Changelog

Stay up-to-date with the latest updates and enhancements! Explore our Changelog to stay informed about all the exciting changes we've made.

~ pip install -U ostorlab

~ oxoauth login

~ oxoscan run --install --agent agent/ostorlab/dast ipa myapple.ipa

๐Ÿ Scan created successfully

~ oxoscan list

mdi-source-commit

Revamped Search, new detection capabilities, actively exploited CVEs and much more.

Tue 22 October 2024
  • Revamped Search: Reworked the search UI to make searching very seamless, without the hassle of having to remember search keywords.
    Private Agents
    New Search UI
  • Added support for applying search filters even if Ticket Grouping is used.
  • Fixed saved rules appearing to the all organisation users. Now, saved rules appear only to the user who saved them.

Remediation

  • Allow the selection of any issue type available in the JIRA project scope.

Inventory & Attack Surface ๐ŸŽฏ

  • Search Assets using Regular Expressions (RegEx): Added support for advanced search patterns using regular expressions.
  • Fixed slow loading of impacted assets in the threat center.
  • Added support to limit assets to the asset owner when exporting potential nodes.
  • Fixed a bug where in search with multiple fingerprints.

Detection ๐Ÿ”

New Vulnerabilities
  • Bleichenbacher vulnerability - Added detection for potential exposure to the Bleichenbacher attack (PKCS#1 v1.5 padding oracle) in SSL/TLS connections. The Bleichenbacher attack allows attackers to exploit weaknesses in RSA-encrypted communications, potentially decrypting sensitive data such as session keys.
  • Weak Cipher Suites - Added detection for identifying whether a server supports weak cipher suites in its SSL/TLS connections.
  • Raccoon Attack Implementation - Added detection for Raccoon Attack vulnerabilities in SSL certificates.
  • ALPACA Attack - Added detection for ALPACA (Application Layer Protocol Confusion) attack vulnerabilities in SSL/TLS certificates.
  • Backdoored Cryptographic Algorithms - Detection for backdoored cryptographic algorithms in SSL certificates, specifically targeting RC4 and Dual_EC_DRBG.
  • Lucky Thirteen - The Lucky Thirteen attack targets the TLS (Transport Layer Security) protocol, specifically its handling of padding in encrypted messages. This attack exploits vulnerabilities in certain TLS implementations with block ciphers like AES.
  • SSL/TLS Protocol - Added detection to identify outdated and potentially vulnerable SSL/TLS protocols such as SSLv3, TLSv1, and TLSv1.1, which are known to have security vulnerabilities.
  • SSL Certificate - This check assesses the security and validity of SSL/TLS certificates by analyzing the certificate's attributes and ensuring compliance with modern best practices. Additionally, the check supports both domain names and IP addresses as targets for validation.
  • Forward Secrecy in SSL/TLS connections - Checks if the server does not support Forward Secrecy (FS), which is vital for protecting session keys.
CVEs & Fingerprinting
  • Add Jetpack version based detection - This implementation introduces detection for vulnerable Jetpack plugin actively exploited in the wild.
  • CVE-2024-9634 - Detection of the GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in versions up to 3.16.3.
  • CVE-2024-9487 - Detection of a cryptographic signature verification flaw in GitHub Enterprise Server allowed bypassing SAML SSO authentication leading to unauthorized user access.
  • CVE-2024-23113 - Detection of a critical format string vulnerability affecting various Fortinet devices, including FortiOS, FortiProxy, FortiPAM, and FortiSwitchManage.
  • CVE-2024-47374 - LiteSpeed Cache plugin for WordPress is vulnerable to a stored cross-site scripting (XSS) vulnerability in versions up to and including 6.5.0.2.
  • CVE-2024-28987 - The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data.
  • CVE-2024-9463 - An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in the disclosure of usernames, clear-text passwords, device configurations, and device API keys of PAN-OS firewalls.

Authorization Bypass ๐Ÿ”

  • Fixes to 4xx Bypass Detection to Remediate False Positives: Improved detection accuracy to reduce false positives in 4xx bypass scenarios.
mdi-source-commit

HTTP2, Private Custom Checks, actively exploited CVE and much more.

Mon 07 October 2024

Network Interception ๐Ÿšฆ

  • Add HTTP2 Support: Implemented support for HTTP2 traffic extraction. HTTP2 is more powerful than HTTP1 but comes with increased complexity to reconstruct traffic.

HTTP2
HTTP2

  • Fix HTTP1 Handling: Resolved issues with handling requests under the HTTP1 protocol to maintain compatibility.

UI ๐ŸŽจ

  • Improve Reporting of Outdated Dependencies: Enhanced reporting of vulnerabilities due to outdated dependencies to offer a clearer understanding of the issue and where it is.

  • Improve Privacy Issues Detection: Upgraded detection mechanisms to better identify and manage privacy-related issues.

  • Fix to Oxotitan UI: Addressed UI glitches and improved overall user interface consistency for a smoother user experience.

  • Add Sorting of Findings by Risk: Introduced sorting capabilities for findings based on risk, making prioritization more efficient.

  • Improvement to Tags Listing and Autocomplete: Enhanced tags listing and autocomplete features to improve usability and user interaction.

Detection ๐Ÿ”

  • Add Support for More Scalar Types in API Autodiscovery: Extended support for additional scalar types, enhancing compatibility with diverse API schemas.

  • Add Detection and Fingerprinting of Several CVEs: Implemented mechanisms for detecting and fingerprinting multiple CVEs, strengthening security posture, specifically:

  • CVE-2024-47176 - This vulnerability involves the CUPS (Common UNIX Printing System), allowing potential remote execution of arbitrary code by exploiting improper input validation and binding to an unrestricted IP address [1][2].

  • CVE-2024-8963 - A path traversal vulnerability in Ivanti Cloud Services Appliance versions before 4.6 Patch 519, allowing unauthorized remote access to restricted functionality [1].
  • CVE-2024-8522 - A SQL Injection vulnerability in the LearnPress WordPress plugin allows unauthenticated attackers to execute arbitrary SQL queries via the '/wp-json/learnpress/v1/courses' API endpoint, potentially extracting sensitive data.
  • CVE-2024-45409 - A vulnerability in the Ruby SAML library improperly verifies the signature of SAML responses, allowing unauthenticated attackers to forge SAML assertions and potentially log in as arbitrary users [1][2].
  • CVE-2024-40711 - An out-of-bounds write vulnerability in the ImageMagick software suite allows attackers to trigger the issue via specially crafted image files, potentially leading to arbitrary code execution.

Custom Checks โœ”๏ธ

  • Add Support for Private Repos: Enabled functionality to work with private repositories securely.

Private Agents
Private Agents

  • Use Deploy SSH Keys: Introduced use of deploy SSH keys for secure operations in private environments.

  • Add Support for Custom Agent Logs: Facilitated the generation and management of custom logs for monitoring agent activities.

agent_log
Agent Log

Analysis Environment ๐Ÿงฉ

  • Add API Endpoints to Scans Analysis Environment: Added new API endpoints to enhance scans analysis and improve investigation processes.

  • Improve Request-Response Research: Optimized methodologies for analyzing request-response interactions for better performance.

  • Add Mixing of Java and C Stack Traces: Enhanced debugging capabilities by enabling mixed Java and C stack trace analysis.

Attack Surface ๐ŸŽฏ

  • Fix Grouping of Fingerprints in Attack Surface by Adding OS: Improved fingerprint grouping to include OS data, optimizing analysis and identification.

service_os
Service+OS

  • Fix Fingerprint Collection for IP Assets: Enhanced processes for collecting fingerprints related to IP assets for more accurate assessments.

Instrumentation ๐Ÿ“

  • Fix Parsing of Integer Arguments in Flutter/Dart Apps: Corrected parsing logic for integer arguments within Flutter/Dart applications to ensure accuracy.

Authorization Bypass ๐Ÿ”

  • Fixes to 4xx Bypass Detection to Remediate False Positives: Improved detection accuracy to reduce false positives in 4xx bypass scenarios.

  • Support for Archived Pages Detection: Implemented support to identify and handle archived pages, aiding historical data analysis.

RSS Feed ๐Ÿ“ก

  • Add RSS Feed: Introduced an RSS feed to keep users updated on the latest changes. Access it https://blog.ostorlab.co/feed/rss.xml or https://blog.ostorlab.co/feed/atom.xml
mdi-source-commit

Enhanced Vulnerability Detection, Expanded Features, and Critical Fixes

Mon 09 September 2024

๐Ÿš€ User Interface:

  • Added notification when triggering the discovery phase. This helps inform users about the discovery process, which may take time on large organizations.
  • New Tags menu with an autocomplete feature for easier navigation and centralized management. All tags are now grouped in a single page and can be centrally edited on all tickets or assets.

Tags Page
Tags Page

  • CVSSv4 support in PDF exports for clearer representation of vulnerabilities. The new visualisation makes it easier to understand each element, from vector, complexity to the need for authentication.

CVSSv4
CVSSv4

  • Grouped vulnerabilities by risk rating in tables, making it easier to differentiate between confirmed and potential findings of the same category.
  • Enhanced speed of fetching threat center counts for impacted assets.

๐Ÿค– AI:

  • Improved AI model for generating vulnerability recommendations. New findings are now reported with increased accuracy.

๐Ÿ” API Autodiscovery:

  • Added support for scanning schema files, including GraphQL, OpenAPI, WSDL, and XML.

๐Ÿ› ๏ธ OXO:

  • Fixed issue where new agent groups were incompatible with all asset types.
  • Added multi-select for asset types during agent group creation.

๐Ÿ’ป Flutter:

  • Support added for the latest Flutter version 3.24.

๐Ÿ” Network Interception:

  • Multiple bug fixes to prevent missed clear traffic.
  • Improved interception of TLS traffic in native code.
  • Fixed decoding issues in HTTP/1.1 traffic.

๐Ÿ›ก๏ธ Threat Center:

  • Added coverage for CVEs:
  • CVE-2024-20439 & CVE-2024-20440: Critical vulnerability in Cisco Smart Licensing Utility allowing administrative access. Severity: 9.8/10.
  • CVE-2024-7593: Critical authentication bypass vulnerability in Ivanti vTM. Severity: 9.8/10.
  • CVE-2024-40766: Critical vulnerability in SonicWall firewalls enabling unauthorized access. Severity: 9.3/10.
  • CVE-2024-6386: Critical RCE vulnerability in WPML WordPress plugin. Severity: 9.9/10.
  • CVE-2024-39717: Critical vulnerability in Versa Director allowing web shell installation. Severity: 9.8/10.
  • CVE-2024-7029: High-severity command injection in AVTECH IP cameras. Severity: 8.7/10.
  • CVE-2024-43399: Critical Zip Slip vulnerability in Mobile Security Framework (MobSF). Severity: 9.8/10.
  • CVE-2024-6633: Critical vulnerability in Fortra’s FileCatalyst Workflow. Severity: 9.8/10.

