663
阿裏雲
技術社區[雲棲]
查詢漏洞掃描詳細信息接口__漏洞掃描API_API手冊_移動安全-阿裏雲
請求參數
| 名稱 |
類型 |
是否必須 |
描述 |
|---|
| ItemId |
String |
是 |
任務唯一標識 |
| Language |
String |
否 |
本地化語言信息,語言代碼(參考ISO-639) |
| Country |
String |
否 |
本地化語言信息,國家代碼(參考ISO-3166) |
請求示例
https://jaq.aliyuncs.com/?ItemId=b888cd36-a5e4-4103-85d3-5ab0c330a5d3&Format=JSON&SignatureMethod=HMAC-SHA1&Country=CN&Signature=v1EGLkqoOgFmxNCO3DjwQ6qVnpw%3D&Timestamp=2016-06-05T07%3A50%3A08Z&Action=GetRiskDetail&AccessKeyId=accessKeyId&RegionId=cn-hangzhou&Language=zh&SignatureNonce=d98527ea-fe68-4536-aa78-01e5b9e480aa&Version=2016-04-12&SignatureVersion=1.0
返回參數
| 名稱 |
父節點 |
描述 |
|---|
| Data |
|
返回結果信息 |
| taskStatus |
Data |
任務狀態:1-已完成,2-處理中,3-處理失敗,4-處理超時 |
| vuln_info |
Data |
漏洞信息 |
| status |
vuln_info |
子任務狀態:1-已完成,2-處理中,3-處理出錯,4-處理超時 |
| vuln_count |
vuln_info |
漏洞數量信息(任務完成時才返回) |
| total |
vuln_count |
漏洞總數量 |
| highLevel |
vuln_count |
高風險漏洞數量 |
| lowLevel |
vuln_count |
低風險漏洞數量 |
| midLevel |
vuln_count |
中風險漏洞數量 |
| vulnDetails |
vuln_info |
漏洞詳情列表(任務完成時才返回) |
| name |
vulnDetails |
漏洞名稱 |
| level |
vulnDetails |
漏洞風險級別:高, 中, 低 |
| count |
vulnDetails |
漏洞數量 |
| locations |
vulnDetails |
漏洞位置 |
| referenctLink |
vulnDetails |
漏洞詳細說明參考鏈接 |
| recommendation |
vulnDetails |
漏洞修複建議 |
返回示例
JSON格式
{ " Data":{ "task_status":1, "vuln_info":{ "status":1, "vuln_count":{ "total":20, "high_level":10, "mid_level":6, "low_level":4, "red_line":7 }, "vuln_details":{ "vuln_detail":[ { "name":"File任意讀寫漏洞", "level":"high", "count":2, "locations":{ "string":[ "Lcom/alibaba/wireless/jaq/vulnerabilities/VulnOpenFileMode#openFileWriteMode", "Lcom/alibaba/wireless/jaq/vulnerabilities/VulnOpenFileMode#openFileReadMode" ] }, "red_line":false, "referenct_link":"https://jaq.alibaba.com/blog.htm?id=58", "recommendation":"不要使用MODE_WORLD_READABLE和MODE_WORLD_WRITABLE" } ] } } } }
XML格式
<GetRiskDetailResponse> <Data> <task_status>1</task_status> <vuln_info> <status>1</status> <vuln_count> <total>20</total> <high_level>10</high_level> <mid_level>6</mid_level> <low_level>4</low_level> <red_line>7</red_line> </vuln_count> <vuln_details> <vuln_detail> <name>File任意讀寫漏洞</name> <level>high</level> <count>2</count> <locations> <string>Lcom/alibaba/wireless/jaq/vulnerabilities/VulnOpenFileMode#openFileWriteMode</string> <string>Lcom/alibaba/wireless/jaq/vulnerabilities/VulnOpenFileMode#openFileReadMode</string> </locations> <red_line>false</red_line> <referenct_link>https://jaq.alibaba.com/blog.htm?id=58</referenct_link> <recommendation>不要使用MODE_WORLD_READABLE和MODE_WORLD_WRITABLE</recommendation> </vuln_detail> </vuln_details> </vuln_info> </result></GetRiskDetailResponse>
最後更新:2016-11-23 16:04:13