mirror of
https://gitlab.com/gitlab-org/gitlab-foss.git
synced 2025-08-03 16:04:30 +00:00
461 lines
11 KiB
Markdown
461 lines
11 KiB
Markdown
---
|
|
stage: Security Risk Management
|
|
group: Security Insights
|
|
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments
|
|
title: Vulnerabilities API
|
|
---
|
|
|
|
{{< details >}}
|
|
|
|
- Tier: Ultimate
|
|
- Offering: GitLab.com, GitLab Self-Managed, GitLab Dedicated
|
|
|
|
{{< /details >}}
|
|
|
|
{{< history >}}
|
|
|
|
- `last_edited_at` [deprecated](https://gitlab.com/gitlab-org/gitlab/-/issues/268154) in GitLab 16.7.
|
|
- `start_date` [deprecated](https://gitlab.com/gitlab-org/gitlab/-/issues/268154) in GitLab 16.7.
|
|
- `updated_by_id` [deprecated](https://gitlab.com/gitlab-org/gitlab/-/issues/268154) in GitLab 16.7.
|
|
- `last_edited_by_id` [deprecated](https://gitlab.com/gitlab-org/gitlab/-/issues/268154) in GitLab 16.7.
|
|
- `due_date` [deprecated](https://gitlab.com/gitlab-org/gitlab/-/issues/268154) in GitLab 16.7.
|
|
|
|
{{< /history >}}
|
|
|
|
{{< alert type="note" >}}
|
|
|
|
The former Vulnerabilities API was renamed to Vulnerability Findings API
|
|
and its documentation was moved to [a different location](vulnerability_findings.md).
|
|
This document now describes the new Vulnerabilities API that provides access to
|
|
[Vulnerabilities](https://gitlab.com/groups/gitlab-org/-/epics/634).
|
|
|
|
{{< /alert >}}
|
|
|
|
{{< alert type="warning" >}}
|
|
|
|
This API is in the process of being deprecated and considered unstable.
|
|
The response payload may be subject to change or breakage
|
|
across GitLab releases. Use the
|
|
[GraphQL API](graphql/reference/_index.md#queryvulnerabilities) instead. For more information, see [GraphQL examples](#replace-vulnerability-rest-api-with-graphql).
|
|
|
|
{{< /alert >}}
|
|
|
|
Every API call to vulnerabilities must be [authenticated](rest/authentication.md).
|
|
|
|
If an authenticated user does not have permission to
|
|
[view vulnerability report](../user/permissions.md#application-security),
|
|
this request returns a `403 Forbidden` status code.
|
|
|
|
## Single vulnerability
|
|
|
|
Gets a single vulnerability
|
|
|
|
```plaintext
|
|
GET /vulnerabilities/:id
|
|
```
|
|
|
|
| Attribute | Type | Required | Description |
|
|
| --------- | ---- | -------- | ----------- |
|
|
| `id` | integer or string | yes | The ID of a Vulnerability to get |
|
|
|
|
```shell
|
|
curl --request GET \
|
|
--header "PRIVATE-TOKEN: <your_access_token>" \
|
|
--url "https://gitlab.example.com/api/v4/vulnerabilities/1"
|
|
```
|
|
|
|
Example response:
|
|
|
|
```json
|
|
{
|
|
"id": 1,
|
|
"title": "Predictable pseudorandom number generator",
|
|
"description": null,
|
|
"state": "opened",
|
|
"severity": "medium",
|
|
"confidence": "medium",
|
|
"report_type": "sast",
|
|
"project": {
|
|
"id": 32,
|
|
"name": "security-reports",
|
|
"full_path": "/gitlab-examples/security/security-reports",
|
|
"full_name": "gitlab-examples / security / security-reports"
|
|
},
|
|
"author_id": 1,
|
|
"closed_by_id": null,
|
|
"created_at": "2019-10-13T15:08:40.219Z",
|
|
"updated_at": "2019-10-13T15:09:40.382Z",
|
|
"closed_at": null
|
|
}
|
|
```
|
|
|
|
## Confirm vulnerability
|
|
|
|
Confirms a given vulnerability. Returns status code `304` if the vulnerability is already confirmed.
