry out any stepped authentication, such as first Form Authentication then OAuth2
- Added filter for discovered websites via AWS connection
- Enabled regex case sensitivity for attack payloads
- Updated Boolean NoSQL / SQL Injection attack payloads
- Expanded scenarios for Discovery Service with AWS Connections
- Improved performance when updating vulnerability lookups
- Improved performance of database indexes
- Improved added API endpoints for Custom Scripts
- Improved performance for Issues Report API endpoint
- Improved detection of IT Hit WebDav Server .Net versions
- Improved Internal Path Disclosure detection
- Improved Remediation Advice for Autocomplete Enabled vulnerability
- Improved detection logic for LFI vulnerability
- Improved identification and version disclosure for PopperJS, CanvasJS, and Next.js
- Improved WAF Detection for F5 BIG IP
Fixes
- Fixed PCI Report generation error when selecting a specific group
- Fixed the issue that prevents users from saving the scan profile when the Is Regex checkbox next to the Excluded Path field is selected on the URL Rewrite page
- Fixed the timezone problem on the Knowledge Base Reports
- Fixed issue with scans stopping with the Find & Follow New Links option enabled
- Fixed issue with agent compression of chromium and node files
- Fixed null value exception with REST API
- Fixed InvalidCastException with REST API
- Fixed ArgumentNullException with Custom Security Checks
- Fixed Access Denied error when attempting to delete scan files which were already previously deleted
- Fixed cannot login to web app after changing database password
- Fixed unclear results with PCI reports with edge date ranges
- Fixed BLR cannot fill address fields
- Fixed licensing issue when adding a previously-deleted website
- Fixed adding some MongoDB vulnerabilities to Knowledge Base report
- Fixed importing Swagger/OpenAPI links
- Fixed Discovery Service issue with AWS Connection throttling
- Fixed authentication failure with MFA recovery codes
- Fixed license file corruption issue during version upgrade
- Fixed scans unauthenticated after successful authentication verification
- Fixed Linux agent update issue
- Fixed the data type detection when importing Swagger schemas
v23.7.0 - 11 Jul 2023
This release contains fixes and a change to the compression tool.
Improvements
- Changed compression tool from 7zip to Tar
Fixes
- Fixed lost license information in unstable network conditions
v23.6.0 - 21 Jun 2023
This release includes many new security checks, improvements, and fixes.
New security checks
- Added new security check for LDAP injection for IAST.
- Added new security check for MongoDB injection.
- Added new security check for Server-side Template Injection for IAST.
- Added new security check for XPath injection for IAST.
- Implemented security check for Sensitive Data Exposure.
- Added the check for Boolean-based MongoDB injection.
- Added the check for MongoDB Operator Injector.
- Implemented the XML external entity check for IAST.
- Added the ISO/IEC27001:2022 Classification.
- Added the report template and attack pattern to the Out-of-band RCE.
- Added passive check for Lua.
- Added a security check to detect public Docker files.
- Implemented a new engine to identify WordPress themes and Plugins.
- Added new security checks for SAML.
- Added security check for IT Hit WebDAV Server .Net Version Disclosure.
- Added security check for MS Exchange Version Disclosure.
- Added new payloads for Command Injection.
- Added support for PopperJS.
- Added support for CanvasJS.
- Added new security check for the SQLite Database Detection.
- Added new payloads for Header Injection.
- Added new security check for Spring Boot Actuator Detection.
- Added security check for NodeJS Stack Trace Disclosure.
- Added security check for SailsJS and ActionHero Identified.
- Added security check for JetBrains .idea Detected.
- Added security check for GraphQL Stack Trace Disclosure.
- Added security checks for Javascript Libraries.
- Added security checks for Web Application Fingerprinter Engine.
- Added new security checks for WordPress Hello Elementor Theme Detection.
- Added new security checks for WordPress Twenty Twenty-Three Theme Detection.
- Added new security checks for WordPress Twenty Twenty-Two Theme Detection.
- Added new security checks for WordPress Astra Theme Detection.
- Added new security checks for WordPress Twenty Twenty-One Theme Detection.
- Added new security checks for WordPress Twenty Twenty Theme Detection.
- Added new security checks for WordPress OceanWP Theme Detection.
- Added new security checks for WordPress Twenty Seventeen Theme Detection.
- Added new security checks for WordPress Kadence Theme Detection.
- Added new security checks for WordPress Twenty-Sixteen Theme Detection.
- Added new security checks for WordPress Twenty Nineteen Theme Detection.
- Added new security checks for WordPress PopularFX Theme Detection.
- Added new security checks for WordPress GeneratePress Theme Detection.
- Added new security checks for WordPress Inspiro Theme Detection.
- Added new security checks for WordPress Go Theme Detection.
- Added new security checks for WordPress Smash Balloon Social Photo Feed Plugin Detection.
- Added new security checks for WordPress Contact Form 7 Plugin Detection.
- Added new security checks for WordPress Yoast SEO Plugin Detection.
- Added new security checks for WordPress Elementor Website Builder Plugin Detection.
- Added new security checks for WordPress Classic Editor Plugin Detection.
- Added new security checks for WordPress Akismet Spam Protection Plugin Detection.
- Added new security checks for WordPress WooCommerce Plugin Detection.
- Added new security checks for WordPress Contact Form by WPForms Plugin Detection.
- Added new security checks for WordPress Really Simple SSL Plugin Detection.
- Added new security checks for WordPress Jetpack Plugin Detection.
