As we reach the end of September 2024, ThreadFix version 3.x on-premises has officially reached its End-of-Life. Therefore, there is no longer support or updates for this version of the product. We have fully transitioned our product and development teams to focus ThreadFix SaaS and migrating all customers over from the on-premises versions. Our Customer Success and Support teams are here to help you in migrating to ThreadFix SaaS and maximizing the value you see from this improved offering from Coalfire. This is the next phase of ThreadFix and our team is looking forward to continuing to support you on this journey.

3.X Version Feature Changes

Version Feature Changes

New versions of ThreadFix may deprecate, remove, and/or reintroduce features. To view a list of feature changes please see below:

3.9.1

November 2024

  • Performance improvement for QualysWAS scan import timing

  • Resolved an issue where Snyk Remote Provider scans may remain stuck in a queue

  • Resolved an issue where attempting to view a vulnerability’s details via the UI or API may not load and/or result in an error

3.8

September 2024

  • Kong has been updated from version 2.8 to 3.6

  • OpenShift is no longer supported

  • The defect description text format for Azure DevOps Defect tracker in the Classic_Description.vm file has been updated

  • The character limits for email, username, and First/Last have been increased to 25 characters

  • The list of currently accepted file types for uploading to findings has been updated

  • Addressed issue where a manually closed vulnerability may display as having been reopened by a scan upload

  • Addressed issue with importing .fpr file types

  • Addressed issue where Time to Remediate policies for new teams/applications may not display correctly in the UI

  • Addressed an issue where Snyk may not allow a new scan to be imported if there is prior data present

3.7

April 2024

  • Resolved issue of not being able to set a Parent field during a Jira ticket creation

  • Resolved an issue where users may receive an error when attempting to retrieve a team’s history of events via API if an application does not exist with a matching ID

  • Addressed an issue where Admin level users are able to delete themselves

  • Resolved an issue where Automated Defect Creation through Azure may not create defects

3.6

March 2024

  • Snyk has been added as a new Remote Provider

  • Improved logging visibility to the Vulnerability Details page in the UI and in the API response for Vulnerability Details

  • Addressed issue where a SAML user with global admin role cannot access Queue Management

  • Addressed issue where a user may not be able to select the Components and/or Affect versions when attempting to create a Defect tracker for Jira

  • Addressed issue where a after uploading a file to the Application page, the UI does not reflect the new file

3.5

January 2024

  • Fix for an issue when a user performs a Vulnerability Search API call using an invalid value, ThreadFix returns a “success=true” status with a blank message

  • Fix for API calls for deleted or invalid IDs returning a success message

  • Fix for an issue On SQL Server, when exporting a Vulnerability Search CSV, the user receives an error

  • Fix for an issue where a Vulnerability Search API export returns different data each time it is performed regardless of filter settings

  • Fix for an issue where some Veracode SCA findings may import with duplicate IDs of other findings rather than unique IDs

3.4.2

November 2023

  • The ability to manually adjust a vulnerability’s Time To Remediate Policy window has been reinstated

  • Performance improvement for the Defect Reporter to Application Defect Tracker Mapping process

  • ThreadFix MSSQL mappings update

  • Checkmarx One available for Remote Provider and proxy settings

  • Security improvements

  • Fix for an issue where MS SQL Server vulnerabilities display the incorrect Severity level

  • Fix for an issue where the Customize Scanner Vulnerability Types Scanner Vulnerability Mapping may not update severities correctly

  • Fix for an issue where the ‘Tag’ field does not display when creating a new ticket in Azure DevOps

  • Fix for an issue where the Scan event messages in the History page displays the date with a UTC Time Zone rather than the user’s Local Time Zone

  • Fix for an issue where after a user updates the Default LDAP Role settings in ThreadFix, the login page may not respect default settings

  • Fix for an issue where a users name that has been updated in the User Management page may not reflect onto the user Login page

  • Fix for an issue where the Vulnerability Search API exports may provide different results each time run

  • Fix for an issue where a Remote Provider will not be created if the user attempts to use a previously entered a name for it that was submitted but not allowed to complete the creation process by exiting the modal before successful completion

  • Performance improvement for the BlackDuck Remote Provider creation process, addressing an issue where it may timeout

  • Fix for an issue where SAML login fails if a username includes invalid characters

3.4

October 2023

  • Integration support is discontinued for Bugzilla (ver 4.x & 5.x), IBM ClearQuest, and VersionOne

  • ThreadFix 3.4 supports MySQL 8 and is not backwards compatible to 5.7. Users will need to upgrade their database to MySQL 8 when upgrading to ThreadFix 3.4.

