跳转到内容

组件漏洞

查询组件漏洞列表信息

基本信息

  • Path:{{ host }} /cleansourcesca-community/vulnerability/info/list
  • Method:POST

请求参数

Headers

参数名称参数值
Content-Typeapplication/json

Body

参数名称说明in是否必须类型schema
req组件漏洞信息查询参数bodytrueComponentVulQueryReqComponentVulQueryReq

schema属性说明

ComponentVulQueryReq

参数名称说明in是否必须类型schema
componentId组件IDbodytruestring
pageNumbodyfalseint32
pageSizebodyfalseint32
taskInstanceId任务实例IDbodytrueint64
vulLevel筛选的漏洞风险等级(不传默认为全部,CRITICAL:超危;HIGH:高危;MEDIUM:中危;LOW:低危)bodyfalsearray

请求示例

json
{
	"componentId": "6b7042dcef71fbbfd174992f621b1ddc",
	"pageNum": 1,
	"pageSize": 10,
	"taskInstanceId": 33163,
	"vulLevel": []
}

响应数据

响应状态码

状态码说明schema
100000OKCommonResult
201Created
401Unauthorized
403Forbidden
404Not Found
100005系统异常
120003未找到任务执行实例
  • 操作成功响应状态码:100000

  • 错误码描述:

    • 100005:系统异常!

    • 120003:未找到任务执行实例

响应参数

参数名称说明类型schema
codestring
dataVulListResponseVulListResponse
messagestring
successboolean

schema属性说明

VulListResponse

参数名称说明类型schema
affectedTaskCount漏洞影响任务数int32
cnnvdNum国家信息安全漏洞库的漏洞编号string
cnnvdHomePage国家信息安全漏洞库的漏洞官方地址string
cveHomePage漏洞标识官网地址string
cnnvdVulName漏洞名称string
cnnvdVulType漏洞类型string
cssaNumcssa漏洞编号string
cveNumcve漏洞编号string
cvssLevel漏洞风险等级(CRITICAL:超危;HIGH:高危;MEDIUM:中危;LOW:低危)string
exploited是否在野利用(1:是,0:不是)string
isExclusive是否为CSSA独家漏洞(1:是,0:不是)int32
reachable组件漏洞是否可达(REACHABLE:可达;UNREACHABLE:不可达;UNKNOWN:未知)string
vulList当前漏洞关联影响的所有漏洞信息集合arrayVulBaseInfoDto
vulNumList当前漏洞关联影响的所有漏洞编号集合array

VulBaseInfoDto

参数名称说明类型schema
cnnvdHomePage国家信息安全漏洞库的漏洞官方地址string
cnnvdNum国家信息安全漏洞库的漏洞编号string
cnnvdVulName漏洞名string
cnnvdVulType漏洞类型string
cveHomePage漏洞标识官网地址string
cvssLevel漏洞等级,CRITICAL:超危;HIGH:高危;MEDIUM:中危;LOW:低危string
exploited是否在野利用(1:是,0:不是)string
isExclusive是否为CSSA独家漏洞(1:是,0:不是)int32
num漏洞编号string
vulType漏洞编号类型(cssa、cve)string
cnnvdVictimList漏洞影响厂商集合array
cnnvdFirms漏洞影响产品(受影响实体)string
cnnvdDescription漏洞描述string
affectedTaskCount使用到当前漏洞的任务数int32

