This guide documents the InsightVM Cloud Application Programming Interface (API). This API supports the Representation State Transfer (REST) design pattern. See Insight Platform API Overview for an overview of all Insight Platform APIs.
Versioning is specified in the URL and the base path of this API is:
https://{region}.api.insight.rapid7.com/vm/{version}/
Version numbers are numerical and prefixed with the letter "v"
, such as "v1"
.
The region indicates the geo-location of the Insight Platform desired:
Code | Region |
---|---|
us | United States |
eu | Europe |
ca | Canada |
au | Australia |
ap | Japan |
Authorization requires a token header X-Api-Key
and can be generated from the Insight Platform key management page.
See Insight Platform API Key for more details.
Unless noted otherwise this API accepts and produces the application/json
and application/xml
media types.
Unless otherwise indicated, the default request body media type is application/json
.
All resources respond to the OPTIONS
request, which allows discoverability of available operations that are supported.
The OPTIONS
response returns the acceptable HTTP operations on that resource within the Allow
header. The response
is always a 200 OK
status.
The following HTTP operations are supported throughout this API. The general usage of the operation and both its failure and success status codes are outlined below.
Verb |
Usage | Success | Failure |
---|---|---|---|
GET |
Used to retrieve a resource by identifier, or a collection of resources by type. | 200 |
400 , 401 , 402 , 404 , 405 , 408 , 410 , 415 , 500 |
POST |
Creates a resource with an application-specified identifier. | 201 |
400 , 401 , 404 , 405 , 408 , 413 , 415 , 500 |
POST |
Performs a request to queue an asynchronous job. | 202 |
400 , 401 , 405 , 408 , 410 , 413 , 415 , 500 |
PUT |
Creates a resource with a client-specified identifier. | 200 |
400 , 401 , 403 , 405 , 408 , 410 , 413 , 415 , 500 |
PUT |
Performs a full update of a resource with a specified identifier. | 201 |
400 , 401 , 403 , 405 , 408 , 410 , 413 , 415 , 500 |
DELETE |
Deletes a resource by identifier or an entire collection of resources. | 204 |
400 , 401 , 405 , 408 , 410 , 413 , 415 , 500 |
OPTIONS |
Requests what operations are available on a resource. | 200 |
401 , 404 , 405 , 408 , 500 |
Resource names represent nouns and identify the entity being manipulated or accessed. All collection resources are pluralized to indicate to the client they are interacting with a collection of multiple resources of the same type. Singular resource names are used when there exists only one resource available to interact with.
The following naming conventions are used by this API:
Type | Case |
---|---|
Resource names | strike-through-case |
Header, body, and query parameters parameters | camelCase |
JSON fields and property names | snake_case |
A collection resource is a parent resource for instance resources, but can itself be retrieved and operated on independently. Collection resources use a pluralized resource name. The resource path for collection resources follow the convention:
/{resource_name}
Collection resources can support the GET
, POST
, PUT
, and DELETE
operations.
The GET
operation invoked on a collection resource indicates a request to retrieve all, or some, of the entities
contained within the collection. This also includes the optional capability to filter or search resources during
the request. The response from a collection listing is a paginated document.
The POST
is a non-idempotent operation that allows for the creation of a new resource when the resource identifier
is not provided by the system during the creation operation (i.e. the Security Console generates the identifier). The
content of the POST
request is sent in the request body. The response to a successful POST
request should be a
201 CREATED
with a valid Location
header field set to the URI that can be used to access to the newly
created resource.
The POST
to a collection resource can also be used to interact with asynchronous resources. In this situation,
instead of a 201 CREATED
response, the 202 ACCEPTED
response indicates that processing of the request is not fully
complete but has been accepted for future processing. This request will respond similarly with a Location
header with
link to the job-oriented asynchronous resource that was created and/or queued.
The PUT
is an idempotent operation that either performs a create with user-supplied identity, or a full replace
or update of a resource by a known identifier. The response to a PUT
operation to create an entity is a 201 Created
with a valid Location
header field set to the URI that can be used to access to the newly created resource.
PUT
on a collection resource replaces all values in the collection. The typical response to a PUT
operation that
updates an entity is hypermedia links, which may link to related resources caused by the side-effects of the changes
performed.
The DELETE
is an idempotent operation that physically deletes a resource, or removes an association between resources.
The typical response to a DELETE
operation is hypermedia links, which may link to related resources caused by the
side-effects of the changes performed.
An instance resource is a "leaf" level resource that may be retrieved, optionally nested within a collection resource. Instance resources are usually retrievable with opaque identifiers. The resource path for instance resources follows the convention:
/{resource_name}/{instance_id}...
Instance resources can support the GET
, PUT
, POST
, PATCH
and DELETE
operations.
Retrieves the details of a specific resource by its identifier. The details retrieved can be controlled through property selection and property views. The content of the resource is returned within the body of the response in the acceptable media type.
Allows for and idempotent "full update" (complete replacement) on a specific resource. If the resource does not exist,
it will be created; if it does exist, it is completely overwritten. Any omitted properties in the request are assumed to
be undefined/null. For "partial updates" use POST
or PATCH
instead.
The content of the PUT
request is sent in the request body. The identifier of the resource is specified within the URL
(not the request body). The response to a successful PUT
request is a 201 CREATED
to represent the created status,
with a valid Location
header field set to the URI that can be used to access to the newly created (or fully replaced)
resource.
Performs a non-idempotent creation of a new resource. The POST
of an instance resource most commonly occurs with the
use of nested resources (e.g. searching on a parent collection resource). The response to a POST
of an instance
resource is typically a 200 OK
if the resource is non-persistent, and a 201 CREATED
if there is a resource
created/persisted as a result of the operation. This varies by endpoint.