๐Ÿงช Taint Analysis:

  • Improved code reachability reporting.
  • Fixed incorrect StatFS findings.
  • Added health detection API.

๐Ÿ” Dynamic Analysis:

  • Enhanced server findings reporting, including host and port numbers for open local ports.

๐Ÿ”„ Port Scanning:

  • Updated service and OS detection mechanisms.
  • Fixed issue with empty services being collected.

๐ŸŒ Web Crawling:

  • Added screenshot functionality post-authentication for better debugging.

๐Ÿ” Fingerprinting:

  • Added support for fingerprinting tech stacks with active threats:
  • VigorConnect, Ivanti, MobSF, Avtech IP Camera, Versa, SonicWALL SonicOS.
  • Improved version detection when multiple versions of the same software are identified.

๐ŸŒ Attack Surface:

  • Fixed IP range handling for more accurate detection.

๐Ÿ”„ GitHub Actions:

  • Migrated from Docker to composite action, supporting workflows across Windows and MacOS platforms.
mdi-source-commit

OXO Titan, Support for CVSS4, and Attack Surface search with certificates

Wed 28 August 2024

๐Ÿ›ก๏ธ Open-Source OXO

  • We are happy to announce the release of OXO Titan, an intuitive User Interface (UI) to transform user interaction with OXO, a vulnerability scanning orchestrator that automatically binds tools together allowing for rapid scale. This OnPrem UI encapsulates OXO's capabilities within an accessible interface, democratizing advanced security scanning techniques. By bridging the gap between the myriad of complex tools and a simple UI, OXO Titan streamlines operations and enhances the user experience.
  • The OXO scan process now exits automatically once completed, streamlining your workflow.

To learn more about OXO Titan, read the full article.

๐Ÿ“Š PDF Reports

  • Track Vulnerability Trends: Easily monitor your asset's vulnerability trends over the last 6 months with our new graph that breaks down vulnerabilities by risk rating.
    Asset Vulnerability Trends
    This graph shows the vulnerabilities per risk rating for each month for the last 6 months
  • See Open vs. Closed Vulnerabilities: Quickly understand the state of your vulnerabilities with a new graph summarizing open and closed issues.
    Closed & Open Vulnerabilities
    This graph is a summary of the vulnerabilities statuses
  • Identify Critical Issues Faster: A new graph now highlights the top 10 most severe vulnerabilities, helping you prioritize critical issues.
    Top 10 most severe vulnerabilities
    This graph is a summary of Top 10 High-Severity Vulnerabilities

โšก๐Ÿ“ก Attack Surface

  • Added support for running an autodiscovery scan. Autodiscovery enables continuous monitoring of an organization's infrastructure to detect missing and rogue assets. This helps with finding blind spots like forgotten or missing acquisition infrastructure, unaccounted-for dev and production machines, or lost assets during internal restructuring and staff change. To run an autodiscovery scan, go to the new scan page and select Attack Surface.
    Autodiscovery Scan
  • Improved Asset Filtering: Filter assets more effectively by certificate details, including serial number, subject, issuer, and validity dates.
  • Enhanced Search Functionality: Search more accurately with the fixed exclusion search feature, ensuring you find exactly what you need.

๐Ÿ” Detection

  • Enhanced vulnerability assessment with support for the Common Vulnerability Scoring System Version 4.0 (CVSSv4). This can be accessed on the details page of a vulnerability.
    Top 10 most severe vulnerabilities
    Vulnerability CVSS4 details
  • Known Exploitable Vulnerabilities: Enhanced security tracking by adding new CVEs - CVE-2024-38077, CVE-2021-33044, CVE-2024-5932, CVE-2024-28986, and CVE-2022-31814.
  • Added support for patched versions, minimizing false positives and ensuring your vulnerabilities are accurately reported.
  • Fixed an OpenSSH False Positive, ensuring only relevant vulnerabilities are reported.
  • Fixed a bug where invalid targets were scanned due to incomplete URL configuration (missing port, scheme, or host). This fix ensures that no inaccurate results are reported.
  • Added support for exposing the OS from scans, helping you gain more precise fingerprinting details.
  • Fixed a bug where Microsoft authentication was not working, improving the call coverage of web scans.

โš ๏ธ Threat Center

Support for Dahua network IP cameras, pfSense open-source firewall and router software, and Traccar GPS tracking. The addition of these targets will help flag assets that are affected by high-severity threats with active exploitation.

๐Ÿ“˜ Knowledge Base

  • More Accurate Vulnerability Scores: We've fixed the CVSSv3 Vector for the Django Debug Mode to provide more precise information.
  • Improved Technical Details: The Insecure Register Receiver Flag Technical details have been fixed so that they're correctly rendering, giving you better clarity on a vulnerability's details.
mdi-source-commit

Privacy Compliance Testing, Fingerprint detection, and User Experience Enhancements

Mon 12 August 2024

๐Ÿ›ก๏ธ Privacy Compliance Testing

We added a new type of scan, Privacy Compliance Testing, which is available for all asset types. The Privacy Compliance Testing identifies privacy concerns by analyzing the application's data collection, usage practices, and compliance with privacy policies.

Privacy Compliance Testing
Privacy Compliance Testing

To learn more about this new feature, see the Privacy Compliance Testing page.

๐Ÿ‡ผ Agent WhatWeb

Added detection for several fingerprints:

  • OFBiz plugin: An open-source enterprise resource planning (ERP) system.
  • Cisco Smart Software Manager On-Prem (SSM On-Prem): A Smart Licensing solution that enables customers to administer products and licenses on their premises.
  • Raisecom: A global leading vendor providing comprehensive access solutions and network devices.
  • Acronis cyber infrastructure plugin: A multi-tenant, hyper-converged infrastructure solution for cyber protection. The agent was also fixed to not scan non HTTP services.

๐ŸŒŒ Agent Asteroid

  • Known Exploitable Vulnerabilities: Enhanced security tracking by adding new CVEs - CVE-2024-5217, CVE-2024-38856, CVE-2024-43044, CVE-2024-7120, and CVE-2024-20419.

๐Ÿ›ก๏ธ OXO

  • Fixed a crash when OXO is run with no asset (--no-asset).

๐ŸŽจ User Experience Enhancements

  • In order to provide more clarity on what each type of scan does, all scan profiles are now visible, even if they're inactive.
    Scan Profiles
    Scan Profiles
  • Fixed a bug when confirming an asset without selecting an owner.
  • Fixed a bug which was causing some fingerprints not to show.
mdi-source-commit

Threat Center, Account Security Enhancements, and added detection

Mon 05 August 2024

โš ๏ธ๏ธ Threat Center

  • We are excited to introduce the Threat Center, a dedicated hub for viewing the latest security alerts and understanding which of your assets are affected. With this new feature, you can easily scan affected assets directly from the Threat Center, ensuring you stay on top of potential threats. Access the Threat Center here.
    Threat Center
    Threat Center UI

๐Ÿ›ก๏ธ Improved Detection

  • Detection for Exposed Docker Registry API vulnerability.

๐Ÿ”’ Security Enhancements

  • To bolster account security, we now require users to verify their password before making any changes to Two-Factor Authentication settings. This additional step adds an extra layer of protection to your account..
    Password Verification
    2FA changes password verification

๐ŸŽจ User Interface Enhancements

  • We've reworked the Call Coverage interface to improve usability. In compact mode, dynamic analysis scenarios are now only displayed on hover, providing a cleaner and more streamlined user experience.
    Call Coverage
    Call Coverage Scenarios
mdi-source-commit

Advanced XSS Protection, CircleCI Enhancements, and UI Upgrades in Our Latest Release

Wed 31 July 2024

Agent XSS ๐Ÿ›ก๏ธ

  • Enhanced XSS Detection: Improved detection capabilities for XSS vulnerabilities and improved vulnerability reporting.
  • Error Handling: Refined error management by properly catching and handling Browser exceptions.

Agent Reporting Engine ๐Ÿ“Š

  • Reporting Enhancements: Updated documentation for deploying scanners and enhanced error handling.
  • Alert System Improvements: Revised the conditions for app download failure alerts for application continuous monitoring.

Agent Asteroid ๐ŸŒŒ

  • Known Exploitable Vulnerabilities: Enhanced security tracking by adding new CVEs (CVE-2024-33544, CVE-2024-40725, CVE-2024-6745, CVE-2024-34102, CVE-2024-5315, CVE-2024-31982, CVE-2024-23692, CVE-2024-6387, CVE-2024-36401, CVE-2024-36991, CVE-2024-37032, CVE-2023-52251, CVE-2024-28995, CVE 2024 29973, CVE-2024-4879).

CircleCI Integration ๐Ÿ”„

  • Continuous Integration Enhancements: Significantly improved the CircleCI configuration across all projects, optimizing build times, and ensuring more reliable build outcomes. Enhanced pipeline automation to include automatic testing and quality checks.

User Interface Enhancements ๐ŸŽจ

  • UI Improvements: Introduced enhancements to user interface improving dashboard performance for large organisations.

Security and Workflow Enhancements ๐Ÿ”’

  • Codecov Integration: Implemented Codecov across all repositories to monitor code coverage, ensuring comprehensive testing and higher code quality.
  • UV Workflow Updates: Transitioned development pipelines to UV, standardizing build processes and improving deployment efficiency across projects.
mdi-source-commit

Detection of CocoaPods Supply Chain Vulnerability, CCPA, SOC2 and more

Mon 08 July 2024

This update introduces new detection capabilities, new data & privacy controls, improved user experience across the platform, and bug fixes.

๐Ÿ›ก๏ธ Detection

  • CocoaPods Supply Chain Vulnerability: We added detection for critical vulnerabilities in CocoaPods. One Key Vulnerability is CVE-2024-38368. This vulnerability allowed attackers to claim unclaimed CocoaPods packages and insert malicious code. The potential for widespread damage was immense, affecting both individual developers and large organizations relying on CocoaPods for dependency management. We go over this vulnerability in-depth in our recent article.
  • CVE_2024_2194: We added detection for the WP Statistics plugin for WordPress, which is vulnerable to Stored Cross-Site Scripting via the URL search parameter in all versions up to, and including, 14.5.
  • Insecure Crypto Mode: A fix was made to improve the rules used to detect Insecure Crypto Mode.

