Vulnerabilities API - GET vulnerability details
Lists the details of a specific vulnerability.
The request produces an application/json
payload.
GET | SaaS | https://{your-environment-id}.live.dynatrace.com/api/v2/securityProblems/{id} |
Environment ActiveGateCluster ActiveGate | https://{your-activegate-domain}:9999/e/{your-environment-id}/api/v2/securityProblems/{id} |
Authentication
To execute this request, you need an access token with securityProblems.read
scope.
To learn how to obtain and use it, see Tokens and authentication.
Parameters
The ID of the requested security problem.
A list of additional security problem properties you can add to the response.
The following properties are available (all other properties are always included and you can't remove them from the response):
riskAssessment
: A risk assessment of the security problem.managementZones
: The management zone where the security problem occurred.codeLevelVulnerabilityDetails
: Details of the code-level vulnerability.globalCounts
: Globally calculated statistics about the security problem. No management zone information is taken into account.filteredCounts
: Statistics about the security problem, filtered by the management zone and timeframe start ('from') query parameters.description
: The description of the vulnerability.remediationDescription
: Description of how to remediate the vulnerability.events
: The security problem's last 10 events within the last 365 days, sorted from newest to oldest.vulnerableComponents
: A list of vulnerable components of the security problem within the provided filter range.affectedEntities
: A list of affected entities of the security problem within the provided filter range.exposedEntities
: A list of exposed entities of the security problem within the provided filter range.reachableDataAssets
: A list of data assets reachable by affected entities of the security problem within the provided filter range.relatedEntities
: A list of related entities of the security problem within the provided filter range.relatedContainerImages
: A list of related container images of the security problem within the provided filter range.relatedAttacks
: A list of attacks detected on the exposed security problem.entryPoints
: A list of entry points and a flag which indicates whether this list was truncated or not.
To add properties, specify them in a comma-separated list and prefix each property with a plus (for example, +riskAssessment,+managementZones
).
To specify management zones, use one of the options listed below. For each option you can specify multiple comma-separated values. If several values are specified, the OR logic applies. All values are case-sensitive and must be quoted.
- Management zone ID: ids("mzId-1", "mzId-2").
- Management zone names: names("mz-1", "mz-2").
You can specify several comma-separated criteria (for example, names("myMz"),ids("9130632296508575249")
).
Based on the timeframe start the affected-, related- and vulnerable entities are being calculated. You can use one of the following formats:
- Timestamp in UTC milliseconds.
- Human-readable format of
2021-01-25T05:57:01.123+01:00
. If no time zone is specified, UTC is used. You can use a space character instead of theT
. Seconds and fractions of a second are optional. - Relative timeframe, back from now. The format is
now-NU/A
, whereN
is the amount of time,U
is the unit of time, andA
is an alignment. The alignment rounds all the smaller values to the nearest zero in the past. For example,now-1y/w
is one year back, aligned by a week. You can also specify relative timeframe without an alignment:now-NU
. Supported time units for the relative timeframe are:m
: minutesh
: hoursd
: daysw
: weeksM
: monthsy
: years
If not set, the default timeframe start of 24 hours in the past is used (now-24h
).
The timeframe start must not be older than 365 days.
Response
Response codes
Response body objects
The SecurityProblemDetails
object
Parameters of a security problem
A list of affected entities of the security problem.
An affected entity is an entity where a vulnerable component runs.
The details of a code-level vulnerability.
A list of CVE IDs of the security problem.
The description of the security problem.
The display ID of the security problem.
A list of entry points and a flag which indicates whether this list was truncated or not.
A list of exposed entities of the security problem.
An exposed entity is an affected entity that is exposed to the internet.
The external vulnerability ID of the security problem.
Statistics about the security problem, filtered by the management zone and timeframe start ('from') query parameters.
The timestamp of the first occurrence of the security problem.
Globally calculated statistics about the security problem. No management zone information is taken into account.
The timestamp when the security problem was last opened.
The timestamp when the security problem was last resolved.
The timestamp of the most recent security problem change.
If true
a change of the mute state is in progress.
The security problem is (true
) or is not (false
) muted.
The package name of the security problem.
A list of data assets reachable by affected entities of the security problem.
A data asset is a service that has database access.
A list of related attacks of the security problem.
Related attacks are attacks on the exposed security problem.
A list of related entities of the security problem.
A related entity is a monitored entity that is directly or indirectly related to an affected entity (for example, it could be a host where an affected process runs).
Each related entity contains a list of corresponding affected entities (for example, an affected process running on this host).
Description of how to remediate the vulnerability.
The ID of the security problem.
The status of the security problem.
OPEN
RESOLVED
The technology of the security problem.
DOTNET
GO
JAVA
KUBERNETES
NODE_JS
PHP
PYTHON
The title of the security problem.
