-
Acunetix v24.10.241106172 - 07 Nov 2024
New Features
- API Discovery now supports retrieving OpenAPI/Swagger specs from Azure API Management → Learn more
- Added support for automated use of OTP in scans, enabling seamless scanning of 2FA-enabled web applications → Learn more
- API Discovery now supports working with RAML specs from Mulesoft Anypoint Exchange
Improvements
- Added the latest checks for outdated technology versions
- Optimised various Directory tests to make less HTTP requests
- DeepScan update which improves scan coverage and consistency
- Minor UI improvements across the app
- Removed redundant configuration option in API Discovery integration with Amazon API Gateway
Fixes
- Fixed a single occurrence edge case when a scan was crashing
- Fixed incorrectly reporting Application Build in RuntimeSCA reportss
API Changes
- Corrected the baseURL for EU customers in our API documentation
-
Acunetix v24.9.241015145 - 17 Oct 2024
New Security Checks
- Added check for CVE-2024-6842
Improvements
- Upgraded to OpenSSL
- Updates to technologies and fingerprints
-
Acunetix v24.9.240918130 - 19 Sep 2024
This release build is currently only available for Acunetix On-Premises
New Security Check
- Apache OFBiz RCE (CVE-2024-45195)
- Apache OfBiz Authz Bypass (CVE-2024-36104, CVE-2024-38856)
Improvements
- Updated Chromium to v128.0.3316.119/.120
- The scanner now supports GraphQL when described in introspection JSON
- The upgraded Scan Details page is now enabled for On-Premises customers as well → Learn more
-
Using API Discovery On-Premises, the admin can specify a destination URL for the Network Traffic Analyzer con
Fixes
- Fixed a false positive in the Solr Injection check
- Resolved a rare case where the vulnerability detail was not loading properly on the new Scan Details page
- Runtime SCA PDF reports are now being generated correctly
- The scan end timestamp is now loading properly on the new Scan Details page
-
Acunetix v24.8.240903137 - 04 Sep 2024
Fixes
- Fixes on the HTTP/2 Handler
-
Acunetix v24.7.1 - 24 Jul 2024
NEW SECURITY CHECKS
- Added detection for Mura Masa SQLi (CVE-2024-32640)
Fixes
- Fixed a False Positive on the ‘Broken access control in Confluence Server and Data Center’ vulnerability (CVE-2023-22515)
-
Acunetix v24.7.0 - 16 Jul 2024
New Features
- Invicti API Security: multi-layered API discovery to enable comprehensive identification of known and undocumented APIs → Learn more
New Security Checks
- Argo CD Information Disclosure (CVE-2024-37152)
- Apache OFBiz SSRF (CVE-2023-50968)
- Apache OFBiz RCE (CVE-2024-32113)
Improvements
- Scanner: Improved processing of large files
- Added support for HTTP/2 requests in Burp state import files
- .NET IAST Sensor: Added support for Engine.Razor functions
- Improved XFS checks
- Improvements to the new Scan Detail page (Early Access)
Fixes
- Minor UI/UX fixes across the application
-
Acunetix v24.6.1 - 02 Jul 2024
SECURITY CHECKS
- Remote Unauthenticated Code Execution Vulnerability in the OpenSSH server (CVE-2024-6387)
- Magento XXE (CVE-2024-34102)
Fixes
- Fixed an issue with the Discovery service in On-Premises environments
-
Acunetix v24.5.240529155 - 30 May 2024
New Features
- Added the ability to link an API definition URL for adding paths to a target before scanning. Read more about how to add paths to targets and how this helps scanning.