๐Ÿค Compliance

  • California Consumer Privacy Act Controls: New support for the California Consumer Privacy Act (CCPA), a comprehensive data privacy law that grants California residents new rights regarding their personal information. To check your app's compliance with the CCPA, click on a scan, scroll down, and then click on the 'Standards' tab.
    California Consumer Privacy Act Controls
    CCPA Standards Report
  • Secure Privacy Findings: Added support for reporting privacy issues, such as insecure collection of users' crash logs without consent, improper usage of contacts data, undeclared collection of users' health information, etc.

๐Ÿ™‚ UX

  • Search History: The search history is now kept in the search bar every time you navigate between pages, or forward/backward on the same page.
    Search History
    Search history across the platform

๐Ÿ•ธ๏ธ Attack Surface

  • Bulk Actions: We added support to run bulk actions (automation rules) directly from the Attack Surface.
    Bulk Actions
    Bulk actions in the Attack Surface
mdi-source-commit

Bug Fixes, Detection, and Attack Surface Improvements

Mon 01 July 2024

This update introduces bug fixes, detection improvements, and attack surface enhancements to provide a more seamless user experience.

๐Ÿ›ก๏ธ Scanning

  • Show source code for the detected vulnerabilities in the vulnerability details page.
    Vulnerability Details
    Source code for detected vulnerabilities

๐Ÿ› ๏ธ Remediation

  • Customized the weekly email for attack surface auditors to only contain their data.
    Weekly Email
    The weekly email for attack surface auditors

๐Ÿ•ธ๏ธ Attack Surface & Inventory

  • Added autocomplete for tags in assets.
    Autocomplete Tags
    Autocomplete for tags in asset
  • Enabled filtering of assets by ownership type.
    Ownership Types
    Filter the assets by the ownership type

๐Ÿ“ฆ Detection

  • Added detection for CVE-2022-24816 : A remote code execution vulnerability in the JT-JIFFLE extension of Geoserver allows remote attackers to execute arbitrary code.
  • Added detection for CVE-2024-34470 : An issue was discovered in HSC Mailinspector 5.2.17-3 through v.5.2.18. An Unauthenticated Path Traversal vulnerability exists in the /public/loader.php file. The path parameter does not properly filter whether the file and directory passed are part of the webroot, allowing an attacker to read arbitrary files on the server.

๐Ÿž Bug Fixes

  • Fixed the search function with inputs that included a schema.
    Schema Search
    Searching scans using a specific schema
  • Fixed the iOS search issue when searching for common apps like Facebook.
    iOS Search
    Searching for common apps like Facebook
  • Fixed the issue where excluded values were still appearing in the graph during PDF generation.
mdi-source-commit

iOS TestFlight scan, Slack Integrations and other improvements

Mon 10 June 2024

This update introduces support for scanning apps using iOS TestFlight, Slack Integrations, support for scanning web apps with an SBOM, and other improvements.

๐Ÿ›ก๏ธ Scanning

  • Added support for iOS TestFlight.
    iOS TestFlight
    Ability to scan iOS apps using TestFlight
  • Added support for SBOM to web scans for extended dependency detection.
    Web Scan SBOM
    Web scan with an optional SBOM

๐Ÿ“„ CI/CD Integrations

  • Added integration of Slack for ticket notifications. See the documentation on how to configure the integration.
    Slack Integration

๐Ÿ› ๏ธ Remediation

  • Show tickets linked to vulnerabilities in the scan page, with support for filtering the tickets by risk rating.
    Vulnerability tickets
    List of vulnerabilities with their related tickets
  • Added support for configuring automation rules to change the priority of the selected tickets to the specified value.
    Automation Rules - Ticket Priority
    Automation Rule to change the ticket priority
  • Added ticket link to the Jira integration report.

๐Ÿ“ฆ Detection

  • Improved detection of Amazon secrets.
  • Added detection for CVE-2024-24919, CVE-2024-23917, CVE-2024-27348, CVE-2024-4956, CVE-2021-40655, CVE-2024-29895, CVE-2024-4956, and CVE-2023-43208.

๐Ÿž Bug Fixes & Improvements

  • Reduced the loading time of the scan page by over 93%.
mdi-source-commit

Integrations, Dynamic analysis improvements, and a new standard support

Mon 27 May 2024

This update introduces multiple new integrations with CI/CD pipelines, improvements to dynamic traces interception & analysis, support for the MASVS standard, and many bug fixes.

๐Ÿ“„ CI/CD Integrations

  • Add integration of TeamCity CI/CD pipelines for automated scanning.
    TeamCity integration
  • Add integration of GoCD build processes.
    GoCD integration

๐Ÿค– Dynamic traces interception & analysis

  • Add extraction of Dictionary arguments of Objective-C methods, this allows for improved detection of numerous vulnerabilities, like insecure data storage.
  • Add support for dynamic instrumentation of Objective-C static methods, this improves the detection of over 250 rules.
  • Add extraction & analysis of sockaddr C-structures to extract IP address and port.

sockaddr extraction

๐Ÿ“‘ MASVS v2.0.0 standard

  • MASV 2.0 is here, Ostorlab has support for it :+1:

OWASP MASVS-v2

๐Ÿ› ๏ธ Remediation

  • Added a due date field to the tickets and the ability to re-open all exception tickets after that period.
  • Added a finished time field to the scan API.

๐Ÿž Misc & Bug Fixes

  • Fixed Tree-Like representation of organisations on the plans page.
    orgs-tree
  • Fixed social authentication username conflict.
mdi-source-commit

Discovery of hidden web paths, detection of libwebp vulnerability, and new CVE detections.

Mon 06 May 2024

This update adds the discovery of hidden web paths, detection of libwebp vulnerability, and new CVE detections.

๐Ÿค– Open Source

OXO version 1.0 was released. It is 10x times faster, supports ARM64 architectures, and is packed with improved capabilities like scanning multiple assets, simpler and powerful CLI.

  • Start a scan is now x10 times faster: In previous versions, starting a scan took almost 3 minutes. With OXO v1, it is now 10 times faster, starting a scan in just 16.5 seconds.
  • Standalone Binary: OXO is now available as a standalone binary for macOS, Linux, and Windows.
  • Support for macOS and ARM64 architecture for agents: If you're a macOS user with an ARM64 processor, we've got some great news for you! OXO can now support ARM64 agents natively.
  • Scan an Inventory file: OXO added scanning multiple assets using an asset definition YAML file. This gives you the possibility to scan a large number of different types of assets at the same time.
  • Friendlier CLI: As of OXO version 1, you can now specify the agent key in a concise way when running scans. Instead of using the full agent key, you can use the shorthand <org>@<name> format.
  • New Documentation Website: OXO now has its dedicated documentation website, packed with tutorials and numerous examples.
  • Agent Store: OXO now has a public agent store. You can publish your agent to the OXO store by simply following this tutorial.
  • Follow scan progress by Default: Starting from the version v1, --follow is the default mode when you start a scan. OXO will keep you updated on the scan's progress.
  • Pass Arguments to agents directly from the CLI: Agents can be fine-tuned using arguments which give you more control and flexibility. Passing arguments is now available throughout the CLI.
  • Add the ability to persist messages: You can now persist any type of message you wish, such as IP, domain, link, and exposed services through the new OXO Open Source agent Nebula.

To read more about OXO v1.0, read the full blog post.

๐Ÿ“ฆ Detection

  • Added discovery of hidden web paths in agent hubble using Google Search and Wayback.
  • Added detection of libwebp vulnerability.
  • Added detection for CVE-2024-4040, CVE-2024-31461, CVE-2024-2389, CVE-2024-32764, CVE-2024-27956, CVE-2024-28890, CVE-2024-28255, and CVE-2024-26331.

๐Ÿž Bug Fixes & Small improvements

  • Fixed bug with CSV import of IPs not updating existing IP assets.
  • Fixed bug with Jira Sync Fields.
mdi-source-commit

Better UI, more concise scan report, improved detection of insecure webview usage, and multiple bug fixes.

Tue 23 April 2024

This update improves the user interface of the platform, adds new detection for Webview-related vulnerabilities, and ships multiple bug fixes.

๐Ÿ“ฆ Detection

  • Added detection for CVE-2023-50969, CVE-2024-2879, CVE-2024-3273, CVE-2024-29269, CVE-2024-3400, and CVE-2023-24955.
  • Added detection capabilities to identify insecure Webview practices in iOS applications.
  • Added a concise and relevant detection for the use of dangerous deprecated APIs.

๐Ÿ› ๏ธ Platform Improvements

  • Added Compact view to the call coverage:
    compact_callcoverage.png
  • Added the ability to specify relevant standards when generating scan reports:
    standars_pdf.png
  • Improvement to the graph node appearance:
    graph_appearance.png
  • Added the ability to search by Objective-C runtime in the ide:
    objc_runtime_filter.png
  • Added filtering for potential nodes:

๐Ÿž Bug Fixes & Small improvements

  • Defaulting new user role to Reader instead of the more privileged User. The change affects SSO / SAML access configuration and UI default.
  • Improve OXO usage documentation.
mdi-source-commit

Objetive C instrumentation, detection of insecure data storage, Regex DoS, and multiple bug fixes.

Mon 15 April 2024

This update significantly improves objective-C instrumentation, adds new detection for insecure data storage and Regex DoS, and ships multiple bug fixes.

๐Ÿ“ฆ Detection & Knowledge Base

  • Improve dynamic instrumentation for objective-C and persist collected stack traces in the Analysis Dynamic section.
  • Added detection capabilities to identify insecure data storage practices in iOS applications. This includes identifying the use of potentially vulnerable storage mechanisms such as UserDefaults and UIPasteboard.
  • Added detection for Regular Expression Denial of Service (ReDoS) vulnerabilities. This new feature identifies sinks that use user input to create regular expressions, which can lead to potential ReDoS attacks.
  • Refined all KB recommendations to be actionable, so now we have a step-by-step process to solve vulnerabilities.
    refined_kbs.png

Frontend Enhancement

  • Added table of contents to Blogs:
    table_of_content.png
  • Added highlighting to the Tips section:
    tips_highlighting.png
  • Added a button to download all PCAP files at once as a ZIP archive:
    download_all_pcaps.png
  • Show graph edge & node labels in a card:
    graph_edge_card.png

๐Ÿž Bug Fixes

  • Fixed the generation of rules for iOS to take init function into consideration.
mdi-source-commit

Detection of Apple's Privacy Manifest, liblzma backdoor, and Attack Surface fixes.

Mon 01 April 2024

This update introduces fixes for the Attack Surface, detection for the liblzma backdoor, and a public store for agents.