|
|
|
|
If an authenticated user does not have permission to
|
|
[change vulnerability status](../user/permissions.md#application-security),
|
|
this request results in a `403` status code.
|
|
|
|
```plaintext
|
|
POST /vulnerabilities/:id/confirm
|
|
```
|
|
|
|
| Attribute | Type | Required | Description |
|
|
| --------- | ---- | -------- | ----------- |
|
|
| `id` | integer or string | yes | The ID of a vulnerability to confirm |
|
|
|
|
```shell
|
|
curl --request POST \
|
|
--header "PRIVATE-TOKEN: <your_access_token>" \
|
|
--url "https://gitlab.example.com/api/v4/vulnerabilities/5/confirm"
|
|
```
|
|
|
|
Example response:
|
|
|
|
```json
|
|
{
|
|
"id": 2,
|
|
"title": "Predictable pseudorandom number generator",
|
|
"description": null,
|
|
"state": "confirmed",
|
|
"severity": "medium",
|
|
"confidence": "medium",
|
|
"report_type": "sast",
|
|
"project": {
|
|
"id": 32,
|
|
"name": "security-reports",
|
|
"full_path": "/gitlab-examples/security/security-reports",
|
|
"full_name": "gitlab-examples / security / security-reports"
|
|
},
|
|
"author_id": 1,
|
|
"closed_by_id": null,
|
|
"created_at": "2019-10-13T15:08:40.219Z",
|
|
"updated_at": "2019-10-13T15:09:40.382Z",
|
|
"closed_at": null
|
|
}
|
|
```
|
|
|
|
## Resolve vulnerability
|
|
|
|
Resolves a given vulnerability. Returns status code `304` if the vulnerability is already resolved.
|
|
|
|
If an authenticated user does not have permission to
|
|
[change vulnerability status](../user/permissions.md#application-security),
|
|
this request results in a `403` status code.
|
|
|
|
```plaintext
|
|
POST /vulnerabilities/:id/resolve
|
|
```
|
|
|
|
| Attribute | Type | Required | Description |
|
|
| --------- | ---- | -------- | ----------- |
|
|
| `id` | integer or string | yes | The ID of a Vulnerability to resolve |
|
|
|
|
```shell
|
|
curl --request POST \
|
|
--header "PRIVATE-TOKEN: <your_access_token>" \
|
|
--url "https://gitlab.example.com/api/v4/vulnerabilities/5/resolve"
|
|
```
|
|
|
|
Example response:
|
|
|
|
```json
|
|
{
|
|
"id": 2,
|
|
"title": "Predictable pseudorandom number generator",
|
|
"description": null,
|
|
"state": "resolved",
|
|
"severity": "medium",
|
|
"confidence": "medium",
|
|
"report_type": "sast",
|
|
"project": {
|
|
"id": 32,
|
|
"name": "security-reports",
|
|
"full_path": "/gitlab-examples/security/security-reports",
|
|
"full_name": "gitlab-examples / security / security-reports"
|
|
},
|
|
"author_id": 1,
|
|
"closed_by_id": null,
|
|
"created_at": "2019-10-13T15:08:40.219Z",
|
|
"updated_at": "2019-10-13T15:09:40.382Z",
|
|
"closed_at": null
|
|
}
|
|
```
|
|
|
|
## Dismiss vulnerability
|
|
|
|
Dismisses a given vulnerability. Returns status code `304` if the vulnerability is already dismissed.
|
|
|
|
If an authenticated user does not have permission to
|
|
[change vulnerability status](../user/permissions.md#application-security),
|
|
this request results in a `403` status code.