New Security Checks
- XWiki Platform RCE (CVE-2023-37462)
- Dolibarr DB Theft (CVE-2023-33568)
- ChatGPT-Next-Web SSRF (CVE-2023-49785)
- OpenMetadata Auth Bypass (CVE-2024-28255)
- Progress Kemp LoadMaster RCE (CVE-2024-1212)
- Coldfusion Arbitrary File Read (CVE-2024-20767)
Improvements
- Fixed the password reset tool for Windows for Acunetix On-Premises
- .NET Core IAST Sensor: Removed dependency on NLog
- Various improvements in Deepscan, lessening the time to process pages / SPAs
- Deepscan updated to not interact with Google Maps
- Updated detection for monitoring systems
- Updated detection of web installers
Fixes
- Correct warning is now displayed when attempting to add more than permitted target variations
Addressed several usability and design issues across application settings - Fixed a possible problem starting OpenVAS scans with Acunetix On-Premises
- Design updates for User settings in Acunetix Online
- Fixed an issue in the PHP sensor affecting PHP 8.1+ web applications
- For users in a User Group, target group assignment is properly applied under all scenarios
- Fixed a user permission issue when using custom roles
- Invite emails from Acunetix On-Premises for Linux are properly displaying content now
- Fixed the OOM (out of memory) problem when processing large PDF files
-
Acunetix v24.3.2 - 15 April 2024
Improvements- Replaced an expiring Invicti Signing Code Certificate for Windows binaries
-
Acunetix v24.4.240427095 - 30 April 2024
New Features
- Added the ability to link an API definition URL for adding paths to a target before scanning. Read more about how to add paths to targets and how this helps scanning.
New Security Checks
- XWiki Platform RCE (CVE-2023-37462)
- Dolibarr DB Theft (CVE-2023-33568)
- ChatGPT-Next-Web SSRF (CVE-2023-49785)
- OpenMetadata Auth Bypass (CVE-2024-28255)
- Progress Kemp LoadMaster RCE (CVE-2024-1212)
- Coldfusion Arbitrary File Read (CVE-2024-20767)
Improvements
- Fixed the password reset tool for Windows for Acunetix On-Premises
- .NET Core IAST Sensor: Removed dependency on NLog
- Various improvements in Deepscan, lessening the time to process pages / SPAs
- Deepscan updated to not interact with Google Maps
- Updated detection for monitoring systems
- Updated detection of web installers
Fixes
- Correct warning is now displayed when attempting to add more than permitted target variations
Addressed several usability and design issues across application settings - Fixed a possible problem starting OpenVAS scans with Acunetix On-Premises
- Design updates for User settings in Acunetix Online
- Fixed an issue in the PHP sensor affecting PHP 8.1+ web applications
- For users in a User Group, target group assignment is properly applied under all scenarios
- Fixed a user permission issue when using custom roles
- Invite emails from Acunetix On-Premises for Linux are properly displaying content now
- Fixed the OOM (out of memory) problem when processing large PDF files
-
Acunetix v24.3.2 - 15 April 2024
Improvements- Replaced an expiring Invicti Signing Code Certificate for Windows binaries
-
Acunetix v24.3.0 - 25 March 2024
New Features
- Smart API Scanning capabilities for Swagger 2
- Smart API Scanning capabilities for OpenAPI 3
New Security Checks
- Jira Seraph Authentication Bypass (CVE-2022-0540)
- Jira QueryComponent Information Disclosure (CVE-2020-14179)
- TeamCity Authentication Bypass (CVE-2024-27198)
- Kramer VIAware RCE (CVE-2021-36356/CVE-2021-35064)
- Cacti Unauthenticated Command Injection (CVE-2022-46169)
Improvements
- Improved Crawling of websites using IFrames
- .NET IAST sensor will report SQL Injection issues introduced through the usage of MSSQL Entity Framework Sql_Query
- Improved detection of DOM XSS in Referrer Header
- Improved detection of DOM XSS in document.cookie
Fixes
- Fixed a situation when a new target couldn’t be created via API
Fixed: Missing HTTP response for vulnerabilities reported by internal scanning agent - Fixed: Missing Attack Details for Unsupported SSL Secure Renegotiation vulnerability
-
Acunetix v24.2.240227118 - 28 Feb 2024
Fixes
- Invitation emails are being sent correctly
- Discovered assets can be correctly assigned to target groups
-
Acunetix v24.2.240226074 - 26 Feb 2024
