Class: Google::Apis::WebsecurityscannerV1::Finding
- Inherits:
-
Object
- Object
- Google::Apis::WebsecurityscannerV1::Finding
- Includes:
- Core::Hashable, Core::JsonObjectSupport
- Defined in:
- lib/google/apis/websecurityscanner_v1/classes.rb,
lib/google/apis/websecurityscanner_v1/representations.rb,
lib/google/apis/websecurityscanner_v1/representations.rb
Overview
A Finding resource represents a vulnerability instance identified during a ScanRun.
Instance Attribute Summary collapse
-
#body ⇒ String
Output only.
-
#description ⇒ String
Output only.
-
#final_url ⇒ String
Output only.
-
#finding_type ⇒ String
Output only.
-
#form ⇒ Google::Apis::WebsecurityscannerV1::Form
! Information about a vulnerability with an HTML.
-
#frame_url ⇒ String
Output only.
-
#fuzzed_url ⇒ String
Output only.
-
#http_method ⇒ String
Output only.
-
#name ⇒ String
Output only.
-
#outdated_library ⇒ Google::Apis::WebsecurityscannerV1::OutdatedLibrary
Information reported for an outdated library.
-
#reproduction_url ⇒ String
Output only.
-
#severity ⇒ String
Output only.
-
#tracking_id ⇒ String
Output only.
-
#violating_resource ⇒ Google::Apis::WebsecurityscannerV1::ViolatingResource
Information regarding any resource causing the vulnerability such as JavaScript sources, image, audio files, etc.
-
#vulnerable_headers ⇒ Google::Apis::WebsecurityscannerV1::VulnerableHeaders
Information about vulnerable or missing HTTP Headers.
-
#vulnerable_parameters ⇒ Google::Apis::WebsecurityscannerV1::VulnerableParameters
Information about vulnerable request parameters.
-
#xss ⇒ Google::Apis::WebsecurityscannerV1::Xss
Information reported for an XSS.
-
#xxe ⇒ Google::Apis::WebsecurityscannerV1::Xxe
Information reported for an XXE.
Instance Method Summary collapse
-
#initialize(**args) ⇒ Finding
constructor
A new instance of Finding.
-
#update!(**args) ⇒ Object
Update properties of this object.
Constructor Details
#initialize(**args) ⇒ Finding
Returns a new instance of Finding.
244 245 246 |
# File 'lib/google/apis/websecurityscanner_v1/classes.rb', line 244 def initialize(**args) update!(**args) end |
Instance Attribute Details
#body ⇒ String
Output only. The body of the request that triggered the vulnerability.
Corresponds to the JSON property body
146 147 148 |
# File 'lib/google/apis/websecurityscanner_v1/classes.rb', line 146 def body @body end |
#description ⇒ String
Output only. The description of the vulnerability.
Corresponds to the JSON property description
151 152 153 |
# File 'lib/google/apis/websecurityscanner_v1/classes.rb', line 151 def description @description end |
#final_url ⇒ String
Output only. The URL where the browser lands when the vulnerability is
detected.
Corresponds to the JSON property finalUrl
157 158 159 |
# File 'lib/google/apis/websecurityscanner_v1/classes.rb', line 157 def final_url @final_url end |
#finding_type ⇒ String
Output only. The type of the Finding. Detailed and up-to-date information on
findings can be found here: https://cloud.google.com/security-command-center/
docs/how-to-remediate-web-security-scanner-findings
Corresponds to the JSON property findingType
164 165 166 |
# File 'lib/google/apis/websecurityscanner_v1/classes.rb', line 164 def finding_type @finding_type end |
#form ⇒ Google::Apis::WebsecurityscannerV1::Form
! Information about a vulnerability with an HTML.
Corresponds to the JSON property form
169 170 171 |
# File 'lib/google/apis/websecurityscanner_v1/classes.rb', line 169 def form @form end |
#frame_url ⇒ String
Output only. If the vulnerability was originated from nested IFrame, the
immediate parent IFrame is reported.
Corresponds to the JSON property frameUrl
175 176 177 |
# File 'lib/google/apis/websecurityscanner_v1/classes.rb', line 175 def frame_url @frame_url end |
#fuzzed_url ⇒ String
Output only. The URL produced by the server-side fuzzer and used in the
request that triggered the vulnerability.
Corresponds to the JSON property fuzzedUrl
181 182 183 |
# File 'lib/google/apis/websecurityscanner_v1/classes.rb', line 181 def fuzzed_url @fuzzed_url end |
#http_method ⇒ String
Output only. The http method of the request that triggered the vulnerability,
in uppercase.
