42Crunch Platform release, March 5, 2025
Platform version: v1.43.x |
This 42Crunch API Security Platform release brings API Security Encyclopedia articles for the OpenAPI Specification (OAS) v3.1 to API Security Audit and initial support for OAS v3.1 in API Conformance Scan.
New features
The following are the new features and improvements to the existing ones in this release.
API Security Encyclopedia articles for the OAS v3.1
API Security Encyclopedia now includes a separate section for APIs following the OAS v3.1.x. New, dedicated issue IDs starting with v3_1-
enable you to clearly disambiguate with audit reports of APIs following the OAS v3.1 and the reports of APIs following v3.0.x.
As the OAS v3.0 and v3.1 share the majority of features, the encyclopedia for the OAS v3.1 starts from the same level as the one for the OAS v3.0. We will continue to adapt Security Audit for the OAS v3.1 as well as implementing new checks for it in the coming releases.
Initial support for the OAS v3.1 in Conformance Scan
The first iteration of the OAS v3.1 support is now included in Conformance Scan, for both Scan v1 and Scan v2 in 42Crunch Platform and on-premises scans:
- Generate scan configurations from API definitions following the OAS v3.1.x.
- Run the scan on v3.1.x APIs like you would on APIs following the OAS v3.0.x.
Unlike in Security Audit, which compares your API definition with the defined version of the OAS standard, Conformance Scan compares your API definition with your API implementation, not the OAS. Therefore test IDs in Conformance Scan are not specific to a particular OAS version.
This is the initial support for OAS v3.1 and so not all new features in it are yet supported. We will continue to improve OAS v3.1 support in Conformance Scan in coming releases. Support for Try it and scanning OAS v3.1 APIs in IDEs is coming in the next release.
In addition to the OAS v3.1 support, we have done several other improvements in Conformance Scan:
- Improved
.p12
support. - Conformance Scan now consistently includes happy path tests in the calculations it makes when generating scan reports, to make the statistics easier to understand.
- If you export a scan report as a CSV file, failed happy path requests are now included in the exported report.
- 42Crunch API Security Testing binary now correctly generates a request body for tests even when a schema does not have any properties defined as
required
.
Mandatory tags in IDEs
If your organization has designated certain tag categories to be mandatory, meaning that all APIs must have a tag from those categories applied to them, an API missing mandatory tags cannot be properly audited or scanned. You can now apply mandatory tags to APIs already in your IDE, so that you can audit and scan your APIs before uploading them to 42Crunch Platform. The tags you applied in the IDE are persisted once you upload the API to the platform.
For more details, see:
- VS Code: Apply mandatory tags in the IDE
- JetBrains IDEs: Apply mandatory tags in the IDE
- Eclipse: Apply mandatory tags in the IDE
We have also included Anypoint Studio by Mulesoft into our supported IDEs, see Integrate 42Crunch Platform with Eclipse IDE.
Compatibility
This section lists the compatible Docker images for some of the components of 42Crunch API Security Platform, as well as other possible compatibility details.
API Firewall images
This release is compatible with the following API Firewall images:
- NEW:
42crunch/apifirewall:v1.1.8
- Upgrade to
openssl-3.3.3
(CVE-2024-12797, CVE-2024-13176)
- Upgrade to
We highly recommend that you switch to the latest image version to take the full advantage of the new features and security improvements.
42crunch/apifirewall:v1.1.7
- Fixed the failure in forwarding large request bodies
- Upgrade to
go-1.23.4
(CVE-2024-45338)
-
42crunch/apifirewall:v1.1.6
- Upgrade to
openssl-3.3.2-r1
(CVE-2024-9143)
- Upgrade to
42crunch/apifirewall:v1.1.5
- Switch to the system certificate store to fix certificate authority renewal issue
All previous image versions have been deprecated and are no longer supported.
When you switch the version of the API Firewall image, you must reconfigure any existing protection configurations so that they work with the new version. For more details, see Reconfigure API Protection.
Conformance Scan images
This release is compatible with the following Conformance Scan images for running it on-premises.
Scan v2
- NEW:
42crunch/scand-agent:v2.0.20
- Fixed response validation on arrays
- Upgrade to
golang.org/x/net v0.37.0
(CVE-2025-22870)
- NEW:
42crunch/scand-agent:v2.0.19
- Initial support for the OAS v3.1 in Conformance Scan
- Improved
.p12
support - Upgrade to
golang.org/x/oauth2 v0.25.0
(CVE-2025-22868) - Upgrade to
golang.org/x/crypto v0.33.0
(CVE-2025-22869)
We highly recommend that you switch to the latest image version to take the full advantage of the new features and security improvements.
