Various optimisations to Amazon S3 related scripts such as XXE and SSRF
Improved the script looking for possible sensitive files
XSS script can now find less common XSS variants such as double encode payloads
SQL injection script checks for other variants such as SQL injection in order by, group by
XSS script now checks for many user controllable tag attributes
Various optimizations in the generation of reports
Improved Server Directory Traversal script
Improved Host Header Attack script
Bug Fixes
Fixed JS errors that appear in HTTP editor.
Restricted links matching was not working in some situations.
Fixed the slow response time alert – moved alert details from description.
Fixed a false positive with Struts2_Development_Mode script.
Auto login crash if requests were failing after a long time.
Existing cookies from manual browsing were ignored by crawler.
Reduced some false positives in Backup file reporting.
Login Sequence Recorder will delete the cookies it collected in the wizard.
Crawler will use cookies from LSR in manual mode.
v9.5.20140602 - 03 Jun 2014
Copy LinkCopy Link
Build v9.5.20140602 - 3rd June 2014
New Features
Added a check for Open Flash Chart ‘ofc_upload_image.php’ Remote PHP Code Execution Vulnerability which affects various web applications including WordPress plugins, Joomla! components, piwik, and others
Added a script which checks for various known Drupal vulnerabilities (in Drupal modules and Drupal core)
Added a test for SFTP/FTP credentials exposure. Various SFTP/FTP clients are storing connection credentials in plain text files (such as sftp-config.json, recentservers.xml, etc.) that are later uploaded on the web server
Added a test for Parallels Plesk SSO (Single sign-on) XXE (XML External Entity) and XSS (Cross-Site Scripting) vulnerabilities
Added a test for systems running PHP versions < 5.5.12, 5.4.28 (multiple vulnerabilities fixed in these versions including the Heartbleed bug affecting PHP)
Added a test looking if the Elasticsearch service is accessible
Added a test for Elasticsearch remote code execution
Added a test for nginx SPDY heap buffer overflow (CVE-2014-0133)
Added a test for Oracle Reports vulnerabilities. These vulnerabilities allow an attacker to gain remote shell on the affected server
Added a test for XXE vulnerabilities in OpenID implementations, which is able to detect XXE vulnerabilities similar to the one found on Facebook recently
A knowledge base item is added each time a known web application is detected (e.g. WordPress web application was detected in directory /blog/)
Improvements
Scanning of WordPress sites has been made more efficient
Improved coverage of ASP.NET based websites
Improved XSS testing script
Bug Fixes
Fixed bug in the pagination of the Scheduler Web Interface
The Login Sequence Recorder was ignoring the maximum size HTTP option
Fixed an issue causing the crawler to create multiple entries of the same custom cookie.
Fixed a bug causing the HTTP sniffer to always listen on localhost
Fixed a bug in the console application preventing scanning from older saved crawl results.
Fixed a crash caused at start-up caused by the DeepScan agent not starting.
v9.0.20140115 - 15 Jan 2014
Copy LinkCopy Link
Build v9.0.20140115 - 15th January 2014
Improvements
WVS will warn user if the login sequence failed to make a successful login and disables the login steps.
Various improvements in the detection of Blind SQL Injection
Various improvements in DeepScan
Better handling of web servers that don’t send HTTP headers in the response (HTTP 0.9)
Improved Readme Files script
JSON parser can now handle unnamed inputs
Bug Fixes
XSS vulnerabilities are no longer reported if the initial request is redirected to another host
Fixed an issue with the Crawler depth limitation
Fixed issue with Crawler request counter when used with login sequence
“Add to request” function in HTTP Editor was not working in raw HTTP request tab
Fixed a bug that was causing false positives in the JavaScript Libraries Audit script
Fixed some false positives in Possible Sensitive Directories script.
v9.0.20131216 - 16 Dec 2013
Copy LinkCopy Link
Build v9.0.20131216 - 16th December 2013
New Features
Added a new Compliance Report Template for PCI 3.0
Added support for HTML5 button of type submit (which acts as an HTML input of type submit).
Added a test for Ruby on Rails CookieStore Session Cookie Persistence vulnerability
Added filename (from file uploads) as an input scheme for a number of tests (XSS, Directory Traversal, SQL Injection, XXE Injection and others)
Implemented a test looking for Java Authentication and Authorization Service (JAAS) authentication bypass (when using a security-constrain section with http-method definitions).
Now it’s possible to read cookie information from scripting (getCookies function).
Implemented a test which checks for JavaScript libraries with known vulnerabilities.
Added a new console parameter /Timestamps to print the current timestamp with each console output line.
Improvements
Improved test for WordPress OptimizePress Theme file upload vulnerability.
The scanner will now indicate that a scan can take long time to complete, allowing the user to tweak the scan settings if needed.
Various improvements to the Login Sequence Recorder
Improved the test looking for possible form caching (look for missing “pragma: no-cache” header).
It is now possible to use multiple input values for HTML inputs using the format: $(choice1,choice2). These can be configured from Configuration > Scan Settings > Input Fields.
Speed improvements gained by streamlining the number of requests performed by some checks.
Better handling of some uncommon HTTP status codes.
The user-agent of the Login Sequence Recorder can now be configured to use the one configured in WVS (by default, it uses Internet Explorer)
Directory Traversal script now provides better handling of Java Web Applications.
Improved the calculation of the average response time during a scan
Bug Fixes
Sites with a high response time were showing incorrect scan statistics.
Fixed rewrite detection on nginx servers with phpfastcgi.
Fixed some false positives in SQL Statement in comment.
Better handling of very long VIEWSTATE strings.
Improved handling of Windows based websites by providing better support for case insensitive filesystems
Scan from HTTP Proxy log entry was not working correctly
Fixed a crash caused by specific characters in the URL Encoded Post Data
Fixed a false positive in Script_Source_Code_Disclosure.script
Fixed some false positives in error messages.
Web Services: fixed Out of Bounds error when importing invalid WSDLs.
Added a test that checks for Microsoft IIS server service.cnf file
Improvements
Improved XSS testing script.
From an alert, clicking on the affected file takes the user to the file in the site structure. This is useful when additional information on the affected file is required (such as the referrers in the case of Broken links, or the source of the web page)
DOM XSS alerts will include more information (such as the HTML written for document.write)
Improved Code Execution script to find more specific issues and reduce the number of requests performed
Bug Fixes
Fixed an issue causing application deadlock.
Fixed false positives shown in broken links
Fixed some false positives with Script_Source_Code_Disclosure.script
Fixed DOM XSS false positives
Fixed an issue with Analyze_Parameter_Values script causing the script not to parse relative paths correctly
Fixed false positives with Slow HTTP Denial Of Server script