The PATCH
operation is used to perform a partial update of a resource. PATCH
is a non-idempotent operation that
enforces an atomic mutation of a resource. Only the properties specified in the request are to be overwritten on the
resource it is applied to. If a property is missing, it is assumed to not have changed.
Permanently removes the individual resource from the system. If the resource is an association between resources, only
the association is removed, not the resources themselves. A successful deletion of the resource should return
204 NO CONTENT
with no response body. This operation is not fully idempotent, as follow-up requests to delete a
non-existent resource should return a 404 NOT FOUND
.
Dates and/or times are specified as strings in the ISO 8601 format(s). The following formats are supported as input:
Value | Format | Notes |
---|---|---|
Date | YYYY-MM-DD | Defaults to 12 am UTC (if used for a date & time |
Date & time only | YYYY-MM-DD'T'hh:mm:ss[.nnn] | Defaults to UTC |
Date & time in UTC | YYYY-MM-DD'T'hh:mm:ss[.nnn]Z | |
Date & time w/ offset | YYYY-MM-DD'T'hh:mm:ss[.nnn][+|-]hh:mm | |
Date & time w/ zone-offset | YYYY-MM-DD'T'hh:mm:ss[.nnn][+|-]hh:mm[ |
Timezones are specified in the regional zone format, such as "America/Los_Angeles"
, "Asia/Tokyo"
, or "GMT"
.
Pagination may be supported on collection resources using a combination of two query parameters, page
and size
.
The page parameter dictates the zero-based index of the page to retrieve, and the size
indicates the size of the page.
For example, /resources?page=2&size=10
will return page 3, with 10 records per page, giving results 21-30.
The maximum page size for a request is 1000.
Some paginated endpoints may supported "cursored" pages, allowing for a guaranteed consistent view of data across page
boundaries. Cursored page requests support a consistent, sequential way to access data across pages. Only if this option
is used are you guaranteed that you will read a record once and only once in any page ("repeatable read").
If not supported, or not specified, the results may shift across page boundaries while they are being read as data updates
("read committed"). The cursor
property is used to follow the same chain of paginated requests from page to page. Each
request will change the value of the next cursor to use on the subsequent page, and may only be used to iterate sequentially
through pages.
The response to a paginated request follows the format:
{
data": [
...
],
"metadata": {
"index": ...,
"size": ...,
"sort": ...,
"total_data": ...,
"total_pages": ...,
"cursor": ...
},
"links": [
"first" : {
"href" : "..."
},
"prev" : {
"href" : "..."
},
"self" : {
"href" : "..."
},
"next" : {
"href" : "..."
},
"last" : {
"href" : "..."
}
]
}
The data
property is an array of the resources being retrieved from the endpoint, each which should contain at
minimum a "self" relation hypermedia link. The metadata
property outlines the details of the current page and total
possible pages. The object for the page includes the following properties:
index
- The page number (zero-based) of the page returned.size
- The size of the pages, which is less than or equal to the maximum page size.total_data
- The total amount of resources available across all pages.total_pages
- The total amount of pages.cursor
- An optional cursor for "cursored" page requestsThe last property of the paged response is the links
array, which contains all available hypermedia links. For
paginated responses, the "self", "next", "previous", "first", and "last" links are returned. The "self" link must
always be returned and should contain a link to allow the client to replicate the original request against the
collection resource in an identical manner to that in which it was invoked.
The "next" and "previous" links are present if either or both there exists a previous or next page, respectively. The "next" and "previous" links have hrefs that allow "natural movement" to the next page, that is all parameters required to move the next page are provided in the link. The "first" and "last" links provide references to the first and last pages respectively. If the page is "cursored" the cursor is automatically incorporated into the pagination links.
Sorting is supported on paginated resources with the sort
query parameter(s). The sort query parameter(s) supports
identifying a single or multi-property sort with a single or multi-direction output. The format of the parameter is:
sort=property[,ASC|DESC]...
Therefore, the request /resources?sort=name,title,DESC
would return the results sorted by the name and title
descending, in that order. The sort directions are either ascending ASC
or descending DESC
. With single-order
sorting, all properties are sorted in the same direction. To sort the results with varying orders by property,
multiple sort parameters are passed.
For example, the request /resources?sort=name,ASC&sort=title,DESC
would sort by name ascending and title
descending, in that order.
The following response statuses may be returned by this API.
Status | Meaning | Usage |
---|---|---|
200 |
OK | The operation performed without error according to the specification of the request, and no more specific 2xx code is suitable. |
201 |
Created | A create request has been fulfilled and a resource has been created. The resource is available as the URI specified in the response, including the Location header. |
202 |
Accepted | An asynchronous task has been accepted, but not guaranteed, to be processed in the future. |
400 |
Bad Request | The request was invalid or cannot be otherwise served. The request is not likely to succeed in the future without modifications. |
401 |
Unauthorized | The user is unauthorized to perform the operation requested, or does not maintain permissions to perform the operation on the resource specified. |
403 |
Forbidden | The resource exists to which the user has access, but the operating requested is not permitted. |
404 |
Not Found | The resource specified could not be located, does not exist, or an unauthenticated client does not have permissions to a resource. |
405 |
Method Not Allowed | The operations may not be performed on the specific resource. Allowed operations are returned and may be performed on the resource. |
408 |
Request Timeout | The client has failed to complete a request in a timely manner and the request has been discarded. |
413 |
Request Entity Too Large | The request being provided is too large for the server to accept processing. |
415 |
Unsupported Media Type | The media type is not supported for the requested resource. |
500 |
Internal Server Error | An internal and unexpected error has occurred on the server at no fault of the client. |
Any error responses can provide a response body with a message to the client indicating more information (if applicable) to aid debugging of the error. All 4xx and 5xx responses will return an error response in the body. The format of the response is as follows:
{
"status": <statusCode>,
"message": <message>,
"localized_message": <message>,
"links" : [ {
"rel" : "...",
"href" : "..."