42crunch/scand-agent:v2.0.18
- Fixed handling of empty scenario list in the lax scanning mode
- Increased maximum number of items in generated arrays
42crunch/scand-agent:v2.0.17
- Upgrade to
go-git v5.13.1
(CVE-2025-21613, CVE-2025-21614) - Upgrade to
nanoid v3.3.8
(CVE-2024-55565) - Upgrade to
golang.org/x/net v0.33.0
(CVE-2024-45338) - Upgrade to
golang.org/x/crypto v0.31.0
(CVE-2024-45337)
- Upgrade to
-
42crunch/scand-agent:v2.0.15
- Fixed replacement of placeholder texts in variables when generating test requests
- Fixed generation of properties in test requests
- Fixed regression on
null
enums
-
42crunch/scand-agent:v2.0.13
- A new property in the scan report to indicate if running a scan test succeeded or not
42crunch/scand-agent:v2.0.12
- Fixed scan report timestamp
42crunch/scand-agent:v2.0.11
- Upgrade to
Golang v1.23.1
(CVE-2022-30635, CVE-2024-34155, CVE-2024-34156, CVE-2024-34158)
- Upgrade to
42crunch/scand-agent:v2.0.10
- New test
response-body-badformat-scan
- Fixed scan configuration creation when
items
isnull
- Fixed excessive data exposure reporting
- New test
42crunch/scand-agent:v2.0.9
- Scan v2 in v1-compatible mode
- Support for
Accept
headers - Upgrade to
Golang 1.22.5
(CVE-2024-24789, CVE-2024-24790, CVE-2024-24791)
42crunch/scand-agent:v2.0.8
- New test
path-item-method-not-allowed-no-authn-scan
- Support for
apiConnectivityCheck
,maxTimeoutRetryAttempts
, andrequestHeaderNameRequestType
- Fixed implementation of
reportIncludeRequestBody
andreportIncludeResponseBody
- Fixed handling of lookahead and lookbehind assertion references in regular expressions
- New test
42crunch/scand-agent:v2.0.7
- Upgrade to
Golang 1.22.3
(CVE-2020-8559, CVE-2024-24788)
- Upgrade to
42crunch/scand-agent:v2.0.6
- Lax testing mode
- Fixed generating conformance test requests when multiple required properties are defined
42crunch/scand-agent:v2.0.4
- Numeric values exceeding the limits of
float64
presented as strings
- Numeric values exceeding the limits of
42crunch/scand-agent:v2.0.3
- Upgrade to
Golang 1.21.5
(CVE-2023-45284, CVE-2023-45283, CVE-2023-39326, CVE-2023-45283) - New scan report
- Tests
parameter-header-contenttype-wrong-scan
andpartial-security-accepted
- Support for
reportIncludeRequestBody
,reportIncludeResponseBody
,reportMaxRequestSizeHappyPath
,reportMaxRequestSizeTest
- Improved logging for runtime limit
- Heartbeat check
- Upgrade to
All previous image versions have been deprecated and are no longer supported.
Scan v1
- NEW:
42crunch/scand-agent:v1.22.26
- Upgrade to
golang.org/x/net v0.37.0
(CVE-2025-22870)
- Upgrade to
- NEW:
42crunch/scand-agent:v1.22.25
- Initial support for the OAS v3.1 in Conformance Scan
- Improved
.p12
support - Upgrade to
golang.org/x/oauth2 v0.25.0
(CVE-2025-22868) - Upgrade to
golang.org/x/crypto v0.33.0
(CVE-2025-22869)
We highly recommend that you switch to the latest image version to take the full advantage of the new features and security improvements.
