Querying the Servers Affected by a Vulnerability
Function
This API is used to query the servers affected by a vulnerability.
URI
GET /v5/{project_id}/vulnerability/hosts
|
Parameter |
Mandatory |
Type |
Description |
|---|---|---|---|
|
project_id |
Yes |
String |
Project ID |
|
Parameter |
Mandatory |
Type |
Description |
|---|---|---|---|
|
enterprise_project_id |
No |
String |
Enterprise project ID. The value 0 indicates the default enterprise project. To query all enterprise projects, set this parameter to all_granted_eps. |
|
vul_id |
Yes |
String |
Vulnerability ID |
|
type |
Yes |
String |
Vulnerability type. Its value can be:
|
|
host_name |
No |
String |
Affected server name |
|
host_ip |
No |
String |
IP address of the affected server |
|
status |
No |
String |
Vulnerability status.
|
|
limit |
No |
Integer |
Number of records on each page |
|
offset |
No |
Integer |
Offset, which specifies the start position of the record to be returned. The value must be a number no less than 0. |
Request Parameters
|
Parameter |
Mandatory |
Type |
Description |
|---|---|---|---|
|
X-Auth-Token |
Yes |
String |
User token. It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token. |
Response Parameters
Status code: 200
|
Parameter |
Type |
Description |
|---|---|---|
|
total_num |
Integer |
Number of affected servers |
|
data_list |
Array of VulHostInfo objects |
List of affected ECSs |
|
Parameter |
Type |
Description |
|---|---|---|
|
host_id |
String |
ID of the server affected by the vulnerability |
|
severity_level |
String |
Risk level.
|
|
host_name |
String |
Affected server name |
|
host_ip |
String |
IP address of the affected server |
|
cve_num |
Integer |
Vulnerability CVEs |
|
cve_id_list |
Array of strings |
The CVE ID list corresponding to the vulnerability |
|
status |
String |
Vulnerability status.
|
|
repair_cmd |
String |
Command line to be executed to fix the vulnerability (This field is available only for Linux vulnerabilities.) |
Example Requests
Query the first 10 records in the list of servers with EulerOS-SA-2021-1894 vulnerability.
GET https://{endpoint}/v5/2b31ed520xxxxxxebedb6e57xxxxxxxx/vulnerability/hosts?vul_id=EulerOS-SA-2021-1894&offset=0&limit=10
Example Responses
Status code: 200
Vul host info list
{
"total_num" : 1,
"data_list" : [ {
"host_id" : "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
"severity_level" : "Low",
"host_name" : "ecs",
"host_ip" : "xxx.xxx.xxx.xxx",
"cve_num" : 1,
"cve_id_list" : [ "CVE-2022-1664" ],
"status" : "vul_status_ignored",
"repair_cmd" : "zypper update update-alternatives"
} ]
}
Status Codes
|
Status Code |
Description |
|---|---|
|
200 |
Vul host info list |
Error Codes
See Error Codes.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.