Wednesday, February 24, 2016

1.6.38

This release adds the capability to report reflected DOM-based and stored DOM-based vulnerabilities.

Burp already reports reflected XSS (where reflection of input allows direct execution of supplied JavaScript) and DOM-based XSS (where data is read from a controllable DOM location and processed in a way that allows execution of JavaScript). Burp now joins these steps together, to handle cases where:
  1. The server returns reflected or stored input in the value of a JavaScript string.
  2. That string is processed in a way that allows execution of JavaScript code from within the string.
The new capability applies to all of the DOM-based vulnerability types that Burp can report, such as JavaScript injection, WebSocket hijacking and open redirection.







MD5: cdba3138c9c0a92f1c2b19171db26e92
SHA256: 7bbd5500bb21a87fda1660f394d828d6c3bdcecc5df951a4f9e81a52dc28e62f

Friday, February 12, 2016

1.6.37

This release gives the Scanner the capability to report all instances where user input is returned in application responses, both reflected and stored:



The information gathered is primarily of use to manual security testers. Some applications contain numerous instances of input retrieval, since it is very common for the entire URL to be reflected within responses. For these reasons, the new Scanner checks are off by default, but can be turned on in the Scanner options:



MD5: d0287d85d288c2af116e0d60878a8a24
SHA256: 318a5544d92b137efb22d4935b343a1af4b610cf67bc6a8b89170d3a33d92dce