In addition to the main user interface, you can control Burp Proxy directly from within your browser. The in-browser UI can be accessed by visiting http://burp with your browser, or by entering the URL of your Proxy listener, for example: http://127.0.0.1:8080.
The in-browser UI lets you view and interact with the Proxy history, Clicking on an entry in the "URL" column displays the original request in raw form. Clicking on an entry in the "Modified" column displays the relevant modified request.
When an individual request is displayed in full, the request can be reissued by clicking the "Repeat request" button. Depending on the currently configured interception rules, the request may be intercepted within the main UI.
If available, you can also view the original response within your browser by clicking the "Show response" button. This causes Burp to return the exact response that was originally received from the server, and neither the request nor response will be intercepted within Burp. Note that when the browser receives the saved response from Burp Proxy, this may cause the browser to make additional requests (for images, CSS, etc.) in the course of rendering the response - these will be handled by Burp in the usual way.
You can download a copy of your Burp CA certificate, which you can install in your browser to eliminate SSL errors.
If you have the Plug-n-hack plugin installed in your browser (currently only available for Firefox) you can also carry out the essential configuration of your browser to work with Burp by visiting the URL of your Proxy listener (for example: http://127.0.0.1:8080) and following the "Plug-n-hack" link.
You can disable in the in-browser interface if required, in the Proxy options.
Get help and join the community discussions at the Burp Suite Support Center.
This release adds a new Scanner check for path-relative style sheet import (PRSSI) vulnerabilities.
These issues are not widely understood by security testers or application developers, and real vulnerabilities are quite prevalent in the wild. The impact of the vulnerability is in many cases serious, and equivalent to cross-site scripting (XSS).