Wednesday, April 2, 2025
HomeCyber Security NewsBurp Suite 2023.6 Released - What's New!

Burp Suite 2023.6 Released – What’s New!

Published on

SIEM as a Service

Follow Us on Google News

PortSwigger released a brand-new version of Burp Suite 2023.6 that is intended for both Professional and Community users.

BChecks, a new type of custom scan check, are introduced in this release. Additionally, it includes GraphQL scan checks, enhancements to Burp Scanner’s live crawl path views, and many other enhancements and bug fixes.

Burp Suite is an integrated platform/graphical tool for performing web application security testing.

Its tools integrate smoothly to assist the whole testing process, from initial mapping and analysis of an application’s attack surface to detecting and exploiting security vulnerabilities.

Feature Updates For Burp Suite 2023.6

BChecks, which are importable and createable scan checks, are introduced in this release. These checks are performed in addition to the built-in scanning process by Burp Scanner. This enables you to optimize your scans and increase the effectiveness of your testing operation.

Its custom-defining language allows you to quickly create BChecks. Burp comes with many starter templates.

Improvements to Burp Scanner’s live crawl paths view

  • From a certain point on the crawl path, you may now see specifics of every navigation step the crawler was able to perform. 
  • Go to the Crawl paths > Outlinks tab of the scan task details window to see these details.
  • At any crawl location, you may now see a screenshot of Burp’s browser.
  • Navigate to the Crawl paths tab of the scan task information window and select Show screenshot.
  • When you reopen a project file, the smallest crawl path tree is now kept.

GraphQL scan checks:

The new scan checks enable you to:

  • Identify and maintain a list of any GraphQL endpoints discovered during the crawl.
  • Identify if introspection queries are enabled.
  • Find out if GraphQL suggestions are enabled.
  • Test for CSRF vulnerabilities in all discovered GraphQL endpoints

Other Improvements

The Montoya API update from PortSwigger allows users to create extensions that provide expanded functionality.

Using the shortcut Ctrl + Shift + O, you can now easily switch to the Organiser tab.

You may now filter issues by target scope in the Dashboard’s Issue activity table.

The method by which Burp’s browser is launched has been modified.

It now works with accounts for sites that use the DevTools listener to detect their presence, such as Google accounts.

Bug Fixes

The Organiser table functionality has been significantly improved; changing the highlight no longer deselects the current row.

In addition, Burp Suite Community Edition now seamlessly integrates filters with precision as a result of an intruder attack.

Browser Upgrade

The integrated browser in Burp has been updated to version 114.0.5735.110 for Windows and 114.0.5735.106 for Mac and Linux.

“We have upgraded Burp’s built-in browser to 114.0.5735.110 for Windows and 114.0.5735.106 for Mac and Linux. This update contains multiple security fixes”, reads the release notification.

Stop Advanced Email Threats That Target Your Business Email – Try AI-Powered Email Security

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Firefox 137 Launches with Patches for High-Severity Security Flaws

Mozilla has officially launched Firefox 137 with crucial security fixes aimed at addressing several...

Google Cloud Platform Vulnerability Exposes Sensitive Data to Attackers

A privilege escalation vulnerability in Google Cloud Platform (GCP), dubbed "ImageRunner," was recently discovered...

Apple Fined $162 Million by France Authorities for Mobile Ad Market Domination

French antitrust regulators have imposed a hefty fine of €150 million ($162.4 million) on...

20,000 WordPress Sites at Risk of File Upload & Deletion Exploits

A critical security alert has been issued to WordPress site administrators following the discovery...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Firefox 137 Launches with Patches for High-Severity Security Flaws

Mozilla has officially launched Firefox 137 with crucial security fixes aimed at addressing several...

Google Cloud Platform Vulnerability Exposes Sensitive Data to Attackers

A privilege escalation vulnerability in Google Cloud Platform (GCP), dubbed "ImageRunner," was recently discovered...

Apple Fined $162 Million by France Authorities for Mobile Ad Market Domination

French antitrust regulators have imposed a hefty fine of €150 million ($162.4 million) on...