The URL to the security problem details page.
The type of the vulnerability.
CODE_LEVEL
RUNTIME
THIRD_PARTY
A list of vulnerable components of the security problem.
A vulnerable component is what causes the security problem.
The CodeLevelVulnerabilityDetails
object
The details of a code-level vulnerability.
The list of encoded MEIdentifier of the process groups.
The list of affected process groups.
The code location of the vulnerability without package and parameter.
The type of code level vulnerability.
CMD_INJECTION
IMPROPER_INPUT_VALIDATION
SQL_INJECTION
SSRF
The code location of the vulnerability.
The vulnerable function of the vulnerability.
Describes what got passed into the code level vulnerability.
The VulnerableFunctionInput
object
Describes what got passed into the code level vulnerability.
The type of the input.
COMMAND
HTTP_CLIENT
JNDI
SQL_STATEMENT
The VulnerableFunctionInputSegment
object
Describes one segment that was passed into a vulnerable function.
The type of the input segment.
MALICIOUS_INPUT
REGULAR_INPUT
TAINTED_INPUT
The value of the input segment.
The EntryPoints
object
A list of entry points and a flag which indicates whether this list was truncated or not.
Indicates whether the list of entry points was truncated or not.
The EntryPoint
object
Information about an entry point of a code-level vulnerability.
Source HTTP path of entry points.
The EntryPointUsageSegment
object
Describes one segment that was passed into a usage and the associated source name and type.
The type of this input segment.
MALICIOUS_INPUT
REGULAR_INPUT
TAINTED_INPUT
The value of this input segment.
The name used in the source for this segment.
The type of the HTTP request part that contains the value that was used in this segment.
HTTP_BODY
HTTP_COOKIE
HTTP_HEADER_NAME
HTTP_HEADER_VALUE
HTTP_OTHER
HTTP_PARAMETER_NAME
HTTP_PARAMETER_VALUE
HTTP_URL
UNKNOWN
The SecurityProblemEvent
object
The event of a security problem.
The reason of the event creation.
ASSESSMENT_CHANGED
SECURITY_PROBLEM_CREATED
SECURITY_PROBLEM_MUTED
SECURITY_PROBLEM_REOPENED
SECURITY_PROBLEM_RESOLVED
SECURITY_PROBLEM_UNMUTED
A snapshot of the risk assessment of a security problem.
The timestamp when the event occurred.
The MuteState
object
Metadata of the muted state of a security problem in relation to an event.
A user's comment.
The reason for the mute state change.
AFFECTED
CONFIGURATION_NOT_AFFECTED
FALSE_POSITIVE
IGNORE
INITIAL_STATE
OTHER
VULNERABLE_CODE_NOT_IN_USE
The user who has muted or unmuted the problem.
The RiskAssessmentSnapshot
object
A snapshot of the risk assessment of a security problem.
The risk score (1-10) from the CVSS score.
The level of exposure of affected entities.
NOT_AVAILABLE
NOT_DETECTED
PUBLIC_NETWORK
The number of currently affected entities.
The number of currently affected nodes.
The number of currently affected process groups.
The number of data assets that are currently reachable by affected entities.
The number of related attacks.
The availability status of public exploits.
AVAILABLE
NOT_AVAILABLE
The Davis risk level.
It is calculated by Dynatrace on the basis of CVSS score.
CRITICAL
HIGH
LOW
MEDIUM
NONE
The Davis risk score (1-10).
It is calculated by Dynatrace on the basis of CVSS score.
The state of vulnerable code execution.
IN_USE
NOT_AVAILABLE
NOT_IN_USE
The RiskAssessmentChanges
object
All changes of the risk assessment.
The delta of the risk score.
The delta of the number of currently affected nodes.
The delta of the number of currently affected process groups.
The delta of the number of data assets that are currently reachable by affected entities.
The delta of the number of related attacks.
The delta of the Davis risk score.
The previous level of exposure of affected entities.
NOT_AVAILABLE
NOT_DETECTED
PUBLIC_NETWORK
The previous availability status of public exploits.
AVAILABLE
NOT_AVAILABLE
The previous state of vulnerable code execution.
IN_USE
NOT_AVAILABLE
NOT_IN_USE
The FilteredCountsDto
object
Statistics about the security problem, filtered by the management zone and timeframe start ('from') query parameters.
Number of affected nodes
Number of affected processes
Number of affected process groups
Number of exposed process groups
Number of reachable data assets
Number of related applications
Number of related attacks
Number of related databases
Number of related hosts
Number of related Kubernetes clusters
Number of related Kubernetes workloads
Number of related services
Number of vulnerable components
The GlobalCountsDto
object
Globally calculated statistics about the security problem. No management zone information is taken into account.