Corresponds to the JSON property httpMethod
187 188 189 |
# File 'lib/google/apis/websecurityscanner_v1/classes.rb', line 187 def http_method @http_method end |
#name ⇒ String
Output only. The resource name of the Finding. The name follows the format of '
projects/projectId
/scanConfigs/scanConfigId
/scanruns/scanRunId
/findings/
findingId
'. The finding IDs are generated by the system.
Corresponds to the JSON property name
194 195 196 |
# File 'lib/google/apis/websecurityscanner_v1/classes.rb', line 194 def name @name end |
#outdated_library ⇒ Google::Apis::WebsecurityscannerV1::OutdatedLibrary
Information reported for an outdated library.
Corresponds to the JSON property outdatedLibrary
199 200 201 |
# File 'lib/google/apis/websecurityscanner_v1/classes.rb', line 199 def outdated_library @outdated_library end |
#reproduction_url ⇒ String
Output only. The URL containing human-readable payload that user can leverage
to reproduce the vulnerability.
Corresponds to the JSON property reproductionUrl
205 206 207 |
# File 'lib/google/apis/websecurityscanner_v1/classes.rb', line 205 def reproduction_url @reproduction_url end |
#severity ⇒ String
Output only. The severity level of the reported vulnerability.
Corresponds to the JSON property severity
210 211 212 |
# File 'lib/google/apis/websecurityscanner_v1/classes.rb', line 210 def severity @severity end |
#tracking_id ⇒ String
Output only. The tracking ID uniquely identifies a vulnerability instance
across multiple ScanRuns.
Corresponds to the JSON property trackingId
216 217 218 |
# File 'lib/google/apis/websecurityscanner_v1/classes.rb', line 216 def tracking_id @tracking_id end |
#violating_resource ⇒ Google::Apis::WebsecurityscannerV1::ViolatingResource
Information regarding any resource causing the vulnerability such as
JavaScript sources, image, audio files, etc.
Corresponds to the JSON property violatingResource
222 223 224 |
# File 'lib/google/apis/websecurityscanner_v1/classes.rb', line 222 def violating_resource @violating_resource end |
#vulnerable_headers ⇒ Google::Apis::WebsecurityscannerV1::VulnerableHeaders
Information about vulnerable or missing HTTP Headers.
Corresponds to the JSON property vulnerableHeaders
227 228 229 |
# File 'lib/google/apis/websecurityscanner_v1/classes.rb', line 227 def vulnerable_headers @vulnerable_headers end |
#vulnerable_parameters ⇒ Google::Apis::WebsecurityscannerV1::VulnerableParameters
Information about vulnerable request parameters.
Corresponds to the JSON property vulnerableParameters
232 233 234 |
# File 'lib/google/apis/websecurityscanner_v1/classes.rb', line 232 def vulnerable_parameters @vulnerable_parameters end |
#xss ⇒ Google::Apis::WebsecurityscannerV1::Xss
Information reported for an XSS.
Corresponds to the JSON property xss
237 238 239 |
# File 'lib/google/apis/websecurityscanner_v1/classes.rb', line 237 def xss @xss end |
#xxe ⇒ Google::Apis::WebsecurityscannerV1::Xxe
Information reported for an XXE.
Corresponds to the JSON property xxe
242 243 244 |
# File 'lib/google/apis/websecurityscanner_v1/classes.rb', line 242 def xxe @xxe end |
Instance Method Details
#update!(**args) ⇒ Object
Update properties of this object
249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 |
# File 'lib/google/apis/websecurityscanner_v1/classes.rb', line 249 def update!(**args) @body = args[:body] if args.key?(:body) @description = args[:description] if args.key?(:description) @final_url = args[:final_url] if args.key?(:final_url) @finding_type = args[:finding_type] if args.key?(:finding_type) @form = args[:form] if args.key?(:form) @frame_url = args[:frame_url] if args.key?(:frame_url) @fuzzed_url = args[:fuzzed_url] if args.key?(:fuzzed_url) @http_method = args[:http_method] if args.key?(:http_method) @name = args[:name] if args.key?(:name) @outdated_library = args[:outdated_library] if args.key?(:outdated_library) @reproduction_url = args[:reproduction_url] if args.key?(:reproduction_url) @severity = args[:severity] if args.key?(:severity) @tracking_id = args[:tracking_id] if args.key?(:tracking_id) @violating_resource = args[:violating_resource] if args.key?(:violating_resource) @vulnerable_headers = args[:vulnerable_headers] if args.key?(:vulnerable_headers) @vulnerable_parameters = args[:vulnerable_parameters] if args.key?(:vulnerable_parameters) @xss = args[:xss] if args.key?(:xss) @xxe = args[:xxe] if args.key?(:xxe) end |