- Added new security checks for WordPress All-in-One WP Migration Plugin Detection.
- Added new security checks for WordPress Wordfence Security Plugin Detection.
- Added new security checks for WordPress Yoast Duplicate Post Plugin Detection.
- Added new security checks for WordPress WordPress Importer Plugin Detection.
- Added new security checks for WordPress LiteSpeed Cache Plugin Detection.
- Added new security checks for WordPress UpdraftPlus WordPress Backup Plugin Plugin Detection.
- Added new security check for EZProxy Identified.
Improvements
- Updated the Java sensor for more stability in the sensor.
- Added the Response Receiver information event to remove waiting time for requests.
- Improved the discovery service for email, website, and main website matching.
- Improved the Not Contains filter for tags.
- Added the EC2 Instance ID column to the default columns on the Discovered Websites page.
- Updated API documentation for outdated ApiFileModel JSON example.
- Added an information message to the report policy page in case the custom report policy cannot be found.
- Improved the agent assignment process to prevent performance issues.
- Changed the Launch Scan button to the New Scan button on the dashboard.
- Added an account ID control when querying the website with the root URL.
- Improved the website importing when the CSV file has more than 1000 entries.
- Added an information message for adding an AWS connection that appears when there is no running instance.
- Improved the health check of websites discovered via the AWS connection.
- Changed the Jira webhook settings, making the Exclude Body checkbox selection mandatory.
- Fixed the importing website issue that threw an error when a user tries to add the website deleted from Invicti previously.
- Improved the scan data by moving some information like attack and knowledge base data to the storage.
- Improved the AWS discovery that can find private IPs in addition to the public IPs when the Include Unreachable Discovered Websites checkbox is selected.
- Improved the user interface for the website’s menu.
- Improved the user interface for the crawling options on the New Scan page.
- Improved the business logic recorder to play the authenticated record.
- Updated the Signature Detection pattern.
- Improved the wordlist for Forced Browsing checks.
- Changed the Session Cookie not marked as Secure severity from High to Medium.
- Improved the performance of downloading the discovery data via the API endpoint.
- [Acunetix 360] Improved the silent installation JSON document for AcuMonitor.
- Increased the delay control for max scan duration to 12 hours. After 12 hours of the maximum scan time set by the customer, the web application fails the scan.
- Improved Drupal and Joomla detection.
- Improved the Next.js version detection.
- Improved Django debug mode enabled.
- Updated the SSL/TLS report template.
Fixes
- Fixed the date-time issue in the Authentication Verifier Service that prevents verifier agents from being listed on the verifier page.
- Fixed the typo on the filter options on the Discovered Webpages page.
- Fixed the proxy settings on the scan policy, so it can be applicable for agents as well.
- Fixed the agent selection issue that prevents users from launching scans.
- Fixed an issue that caused a bad CSRF token when confirming Cross-site Scripting.
- Fixed the issue that is filling out the login form on the logout page during the login verification.
- Fixed the issue of changing the order of API parameters while importing the JSON file.
- Fixed the vulnerability signature types for Cloudflare and Cdnjs.
- Fixed the custom script information on the 3-Legged Authorization in the scan summary.
- Fixed the issue that prevented empty website groups from being deleted.
- Fixed the issue that resulted in the scanning of the target URL instead of the GraphQL endpoint.
- Fixed the token detection issue although the Detect Bearer Authorization Token function is disabled.
- Fixed the case-sensitive parameter name that caused issues when migrating the database.
- Fixed the ServiceNow integration issue that failed to export the issue information.
- Fixed the issue that allowed a user with permission to add/edit a website group the ability to view all account websites.
- Fixed the permission issue that a user can add and edit discovery connection via an API endpoint although the user does not have that permission.
- Fixed the logo issue that the Knowledge Base report was showing the old Invicti logo.
- Fixed issues encountered during scan deletion and canceling to improve performance.
- Fixed the issue in which a team’s name is deleted during the editing process.
- Fixed the validation issue for the Kafta integration.
- Fixed the password update issue for the authentication verifier process that failed to obtain the new password.
- Improved report generation via API endpoints.
- Fixed the login failures when the Authentication Profile is selected as the Use matched profile.
- Fixed the issue that caused the flashing custom script screen.
- Fixed the issue with cascading combo box by fixing the query.
- Fixed an internal server error while exporting from the Invicti Standard to the Invicti Enterprise.
- Fixed the issue with the “#” sign that can appear in the target URL.
- Fixed the issue with choosing the All option from the website group drop-down on the Reporting page.
- Fixed an issue about HTTP Status codes on the crawler performance in the Knowledge Base Report.
- Fixed the importing GraphQL introspection issue.
- Fixed the weak Nonce detection in Content Security Policy.
v23.5.0 - 25 May 2023
This release includes security checks, improvements, and fixes. We added new checks for GraphQL. We improved our Linux agents to be compatible with FIPS-enabled environments and improved the IAST Bridge. We also fixed some bugs.
New security checks
- Added new patterns for GrapQL attack usage.
- Added new attack pattern to CommandInjection.xml.
- Implemented Bootstrap Libraries Detection.
- Added Out-of-Date vulnerability for mod_ssl.
- Added a report template and vulnerability type for Spring Framework Identified.
- Added JavaMelody Interface Detected Signature.
- Added the support for Nested objects for GraphQL attacks.
Improvements
- Added the discovery source option to filters on the discovered websites page.
- Added the AWS badge to the Discovery Service to identify the assets identified via the AWS connection.
- Improved the Linux agents to work in the FIPS-enabled environment.