} ]
}
The status
property is the same as the HTTP status returned in the response, to ease client parsing. The message
property is a localized message in the request client's locale (if applicable) that articulates the nature of the
error. The last property is the links
property.
The response statuses 401, 403 and 404 need special consideration for security purposes. As necessary, error statuses and messages may be obscured to strengthen security and prevent information exposure. The following is a guideline for privileged resource response statuses:
Use Case | Access | Resource | Permission | Status |
---|---|---|---|---|
Unauthenticated access to an unauthenticated resource. | Unauthenticated | Unauthenticated | Yes | 20x |
Unauthenticated access to an authenticated resource. | Unauthenticated | Authenticated | No | 401 |
Unauthenticated access to an authenticated resource. | Unauthenticated | Non-existent | No | 401 |
Authenticated access to a unauthenticated resource. | Authenticated | Unauthenticated | Yes | 20x |
Authenticated access to an authenticated, unprivileged resource. | Authenticated | Authenticated | No | 404 |
Authenticated access to an authenticated, privileged resource. | Authenticated | Authenticated | Yes | 20x |
Authenticated access to an authenticated, non-existent resource | Authenticated | Non-existent | Yes | 404 |
Commonly used response headers include:
Header | Example | Purpose |
---|---|---|
Allow |
OPTIONS, GET |
Defines the allowable HTTP operations on a resource. |
Cache-Control |
no-store, must-revalidate |
Disables caching of resources (as they are all dynamic). |
Content-Encoding |
gzip |
The encoding of the response body (if any). |
Location |
Refers to the URI of the resource created by a request. | |
Transfer-Encoding |
chunked |
Specified the encoding used to transform response. |
Retry-After |
5000 | Indicates the time to wait before retrying a request. |
X-Content-Type-Options |
nosniff |
Disables MIME type sniffing. |
X-XSS-Protection |
1; mode=block |
Enables XSS filter protection. |
X-Frame-Options |
SAMEORIGIN |
Prevents rendering in a frame from a different origin. |
X-UA-Compatible |
IE=edge,chrome=1 |
Specifies the browser mode to render in. |
When application/json
is returned in the response body it is always pretty-printed (indented, human readable output).
Additionally, gzip compression/encoding is supported on all responses.
Dates or times are returned as strings in the ISO 8601 'extended' format. When a date and time is returned (instant) the value is converted to UTC.
For example:
Value | Format | Example |
---|---|---|
Date | YYYY-MM-DD |
2017-12-03 |
Date & Time | YYYY-MM-DD'T'hh:mm:ss[.nnn]Z |
2017-12-03T10:15:30Z |
Saves a new build with the specified details.
region required | string (Region) Enum: "us" "us2" "us3" "eu" "ca" "au" "ap" Example: us The region of the Insight Platform to use. See Overview for more information. |
Request body with new build details.
artifact_id | string The identifier of the image, in hash format |
build_version | string Version of Jenkins build. |
number | string Number of the jenkins build. |
platform | string Name of the jenkins platform. |
object (Policy) Set of policy rules. | |
project_id | string The identifier of the project |
start | string Start time of the build. The format is an ISO 8601 date time, |
status | string Status of the jenkins build. |
system_id | string The identifier of the system. |
version | string Version of jenkins. |
Upload a new build with build identifier 85
.
{- "artifact_id": "sha256:asdf9y8a8sdfasdf9y8a8sdfasdf9y8a8sdfasdf9y8a8sdfasdf9y8a8sdf",
- "system_id": "8abe8ab-sfd78-fs67-23hj-sfd9vixuj2kjbg76",
- "platform": "jenkins",
- "version": "2.176.3",
- "build_version": null,
- "project_id": "image-assessment",
- "number": "16",
- "status": "failure",
- "policy": {
- "rules": [
- {
- "action": "MARK_UNSTABLE",
- "actualValue": "7",
- "configuredValue": "1",
- "criterion": "CRITICAL_VULN_COUNT",
- "packageIds": null,
- "status": "FAILED",
- "vulnerabilityIds": null
}, - {
- "action": "FAIL",
- "actualValue": "9.3",
- "configuredValue": "7.0",
- "criterion": "MAX_CVSS_SCORE",
- "packageIds": null,
- "status": "FAILED",
- "vulnerabilityIds": null
}
]
}
}
The identifier of the build.
{- "id": "85",
- "links": [
]
}
Retrieves details about previously executed build.
region required | string (Region) Enum: "us" "us2" "us3" "eu" "ca" "au" "ap" Example: us The region of the Insight Platform to use. See Overview for more information. |
id required | integer <int32> Example: 85 The identifier of the build. |
Retrieving build details with build id 85
.
{- "artifact_id": "sha256:9baee74a44692c1422fa617dfa15a4d0707155915dd9c8fb3ec0364545374ccd",
- "build_id": 85,
- "number": "75",
- "policy": {
- "rules": [
- {
- "action": "MARK_UNSTABLE",
- "actualValue": 7,
- "configuredValue": 1,
- "criterion": "CRITICAL_VULN_COUNT",
- "status": "FAILED"
}
]
}, - "start": "2019-03-12T06:52:09.733Z",
- "status": "UNSTABLE"
}
Saves the details for a container image for assessment. These details typically come automatically from connecting to configured registries, but this endpoint may be used to manually upload fingerprinting and other metadata used to perform assessment of the image.
region required | string (Region) Enum: "us" "us2" "us3" "eu" "ca" "au" "ap" Example: us The region of the Insight Platform to use. See Overview for more information. |
The details for the image to upload and assess.
