663
阿里云
技术社区[云栖]
查询漏洞扫描详细信息接口__漏洞扫描API_API手册_移动安全-阿里云
请求参数
名称 |
类型 |
是否必须 |
描述 |
---|
ItemId |
String |
是 |
任务唯一标识 |
Language |
String |
否 |
本地化语言信息,语言代码(参考ISO-639) |
Country |
String |
否 |
本地化语言信息,国家代码(参考ISO-3166) |
请求示例
https://jaq.aliyuncs.com/?ItemId=b888cd36-a5e4-4103-85d3-5ab0c330a5d3&Format=JSON&SignatureMethod=HMAC-SHA1&Country=CN&Signature=v1EGLkqoOgFmxNCO3DjwQ6qVnpw%3D&Timestamp=2016-06-05T07%3A50%3A08Z&Action=GetRiskDetail&AccessKeyId=accessKeyId&RegionId=cn-hangzhou&Language=zh&SignatureNonce=d98527ea-fe68-4536-aa78-01e5b9e480aa&Version=2016-04-12&SignatureVersion=1.0
返回参数
名称 |
父节点 |
描述 |
---|
Data |
|
返回结果信息 |
taskStatus |
Data |
任务状态:1-已完成,2-处理中,3-处理失败,4-处理超时 |
vuln_info |
Data |
漏洞信息 |
status |
vuln_info |
子任务状态:1-已完成,2-处理中,3-处理出错,4-处理超时 |
vuln_count |
vuln_info |
漏洞数量信息(任务完成时才返回) |
total |
vuln_count |
漏洞总数量 |
highLevel |
vuln_count |
高风险漏洞数量 |
lowLevel |
vuln_count |
低风险漏洞数量 |
midLevel |
vuln_count |
中风险漏洞数量 |
vulnDetails |
vuln_info |
漏洞详情列表(任务完成时才返回) |
name |
vulnDetails |
漏洞名称 |
level |
vulnDetails |
漏洞风险级别:高, 中, 低 |
count |
vulnDetails |
漏洞数量 |
locations |
vulnDetails |
漏洞位置 |
referenctLink |
vulnDetails |
漏洞详细说明参考链接 |
recommendation |
vulnDetails |
漏洞修复建议 |
返回示例
JSON格式
{
" Data":{
"task_status":1,
"vuln_info":{
"status":1,
"vuln_count":{
"total":20,
"high_level":10,
"mid_level":6,
"low_level":4,
"red_line":7
},
"vuln_details":{
"vuln_detail":[
{
"name":"File任意读写漏洞",
"level":"high",
"count":2,
"locations":{
"string":[
"Lcom/alibaba/wireless/jaq/vulnerabilities/VulnOpenFileMode#openFileWriteMode",
"Lcom/alibaba/wireless/jaq/vulnerabilities/VulnOpenFileMode#openFileReadMode"
]
},
"red_line":false,
"referenct_link":"https://jaq.alibaba.com/blog.htm?id=58",
"recommendation":"不要使用MODE_WORLD_READABLE和MODE_WORLD_WRITABLE"
}
]
}
}
}
}
XML格式
<GetRiskDetailResponse>
<Data>
<task_status>1</task_status>
<vuln_info>
<status>1</status>
<vuln_count>
<total>20</total>
<high_level>10</high_level>
<mid_level>6</mid_level>
<low_level>4</low_level>
<red_line>7</red_line>
</vuln_count>
<vuln_details>
<vuln_detail>
<name>File任意读写漏洞</name>
<level>high</level>
<count>2</count>
<locations>
<string>Lcom/alibaba/wireless/jaq/vulnerabilities/VulnOpenFileMode#openFileWriteMode</string>
<string>Lcom/alibaba/wireless/jaq/vulnerabilities/VulnOpenFileMode#openFileReadMode</string>
</locations>
<red_line>false</red_line>
<referenct_link>https://jaq.alibaba.com/blog.htm?id=58</referenct_link>
<recommendation>不要使用MODE_WORLD_READABLE和MODE_WORLD_WRITABLE</recommendation>
</vuln_detail>
</vuln_details>
</vuln_info>
</result>
</GetRiskDetailResponse>
最后更新:2016-11-23 16:04:13