Request a reattack
Role required: User, Vulnerability Manager or User Manager
Note: Before requesting a reattack, make sure you have
synced the fixed software version to the platform.
When you have fixed your code or service configuration to address a reported vulnerability, you can request a reattack to validate the effectiveness of your effort. Reattacks are retests performed by Fluid Attacks' tool and hacking team (the latter are available exclusively in the Advanced plan).
Reattack requests can be sent from Fluid Attacks' platform in the Locations and To do sections. But you can also send them from Jira Cloud and VS Code thanks to Fluid Attacks' integrations. This page is dedicated to sending reattack requests from the platform. These are the steps to do it from Locations:
-
Go to the intended group's Vulnerabilities section and choose the type of vulnerability in question.
-
In the Locations section, click on Select locations to reattack.
-
Select the vulnerability to be verified by the reattack. Only entries with the Vulnerable status and whose reattack status is neither Requested nor On hold are eligible. Then click on the Reattack button.
You may select multiple vulnerabilities and then click Reattack.
-
In the pop-up window, provide a detailed description (minimum 10 characters) of the fix you implemented to address the vulnerability.
If the reattack is to be performed by Fluid Attacks' tool, your justification does not need to be detailed. Read more about
reattacks by the tool below.
-
Click Confirm. The Reattack column for that vulnerability then displays the value Requested.
To request reattacks from the To do section, follow these steps:
- Go to the To do section.
- Select the vulnerability by its check box and click on Reattack.
- Provide a justification (minimum 10 characters) in the pop-up window and click Confirm.
After requesting the reattack you need to wait for the tool or hacking team to inform you of the outcome. If performed by the tool, the reattack may take several minutes. If performed by security analysts, the response time adheres to the conditions specified in the service-level agreement, i.e., a median of 16 office hours.
Moreover, a new comment related to your request appears in the type of vulnerability's Consulting section. If applicable, a further comment appears shortly after, where Fluid Attacks' tool informs you of the reattack outcome. If security analysts are involved, they may add detailed comments along with the reattack outcome information.
Reattack outcomes
On the platform, there are two possible reattack outcomes which are informed in the Reattack column of the Locations table.
- Verified (vulnerable): The vulnerability is still exploitable. Fluid Attacks' tool or hacking team provide evidence of the exploit, accessible in the Evidence section. You should attempt remediation again and then request another reattack.
- Verified (safe): The vulnerability has been successfully remediated.
Reattack outcomes are recorded in the type of vulnerability's Tracking and Consulting sections.
Reattacks on hold
Reattacks might be temporarily delayed due to situations from your side, which Fluid Attacks calls "events." To learn more about them, read Resolve events impeding tests. Delayed reattacks are shown in the Locations table with the value On hold.
Once the events are resolved, the reattack request is automatically reactivated.
Reattacks for vulnerabilities detected by the automated tool
Bear in mind the following regarding reattacks for vulnerabilities detected by the automated tool:
- No detailed justification is needed in your request as the tool does not take it into account.
- If you suspect a false positive or determine the finding poses no risk due to other security measures, contact Fluid Attacks or request the zero risk treatment, respectively, instead of a reattack.
- The comments in Consulting sections are simple messages mentioning vulnerabilities present and remediated resulting from the reattack.
- If you have trouble remedying the vulnerability, consult the vulnerability and fixes documentation for code examples or use the Fluid Attacks features that leverage generative artificial intelligence to have an idea of how to proceed.
Reattack a permanently accepted vulnerability
Role required: User, Vulnerability Manager or User Manager
Despite having accepted a vulnerability permanently on Fluid Attacks' platform, you can request a reattack if you determine you have remediated it.
The steps to request a reattack for a permanently accepted vulnerability are no different from those described above. After sending the request, the column Reattack shows the value Requested.
Error when requesting reattacks
The platform prevents a reattack request if
- the latest cloned version (last commit) of the repository associated with the vulnerability you are attempting to reattack is more than 1 day old, or
- the vulnerability is still present in that last commit (or even in a previous commit).
In such cases, an error message prompts you to update the repository before requesting the reattack.
These are the recommended steps when encountering this error:
-
Check the current version of the repository (in your remote version control system or remote container where the repository is hosted) and ensure the latest commit is recent and includes the fix.
-
Update the branch under evaluation (i.e., the one registered in the Scope section) to include the current version of the repository.
-
Return to the platform and request the reattack again.
-
If necessary, manually update the repository in Scope and request the reattack once its Status is OK.
Notes:
- Repeat these steps for each repository associated with multiple vulnerabilities you wish to reattack.
- Contact help@fluidattacks.com if you face issues with the above steps or if you believe a repository update is not required.