  • Jira has deprecated and removed certain endpoints as of version 9.0, in order to maintain proper functionality with ThreadFix, it is recommended to upgrade to 3.4

  • AppScan Enterprise identified and resolved an issue where some vulnerabilities reported finding details for multiple issue types as a single concatenated string via the AppScan API.  In this instance ThreadFix would ingest this data as if it was legitimate which could cause some display and merging issues if the instance of AppScan Enterprise in use is a version subject to this misbehavior. HCL has informed our impacted clients that the issues have been resolved; clients should prioritize updating their AppScan Enterprise instance to the latest HCL patch prior to updating ThreadFix.

  • CheckmarxOne has been added as a new Remote Provider

  • Qualys WAS results now display more information for users to review

  • defectProfileId and useDefaultDefectProfile have been added to the Submit Defect API calls

  • CWE 16 behavior has been adjusted as many scanning tools provide CWE 16 as a catch all for vulnerabilities that are not specifically software in nature:

    • It’s been observed through repeated testing that a more appropriate path for ThreadFix is to treat all SAST, DAST, IAST, and Mobile findings as unmergeable if they are classified as CWE 16. As of 3.4 ThreadFix will no longer permit merging in those instances.

    • SCA/Dependency finding types will still merge as before as CWE is not a component of the merge logic for those findings

  • In preparation for ThreadFix SaaS - we have updated our Allowed and Blocked file types. Below is the current allowed file types that can be uploaded as scans:

    • .csv

    • .fpr

    • .json

    • .nessus

    • .ozasmt

    • .xml

  • Fix for an issue where findings show a CWE Number instead of a name

  • Fix for the Last Import Attempt Status not updating for Netsparker Enterprise app after a successful import

  • Fix for an issue where the user may not be able to view a defect from the Vulnerability Detail page, resulting in an error

  • Fix for an issue where not all Pen Test teams would display in the Identity Management page

  • Fix for an issue where if a Team is deleted in the Portfolio page and a newly created Team with the same name is created with an application, the previously deleted Team name may appear on the UI.

  • Security updates

  • Several minor UI updates

 

3.3.4

August 2023

  • Minor UI updates

  • Fix for Black Duck ingesting invalid Finding CVE data

  • Fix for a NullPointerException error when trying to update an application, via the Update Application API, containing at least one unmapped vulnerability

  • Fix for Acunetix 360 and Netsparker Enterprise, where if the application is renamed on the scanner, the existing RemoteProviderApplication row is discarded. This occurred despite the nativeId value persisting.

  • Error addressed when a user tries to edit a JIRA defect tracker using a new longer API token

  • Fix for Fortify on Demand microservice registering more vulnerabilities than actually exist

3.3.3

July 2023

  • Improvement to Vulnerability Detail page display of Findings Comments

  • Improvement for scanning of Fortify XML files, removing invalid characters that may impede the scanning process

  • Fix for LDAP user group membership not being validated/synced on login

  • Fix for “Invalid username/password combination” error when attempting to gather collections from a defect tracker in Azure DevOps

  • Fix for instances where in certain user configurations, importing Contrast Remote Provider findings may fail and provide a “Failed during remote provider import” error

3.3.2

May 2023

  • Microservice Project support added for Fortify on Demand

3.3.1

February 2023

  • Improvement of ThreadFix’s ability to identify and parse Fortify SCC external lists and filters to more accurately mark findings

  • Improved ThreadFix upgrade migration automation to have better error handling and recovery

3.3

January 2023

Ingestion Enhancements

  • ThreadFix File format now supports CVSS score values for both ingestion and export

  • Fortify SSC/FoD/SCA imports have improved filter parsing to support more custom filters from Microfocus

  • Fortify on Demand now supports dependency findings

  • Acunetix enhanced false positive support

  • Contrast findings support greater specificity in filtering on finding types based on finding data

  • Added Scan Agent configuration support for AppScan Standard and WebInspect allowing custom configuration for these scan agents

  • SonarQube integration has been updated to support changes in their API

    • Hotspot findings in version 8.9 and 9 are now supported

    • All previous versions of SonarQube are no longer supported 

 

System Enhancements

  • Created UI driven customization for report caching times

  • Added OWASP Top 10 2021 report

  • API support added for custom severity name

  • Created a bulk-export for all unmapped vulnerability types to CSV file

  • Reintroduced Scan File Retention customization to the ThreadFix 3 architecture

  • Reintroduced LDAP linked SAML Authorization to the ThreadFix 3 architecture

  • The following Global FPR Filter Set API REST calls have been reintroduced:

    • Upload Global FPR Filter Set Override 3.X - API

    • Clear Global FPR Filter Set Override 3.X - API

  • Additional bug fixes and security enhancements

 

  Removed Features

  •  Acunetix & AppSpider scan agents have been disabled, with plans for re-introduction

Addressed Reported Issues and Security Updates

  • Importing LDAP users fails if any user have Title fields containing over 60 characters. The limit has been increased to 128.