- Updated the IAST Bridge to improve the communication between the bridge and the scanner agent.
- Added a null check for HAR files imported.
- Added the Retest All Subitems in the Sitemap to prevent non-retestable issues from being retested.
- Improved the agent and web application communication to end it after three attempts if the internal agent has wrong information.
- Updated IAST NuGet PHP package.
- Updated StaticDetection.xml & StaticResourceFinder.xml.
- Changed WAF Identification Signature for F5 Big IP.
- Added service worker request support for authentication, login simulation, and crawling.
Fixes
- Fixed the AWS connection issue to let customers add internal EC2 instances.
- Fixed an issue that caused high memory usage while collecting form values.
- Fixed the issue that caused the change in the date and time format during the Postman file importing.
- Fixed the next scheduled scan execution time information on the user interface.
- Fixed the issue that displayed “vulnerability not found” on the user interface although the vulnerability is identified.
- Fixed the control issue that threw an “internal server error” when exporting a scan from Invicti Standard to the Enterprise.
- Fixed the issue that allowed a user with permission to add/edit a website group the ability to view all account websites.
- Fixed the logo issue that the Knowledge Base report was showing the old Invicti logo.
- Fixed the untrusted certificate error for internal proxies.
v23.4.0 - 24 Apr 2023
This release includes security checks, improvements, and fixes. We changed the brand logo, improved the Hawk setting control, and added a column to see whether an issue is retestable or not. We also fixed some bugs.
New security checks
- Added package.json Configuration File attack pattern.
- Added new File Upload Injection pattern.
- Added SSRF (Equinix) vulnerability.
- Added Swagger user interface Out-of-Date vulnerability.
- Added a file upload injection pattern.
- Added StackPath CDN Identified vulnerability.
- Added Insecure Usage of Version 1 GUID vulnerability.
- Added JBoss Web Console JMX Invoker check.
- Added Windows Server check.
- Added Windows CE check.
- Added Cloudflare Identified, Cloudflare Bot Management, Cloudflare Browser Insights, and cdnjs checks.
- Added Varnish Version Disclosure vulnerability check.
- Added Stack Trace Disclosure (Apache Shiro) vulnerability check.
- Added Java Servlet Ouf-of-Date vulnerability check.
- Added AEM Detected vulnerability check.
- Added CDN Detected(JsDelivr) vulnerability check.
Improvements
- Updated Invicti Enterprise with the new brand logo.
- Added external schema import to solve a WSDL file importing another WSDL file.
- Added the Hawk URL configuration to the silent installation document.
- Improved the Authentication Verifier settings in the silent installation document to skip or not the verifier.
- Improved the On-Premises installation package to run as 64-bit if the platform support 64-bit.
- Improved the settings page for admins to change the Hawk URL.
- Improved the bulk update of those issues with the Fixed(Can’t Retest) status.
- Added a column on the Issues page to show users whether an issue is retestable.
- Improved the scan compression algorithm to lower the size of the scan data.
- Added a tooltip to show the full scan report name when it is too long.
- Added a progress indication while exporting a PCI scan report.
- Added an option to delete the stuck agents’ commands.
- Fixed the business logic recorder issue while using the Basic, NTLM/Kerberos Configurations.
- Improved the descriptions for /api/1.0/issues/report endpoint and the integration parameter on the Allissues endpoint.
- Improved WS_FTP Log vulnerability test pattern.
- Improved X-XSS-Protection Header Issue vulnerability template.
- Improved MySQL Database Error Message attack pattern.
- Improved XML External Entity Injection vulnerability test pattern.
- Improved Forced Browsing List.
- Added CWE classification for Insecure HTTP Usage.
- Added GraphQL Attack Usage to existing test patterns by default.
- Added an option to ignore events that can break the JavaScript simulation script.
- Added version number information to internal agents on the Configure New Agent page.
- Added an option to set a timeout value for agents to be set as Unavailable if they are stuck.
- Improved Invicti Enterprise to clear all login files upon signing out of the application.
- Improved the Authentication Verifier settings in the silent installation document to skip or not the verifier.
- Created a queue to store scan results and register results asynchronously.
- Added the vulnerability database to the installation package.
Fixes
- Fixed Out-of-memory reason at CDPSession.
- Fixed the issue with the DefectDojo report submission.
- Fixed the Client Secret in raw text appearing in the scan report for OAuth2.
- Fixed the time zone issue for the authentication verifier agent.
- Fixed the IAST Bridge installation issue that ended prematurely.
- Fixed the issue that displayed “vulnerability not found” on the user interface although the vulnerability is identified.
- Fixed the scan duration limit issue that crashed the application.
- Fixed the issue with a folder name with blanks to prevent the Unquoted Service Path vulnerability.
- Fixed the control issue that threw an “internal server error” when exporting a scan from Invicti Standard to the Enterprise.
- Fixed the update issue in the Proof node in the Knowledge Base panel.
- Fixed the scan profile issue when exported from Invicti Standard to Invicti Enterprise.
- Fixed the API token reset issue for team members.
- Fixed the API documentation’s website that failed to show descriptions.
- Fixed the business logic recorder issue where the session is dropped because of a cookie.
- Fixed the default email address that appeared on the login page during the custom script window.
- Fixed the Out-of-Memory issue caused by the Text Parser when adding any extension to the parser.
- Fixed the Client Secret in raw text appearing in the scan report for OAuth2.
- Fixed the Hawk validation issue.
