Querying the Servers Affected by a Vulnerability
Function
This API is used to query the servers affected by a vulnerability.
URI
GET /v5/{project_id}/vulnerability/hosts
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
project_id |
Yes |
String |
Project ID |
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
enterprise_project_id |
No |
String |
Enterprise project ID. The value 0 indicates the default enterprise project. To query all enterprise projects, set this parameter to all_granted_eps. |
vul_id |
Yes |
String |
Vulnerability ID |
type |
Yes |
String |
Vulnerability type. Its value can be:
|
host_name |
No |
String |
Affected server name |
host_ip |
No |
String |
IP address of the affected server |
status |
No |
String |
Vulnerability status.
|
limit |
No |
Integer |
Number of records on each page |
offset |
No |
Integer |
Offset, which specifies the start position of the record to be returned. The value must be a number no less than 0. |
Request Parameters
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
X-Auth-Token |
Yes |
String |
User token. It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token. |
Response Parameters
Status code: 200
Parameter |
Type |
Description |
---|---|---|
total_num |
Integer |
Number of affected servers |
data_list |
Array of VulHostInfo objects |
List of affected ECSs |
Parameter |
Type |
Description |
---|---|---|
host_id |
String |
ID of the server affected by the vulnerability |
severity_level |
String |
Risk level.
|
host_name |
String |
Affected server name |
host_ip |
String |
IP address of the affected server |
cve_num |
Integer |
Vulnerability CVEs |
cve_id_list |
Array of strings |
The CVE ID list corresponding to the vulnerability |
status |
String |
Vulnerability status.
|
repair_cmd |
String |
Command line to be executed to fix the vulnerability (This field is available only for Linux vulnerabilities.) |
Example Requests
Query the first 10 records in the list of servers with EulerOS-SA-2021-1894 vulnerability.
GET https://{endpoint}/v5/2b31ed520xxxxxxebedb6e57xxxxxxxx/vulnerability/hosts?vul_id=EulerOS-SA-2021-1894&offset=0&limit=10
Example Responses
Status code: 200
Vul host info list
{ "total_num" : 1, "data_list" : [ { "host_id" : "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx", "severity_level" : "Low", "host_name" : "ecs", "host_ip" : "xxx.xxx.xxx.xxx", "cve_num" : 1, "cve_id_list" : [ "CVE-2022-1664" ], "status" : "vul_status_ignored", "repair_cmd" : "zypper update update-alternatives" } ] }
Status Codes
Status Code |
Description |
---|---|
200 |
Vul host info list |
Error Codes
See Error Codes.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.