NeXpose Release August 29, 2011

Document created by mburstein Employee on Aug 29, 2011Last modified by mburstein Employee on Nov 1, 2011
Version 2Show Document
  • View in full screen mode
                                                        

Rapid72011-08-29 product and content updates
                  Release announcement

          

This Rapid7® NeXpose® release features improvements to API, authentication, Web scanning, and fingerprinting

 

These release notes document what's new in this NeXpose release. Your NeXpose installation will automatically download and install content updates. If you have enabled NeXpose to install product updates, it will do so as well. See the third FAQ.

Reminder: Migrate your database
                 

                

If you have not migrated yet: All releases of NeXpose now require the PostgreSQL 9 database to be running. If you are using an earlier version of PostgreSQL, your NeXpose installation will be ineligible to receive any content or product updates. Over time, this will result in decreased accuracy and validity of your results and reporting.

          

To execute the migration, first download and review the guide Migrating the NeXpose Database. This document includes detailed instructions on how to prepare for, run, and monitor the migration.

          

After reviewing the guide, go to the Database Migration page, which you can access by clicking the maintenance link on the Administration page of the console Web interface. When you are ready to execute the migration, click the Start Migration button. Follow the migration guide for instructions throughout the process.

                          

Improved API role permissions configuration | product
               

               

The ManageDynamicAssetGroups element is now included in the RoleCreate API and the RoleUpdate API to ensure that you have appropriate permissions assigned to manage dynamic asset groups.

        

Improvements to SSH public key authentication | product
                 

                

Improvements to SSH public key authentication allow better scan performance, more accurate detection, and better reporting of risks.

                   
  • Server-generated debug messages are now handled properly when key-specific options are specified in authorized_keys or equivalent files.
  • Credentials are now correctly specified in remote-engine scans that are authenticated with SSH public keys.
          

Improvements to PCI vulnerability checks | product
                 

                 

The HTML form parameters without the "type" attribute can now be cataloged in scan results to improve reporting accuracy.

          

Improvements to fingerprinting | product
                 

                 

Improved fingerprinting provides more accurate identification of services and better reporting of vulnerabilities.

                    
  • A new check determines whether the authentication mechanism on target VPNs uses insecure encryption methods via Aggressive Mode. This improvement requires the most recent product update.
  • Fingerprinting now accurately differentiates Microsoft .NET Framework 4.0 from the Microsoft .NET 4.0 Client Profile.
          

Improvements to Web scanning | product
               

                

Improvements to Web application scanning allow for more accurate detection and reporting of vulnerabilities and expand your ability to track risk and prioritize remediation. The Web application scanner now accurately identifies the following security issues:

                  
  • cookies with missing "secure" flags in HTTPS applications
  • cookies with missing "HttpOnly" flags
  • remote file inclusions, one of the highest risk vulnerabilities mentioned in OWASP's Top 10
          

Improvements to scanning | product
                 

                 

During scans of certain SSL/TLS protocols, like IMAPS, POPS, TELNETS, FTPS, and SMTPS, the full certificate chain is now retrieved, eliminating false positives related to certificate chain validation.

            

Bi-monthly vulnerability check update | content
               

            

New vulnerability and patch checks bring coverage up to date for the following operating systems and applications:

                   
  • The accuracy of a check related to Cisco IOS has been improved
  • Adobe Flash
  • Adobe Reader
  • Apache
  • Apple QuickTime
  • CentOS
  • Cisco devices
  • Java Runtime Environment
  • Mozilla Firefox
  • OpenSSL
  • PHP
  • Red Hat Enterprise Linux
  • Solaris
  • VMware
          

These checks help prevent security breaches that could allow hostile parties to take control of affected systems, gain access to confidential data, disrupt business operations, or cause other problems.

          

Content update
                 

                    
  • Update ID: 1559517118
          

Product update
                 

                   
  •   Linux 32                      | Update ID: 1839621938
  •   Linux 64                      | Update ID: 3901061369
  •   Windows 32                     | Update ID: 3739743725
  •   Windows 64                     | Update ID: 1286150547

Installers
                 

   Released on August 1, 2011 (see fourth FAQ).                                

md5sum files
                 

                  Download the appropriate md5sum file to ensure that the installer was not corrupted during download:                                 

Frequently asked questions (FAQs)
                 

                  
  • How will I know NeXpose has updated with this specific release?
    All updates are listed on the News page of the NeXpose Security Console Web interface.
  • Why doesn’t the most recent date on the News page match the dates of the current updates on the Administration page?
    You may occasionally notice that the most recent date on the News page does not match the dates of the current updates listed on the NeXpose Security Console administration page. The dates on the News page are official release dates. The dates on the console page indicate when updates were actually applied to your NeXpose installation.
  • What are content updates, and what are product updates?
    Content updates include new checks for vulnerabilities, patch verification, and compliance with security policies. Product updates include performance improvements, bug fixes, and new features in NeXpose.
  • Why are installers not updated with every release?
    To help you stay on top of an ever-growing number of security threats, Rapid7 makes the delivery of new security content timely and convenient.  After installation and first-time start-up, NeXpose continues to update itself dynamically. This makes it unnecessary for Rapid7 to update installers  with every release of security content. So, you don't have to download installers every time new content is available.
  • Does this dynamic self-updating cause NeXpose to restart?
    Yes. You may notice NeXpose taking longer to start for the first time after installation. You may also notice it restarting more than once as it completes a required sequence of updates.
  • How can I obtain more information about this release?
    If you have purchased NeXpose, contact our Technical Support Team at Support@Rapid7.com. If you are using the Community version of NeXpose, go to http://community.rapid7.com.
                          
Join Rapid7 at the UNITED Security Summit
www.unitedsummit.org
September 19 & 20 in San Francisco
Fostering Innovation & Collaboration
           

Attachments

    Outcomes