- Fixed the scan flow with different logic for incremental scans that are launched via CI/CD integrations and the user interface.
- Fixed the custom vulnerability deletion problem on the custom report policy.
- Fixed the vulnerability database issue that occurred because of a URL redirect problem.
- Fixed the internal server error on the Audit logs’ list endpoint.
- Fixed the issue of email notifications when a new scan is launched.
- Fixed the typo on the OAuth2 settings page.
- Fixed the issue updating timeout issue.
- Fixed the issues API endpoint on the updating and sorting.
- Fixed the tagging issue with the Azure Boards integration that the tag appeared on the Azure board although there is no tag entered on the Invicti side.
- Improved the web app and agent communication.
- Updated the docker agent package for the 64-bit process.
- Fixed the bug that threw an object reference error while trying to end the scans that exceeded the max scan duration.
- Fixed the Classless Inter-Domain Routing (CIDR) transformation issue for the discovery service.
- Fixed the discovery service crawling issue.
- Fixed issues that caused erroneous reports.
v23.3.0 - 16 Mar 2023
This release includes new features, security checks, improvements, and fixes. We added an option to exclude an issue's history to improve report generation. We added new security checks and improved existing checks. We also improved the web application's performance. We also fixed some bugs.
New features
- Added the Maximum 404 Signatures field to scan policies.
- Added an option to exclude issues’ history from reports.
- Added an option to set a timeout value for agents to be set as Unavailable if they are stuck
New security checks
- Added the JSON Web Tokens detected check.
- Added JWT Token Forgery through Kid by using static files.
Improvements
- Improved the JSON Web Tokens’ vulnerability logic.
- Updated JWT Token Forgery check condition.
- Extended excluded header names with new headers.
- Improved the JWT Token Finder Regex in the JWT engine.
- Updated the embedded Chromium browser.
- Added the permission check to download reports.
- Added a parameter (ImportedLinks) for imported links to the /scanprofiles/new API endpoint.
- Improved the global dashboard performance.
- Added records limit to avoid Out-of-Memory exceptions on reports.
- Added the link scope check for the user-controllable cookie vulnerability.
- Improved the default browser settings to be reflected in the business logic recorder (BLR).
- [Early Access] Created a queue to store scan results and register results asynchronously.
- Improved the web app and agent communication.
- Improved the performance of the scan report API endpoint.
Fixes
- Fixed an issue that caused unhandled exceptions when there is no service endpoint definition in the WSDL file.
- Fixed accessibility issue in the scan optimizer pop-up.
- Fixed special character problems in Crawled and Scanned URLs reports.
- Fixed “file in use error” while archiving scan logs.
- Fixed the OAuth 2.0 authentication problem caused by the failure to get code information and certification validation in out-of-scope links. Fixed missing cookies for the JSON Web Tokens attack requests.
- Fixed the text parser extension issue that caused agents stuck.
- Fixed the vulnerability family issue that caused the Hawk not to detect issues.
- Fixed the bug that threw an error when the Require SAML assertions to be encrypted checkbox is not selected on the Single Sign-on page.
- Fixed a bug that caused scans to be canceled unexpectedly.
- Fixed a bug that caused scans to terminate prematurely due to incorrect time settings.
- Fixed the exception issue for the internal authentication verifier.
- Fixed the cloud agent issue that was stuck in the launching stage.
- Fixed the host unavailable issue that was thrown for sub-target URLs.
- Updated the docker agent package for the 64-bit process.
v23.2.0 - 28 Feb 2023
This release includes improvements and fixes. We added a new API endpoint and improved integrations and scan compression algorithm. We also addressed several issues, including bug fixes in Docker scanner agent, Linux agents, and Hawk
Improvements
- Improved the Technologies page for detailed version information of technologies identified.
- Improved the target website deletion process to prevent any errors because of instantaneous action.
- Improved the scan compression algorithm.
- Add a new API endpoint (
api/1.0/issues/summary
) for better issue reporting. - Added
/api/1.0/scans/validate-imported-links-file
to retrieve errors in the imported links. - Added the last revived date parameter to the All Issues API endpoint.
- Improved the API endpoint to create team members and update their information.
- Improved the maximum scan duration to stop only those scans with the Scanning status.
- Added a token matching rule when it is required to get the token from a website other than the target URL.
- Added secure attribution for cookies.
- Added interval for Update Agents’ list on the installation wizard.
- Added the GUID control before getting the integration id to prevent any issue in the flow.
- Updated the scan control center to drop the difference between the unsuccessful resuming and pausing status.
- Improved the detection of whether the Jira instance is on the cloud or on-premises.
- Improved the ServiceNow Incident Management integration.
- Added active scan check when deleting an authentication profile.
- Improved the Invicti web application performance.
- Improved the website deletion process to block access to the associated file of the deleted website.
- Improved the Jira integration to add the Affected Versions as an option.
- Updated the TeamCity plugin that requires the Server URL and Domain URL to be the same.
- Improved the vulnerability report in which any credit card information is masked.
- Added the Authentication Verifier Service’s IP address to the setting to prevent it from being affected by the IP Restrictions.
- Improved the agent’s configuration file to specify a folder where the agent’s scan data is to be saved.
- Fixed case sensitivity when checking HTTP headers for JSON Web Tokens.
- Fixed missing CSP 3 Directive.
- Changed the Second Level Domain option on the Discovery Service to disabled by default.
- Improved the scanning of Burp files that are without XML extensions.
Fixes
- Fixed the scanner agent issue where the Linux agents failed because of TLS as a result of breaking changes in .NET 5.
