Lists the remediation tracking process groups of a third-party vulnerability (or, in the case of Kubernetes vulnerabilities, the remediation tracking Kubernetes nodes).
The request produces an application/json
payload.
GET | SaaS | https://{your-environment-id}.live.dynatrace.com/api/v2/securityProblems/{id}/remediationItems |
Environment ActiveGateCluster ActiveGate | https://{your-activegate-domain}:9999/e/{your-environment-id}/api/v2/securityProblems/{id}/remediationItems |
To execute this request, you need an access token with securityProblems.read
scope.
To learn how to obtain and use it, see Tokens and authentication.
The ID of the requested third-party security problem.
Defines the scope of the query. Only remediable entities matching the specified criteria are included in the response.
You can add one or more of the following criteria. Values are not case-sensitive and the EQUALS
operator is used unless otherwise specified.
vulnerabilityState("value")
. Find the possible values in the description of the vulnerabilityState field of the response. If not set, all entities are returned.muted("value")
. Possible values are TRUE
or FALSE
.assessment.dataAssets("value")
Possible values are REACHABLE
, and NOT_DETECTED
.assessment.exposure("value")
Possible values are PUBLIC_NETWORK
, and NOT_DETECTED
.assessment.vulnerableFunctionUsage("value")
Possible values are IN_USE
, and NOT_IN_USE
.assessment.vulnerableFunctionRestartRequired("value")
Possible values are TRUE
or FALSE
.assessment.vulnerableFunctionInUseContains("value")
. Possible values are class::function
, class::
and function
. The CONTAINS
operator is used. Only vulnerable functions in use are considered.assessment.accuracy("value")
Possible values are FULL
and REDUCED
.entityNameContains("value-1")
. The CONTAINS
operator is used.trackingLink.displayNameContains("value")
. The CONTAINS
operator is used.To set several criteria, separate them with a comma (,
). Only results matching all criteria are included in the response.
Specify the value of a criterion as a quoted string. The following special characters must be escaped with a tilde (~
) inside quotes:
~
"
RemediationItemList
objectA list of remediation items.
RemediationItem
objectA possible remediation for a security problem.
The progress of this remediation item. It contains affected and unaffected entities.
External tracking link URL associated with the remediable entity of the security problem.
RESOLVED
VULNERABLE
A list of vulnerable components of the remediation item.
A vulnerable component is what causes the security problem.
RemediationAssessment
objectAssessment of the remediation item.
The accuracy of the assessment.
FULL
NOT_AVAILABLE
REDUCED
The reachability of related data assets by affected entities.
NOT_AVAILABLE
NOT_DETECTED
REACHABLE
The level of exposure of affected entities.
NOT_AVAILABLE
NOT_DETECTED
PUBLIC_NETWORK
The number of related data assets.
Whether a restart is required for the latest vulnerable function data.
The usage of vulnerable functions
IN_USE
NOT_AVAILABLE
NOT_IN_USE
A list of vulnerable functions that are not available.
AssessmentAccuracyDetails
objectThe assessment accuracy details.
The reason for a reduced accuracy of the assessment.
LIMITED_AGENT_SUPPORT
LIMITED_BY_CONFIGURATION
VulnerableFunction
objectDefines an vulnerable function.
The class name of the vulnerable function.
The file path of the vulnerable function.
The function name of the vulnerable function.
RemediationItemMuteState
objectThe mute state of a remediation item of a security problem.
A short comment about the most recent mute state change.
The timestamp (UTC milliseconds) of the last update of the mute state.
The remediation is (true
) or is not (false
) muted.
The reason for the most recent mute state change.
AFFECTED
CONFIGURATION_NOT_AFFECTED
FALSE_POSITIVE
IGNORE
INITIAL_STATE
OTHER
VULNERABLE_CODE_NOT_IN_USE
The user who last changed the mute state.
RemediationProgress
objectThe progress of this remediation item. It contains affected and unaffected entities.
A list of related entities that are affected by the security problem.
A list of related entities that are affected by the security problem.
TrackingLink
objectExternal tracking link URL associated with the remediable entity of the security problem.
Display name (title) set for the tracking link, e.g. 'ISSUE-123'.
The timestamp (UTC milliseconds) of the last update of the tracking link.
URL set for the tracking link, e.g. https://example.com/ISSUE-123
The user who last changed the tracking link.
VulnerableComponent
objectVulnerable component of a security problem.
A list of affected entities.
The display name of the vulnerable component.
The file name of the vulnerable component.
The Dynatrace entity ID of the vulnerable component.
The number of affected entities.
The short, component-only name of the vulnerable component.
