663
iPhone_iPad_Mac_apple
查詢漏洞掃描詳細信息接口__漏洞掃描API_API手冊_移動安全-阿裏雲
請求參數
名稱 |
類型 |
是否必須 |
描述 |
---|
ItemId |
String |
是 |
任務唯一標識 |
Language |
String |
否 |
本地化語言信息,語言代碼(參考ISO-639) |
Country |
String |
否 |
本地化語言信息,國家代碼(參考ISO-3166) |
請求示例
https://jaq.aliyuncs.com/?ItemId=b888cd36-a5e4-4103-85d3-5ab0c330a5d3&Format=JSON&SignatureMethod=HMAC-SHA1&Country=CN&Signature=v1EGLkqoOgFmxNCO3DjwQ6qVnpw%3D&Timestamp=2016-06-05T07%3A50%3A08Z&Action=GetRiskDetail&AccessKeyId=accessKeyId&RegionId=cn-hangzhou&Language=zh&SignatureNonce=d98527ea-fe68-4536-aa78-01e5b9e480aa&Version=2016-04-12&SignatureVersion=1.0
返回參數
名稱 |
父節點 |
描述 |
---|
Data |
|
返回結果信息 |
taskStatus |
Data |
任務狀態:1-已完成,2-處理中,3-處理失敗,4-處理超時 |
vuln_info |
Data |
漏洞信息 |
status |
vuln_info |
子任務狀態:1-已完成,2-處理中,3-處理出錯,4-處理超時 |
vuln_count |
vuln_info |
漏洞數量信息(任務完成時才返回) |
total |
vuln_count |
漏洞總數量 |
highLevel |
vuln_count |
高風險漏洞數量 |
lowLevel |
vuln_count |
低風險漏洞數量 |
midLevel |
vuln_count |
中風險漏洞數量 |
vulnDetails |
vuln_info |
漏洞詳情列表(任務完成時才返回) |
name |
vulnDetails |
漏洞名稱 |
level |
vulnDetails |
漏洞風險級別:高, 中, 低 |
count |
vulnDetails |
漏洞數量 |
locations |
vulnDetails |
漏洞位置 |
referenctLink |
vulnDetails |
漏洞詳細說明參考鏈接 |
recommendation |
vulnDetails |
漏洞修複建議 |
返回示例
JSON格式
{
" Data":{
"task_status":1,
"vuln_info":{
"status":1,
"vuln_count":{
"total":20,
"high_level":10,
"mid_level":6,
"low_level":4,
"red_line":7
},
"vuln_details":{
"vuln_detail":[
{
"name":"File任意讀寫漏洞",
"level":"high",
"count":2,
"locations":{
"string":[
"Lcom/alibaba/wireless/jaq/vulnerabilities/VulnOpenFileMode#openFileWriteMode",
"Lcom/alibaba/wireless/jaq/vulnerabilities/VulnOpenFileMode#openFileReadMode"
]
},
"red_line":false,
"referenct_link":"https://jaq.alibaba.com/blog.htm?id=58",
"recommendation":"不要使用MODE_WORLD_READABLE和MODE_WORLD_WRITABLE"
}
]
}
}
}
}
XML格式
<GetRiskDetailResponse>
<Data>
<task_status>1</task_status>
<vuln_info>
<status>1</status>
<vuln_count>
<total>20</total>
<high_level>10</high_level>
<mid_level>6</mid_level>
<low_level>4</low_level>
<red_line>7</red_line>
</vuln_count>
<vuln_details>
<vuln_detail>
<name>File任意讀寫漏洞</name>
<level>high</level>
<count>2</count>
<locations>
<string>Lcom/alibaba/wireless/jaq/vulnerabilities/VulnOpenFileMode#openFileWriteMode</string>
<string>Lcom/alibaba/wireless/jaq/vulnerabilities/VulnOpenFileMode#openFileReadMode</string>
</locations>
<red_line>false</red_line>
<referenct_link>https://jaq.alibaba.com/blog.htm?id=58</referenct_link>
<recommendation>不要使用MODE_WORLD_READABLE和MODE_WORLD_WRITABLE</recommendation>
</vuln_detail>
</vuln_details>
</vuln_info>
</result>
</GetRiskDetailResponse>
最後更新:2016-11-23 16:04:13