Class: Google::Apis::WebsecurityscannerV1alpha::Finding
- Inherits:
-
Object
- Object
- Google::Apis::WebsecurityscannerV1alpha::Finding
- Includes:
- Core::Hashable, Core::JsonObjectSupport
- Defined in:
- generated/google/apis/websecurityscanner_v1alpha/classes.rb,
generated/google/apis/websecurityscanner_v1alpha/representations.rb,
generated/google/apis/websecurityscanner_v1alpha/representations.rb
Overview
A Finding resource represents a vulnerability instance identified during a ScanRun.
Instance Attribute Summary collapse
-
#body ⇒ String
The body of the request that triggered the vulnerability.
-
#description ⇒ String
The description of the vulnerability.
-
#final_url ⇒ String
The URL where the browser lands when the vulnerability is detected.
-
#finding_type ⇒ String
The type of the Finding.
-
#frame_url ⇒ String
If the vulnerability was originated from nested IFrame, the immediate parent IFrame is reported.
-
#fuzzed_url ⇒ String
The URL produced by the server-side fuzzer and used in the request that triggered the vulnerability.
-
#http_method ⇒ String
The http method of the request that triggered the vulnerability, in uppercase.
-
#name ⇒ String
The resource name of the Finding.
-
#outdated_library ⇒ Google::Apis::WebsecurityscannerV1alpha::OutdatedLibrary
Information reported for an outdated library.
-
#reproduction_url ⇒ String
The URL containing human-readable payload that user can leverage to reproduce the vulnerability.
-
#tracking_id ⇒ String
The tracking ID uniquely identifies a vulnerability instance across multiple ScanRuns.
-
#violating_resource ⇒ Google::Apis::WebsecurityscannerV1alpha::ViolatingResource
Information regarding any resource causing the vulnerability such as JavaScript sources, image, audio files, etc.
-
#vulnerable_headers ⇒ Google::Apis::WebsecurityscannerV1alpha::VulnerableHeaders
Information about vulnerable or missing HTTP Headers.
-
#vulnerable_parameters ⇒ Google::Apis::WebsecurityscannerV1alpha::VulnerableParameters
Information about vulnerable request parameters.
-
#xss ⇒ Google::Apis::WebsecurityscannerV1alpha::Xss
Information reported for an XSS.
Instance Method Summary collapse
-
#initialize(**args) ⇒ Finding
constructor
A new instance of Finding.
-
#update!(**args) ⇒ Object
Update properties of this object.
Methods included from Core::JsonObjectSupport
Methods included from Core::Hashable
Constructor Details
#initialize(**args) ⇒ Finding
Returns a new instance of Finding.
225 226 227 |
# File 'generated/google/apis/websecurityscanner_v1alpha/classes.rb', line 225 def initialize(**args) update!(**args) end |
Instance Attribute Details
#body ⇒ String
The body of the request that triggered the vulnerability.
Corresponds to the JSON property body
144 145 146 |
# File 'generated/google/apis/websecurityscanner_v1alpha/classes.rb', line 144 def body @body end |
#description ⇒ String
The description of the vulnerability.
Corresponds to the JSON property description
149 150 151 |
# File 'generated/google/apis/websecurityscanner_v1alpha/classes.rb', line 149 def description @description end |
#final_url ⇒ String
The URL where the browser lands when the vulnerability is detected.
Corresponds to the JSON property finalUrl
154 155 156 |
# File 'generated/google/apis/websecurityscanner_v1alpha/classes.rb', line 154 def final_url @final_url end |
#finding_type ⇒ String
The type of the Finding.
Corresponds to the JSON property findingType
159 160 161 |
# File 'generated/google/apis/websecurityscanner_v1alpha/classes.rb', line 159 def finding_type @finding_type end |
#frame_url ⇒ String
If the vulnerability was originated from nested IFrame, the immediate
parent IFrame is reported.
Corresponds to the JSON property frameUrl
165 166 167 |
# File 'generated/google/apis/websecurityscanner_v1alpha/classes.rb', line 165 def frame_url @frame_url end |
#fuzzed_url ⇒ String
The URL produced by the server-side fuzzer and used in the request that
triggered the vulnerability.
