AttackForge Enterprise & AttackForge Core
Powered By GitBook
UpdateVulnerabilityLibraryIssue
This method can be used for the following functionality: Update a vulnerability in the library, by vulnerability identifier (Id).

Parameters

The following URL, Headers and Parameters are required for requests to this API endpoint. Where a parameter is optional, it will be indicated. Otherwise treat all parameters as mandatory.

Headers

1
PUT /api/ss/library/:id HTTP/1.1
2
Host: demo.attackforge.com
3
X-SSAPI-KEY: APIKey
4
Content-Type: application/json
5
Connection: close
Copied!

Query

id (string)
Identifier for the vulnerability.
Example:
1
PUT /api/ss/library/5d5b27724a83a708c46f3f52 HTTP/1.1
Copied!
title (string) (optional)
Title for the vulnerability.
Example:
1
{
2
"title": "..."
3
}
Copied!
category (string) (optional)
Category for the vulnerability.
Example:
1
{
2
"category": "..."
3
}
Copied!
description (string) (optional)
Description for the vulnerability.
Example:
1
{
2
"description": "..."
3
}
Copied!
severity (number) (optional)
Severity for the vulnerability. Must be a number between 1 to 10.
Example:
1
{
2
"severity": 10
3
}
Copied!
likelihood_of_exploitation (number) (optional)
Likelihood of Exploitation for the vulnerability. Must be a number between 1 to 10.
Example:
1
{
2
"likelihood_of_exploitation": 10
3
}
Copied!
priority (string) (optional)
Priority for the vulnerability. Must be one of the following: Critical, High, Medium, Low, Info
Example:
1
{
2
"priority": "Critical"
3
}
Copied!
attack_scenario (string) (optional)
Attack Scenario for the vulnerability.
Example:
1
{
2
"attack_scenario": "..."
3
}
Copied!
remediation_recommendation (string) (optional)
Remediation Recommendation for the vulnerability.
Example:
1
{
2
"remediation_recommendation": "..."
3
}
Copied!
impact_on_confidentiality (string) (optional)
Impact on Confidentiality for the vulnerability. Must be one of the following: High, Medium, Low, None
Example:
1
{
2
"impact_on_confidentiality": "High"
3
}
Copied!
impact_on_integrity (string) (optional)
Impact on Integrity for the vulnerability. Must be one of the following: High, Medium, Low, None
Example:
1
{
2
"impact_on_integrity": "High"
3
}
Copied!
impact_on_availability (string) (optional)
Impact on Availability for the vulnerability. Must be one of the following: High, Medium, Low, None
Example:
1
{
2
"impact_on_availability": "High"
3
}
Copied!
tags (array of strings) (optional)
Tags for the vulnerability.
Example:
1
{
2
"tags": ["...", "...", "..."]
3
}
Copied!
is_deleted (boolean) (optional)
Whether vulnerability is deleted or not.
Example:
1
{
2
"is_deleted": false
3
}
Copied!
import_to_library (string) (optional)
Import vulnerabilities into the Imported Vulnerabilities Library (default) or Main Vulnerabilities Library. Must be either "Imported Vulnerabilities" or "Main Vulnerabilities".
Example:
1
"import_to_library": "Imported Vulnerabilities"
Copied!
import_source (string) (optional)
Vulnerability source e.g. Nessus, BURP, Custom Tool, etc.
Example:
1
"import_source": "Nessus"
Copied!
import_source_id (string) (optional)
Vulnerability source/plugin id. Unique Id from the source/tool vulnerability is imported from.
Example:
1
"import_source_id": "NessusPlugin123"
Copied!

Example

The following example is a cURL request to update a vulnerability in the library by its identifier (Id).

Request

Include API Token instead of stars in 'X-SSAPI-KEY: ***************************************' parameter.
1
curl -X PUT 'https://demo.attackforge.com/api/ss/library/5d5b27724a83a708c46f3f52' -H 'Host: demo.attackforge.com' -H 'X-SSAPI-KEY: ***************************************' -H 'Content-Type: application/json' -H 'Connection: close' -d '{
2
"title": "SQL Injection",
3
"category": "Injection",
4
"description": "Lorem Ipsum...",
5
"severity": 10,
6
"likelihood_of_exploitation": 10,
7
"priority": "Critical",
8
"attack_scenario": "Lorem Ipsum...",
9
"remediation_recommendation": "Lorem Ipsum...",
10
"impact_on_confidentiality": "High",
11
"impact_on_integrity": "High",
12
"impact_on_availability": "High",
13
"tags": ["CWE-89", "Injection"],
14
"is_deleted": false,
15
"import_to_library": "Imported Vulnerabilities",
16
"import_source": "Nessus",
17
"import_source_id": "NessusPlugin123"
18
}'
Copied!

Response

Response contains a status.
1
{
2
"status": "Vulnerability Updated"
3
}
Copied!
Last modified 27d ago