๐Ÿ“ฆ Detection

  • Added detection for Apple's Privacy Manifest files. A Privacy Manifest describes the data an app or third-party SDK collects and the reasons required APIs it uses. Developers are required to include it in their apps before May 1st, 2024. The detection rule checks that apps are compliant with the new requirement, and whether their implementation is secure or not.
  • Added detection for Django DEBUG mode enabled.
  • Added detection for leaking secrets in Web Apps.
  • Added detection for liblzma backdoor.
  • Added detection for CVE-2023-48788, CVE-2021-44529, CVE-2019-7256, CVE-2022-20767, CVE-2022-0412, and CVE-2024-1212.
  • Improved detection for Personally Identifiable Information (PII). The rule now detects way more vulnerable methods that leak PII data. PII leaking is now also done using a static rule.
  • Improved detection for Mixed content WebView settings by analyzing and detecting more dangerous WebView settings.

๐Ÿค– Open Source

๐Ÿž Bug Fixes

  • Fixed confirming assets defaulting to red as the custom color.
  • Fixed Android and iOS search filters not working for potential assets.
  • Fixed the CVE matcher DNA to take into account the latest CVEs.
mdi-source-commit

Addition of CSS Injection Detection, ARM64 support, and migration of Agent's Docker Images.

Mon 25 March 2024

This update introduces fixes for the Attack Surface, migration of Agent's Docker Images to Docker Hub, enhanced detection capabilities for vulnerabilities, and support for ARM64 architecture in OSS.

๐Ÿ•ธ๏ธ Attack Surface

  • Addressed issue with Attack Surface creating non-confirmed assets from detected vulnerabilities. Users now have the ability to only collect metrics of confirmed and maintained attack surface assets without issues related to non-validated assets from scans.

๐Ÿ› ๏ธ Infrastructure

  • Migrated Agent's Docker Images to Docker Hub for improved visibility and speed into open-source OXO agents.

๐Ÿ“ฆ Detection

  • Added detection for aiohttp path traversal vulnerability actively getting exploited.
  • Added detection of CSS injection vulnerabilities leading to application takeover, keylogging and defacement.

๐Ÿค– Open Source

  • Added support for ARM64 architecture, enabling running the venerable OXO on Mac Machines with native speed.
mdi-source-commit

Exposed Scan PCAP and JIRA custom Mapping

Mon 18 March 2024

This update introduces a series of new features related to the IDE, Jira integration, OXO, and many improvements to the platform.

๐Ÿ“„ PCAP files exposed in the IDE.

  • Designed for security teams looking to push the analysis even deeper, now you can download all raw PCAP for your mobile full scan.
    PCAP files

๐Ÿค– Open Source

  • Binaries for the OXO scanning orchestrator are available with every new release for Ubuntu, macOS, and Windows.

    OXO Binaries

  • Added agent key shortcuts: Instead of

oxo scan run --agent agent/ostorlab/nmap ip 8.8.8.8

You can now simply run:

oxo scan run --agent nmap ip 8.8.8.8

Or

oxo scan run --agent @your-org/nmap ip 8.8.8.8
  • Added support for scanning Network ranges and IP addresses in the cloud runtime.
oxo scan --runtime=cloud run -g network_agent_group.yaml ip  8.8.8.8/30

๐Ÿ“‘ Jira custom fields mapping

  • If you have Jira integration enabled on Ostorlab, you can now map custom fields from your tickets with Ostorlab fields.
    Custom mapping
  • Syncing the fields and values can be done from your JIRA project to Ostorlab and vice-versa.

๐Ÿ•ธ๏ธ Attack surface refinements

  • Added ability to edit potential nodes, specifying a custom potential owner.

๐Ÿ”ฌ XSS detection

  • Improvements to postMessage XSS detection, adding detection of XSS in complex data objects.

๐Ÿž Bug Fixes

  • Fixed segregation and excluded unreliable rules in the VirusTotal agent.
  • Addressed ecosystem confusion for outdated dependencies detection.
mdi-source-commit

Enhancements to the Open Source CLI, Platform, and Detection.

Mon 11 March 2024

This update introduces various improvements to the XSS scanner, the functionality of the open-source CLI, and monitoring rule creation.

๐Ÿ› ๏ธ Platform Improvements

  • Restructured the new monitoring rule flow to be more user-friendly and intuitive.
    Preview of New monitoring flow

๐Ÿ“ฆ Detection & Knowledge Base

  • Added detection for Fortinet FortiOS Out-of-Bound Write SSL VPN Vulnerability.
  • Improve XSS Agent to detect PostMessage-based XSS.

๐Ÿค– Open Source

  • Ship the first version of Nebula Agent for persisting messages locally.
  • Added support for primitive arguments of agents in CLI scan run. You can pass arguments using the --arg flag, e.g.:
oxo scan run --agent agent/ostorlab/nmap --follow agent/ostorlab/nmap --arg fast_mode:False ip 8.8.8.8

This command will initiate a scan using the Nmap agent with the fast_mode argument set to False:

Preview of an oxo scan with agent arguments

mdi-source-commit

Attack Surface, Remediation, Automation Rules, and Detection improvements

Mon 04 March 2024

This update introduce a series of updates aimed at enhancing user experience, platform improvements, and bug fixes across various features.

๐Ÿ•ธ๏ธ Attack Surface & Inventory Improvements

  • Users can now export inventory assets to a CSV file for easier data manipulation and analysis.
    Export assets
  • The asset owner field is now pre-populated when editing one or more assets as well as when confirming potential nodes.
  • Fixed a bug where assigning attack surface owners to an attack surface auditor failed when users created a new owner within the modal.

๐Ÿ“„ Remediation Enhancements

  • Regular expressions are now supported for filtering data in Remediation, Inventory, and Attack Surface, allowing for more granular searches.
  • Fixed exclusion filter functionality for assigned and self-reported tickets.
  • Fixed ticket metrics to be based on closed time rather than modified time.
  • Users can now open created tickets in new tabs when using the "Save & Add Another" feature for convenient access.

โš™๏ธ Automation Rules Updates

  • Introducing a new automation rule action enabling the deletion of tags assigned to selected tickets or assets, enhancing customization and control.
  • You can now see a list of items a new rule will apply to before creating the rule.
    Preview list of items new rule applies to

๐Ÿ›ก๏ธ Scan Enhancements

  • Fixed an issue with multiple downloads of exported scans.
  • Mobile scan summaries now display IP addresses within the preview of backend links for better context.
    Scan summary backend IPs

๐Ÿ“ฆ Detection & Knowledge Base

  • Added detection for Insecure Storage vulnerabilities in mobile applications.
  • Enhanced descriptions and recommendations for Personally Identifiable Information (PII) vulnerabilities, complete with insightful code snippets.
  • Detections for HTML injection and dynamic code loading have also been refined for increased accuracy.

๐Ÿค– Open Source

  • Added support for scanning a list of assets using a Yaml asset definition file. You can pass an asset definition file using the -a flag, e.g:
oxo scan run --install -g agent_group.yaml -a assets_group.yaml

OXO target group definition
- Fixed a bug related to the download progress while installing agents. The bug was a KeyError which usually occurred due to network issues when installing agents. Because of the bug, agent installation would sometimes fail. The error is now gracefully handled so that agent installation does not fail.

๐Ÿ—๏ธ Improved API Keys page

The API keys page has been redesigned for ease of use.

mdi-source-commit

OXO Open-Source Improving

Mon 26 February 2024

OXO Open-Source Improving

OXO open-source is coming with new features and enhancements to facilitate its usage:

Enhanced Message Specification in Agent Groups :

  • Users can now specify the source of messages within an agent group.
  • Users now have the ability to specify the in_selector within the agent group definition. This feature overrides the default configuration set in the agent YAML file, providing more flexibility and customization.
    Choose accepted agent
  • Search by Risk Rating : Users can now search for vulnerabilities based on specific risk ratings or a combination of multiple risk ratings.
    Search with keywords
  • Keywords search in different fields : Users can now search for findings that contain a specific text.
    Search with risk_rating

Performance Enhancement :

  • By reducing the health check interval for agents and optimizing the scaling process, users can now experience faster startup and execution times, significantly improving the overall efficiency of OXO open-source.

Security Enhancements

  • Enhance the detection capabilities for path traversal vulnerabilities.
  • Refine the detection mechanisms for improved identification of intent redirection vulnerabilities.
mdi-source-commit

Test Credential Name

Mon 19 February 2024

Test Credential Name

Users can now assign a custom name/label to their test credentials for improved organization and identification. With the help of this optional name/label, users can quickly recognize and manage their test credentials and differentiate between different test configurations.

Test credential name

mdi-source-commit

Attack Surface Discovery paths

Fri 16 February 2024

Attack Surface Discovery Paths

The latest update incorporates attack surface discovery paths, offering detailed insights into how assets were discovered. This addition helps understand from which asset(s) a particular asset came from.

The attack surface discovery path of an asset can be viewed from the asset details page by going to the Inventory and then clicking on the asset.

Attack Surface Discovery Path

The discovery path can also be seen from the discovery page and left-clicking on the asset in the graph.

Attack Surface Discovery Path Menu

Graph Edge Attributes

Graph edges now show attributes, facilitating a clearer understanding of the relationships between nodes. This is helpful when you want to know which tool discovered the node, when the node was discovered, when it was last 'seen', etc.

Attack Surface graph edges attributes

These updates collectively contribute to a deeper comprehension of the attack surface discovery.

mdi-source-commit

IAM, XSS and over 1000 new dynamic rules.

Mon 12 February 2024

๐Ÿ› ๏ธ Enhanced Dynamic Analysis

Over the past month, significant advancements have been made in dynamic analysis. We've expanded our capabilities to include instrumentation support for Java, Kotlin, Swift, and Dart ๐Ÿš€. We've also enhanced our detection mechanisms, identifying over 1,365 new vulnerable patterns in Swift and 846 in Dart.

HTTP Folders

๐Ÿ—๏ธ Refined IAM Management

We've fine-tuned IAM management by introducing two new roles: Reader, offering read-only access, and Attack Surface Auditor, designated for conducting thorough audits of the attack surface. This update ensures more tailored and secure access management.

HTTP Folders

๐Ÿ” More Detailed Attack Surface Insights

The Attack Surface feature now provides more detailed access control, tailored per Owner. This update enhances both the precision of discovered asset recommendations and the specificity of access rights, ensuring a more secure and efficient management of assets.

HTTP Folders

๐Ÿ›ก๏ธ Enhanced XSS Detection Capabilities

Our XSS Detection capabilities have undergone a significant overhaul, leading to better detection rates and broader coverage. We've added several new payloads and re-engineered our approach to authenticated testing, greatly enhancing the robustness of authentication during tests.