成功响应示例

json
{
  "code": "100000",
  "message": "操作成功",
  "data": {
    "pageNum": 1,
    "pageSize": 10,
    "totalPage": 1,
    "total": 3,
    "list": [
      {
        "cnnvdVulName": "Thinkgem JeeSite 输入验证错误漏洞",
        "cveNum": "CVE-2025-7763",
        "cssaNum": null,
        "cvssLevel": "MEDIUM",
        "cnnvdVulType": "输入验证错误",
        "cnnvdHomePage": "https://www.cnnvd.org.cn/home/globalSearch?keyword=CNNVD-202507-2375",
        "cveHomePage": "https://nvd.nist.gov/vuln/detail/CVE-2025-7763",
        "cnnvdNum": "CNNVD-202507-2375",
        "exploited": "1",
        "isExclusive": 0,
        "affectedTaskCount": 1,
        "reachable": "UNKNOWN",
        "vulNumList": [
          "CVE-2025-7763",
          "CSSA-2025-78420",
          "CSSA-2025-86356",
          "CSSA-2025-62841"
        ],
        "vulList": [
          {
            "cnnvdNum": "CNNVD-202507-2375",
            "cnnvdVulName": "Thinkgem JeeSite 输入验证错误漏洞",
            "cnnvdHomePage": "https://www.cnnvd.org.cn/home/globalSearch?keyword=CNNVD-202507-2375",
            "cnnvdDescription": "Thinkgem JeeSite是中国卓源(Thinkgem)公司的一套开源的Java EE企业级快速开发平台。该平台包括系统权限组件、数据权限组件、数据字典组件、核心工具组件、视图操作组件、工作流组件和代码生成组件等。\r\nThinkgem JeeSite 5.12.0及之前版本存在输入验证错误漏洞,该漏洞源于组件Site Controller/SSO处理不当导致开放重定向。",
            "cnnvdVictimList": [],
            "cnnvdFirms": "卓源",
            "num": "CVE-2025-7763",
            "vulType": "cve",
            "cveHomePage": "https://nvd.nist.gov/vuln/detail/CVE-2025-7763",
            "cvssLevel": "MEDIUM",
            "cnnvdVulType": "输入验证错误",
            "vulSource": null,
            "exploited": "1",
            "isExclusive": 0,
            "affectedTaskCount": 1
          },
          {
            "cnnvdNum": "",
            "cnnvdVulName": "Jeesite5开放重定向漏洞可能导致敏感信息泄露",
            "cnnvdHomePage": "https://www.cnnvd.org.cn/home/globalSearch?keyword=",
            "cnnvdDescription": "重定向函数redirectUrl存在用户可控参数传递缺陷,当解析含\"://\"协议标识符的外部URL时,未实施严格的白名单策略校验域合法性,攻击者可通过构造带恶意域名参数的请求链路,诱导目标用户访问预设的钓鱼页面或中间人代理节点,从而劫持用户会话Cookie或获取信任凭证,窃取身份认证令牌,造成业务流截获及虚假表单提交等二次攻击,威胁信息安全边界完整性。",
            "cnnvdVictimList": [],
            "cnnvdFirms": "",
            "num": "CSSA-2025-78420",
            "vulType": "cssa",
            "cveHomePage": "https://nvd.nist.gov/vuln/detail/null",
            "cvssLevel": "MEDIUM",
            "cnnvdVulType": "",
            "vulSource": null,
            "exploited": "0",
            "isExclusive": 0,
            "affectedTaskCount": 1
          },
          {
            "cnnvdNum": "",
            "cnnvdVulName": "jeesite5开放重定向漏洞允许远程诱导访问第三方站点",
            "cnnvdHomePage": "https://www.cnnvd.org.cn/home/globalSearch?keyword=",
            "cnnvdDescription": "重定向方法存在用户可控参数未校验缺陷,攻击者可通过构造包含恶意URL的SSO请求触发跨域重定向,在用户登录过程中劫持会话流至预设的第三方网址,该漏洞依赖AJAX请求处理逻辑缺陷与URL编码绕过机制,结合社会工程学手段可实施钓鱼攻击或中间人渗透。",
            "cnnvdVictimList": [],
            "cnnvdFirms": "",
            "num": "CSSA-2025-86356",
            "vulType": "cssa",
            "cveHomePage": "https://nvd.nist.gov/vuln/detail/null",
            "cvssLevel": "MEDIUM",
            "cnnvdVulType": "",
            "vulSource": null,
            "exploited": "0",
            "isExclusive": 0,
            "affectedTaskCount": 1
          },
          {
            "cnnvdNum": "",
            "cnnvdVulName": "Jeesite5开放重定向漏洞可诱导用户访问恶意网站",
            "cnnvdHomePage": "https://www.cnnvd.org.cn/home/globalSearch?keyword=",
            "cnnvdDescription": "SiteController.select方法未对用户提交的redirect参数实施有效校验,在接收到包含外域URL值时,代码直接拼接返回REDIRECT状态码,攻击者可通过构造携带恶意网址的请求参数触发非预期重定向,结合社会工程学手段诱导受害者访问指定位置,存在用户凭证泄露及业务流量劫持风险。",
            "cnnvdVictimList": [],
            "cnnvdFirms": "",
            "num": "CSSA-2025-62841",
            "vulType": "cssa",
            "cveHomePage": "https://nvd.nist.gov/vuln/detail/null",
            "cvssLevel": "LOW",
            "cnnvdVulType": "",
            "vulSource": null,
            "exploited": "0",
            "isExclusive": 0,
            "affectedTaskCount": 1
          }
        ]
      }
    ]
  },
  "success": true
}

