663
阿里云
技术社区[云栖]
查询漏洞扫描详细信息接口__漏洞扫描API_API手册_移动安全-阿里云
请求参数
| 名称 |
类型 |
是否必须 |
描述 |
|---|
| ItemId |
String |
是 |
任务唯一标识 |
| Language |
String |
否 |
本地化语言信息,语言代码(参考ISO-639) |
| Country |
String |
否 |
本地化语言信息,国家代码(参考ISO-3166) |
请求示例
https://jaq.aliyuncs.com/?ItemId=b888cd36-a5e4-4103-85d3-5ab0c330a5d3&Format=JSON&SignatureMethod=HMAC-SHA1&Country=CN&Signature=v1EGLkqoOgFmxNCO3DjwQ6qVnpw%3D&Timestamp=2016-06-05T07%3A50%3A08Z&Action=GetRiskDetail&AccessKeyId=accessKeyId&RegionId=cn-hangzhou&Language=zh&SignatureNonce=d98527ea-fe68-4536-aa78-01e5b9e480aa&Version=2016-04-12&SignatureVersion=1.0
返回参数
| 名称 |
父节点 |
描述 |
|---|
| Data |
|
返回结果信息 |
| taskStatus |
Data |
任务状态:1-已完成,2-处理中,3-处理失败,4-处理超时 |
| vuln_info |
Data |
漏洞信息 |
| status |
vuln_info |
子任务状态:1-已完成,2-处理中,3-处理出错,4-处理超时 |
| vuln_count |
vuln_info |
漏洞数量信息(任务完成时才返回) |
| total |
vuln_count |
漏洞总数量 |
| highLevel |
vuln_count |
高风险漏洞数量 |
| lowLevel |
vuln_count |
低风险漏洞数量 |
| midLevel |
vuln_count |
中风险漏洞数量 |
| vulnDetails |
vuln_info |
漏洞详情列表(任务完成时才返回) |
| name |
vulnDetails |
漏洞名称 |
| level |
vulnDetails |
漏洞风险级别:高, 中, 低 |
| count |
vulnDetails |
漏洞数量 |
| locations |
vulnDetails |
漏洞位置 |
| referenctLink |
vulnDetails |
漏洞详细说明参考链接 |
| recommendation |
vulnDetails |
漏洞修复建议 |
返回示例
JSON格式
{ " Data":{ "task_status":1, "vuln_info":{ "status":1, "vuln_count":{ "total":20, "high_level":10, "mid_level":6, "low_level":4, "red_line":7 }, "vuln_details":{ "vuln_detail":[ { "name":"File任意读写漏洞", "level":"high", "count":2, "locations":{ "string":[ "Lcom/alibaba/wireless/jaq/vulnerabilities/VulnOpenFileMode#openFileWriteMode", "Lcom/alibaba/wireless/jaq/vulnerabilities/VulnOpenFileMode#openFileReadMode" ] }, "red_line":false, "referenct_link":"https://jaq.alibaba.com/blog.htm?id=58", "recommendation":"不要使用MODE_WORLD_READABLE和MODE_WORLD_WRITABLE" } ] } } } }
XML格式
<GetRiskDetailResponse> <Data> <task_status>1</task_status> <vuln_info> <status>1</status> <vuln_count> <total>20</total> <high_level>10</high_level> <mid_level>6</mid_level> <low_level>4</low_level> <red_line>7</red_line> </vuln_count> <vuln_details> <vuln_detail> <name>File任意读写漏洞</name> <level>high</level> <count>2</count> <locations> <string>Lcom/alibaba/wireless/jaq/vulnerabilities/VulnOpenFileMode#openFileWriteMode</string> <string>Lcom/alibaba/wireless/jaq/vulnerabilities/VulnOpenFileMode#openFileReadMode</string> </locations> <red_line>false</red_line> <referenct_link>https://jaq.alibaba.com/blog.htm?id=58</referenct_link> <recommendation>不要使用MODE_WORLD_READABLE和MODE_WORLD_WRITABLE</recommendation> </vuln_detail> </vuln_details> </vuln_info> </result></GetRiskDetailResponse>
最后更新:2016-11-23 16:04:13