- Previous: Vulnerability Response
- Up: Vulnerability Response
- Next: WBS Automation
Retrieve vulnerabilities and misconfiguration
This API allows to query the scanners to retrieve detected vulnerabilities and misconfiguration
#### Request URI
# Response structure
#### Response Example
| Path Parameter | Type | Mandatory | Description | Technical details |
system |
String | Y | Parameter Indicating which system must be queried. | Possible values: Pentera or RangerAD |
| Query Parameter | Type | Mandatory | Description | Technical details |
fromDate |
String | Y | From which date the data should be retrieved | Format: YYYY-MM-DD |
toDate |
String | N | Up to which date the data should be retrieved. If missing, current date will be used as default | Format: YYYY-MM-DD |
top |
Integer | N | Parameter for pagination result. Indicates how many record should be retrieved at the time. | Currently active only for RangerAD. For Pentera, all the data retrieved will be always returned in response |
nextPage |
String | N | Parameter for pagination result. Indicates the identifier to resume from the last page read. | Currently active only for RangerAD. For Pentera, all the data retrieved will be always returned in response |
| Field | Type | Description | Technical Details |
|---|---|---|---|
vulnerabilities (0..∞) |
|||
| target_name | string | Name of the scanned target | |
| target_id | string | Unique identifier of the target | |
| target_type | string | Type of the target (Host, Network, etc.) | |
| id | string | Internal vulnerability identifier | |
| name | string | Vulnerability name | |
| summary | string | Short explanation of the vulnerability | |
| port | number | Port where service is detected | |
| protocol | string | Protocol associated with the vulnerability | |
| severity | number | Severity score (CVSS-like) | |
| insight | string | Detailed explanation of the risk | |
| remediation | string | Recommended fix | |
| priority | number | Priority for remediation | |
misconfigurations (0..∞) |
|||
edges (0..∞) |
|||
node (0..∞) |
|||
| id | string | Unique identifier for this misconfiguration item | |
| name | string | Title describing the misconfiguration | |
| detectedAt | string (timestamp) | Timestamp when the misconfiguration was first detected | |
| lastSeenAt | string (timestamp) | The most recent time this misconfiguration was observed | |
| product | string | Security product that identified the issue | |
| organization | string | Organization or tenant associated with this misconfiguration | |
| environment | string | The system environment where the misconfiguration exists | |
| severity | string | Risk severity classification | |
| status | string | Current lifecycle state of the finding | |
| exploitId | string | Identifier referencing an associated exploit (if any) | |
| misconfigurationType | string | Category/type of misconfiguration | |
misconfigurationDetail (0..∞) |
|||
| impact | string | Description of the security or operational impact | |
| mitigationSteps | string | Steps recommended to mitigate or resolve the misconfiguration | |
| mitigationReferences | string | Reference links or documentation supporting mitigation | |
mitreAttacks (0..∞) |
|||
| techniqueId | string | MITRE ATTACK technique identifier | |
| techniqueName | string | Name and description of the attack technique | |
| techniqueUrl | string | External URL to the MITRE ATTACK technique reference | |
- Previous: Vulnerability Response
- Up: Vulnerability Response
- Next: WBS Automation
Docs Navigation
- Campari Open API
- Getting Started
- Connection Tester
- Automatic GRC
- Coupa Integration
- Customer Master Data
- Dogana Connector
- EZFocus
- Invoice Verification
- Invoice Management
- InvoicePACloud
- Journal Entries
- Logistics Operators
- Material Master Data
- One Plan
- Picklist
- Purchase Orders
- Product
- Sales Order
- SAP Utils
- SendLinkToSAP
- Transport Management System
- Vendor Purchase Orders
- Vendor
- Payment
- Vulnerability Response
- WBS Automation
0 Comments
Please sign in to post a comment.