- Fixed the configuration issue in a Docker scanner agent.
- Fixed the Hawk validation issue.
- Fixed the issue in the IAST installer that threw an error message despite successful installation.
- Fixed the basic authentication issue that threw an error although the credentials are correct in the scan profile.
- Fixed the business logic recorder issue that prevented the recorder to play recorded steps during a scan.
- Fixed the inconsistent number of vulnerability counts by severity information on the scan report page.
- Fixed the vulnerability serialization issue that caused the out-of-memory error.
- Fixed the scan scope issue that does not load the scan scope correctly on the first try.
- Fixed the scan profile issue that failed to register the database selected on the scan optimization page.
- Fixed the corrupted scan data ZIP file downloaded via an API endpoint.
- Fixed the silent installation issue in which the installation path cannot be located.
- Fixed the business logic recorder issue where the session is dropped because of a cookie.
- Fixed the sitemap issue that fails to show the site map after the scan.
- Fixed the null reference exception thrown in the new installation.
- Fixed the issue that fails to render the API document’s index page.
- Fixed the bug that threw an error when exporting a report.
- Fixed a bug that prevents the scanner from attacking to login and logout pages.
- Fixed the synchronization issue for the Discovery Service.
- Fixed an issue about header encoding that cause false positive CSP reporting.
- Fixed an issue that caused unhandled exceptions when there is no service endpoint definition in the WSDL file.
- Fixed null reference error during the SCIM User creation.
- Fixed the user interface issue to reflect the agent information on the Installed Framework accurately.
- Fixed the Hawk URL issue that is changed after the scan policy update via an API endpoint.
- Fixed the bug that throws a null reference exception at the authentication.
- Fixed the inconsistent risk level on the generated reports.
- Fixed the bug that throws a null reference exception at the authentication.
- Fixed the IPv6 registered website resolution issue thrown before scanning.
- Improved the maximum scan duration detection.
- Fixed the scheduled scans not being exported issue from Invicti Standard to Invicti Enterprise.
- Fixed the bug in which OAuth2 settings were not transferred properly from the web application to the agent.
- Fixed the bug that throws a null reference exception at the authentication.
- Increased the time out for the cloud PDF converter to prevent timeout-related errors.
Removed
- Removed the PCI DSS scan option on the New Scan page.
v23.1.0 - 17 Jan 2023
This release includes new features, new security checks, improvements, and fixes. We added a control center to suspend scans in case. We added security checks for MongoDB and Text4Shell. We also improved integrations, business logic recorder, notification rules, docker agent, and many more. We also fixed some bugs.
New features
- Added a scan control center to suspend all scans, and pause and resume all scans when needed.
- Added a feature to generate a report for vulnerabilities identified across a website group.
- Added an API parameter to choose among agent groups to launch an incremental scan. [API-only]
- Added an option to determine how long Invicti stores scan data.
- Added auto-GraphQL test after endpoint is detected.
New Security Checks
- Added MongoDB Time-based (Blind) Injection.
- Added SQLite Boolean SQL Injection.
- Added MongoDB Error-based Injection.
- Added the Text4Shell (CVE-2022-42889) check.
Improvements
- Improved the Jira integration.
- Improved the ServiceNow Incident Management.
- Added the report option to the Jenkins integration.
- Improved the notification rule scope.
- Updated embedded Chromium browser.
- Updated the docker scanner agent.
- Added an option to block navigation on SPAs pages.
- Added an option to export the PCI DSS scan report even if it fails the scan.
- Improved the scan report page’s performance.
- Upgraded the TeamCity plugin.
- Added an option to include the IAM Role to the Cloud Provider settings.
- Improved the SSO to inform users about the expired SAML certificate.
- Removed the target URL health check that lets the scan continue despite getting error messages such as 403.
- Added URL validation check for the authentication verifier settings.
- Added the information message when users want to delete the preferred agent configured to a scan.
- Improved the scan profile to edit Basic, Digest, NTLM/Kerberos, and Negotiate Authentication while starting a new scan.
- Updated the text on the GraphQL Instropection pop-up.
- Updated the Basic Authentication message for the internal authentication verifier agent.
- Improved the scan profile feature, so any updates on a scan profile are to be reflected on the scheduled scans, incremental scans, and retests.
- Added information for stuck agents where the scan failed because of the agent’s deletion.
- Improved the Activity Log page to list any changes on the general settings.
- Improved the user agent to add custom user agents.
- Improved the Basic, Digest, NTLM/Kerberos, Negotiate Authentication to inform users on the test credentials page whether this authentication is required or not.
- Improved the required information for the Kafka integration.
- Improved the raw scan file expired information message.
- Added notification to warn users if they are creating a vulnerability profile that exists on the report policy.
- Added content and return type to the scans/report and scans/downloadscanfile API endpoint.
- Added the .gql to the supported file types for the import link.
- Improved the Trend Matrix Report exporting to include the severity information as well.
- Improved the HashiCorp integration to authenticate with user tokens, too.
- Added a name validation for adding a new member’s name and editing a member’s name.
- Improved the global dashboard performance.
- Added an active scan check before deleting a scan profile related to that active scan.
- Improved the importing link to parse the complex example value for RAML.
- Added the support for browser flag.
- Improved the website dashboard performance.
- Added the attack option for Cross-site Request Forgery (CSRF).
- Added the required tooltip for the Value field of the Kafka integration.
- Added an explanation for the failed requests error.
- Added name variable support for Passive and Singular Custom Security Checks.