Number of affected nodes
Number of affected process group instances
Number of affected process groups
Number of exposed process groups
Number of reachable data assets exposed
Number of related applications
Number of attacks on the exposed security problem
Number of related hosts
Number of related kubernetes cluster
Number of related kubernetes workloads
Number of related services
Number of vulnerable components
The ManagementZone
object
A short representation of a management zone.
The ID of the management zone.
The name of the management zone.
The RelatedAttacksList
object
A list of related attacks of the security problem.
Related attacks are attacks on the exposed security problem.
A list of related attack ids.
The RelatedContainerList
object
A list of related container images.
The RelatedContainerImage
object
Related container image of a security problem.
A list of affected entities.
The image ID of the related container image.
The image name of the related container image.
The number of affected entities.
The RelatedEntitiesList
object
A list of related entities of the security problem.
A related entity is a monitored entity that is directly or indirectly related to an affected entity (for example, it could be a host where an affected process runs).
Each related entity contains a list of corresponding affected entities (for example, an affected process running on this host).
A list of related databases.
The RelatedEntity
object
An entity related to a security problem.
A list of affected entities related to the entity.
The Dynatrace entity ID of the entity.
The number of affected entities related to the entity.
The RelatedService
object
A service related to a security problem.
A list of affected entities related to the entity.
The level of exposure of the service.
NOT_AVAILABLE
NOT_DETECTED
PUBLIC_NETWORK
The Dynatrace entity ID of the entity.
The number of affected entities related to the entity.
The RiskAssessmentDetails
object
Risk assessment of a security problem.
The accuracy of the assessment.
FULL
NOT_AVAILABLE
REDUCED
The risk level from the CVSS score.
CRITICAL
HIGH
LOW
MEDIUM
NONE
The risk score (1-10) from the CVSS score.
The original attack vector of the CVSS assessment.
The reachability of related data assets by affected entities.
NOT_AVAILABLE
NOT_DETECTED
REACHABLE
The level of exposure of affected entities.
NOT_AVAILABLE
NOT_DETECTED
PUBLIC_NETWORK
The availability status of public exploits.
AVAILABLE
NOT_AVAILABLE
The Davis risk level.
It is calculated by Dynatrace on the basis of CVSS score.
CRITICAL
HIGH
LOW
MEDIUM
NONE
The Davis risk score (1-10).
It is calculated by Dynatrace on the basis of CVSS score.
The attack vector calculated by Dynatrace based on the CVSS attack vector.
Whether a restart is required for new vulnerable function data.
The state of vulnerable code execution.
IN_USE
NOT_AVAILABLE
NOT_IN_USE
The AssessmentAccuracyDetails
object
The assessment accuracy details.
The reason for a reduced accuracy of the assessment.
LIMITED_AGENT_SUPPORT
LIMITED_BY_CONFIGURATION
The VulnerableComponent
object
Vulnerable component of a security problem.
A list of affected entities.
The display name of the vulnerable component.
The file name of the vulnerable component.
The Dynatrace entity ID of the vulnerable component.
The number of affected entities.
The short, component-only name of the vulnerable component.
Response body JSON model
{"affectedEntities": ["string"],"codeLevelVulnerabilityDetails": {"processGroupIds": ["string"],"processGroups": ["string"],"shortVulnerabilityLocation": "string","type": "CMD_INJECTION","vulnerabilityLocation": "string","vulnerableFunction": "string","vulnerableFunctionInput": {"inputSegments": [{"type": "MALICIOUS_INPUT","value": "string"}],"type": "COMMAND"}},"cveIds": ["string"],"description": "string","displayId": "string","entryPoints": {"items": [{"sourceHttpPath": "string","usageSegments": [{"segmentType": "MALICIOUS_INPUT","segmentValue": "string","sourceArgumentName": "string","sourceType": "HTTP_BODY"}]}],"truncated": true},"events": [{"muteState": {"comment": "string","reason": "AFFECTED","user": "string"},"reason": "ASSESSMENT_CHANGED","riskAssessmentSnapshot": {"baseRiskScore": 1,"changes": {"deltaBaseRiskScore": 1,"deltaNumberOfAffectedNodes": 1,"deltaNumberOfAffectedProcessGroups": 