finding.proto 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122
  1. // Copyright 2022 Google LLC
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. syntax = "proto3";
  15. package google.cloud.websecurityscanner.v1;
  16. import "google/api/field_behavior.proto";
  17. import "google/api/resource.proto";
  18. import "google/cloud/websecurityscanner/v1/finding_addon.proto";
  19. option csharp_namespace = "Google.Cloud.WebSecurityScanner.V1";
  20. option go_package = "google.golang.org/genproto/googleapis/cloud/websecurityscanner/v1;websecurityscanner";
  21. option java_multiple_files = true;
  22. option java_outer_classname = "FindingProto";
  23. option java_package = "com.google.cloud.websecurityscanner.v1";
  24. option php_namespace = "Google\\Cloud\\WebSecurityScanner\\V1";
  25. option ruby_package = "Google::Cloud::WebSecurityScanner::V1";
  26. // A Finding resource represents a vulnerability instance identified during a
  27. // ScanRun.
  28. message Finding {
  29. option (google.api.resource) = {
  30. type: "websecurityscanner.googleapis.com/Finding"
  31. pattern: "projects/{project}/scanConfigs/{scan_config}/scanRuns/{scan_run}/findings/{finding}"
  32. };
  33. // The severity level of a vulnerability.
  34. enum Severity {
  35. // No severity specified. The default value.
  36. SEVERITY_UNSPECIFIED = 0;
  37. // Critical severity.
  38. CRITICAL = 1;
  39. // High severity.
  40. HIGH = 2;
  41. // Medium severity.
  42. MEDIUM = 3;
  43. // Low severity.
  44. LOW = 4;
  45. }
  46. // Output only. The resource name of the Finding. The name follows the format of
  47. // 'projects/{projectId}/scanConfigs/{scanConfigId}/scanruns/{scanRunId}/findings/{findingId}'.
  48. // The finding IDs are generated by the system.
  49. string name = 1;
  50. // Output only. The type of the Finding.
  51. // Detailed and up-to-date information on findings can be found here:
  52. // https://cloud.google.com/security-command-center/docs/how-to-remediate-web-security-scanner-findings
  53. string finding_type = 2;
  54. // Output only. The severity level of the reported vulnerability.
  55. Severity severity = 17 [(google.api.field_behavior) = OUTPUT_ONLY];
  56. // Output only. The http method of the request that triggered the vulnerability, in
  57. // uppercase.
  58. string http_method = 3;
  59. // Output only. The URL produced by the server-side fuzzer and used in the request that
  60. // triggered the vulnerability.
  61. string fuzzed_url = 4;
  62. // Output only. The body of the request that triggered the vulnerability.
  63. string body = 5;
  64. // Output only. The description of the vulnerability.
  65. string description = 6;
  66. // Output only. The URL containing human-readable payload that user can leverage to
  67. // reproduce the vulnerability.
  68. string reproduction_url = 7;
  69. // Output only. If the vulnerability was originated from nested IFrame, the immediate
  70. // parent IFrame is reported.
  71. string frame_url = 8;
  72. // Output only. The URL where the browser lands when the vulnerability is detected.
  73. string final_url = 9;
  74. // Output only. The tracking ID uniquely identifies a vulnerability instance across
  75. // multiple ScanRuns.
  76. string tracking_id = 10;
  77. // Output only. An addon containing information reported for a vulnerability with an HTML
  78. // form, if any.
  79. Form form = 16;
  80. // Output only. An addon containing information about outdated libraries.
  81. OutdatedLibrary outdated_library = 11;
  82. // Output only. An addon containing detailed information regarding any resource causing the
  83. // vulnerability such as JavaScript sources, image, audio files, etc.
  84. ViolatingResource violating_resource = 12;
  85. // Output only. An addon containing information about vulnerable or missing HTTP headers.
  86. VulnerableHeaders vulnerable_headers = 15;
  87. // Output only. An addon containing information about request parameters which were found
  88. // to be vulnerable.
  89. VulnerableParameters vulnerable_parameters = 13;
  90. // Output only. An addon containing information reported for an XSS, if any.
  91. Xss xss = 14;
  92. // Output only. An addon containing information reported for an XXE, if any.
  93. Xxe xxe = 18 [(google.api.field_behavior) = OUTPUT_ONLY];
  94. }