  • In some instances, ThreadFix license expiration reminders can repeatedly post to the logs and create performance issues. The frequency of reminders has been adjusted to once per user login.

  • A manually closed vulnerability may be marked as “re-opened” if a scan containing the open vulnerability is uploaded from a date prior to when it was manually closed. ThreadFix will not mark a manually closed vulnerability as having been re-opened from an uploaded scan preceding the vulnerability having been manually closed.

3.2

September 2022

Azure Dev Ops

  • Significant improvements to our integration with Azure Dev Ops including

    • Support for unique datatypes natively in ThreadFix UI

    • Performance improvements

    • UI indication of all required fields

    • Autocomplete and picklist support of applicable fields 

2.X Feature Parity (3.X only)

  • Implemented the Sonatype remote provider utilizing the new 3.1 ingestion pipeline

  • Added Remote Provider application names to the Finding Detail page

 

Integration Enhancements

  • The following remote providers now ingest and store CVSS values: Acunetix 360, Black Duck, Netsparker, NowSecure, and WhiteHat Sentinel Source

  • Checkmarx can now ingest additional scanner detail and scanner recommendations for findings

  • Contrast date management enhancements to provide greater accuracy on finding discovery dates

  • Improved SonarQube severity mappings

  • The maximum number of Defect Profiles that can be associated with a single defect tracker has been increased to 1024

  • Improvement to Fortify SCC findings filtering

  

Addressed Reported Issues and Security Updates

  • Upgraded dependencies and images including Debian, Kafka, and ActiveMQ

  • Fixed intermittent import errors with Acunetix 360/Netsparker

  • WhiteHat API updates to support new requirements from WhiteHat

  • Improvement to UI messaging indicating when all remote providers have been mapped

  • Improvement to UI messaging indicating when an invalid scanId was used

  • The ThreadFix UI Help button has been adjusted to now direct to the Coalfire Support Portal

3.1.2

May 2022

  • No feature changes in 3.1.2

3.1.1

April 2022

Note the following changes to features with the introduction of ThreadFix 3.1.1:

Reintroduced

  • The Check Remote Provider Application Import Status endpoint has been reintroduced

  • Coverity Remote Provider has been reintroduced

Deprecated and Removed

For other REST API updates, refer to the Change Log

  • The Black Duck call "/remediating" has been deprecated by Black Duck in version 2021.10.0 and has been replaced by "/upgrade"

  • The SSVL Converter Tool deprecated in 3.1 has been removed

3.1

October 2021

Note the following changes to features with the introduction of ThreadFix 3.1:

Deprecated and Removed

  • Support has been ended for the SSVL Converter

  • Bi-directional capability for Checkmarx and AppSpider has been removed

  • Service Delivery/Service Request feature set is no longer supported

  • Removed the Import All Vulnerabilities remote provider option

  • Saved scan files on the file system will not be migrated to 3.1 (NOTE: this only impacts the raw scan files. All vulnerability data is fully retained and migrated)

  • SonarQube Plugin removed from the Tools section.  Remote Provider integration still behaves as before.

  • Support for the following integrations has been removed:

    • SkipFish

    • Swamp Scarf

Limitations, Scheduled for Enhancement Post 3.1

  • Limit of 3000 vulnerabilities when exporting Vulnerability Search data to a .csv file.

  • Remediation filters do not update automatically in 3.1, they will update with a defect status call sync. This feature is planned to be reintroduced. (NOTE: this may impact created policies based on these filters)

Absent, Scheduled for Re-introduction Post 3.1 

  • The Disable Vulnerability Merging option when creating a new application has been removed, this feature is planned to be reintroduced

  • Scan File Retention feature has been removed, this feature is planned to be reintroduced

  • The Vulnerability Close Settings option, allowing users to close vulnerabilities only when all scanners report them closed, has been removed, but is planned to be reintroduced

  • The Scan Agent tool API endpoints have not been migrated, this feature is planned to be reintroduced

  • The ability to cancel queued scans has been removed, this feature is planned to be reintroduced in the future

  • Time to Remediate Date policy override has been disabled, this feature will be reinstated

  • Dashboard and Analytics page report caching time configuration has been disabled with plans to be re-enabled

  • The Global FPR Filter Set API REST calls have been removed, with plans to be reintroduced

  • Support for the following integrations has been removed, with plans for reintroduction:

    • Acunetix File Importer

    • Brakeman

    • Coverity

    • Dependency Check

    • Sonatype

Table of Contents

www.threadfix.it | www.coalfire.com
Copyright © 2024 Coalfire. All rights reserved.

This Information Security Policy is CoalFire - Public: Distribution of this material is not limited.