- Added auto responder for images to escape the onerror issue.
Fixes
- Fixed the business logic recorder issue that prevented the recorder to play recorded steps during a scan.
- Fixed the internal agent update issue that is stuck in the updating process.
- Fixed the deserialization problem when importing the scan session.
- Fixed the CSP analyzer Regex enumeration problem.
- Fixed the stateless link uncrawled that is waiting for the resource finder.
- Fixed the issue with updating Linux agents from versions older than 2.0.2.155.
- Fixed the SQL timeout issue when the reporting date page is too large.
- Fixed the retest issue.
- Fixed the Shark validation issue that threw exceptions while validating.
- Fixed the issue of adding emails with special characters to the Notification.
- Fixed a bug that caused the scan session failure when the scan is paused and resumed.
- Fixed a bug that causes server error when expired integration is cloned.
- Fixed an issue where the Due Days for FreshService integration is displayed as required despite being optional.
- Fixed an issue that prevented the Authentication Verifier Server from communicating with the web application when the IP Restriction is enabled.
- Fixed a bug that disabled the Send To button on the All Issues page when users select edit but navigate back to the page.
- Fixed a bug where DefectDojo automatic issue import is not working.
- Fixed timeout issues during website DNS checking.
- Fixed an issue where a JavaScript Setting option blocks inputs for the single-page applications to be reported in the Web Pages with Inputs node.
- Fixed the improper path parsing when a postman collection file is imported.
- Fixed a bug that caused the browse section to continue appearing on the Links/API definition page after the import process is canceled.
- Fixed the null return upon the “GET /scans/list-scheduled” API call.
- Fixed the late formation folder size issue.
- Fixed a bug that does not show the status change drop-down on the scan report page when zoomed in.
- Updated the Unfuddle Integration where optional fields have “required” text.
- Improved the IP Restriction Infrastructure.
- Fixed failed scans where the Target URL is IPv6 and starting with ::1
- Fixed the null reference problem issue while using the 3-legged flow type for OAuth2.
- Fixed the Chrome version number on the custom script editor while using an internal authentication agent.
- Fixed the GraphQL retest bug that showed a different request count.
- Fixed the single sign-on issue that prevented users from using SSO.
- Fixed the Jenkins plug-in integration so that it can work after the Log4j update.
- Fixed the maximum scan duration bug when set in the user interface and API endpoint.
- Fixed the tooltip color on the scan status page.
- Fixed the ServiceNow API endpoint issue.
- Fixed the Nuget package version issue.
- Fixed the required attribute for the category on the ServiceNow Incident Management integration.
- Fixed the website’s exporting to CSV issue when sorted by description.
- Improved the scan status that running scans will be set as Failed if their Scanner Agent is Not Available or Terminated.
- Fixed the deleted vulnerability issue while creating a scan report.
- Improved the site map and vulnerability synchronization.
- Fixed the Exclude Authentication Pages option on the scan scope when configuring an authentication profile.
- Fixed a bug that corrupts the header authentication credentials after updating the scheduled scan.
- Fixed the status information showing different data on the Discovered Webpages page.
- Fixed the Docker Agent build fail because of the compiler package.
- Fixed the Total Elapsed and Average Time values displaying 00:00:00 on the Scan Performance tab of the Technical Report.
- Fixed the time values displaying 00:00:00 on the Crawling Performance node of the Technical Report.
- Improved the GraphQL scanning to include the separated comment lines in GraphQL files.
- Fixed the Authentication Verifier Agent’s time zone bug.
- Fixed an issue that results in false positive Cross-site Scripting (DOM-based).
- Fixed the bug that duplicates the login page when users try to revalidate the login form.
- Improved the Authentication Verifier Agent to work with self-signed SSL.
- Fixed the bug on the user interface of ServiceNow Incident Management integration that caused issues with the On Hold status.
- Fixed the bug on the user interface of ServiceNow Incident Management integration that caused issues with the Closed status.
- Improved the Azure Pipeline Extension to generate a scan report on the release pipeline.
- Fixed the Single Sign-on – encryption certification issue.
- Fixed the web security issue for the origin header problem.
- Fixed the sitemap bug that caused missing information when imported.
- Fixed the bug that threw an error, as HTTP Requester deletes the whole body part of the request which contains the login credentials.
- Fixed highlighting CSP Directives in different header issues.
- Fixed duplicate bearer tokens for some requests.
- Updated Liferay Portal signature & added a mapping for version conversion.
- Fixed an issue that resulted in false positive Cross-site Scripting (DOM-based).
- Fixed the bug that shows the previous version of VDB.
- Updated Vulnerability Detection Logic in the JWT engine.
- Fixed parseable false attack patterns place.
- Fixed the comma issue that appeared when the scan is launched with the Header Authentication.
- Fixed the internal agent issue in which the scan is stuck after the scan is canceled.
- Fixed the issue that showed the wrong country flags for country phone codes.
- Fixed the product name in lowercase for those customers using Turkish Windows OS.
- Fixed the issue in which the authentication verifier agent is not listed after the time zone is changed.
- Improved the authentication verifier configuration file to support using the plus (+) for space encoding.
- Improved the log for the knowledge base report.
- Fixed the mistaken information on the retestable vulnerabilities.
- Fixed the fix calculation bug in the Issues API endpoint that occurred when scan(s) are deleted.
- Fixed the issue that deleted the customization folder in the agent’s folder after the update.
- Fixed the bug that displayed different method icons on the technical report page.