|
|
|
|
```plaintext
|
|
POST /vulnerabilities/:id/dismiss
|
|
```
|
|
|
|
| Attribute | Type | Required | Description |
|
|
| --------- | ---- | -------- | ----------- |
|
|
| `id` | integer or string | yes | The ID of a vulnerability to dismiss |
|
|
|
|
```shell
|
|
curl --request POST \
|
|
--header "PRIVATE-TOKEN: <your_access_token>" \
|
|
--url "https://gitlab.example.com/api/v4/vulnerabilities/5/dismiss"
|
|
```
|
|
|
|
Example response:
|
|
|
|
```json
|
|
{
|
|
"id": 2,
|
|
"title": "Predictable pseudorandom number generator",
|
|
"description": null,
|
|
"state": "closed",
|
|
"severity": "medium",
|
|
"confidence": "medium",
|
|
"report_type": "sast",
|
|
"project": {
|
|
"id": 32,
|
|
"name": "security-reports",
|
|
"full_path": "/gitlab-examples/security/security-reports",
|
|
"full_name": "gitlab-examples / security / security-reports"
|
|
},
|
|
"author_id": 1,
|
|
"closed_by_id": null,
|
|
"created_at": "2019-10-13T15:08:40.219Z",
|
|
"updated_at": "2019-10-13T15:09:40.382Z",
|
|
"closed_at": null
|
|
}
|
|
```
|
|
|
|
## Revert vulnerability to detected state
|
|
|
|
Reverts a given vulnerability to detected state. Returns status code `304` if the vulnerability is already in detected state.
|
|
|
|
If an authenticated user does not have permission to
|
|
[change vulnerability status](../user/permissions.md#application-security),
|
|
this request results in a `403` status code.
|
|
|
|
```plaintext
|
|
POST /vulnerabilities/:id/revert
|
|
```
|
|
|
|
| Attribute | Type | Required | Description |
|
|
| --------- | ---- | -------- | ----------- |
|
|
| `id` | integer or string | yes | The ID of a vulnerability to revert to detected state |
|
|
|
|
```shell
|
|
curl --request POST \
|
|
--header "PRIVATE-TOKEN: <your_access_token>" \
|
|
--url "https://gitlab.example.com/api/v4/vulnerabilities/5/revert"
|
|
```
|
|
|
|
Example response:
|
|
|
|
```json
|
|
{
|
|
"id": 2,
|
|
"title": "Predictable pseudorandom number generator",
|
|
"description": null,
|
|
"state": "detected",
|
|
"severity": "medium",
|
|
"confidence": "medium",
|
|
"report_type": "sast",
|
|
"project": {
|
|
"id": 32,
|
|
"name": "security-reports",
|
|
"full_path": "/gitlab-examples/security/security-reports",
|
|
"full_name": "gitlab-examples / security / security-reports"
|
|
},
|
|
"author_id": 1,
|
|
"closed_by_id": null,
|
|
"created_at": "2019-10-13T15:08:40.219Z",
|
|
"updated_at": "2019-10-13T15:09:40.382Z",
|
|
"closed_at": null
|
|
}
|
|
```
|
|
|
|
## Replace Vulnerability REST API with GraphQL
|
|
|
|
To prepare for the [upcoming deprecation](https://gitlab.com/groups/gitlab-org/-/epics/5118) of
|
|
the Vulnerability REST API endpoint, use the examples below to perform the equivalent operations
|
|
with the GraphQL API.
|
|
|
|
### GraphQL - Single vulnerability
|
|
|
|
Use [`Query.vulnerability`](graphql/reference/_index.md#queryvulnerability).