created | string The time at which the image was created. The format is an ISO 8601 date time, |
Array of objects (Repository Digest) The digests to associate to the image. | |
id | string The identifier of the image, in hash format |
Array of objects (Image layer) The layers that comprise the image. | |
size | integer <int64> Size of image in bytes. |
type | string Specifies if the image type is Docker or Unknown(for anything other than a docker image). |
Uploading details for an image
{- "id": "sha256:4e9f56af74e9f56af74e9f56af74e9f56af74e9f56a4e9f56af74e9f56af754e9f56af7",
- "type": "DOCKER",
- "size": 100820608,
- "created": "2019-04-18T23:01:40.505780800Z",
- "digests": [ ],
- "layers": [
- {
- "id": "sha256:74e9f56af74e9f56a4e9f56af74e9f56af774e9f56af74e9f56a4e9f56af74e9f56af7",
- "parent_id": "sha256:4226f1146c0e9c11c8524c708d1becff1a75c34fbe5ea86d4f2d687398046b4c",
- "author": null,
- "created": "1970-01-01T00:00:00Z",
- "size": 61952512,
- "empty": false,
- "commands": "/bin/sh -c #(nop) COPY dir:b1d25a067f80b1d25a067f80b1d25a067f80b1d25a067f80b1d25a067f80 in /opt/jre ",
- "comment": null,
- "operating_system": null,
- "packages": [ ]
}, - {
- "id": "sha256:e503916afaf51897109a05007fa4e503916afaf51897109a05007fa4",
- "parent_id": "sha256:ee55afcce9c11ab21398fd0ee55afcce9c11ab21398fd0ee55afcce9c11ab21398fd0",
- "author": null,
- "created": "1970-01-01T00:00:00Z",
- "size": 11776,
- "empty": false,
- "commands": "/bin/sh -c addgroup -g 1000 -S user && adduser -u 1000 -S user -G user",
- "comment": null,
- "operating_system": null,
- "packages": [ ]
}
]
}
{- "id": "sha256%3A4e9f56af74e9f56af74e9f56af74e9f56af74e9f56a4e9f56af74e9f56af754e9f56af7",
- "links": [
]
}
Returns the details of previously saved image.
region required | string (Region) Enum: "us" "us2" "us3" "eu" "ca" "au" "ap" Example: us The region of the Insight Platform to use. See Overview for more information. |
id required | string Example: sha256:a31a277d8d39450220c722c1302a345c84206e7fd4cdb619e7face046e89031d The identifier of the image, in hash format |
Image details associated with image identifier sha256:11cd0b38bc3ceb958ffb2f9bd70be3fb317ce7d255c8a4c3f4af30e298aa1aab
.
{- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [
- {
- "instances": 1,
- "results": [
- {
- "check_id": "alpine-linux-cve-2019-14697-10709-3-8",
- "key": null,
- "proof": "<p><p>Vulnerable OS: Alpine Linux 3.8.0<p></p></p><p>Vulnerable software installed: Alpine musl 1.1.19-r10</p></p>",
- "status": "vulnerable-version",
- "vulnerability_id": "alpine-linux-cve-2019-14697"
}
], - "status": "vulnerable",
- "vulnerability": {
- "added": "2019-11-08",
- "categories": [
- "Alpine Linux"
], - "cves": [
- "CVE-2019-14697"
], - "cvss_v2": {
- "access_complexity": "low",
- "access_vector": "network",
- "authentication": "none",
- "availability_impact": "partial",
- "confidentiality_impact": "partial",
- "exploit_score": 9.996799,
- "impact_score": 6.442976,
- "integrity_impact": "partial",
- "score": 7.5,
- "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
}, - "cvss_v3": {
- "attack_complexity": "low",
- "attack_vector": "network",
- "availability_impact": "high",
- "confidentiality_impact": "high",
- "exploit_score": 3.8870428,
- "impact_score": 5.873119,
- "integrity_impact": "high",
- "privileges_required": "none",
- "scope": "unchanged",
- "score": 9.8,
- "user_interaction": "none",
- "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}, - "denial_of_service": false,
- "description": {
- "html": "<p>musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code.</p>",
- "text": "musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code."
}, - "exploits": [ ],
- "id": "alpine-linux-cve-2019-14697",
- "malware_kits": [ ],
- "modified": "2019-12-04",
- "pci": {
- "cvss_score": 7.5,
- "fail": true,
- "severity_score": 5,
- "special_notes": "",
- "status": "fail"
}, - "published": "2019-08-06",
- "references": [
], - "risk_score": 562.31,
- "severity": "critical",
- "severity_score": 8,
- "title": "Alpine Linux: CVE-2019-14697: musl x87 float stack imbalance"
}
}
], - "risk_score": 556.052734375,
- "vulnerabilities": {
- "instances": 1,
- "severity": {
- "critical": 1,
- "moderate": 0,
- "severe": 0
}, - "total": 1
}
}, - "created": "2018-07-06T14:14:06.393356Z",
- "digests": [
- {
- "digest": "sha256:7043076348bf5040220df6ad703798fd8593a0918d06d3ce30c6c93be117e430",
- "registry": "_DockerHub",
- "repository": "library/alpine"
}, - {
- "digest": "sha256:0873c923e00e0fd2ba78041bfb64a105e1ecb7678916d1f7776311e45bf5634b",
- "registry": null,
- "repository": null
}
], - "findings": [
- {
- "instances": 1,
- "results": [
- {
- "check_id": "alpine-linux-cve-2019-14697-10709-3-8",
- "key": null,
- "proof": "<p><p>Vulnerable OS: Alpine Linux 3.8.0<p></p></p><p>Vulnerable software installed: Alpine musl 1.1.19-r10</p></p>",
- "status": "vulnerable-version",
- "vulnerability_id": "alpine-linux-cve-2019-14697"
}
], - "status": "vulnerable",
- "vulnerability": {
- "added": "2019-11-08",
- "categories": [
- "Alpine Linux"
], - "cves": [
- "CVE-2019-14697"
], - "cvss_v2": {
- "access_complexity": "low",
- "access_vector": "network",
- "authentication": "none",
- "availability_impact": "partial",
- "confidentiality_impact": "partial",
- "exploit_score": 9.996799,
- "impact_score": 6.442976,
- "integrity_impact": "partial",
- "score": 7.5,
- "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
}, - "cvss_v3": {
- "attack_complexity": "low",
- "attack_vector": "network",
- "availability_impact": "high",
- "confidentiality_impact": "high",
- "exploit_score": 3.8870428,
- "impact_score": 5.873119,
- "integrity_impact": "high",
- "privileges_required": "none",
- "scope": "unchanged",
- "score": 9.8,
- "user_interaction": "none",
- "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}, - "denial_of_service": false,
- "description": {
- "html": "<p>musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code.</p>",
- "text": "musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code."