๐Ÿ“ฆ Advanced Vulnerable Dependency Detection

We've improved the correlation between application fingerprints and known vulnerabilities searches. This enhancement has led to the detection of over 150% more new packages across various frameworks and languages, significantly boosting our ability to identify and mitigate vulnerabilities.

๐Ÿž Bug Fixes

  • Resolved an issue causing errors in the detection of source map code leaks.
  • Fixed an error encountered when evaluating IP reputation.
  • Addressed a bug that prevented the crawler from collecting request and response headers.
  • Improved handling of large arguments collected during dynamic analysis.
  • Corrected an issue with XSS tab timeouts, ensuring no findings are missed.
  • Updated and clarified descriptions in our knowledge base entries.
  • Fixed CSV validation errors during asset imports.
  • Enhanced the computation of vulnerability DNA in the XSS Agent for more accurate detection.
mdi-source-commit

Support for Basic Authentication, HTTP folders and other improvements

Tue 16 January 2024

HTTP Folders

Introducing HTTP Folders, a new way to navigate your app communication. Easily navigate domains and subdomains for a clear view of requests and responses, gaining valuable insights with streamlined visibility. You can see your app's HTTP folders in the IDE section of your scan report.

HTTP Folders

  • โ„น๏ธ Detailed Information: Each HTTP folder includes detailed information such as the domain, subdomain, and a list of requests and responses.
  • ๐Ÿ” Search and Filter: Easily search and filter HTTP folders based on domain, subdomain, or specific requests, facilitating efficient monitoring and analysis.

Basic Authentication

Ostorlab now supports Basic Authentication in Web scans. Test applications seamlessly with Basic Authentication or Composed Authentication (Form-based or Script-based), enabling a more wide-ranging scan.

  • ๐Ÿ”’ Various Authentication Methods: Unlock a spectrum of testing possibilities with support for Basic and Composed Authentication.
  • ๐ŸŒ Expanded Testing Scope: Ensure wider coverage of your application testing.

Attack Surface Enhancement

We've enhanced the Attack Surface section to streamline navigation. Introducing the new "Nodes" tab, it provides a comprehensive list of all nodes in your attack surface graph, along with a summary of their properties, including type and ownership. You can see your Attack Surface "Nodes" in the Attack Surface section.

Attack Surface

We've made an enhancement to the Stack Traces search in the Dynamic tab of the IDE section. Now, you can conveniently search stack traces by Runtime type, including Flutter, C, Dex, or Swift.

Stack Traces

mdi-source-commit

Introduction of a comprehensive audit logging system

Mon 20 November 2023

Audit Logs

Introducing a comprehensive audit logging system. This new feature allows organization admins to track and monitor various activities and changes within the organization, providing enhanced visibility into user actions. You can see your organization's audit logs in the Audit Logs section of the Library.

Audit Logs

  • ๐Ÿ“œ Audit Actions: Auditing a wide range of actions, including user logins, data modifications, configuration changes, and more.
  • ๐Ÿ•ฆ User Activity Tracking: Recording user interactions to assist in maintaining accountability and security.
  • โ„น๏ธ Detailed Information: Each audit log entry includes detailed information such as the user responsible, timestamp, and a description of the specific action taken.
  • ๐Ÿ” Search and Filter: Easily search and filter audit logs based on user, date, or specific activities, facilitating efficient monitoring and analysis.
mdi-source-commit

Support for Bitbucket CI/CD integration, IDE Enhancements

Tue 14 November 2023

Bitbucket CI/CD Integration

Seamlessly integrate Ostorlab security scanning into your CI/CD pipelines. Get started with our documentation.

๐Ÿ” IDE & Security Improvements

  • ๐Ÿ“„ Mobile scan logs displayed directly in the IDE.
    IdeLogs
  • โšก Faster and more responsive IDE.
  • ๐Ÿšซ Critical risk rating added.

    Critical-risk-rating

  • ๐ŸŒ Reputation report for IP/domains.

  • Detect Oauth account takeover from config files
  • Not aggregate exception and false positive tickets.

๐ŸŽจ UI Enhancements & Fixes

  • ๐Ÿ› ๏ธ Fix scan summaries for shared scans.
  • ๐Ÿ–ฅ๏ธ Distinguish between store and file targets in remediation sections: Scan from the store and file scans are now aggregated separately. This allows you to distinguish between the two types of scans in the remediation section.
  • โšก Faster ticket page loading.
  • Possibility to add titles when creating scans.
    Critical-risk-rating
  • New scan events in the ticket page.
  • Support for SVG images in organization images.
  • In the subscription page: show tag Canceled only if the plan is active.
  • When exiting the ticket page in edit mode, a prompt is displayed to save the modifications.
  • Rework the organisation settings page.
  • Add bulk delete for test credentials.
  • Add the ability to disable email notifications.
  • Improved function signature presentation with parameter name and type.

๐Ÿ” Open Source Updates

  • Improved handling of connection issues during agent initiation.
  • Improve presentation risk ratings in CLI.
mdi-source-commit

Security Enhancements, Compliance Mapping, and User Experience Upgrades

Fri 13 October 2023

๐Ÿ” Security Enhancements:

  • ๐Ÿ›ก๏ธ Enhanced URL injection detection, added OAuth account takeover detection, and source map leak prevention, with improved dependency confusion vulnerability detection.
  • ๐ŸŒ PCI and GDPR Compliance Standard Mapping.
  • ๐Ÿ“Š Separated findings between store and file scans for clearer reporting.
  • ๐Ÿšซ Enhanced CVE vulnerability reporting.

๐Ÿš€ User Experience Improvements:

  • ๐Ÿ“„ Improved PDF reports with enhanced graphics and summaries.
  • โšก Achieved a 10x speedup in secret detection for faster scans.
  • ๐Ÿ–ฅ๏ธ Introduced a new ticket/remediation UI for better usability and common actions.
  • ๐Ÿ” Enhanced scan search functionality for easier information retrieval.
mdi-source-commit

Support for SBOM scan in Circleci, AzureDevOps and GitHub pipelines & support for Multi-SBOM scanning

Tue 29 August 2023

Added support for multi-SBOM Scanning and the ability to scan SBOM files through CI/CD integrations.

๐Ÿ“ข CI/CD support SBOM

๐Ÿ”„๐Ÿ› ๏ธ ๏ธNow it's possible to run the scan for SBOM files through the ostorlab CI/CD integrations, for more info refer to Github Integration, Azure-Devops Integration, CircleCi Integration

CircleCi

๐Ÿ“ข Multi-SBOM

Multi-Sbom

Ostorlab now supports the simultaneous scanning of multiple Software Bill of Materials (SBOM) files ๐Ÿ“๐Ÿ“ Documentation.

mdi-source-commit

PDF report items filtering by both risk rating and ticket status

Wed 09 August 2023

Ostorlab now supports filtering PDF report items by both risk rating and ticket status.

Modal to filter PDF report items by both risk rating and ticket status

Ticket statuses are now also included in the report for better understanding:

PDF report showing both risk rating and ticket status

mdi-source-commit

August Fix-it!

Tue 08 August 2023

During our recent Fix-It Week ๐Ÿ› ๏ธ๐Ÿ˜ƒ, our dedicated team put in a tremendous effort to address and resolve over 107 issues affecting our systems. This action-packed week led to numerous improvements in functionality, stability, and security across various components of our application. ๐Ÿš€๐Ÿ”ง๐Ÿ”’ Below is a highlight of the most notable fixes: ๐Ÿ“‹๐Ÿ”

Security:

  • Improve brute force attack detection and remediation, particularly credential stuffing ๐Ÿ”๐Ÿ’ช
  • Improve XSS handling of form input fuzzing ๐Ÿ›ก๏ธ๐Ÿ”
  • Improve description and recommendation of several common vulnerabilities ๐Ÿ“๐Ÿ”’
  • Improve fingerprint detection of Xamarin dependencies ๐Ÿง๐Ÿ”

Attack Surface:

  • Improve handling of edge case TLD values ๐Ÿ”„๐Ÿ”

UI:

  • Add item filtering in the ticket edit mode ๐Ÿ”๐ŸŽซ
  • UI improvements ๐ŸŽจโœจ

Production:

  • Series of bug fixes, dead code deletion, and version upgrades, some with their fair share of breakages, pain, sweat, and tears ๐Ÿ˜…๐Ÿš‘๐Ÿ”ง
  • Add support for download geofencing in more countries ๐ŸŒ๐Ÿ“ฅ๐Ÿ”’

Monkey Tester:

  • Address navigation issues in some edge cases using image detection and OCR reading ๐Ÿ’๐Ÿ”๐Ÿ“–

Jira:

  • Updated Jira Projects API to fetch projects in real mode ๐Ÿ“Š๐Ÿ”„
  • Add backporting of tickets in case Jira project settings are changed ↩๏ธ๐ŸŽซ

Mobile: * Support for Different Regions in iOS Downloader: Added support for downloading iOS applications in Japan, Russia, UK, Germany, and China ๐ŸŒ๐Ÿ“ฑ๐Ÿ‡ฏ๐Ÿ‡ต๐Ÿ‡ท๐Ÿ‡บ๐Ÿ‡ฌ๐Ÿ‡ง๐Ÿ‡ฉ๐Ÿ‡ช๐Ÿ‡จ๐Ÿ‡ณ.

mdi-source-commit

Extended Dependency Detection

Tue 18 July 2023

We are excited to announce that Ostorlab now supports uploading an SBOM or Lockfile for extended dependency detection.

Create a scan with an SBOM or Lockfile

Supported Files

The platform supports an extensive list of SBOM and Lockfiles.

  • SPDX
  • CycloneDX
  • gradle.lockfile
  • pubspec.lock
  • buildscript-gradle.lockfile
  • pnpm-lock.yaml
  • package-lock.json
  • packages.lock.json
  • pom.xml
  • Gemfile.lock
  • yarn.lock
  • Cargo.lock
  • composer.lock
  • conan.lock
  • mix.lock
  • go.mod
  • requirements.txt
  • Pipfile.lock
  • poetry.lock

To get started, refer to the detailed steps provided in our integration documentation here.

mdi-source-commit

CircleCI and AppCenter CI/CD integrations

Tue 11 July 2023

We are excited to announce the addition of CircleCI and AppCenter CI/CD integrations.

๐Ÿ“ข Circleci

With CircleCI orb, you can integrate security scanning into your deployment pipeline. With this integration, you can enhance the security of your applications during the deployment process.

CircleCi

To get started, refer to the detailed steps provided in our integration documentation here.

