Skip to main content

DescribeEmgVulGroup

Description

call the DescribeEmgVulGroup interface to query emergency vulnerability information in groups.

Request Method

POST

Request Path

/apsara/route/Sas/DescribeEmgVulGroup

Request Parameters Common Parameters

NameLocationTypeRequiredSample valueDescription
regionIdBODYstringYesNo sample value for this parameter.region id
LangBODYstringNozhthe language type of the request and receive message. zh: Chinese en: English
versionBODYstringNo2016-01-01version of api

Return data

NameTypeSample valueDescription
PendingCountinteger0Number of vulnerabilities to be processed.
Typestringscanscan type of emergency vulnerability. scan: scan with plug-in python: scan with script
TotalCountinteger2total number of vulnerabilities.
DescriptionstringJenkins is an open source software project. it is a continuous integration tool developed based on Java. it is used to monitor continuous repetitive work and aims to provide an open and easy-to-use software platform to make continuous integration of software possible. \n\nJenkins there is an arbitrary file read vulnerability, an attacker can directly obtain the contents of the file specified by the attacker from the request response by constructing a malicious HTTP request to send to the Jenkins Web server under remote and unauthorized circumstances.vulnerability description.
RequestIdstringE836EDA2-DBFB-489E-8FD3-5B141EB81A9Crequest ID of the result.
AliasNamestringJenkins remote high-risk security vulnerabilities (CVE-2018-1999001 and CVE-2018-1999002)vulnerability alias.
GmtPublishlong1532592480000vulnerability release time, timestamp.
EmgVulGroupListarrayNo sample value for this parameter.emergency vulnerability grouping information.
Namestringscan:ACSV-2018-072601vulnerability name.

Example

Successful Response example

{
"PendingCount":"0",
"Type":"scan",
"TotalCount":"2",
"Description":"Jenkins is an open source software project. it is a continuous integration tool developed based on Java. it is used to monitor continuous repetitive work and aims to provide an open and easy-to-use software platform to make continuous integration of software possible. \\n\\nJenkins there is an arbitrary file read vulnerability,
an attacker can directly obtain the contents of the file specified by the attacker from the request response by constructing a malicious HTTP request to send to the Jenkins Web server under remote and unauthorized circumstances.",
"RequestId":"E836EDA2-DBFB-489E-8FD3-5B141EB81A9C",
"AliasName":"Jenkins remote high-risk security vulnerabilities (CVE-2018-1999001 and CVE-2018-1999002)",
"GmtPublish":"1532592480000",
"EmgVulGroupList":"",
"Name":"scan:ACSV-2018-072601"
}

Failed Response example

{
"errorSample":
{
"resultCode":-1,
"resultMsg":"system error",
"result":null
}

}