Release 10.3
October 23, 2024
What's New?
New QIDs
The following new QIDs are introduced in this release:
Vuln ID | Category | Title | Description |
---|---|---|---|
150221 |
Information Gathered |
External (third-party) CSS link detected |
Detection of all external resources, including stylesheets (CSS), is a basic certification and audit requirement as malicious actors may exploit them to gain control over your sensitive information. |
150845 |
Information Gathered |
Business logic abuse potential due to the presence of external domains detected |
Qualys WAS now supports the detection of external domains used in a web application. The external domains introduce external threats and dependencies and compromise the application's integrity. |
150222 |
Vulnerability |
Reverse Tabnabbing |
Reverse Tabnabbing is an attack where the target page is replaced by a phishing site. When a user clicks on the HTML link, they are redirected to phishing or unintentional website. WAS detects this vulnerability during crawling and evaluates HTML links embedded in anchor tags. |
150320 |
Practice |
Null Byte Injection |
Null Byte Injection is an active exploitation technique used to bypass sanity-checking filters in web infrastructure by adding URL-encoded null byte characters (e.g., % 00 or 0x00 in hex) to the user-supplied data. The injection of null bytes introduces vulnerabilities to the system and applications to alter the application's intended logic and allow a malicious adversary to gain unauthorized access to the system files. |
Updated QIDs
The following QIDs are updated in this release:
Vuln ID | Category | Title | Description |
---|---|---|---|
150022 |
Vulnerability |
Server Error Message |
The QID 150022 is updated to report the syntax error in response headers during crawling and parameter testing. |
150125 |
Information Gathered |
File Upload Form Found |
We updated the QID 150125 to detect the forms without the <form> tag and file upload buttons outside the <form> tag. |
Enhancement for Burp Collection Parsing
For some burp collections, all the burp requests were not parsed due to the unidentified HTTP header version. We have now updated the HTTP versions for the burp requests that were skipped during parsing. With this enhancement, the entire burp collection is crawled in the parsing process.
Issues Addressed
The following reported and notable customer issues have been fixed in this release.
Category/Component | Description |
---|---|
Reporting | We fixed an issue in which the QID 150116 was not reported for some scans even after the successful basic authentication. |
Standard Authentication | An issue was observed where the scan with standard authentication failed as it was redirecting to an external URL. We fixed this issue by modifying the form identification logic for the browser. |
Scan | The findings associated with the QID 150568 could not be fixed because the affected URLs were not being crawled even after the retest. We fixed this issue by including all vulnerable links for retest action. |
False Positives | We have fixed the false positive findings reported for security header-related QIDs - 150202, 150204, 150206, 150245, and 150124. Now, the primary URL and correct status codes for these QIDs are reported. |