Product update: Dynamic API Scanning, Recommendations & Classifications, and more
We know the importance of staying ahead of threats. At Detectify, we’re committed to providing you with the tools you need to secure your applications …
Detectify
For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and improvements sourced from our security researchers and Crowdsource ethical hacker community. Due to confidentially agreements, we cannot publicize all security update releases here but they are immediately added to our scanner and available to all users. This post highlights a few things that we have improved in the last two weeks.
The following are some of the security vulnerabilities reported by Detectify Crowdsource ethical hackers. We added these tests to the Detectify scanner tool on 15 November.
This WordPress plugin logs the IP-address of users that has multiple failed login attempts. However, in place of recording the actual IP-address, it is possible to log the value of the X-Forwarded-For-header instead.
When the administrator of the WordPress installation later logs into the dashboard the log is visible to them without proper filtering. This means that it is possible to use an XSS-payload as header value. Additional reading.
During a scan of a website we check for several headers that we think improves the security by having set. For some we warn where they are lacking, for others we only warn if it is set to a invalid value.
To the list of checked headers we have now added Expect-CT when it is invalid, as that was submitted to us by a Crowdsource community member. More information about the header.
Path Traversal bugs have received more and more interest from the security community, which also has lead to more submissions from our Detectify Crowdsource white hat hackers. This one was added in the latest release.
After looking at Crowdsource submissions and keeping up with the security community in general, our development team also added security tests to check for CVE-2018-3760: Ruby on Rails Path Traversal and CVE-2018-1271: Spring Path Traversal.
After the last security update that included submissions related to Spring Boot, our further exploration of this lead to us adding more endpoints that are commonly exposed over the internet.
Questions or comments on our latest security updates? Let us know in the section below.
Begin a scan for the latest vulnerabilities today. Start a free trial with Detectify here!
Already have an account? Login to check your assets.
We know the importance of staying ahead of threats. At Detectify, we’re committed to providing you with the tools you need to secure your applications …
What if we told you that our newly released API Scanner has 922 quintillion payloads for a single type of vulnerability test? A quintillion is …