|
|
|
|
```graphql
|
|
{
|
|
vulnerability(id: "gid://gitlab/Vulnerability/20345379") {
|
|
title
|
|
description
|
|
state
|
|
severity
|
|
reportType
|
|
project {
|
|
id
|
|
name
|
|
fullPath
|
|
}
|
|
detectedAt
|
|
confirmedAt
|
|
resolvedAt
|
|
resolvedBy {
|
|
id
|
|
username
|
|
}
|
|
}
|
|
}
|
|
```
|
|
|
|
Example response:
|
|
|
|
```json
|
|
{
|
|
"data": {
|
|
"vulnerability": {
|
|
"title": "Improper Input Validation in railties",
|
|
"description": "A remote code execution vulnerability in development mode Rails beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.",
|
|
"state": "RESOLVED",
|
|
"severity": "CRITICAL",
|
|
"reportType": "DEPENDENCY_SCANNING",
|
|
"project": {
|
|
"id": "gid://gitlab/Project/6102100",
|
|
"name": "security-reports",
|
|
"fullPath": "gitlab-examples/security/security-reports"
|
|
},
|
|
"detectedAt": "2021-10-14T03:13:41Z",
|
|
"confirmedAt": "2021-12-14T01:45:56Z",
|
|
"resolvedAt": "2021-12-14T01:45:59Z",
|
|
"resolvedBy": {
|
|
"id": "gid://gitlab/User/480804",
|
|
"username": "thiagocsf"
|
|
}
|
|
}
|
|
}
|
|
}
|
|
```
|
|
|
|
### GraphQL - Confirm vulnerability
|
|
|
|
Use [`Mutation.vulnerabilityConfirm`](graphql/reference/_index.md#mutationvulnerabilityconfirm).
|
|
|
|
```graphql
|
|
mutation {
|
|
vulnerabilityConfirm(input: { id: "gid://gitlab/Vulnerability/23577695"}) {
|
|
vulnerability {
|
|
state
|
|
}
|
|
errors
|
|
}
|
|
}
|
|
```
|
|
|
|
Example response:
|
|
|
|
```json
|
|
{
|
|
"data": {
|
|
"vulnerabilityConfirm": {
|
|
"vulnerability": {
|
|
"state": "CONFIRMED"
|
|
},
|
|
"errors": []
|
|
}
|
|
}
|
|
}
|
|
```
|
|
|
|
### GraphQL - Resolve vulnerability
|
|
|
|
Use [`Mutation.vulnerabilityResolve`](graphql/reference/_index.md#mutationvulnerabilityresolve).
|
|
|
|
```graphql
|
|
mutation {
|
|
vulnerabilityResolve(input: { id: "gid://gitlab/Vulnerability/23577695"}) {
|
|
vulnerability {
|
|
state
|
|
}
|
|
errors
|
|
}
|
|
}
|
|
```
|
|
|
|
Example response:
|
|
|
|
```json
|
|
{
|
|
"data": {
|
|
"vulnerabilityConfirm": {
|
|
"vulnerability": {
|
|
"state": "RESOLVED"
|
|
},
|
|
"errors": []
|
|
}
|
|
}
|
|
}
|
|
```
|
|
|
|
### GraphQL - Dismiss vulnerability
|
|
|
|
Use [`Mutation.vulnerabilityDismiss`](graphql/reference/_index.md#mutationvulnerabilitydismiss).
|
|
|
|
```graphql
|
|
mutation {
|
|
vulnerabilityDismiss(input: { id: "gid://gitlab/Vulnerability/23577695"}) {
|
|
vulnerability {
|
|
state
|
|
}
|
|
errors
|
|
}
|
|
}
|
|
```
|
|
|
|
Example response:
|
|
|
|
```json
|
|
{
|
|
"data": {
|
|
"vulnerabilityConfirm": {
|
|
"vulnerability": {
|
|
"state": "DISMISSED"
|
|
},
|
|
"errors": []
|
|
}
|
|
}
|
|
}
|
|
```
|
|
|
|
### GraphQL - Revert vulnerability to detected state
|
|
|
|
Use [`Mutation.vulnerabilityRevertToDetected`](graphql/reference/_index.md#mutationvulnerabilityreverttodetected).
|
|
|
|
```graphql
|
|
mutation {
|
|
vulnerabilityRevertToDetected(input: { id: "gid://gitlab/Vulnerability/20345379"}) {
|
|
vulnerability {
|
|
state
|
|
}
|
|
errors
|
|
}
|
|
}
|
|
```
|
|
|
|
Example response:
|
|
|
|
```json
|
|
{
|
|
"data": {
|
|
"vulnerabilityConfirm": {
|
|
"vulnerability": {
|
|
"state": "DETECTED"
|
|
},
|
|
"errors": []
|
|
}
|
|
}
|
|
}
|
|
```
|