Today marks the next update to the TrustKeeper Scan Engine and as usual, we have been slaving away in the dungeon annihilating new vulnerabilities with sword and shield.
This update includes a recent Dell SonicWALL Scrutinizer (also know as Plixer International Scrutinizer) SQL injection vulnerability. The vulnerability was discovered by muts of Offensive Security, which was released during BlackHat USA and affects versions 9.0.1 and earlier (unauthenticated) and before 9.5.2 (authenticated).
A cross-site scripting vulnerability for Support Incident Tracker (SiT!) is also included, which was discovered by SpiderLabs Research. For more information on this vulnerability, see our recent blog post and advisory.
As always, this update includes a number of bug fixes, support for new applications, and improved evidence for existing vulnerabilities.
New Vulnerability Test Highlights
Some of the more interesting vulnerability tests we added recently are as follows:
* JIRA XSS Vulnerabilities in Labelling and Issue Linking
* JIRA XSS Vulnerability in Administration Interface of Bamboo Plugin
* JIRA XSS Vulnerabilities in URL Query Strings
* JIRA Standalone Vulnerability with Session Cookies
* JIRA Users without the 'JIRA Users' Permission can Login via Crowd Single Sign On
* JIRA XSRF Vulnerability in 'Logout' Action
* JIRA Security Vulnerabilities in FishEye Plugin
* JIRA Security Vulnerabilities in Bamboo Plugin
* Plixer International Scrutinizer SQL Injection Vulnerability in statusFilter.php (CVE-2012-2962)
* nginx Vulnerabilities with Windows directory aliases (CVE-2011-4963)
Support Incident Tracker
* Support Incident Tracker (SiT!) XSS Vulnerabilities in setup.php (CVE-2012-4346)
How to Update?
All Trustwave customers using the TrustKeeper Scan Engine receive the updates "auto-magically" as soon as an update is available. No action is required.