Vulnerabilities API - GET remediation item entities
Lists the remediation tracking processes of a third-party vulnerability.
The request produces an application/json
payload.
GET | SaaS | https://{your-environment-id}.live.dynatrace.com/api/v2/securityProblems/{id}/remediationItems/{remediationItemId}/remediationProgressEntities |
Environment ActiveGateCluster ActiveGate | https://{your-activegate-domain}:9999/e/{your-environment-id}/api/v2/securityProblems/{id}/remediationItems/{remediationItemId}/remediationProgressEntities |
Authentication
To execute this request, you need an access token with securityProblems.read
scope.
To learn how to obtain and use it, see Tokens and authentication.
Parameters
The ID of the requested third-party security problem.
The ID of the remediation item.
Defines the scope of the query. Only remediation progress entities matching the specified criteria are included in the response.
You can add one or more of the following criteria. Values are not case-sensitive and the EQUALS
operator is used unless otherwise specified.
- State:
state("value")
. Possible values the state field areAFFECTED
andUNAFFECTED
. If not set, all entities are returned. - Vulnerable function usage assessment:
assessment.vulnerableFunctionUsage("value")
Possible values areIN_USE
, andNOT_IN_USE
. - Vulnerable function restart required:
assessment.vulnerableFunctionRestartRequired("value")
Possible values areTRUE
orFALSE
. - Vulnerable function in use contains:
assessment.vulnerableFunctionInUseContains("value")
. Possible values areclass::function
,class::
andfunction
. TheCONTAINS
operator is used. Only vulnerable functions in use are considered. - Entity name contains:
entityNameContains("value-1")
. TheCONTAINS
operator is used.
To set several criteria, separate them with a comma (,
). Only results matching all criteria are included in the response.
Specify the value of a criterion as a quoted string. The following special characters must be escaped with a tilde (~
) inside quotes:
- Tilde
~
- Quote
"
Response
Response codes
Success. The response contains a list of remediation progress entities of a remediation item of a security problem. The number of entities returned is limited.
Response body objects
The RemediationProgressEntityList
object
A list of remediation progress entities.
The RemediationProgressEntity
object
An affected or unaffected entity of a remediation for a security problem.
The timestamp when the remediation progress entity has first been related to the vulnerability.
The ID of the remediation progress entity.
The name of the remediation progress entity.
The current state of the remediation progress entity.
AFFECTED
UNAFFECTED
A list of vulnerable components of the remediation item.
A vulnerable component is what causes the security problem.
The RemediationProgressEntityAssessment
object
Assessment of the remediation progress entity.
Whether a restart is required for the latest vulnerable function data.
The usage of vulnerable functions
IN_USE
NOT_AVAILABLE
NOT_IN_USE
A list of vulnerable functions that are not available.
The VulnerableFunction
object
Defines an vulnerable function.
The class name of the vulnerable function.
The file path of the vulnerable function.
The function name of the vulnerable function.
The RemediationProgressVulnerableComponent
object
A vulnerable component with details for a remediation progress entity (PGI).
The display name of the vulnerable component.
The file name of the vulnerable component.
The Dynatrace entity ID of the vulnerable component.
The load origins of the vulnerable components.
The short, component-only name of the vulnerable component.
Response body JSON model
{"remediationProgressEntities": [{"assessment": {"vulnerableFunctionRestartRequired": true,"vulnerableFunctionUsage": "IN_USE","vulnerableFunctionsInUse": [{"className": "string","filePath": "string","functionName": "string"}],"vulnerableFunctionsNotAvailable": [{}],"vulnerableFunctionsNotInUse": [{}]},"firstAffectedTimestamp": 1,"id": "string","name": "string","state": "AFFECTED","vulnerableComponents": [{"displayName": "string","fileName": "string","id": "string","loadOrigins": ["string"],"shortName": "string"}]}]}
Example
Examine the currently affected processes of a remediation item.
Required filter: remediationProgressEntitySelector=state("AFFECTED")
.
Curl
curl -X 'GET' 'https://mySampleEnv.live.dynatrace.com/api/v2/securityProblems/7412525767433554374/remediationItems/PROCESS_GROUP-F32C09AEDCB7A450/remediationProgressEntities?remediationProgressEntitySelector=state%28%22AFFECTED%22%29' \-H 'accept: application/json; charset=utf-8' \-H 'Authorization: Api-Token [your_token]'
Request URL
https://mySampleEnv.live.dynatrace.com/api/v2/securityProblems/7412525767433554374/remediationItems/PROCESS_GROUP-F32C09AEDCB7A450/remediationProgressEntities?remediationProgressEntitySelector=state%28%22AFFECTED%22%29
Response body
{"remediationProgressEntities": [{"id": "PROCESS_GROUP_INSTANCE-66B8C7F0FA77E541","name": "app.js (frontend) unguard-frontend-* (unguard-frontend-696558fd77-cdkxp)","firstAffectedTimestamp": 1725894871213,"state": "AFFECTED","vulnerableComponents": [{"id": "SOFTWARE_COMPONENT-30CF12729DF87E61","displayName": "minimatch:3.0.4","shortName": "minimatch"}],"assessment": {"vulnerableFunctionUsage": "NOT_AVAILABLE","vulnerableFunctionRestartRequired": false,"vulnerableFunctionsInUse": [],"vulnerableFunctionsNotInUse": [],"vulnerableFunctionsNotAvailable": []}}]}