- Fixed the bug in sending issues to Mattermost.
- Fixed the Slack integration issue that failed to send notifications.
- Fixed the inconsistent discovered website result by handling null values.
- Fixed a bug that prevented the PCI scan from running ever again if any previous PCI scan failed to start.
- Fixed the Business Logic Recorder issue that prevents login when there is a custom script for the form authentication.
- Improved the creation of websites via the Discovery Service to include the port numbers and the URL.
- Fixed a bug that displayed vulnerabilities without their id on the website and global dashboard page.
- Fixed WSDL parse issue for non-defined object types.
- Fixed the null reference exception on HTTP Requester.
- Fixed the internal agent update issue that is stuck in the updating process.
- Fixed the attribute issue that prevented the Discovery Service from running the discovery properly.
- Fixed the agent stuck issue when the target link scan timeout is detected.
- Fixed an issue that overwrote TLS settings available in the scan policy when the Ignore SSL Certificate Errors is set to True in the Appsetting.json file.
v2.4.2 - 09 Nov 2022
This release includes a fix for scanner agents.
Fixes
- Fixed the Out of version range issue for the scanner agents.
v2.4.1 - 25 Oct 2022
This release includes the notification improvement.
Improvements
- Improved the notification rule scope.
Fixes
- Fixed the user agent version on the request tab of the scan policy.
- Improved the scan status that running scans will be set as Failed if their Scanner Agent is Not Available or Terminated.
v2.4 - 12 Oct 2022
This release includes new features, improvements, and fixes. We added the Business Logic Recorder, Azure Key Vault, and GraphQL library detection support. We improved the Authentication Verification Service, support for internal secrets and encryption management services, and running scanners agents on AWS among others. Also, we fixed some bugs.
NEW FEATURES
- Added the Business Logic Recorder feature in Invicti Enterprise, so you can scan web applications without extensive manual work or additional non-automated tools.
- Added support for Azure Key Vault.
- Added GraphQL Libraries detection support.
- Added built-in DVWA policies to scan policies.
- Added the feature to tag discovered websites.
- Added Invicti Shark (IAST) to the Knowledge Base.
IMPROVEMENTS
- Improved the Authentication Verifier to work with .NET 6.0.
- [Breaking Change] Added support for on-premises versions of CyberArk, HashiCorp Vault, and Azure Key Vault. This requires an authentication verifier agent.
- Improved the Late-Confirmation Storage Mechanism to lower disc usage.
- Improved the rate limit for the All Issues API endpoint.
- Improved the Cloud Provider setting to enable the Linux ID Image.
- Added an API endpoint to better understand how many websites each user scanned.
- Added raw scan file expired status to the Scan Failure Reasons.
- Added the IsEnabled API endpoint for the OAuth2 setting.
- Updated the icons on the Trend Matrix page.
- Added logs to scheduled scans to identify the license issue when the scan couldn’t be launched.
- Improved the internal agent to check whether OAuth2 is enabled or not.
- Improved the agent’s language setting to prevent non-English texts from appearing on the scan results.
- Improved the Activity Log to include information on vulnerability profile changes.
- Improved the Scan Profiles API endpoint to include information on the imported URLs.
- Added integration failed status for the Secrets and Encryption Management services.
- Updated the scan agent update workflow. When there is a new update and users have more than one scan agent, the new version will be downloaded only once. Other scan agents will rely on this new package to update themselves.
- Added a drop-down to determine how many results to be displayed on a page.
- Added a new explanation for the api/1.0/scans/unschedule endpoint to clear any ambiguity
- Added a filter that checks the number of issues being displayed on the global dashboard.
- Improved the IP filtering on the discovered websites’ page.
- Updated the Splunk plug-in to prevent exporting unnecessary HTML information to the Splunk ticket.
- Added ‘Is Encoded’ option to OAuth2 parameters.
- Adding the Connection Timeout option to the scan policy.
- Improved the Knowledge Base tab in the technical report section for accessibility.
- Added the Browser Settings to scan policy.
- Added report policy migration process while relaunching scan session to prevent launch scan issue.
- Added a discovered date column for websites detected by the Discovery Service.
- Updated the Invicti Hawk’s redirection while validating the certificate.
- Added a timeout for website import. The default value for timeout is 400 ms.
- Improved the tooltip for security checks on the scan policy page to properly reflect the security policy selections.
- Updated the SCIM integration for provisioning on Azure Active Directory’s marketplace.
- Added the ability to bulk edit issues.
- Added the scan policy header to the OAuth2 requests.
- Improved JWT confirmation to avoid false positives.
- Added a new IAST vulnerability: Overly Long Session Timeout.
- Added new config vulnerabilities for the IAST Node.js sensor.
- Added new config vulnerabilities for the IAST Java sensor.
- Added support for detecting SQL Injections on HSQLDB.
- Added support for detecting XSS through file upload.
- Updated DISA STIG Classifications.
- Updated Java and Node.js IAST sensors.
- Improved the Content Security Policy Engine.
- Updated XSS via File Upload vulnerability template.
- Added Extract Resource default property to DOM simulation.
- Added an option to discard certificate validation errors on the Enterprise Integration window during SSL/TLS connections.
- Added the agent mode to the authentication request.
- Added a default behavior to scan the login page.
- Added a default behavior to disable TLS1.3.
FIXES
- Fixed the issue that the advanced installer enabled the Windows authentication.
- Fixed a bug with displaying cookie names in the scan policy.
- Fixed a Globally Unique Identifier bug that assigned zero to a custom vulnerability when identified.