๐Ÿ“ข AppCenter

With AppCenter integration, you are able to incorporate Ostorlab security scanning into your CI/CD pipelines.

CircleCi

For more information and instructions, please refer to the documentation here.

mdi-source-commit

New Features & Fixes in July 2023

Sat 01 July 2023

We're excited to announce a series of updates and improvements designed to enhance your experience and security. Here's what's new:

๐Ÿ” Security Enhancements

  • Added over 200 Flutter-specific detection rules for increased vulnerability spotting.๐ŸŽฏ
  • Improved vulnerability entries for various issues, including template injection, XML injection, ZIP path traversal, and more.๐Ÿ”ง
  • Addressed insecure biometric authentication and client-side XSS among new vulnerabilities.๐Ÿ›ก๏ธ
  • Launched an open-source Flutter vulnerable module for community contribution.๐Ÿš€
  • Rolled out a detection feature for Facebook insecure devsettings.๐Ÿ”
  • Minor bug fixes and improvements in our PDF generation process.๐Ÿ“

๐Ÿ”„ Authentication Improvements

  • Social authentication now supports Google and Github providers, allowing for seamless and secure sign-in experiences.๐Ÿ”‘

๐Ÿง  AI and Analysis Updates

  • Introduced an AI Enhanced summary and recommendation system for better decision-making.๐Ÿค–
  • Added dynamic call listing to the analysis environment, allowing for more comprehensive exploration.๐Ÿ”Ž
  • Deprecated some iOS findings for more accurate results.โŒ

๐Ÿ–ฅ๏ธ UI & UX Upgrades

  • Revamped the notification UI for a more streamlined user experience.๐Ÿ””
  • Added ticket count in the remediation menu for better task management.๐Ÿ“Š
  • Rolled out duration-based search filters to refine your search results.โฑ๏ธ
  • Slots counts are now visible on the payment page for improved transparency.๐Ÿ’ณ
  • We've also given our blog a fresh, new look!๐ŸŒ

๐Ÿค Integration and Support

  • Minor bug fixes in Jira integration support for smoother collaboration.๐Ÿ”ง
  • Improved geofencing support for several countries, including India and UK.๐ŸŒ
  • Bettered Monkey Tester support for Webview based navigation on both Android and iOS platforms.๐Ÿ“ฑ

๐Ÿ› Bug Fixes & Open-Source Contributions

  • Fixed bugs in AAB file support for a smoother app experience.๐Ÿ› ๏ธ
  • Fixed multiple issues in open-source agents like Truffle Hog and Semgrep.๐Ÿž
  • Released an open-source OSV agent for broader community collaboration.๐Ÿ‘ฅ
  • Addressed minor bugs to improve Automation Rules functioning.๐Ÿ”„
mdi-source-commit

Enhanced Security Features, New Automation Rules, and Flexible Yearly Plans for Improved User Experience

Mon 01 May 2023

Our latest release is packed with numerous enhancements, designed to elevate your security experience with Ostorlab. From attack surface discovery to vulnerability detection and reporting, we have made significant strides to make your security journey smoother than ever before.

Here are some of the highlights of our latest release:

  • Faster and easier navigation of artifacts and scan coverage;
  • Weekly reporting that provides valuable insights into trends and patterns;
  • Export button to CSV from both scan and tickets menus for enhanced convenience;
  • Over 50 new vulnerability detections, further improving the quality of our security assessments;
  • Improved SMS 2-FA based authentication, providing an added layer of security;
  • Extraction of dynamic routing from popular web frameworks like Next.js and Nuxt.js, helping you identify potential vulnerabilities in your web applications more efficiently.

New Automation Rules

We are excited to announce the release of our new automation rules features, designed to streamline your workflow and simplify your security management. With these new features, you can now automatically assign owners, set tags, send email notifications, and more.

Here are a few examples of how the new automation rules can come in handy:

  • Automatically assign vulnerabilities to a user for remediation;
  • Confirm discovered assets and assign an owner automatically;
  • Apply specific tags to assets that match certain filters;
  • Receive email notifications when assets match a specific pattern, such as when a potential service has SSH exposed on a non-default port.

Flexible Yearly Plans: Use Your Testing Slots Anytime, Anywhere

We are thrilled to announce that we have made some significant changes to our yearly plans based on your feedback. One of the most requested features from our users has been the ability to adjust the usage of their yearly plans to meet spikes in testing needs, without losing testing slots during periods of inactivity or development.

We are delighted to inform you that we have taken note of your feedback, and have made necessary adjustments to our yearly plans, allowing access to all testing slots at any time. Additionally, you can now rest easy knowing that unused testing slots will not be lost during a particular month.

These updates are already available to our existing users with an active plan, and for those who wish to subscribe to a yearly plan.

We hope these changes will enable you to maximize the value of our service and meet your testing requirements without any hassle.

mdi-source-commit

Enhanced Attack Surface Detection: Introducing Faster Scans, Mobile App Attack Surface, and Improved Navigation Features

Sat 01 April 2023

Attack Surface Enhancements

We've made a long list of changes to improve the experience of detecting and navigating your attack surface.

Here are just some of the cool new features:

  • Narrow down on any asset using the filter button and access its direct asset connections or even its 2nd and 3rd connections. This feature helps us understand how the attack surface discovery detects new assets. A great example is a user with his work email registering multiple new domains that weren't tracked anywhere before. You know yourself, John from Marketing ๐Ÿ™‚.
  • Addition of powerful new search features like searching by multiple ownership types or excluding assets matching a search pattern.
  • Convenient quick action buttons to trigger a scan or add a monitoring rule. If you are curious about that asset's vulnerabilities, just hit "Quick Scan".
  • Bulk asset import makes it a breeze to add many assets by simply uploading a CSV file.
  • Access asset data directly from the attack surface graph with information such as DNS Records, open services, used libraries, Whois data, in-use certificates, and much more.

A deeper look at your Mobile Applications Attack Surface.

Attack surface is not just about domain names and IP addresses, especially if you are a mobile-first company.

Ostorlab’s attack surface now detects and tracks mobile applications' attack surface, be it what is the app exposing, what dangerous features is it using, what libraries are used and most importantly tracking their changes and when they are changed. It will even list all backend systems and indicate their geographical location.

Mobile Scan Summary

Our latest work includes a new scan insights feature with a summary of scan reports and actionable feedback on how to improve the security of your app. Augmented with attack surface data, the report provides useful insight into the impact of the identified issues.

Faster Scans ๐ŸŽ๐ŸŽ๐ŸŽ

If you have been using the platform for a while, you might have noticed that scans run faster, much faster. This has required a substantial amount of engineering effort to increase speed without sacrificing quality. This is only the first step toward achieving a full scan completion in under an hour which we aim to achieve before the end of this year.

mdi-source-commit

Improved automation rules, export options, UI, and support.

Wed 01 March 2023
  • ๐Ÿ†• Release of new automation rules to auto-assign owners, set tag, notify results, etc.
  • ๐Ÿ†• Added new export options to CSV and a copy of ticket.
  • โฌ† Improved the UI of the attack surface adding search capabilities.
  • ๐Ÿ†• Added details to the Plans page on exact history usage.
  • โฌ† Improved the speed and UI of scan artifacts and call coverage.
  • ๐Ÿ†• Added Jenkins support for remote build nodes.
  • ๐Ÿ†• Released weekly organisation summary email with collection of last scans, last findings and items requiring attention.
  • ๐Ÿ†• Added ability to save searches.
  • ๐Ÿ› Multiple fixes to Jira ticket creation.
  • โฌ† Added new search to the monitoring page.
  • ๐Ÿ› Fixed handling of XAPK files.
  • ๐Ÿ†• Add scan summary new feature to the PDF reports.
  • โฌ† Improved coverage of Web Authentication recorder to support new cases.
  • ๐Ÿ†• Added support in the crawler for path extraction of dynamically routed web frameworks like Next.js and Nuxt.js.
  • ๐Ÿ†• Release of new open-source agent for trufflehog.
  • ๐Ÿ†• Added Wireguard VPN support to several open-source agents like nmap, tsunami, nuclei ...
  • ๐Ÿ†• Improve Monkey tester support for SMS based 2-FA .
  • โฌ† Improved reporting of public firebase databases.
  • โฌ† Added detection of insecure biometric authentication implementation on Android.
  • โฌ† Improved reporting of clear text traffic vulnerabilities.
  • โฌ† Improved the backend vulnerability fuzzer and productionization of learning pipeline and addition of new test cases for SQL injection.
  • ๐Ÿ†• Improved PII detection in logs.
  • ๐Ÿ› Deployed multiple fixes and improvements to secret detection.
  • โฌ† Improved over 50 knowledge base entries like hasFragileUserData for better description and recommendation.
  • โฌ† Improved detection of insecure file provider path settings.
  • ๐Ÿ› Optimized the performance of several queries improving performance by 86%.
mdi-source-commit

Enhanced scan speed and reliability, and other improvements.

Sun 01 January 2023
  • ๐ŸŽ‰ Faster scan and improved scan reliability
  • ๐Ÿš€ Mobile Attack surface tracking and historization
  • โšก Improved backend detection and geographic location reporting
mdi-source-commit

Enhanced metrics for improved scanning health, remediation, and attack surface

Tue 01 November 2022
  • ๐ŸŽ‰ Improved metrics with over new 100 metrics collected and new dashboard showing both scanning health, remediation improvement and attack surface evolution.
  • ๐Ÿ”’ Attack surface tracking and historization allowing for known what services and libraries are present and when they were introduced.
mdi-source-commit

Release of Attack Surface asset discovery

Mon 01 August 2022
  • ๐Ÿš€ Release of Attack Surface asset discovery, a graph-based approach with improved coverage for better asset detection.
  • โšก Ability to configure assets with owners, color, notes, tags, location, and risk rating to ease adding context and influence vulnerability risk rating.
  • ๐Ÿ“˜ Collection of asset history with information like DNS, open services and ports, tech stacks, whois. This offers the ability to track changes and monitor evolution over time.
  • ๐Ÿ”ฌ Out-of-the-box scan instrumentation with opentelemetry and improved debugging of Ostorlab's open-source engine.
  • ๐Ÿ’ป Open-sourcing of several new detectors for domain hijacking, recon, fingerprinting ...
  • ๐ŸŽŒ Ability to search applications on the store by country.
  • ๐Ÿ“„ Certificate-based authentication for Mobile Scans and script-based authentication for web scans.
  • ๐Ÿ’ New analysis environment for web applications with intercepted traffic and visualization of crawl coverage (this one looks awesome).
  • ๐Ÿ“ Improved plans management for large organizations with the ability to transfer subscriptions and resize them on the fly.
  • ๐ŸŽฉ Improved Jira integrations with configuration test, risk rating selection, and improved information synchronization.
mdi-source-commit