Corresponds to the JSON property fuzzedUrl
171 172 173 |
# File 'generated/google/apis/websecurityscanner_v1alpha/classes.rb', line 171 def fuzzed_url @fuzzed_url end |
#http_method ⇒ String
The http method of the request that triggered the vulnerability, in
uppercase.
Corresponds to the JSON property httpMethod
177 178 179 |
# File 'generated/google/apis/websecurityscanner_v1alpha/classes.rb', line 177 def http_method @http_method end |
#name ⇒ String
The resource name of the Finding. The name follows the format of
'projects/projectId
/scanConfigs/scanConfigId
/scanruns/scanRunId
/findings/
findingId
'.
The finding IDs are generated by the system.
Corresponds to the JSON property name
185 186 187 |
# File 'generated/google/apis/websecurityscanner_v1alpha/classes.rb', line 185 def name @name end |
#outdated_library ⇒ Google::Apis::WebsecurityscannerV1alpha::OutdatedLibrary
Information reported for an outdated library.
Corresponds to the JSON property outdatedLibrary
190 191 192 |
# File 'generated/google/apis/websecurityscanner_v1alpha/classes.rb', line 190 def outdated_library @outdated_library end |
#reproduction_url ⇒ String
The URL containing human-readable payload that user can leverage to
reproduce the vulnerability.
Corresponds to the JSON property reproductionUrl
196 197 198 |
# File 'generated/google/apis/websecurityscanner_v1alpha/classes.rb', line 196 def reproduction_url @reproduction_url end |
#tracking_id ⇒ String
The tracking ID uniquely identifies a vulnerability instance across
multiple ScanRuns.
Corresponds to the JSON property trackingId
202 203 204 |
# File 'generated/google/apis/websecurityscanner_v1alpha/classes.rb', line 202 def tracking_id @tracking_id end |
#violating_resource ⇒ Google::Apis::WebsecurityscannerV1alpha::ViolatingResource
Information regarding any resource causing the vulnerability such
as JavaScript sources, image, audio files, etc.
Corresponds to the JSON property violatingResource
208 209 210 |
# File 'generated/google/apis/websecurityscanner_v1alpha/classes.rb', line 208 def violating_resource @violating_resource end |
#vulnerable_headers ⇒ Google::Apis::WebsecurityscannerV1alpha::VulnerableHeaders
Information about vulnerable or missing HTTP Headers.
Corresponds to the JSON property vulnerableHeaders
213 214 215 |
# File 'generated/google/apis/websecurityscanner_v1alpha/classes.rb', line 213 def vulnerable_headers @vulnerable_headers end |
#vulnerable_parameters ⇒ Google::Apis::WebsecurityscannerV1alpha::VulnerableParameters
Information about vulnerable request parameters.
Corresponds to the JSON property vulnerableParameters
218 219 220 |
# File 'generated/google/apis/websecurityscanner_v1alpha/classes.rb', line 218 def vulnerable_parameters @vulnerable_parameters end |
#xss ⇒ Google::Apis::WebsecurityscannerV1alpha::Xss
Information reported for an XSS.
Corresponds to the JSON property xss
223 224 225 |
# File 'generated/google/apis/websecurityscanner_v1alpha/classes.rb', line 223 def xss @xss end |
Instance Method Details
#update!(**args) ⇒ Object
Update properties of this object
230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 |
# File 'generated/google/apis/websecurityscanner_v1alpha/classes.rb', line 230 def update!(**args) @body = args[:body] if args.key?(:body) @description = args[:description] if args.key?(:description) @final_url = args[:final_url] if args.key?(:final_url) @finding_type = args[:finding_type] if args.key?(:finding_type) @frame_url = args[:frame_url] if args.key?(:frame_url) @fuzzed_url = args[:fuzzed_url] if args.key?(:fuzzed_url) @http_method = args[:http_method] if args.key?(:http_method) @name = args[:name] if args.key?(:name) @outdated_library = args[:outdated_library] if args.key?(:outdated_library) @reproduction_url = args[:reproduction_url] if args.key?(:reproduction_url) @tracking_id = args[:tracking_id] if args.key?(:tracking_id) @violating_resource = args[:violating_resource] if args.key?(:violating_resource) @vulnerable_headers = args[:vulnerable_headers] if args.key?(:vulnerable_headers) @vulnerable_parameters = args[:vulnerable_parameters] if args.key?(:vulnerable_parameters) @xss = args[:xss] if args.key?(:xss) end |