New Features
- Added the ability to use Aria Roles to provide better coverage
- Introduced PCI DSS 4.0 report. Note that PCI DSS 3.2 will reach the end of its support or relevance by the end of March
- .NET IAST now supports .NET 8 (currently in Open Beta)
New Security Checks
- XXE in Ivanti Connect Secure, Policy Secure and Neurons (CVE-2024-22024)
- Magento 2.0-2.3 End of life
- ColdFusion Access Control bypass (CVE-2023-29298 / CVE-2023-38205)
- ColdFusion XSS (CVE-2023-44352)
- Skype for Business SSRF (CVE-2023-41763)
- VMware Aria Operations for Networks RCE (CVE-2023-20887)
- IBM Aspera Faspex RCE (CVE-2022-47986)
- GeoServer SSRF (CVE-2021-40822)
- WSO2 Management Console XSS (CVE-2022-29548)
- SSRF in Ivanti Connect Secure, Policy Secure and Neurons (CVE-2024-21893)
- LISTSERV XSS (CVE-2022-39195)
- Unrestricted access to MLflow
- KeyCloak Information Disclosure (CVE-2020-27838)
- CloudPanel file-manager Auth bypass (CVE-2023-35885)
- TestRail Information Disclosure (CVE-2021-40875)
- Grafana Snapshot Authentication Bypass (CVE-2021-39226)
- Harbor Unauthorized Access Vulnerability
- Ghost CMS Theme Path Traversal (CVE-2023-32235)
- cPanel XSS (CVE-2023-29489)
- GoAnywhere MFT Authentication Bypass (CVE-2024-0204)
- Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core API Auth bypass (CVE-2023-35082)
- Unauthenticated OGNL injection in Confluence Server and Data Center (CVE-2023-22527)
- Authentication Bypass in Ivanti Connect Secure and Policy Secure (CVE-2023-46805)
- RCE in Ivanti Connect Secure and Policy Secure (CVE-2024-21887)
- GeoServer WMS SSRF (CVE-2023-43795)
- Ivanti Sentry Authentication Bypass (CVE-2023-38035)
- SAP SAP BusinessObjects Business Intelligence Platform XXE (CVE-2022-28213)
- SysAid On-Premise RCE (CVE-2023-47246)
- Multiple ColdFusion WDDX Deserialization RCEs (CVE-2023-44353 / CVE-2023-38203 / CVE-2023-38204)
Improvements
- Updated Chromium to 121.0.6167.139/140
- Improved detection of DOM-based Cross Site Scripting (XSS)
- Improved the way that “Content Security Policy Misconfiguration” alerts are reported
- Improved detection of Client Side Prototype Pollution (CSPP)
- IAST scans will start reporting the IAST sensor version used for the scan
- New column “Result” is shown in the list of scans to provide more details about scan outcome
- Enhanced support for OTP apps by displaying the activation code next to the QR code
- Improved crawling of Single Page Applications (SPA) that are using Ionic Framework
- Added the ability to scan web applications which require browsing in a single browser tab
- Upgraded user experience of in-app notifications – Updated UX of notifications dropdown
- When accessing the application from a different location or browser, all other sessions are promptly terminated. Previously, users were notified, causing inconvenience when working from various locations
Fixes
- Fixed a bug caused by the engine not respecting Cache-Control directive
- In rare situations, a report being generated could have resulted in an Internal server error. This issue has now been fixed
- Fixed several minor user experience issues across the application
-
Acunetix v24.1.240131143 - 01 Feb 2024
New Features
- The Java IAST sensor now supports Java 21
New Security Checks
- Added checks for jslib Lodash (CVE-2020-8203, CVE-2021-23337, CVE-2020-28500, CVE-2019-10744, CVE-2019-1010266, CVE-2018-16487)
Fixes
- Fixed a bug in the processing of technologies
-
Acunetix v24.1.240111130 - 11 Jan 2024
New Features
- The Java IAST sensor has been updated to support Java 17 and removes the requirement for AspectJWeaver
- Changes to the mechanism that manages services for Acunetix On-Premises for Docker and Linux (Customers using Acunetix On-Premises for Docker or Linux need to manually update to version 24.1)
New Security Checks
- Improved Elmah security check to check for variants of Elmah
- OpenCms Chemistry Solr XML External Entity (XXE) (CVE-2023-42346)
- OwnCloud phpinfo Information Disclosure (CVE-2023-49103)
- TorchServe Management API SSRF (CVE-2023-43654)
- Updated vulnerabilities for WordPress Core and WordPress plugins
- Ofbiz PreAuth RCE (CVE-2023-49070)
- F5 BIG-IP Request Smuggling (CVE-2023-46747)
