Acunetix Web Vulnerability Scanner build 14.2.210503151
Acunetix Build History
Version 14 build 14.2.210503151 for Windows, Linux and macOS – 4th May 2021
New Features
- Acunetix is now available on Docker
- New Scan Statistics page for each Scan
- Vulnerability information can now be sent to AWS WAF
New Vulnerability Checks
- New check for Hashicorp Consul API is accessible without authentication [https://www.consul.io/docs/security]
- Multiple new checks for Unrestricted access to a monitoring system
- Improvements to JavaScript Library Audit checks
- New check for Cisco RV Series Authentication Bypass (CVE-2021-1472)
- New check for ntopng Authentication Bypass (CVE-2021-28073)
- New check for Agentejo Сockpit CMS resetpassword NoSQLi (CVE-2020-35847)
- New check for AppWeb Authentication Bypass (CVE-2018-8715)
- New check for Apache OFBiz SOAPService Deserialization RCE (CVE-2021-26295)
- New check for F5 iControl REST unauthenticated remote command execution vulnerability (CVE-2021-22986)
- New check for Python Debugger Unauthorized Access Vulnerability
- New check for Virtual Host locations misconfiguration
- New check for Request Smuggling
Updates
- Full rows and column selection is now possible in the Excluded Hours page
- Updated UI with new Acunetix branding
- Issue Tracker ID will be shown for vulnerabilities sent to any Issue Tracker
- Issue Trackers can now be restricted to a specific Target Group
- Target Description will be sent to the Issue Trackers
- Updated Jira integration to support Jira version 9
- Multiple updates to the JAVA AcuSensor
- Scanning engine will now test cookies on pages which do not have any inputs
- The scanner will stop testing cookies which have been found to be vulnerable
- Where possible, DOM XSS vulnerabilities will show the code snippet of the vulnerable JavaScript call
- CSV Export will now show the Target Address
- Maximum size for a custom cookie configured in a Target increased to 4096 characters
- New date filter in the Vulnerabilities page
- Vulnerability severity now shows text in addition to color coded icon
- Multiple updates to the LSR
- Added support for BaseUrl / Global Variables in Postman import files
Fixes
- Import files
- Fixed extra CR in Target CSV export
- Fixed DeepScan crash
- Fixed: Discovery options are only shown to users with “Access All Targets” permission
- Fixed: Existing user’s details shown when adding a new user
- Fixed a scanner crash
- Fixed: Blind XSS check is now part of the XSS scanning profile
- Fixed: AcuMonitor checks where not done when scan done by an engineonly installation
- Fixed issue causing AcuMonitor not to be registered when using authenticated proxy
- Fixed issue when loading vulnerabilities for a Target Group
- Fixed issue with Postman importer
- Fixed sporadic issue when checking for new Acunetix updates on Mac
- Fixed issue in WP XMLRPC pingback check
适用于Windows,Linux和macOS的版本14构建14.2.210503151 – 2021年5月4日
新的功能
- Acunetix现在可在Docker上使用
- 每次扫描的“新扫描统计信息”页面
- 现在可以将漏洞信息发送到AWS WAF
新漏洞检查
- 无需身份验证即可访问Hashicorp Consul API的新支票[https://www.consul.io/docs/security]
- 多项新检查,可以无限制地访问监视系统
- JavaScript库审核检查的改进
- Cisco RV系列身份验证旁路(CVE-2021-1472)的新检查
- ntopng身份验证绕过的新检查(CVE-2021-28073)
- AgentejoСockpitCMS重置密码NoSQLi的新检查(CVE-2020-35847)
- AppWeb身份验证绕过的新检查(CVE-2018-8715)
- Apache OFBiz SOAPService反序列化RCE(CVE-2021-26295)的新检查
- F5 iControl REST未经身份验证的远程命令执行漏洞的新检查(CVE-2021-22986)
- Python调试器未授权访问漏洞的新检查
- 虚拟主机位置错误配置的新检查
- 请求走私的新支票
更新
- 现在可以在“排除的小时数”页面中选择完整的行和列
- 使用新的Acunetix品牌更新了UI
- 对于发送到任何问题跟踪器的漏洞,将显示问题跟踪器ID
- 现在可以将问题跟踪器限制为特定的目标组
- 目标描述将发送到问题跟踪器
- 更新了Jira集成以支持Jira版本9
- JAVA AcuSensor的多个更新
- 扫描引擎现在将在没有任何输入的页面上测试Cookie
- 扫描程序将停止测试被发现容易受到攻击的Cookie
- DOM XSS漏洞将在可能的情况下显示易受攻击的JavaScript调用的代码段
- CSV导出现在将显示目标地址
- 目标中配置的自定义Cookie的最大大小增加到4096个字符
- 漏洞页面中的新日期过滤器
- 漏洞严重性现在除了显示颜色编码的图标外,还显示文本
- 对LSR的多次更新
- 在Postman导入文件中增加了对BaseUrl / Global Variables的支持
修正
- 导入文件
- 修复了目标CSV导出中的额外CR
- 修复了DeepScan崩溃
- 固定:发现选项仅显示给具有“访问所有目标”权限的用户
- 固定:添加新用户时显示现有用户的详细信息
- 修复了扫描仪崩溃
- 修正:盲XSS检查现在是XSS扫描配置文件的一部分
- 修正:AcuMonitor会检查仅通过引擎安装完成的扫描时未完成的地方
- 修复了导致使用身份验证的代理时未注册AcuMonitor的问题
- 修复了为目标组加载漏洞时的问题
- 已解决邮递员进口商的问题
- 修复了在Mac上检查新的Acunetix更新时的零星问题
- 修复了WP XMLRPC pingback检查中的问题
下载地址:https://www.fahai.org/
1、将wvsc文件放置于/home/acunetix/.acunetix/v_210503151/scanner/目录,与原文件进行替换;
2、将license_info.json、wa_data.dat文件设置444权限,命令:[ chmod 444 license_info.json & chmod 444 wa_data.dat ];
3、将license_info.json、wa_data.dat文件放置于/home/acunetix/.acunetix/data/license/目录,与原文件进行替换。
1、将wvsc文件放置于/home/acunetix/.acunetix/v_210503151/scanner/目录,与原文件进行替换;
2、将license_info.json、wa_data.dat文件设置444权限,命令:[ chmod 444 license_info.json & chmod 444 wa_data.dat ];
3、将license_info.json、wa_data.dat文件放置于/home/acunetix/.acunetix/data/license/目录,与原文件进行替换。
软件+补丁下载地址:
链接:
https://pan.baidu.com/s/1gU_zY_G7rgPkHleoMahdqA
提取码:
awvs
亲测,提速百分之300,扫描高危个数增加百分之10.
本文始发于微信公众号(利刃信安):把你的老版本漏洞扫描器扔了吧,亲测,提速百分之300,扫描高危个数增加百分之10
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论