失败响应示例

json
{
  "code": "100005",
  "message": "系统异常!",
  "data": null,
  "success": false
}

{
  "code": "120003",
  "message": "未找到任务执行实例",
  "data": null,
  "success": false
}

查询组件漏洞可达信息

基本信息

  • Path:{{ host }} /cleansourcesca-community/vulnerability/reachable/info/list
  • Method:POST

请求参数

Headers

参数名称参数值
Content-Typeapplication/json

Body

参数名称说明in是否必须类型schema
reachableInfoRequestreachableInfoRequestbodytrueReachableInfoRequestReachableInfoRequest

schema属性说明

ReachableInfoRequest

参数名称说明in是否必须类型schema
componentId组件idbodytruestring
cveNum漏洞编号bodytruestring
taskInstanceId扫描任务实例idbodytrueint64

请求示例

json
{
	"componentId": "12cf1abdf9f0a75ca93fb0de0f660c38",
	"cveNum": "CVE-2020-14061",
	"taskInstanceId": 32377
}

响应数据

响应状态码

状态码说明schema
100000OKCommonResult
201Created
401Unauthorized
403Forbidden
404Not Found
100005系统异常
120003未找到任务执行实例
  • 操作成功响应状态码:100000

  • 错误码描述:

    • 100005:系统异常!

    • 120003:未找到任务执行实例

响应参数

参数名称说明类型schema
codestring
dataVulReachableResponseVulReachableResponse
messagestring
successboolean

schema属性说明

VulReachableResponse

参数名称说明类型schema
callChainstring
componentCallChainobject
componentIdstring
cveNumstring
scanResultsarrayScanResultResponse

ScanResultResponse

参数名称说明类型schema
filePathstring
positionInfosarrayPositionInfoResponse

PositionInfoResponse

参数名称说明类型schema
funcSignaturestring
lineEndint32
lineStartint32
posEndint32
posStartint32
textstring