}, - "exploits": [ ],
- "id": "alpine-linux-cve-2019-14697",
- "malware_kits": [ ],
- "modified": "2019-12-04",
- "pci": {
- "cvss_score": 7.5,
- "fail": true,
- "severity_score": 5,
- "special_notes": "",
- "status": "fail"
}, - "published": "2019-08-06",
- "references": [
], - "risk_score": 562.31,
- "severity": "critical",
- "severity_score": 8,
- "title": "Alpine Linux: CVE-2019-14697: musl x87 float stack imbalance"
}
}
], - "id": "sha256:11cd0b38bc3ceb958ffb2f9bd70be3fb317ce7d255c8a4c3f4af30e298aa1aab",
- "layer_count": 1,
- "layers": [
- {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [
- {
- "instances": 1,
- "results": [
- {
- "check_id": "alpine-linux-cve-2019-14697-10709-3-8",
- "key": null,
- "proof": "<p><p>Vulnerable OS: Alpine Linux 3.8.0<p></p></p><p>Vulnerable software installed: Alpine musl 1.1.19-r10</p></p>",
- "status": "vulnerable-version",
- "vulnerability_id": "alpine-linux-cve-2019-14697"
}
], - "status": "vulnerable",
- "vulnerability": {
- "added": "2019-11-08",
- "categories": [
- "Alpine Linux"
], - "cves": [
- "CVE-2019-14697"
], - "cvss_v2": {
- "access_complexity": "low",
- "access_vector": "network",
- "authentication": "none",
- "availability_impact": "partial",
- "confidentiality_impact": "partial",
- "exploit_score": 9.996799,
- "impact_score": 6.442976,
- "integrity_impact": "partial",
- "score": 7.5,
- "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
}, - "cvss_v3": {
- "attack_complexity": "low",
- "attack_vector": "network",
- "availability_impact": "high",
- "confidentiality_impact": "high",
- "exploit_score": 3.8870428,
- "impact_score": 5.873119,
- "integrity_impact": "high",
- "privileges_required": "none",
- "scope": "unchanged",
- "score": 9.8,
- "user_interaction": "none",
- "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}, - "denial_of_service": false,
- "description": {
- "html": "<p>musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code.</p>",
- "text": "musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code."
}, - "exploits": [ ],
- "id": "alpine-linux-cve-2019-14697",
- "malware_kits": [ ],
- "modified": "2019-12-04",
- "pci": {
- "cvss_score": 7.5,
- "fail": true,
- "severity_score": 5,
- "special_notes": "",
- "status": "fail"
}, - "published": "2019-08-06",
- "references": [
], - "risk_score": 562.31,
- "severity": "critical",
- "severity_score": 8,
- "title": "Alpine Linux: CVE-2019-14697: musl x87 float stack imbalance"
}
}
], - "risk_score": 562.3055419921875,
- "vulnerabilities": {
- "instances": 1,
- "severity": {
- "critical": 1,
- "moderate": 0,
- "severe": 0
}, - "total": 1
}
}, - "author": null,
- "command": {
- "commands": [
- "file:25f61d70254b9807a40cd3e8d820f6a5ec0e1e596de04e325f6a33810393e95a in /"
], - "operands": [
- "file:25f61d70254b9807a40cd3e8d820f6a5ec0e1e596de04e325f6a33810393e95a in /"
], - "original": "/bin/sh -c #(nop) ADD file:25f61d70254b9807a40cd3e8d820f6a5ec0e1e596de04e325f6a33810393e95a in / ",
- "type": "ADD"
}, - "commands": "/bin/sh -c #(nop) ADD file:25f61d70254b9807a40cd3e8d820f6a5ec0e1e596de04e325f6a33810393e95a in / ",
- "comment": null,
- "created": "2018-07-06T14:14:06.165547Z",
- "empty": false,
- "id": "sha256:8e3ba11ec2a2b39ab372c60c16b421536e50e5ce64a0bc81765c2e38381bcff6",
- "operating_system": {
- "architecture": "x86_64",
- "description": "Alpine Linux 3.8.0",
- "family": "Linux",
- "name": "Linux",
- "vendor": "Alpine",
- "version": "3.8.0",
- "system_name": "Alpine Linux",
- "type": "Container"
}, - "package_count": 13,
- "packages": [
- {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "Alpine base dir structure and init scripts",
- "epoch": null,
- "home_page": null,
- "id": 20098050,
- "license": "GPL-2.0",
- "maintainer": "Natanael Copa <ncopa@alpinelinux.org>",
- "name": "alpine-baselayout",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 397312,
- "source": "alpine-baselayout",
- "type": "APKG",
- "version": "3.1.0-r0"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "Public keys for Alpine Linux packages",
- "epoch": null,
- "home_page": null,
- "id": 20098051,
- "license": "MIT",
- "maintainer": "Natanael Copa <ncopa@alpinelinux.org>",
- "name": "alpine-keys",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 98304,
- "source": "alpine-keys",
- "type": "APKG",
- "version": "2.1-r1"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "Alpine Package Keeper - package manager for alpine",
- "epoch": null,
- "home_page": null,
- "id": 20098052,
- "license": "GPL2",
- "maintainer": "Natanael Copa <ncopa@alpinelinux.org>",
- "name": "apk-tools",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 262144,
- "source": "apk-tools",
- "type": "APKG",
- "version": "2.10.0-r0"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "Size optimized toolbox of many common UNIX utilities",
- "epoch": null,
- "home_page": null,
- "id": 20098053,
- "license": "GPL-2.0",
- "maintainer": "Natanael Copa <ncopa@alpinelinux.org>",
- "name": "busybox",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 905216,
- "source": "busybox",
- "type": "APKG",
- "version": "1.28.4-r0"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "Meta package to pull in correct libc",
- "epoch": null,
- "home_page": null,
- "id": 20098054,
- "license": "BSD",
- "maintainer": "Natanael Copa <ncopa@alpinelinux.org>",
