Release 1.18

December 15, 2024

What's New?

With this release, we introduce the following new features and enhancements to the Web Application Scanning user interface.

Enhanced Search with Classic Filters in Web Applications 

With this release, the classic data list filters are available in the Web Applications tab to enhance web application search.

With these filters, you can search for web applications using multiple criteria for web applications and detections associated with web applications. The filters help in quick searches with multiple and complex criteria without entering the QQL tokens manually.

A toggle is added to the left pane to switch between Quick and Classic filters. 

When you select multiple criteria from the Classic filters, the QQL tokens are added accordingly, and a search is performed to find the web applications based on the specified criteria. 

For example, values for the Web Application, Last Scan Status, and Detection Type filters are set from the classic filters.

Token Changes

The following QQL tokens are added to the Web Applications tab for the Classic filters. 

Token  Description 
application.scanScheduled Select the value true | false to find applications for which scan is scheduled.
application.scanScheduledType Select a scan type to find applications which have the selected scan scheduled: DISCOVERY, VULNERABILITY.
application.scannerType Select a scanner type to find applications where the selected scanner appliance type is defined for scanning: EXTERNAL, INTERAL, SCANNER_TAGS.

New Scan Status for Maximum Links Crawled

With this feature, we have added a new scan status - Max Links Crawled to indicate that the web application scan has ended due to the maximum number of links allowed for the scan has been crawled.

Token Change

The new value - MAX LINKS CRAWLED is added to the following tokens in WAS.

Tab  Token  Description 
Scan List scan.status Use the MAX LINKS CRAWLED value to find scans that ended because the maximum allowed links have been crawled in the scan. 
Web Applications application.lastScanStatus Use the MAX LINKS CRAWLED value to find web applications for which the last scan status is MAX LINKS CRAWLED.

WAS-VMDR Integration 

When Qualys Vulnerability Management Detection and Response (VMDR) detects some specific QIDs on the host assets, these QIDs signify that there might be a web application service running on the host asset. With this release, you can create a web application in WAS from the Detections tab in VMDR. Each of these QIDs has a port mapped to it which is used to populate the URL of the web application to be created in WAS.

List of QIDsList of QIDs

10464
11803
11827
11955
12087
12230
12245
12882
6728
12680
13136
13162
13910
38806
38807
38808
38809
42416
45056
45114
45110
45264
45266
48001
48002
48065
48118
48131
48200
62054
86000
86001
86047
86048
86054
86263
86264
86383
86473
86565
86693
86762
86728
86729
86743
86771
87089
87379
105664

Required Application Version  VMDR 2.1.0


You must have VMDR and WAS subscription and configure WAS Asset Permissions assigned. 

New Token

The following new tokens are added in the KnowledgeBase tabs:

Token  Description 
vulnDef.patchAvailable Select the one of the values - true | false to search QIDs based on patch availability.
vulnDef.complianceTypes Use this token to search for QIDs with the specified compliance type—HIPAA, GLBA, COBIT, SOX, or PCI.

Token Removal

The following token is removed from the Web Applications tab:

Token  Description 
asset.uuid You could use this token to find web applications with specified UUID. 

Issues Addressed 

The following important and notable issues are fixed in this release.

Category/Component Issue Description

Scan report

 

We have fixed an issue where the Scan Details section in the Scan Report displays Authentication as Not Used even when QIDs 150035 and 150116 were reported. Together, QIDs 150116 and 150035 indicate successful server authentication. 

Scan schedule 

If a web application removed from the subscription is part of an existing scheduled scan, it was not removed from the scheduled scan, and the user could not edit the scan schedule. 

This issue has been fixed. Now, the web application removed from the subscription is removed from the scan schedule automatically, and the user can edit the scan schedule. 

DNS Override, Scans

 

When the user launched a scan for multiple web applications, the scans did not use the DNS Override value even when the default setting for DNS Override was set to Use DNS override defined per application if proxy is not used.

Now, the defined DNS override value is used for multiple web application scanning and is available in the Scan Details screen and Scan Report.

Authentication record

 

While editing an authentication record with a parametrized Selenium script, when the user deleted and uploaded the script again and launched a scan, the authentication failed due to an empty password tag. 

This issue is fixed. 

Scan schedule We fixed an issue where the user could not view or edit a scan schedule if the Scanner Appliance option from legacy WAS. 
Now, the user can access the scan schedule from the new WAS even if the scanner appliance is marked as deleted. 

Sitemap report

 

An issue was observed when the user downloaded the sitemap report for links greater than 10000 in a CSV format; the report did not display crawl links. 

The issue is fixed, and the sitemap reports get downloaded with all results available in the report. 

Scan report

 

We have fixed an issue where the Detection Information section in the web application report and scan report did not display which keywords or regex were matched during scanning even when keywords and regex are defined to detect sensitive content in the target web application. 

Scans

 

We have fixed an issue where the scan status was displayed as Processing even when the scan ended. 

Scan report

 

We fixed an issue where the DNS override setting was visible in the Scan Details but not available in the scan Report. This was observed for scheduled and on-demand scans. 

Scan settings 

 

We fixed an issue where the user could not update the Cancel Scan option > Cancel Scan After value to the value configured for the subscription while editing a scan schedule. The user could set the value between 24 to 48 hours. 

Retest web application

 

We fixed an issue where the user encountered an error while retesting some web applications.  

User permissions

 

We fixed an issue where the sub-user could not update the authentication record even though the right permissions were assigned. 

Proxy support

 

We fixed an issue where the scheduled scan did not use proxy settings when the scan target is defined using tags and the Proxy Support option is set to User Proxy defined for each web application.

Dashboard, QQL

 

Earlier, when the user clicked a dashboard widget, the data list displayed incorrect results for the query. This was observed due to incorrect mapping of QQL queries from the dashboard to the data list for table and graph widgets. 
The issue is resolved. 

Web Application data list report

 

We fixed an issue where a discrepancy was observed between the web application count and the downloaded data list report. 

Dashboard, QQL

An issue was observed when the user clicked a dashboard widget, the data list displayed incorrect data. This was observed as the backticks were getting incorrectly added to the QQL token value. This issue is fixed.