成功响应示例

json
{
  "code": "100000",
  "message": "Operation succeeded.",
  "data": {
    "componentId": "12cf1abdf9f0a75ca93fb0de0f660c38",
    "cveNum": "CVE-2020-14061",
    "callChain": null,
    "scanResults": [
      {
        "filePath": "Output/src/main/java/org/example/CVE_2020_10673_Test.java",
        "positionInfos": [
          {
            "posStart": 77,
            "posEnd": 394,
            "lineStart": 78,
            "lineEnd": 78,
            "text": "object7075626c6963204a736f6e446573657269616c697a65723c4f626a6563743e2066696e6456616c7565446573657269616c697a657228446573657269616c697a6174696f6e436f6e7465787420637478742c446573657269616c697a6572466163746f727920666163746f72792c204a617661547970652070726f70657274795479706529.findValueDeserializer(param0, param1, param2)",
            "funcSignature": "8f19ae7ac1cee9eceb004368a1459b3c"
          }
        ]
      },
      {
        "filePath": "Output/src/main/java/org/example/CVE_2020_36189_Test.java",
        "positionInfos": [
          {
            "posStart": 77,
            "posEnd": 394,
            "lineStart": 78,
            "lineEnd": 78,
            "text": "object7075626c6963204a736f6e446573657269616c697a65723c4f626a6563743e2066696e6456616c7565446573657269616c697a657228446573657269616c697a6174696f6e436f6e7465787420637478742c446573657269616c697a6572466163746f727920666163746f72792c204a617661547970652070726f70657274795479706529.findValueDeserializer(param0, param1, param2)",
            "funcSignature": "8f19ae7ac1cee9eceb004368a1459b3c"
          }
        ]
      },
      {
        "filePath": "Output/src/main/java/org/example/CVE_2020_9547_Test.java",
        "positionInfos": [
          {
            "posStart": 77,
            "posEnd": 394,
            "lineStart": 78,
            "lineEnd": 78,
            "text": "object7075626c6963204a736f6e446573657269616c697a65723c4f626a6563743e2066696e6456616c7565446573657269616c697a657228446573657269616c697a6174696f6e436f6e7465787420637478742c446573657269616c697a6572466163746f727920666163746f72792c204a617661547970652070726f70657274795479706529.findValueDeserializer(param0, param1, param2)",
            "funcSignature": "8f19ae7ac1cee9eceb004368a1459b3c"
          }
        ]
      },
      {
        "filePath": "Output/src/main/java/org/example/CVE_2020_10672_Test.java",
        "positionInfos": [
          {
            "posStart": 77,
            "posEnd": 394,
            "lineStart": 77,
            "lineEnd": 77,
            "text": "object7075626c6963204a736f6e446573657269616c697a65723c4f626a6563743e2066696e6456616c7565446573657269616c697a657228446573657269616c697a6174696f6e436f6e7465787420637478742c446573657269616c697a6572466163746f727920666163746f72792c204a617661547970652070726f70657274795479706529.findValueDeserializer(param0, param1, param2)",
            "funcSignature": "8f19ae7ac1cee9eceb004368a1459b3c"
          }
        ]
      }
    ],
    "componentCallChain": null
  },
  "success": true
}

失败响应示例

json
{
  "code": "100005",
  "message": "系统异常!",
  "data": null,
  "success": false
}

{
  "code": "120003",
  "message": "未找到任务执行实例",
  "data": null,
  "success": false
}

组件漏洞可达源码信息

基本信息

  • Path:{{ host }} /cleansourcesca-community/vulnerability/source_code/get
  • Method:POST

请求参数

Headers

参数名称参数值
Content-Typeapplication/json

Body

参数名称说明in是否必须类型schema
sourceFileRequestsourceFileRequestbodytrueSourceFileRequestSourceFileRequest

schema属性说明

SourceFileRequest

参数名称说明in是否必须类型schema
filePathbodyfalsestring
taskInstanceIdbodyfalseint64

请求示例

json
{
	"filePath": "Output/src/main/java/org/example/CVE_2020_10673_Test.java",
	"taskInstanceId": 32377
}

响应数据

响应状态码

状态码说明schema
100000OKCommonResult
201Created
401Unauthorized
403Forbidden
404Not Found
100005系统异常
120003未找到任务执行实例
160000获取漏洞可达源码文件失败!
  • 操作成功响应状态码:100000

  • 错误码描述:

    • 100005:系统异常!

    • 120003:未找到任务执行实例

    • 160000:获取漏洞可达源码文件失败!