- "name": "libc-utils",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 4096,
- "source": "libc-dev",
- "type": "APKG",
- "version": "0.7.1-r0"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "libressl libcrypto library",
- "epoch": null,
- "home_page": null,
- "id": 20098055,
- "license": "custom",
- "maintainer": "Orion <systmkor@gmail.com>",
- "name": "libressl2.7-libcrypto",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 2125824,
- "source": "libressl",
- "type": "APKG",
- "version": "2.7.4-r0"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "libressl libssl library",
- "epoch": null,
- "home_page": null,
- "id": 20098056,
- "license": "custom",
- "maintainer": "Orion <systmkor@gmail.com>",
- "name": "libressl2.7-libssl",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 327680,
- "source": "libressl",
- "type": "APKG",
- "version": "2.7.4-r0"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "libressl libtls library",
- "epoch": null,
- "home_page": null,
- "id": 20098057,
- "license": "custom",
- "maintainer": "Orion <systmkor@gmail.com>",
- "name": "libressl2.7-libtls",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 77824,
- "source": "libressl",
- "type": "APKG",
- "version": "2.7.4-r0"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [
- {
- "instances": 1,
- "results": [
- {
- "check_id": "alpine-linux-cve-2019-14697-10709-3-8",
- "key": null,
- "proof": "<p><p>Vulnerable OS: Alpine Linux 3.8.0<p></p></p><p>Vulnerable software installed: Alpine musl 1.1.19-r10</p></p>",
- "status": "vulnerable-version",
- "vulnerability_id": "alpine-linux-cve-2019-14697"
}
], - "status": "vulnerable",
- "vulnerability": {
- "added": "2019-11-08",
- "categories": [
- "Alpine Linux"
], - "cves": [
- "CVE-2019-14697"
], - "cvss_v2": {
- "access_complexity": "low",
- "access_vector": "network",
- "authentication": "none",
- "availability_impact": "partial",
- "confidentiality_impact": "partial",
- "exploit_score": 9.996799,
- "impact_score": 6.442976,
- "integrity_impact": "partial",
- "score": 7.5,
- "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
}, - "cvss_v3": {
- "attack_complexity": "low",
- "attack_vector": "network",
- "availability_impact": "high",
- "confidentiality_impact": "high",
- "exploit_score": 3.8870428,
- "impact_score": 5.873119,
- "integrity_impact": "high",
- "privileges_required": "none",
- "scope": "unchanged",
- "score": 9.8,
- "user_interaction": "none",
- "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}, - "denial_of_service": false,
- "description": {
- "html": "<p>musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code.</p>",
- "text": "musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code."
}, - "exploits": [ ],
- "id": "alpine-linux-cve-2019-14697",
- "malware_kits": [ ],
- "modified": "2019-12-04",
- "pci": {
- "cvss_score": 7.5,
- "fail": true,
- "severity_score": 5,
- "special_notes": "",
- "status": "fail"
}, - "published": "2019-08-06",
- "references": [
], - "risk_score": 562.31,
- "severity": "critical",
- "severity_score": 8,
- "title": "Alpine Linux: CVE-2019-14697: musl x87 float stack imbalance"
}
}
], - "risk_score": 562.201171875,
- "vulnerabilities": {
- "instances": 1,
- "severity": {
- "critical": 1,
- "moderate": 0,
- "severe": 0
}, - "total": 1
}
}, - "description": "the musl c library (libc) implementation",
- "epoch": null,
- "home_page": null,
- "id": 20098058,
- "license": "MIT",
- "maintainer": "Timo Teräs <timo.teras@iki.fi>",
- "name": "musl",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 602112,
- "source": "musl",
- "type": "APKG",
- "version": "1.1.19-r10"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "the musl c library (libc) implementation",
- "epoch": null,
- "home_page": null,
- "id": 20098059,
- "license": "MIT BSD GPL2+",
- "maintainer": "Timo Teräs <timo.teras@iki.fi>",
- "name": "musl-utils",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 122880,
- "source": "musl",
- "type": "APKG",
- "version": "1.1.19-r10"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "Scan ELF binaries for stuff",
- "epoch": null,
- "home_page": null,
- "id": 20098060,
- "license": "GPL-2.0",
- "maintainer": "Natanael Copa <ncopa@alpinelinux.org>",
- "name": "scanelf",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 94208,
- "source": "pax-utils",
- "type": "APKG",
- "version": "1.2.3-r0"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "EXternal ssl_client for busybox wget",
- "epoch": null,
- "home_page": null,
- "id": 20098061,
- "license": "GPL-2.0",
- "maintainer": "Natanael Copa <ncopa@alpinelinux.org>",
- "name": "ssl_client",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 24576,
- "source": "busybox",
- "type": "APKG",
- "version": "1.28.4-r0"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "A compression/decompression Library",
- "epoch": null,
- "home_page": null,
- "id": 20098062,
- "license": "zlib",
- "maintainer": "Natanael Copa <ncopa@alpinelinux.org>",
- "name": "zlib",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 102400,
- "source": "zlib",
- "type": "APKG",
- "version": "1.2.11-r1"
}
], - "parent_id": null,
- "position": 1,
- "size": 2206542
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "author": null,
- "command": {
- "commands": [
- "[\"/bin/sh\"]"
