v24.12.0 - 17 Dec 2024
New Features
- API Discovery now supports working with RAML specs from Mulesoft Anypoint Exchange
- API Discovery now supports retrieving Open API/Swagger specs from Kong Konnect → Learn more
-
Verifying the Hash Value for Package Integrity in Acunetix 360 On-Premises – see notes below
New Security Checks
- Added detection for multiple JavaScript libraries
- Added detection for Masa CMS (CVE-2022-47002 and CVE-2021-42183)
- Added a check for applications performing certificate name validation to prevent reading invalid memory addresses (CVE-2024-6119)
- Added detection of Google Tag Manager as a technology in the Vulnerability Database (VDB)
Improvements
- Changed the Mend integration to utilize an activation key so that the setup process is simpler
- Updated the AuthVerificationService from .NET 6.0 to .NET 8.0
- Enhanced security to prevent customer login information from being written in clear text
- OpenSSL configuration (openssl.cnf) updated for Docker compatibility
- Added a new filter in the Recent Scans page for Agent Mode in order to distinguish between Internal and Cloud agents
- Revised field descriptions in the Swagger model documentation to accurately reflect the use of the RequiredIf attribute
- Improved analysis and remediation capabilities for [Possible] Server-Side Template Injection vulnerabilities
- Fixed an issue with the implementation of AWS Lambda integration for HTML to PDF conversion in WebApp
Fixes
- Vulnerability profiles that are set as hidden will now still be reported in the scan reports of scans completed prior to the vulnerability being hidden
- Fixed a bug in the editing of scan profiles with custom report policies
- Resolved an issue in the exporting of team member data with all attributes selected
- Resolved an issue with missing vulnerability profiles in custom report policies
- Fixed an issue with missing links in imported files that were sent from the API Inventory to the agent
- Fixed an issue where target names longer than 40 characters were not being truncated as expected on the Create New Target page
- Fixed an issue where the “Download HTTP Request Logs” button triggered an error while a scan was in progress
- Fixed an issue where user names containing the character “ä” could not be added
- Fixed an issue with the scan data retention period for raw scan files that was not working as expected
- Fixed missing scan completed notifications with report attachments
- Fixed an issue where adding more than one name to a Notification’s Excluded Recipients would remove the other users from all other notifications
- Fixed an issue where the verifier agent could not read or apply custom proxy settings from the appsettings.json file
- Fixed an issue where uploading a .proto file caused a “No links found in the file” error
- Fixed missing request/response details for some out-of-band vulnerabilities
- Resolved a breaking change in .NET 8’s System.Net.Security.UseManagedNtlm by upgrading from Ubuntu 22.04 to Ubuntu 24.04, where the issue was addressed. The Agent was updated to .NET 8.
- Fixed an issue where Retest-type scans did not identify the same vulnerabilities detected during full scans
- Fixed high CPU usage in some agents caused by Chromium
- Scans attempting to run with Agent Group without any agents will result correctly in failure instead of queue
- Fixed an issue that was preventing users from accessing a Scan Policy
- Fixed an issue where the Misconfigured Access-Control-Allow-Origin Header vulnerability was not detected
- Removed the [Possible] Password Transmitted over Query String vulnerability
- Fixed an issue with URL and port validation for the IAST Bridge on WebApp OnPrem
- Fixed a minor typo in the Slack integration documentation
Notes for Acunetix 360 On-Premises Upgrade: .NET 6 to .NET 8
Impact
With the 24.12.0 release, Acunetix 360 upgraded from .NET 6 to .NET 8. This upgrade may affect customers using agents on certain Linux distributions due to changes in operating system dependencies.
As a result, agents might not function correctly on unsupported versions of Linux after the upgrade.
Why Is This Happening?
Microsoft has deprecated .NET 6, and upgrading to .NET 8 is mandatory for Acunetix 360 to maintain compatibility and support.
Solution (Customer Action Required)
Customers must verify the Linux version on which they are running Acunetix 360 Agents:
- If using Ubuntu 24.04 or higher: No action is required.
- If using RHEL 8 or higher: No action is required.
- If using an older version (Ubuntu <24.04 or RHEL <8):
- Option 1: Upgrade to Ubuntu 24.04 or RHEL 8 (or higher).
- Option 2: Disable auto-upgrade until the system is updated to a supported version.
Note
We will automatically disable auto-upgrade for affected agents. Customers should not re-enable auto-upgrade until they have upgraded to a supported version of Linux.
Notes for Verifying the Hash Value for Package Integrity in Acunetix 360 On-Premises
The hash value for the “24.12.0.zip” file is provided below. You can verify the integrity of the file by checking its hash value using one of the methods outlined above:
Hash Value: 9957D4DA135F6DA98D61ABAA947C49D88E72A6C753740094F206AAD74A4C3042
Methods to Verify the Hash Value:
PowerShell (Windows):
Get-FileHash -Path "24.12.0.zip" -Algorithm SHA256
Command Prompt (Windows):
certutil -hashfile "24.12.0.zip" SHA256
Linux or macOS:
sha256sum "24.12.0.zip"
You can use any of the above methods to verify the hash value and ensure the integrity of the “24.12.0.zip” file.