

Thanks are due to Bruno Morisson and Juho Nurminen.Your image was not uploaded. Note that some of the security issues were reported through our bug bounty program, which pays generously for bugs large and small. A fix has been applied following a change in JRuby 9.2.0.0 that prevented Burp extensions written in Ruby from running.Burp ClickBandit has been updated to support sandboxed iframes.The following enhancements have been made: A bug that prevented the Proxy from correctly handing requests that use a literal IPv6 address in the domain name of the requested URL.Click on the downloaded file to run the installer. Select your operating system and click on the Download button.


The impact of this bug is that if a user configures HTTP Basic authentication for domain A, performs a scan of domain A, domain A redirects to domain B, and the user has included domain B within their target scope, then the credentials would be leaked.

This would not normally be sufficient to infer specific vulnerabilities. The impact of this bug is that if an attacker performed an active MITM attack within the network that is hosting the Collaborator server, then they would be able to correlate interaction data with polling clients. A bug that prevented Burp from validating the common name of the Collaborator server certificate when polling over HTTPS.