], - "operands": [
- "[\"/bin/sh\"]"
], - "original": "/bin/sh -c #(nop) CMD [\"/bin/sh\"]",
- "type": "CMD"
}, - "commands": "/bin/sh -c #(nop) CMD [\"/bin/sh\"]",
- "comment": null,
- "created": "2018-07-06T14:14:06.393356Z",
- "empty": true,
- "id": "sha256:11cd0b38bc3ceb958ffb2f9bd70be3fb317ce7d255c8a4c3f4af30e298aa1aab_empty_0",
- "operating_system": null,
- "package_count": 0,
- "packages": [ ],
- "parent_id": "sha256:8e3ba11ec2a2b39ab372c60c16b421536e50e5ce64a0bc81765c2e38381bcff6",
- "position": null,
- "size": 0
}
], - "operating_system": {
- "architecture": "x86_64",
- "description": "Alpine Linux 3.8.0",
- "family": "Linux",
- "name": "Linux",
- "vendor": "Alpine",
- "version": "3.8.0",
- "system_name": "Alpine Linux",
- "type": "Container"
}, - "package_count": 13,
- "packages": [
- {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "Alpine base dir structure and init scripts",
- "epoch": null,
- "home_page": null,
- "id": 20098050,
- "license": "GPL-2.0",
- "maintainer": "Natanael Copa <ncopa@alpinelinux.org>",
- "name": "alpine-baselayout",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 397312,
- "source": "alpine-baselayout",
- "type": "APKG",
- "version": "3.1.0-r0"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "Public keys for Alpine Linux packages",
- "epoch": null,
- "home_page": null,
- "id": 20098051,
- "license": "MIT",
- "maintainer": "Natanael Copa <ncopa@alpinelinux.org>",
- "name": "alpine-keys",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 98304,
- "source": "alpine-keys",
- "type": "APKG",
- "version": "2.1-r1"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "Alpine Package Keeper - package manager for alpine",
- "epoch": null,
- "home_page": null,
- "id": 20098052,
- "license": "GPL2",
- "maintainer": "Natanael Copa <ncopa@alpinelinux.org>",
- "name": "apk-tools",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 262144,
- "source": "apk-tools",
- "type": "APKG",
- "version": "2.10.0-r0"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "Size optimized toolbox of many common UNIX utilities",
- "epoch": null,
- "home_page": null,
- "id": 20098053,
- "license": "GPL-2.0",
- "maintainer": "Natanael Copa <ncopa@alpinelinux.org>",
- "name": "busybox",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 905216,
- "source": "busybox",
- "type": "APKG",
- "version": "1.28.4-r0"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "Meta package to pull in correct libc",
- "epoch": null,
- "home_page": null,
- "id": 20098054,
- "license": "BSD",
- "maintainer": "Natanael Copa <ncopa@alpinelinux.org>",
- "name": "libc-utils",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 4096,
- "source": "libc-dev",
- "type": "APKG",
- "version": "0.7.1-r0"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "libressl libcrypto library",
- "epoch": null,
- "home_page": null,
- "id": 20098055,
- "license": "custom",
- "maintainer": "Orion <systmkor@gmail.com>",
- "name": "libressl2.7-libcrypto",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 2125824,
- "source": "libressl",
- "type": "APKG",
- "version": "2.7.4-r0"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "libressl libssl library",
- "epoch": null,
- "home_page": null,
- "id": 20098056,
- "license": "custom",
- "maintainer": "Orion <systmkor@gmail.com>",
- "name": "libressl2.7-libssl",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 327680,
- "source": "libressl",
- "type": "APKG",
- "version": "2.7.4-r0"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "libressl libtls library",
- "epoch": null,
- "home_page": null,
- "id": 20098057,
- "license": "custom",
- "maintainer": "Orion <systmkor@gmail.com>",
- "name": "libressl2.7-libtls",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 77824,
- "source": "libressl",
- "type": "APKG",
- "version": "2.7.4-r0"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [
- {
- "instances": 1,
- "results": [
- {
- "check_id": "alpine-linux-cve-2019-14697-10709-3-8",
- "key": null,
- "proof": "<p><p>Vulnerable OS: Alpine Linux 3.8.0<p></p></p><p>Vulnerable software installed: Alpine musl 1.1.19-r10</p></p>",
- "status": "vulnerable-version",
- "vulnerability_id": "alpine-linux-cve-2019-14697"
}
], - "status": "vulnerable",
- "vulnerability": {
- "added": "2019-11-08",
- "categories": [
- "Alpine Linux"
], - "cves": [
- "CVE-2019-14697"
], - "cvss_v2": {
- "access_complexity": "low",
- "access_vector": "network",
- "authentication": "none",
- "availability_impact": "partial",
- "confidentiality_impact": "partial",
- "exploit_score": 9.996799,
- "impact_score": 6.442976,
- "integrity_impact": "partial",
- "score": 7.5,
- "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
}, - "cvss_v3": {
- "attack_complexity": "low",
- "attack_vector": "network",
- "availability_impact": "high",
- "confidentiality_impact": "high",
- "exploit_score": 3.8870428,
- "impact_score": 5.873119,
- "integrity_impact": "high",
- "privileges_required": "none",
- "scope": "unchanged",
- "score": 9.8,
- "user_interaction": "none",
- "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}, - "denial_of_service": false,
- "description": {
- "html": "<p>musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code.</p>",
- "text": "musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code."
