Release 10.3 

October 23, 2024

What's New?

New QIDs

The following new QIDs are introduced in the release:

Vuln ID Category Title Description

150221

Information Gathered

External (third-party) CSS link detected

Detection of all external resources, including stylesheets (CSS), is a basic certification and audit requirement as malicious actors may exploit them to gain control over your sensitive information.

150845

Information Gathered

Business logic abuse potential due to the presence of external domains detected

Qualys WAS now supports the detection of external domains used in a web application. The external domains introduce external threats and dependencies and compromise the application's integrity.

150222

Vulnerability

Reverse Tabnabbing

Reverse Tabnabbing is an attack where the target page is replaced by a phishing site.  When a user clicks on the HTML link, they are redirected to phishing or unintentional website.

WAS detects this vulnerability during crawling and evaluates HTML links embedded in anchor tags.

150320

Practice

Null Byte Injection

Null Byte Injection is an active exploitation technique used to bypass sanity-checking filters in web infrastructure by adding URL-encoded null byte characters (e.g., % 00 or 0x00 in hex) to the user-supplied data.

The injection of null bytes introduces vulnerabilities to the system and applications to alter the application's intended logic and allow a malicious adversary to gain unauthorized access to the system files.

Updated QIDs

The following QIDs are updated in this release:

Vuln ID Category Title Description

150022

Vulnerability

Server Error Message

The QID 150022 is updated to report the syntax error in response headers during crawling and parameter testing.

150125

Information Gathered

File Upload Form Found

We updated the QID 150125 to detect the forms without the <form> tag and file upload buttons outside the <form> tag.

Enhancement for Burp Collection Parsing

For some burp collections, all the burp requests were not parsed due to the unidentified  HTTP header version. We have now updated the HTTP versions for the burp requests that were skipped during parsing. With this enhancement, the entire burp collection is crawled in the parsing process.

Issues Addressed

The following reported and notable customer issues have been fixed in this release.

Category/Component Description
Reporting We fixed an issue in which the QID 150116 was not reported for some scans even after the successful basic authentication.
Standard Authentication An issue was observed where the scan with standard authentication failed as it was redirecting to an external URL. We fixed this issue by modifying the form identification logic for the browser. 
Scan The findings associated with the QID 150568 could not be fixed because the affected URLs were not being crawled even after the retest. We fixed this issue by including all vulnerable links for retest action.
False positives We have fixed the false positive findings reported for security header-related QIDs - 150202, 150204, 150206, 150245, and 150124. Now, the primary URL and correct status codes for these QIDs are reported.