- Fixed a bug that prevents editing an internal website.
- Fixed a bug that caused a broken website-scan relationship as a result of an inconsistent update.
- Fixed the inconsistent vulnerabilities listed in XML and CVS reports.
- Fixed the bug that caused the issues’ status to stay the same in the case of bulk editing.
- Fixed a bug on the user interface that showed incorrect scan status.
- Fixed an issue with global servers in imported Swagger files.
- Fixed a bug that adds duplicated users to a team when added using SCIM.
- Fixed the Azure board integration webhook issue caused by the status codes.
- Fixed a bug that prevents members with user-defined roles from being deleted.
- Fixed a bug that prevents the information displayed when users select Jira on the user mapping.
- Fixed a bug that prevents a notification from being sent to users when users filter the state.
- Fixed a bug that does not request to verify website ownership when the website’s agent mode is changed from internal to Cloud.
- Fixed a bug that causes showing an outdated vulnerability database version of an agent on the user interface.
- Fixed a bug that shows different information between Invicti Standard and Invicti Enterprise on the Known Issues of the Out-of-Date Node when the software composition analysis is run.
- Fixed a bug that does not show the website thumbnail when the scan is completed.
- Fixed an issue that causes custom vulnerabilities not to be added to the Vulnerability Lookup table.
- Changed filter for Groupable Custom vulnerabilities when creating vulnerability model.
- Fixed a bug that prevents a scan profile from being updated when users add a client certificate.
- Fixed a bug that threw an error when users tried to delete a scan policy.
- Fix a bug that prevents exporting a vulnerability list report in CSV or XML when Invicti Shark (IAST) is enabled.
- Fixed a bug while excluding cookies during the scan.
- Fixed a bug that prevents websites from being deleted.
- Fixed the Jazz Team Server multiple category issue.
- Fixed a bug that occurs when a detailed scan report does not report the CVSS scores for custom vulnerabilities.
- Fixed a bug that prevents editing the FreshService integration.
- Fixed the link that throws an error on the SCIM API documentation page.
- Fixed a bug that throws an exception when the agent is started in debug mode on IDE.
- Removed the space on CVSS Scores that caused incorrect values to show up.
- Fixed the parsing problem encountered when Burp and Postman files are imported via the Links/API Definition page.
- Fixed imported links DLL mismatch problem for GraphQL.
- Improved the scan agent to continue scanning in case of getting HTTP status errors like Forbidden, Unauthorized, and ProxyAuthenticationRequired for websites supporting TLS 1.3.
- Fixed a bug that causes scan failures if the scan profile name includes the “/” character.
- Fixed a bug that was caused by special characters that affected the Out of Scope node.
- Fixed a bug that caused the OAuth2 settings to disappear after being saved in a scan profile following enabling and disabling operations.
- Fixed a bug that throws errors on the summary page for technologies links.
- Fixed the issue that IP Address Restriction is not working on API access.
- Fixed an issue that shows the same vulnerabilities more than once in the scan summary reports.
- Fixed a bug that shows the soft-deleted scan policies when their URL is entered.
- Fixed a bug while excluding cookies during the scan.
- Fixed a bug that prevents notifications from appearing on the user interface when data size is exceeded.
- Fixed imported links DLL mismatch problem for Postman and GraphQL.
- Fixed a bug that shows the empty list of possible GraphQL endpoints in the Security Checks list.
- Fixed a bug that throws 500 Internal Server Error returns upon “GET issues/addressedissues” API call.
- Fixed a bug that throws 500 Internal Server Error returns upon “GET /issues/todo” API call.
- Fixed an issue that passive vulnerabilities were reported at out-of-scope links.
- Fixed an issue that imports global servers at Swagger files.
- Fixed an issue where the OK button disappears during interactive login.
- Fixed an issue that adds interactive login buttons to iframes.
- Fixed a null reference exception at the LFI exploit panel.
- Fixed basic authorization over HTTP bug.
- Fixed SQL Injection Vulnerability Family Reporting Bug.
- Fixed a bug in that the custom script throws a null reference exception when a script is added to the paused scan.
- Fixed a bug that deletes an authentication password when a new scan is started with a copied profile.
- Fixed a bug that causes the Sitemap to disappear during scanning with IAST.
- Fixed a bug that caused missing tables and values when a report policy is exported as an SQL file.
- Fixed an issue that causes the attack process not to be completed for a security check when there is an error occurred while attacking a parameter with an attack pattern.
- Fixed the LFI Exploiter null reference.
- Fixed a bug that occurs when a detailed scan report does not report the CVSS scores for custom vulnerabilities.
- Fixed a bug when the Log4J vulnerability profile is not migrated with the report policy migration.
- Fixed a bug that prevents the WSDL files from being imported.
- Fixed reporting “SSL/TLS not implemented” when scanning only TLS 1.3 supported site.
- Fixed a bug that throws an error for NTML authentication when the custom username and password credentials are provided when the system proxy is entered into the appsetting.json
- Fixed the bug that the passive vulnerabilities were reported from out-of-scope links.
- Fixed the issue that does not terminate the Chromium instances although the max scan duration is exceeded.
- Fixed the issue that automatically enables “Exclude Authentication Pages” after enabling form authentication.
- Fixed the bug that throws a null reference exception at the link pool.
- Fixed the bug that resulted in running many Chromium instances when a new scan is started.
REMOVED
- Removed the agent platform selection option for the internal agents from the user interface.
- Removed the Ignore these extensions field from the scan policies page.