Vulnerabilities API - GET remediation items
Lists the remediation tracking process groups of a third-party vulnerability (or, in the case of Kubernetes vulnerabilities, the remediation tracking Kubernetes nodes).
The request produces an application/json
payload.
GET | SaaS | https://{your-environment-id}.live.dynatrace.com/api/v2/securityProblems/{id}/remediationItems |
Environment ActiveGateCluster ActiveGate | https://{your-activegate-domain}:9999/e/{your-environment-id}/api/v2/securityProblems/{id}/remediationItems |
Authentication
To execute this request, you need an access token with securityProblems.read
scope.
To learn how to obtain and use it, see Tokens and authentication.
Parameters
The ID of the requested third-party security problem.
Defines the scope of the query. Only remediable entities matching the specified criteria are included in the response.
You can add one or more of the following criteria. Values are not case-sensitive and the EQUALS
operator is used unless otherwise specified.
- Vulnerability state:
vulnerabilityState("value")
. Find the possible values in the description of the vulnerabilityState field of the response. If not set, all entities are returned. - Muted:
muted("value")
. Possible values areTRUE
orFALSE
. - Reachable data asset assessment:
assessment.dataAssets("value")
Possible values areREACHABLE
, andNOT_DETECTED
. - Network exposure assessment:
assessment.exposure("value")
Possible values arePUBLIC_NETWORK
, andNOT_DETECTED
. - Vulnerable function usage assessment:
assessment.vulnerableFunctionUsage("value")
Possible values areIN_USE
, andNOT_IN_USE
. - Vulnerable function restart required:
assessment.vulnerableFunctionRestartRequired("value")
Possible values areTRUE
orFALSE
. - Vulnerable function in use contains:
assessment.vulnerableFunctionInUseContains("value")
. Possible values areclass::function
,class::
andfunction
. TheCONTAINS
operator is used. Only vulnerable functions in use are considered. - Assessment accuracy:
assessment.accuracy("value")
Possible values areFULL
andREDUCED
. - Entity name contains:
entityNameContains("value-1")
. TheCONTAINS
operator is used. - Tracking link display name:
trackingLink.displayNameContains("value")
. TheCONTAINS
operator is used.
To set several criteria, separate them with a comma (,
). Only results matching all criteria are included in the response.
Specify the value of a criterion as a quoted string. The following special characters must be escaped with a tilde (~
) inside quotes:
- Tilde
~
- Quote
"
Response
Response codes
Response body objects
The RemediationItemList
object
A list of remediation items.
The RemediationItem
object
A possible remediation for a security problem.
The progress of this remediation item. It contains affected and unaffected entities.
External tracking link URL associated with the remediable entity of the security problem.
RESOLVED
VULNERABLE
A list of vulnerable components of the remediation item.
A vulnerable component is what causes the security problem.
The RemediationAssessment
object
Assessment of the remediation item.
The accuracy of the assessment.
FULL
NOT_AVAILABLE
REDUCED
The reachability of related data assets by affected entities.
NOT_AVAILABLE
NOT_DETECTED
REACHABLE
The level of exposure of affected entities.
NOT_AVAILABLE
NOT_DETECTED
PUBLIC_NETWORK
The number of related data assets.
Whether a restart is required for the latest vulnerable function data.
The usage of vulnerable functions
IN_USE
NOT_AVAILABLE
NOT_IN_USE
A list of vulnerable functions that are not available.
The AssessmentAccuracyDetails
object
The assessment accuracy details.
The reason for a reduced accuracy of the assessment.
LIMITED_AGENT_SUPPORT
LIMITED_BY_CONFIGURATION
The VulnerableFunction
object
Defines an vulnerable function.
The class name of the vulnerable function.
The file path of the vulnerable function.
The function name of the vulnerable function.
The RemediationItemMuteState
object
The mute state of a remediation item of a security problem.
A short comment about the most recent mute state change.
The timestamp (UTC milliseconds) of the last update of the mute state.
The remediation is (true
) or is not (false
) muted.
The reason for the most recent mute state change.
AFFECTED
CONFIGURATION_NOT_AFFECTED
FALSE_POSITIVE
IGNORE
INITIAL_STATE
OTHER
VULNERABLE_CODE_NOT_IN_USE
The user who last changed the mute state.
The RemediationProgress
object
The progress of this remediation item. It contains affected and unaffected entities.
A list of related entities that are affected by the security problem.
A list of related entities that are affected by the security problem.
The TrackingLink
object
External tracking link URL associated with the remediable entity of the security problem.
Display name (title) set for the tracking link, e.g. 'ISSUE-123'.
The timestamp (UTC milliseconds) of the last update of the tracking link.
URL set for the tracking link, e.g. https://example.com/ISSUE-123
The user who last changed the tracking link.
The VulnerableComponent
object
Vulnerable component of a security problem.
A list of affected entities.
The display name of the vulnerable component.
The file name of the vulnerable component.
The Dynatrace entity ID of the vulnerable component.
The number of affected entities.
The short, component-only name of the vulnerable component.