}, - "exploits": [ ],
- "id": "alpine-linux-cve-2019-14697",
- "malware_kits": [ ],
- "modified": "2019-12-04",
- "pci": {
- "cvss_score": 7.5,
- "fail": true,
- "severity_score": 5,
- "special_notes": "",
- "status": "fail"
}, - "published": "2019-08-06",
- "references": [
], - "risk_score": 562.31,
- "severity": "critical",
- "severity_score": 8,
- "title": "Alpine Linux: CVE-2019-14697: musl x87 float stack imbalance"
}
}
], - "risk_score": 562.201171875,
- "vulnerabilities": {
- "instances": 1,
- "severity": {
- "critical": 1,
- "moderate": 0,
- "severe": 0
}, - "total": 1
}
}, - "description": "the musl c library (libc) implementation",
- "epoch": null,
- "home_page": null,
- "id": 20098058,
- "license": "MIT",
- "maintainer": "Timo Teräs <timo.teras@iki.fi>",
- "name": "musl",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 602112,
- "source": "musl",
- "type": "APKG",
- "version": "1.1.19-r10"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "the musl c library (libc) implementation",
- "epoch": null,
- "home_page": null,
- "id": 20098059,
- "license": "MIT BSD GPL2+",
- "maintainer": "Timo Teräs <timo.teras@iki.fi>",
- "name": "musl-utils",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 122880,
- "source": "musl",
- "type": "APKG",
- "version": "1.1.19-r10"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "Scan ELF binaries for stuff",
- "epoch": null,
- "home_page": null,
- "id": 20098060,
- "license": "GPL-2.0",
- "maintainer": "Natanael Copa <ncopa@alpinelinux.org>",
- "name": "scanelf",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 94208,
- "source": "pax-utils",
- "type": "APKG",
- "version": "1.2.3-r0"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "EXternal ssl_client for busybox wget",
- "epoch": null,
- "home_page": null,
- "id": 20098061,
- "license": "GPL-2.0",
- "maintainer": "Natanael Copa <ncopa@alpinelinux.org>",
- "name": "ssl_client",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 24576,
- "source": "busybox",
- "type": "APKG",
- "version": "1.28.4-r0"
}, - {
- "assessment": {
- "exploitability": {
- "exploitable": false,
- "exploits": 0,
- "exposed_to_malware": false,
- "malware_kits": 0
}, - "findings": [ ],
- "risk_score": 0,
- "vulnerabilities": {
- "instances": 0,
- "severity": {
- "critical": 0,
- "moderate": 0,
- "severe": 0
}, - "total": 0
}
}, - "description": "A compression/decompression Library",
- "epoch": null,
- "home_page": null,
- "id": 20098062,
- "license": "zlib",
- "maintainer": "Natanael Copa <ncopa@alpinelinux.org>",
- "name": "zlib",
- "os_architecture": "x86_64",
- "os_family": "Linux",
- "os_name": "Linux",
- "os_vendor": "Alpine",
- "os_version": "3.8.0",
- "release": null,
- "size": 102400,
- "source": "zlib",
- "type": "APKG",
- "version": "1.2.11-r1"
}
], - "repositories": [
- {
- "registry": "_DockerHub",
- "repository": "library/alpine"
}
], - "repository": {
- "registry": "_DockerHub",
- "repository": "library/alpine"
}, - "repository_tags": [ ],
- "size": 2206542,
- "tags": [ ],
- "type": "docker"
}
Updates a registry with the specified details.
region required | string (Region) Enum: "us" "us2" "us3" "eu" "ca" "au" "ap" Example: us The region of the Insight Platform to use. See Overview for more information. |
Request body to update details about the registry.
${registryupdate.description}, ${registry.update.description}
Adding a docker hub registry.
{- "uri": "registry-1.docker.io",
- "vendor": "DOCKER_HUB"
}
The identifier of the registry.
{- "id": "sample-registry",
- "links": [
- {
- "rel": "self"
}, - {
- "rel": "connection"
}
]
}
Updates a repository with the specified details.
region required | string (Region) Enum: "us" "us2" "us3" "eu" "ca" "au" "ap" Example: us The region of the Insight Platform to use. See Overview for more information. |
id required | string Example: _DockerHub The identifier of the registry, in encoded format. |
Request body to update details about the repository.
description | string Description about the repository. |
id | string The identifier of the repository. |
imageDigests | Array of objects (Image Digest) unique Digest corresponding to an image. |
tags | Array of objects (Repository Tag) unique Digest corresponding to a tag. |
Adding an nginx repository.
{- "id": "library/nginx",
- "description": "Official build of Nginx.",
- "image_digests": [
- {
- "digest": "sha256:ee5a9b68e8d4a4b8b48318ff08ad5489bd1ce52b357bf48c511968a302bc347b",
- "image": "sha256:3bcfcd94d7f0c31284b415ecd0c0488f94da29f18c7eca789ea34b137e99c9e7"
}
], - "tags": [
- {
- "digest": "sha256:ee5a9b68e8d4a4b8b48318ff08ad5489bd1ce52b357bf48c511968a302bc347b",
- "name": "mainline-alpine"
}, - {
- "digest": "sha256:ee5a9b68e8d4a4b8b48318ff08ad5489bd1ce52b357bf48c511968a302bc347b",
- "name": "alpine"
}, - {
- "digest": "sha256:ee5a9b68e8d4a4b8b48318ff08ad5489bd1ce52b357bf48c511968a302bc347b",
- "name": "1.19.0-alpine"
}, - {
- "digest": "sha256:ee5a9b68e8d4a4b8b48318ff08ad5489bd1ce52b357bf48c511968a302bc347b",
- "name": "1.19-alpine"
}, - {
- "digest": "sha256:ee5a9b68e8d4a4b8b48318ff08ad5489bd1ce52b357bf48c511968a302bc347b",
- "name": "1-alpine"
}
]
}
The identifier of the repository.
{- "id": "library/nginx",
- "links": [
- {
- "rel": "self"
}, - {
- "rel": "connection"
}
]
}