March-April-May 2022

Sun 01 May 2022
  • ๐Ÿ’Ž New Attack Surface Discovery to discover known and unknown owned assets and schedule continuous monitoring
  • ๐Ÿ”’ Add support for using Chrome Recorder script for Authentication
  • ๐ŸŽ‰ Add support for CRON based monitoring with defined schedules
  • ๐Ÿ”จ Github Actions integrations
  • ๐ŸŽ‰ Open-sourcing of over 20 security testing agents (Zap, Whatweb, Whois IP, Whois Domain, Wappalyzer, Virus Total, Tsunami, Tracker, Subfinder, Openvas, Nuclei, Nmap ...)
  • ๐Ÿš€ Performance and resilience improvement to Ostorlab Agent Builder
mdi-source-commit

November-December 2021 / January-February 2022

Tue 01 February 2022
  • ๐Ÿ‘พ Improve detection of Flutter and React-Native vulnerabilities
  • ๐Ÿ‘พ Add detection of several new classes of vulnerabilities, including Log4J
  • ๐ŸŽ‰ Open-Sourcing of Ostorlab scanning engine adding support for local runtime and Windows-based environment Adding Ostorlab Agent store to easily access and publish scan agent
  • ๐Ÿš€ New agent-group definition to define composable scan agent
  • ๐Ÿš€ New agent-group UI builder and YAML definition file generation
  • ๐Ÿš€ Automated agent builder from repo that automatically detects and builds new releases
  • ๐Ÿซ New learning center exposing documentation, videos, scan sample and vulnerability knowledge base
  • ๐ŸŽ‰ Open-Sourcing Ostorlab knowledge base
  • ๐ŸŽ‰ Open-Sourcing agents for popular tools Nmap, Tsunami, Nuclei and Virustotal
  • ๐ŸŽ‰ Open-Sourcing agents for improved vulnerability tracking (Tracker, Persist Vulnz, Inject Asset and Debug)
  • ๐Ÿ” Improve account security with OTP (One-Time-Password) support
  • ๐Ÿ”จAdd integrations portal to configure newly support integrations
  • ๐Ÿ”จ Add Jira, Gitlab and Jenkins for CI/CD and ticketing integration
  • ๐Ÿ” Add SAML-based authentication for SSO enterprise access
mdi-source-commit

September-October 2021

Fri 01 October 2021
  • Release of the Remediation API with better vulnerability lifecycle management, allowing detection of fixed vulnerabilities, re-opens and maintain status of exception and false positives
  • New dashboard offering a glass box view into security posture and urgent tasks
  • Management of patching and priority policies with SLO and tools to track and measure fix performance
  • 3rd Party integrations with Jira
  • Add Ticket timeline to with dynamic setting of start and end time
  • Add grouping of ticket by status, priority and tag
  • Add Ticket bulk edit mode
mdi-source-commit

August 2021

Sun 01 August 2021

Focus on improving the Monkey Tester to improve coverage adding support for more strategies and advanced test case generation. Work also included better handling of Application packaging and management of our fleet of mobile devices.

  • ๐Ÿค– An all improved Monkey Tester with highly improved code coverage
  • ๐Ÿ’ UI Call coverage visualisation to understand what has been done
mdi-source-commit

July 2021

Thu 01 July 2021

Focus on improving Web Scanner detection, adding several features, like Backend fingerprinting, adding more vulnerabilities and improving Backend Vulnerability representation model. Work also included improving Monkey Tester to support more advanced testing strategies. Key updates:

  • ๐Ÿค– Adding support for multiple strategies to Monkey Tester
  • ๐Ÿชฒ Multiple bug fixes and improvements to Backend Scanner, XSS Scanner, Fingerprint detections
  • ๐Ÿค– Scale search indexing infrastructure to handle the increase in covered assets
mdi-source-commit

June 2021

Tue 01 June 2021
  • ๐Ÿค– Support of new backend vulnerabilities, like SQL with JDBC escape sequence, Jinja template injection, Python Object serialisation ...
  • ๐Ÿค– Support of new backend vulnerabilities, like XXE, XSLT injection, Fastjson serialisation, PHP RCE ...
  • ๐Ÿชฒ Tweaks to the JDWP Android monitor for coverage and performance.
  • ๐Ÿš€ Parallelization and backend vulnerability model generation to improve false positive confidence to 6*9 (99.9999%).
mdi-source-commit

May 2021

Sat 01 May 2021
  • ๐Ÿชฒ API traffic improvement and bug fixes
  • ๐Ÿ” Multiple performance and enhanced result for the new search feature
  • ๐Ÿค– New dynamic instrumentation engine for iOS based on LLDB
  • ๐Ÿค– Improve iOS instrumentation to capture SQL, Crypto, Keychain, Zip, Wifi, Webkit, Biometric, Filesystem, HTTP, Preferences dangerous API
  • ๐Ÿค– Enable backtracing of dangerous API to track their usage
  • ๐Ÿค– Support of credential authentication in Web Scan
  • ๐Ÿค– Improved Web Crawling to support mutated html
mdi-source-commit

April 2021

Thu 01 April 2021
  • ๐Ÿ” New rules to detect insecure javascript patterns and new insecure secret usage.
  • ๐Ÿ’ Add search, tagging and call trace of extern functions, like JNI.
  • ๐Ÿ” New scan search capability to search across all analysis asset types.
  • ๐Ÿ’ API traffic IDE capability.
  • ๐Ÿค– API to persist taint graph from scan.
mdi-source-commit

March 2021

Mon 01 March 2021
  • ๐Ÿชฒ Fixes to the Analysis Environment indexing to enable code and file search
  • ๐Ÿ“ข Deprecate Free+Analysis scan type in a revamp of the analysis environment
  • ๐Ÿš€ Asset inventory model rewrite leading address a performance issues leading to 600% performance improvement of loading scans.
  • ๐Ÿค– Support for persisting taint graph for use by the Analysis Environment and future VulnAPI
  • ๐Ÿ’ Support for tagging of native function in IDE
  • ๐Ÿ” Add multiple new sinks methods
  • ๐Ÿชฒ Remove false positive in detection of RSA/ECB weak encryption
  • ๐Ÿชฒ Bug fixes to taint analysis leading missing detections
  • ๐Ÿค– Detection of valid Sendgrid API keys
  • ๐Ÿค– Enhanced detection of dangerous Webview settings and deprecation of non-vulnerable APIs
  • ๐Ÿค– Detection of insecure Zip leading to path traversal arbitrary file overwrite
  • ๐Ÿชฒ Fix Twitter API detection
mdi-source-commit

February 2021

Mon 01 February 2021
  • ๐Ÿชฒ Fixes to the Analysis Environment indexing to enable code and file search
  • ๐Ÿ“ข Deprecate Free+Analysis scan type in a revamp of the analysis environment
  • ๐Ÿš€ Asset inventory model rewrite leading address a performance issues leading to 600% performance improvement of loading scans.
  • ๐Ÿค– Support for persisting taint graph for use by the Analysis Environment and future VulnAPI
  • ๐Ÿ’ Support for tagging of native function in IDE
  • ๐Ÿ” Add multiple new sinks methods
  • ๐Ÿชฒ Remove false positive in detection of RSA/ECB weak encryption
  • ๐Ÿชฒ Bug fixes to taint analysis leading missing detections
  • ๐Ÿค– Detection of valid Sendgrid API keys
  • ๐Ÿค– Enhanced detection of dangerous Webview settings and deprecation of non-vulnerable APIs
  • ๐Ÿค– Detection of insecure Zip leading to path traversal arbitrary file overwrite
  • ๐Ÿชฒ Fix Twitter API detection
mdi-source-commit

January 2021

Fri 01 January 2021
  • ๐Ÿค– Switch API encoding from JSON to UBJSON to add support for binary format
  • ๐Ÿ’ Analysis Env javascript formatting
  • ๐Ÿ’ Analysis Env detection of new file formats
  • ๐Ÿ’ Analysis Env call trace node coloring to match function and method tagging
  • ๐Ÿชฒ Multiple bug fixes and performance optimization of the Analysis Env
  • ๐Ÿ“ข Support for sharing report access using a shareable link
  • ๐Ÿ“ข Add edit mode to vulnerabilities to change risk rating or mark as a false positive
  • ๐Ÿš€ Detection of new secrets keys and dangerous functions
mdi-source-commit

December 2020

Tue 01 December 2020
  • ๐Ÿ“ข Release of Android and iOS application analysis environment
  • ๐Ÿš€ Analysis Env support for APK and IPA file listing with content access
  • ๐Ÿš€ Analysis Env support for Code highlighting for HTML, Javascript, XML, Java, C++
  • ๐Ÿš€ Analysis Env support for Binary plist extraction
  • ๐Ÿš€ Analysis Env support for Macho and ELF file disassembly and decompilation for ARM and ARM64
  • ๐Ÿš€ Analysis Env support for Macho and ELF string listing
  • ๐Ÿš€ Analysis Env support for DEX classes listing
  • ๐Ÿš€ Analysis Env support for DEX smali listing and java decompilation
  • ๐Ÿš€ Analysis Env support for Android resource extraction
  • ๐Ÿš€ Analysis Env support for Android manifest extraction
  • ๐Ÿš€ Analysis Env support for DEX, Macho, and ELF function call trace with full refs and xrefs generation
  • ๐Ÿš€ Analysis Env support for Dangerous functions tagging to identify security hotspots.
  • ๐Ÿš€ Analysis Env support for Contextual call trace generation.
mdi-source-commit

October 2020

Thu 01 October 2020
  • ๐Ÿ“ข Release of continuous application monitoring from the store
  • ๐Ÿ” Detection of weak Bluetooth connection
  • ๐Ÿ” Detection of dynamic broadcast receiver with no permissions
  • ๐Ÿ“ข New Jenkins Plugin to integrate CI/CD pipelines with Ostorlab
  • ๐Ÿ’ Email and UI notification to inform of key events (scan completion, password change ...)
  • ๐Ÿ’ Expose API key generation and management from the UI
mdi-source-commit

September 2020

Tue 01 September 2020
  • ๐Ÿ“ข Release of Ostorlab lighthouse continuously scanning public applications
  • ๐Ÿ“ข Release of Ostorlab VulnDB UI to access internal known vulnz database
  • ๐Ÿ’ Vulnerability tagged as affecting security and privacy, security only or privacy only
  • ๐Ÿ” Detection of several privacy settings in Android manifest
  • ๐Ÿ” Detection of facebook SDK debug mode
  • ๐Ÿ” Detection of GPS location tracking impacting privacy
  • ๐Ÿชฒ Fix insufficient sink default taint and missing propagation for Array and Const
mdi-source-commit

