Lists the vulnerable functions and their usage.
The request produces an application/json
payload.
GET | SaaS | https://{your-environment-id}.live.dynatrace.com/api/v2/securityProblems/{id}/vulnerableFunctions |
Environment ActiveGateCluster ActiveGate | https://{your-activegate-domain}:9999/e/{your-environment-id}/api/v2/securityProblems/{id}/vulnerableFunctions |
To execute this request, you need an access token with securityProblems.read
scope.
To learn how to obtain and use it, see Tokens and authentication.
The ID of the requested third-party security problem.
Defines the scope of the query. Only vulnerable functions matching the specified criteria are included in the response.
You can add the following criteria. Values are not case sensitive and the EQUALS
operator is used unless otherwise specified.
managementZoneIds("mzId-1", "mzId-2")
.managementZones("name-1", "name-2")
. Values are case sensitive.processGroupIds("pgId-1", "pgId-2")
. Specify Dynatrace entity IDs here.processGroupNames("name-1", "name-2")
. Values are case sensitive.processGroupNameContains("name-1")
. The CONTAINS
operator is used.Specify the value of a criterion as a quoted string. The following special characters must be escaped with a tilde (~
) inside quotes:
~
"
Defines additional grouping types in which vulnerable functions should be displayed.
You can add one of the following grouping types.
PROCESS_GROUP
VulnerableFunctionsContainer
objectA list of vulnerable functions, their security problem wide usages and their usages per process group. Optional: A list of vulnerable function usages per process group for a security problem.
A list of vulnerable functions, their security problem wide usages and their usages per process group.
A list of vulnerable function usages per process group for a security problem. The result is sorted based on the following criteria:
VulnerableFunctionProcessGroups
objectA vulnerable function including its usage by specific process groups in context of the security problem.
The process group identifiers, where this vulnerable function is in use.
The process group identifiers, where information about the usage of this function not available.
The process group identifiers, where this vulnerable function is not in use.
The vulnerable function usage based on the given process groups:
IN_USE
NOT_AVAILABLE
NOT_IN_USE
VulnerableFunction
objectDefines an vulnerable function.
The class name of the vulnerable function.
The file path of the vulnerable function.
The function name of the vulnerable function.
ProcessGroupVulnerableFunctions
objectThe vulnerable functions of a process group including their usage.
The process group identifier.
{"vulnerableFunctions": [{"function": {"className": "string","filePath": "string","functionName": "string"},"processGroupsInUse": ["string"],"processGroupsNotAvailable": ["string"],"processGroupsNotInUse": ["string"],"usage": "IN_USE"}],"vulnerableFunctionsByProcessGroup": [{"functionsInUse": [{}],"functionsNotAvailable": [{}],"functionsNotInUse": [{}],"processGroup": "string"}]}
Given a vulnerability with ID 2919200225913269102
that has vulnerable functions in use, query both views on the vulnerable functions (vulnerable function to PROCESS_GROUP
and PROCESS_GROUP
to vulnerable function).
Required filter: groupBy=PROCESS_GROUP
.
curl -X 'GET' 'https://mySampleEnv.live.dynatrace.com/api/v2/securityProblems/2919200225913269102/vulnerableFunctions?groupBy=PROCESS_GROUP' \-H 'accept: application/json; charset=utf-8' \-H 'Authorization: Api-Token [your_token]'
https://mySampleEnv.live.dynatrace.com/api/v2/securityProblems/2919200225913269102/vulnerableFunctions?groupBy=PROCESS_GROUP
{"vulnerableFunctions": [{"function": {"className": "org.apache.coyote.http11.Http11InputBuffer","filePath": null,"functionName": "parseHeader"},"usage": "IN_USE","processGroupsInUse": ["PROCESS_GROUP-285FF9C91448BC8B"],"processGroupsNotInUse": [],"processGroupsNotAvailable": []}],"vulnerableFunctionsByProcessGroup": [{"processGroup": "PROCESS_GROUP-285FF9C91448BC8B","functionsInUse": [{"className": "org.apache.coyote.http11.Http11InputBuffer","filePath": null,"functionName": "parseHeader"}],"functionsNotInUse": [],"functionsNotAvailable": []}]}