{"remediationItems": [{"assessment": {"assessmentAccuracy": "FULL","assessmentAccuracyDetails": {"reducedReasons": ["LIMITED_AGENT_SUPPORT"]},"dataAssets": "NOT_AVAILABLE","exposure": "NOT_AVAILABLE","numberOfDataAssets": 1,"vulnerableFunctionRestartRequired": true,"vulnerableFunctionUsage": "IN_USE","vulnerableFunctionsInUse": [{"className": "string","filePath": "string","functionName": "string"}],"vulnerableFunctionsNotAvailable": [{}],"vulnerableFunctionsNotInUse": [{}]},"entityIds": ["string"],"firstAffectedTimestamp": 1,"id": "string","muteState": {"comment": "string","lastUpdatedTimestamp": 1,"muted": true,"reason": "AFFECTED","user": "string"},"name": "string","remediationProgress": {"affectedEntities": ["string"],"unaffectedEntities": ["string"]},"resolvedTimestamp": 1,"trackingLink": {"displayName": "string","lastUpdatedTimestamp": 1,"url": "string","user": "string"},"vulnerabilityState": "RESOLVED","vulnerableComponents": [{"affectedEntities": ["string"],"displayName": "string","fileName": "string","id": "string","numberOfAffectedEntities": 1,"shortName": "string"}]}]}
List the remediation items of the 8788643471842202915
vulnerability. The response is truncated to two entries.
curl --request GET \--url https://mySampleEnv.live.dynatrace.com/api/v2/securityProblems/8788643471842202915/remediationItems \--header 'Authorization: Api-Token [your_token]'
https://mySampleEnv.live.dynatrace.com/api/v2/securityProblems/8788643471842202915/remediationItems
{"remediationItems": [{"id": "PROCESS_GROUP-70DF2C1374244F5A","entityIds": ["PROCESS_GROUP-70DF2C1374244F5A"],"name": "KpiTomcatBackEnd-CWS-1-IG-144-HG","firstAffectedTimestamp": 1633531037359,"assessment": {"exposure": "NOT_DETECTED","dataAssets": "REACHABLE"},"vulnerabilityState": "VULNERABLE","muteState": {"muted": false,"user": "unknown","reason": "INITIAL_STATE"},"vulnerableComponents": [{"id": "SOFTWARE_COMPONENT-2559CD116033C217","displayName": "io.software.component.1.1","fileName": "io.software.component.1.1.jar","numberOfAffectedEntities": 2,"affectedEntities": ["PROCESS_GROUP_INSTANCE-3684888745E180D5","PROCESS_GROUP_INSTANCE-8F100796B9296962"]},{"id": "SOFTWARE_COMPONENT-0A679AA673B2B525","displayName": "io.software.component.loader.2.0.Final","fileName": "io.software.component.loader.2.0.jar","numberOfAffectedEntities": 4,"affectedEntities": ["PROCESS_GROUP_INSTANCE-0D133F13A28B477A","PROCESS_GROUP_INSTANCE-258962DC804FEDBC","PROCESS_GROUP_INSTANCE-3684888745E180D5","PROCESS_GROUP_INSTANCE-B79C2594071FBF6C"]}],"remediationProgress": {"affectedEntities": ["PROCESS_GROUP_INSTANCE-0D133F13A28B477A","PROCESS_GROUP_INSTANCE-258962DC804FEDBC","PROCESS_GROUP_INSTANCE-3684888745E180D5","PROCESS_GROUP_INSTANCE-8F100796B9296962","PROCESS_GROUP_INSTANCE-B79C2594071FBF6C"],"unaffectedEntities": ["PROCESS_GROUP_INSTANCE-63AD33941D667CAC","PROCESS_GROUP_INSTANCE-E20A5DDF167AF3B8","PROCESS_GROUP_INSTANCE-F1166B3AB1F4312D","PROCESS_GROUP_INSTANCE-F9D0250A7432521D","PROCESS_GROUP_INSTANCE-FF1B355E4E252FA1"]}},{"id": "PROCESS_GROUP-18407614632D87A6","entityIds": ["PROCESS_GROUP-18407614632D87A6"],"name": "KpiTomcatFrontEnd-CWS-1-IG-67-HG","firstAffectedTimestamp": 1633531037359,"assessment": {"exposure": "PUBLIC_NETWORK","dataAssets": "NOT_DETECTED"},"resolvedTimestamp": 1636096094323,"vulnerabilityState": "RESOLVED","muteState": {"muted": false,"user": "unknown","reason": "INITIAL_STATE"},"vulnerableComponents": [{"id": "SOFTWARE_COMPONENT-2559CD116033C217","displayName": "io.software.component.1.1.Final","fileName": "io.software.component.1.1.jar","numberOfAffectedEntities": 1,"affectedEntities": ["PROCESS_GROUP_INSTANCE-41115D4B6F8BFEEC"]}],"remediationProgress": {"affectedEntities": ["PROCESS_GROUP_INSTANCE-41115D4B6F8BFEEC"],"unaffectedEntities": ["PROCESS_GROUP_INSTANCE-0189CF4780B4B872","PROCESS_GROUP_INSTANCE-2D54D85C45C0BA57","PROCESS_GROUP_INSTANCE-3E6373ACEA9DE722","PROCESS_GROUP_INSTANCE-47BCF72F93FF9528","PROCESS_GROUP_INSTANCE-6B5EF5C1A5ED42D0","PROCESS_GROUP_INSTANCE-BA18DB16A7A28A04","PROCESS_GROUP_INSTANCE-BCAECCB29AB12462","PROCESS_GROUP_INSTANCE-DD3CD2024A06BB5B","PROCESS_GROUP_INSTANCE-DE5B280889AC6569"]}}]}
200