Response body JSON model
{"remediationItems": [{"assessment": {"assessmentAccuracy": "FULL","assessmentAccuracyDetails": {"reducedReasons": ["LIMITED_AGENT_SUPPORT"]},"dataAssets": "NOT_AVAILABLE","exposure": "NOT_AVAILABLE","numberOfDataAssets": 1,"vulnerableFunctionRestartRequired": true,"vulnerableFunctionUsage": "IN_USE","vulnerableFunctionsInUse": [{"className": "string","filePath": "string","functionName": "string"}],"vulnerableFunctionsNotAvailable": [{}],"vulnerableFunctionsNotInUse": [{}]},"entityIds": ["string"],"firstAffectedTimestamp": 1,"id": "string","muteState": {"comment": "string","lastUpdatedTimestamp": 1,"muted": true,"reason": "AFFECTED","user": "string"},"name": "string","remediationProgress": {"affectedEntities": ["string"],"unaffectedEntities": ["string"]},"resolvedTimestamp": 1,"trackingLink": {"displayName": "string","lastUpdatedTimestamp": 1,"url": "string","user": "string"},"vulnerabilityState": "RESOLVED","vulnerableComponents": [{"affectedEntities": ["string"],"displayName": "string","fileName": "string","id": "string","numberOfAffectedEntities": 1,"shortName": "string"}]}]}
Example
List the remediation items of the 8788643471842202915
vulnerability. The response is truncated to two entries.
Curl
curl --request GET \--url https://mySampleEnv.live.dynatrace.com/api/v2/securityProblems/8788643471842202915/remediationItems \--header 'Authorization: Api-Token [your_token]'
Request URL
https://mySampleEnv.live.dynatrace.com/api/v2/securityProblems/8788643471842202915/remediationItems
Response body
{"remediationItems": [{"id": "PROCESS_GROUP-70DF2C1374244F5A","entityIds": ["PROCESS_GROUP-70DF2C1374244F5A"],"name": "KpiTomcatBackEnd-CWS-1-IG-144-HG","firstAffectedTimestamp": 1633531037359,"assessment": {"exposure": "NOT_DETECTED","dataAssets": "REACHABLE"},"vulnerabilityState": "VULNERABLE","muteState": {"muted": false,"user": "unknown","reason": "INITIAL_STATE"},"vulnerableComponents": [{"id": "SOFTWARE_COMPONENT-2559CD116033C217","displayName": "io.software.component.1.1","fileName": "io.software.component.1.1.jar","numberOfAffectedEntities": 2,"affectedEntities": ["PROCESS_GROUP_INSTANCE-3684888745E180D5","PROCESS_GROUP_INSTANCE-8F100796B9296962"]},{"id": "SOFTWARE_COMPONENT-0A679AA673B2B525","displayName": "io.software.component.loader.2.0.Final","fileName": "io.software.component.loader.2.0.jar","numberOfAffectedEntities": 4,"affectedEntities": ["PROCESS_GROUP_INSTANCE-0D133F13A28B477A","PROCESS_GROUP_INSTANCE-258962DC804FEDBC","PROCESS_GROUP_INSTANCE-3684888745E180D5","PROCESS_GROUP_INSTANCE-B79C2594071FBF6C"]}],"remediationProgress": {"affectedEntities": ["PROCESS_GROUP_INSTANCE-0D133F13A28B477A","PROCESS_GROUP_INSTANCE-258962DC804FEDBC","PROCESS_GROUP_INSTANCE-3684888745E180D5","PROCESS_GROUP_INSTANCE-8F100796B9296962","PROCESS_GROUP_INSTANCE-B79C2594071FBF6C"],"unaffectedEntities": ["PROCESS_GROUP_INSTANCE-63AD33941D667CAC","PROCESS_GROUP_INSTANCE-E20A5DDF167AF3B8","PROCESS_GROUP_INSTANCE-F1166B3AB1F4312D","PROCESS_GROUP_INSTANCE-F9D0250A7432521D","PROCESS_GROUP_INSTANCE-FF1B355E4E252FA1"]}},{"id": "PROCESS_GROUP-18407614632D87A6","entityIds": ["PROCESS_GROUP-18407614632D87A6"],"name": "KpiTomcatFrontEnd-CWS-1-IG-67-HG","firstAffectedTimestamp": 1633531037359,"assessment": {"exposure": "PUBLIC_NETWORK","dataAssets": "NOT_DETECTED"},"resolvedTimestamp": 1636096094323,"vulnerabilityState": "RESOLVED","muteState": {"muted": false,"user": "unknown","reason": "INITIAL_STATE"},"vulnerableComponents": [{"id": "SOFTWARE_COMPONENT-2559CD116033C217","displayName": "io.software.component.1.1.Final","fileName": "io.software.component.1.1.jar","numberOfAffectedEntities": 1,"affectedEntities": ["PROCESS_GROUP_INSTANCE-41115D4B6F8BFEEC"]}],"remediationProgress": {"affectedEntities": ["PROCESS_GROUP_INSTANCE-41115D4B6F8BFEEC"],"unaffectedEntities": ["PROCESS_GROUP_INSTANCE-0189CF4780B4B872","PROCESS_GROUP_INSTANCE-2D54D85C45C0BA57","PROCESS_GROUP_INSTANCE-3E6373ACEA9DE722","PROCESS_GROUP_INSTANCE-47BCF72F93FF9528","PROCESS_GROUP_INSTANCE-6B5EF5C1A5ED42D0","PROCESS_GROUP_INSTANCE-BA18DB16A7A28A04","PROCESS_GROUP_INSTANCE-BCAECCB29AB12462","PROCESS_GROUP_INSTANCE-DD3CD2024A06BB5B","PROCESS_GROUP_INSTANCE-DE5B280889AC6569"]}}]}
Response code
200