响应参数

参数名称说明类型schema
codestring
dataSourceCodeResponseSourceCodeResponse
messagestring
successboolean

schema属性说明

SourceCodeResponse

参数名称说明类型schema
contentstring
sizeint64

成功响应示例

json
{
  "code": "100000",
  "message": "Operation succeeded.",
  "data": {
    "content": "package org.example;\nimport com.fasterxml.jackson.databind.deser.*;\nimport com.fasterxml.jackson.databind.*;\nimport com.fasterxml.jackson.databind.jsontype.impl.*;\nimport com.fasterxml.jackson.databind.deser.*;\nimport com.fasterxml.jackson.databind.*;\nimport com.fasterxml.jackson.databind.deser.*;\nimport com.fasterxml.jackson.databind.*;\nimport com.fasterxml.jackson.databind.*;\nimport com.fasterxml.jackson.core.*;\nimport java.io.*;\nimport java.net.*;\n\npublic class CVE_2020_10673_Test {\nprivate Object func0(Object object) {\nreturn this;\n}\nprivate Object func1(Object object) {\nreturn this;\n}\nprivate Object func2(Object object) {\nreturn this;\n}\nprivate Object func3(Object object) {\nreturn this;\n}\nprivate Object func4(Object object) {\nreturn this;\n}\nprivate Object func5(Object object) {\nreturn this;\n}\nprivate Object func6(Object object) {\nreturn this;\n}\nprivate Object func7(Object object) {\nreturn this;\n}\nprivate Object func8(Object object) {\nreturn this;\n}\nprivate Object func9(Object object) {\nreturn this;\n}\npublic static void main(String[] args) {\n\tDeserializerCache object70726f746563746564204a736f6e446573657269616c697a65723c3f3e205f637265617465446573657269616c697a65723228446573657269616c697a6174696f6e436f6e7465787420637478742c446573657269616c697a6572466163746f727920666163746f72792c204a6176615479706520747970652c204265616e4465736372697074696f6e206265616e4465736329 = new DeserializerCache();\n\tDeserializationContext param0 = new DeserializationContext();\n\tDeserializerFactory param1 = new DeserializerFactory();\n\tJavaType param2 = new JavaType();\n\tBeanDescription param3 = new BeanDescription();\n\tObject result = func0(func1(func2(func3(func4(func5(func6(func7(func8(func9(object70726f746563746564204a736f6e446573657269616c697a65723c3f3e205f637265617465446573657269616c697a65723228446573657269616c697a6174696f6e436f6e7465787420637478742c446573657269616c697a6572466163746f727920666163746f72792c204a6176615479706520747970652c204265616e4465736372697074696f6e206265616e4465736329._createDeserializer2(param0, param1, param2, param3)))))))))));\n\n\tDeserializerCache object70726f746563746564204a736f6e446573657269616c697a65723c4f626a6563743e205f637265617465416e6443616368653228446573657269616c697a6174696f6e436f6e7465787420637478742c446573657269616c697a6572466163746f727920666163746f72792c204a61766154797065207479706529 = new DeserializerCache();\n\tDeserializationContext param0 = new DeserializationContext();\n\tDeserializerFactory param1 = new DeserializerFactory();\n\tJavaType param2 = new JavaType();\n\tObject result = func0(func1(func2(func3(func4(func5(func6(func7(func8(func9(object70726f746563746564204a736f6e446573657269616c697a65723c4f626a6563743e205f637265617465416e6443616368653228446573657269616c697a6174696f6e436f6e7465787420637478742c446573657269616c697a6572466163746f727920666163746f72792c204a61766154797065207479706529._createAndCache2(param0, param1, param2)))))))))));\n\n\tObjectMapper object70726f746563746564204a736f6e446573657269616c697a65723c4f626a6563743e205f66696e64526f6f74446573657269616c697a657228446573657269616c697a6174696f6e436f6e7465787420637478742c4a617661547970652076616c75655479706529 = new ObjectMapper();\n\tDeserializationContext param0 = new