August 2020

Sat 01 August 2020
  • ๐Ÿ“ข Store search and scan feature
  • ๐Ÿ“ข Deep 3rd party dependencies fingerprinting
  • ๐Ÿ’ Markdown vulnerability text and description support
mdi-source-commit

July 2020

Wed 01 July 2020
  • ๐Ÿ“ข Extend 3rd party dependencies rules
  • ๐Ÿš€ Creation of database of unreported vulnerabilities
mdi-source-commit

June 2020

Mon 01 June 2020
  • ๐Ÿ’ Report libraries and 3rd party dependencies
  • ๐Ÿ” Fingerprinting of Native Android libs, iOS Frameworks, Cordova plugins, Javascript libraries, Xamarin libs and OpenSSL
  • ๐Ÿš€ Vetted and enhanced vulnerability database with all the known vulnerabilities affecting libraries and 3rd party dependencies
  • ๐Ÿš€ Indexing support for Maven Jar and AAR, Cocoapod podspecs and NPM packages
  • ๐Ÿ” Detect calls to dangerous Bluetooth API
mdi-source-commit

May 2020

Fri 01 May 2020
  • ๐Ÿ“ข Exposure of CVSSv3 score
  • ๐Ÿค– Alpha support for UI Automation rules
  • ๐ŸŽ Add Xamarin decompiled source code to the list of artifacts
  • ๐Ÿ” Detect of secrets (SSH Private Keys, Service Account, Slack Token, etc.)
  • ๐Ÿ” Detect use of deprecated TLS protocols (SSLv2, SSLv3, TLSv1.0, TLSv1.1)
mdi-source-commit

April 2020

Wed 01 April 2020
  • ๐Ÿ“Š Add generation of executive summary PDF report
  • ๐Ÿ“ข New Secure risk rating to denote secure implementation
  • ๐Ÿ“ข New Hardening risk rating to differentiate between actual vulnerability and missing hardening mechanism
  • ๐Ÿ“ข Add support for archiving scans
  • ๐Ÿ“ข Add support for exporting scans
  • ๐Ÿ” Add detection of new sinks and sources leading to insecure file write, insecure TLS and command execution
  • ๐Ÿš€ Enhance performance of taint analysis and increase coverage
  • ๐Ÿ’ Enhanced representation of taint information
  • ๐Ÿ’ Enhanced representation of stack traces collected in dynamic analysis
  • โš  Fix inconsistency in risk rating
  • ๐Ÿชฒ Fix false positive in iOS detection for missing ARC and Stack Guard protections
mdi-source-commit

March 2020

Sun 01 March 2020
  • Support for streaming API to create and stops scans
  • Subscription support
  • New KB entry for Webview LoadURL injection
  • Bug fixes to JDWP Hooking engine
  • Dashboard update showing scan plan
  • Support for stopping and archiving scans
mdi-source-commit

February 2020

Sat 01 February 2020
  • API for scheduling rules
  • Migration to Kubernetes
  • Initial support for streaming API to create scans
mdi-source-commit

January 2020

Wed 01 January 2020
  • API to manage Inventory (mobile apps, urls, domains, ...)
  • UI to list, create and update Inventory and Assets
  • CI/CD pipeline integration
  • Deprecate old UIs
mdi-source-commit

December 2019

Sun 01 December 2019
  • Release of the alpha version of the new reporting front end
  • API naming fixes
  • Fix submission of the test credentials
  • New Google Play client to support scanning from the Play Store directly
  • Several New APIs move to GraphQL (Account and Password Management, Artifcats)
  • Worker to handle long-running jobs (PDF generation and Scan Export)
mdi-source-commit

November 2019

Fri 01 November 2019
  • Progress on the new reporting front end
  • Bug fixes in public website
  • Simplified pagination support in all APIs
  • Experimental API to create Web Scans
mdi-source-commit

October 2019

Tue 01 October 2019
  • Release of an open source Android application to benchmark vulnerability scanners
  • Extensions to the GraphQL API adding support for pagination, vulnerability search and switch from passing applications in Base64 to multi-part support
  • Progress on the new reporting front end
mdi-source-commit

September 2019

Sun 01 September 2019
mdi-source-commit

August 2019

Thu 01 August 2019
  • Major migration of all existing infra and data to the new backends.
mdi-source-commit

June 2019

Sat 01 June 2019
  • Infra refactoring into a micro-service architecture.
  • Separation of user portal and public website to prepare moving to serverless.
  • Separation of backend and add an orchestration backend to prepare moving from Swarm to k8s.
mdi-source-commit

May 2019

Wed 01 May 2019
  • Refactoring of API adding support for GraphQL.
  • Migration of website, user portal and orchestrator to GraphQL.
mdi-source-commit

April 2019

Mon 01 April 2019
  • Extending vulnerability test bed.
  • Add support for template injection of 4 new Java template engines.
  • Add support detection of Ruby code injection.
  • Add support detection of Node.js code injection.
mdi-source-commit

March 2019

Fri 01 March 2019
  • Multiple bug fixes and performance enhancements.
  • Fix false positive detection of Template Injection.
  • Add support detection of python code injection.
  • Add support detection of pickle deserialization injection.
mdi-source-commit

February 2019

Fri 01 February 2019
  • Multiple bug fixes and performance enhancements.
  • Enhance detection of XSS adding support for multiple callbacks vectors.
mdi-source-commit

January 2019

Tue 01 January 2019
  • New alpha system to detect vulnerabilities in backends from previously collected ones.
  • Creation of a new vulnerability test bed.
mdi-source-commit

December 2018

Sat 01 December 2018
  • Add support for detection of stored XSS.
  • Complete rework of the scan authentication module. It works well and sends fewer requests.
  • Brand new subscription menu.
  • Bug cleaning season.
mdi-source-commit

November 2018

Thu 01 November 2018
  • Add support for multi-step submitting of Forms.
  • Enhancement to automatic detection of CSRF fields and auto-update of CSRF tokens.
  • Alpha version of Fingerprinting agents.
mdi-source-commit

October 2018

Mon 01 October 2018
  • Major enhancement coverage of XSS contexts, long live Polyglot payloads.
mdi-source-commit

September 2018

Sat 01 September 2018
  • Enhance CSRF handling for web scanning.
  • Add scan export and import feature for on-premise scanning support.
  • Implementation of ADB Proxy agent for on-premise scanning support.
  • Add collection of screenshots and logcat traffic during dynamic analysis.
  • New security rules for Android Network Security Configuration.
  • Fix false positives in Cryptography rules using static taint.
  • Rework of all rules formatting.
  • Fix PDF generation and add support for code highlighting.
  • Add support for kown pathes crawling
  • Add Artifact panel to store extracted source code, screenshots and traffic logs.
  • Add Xamarin source code decompilation.
  • Fix duplicate request testing by backend and XSS scanner.
  • Initial work on CSRF token detection and generation for POST request fuzzing.
  • Add support for inserting payloads in sub-pathes.
mdi-source-commit

August 2018

Wed 01 August 2018
  • Extensive bug fixes month of all core components.
  • Enhance testability of the scanning engine.
  • Enhance reporting features.
mdi-source-commit

July 2018

Sun 01 July 2018
  • Enhanced detection of template injection vulnerabilities.
  • New scanner for detecting XSS vulnerabilities.
  • Ehanced supported for nested serialization formats.
  • Major rework for scan scheduling engine for increased scalability.
mdi-source-commit

June 2018

Fri 01 June 2018
  • New backend scanning engine with beta support for SQL injection and XXE
  • Adding beta support for crawling of HTML content.
mdi-source-commit

May 2018

Tue 01 May 2018
  • Bumping free scanner coverage limit from 100 to 300.
  • New detector for encrypted IPA.
  • Fix false positive in dynamic rules detecting weak encryption.
mdi-source-commit

April 2018

Sun 01 April 2018
  • Porting LLDB for iOS to work on Linux.
  • New backend scan engine.
  • New experimental crawler.
mdi-source-commit

February 2018

Thu 01 February 2018
  • Adding Support for authenticated scan.
  • Final version of Java hook engine with stack trace support and full context inspection.
  • Major enhancement to the taint engine reducing false positives.
  • Multiple bug fixes affecting PDF generation and false positive declaration.
  • Adding feature to report false positives and remove them from the final report.
  • Multiple new dynamic rules to trace sensitive function call.
  • New agent to detect sensitive material files, like private encryption keys.
mdi-source-commit

January 2018

Mon 01 January 2018
  • Surface static taint analysis coverage in the scan report.
mdi-source-commit

December 2017

Fri 01 December 2017
  • Unsafe Transport App Security settings in iOS apps are reported as vulnerabilities.
  • Performance enhancement for the support of large multidex files.
  • Bug fix in method xref for multidex files.
  • Enhance vulnerability de-duplication.
  • Multiple bug fixes for iOS scan rules.
mdi-source-commit

November 2017

Wed 01 November 2017
  • Advanced option to detect weak files permission for both Android and iOS. (OWASP Mobile Top 10 - M2)
  • Advanced option to detect Personal Identifiable Information (PII) leakage for both Android and iOS. (OWASP Mobile Top 10 - M2)
  • Advanced option to detect clear-text traffic for both Android and iOS. (OWASP Mobile Top 10 - M3)
  • Advanced option to detect insecure TLS/SSL validation for both Android and iOS. (OWASP Mobile Top 10 - M3)
  • Advanced option to support iOS call to weak Cryptographic API. (OWASP Mobile Top 10 - M5)
  • Advanced option to support download PDF report.
mdi-source-commit

September 2017

Fri 01 September 2017
  • Stabilizing unlimited scan feature with bug fixes.
  • Correction of false positives in Insecure Encryption Mode.
  • Correction of false positives in ASLR detection for iOS Apps.
  • Move to a clustered architecture to support increase scan load.
  • Final version to support dedicated unlimited scans.
mdi-source-commit

August 2017

Tue 01 August 2017
  • New feature to support dedicated scans.
  • Tweaks and updates to the user interface to support fast uploading.
mdi-source-commit

July 2017

Sat 01 July 2017
  • New backend system to support the increased load.
  • Major code refactoring of all agents to support the new backend system.
  • Multiple bug fixes.
mdi-source-commit

June 2017

Thu 01 June 2017
  • New static taint engine for Android Bytecode.
  • Multiple bug fixes and performance tweaks.