-
42crunch/scand-agent:v1.22.24
- Fixed handling of nullable enums and empty strings
- Increased maximum number of items in generated arrays
42crunch/scand-agent:v1.22.23
- Upgrade to
go-git v5.13.1
(CVE-2025-21613, CVE-2025-21614) - Upgrade to
nanoid v3.3.8
(CVE-2024-55565) - Upgrade to
golang.org/x/net v0.33.0
(CVE-2024-45338) - Upgrade to
golang.org/x/crypto v0.31.0
(CVE-2024-45337)
- Upgrade to
42crunch/scand-agent:v1.22.21
- Default value maximum scan report size 20 MB to align with Scan v2
42crunch/scand-agent:v1.22.20
- Fixed excessive data exposure reporting
42crunch/scand-agent:v1.22.19
- Upgrade to
Golang v1.23.1
(CVE-2022-30635, CVE-2024-34155, CVE-2024-34156, CVE-2024-34158) - Happy path tests included in the number of tests
- Upgrade to
42crunch/scand-agent:v1.22.18
- Fixed scan configuration creation when
items
isnull
- Fixed scan configuration creation when
42crunch/scand-agent:v1.22.17
- Upgrade to
Golang 1.22.5
(CVE-2024-24789, CVE-2024-24790, CVE-2024-24791)
- Upgrade to
42crunch/scand-agent:v1.22.16
- Upgrade to
Golang 1.22.3
(CVE-2020-8559, CVE-2024-24788)
- Upgrade to
42crunch/scand-agent:v1.22.15
- Fixed handling of query parameters in request generation
- Fixed generating conformance test requests when multiple required properties are defined
42crunch/scand-agent:v1.22.14
- Upgrade to
Golang 1.21.5
(CVE-2023-39326, CVE-2023-45283)
- Upgrade to
42crunch/scand-agent:v1.22.13
- Upgrade to
Golang 1.21.3
(CVE-2023-45284, CVE-2023-45283) - Heartbeat check to keep the connection to 42Crunch Platform active in case of extremely long scans
- Fixed handling of
example
andx-42c-sample
- Upgrade to
42crunch/scand-agent:v1.22.12
- Support for
text/plain
as content type - Support for
read-only
properties
- Support for
-
42crunch/scand-agent:v1.22.11
- Upgrade to
Golang 1.20.7
(CVE-2023-39319, CVE-2023-39318, CVE-2023-3978, CVE-2023-29409) - Fixed handling of
<
and>
characters in the request payload - Improved handling of content not supported by Conformance Scan
- Upgrade to
42crunch/scand-agent:v1.22.9
- Performance improvements to scan configuration generation
- Better memory handling when generating array items of the type
file
for scan requests - Better handling of expired customization rules
- Improved JSON schema validation for UTF-8 strings
42crunch/scand-agent:v1.22.8
- Upgrade to
Golang 1.20.4
(CVE-2022-41716, CVE-2022-41717, CVE-2022-41720, CVE-2022-41722, CVE-2022-41723, CVE-2022-41724, CVE-2022-41725, CVE-2023-24532, CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-24538, CVE-2023-24539, CVE-2023-24540, CVE-2023-29400)
- Upgrade to
42crunch/scand-agent:v1.22.7
- Updates to regular expression library
42crunch/scand-agent:v1.22.6
- Fixed regular expressions handling
In some rare cases, certain regular expression patterns could send the on-premises scan to an infinite loop, and the process would not finish. This image version fixes that, so if you are experiencing on-premises scan hanging, we recommend upgrading from the previous scan images to this one.
- Fixed regular expressions handling
42crunch/scand-agent:v1.22.4
- Improved array iteration
All previous image versions have been deprecated and are no longer supported.
Changed behavior
Security Audit no longer raises issues about missing maxLenght
or pattern
on strings that have a well-defined format, such as date-time
(RFC 3339) . Depending on your API, this may affect the audit score.
Known issues
This release has the following known issues.
Deprecation of example
in the OAS v3.1 not yet properly handled
The OAS v3.1 has deprecated the property example
in favor of examples
, but example
has not yet been removed from the standard. Currently, this is not properly handled in Security Audit and will be fixed in the next release.
Manage teams permission not shown on list of users
The permission to manage teams is not yet shown on the list of users in your organization, but you can view all permissions that a user has by clicking the permission column. This permission also does not yet have a shortcut that you could use when searching by permission.
These will be fixed in a future release.
Changing tagging on an API may trigger an unrelated error on the UI
Sometimes applying tags to or removing them from an API may trigger an unrelated error on failing to fetch the SQG approval report for the API. This happens if the API in question has been scanned on-premises and the scan has finished after you arrived on the API Summary page, because the UI cannot find the latest on-premises scan report and the associated approval report. Refreshing the page gets the latest reports and resolves the issue.
Tagging and untagging the API is not affected by this error: tags get correctly applied and removed in any case.
This will be fixed in a future release.
Data dictionary duplication
Duplicating a data dictionary does not yet duplicate the values in it.
This will be fixed in a future release.
Scan customization rules may lead to no response codes being accepted.
In some cases, scan rules can lead to HTTP status response codes in API responses that are normally expected (for example, HTTP 401
or HTTP 404
) to be treated as unexpected. This in turn can lead to a false positive in the scan results.
By default, the expected HTTP status response codes that are defined in scan rules applied to the scanned API take preference over the response codes that Conformance Scan would otherwise expect. However, this can cause problems in scan process if your scan rule only skips header or response body analysis but does not define any expected response codes, either for happy path requests or for particular test IDs. This results in the scan rule to have null
defined as the expected response code, and because the scan rule takes preference over the default scan behavior, no response codes except null
are accepted. This in turn means that some tests are incorrectly flagged as returning unexpected response codes when they were in fact successful.
We are currently investigating the best way how to reconcile the designed behavior of Conformance Scan and scan rules in these cases, and this issue will be fixed in a future release.