1,"deltaNumberOfReachableDataAssets": 1,"deltaNumberOfRelatedAttacks": 1,"deltaRiskScore": 1,"previousExposure": "NOT_AVAILABLE","previousPublicExploit": "AVAILABLE","previousVulnerableFunctionUsage": "IN_USE"},"exposure": "NOT_AVAILABLE","numberOfAffectedEntities": 1,"numberOfAffectedNodes": 1,"numberOfAffectedProcessGroups": 1,"numberOfReachableDataAssets": 1,"numberOfRelatedAttacks": 1,"publicExploit": "AVAILABLE","riskLevel": "CRITICAL","riskScore": 1,"vulnerableFunctionUsage": "IN_USE"},"timestamp": 1}],"exposedEntities": ["string"],"externalVulnerabilityId": "string","filteredCounts": {"affectedNodes": 1,"affectedProcessGroupInstances": 1,"affectedProcessGroups": 1,"exposedProcessGroups": 1,"reachableDataAssets": 1,"relatedApplications": 1,"relatedAttacks": 1,"relatedDatabases": 1,"relatedHosts": 1,"relatedKubernetesClusters": 1,"relatedKubernetesWorkloads": 1,"relatedServices": 1,"vulnerableComponents": 1},"firstSeenTimestamp": 1,"globalCounts": {"affectedNodes": 1,"affectedProcessGroupInstances": 1,"affectedProcessGroups": 1,"exposedProcessGroups": 1,"reachableDataAssets": 1,"relatedApplications": 1,"relatedAttacks": 1,"relatedHosts": 1,"relatedKubernetesClusters": 1,"relatedKubernetesWorkloads": 1,"relatedServices": 1,"vulnerableComponents": 1},"lastOpenedTimestamp": 1,"lastResolvedTimestamp": 1,"lastUpdatedTimestamp": 1,"managementZones": [{"id": "string","name": "string"}],"muteStateChangeInProgress": true,"muted": true,"packageName": "string","reachableDataAssets": ["string"],"relatedAttacks": {"attacks": ["string"]},"relatedContainerImages": {"containerImages": [{"affectedEntities": ["string"],"imageId": "string","imageName": "string","numberOfAffectedEntities": 1}]},"relatedEntities": {"applications": [{"affectedEntities": ["string"],"id": "string","numberOfAffectedEntities": 1}],"databases": ["string"],"hosts": [{}],"kubernetesClusters": [{}],"kubernetesWorkloads": [{}],"services": [{"affectedEntities": ["string"],"exposure": "NOT_AVAILABLE","id": "string","numberOfAffectedEntities": 1}]},"remediationDescription": "string","riskAssessment": {"assessmentAccuracy": "FULL","assessmentAccuracyDetails": {"reducedReasons": ["LIMITED_AGENT_SUPPORT"]},"baseRiskLevel": "CRITICAL","baseRiskScore": 1,"baseRiskVector": "string","dataAssets": "NOT_AVAILABLE","exposure": "NOT_AVAILABLE","publicExploit": "AVAILABLE","riskLevel": "CRITICAL","riskScore": 1,"riskVector": "string","vulnerableFunctionRestartRequired": true,"vulnerableFunctionUsage": "IN_USE"},"securityProblemId": "string","status": "OPEN","technology": "DOTNET","title": "string","url": "string","vulnerabilityType": "CODE_LEVEL","vulnerableComponents": [{"affectedEntities": ["string"],"displayName": "string","fileName": "string","id": "string","numberOfAffectedEntities": 1,"shortName": "string"}]}
Example
Query the details and risk assessment of a specific vulnerability.
Required filter: fields=%2BriskAssessment
.
Curl
curl -X 'GET' 'https://mySampleEnv.live.dynatrace.com/api/v2/securityProblems/7412525767433554374?fields=%2BriskAssessment' \-H 'accept: application/json; charset=utf-8' \-H 'Authorization: Api-Token [your_token]'
Request URL
https://mySampleEnv.live.dynatracelabs.com/api/v2/securityProblems/7412525767433554374?fields=%2BriskAssessment
Response body
{"securityProblemId": "7412525767433554374","displayId": "S-4073","status": "OPEN","muted": false,"externalVulnerabilityId": "SNYK-JS-MINIMATCH-3050818","vulnerabilityType": "THIRD_PARTY","title": "Regular Expression Denial of Service (ReDoS)","packageName": "minimatch","url": "https://demo.dev.dynatracelabs.com/ui/security/problem/7412525767433554374","technology": "NODE_JS","firstSeenTimestamp": 1666080124915,"lastUpdatedTimestamp": 1727156677302,"lastOpenedTimestamp": 1726497786003,"riskAssessment": {"riskLevel": "MEDIUM","riskScore": 5.3,"riskVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/MC:N/MI:N","baseRiskLevel": "MEDIUM","baseRiskScore": 5.3,"baseRiskVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","exposure": "PUBLIC_NETWORK","dataAssets": "REACHABLE","publicExploit": "NOT_AVAILABLE","vulnerableFunctionUsage": "NOT_AVAILABLE","assessmentAccuracy": "FULL","assessmentAccuracyDetails": {"reducedReasons": []},"vulnerableFunctionRestartRequired": false},"cveIds": ["CVE-2022-3517"],"muteStateChangeInProgress": false}