DescribeEmgVulGroup
Description
call the DescribeEmgVulGroup interface to query emergency vulnerability information in groups.
Request Method
POST
Request Path
/apsara/route/Sas/DescribeEmgVulGroup
Request Parameters Common Parameters
Name | Location | Type | Required | Sample value | Description |
---|---|---|---|---|---|
regionId | BODY | string | Yes | No sample value for this parameter. | region id |
Lang | BODY | string | No | zh | the language type of the request and receive message. zh: Chinese en: English |
version | BODY | string | No | 2016-01-01 | version of api |
Return data
Name | Type | Sample value | Description |
---|---|---|---|
PendingCount | integer | 0 | Number of vulnerabilities to be processed. |
Type | string | scan | scan type of emergency vulnerability. scan: scan with plug-in python: scan with script |
TotalCount | integer | 2 | total number of vulnerabilities. |
Description | string | Jenkins is an open source software project. it is a continuous integration tool developed based on Java. it is used to monitor continuous repetitive work and aims to provide an open and easy-to-use software platform to make continuous integration of software possible. \n\nJenkins there is an arbitrary file read vulnerability, an attacker can directly obtain the contents of the file specified by the attacker from the request response by constructing a malicious HTTP request to send to the Jenkins Web server under remote and unauthorized circumstances. | vulnerability description. |
RequestId | string | E836EDA2-DBFB-489E-8FD3-5B141EB81A9C | request ID of the result. |
AliasName | string | Jenkins remote high-risk security vulnerabilities (CVE-2018-1999001 and CVE-2018-1999002) | vulnerability alias. |
GmtPublish | long | 1532592480000 | vulnerability release time, timestamp. |
EmgVulGroupList | array | No sample value for this parameter. | emergency vulnerability grouping information. |
Name | string | scan:ACSV-2018-072601 | vulnerability name. |
Example
Successful Response example
{
"PendingCount":"0",
"Type":"scan",
"TotalCount":"2",
"Description":"Jenkins is an open source software project. it is a continuous integration tool developed based on Java. it is used to monitor continuous repetitive work and aims to provide an open and easy-to-use software platform to make continuous integration of software possible. \\n\\nJenkins there is an arbitrary file read vulnerability,
an attacker can directly obtain the contents of the file specified by the attacker from the request response by constructing a malicious HTTP request to send to the Jenkins Web server under remote and unauthorized circumstances.",
"RequestId":"E836EDA2-DBFB-489E-8FD3-5B141EB81A9C",
"AliasName":"Jenkins remote high-risk security vulnerabilities (CVE-2018-1999001 and CVE-2018-1999002)",
"GmtPublish":"1532592480000",
"EmgVulGroupList":"",
"Name":"scan:ACSV-2018-072601"
}
Failed Response example
{
"errorSample":
{
"resultCode":-1,
"resultMsg":"system error",
"result":null
}
}