Product update: Dynamic API Scanning, Recommendations & Classifications, and more
We know the importance of staying ahead of threats. At Detectify, we’re committed to providing you with the tools you need to secure your applications …
Detectify
Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and improvements sourced from our security researchers. Due to confidentially agreements, we cannot publicize all security update releases here but they are immediately added to our scanner and available to all users.
The following are some of the security vulnerabilities reported by Detectify Crowdsource ethical hackers.
We added these tests to the Detectify scanner from August 31 – September 4.
JFrog Artifactory is vulnerable to administrator account takeover. By providing the HTTP header ‘X-Forwarded-For’ as localhost, it is possible to bypass Artifactory’s whitelist allowed IP addresses. This vulnerability is exploitable in most configurations, including when an external SSO provider, such as Okta or OneLogin, is used.
This module exploits a directory traversal vulnerability in ResourceManager.java of Eclipse Mojarra 2.3.4. An attacker is able to abuse the `loc` parameter in the getLocalePrefix function to download configuration files or Java bytecodes from applications.
We have released several reported 0-days in Atlassian Jira, including XSS, XXE and RCE vulnerabilities.
This module checks for exposed BitBucket pipeline configuration files. These files contain information used in the build and deploy parts of the affected system and can be leveraged for further attacks.
This module checks for files in the /_vti_pvt folder of Microsoft IIS sites. Old Microsoft IIS sites and Microsoft IIS sites that have been upgraded from older versions sometimes contain files containing metadata and other content-related information in the /_vti_pvt folder. These files should have been removed or restricted following the install/upgrade, as they contain sensitive information which should not be exposed.
This module searches for a reflected XSS vulnerability in a vBulletin test script (vb_test.php) that users can use to check if their server environment is suitable for vBulletin.
This module searches for exposed Nginx configuration files. These files contain information that can help attackers conduct further attacks against the application.
A Local File Inclusion vulnerability exists within the bispgraph.jsp file in Oracle E-Business Suite. Successful exploitation would allow an attacker to read sensitive files on the server.
We know the importance of staying ahead of threats. At Detectify, we’re committed to providing you with the tools you need to secure your applications …
What if we told you that our newly released API Scanner has 922 quintillion payloads for a single type of vulnerability test? A quintillion is …