AttackForge Enterprise & AttackForge Core
Powered By GitBook
GetVulnerabilityById
This method can be used for the following functionality: Get a vulnerability that this user has access to, by vulnerability identifier (Id).

Parameters

The following URL, Headers and Parameters are required for requests to this API endpoint. Where a parameter is optional, it will be indicated. Otherwise treat all parameters as mandatory.

Headers

1
GET /api/ss/vulnerability/:id HTTP/1.1
2
Host: demo.attackforge.com
3
X-SSAPI-KEY: APIKey
4
Content-Type: application/json
5
Connection: close
Copied!

Query

id (string)
Identifier for the vulnerability.
Example:
1
GET /api/ss/vulnerability/5e573d3ed1484a0c155f3732 HTTP/1.1
Copied!

Example

The following example is a cURL request to get a vulnerability by its identifier (Id).

Request

Include API Token instead of stars in 'X-SSAPI-KEY: ***************************************' parameter.
1
curl -X GET 'https://demo.attackforge.com/api/ss/vulnerability/5e573d3ed1484a0c155f3732' -H 'Host: demo.attackforge.com' -H 'X-SSAPI-KEY: ***************************************' -H 'Content-Type: application/json' -H 'Connection: close'
Copied!

Response

Response contains a vulnerability object.
1
{
2
"vulnerability": {
3
"vulnerability_id": "...",
4
"vulnerability_alternate_id": "...",
5
"vulnerability_created": "...",
6
"vulnerability_modified": "...",
7
"vulnerability_title": "...",
8
"vulnerability_priority": "...",
9
"vulnerability_cvssv3_vector": "...",
10
"vulnerability_cvssv3_base_score": "...",
11
"vulnerability_cvssv3_temporal_score": "...",
12
"vulnerability_cvssv3_environmental_score": "...",
13
"vulnerability_status": "...",
14
"vulnerability_status_updated": "...",
15
"vulnerability_retest": "...",
16
"vulnerability_likelihood_of_exploitation": 10,
17
"vulnerability_steps_to_reproduce": "...",
18
"vulnerability_steps_to_reproduce_HTML": "...",
19
"vulnerability_tags": ["...","..."],
20
"vulnerability_is_zeroday": "...",
21
"vulnerability_notes": [{"note":"..."},{"note":"..."}],
22
"vulnerability_description": "...",
23
"vulnerability_attack_scenario": "...",
24
"vulnerability_remediation_recommendation": "...",
25
"vulnerability_remediation_notes": [{"note":"...","created":"...","created_by":"..."}],
26
"vulnerability_affected_asset_name": "...",
27
"vulnerability_affected_asset_id": "...",
28
"vulnerability_affected_asset_library_id": "...",
29
"vulnerability_affected_asset_library_external_id": "...",
30
"vulnerability_project_name": "...",
31
"vulnerability_project_id": "...",
32
"vulnerability_project_code": "...",
33
"vulnerability_project_groups": [{"id": "...", "name": "..."}],
34
"vulnerability_discovered_by": "...",
35
"vulnerability_evidence": [{"file_name":"...","file_name_custom":"...","storage_name":"...","file_type":"...","file_size_kb":"..."}],
36
"vulnerability_custom_fields": [{"key": "...", "value": "...", "type": "Tag/Field"}],
37
"vulnerability_library_custom_fields": [{"key": "...", "value": "...", "type": "Tag/Field"}],
38
"vulnerability_project_custom_fields": [{"key": "...", "value": "...", "type": "Tag/Field"}]
39
}
40
}
Copied!
Last modified 12d ago