漏洞管理服务 CODEARTS INSPECTOR-获取主机漏洞扫描结果:响应示例

时间:2024-10-14 17:06:44

响应示例

状态码: 200

OK

{
  "total" : 1,
  "items" : [ {
    "type" : "protocolvuln",
    "port" : "general-tcp",
    "title" : "Apache Log4j2 Remote Code Execution Vulnerability",
    "sa_id" : "Apache Log4j2 Remote Code Execution Vulnerability",
    "vuln_id" : "1.3.6.1.4.1.25623.1.0.301012-general-tcp",
    "severity" : "high",
    "topic" : "Apache Log4j2 Remote Code Execution Vulnerability",
    "description" : "Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. \\nAn attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.\\nhttps://www.huaweicloud.com/notice/2021/20211210001621800.html\\n",
    "fix_advisory" : "Update log4j to 2.12.2, 2.16.0 or later. Ask application vendor for a fix.\\nPlease refer to https://www.huaweicloud.com/notice/2021/20211210001621800.html",
    "cve_list" : [ {
      "id" : "CVE-2021-44228",
      "link" : ""
    } ],
    "ref_link_list" : [ "" ],
    "vul_detect_result" : "/var/lib/docker/overlay2/54e1e225d711d77afc0e8cf6fa3dda0274c56659b21d214715ee53f18565789f/diff/root/sdkrend/log4j-core-2.8.2.jar\\n",
    "cvss_score" : "9.3",
    "cvss_version" : "",
    "cvss_vector" : "AV:N/AC:M/Au:N/C:C/I:C/A:C",
    "is_ignore" : false
  } ]
}
support.huaweicloud.com/api-vss/ListHostResults.html