Search What is Detectify?

Detectify security updates for 10 January

January 10, 2019

For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and improvements sourced from our security researchers and Crowdsource ethical hacker community. Due to confidentially agreements, we cannot publicize all security update releases here but they are immediately added to our scanner and available to all users. This post highlights a few things that we have improved in the last two weeks.

The following are some of the security vulnerabilities reported by Detectify Crowdsource ethical hackers. We added these tests to the Detectify scanner tool on 10 January.

CVE-2018-15961: Adobe ColdFusion Unrestricted File Upload
Adobe Coldfusion lets unauthenticated attackers upload files to ckeditor which will be stored on the server. This is a critical vulnerability and more details are found on Adobe.

CVE-2018-17254: Joomla! JCK-Editor SQL Injection
The JCK Editor component 6.4.4 for Joomla! allows SQL Injection via the jtreelink/dialogs/links.php parent parameter. Authentication is not needed for a successful exploit. Read more here.

Atlassian Jira Route-based Authentication Bypass
By accessing a specific endpoint, it is possible to view employee emails and ticket names.

Nexus Sonatype Default Credentials
The repository manager Nexus is using default credentials.

Response-Proxy DOM XSS
The response-proxy.html file is vulnerable to DOM XSS because it does not validate the value from a URL.

The value of the two attributes in the Subscription page are reflected which leads to reflected XSS. Read more.


Questions or comments on our latest security updates? Let us know in the section below.

Begin a scan for the latest vulnerabilities today. Start a free trial with Detectify here!

Already have an account? Login to check your assets.

Detectify is a continuous web scanner monitor service that can be set up for automated scanning for 1000+ known vulnerabilities including the OWASP Top 10. Check for the latest vulnerabilities!