- Sitecore XP TemplateParser RCE (CVE-2023-35813)
- Added a check for SSRF/LFI via PDF generation
- Added a check for file inclusion/path traversal when the response is shown inside a PDF
Improvements
- Updated .NET (core) IAST sensor to hook new functions
- The scanner will now properly report when the protocol (http/https) is changed at the start of the scan
- Increased the size limit to 10kB for supported Client Certificates for authenticated scans
- Updated to Chromium 119.0.6045.199/200
- Users can opt-in to receive a direct download link instead of a PDF report attachment (On-Prem only)
- Improved crawling of Single Page Applications (SPA) that are using React
- Improved crawling of Single Page Applications (SPA) that are using the Angular Framework
- Improved crawling of Single Page Applications (SPA) that are using the Vue.js Framework
- New User Profile design
- A refreshed UI with a new navigational experience
Fixes
- Fixed an issue that was causing some vulnerabilities not to be exported to Amazon AWS WAF
- Fixed a Deepscan and LSR issue caused when a page overrides the standard window.* methods
- Notifications about scans that require manual intervention are now correctly displayed wherever the user is located (On-Prem only)
- Fixed a number of scanner crashes
-
Acunetix v23.11.231130164 - 4 Dec 2023
Fixes- Fixed a bug in SSO workflow.
-
Acunetix v23.11.0 - 23 Nov 2023
New Features
- Every user can now choose which email notifications they receive by setting their individual preferences located in their User Profile
- For Acunetix On-Premises customers, email server settings have been moved under the Settings menu
- You can now open Acunetix on multiple tabs without needing to log in with every new tab you open
- We’ve added CVSS 4.0 scores to some vulnerabilities — You’ll find the CVSS 4.0 score and vector displayed next to the old score (3.1/3.0/2.0, whichever is highest) in the UI and API
- For Acunetix On-Demand customers, user management is now available under Settings > Users & Access. Here you’ll find the user list with some new filter options and a new way to create user accounts by generating an invitation link (the user specifies their own password instead of the administrator).
New Security Checks
- Added default JWT keys for Apache Superset: CVE-2023-27524
- Cisco IOS XE Web UI Authentication Bypass: CVE-2023-20198
- Cisco IOS XE implant detection: CVE-2023-20198
- Citrix NetScaler Information Disclosure – ‘Citrix Bleed’: CVE-2023-4966
Improvements
- Email notifications now have the option to include a direct link for downloading PDF report. Previously it was necessary to log in to Acunetix to download PDF report.
- Updated the Chromium Build to 119.0.6045.123/.124
- Enhanced IAST .NET sensor detection capabilities
- IImproved location detection when using LSR
- Improved scanner stability for select environments
- Improvements to handling OpenAPI specifications
- Multiple improvements to the SQL Injection vulnerability checks
Fixes
- Fixed an issue that was causing Amazon WAF exports to fail
PDF reports now display information that was previously being cut off
-
Acunetix v15.6.230505122 - 09 May 2023
New Security Checks
- Added SAML-related security checks.
- New security checks for Adobe ColdFusion affected by Deserialization RCE vulnerability. CVE-2023-26359/CVE-2023-26360
- New security checks for GraphQL.
- New checks for Joomla vulnerabilities.
Improvements
- Updated the embedded Chromium browser to v109.0.5414.141 for Windows and 112.0.5615.165 for Linux.
- Improved the Business Logic Recorder to work with autocomplete fields.
- Updated .NET IAST AcuSensor to avoid reporting false positives for default server misconfiguration.
- Improved .NET IAST AcuSensor for reporting vulnerable packages.
- Added support for file upload to the Login Sequence Recorder and Business Logic Recorder.
- Improved response handling.
- Various DeepScan Improvements.
- Improved the coverage of development file exposure check.
- Updated the Software Composition Analysis (SCA) database.
- Updated the WordPress plugin vulnerabilities.
Fixes
- Various fixes in the scanner to lower memory usage.
軟體更新資訊
Acunetix v24.10.241106172 發布消息-版本更新公告
- 日期:2024-11-07
- 分類:軟體更新資訊
更新消息