DeserializationContext();\n\tJavaType param1 = new JavaType();\n\tObject result = func0(func1(func2(func3(func4(func5(func6(func7(func8(func9(object70726f746563746564204a736f6e446573657269616c697a65723c4f626a6563743e205f66696e64526f6f74446573657269616c697a657228446573657269616c697a6174696f6e436f6e7465787420637478742c4a617661547970652076616c75655479706529._findRootDeserializer(param0, param1)))))))))));\n\n\tSubTypeValidator object7075626c696320766f69642076616c69646174655375625479706528446573657269616c697a6174696f6e436f6e7465787420637478742c204a6176615479706520747970652c4265616e4465736372697074696f6e206265616e4465736329 = new SubTypeValidator();\n\tDeserializationContext param0 = new DeserializationContext();\n\tJavaType param1 = new JavaType();\n\tBeanDescription param2 = new BeanDescription();\n\tObject result = func0(func1(func2(func3(func4(func5(func6(func7(func8(func9(object7075626c696320766f69642076616c69646174655375625479706528446573657269616c697a6174696f6e436f6e7465787420637478742c204a6176615479706520747970652c4265616e4465736372697074696f6e206265616e4465736329.validateSubType(param0, param1, param2)))))))))));\n\n\tObjectMapper object70726f746563746564204a736f6e4e6f6465205f7265616454726565416e64436c6f7365284a736f6e50617273657220703029 = new ObjectMapper();\n\tJsonParser param0 = new JsonParser();\n\tObject result = func0(func1(func2(func3(func4(func5(func6(func7(func8(func9(object70726f746563746564204a736f6e4e6f6465205f7265616454726565416e64436c6f7365284a736f6e50617273657220703029._readTreeAndClose(param0)))))))))));\n\n\tDeserializerCache object7075626c6963204a736f6e446573657269616c697a65723c4f626a6563743e2066696e6456616c7565446573657269616c697a657228446573657269616c697a6174696f6e436f6e7465787420637478742c446573657269616c697a6572466163746f727920666163746f72792c204a617661547970652070726f70657274795479706529 = new DeserializerCache();\n\tDeserializationContext param0 = new DeserializationContext();\n\tDeserializerFactory param1 = new DeserializerFactory();\n\tJavaType param2 = new JavaType();\n\tObject result = func0(func1(func2(func3(func4(func5(func6(func7(func8(func9(object7075626c6963204a736f6e446573657269616c697a65723c4f626a6563743e2066696e6456616c7565446573657269616c697a657228446573657269616c697a6174696f6e436f6e7465787420637478742c446573657269616c697a6572466163746f727920666163746f72792c204a617661547970652070726f70657274795479706529.findValueDeserializer(param0, param1, param2)))))))))));\n\n\tBeanDeserializerFactory object7075626c6963204a736f6e446573657269616c697a65723c4f626a6563743e206372656174654265616e446573657269616c697a657228446573657269616c697a6174696f6e436f6e7465787420637478742c4a6176615479706520747970652c204265616e4465736372697074696f6e206265616e4465736329 = new BeanDeserializerFactory();\n\tDeserializationContext param0 = new DeserializationContext();\n\tJavaType param1 = new JavaType();\n\tBeanDescription param2 = new BeanDescription();\n\tObject result = func0(func1(func2(func3(func4(func5(func6(func7(func8(func9(object7075626c6963204a736f6e446573657269616c697a65723c4f626a6563743e206372656174654265616e446573657269616c697a657228446573657269616c697a6174696f6e436f6e7465787420637478742c4a6176615479706520747970652c204265616e4465736372697074696f6e206265616e4465736329.createBeanDeserializer(param0, param1, param2)))))))))));\n\n\tObjectMapper object7075626c6963204a736f6e4e6f646520726561645472656528526561646572207229 = new ObjectMapper();\n\tReader param0 = new Reader();\n\tObject result = func0(func1(func2(func3(func4(func5(func6(func7(func8(func9(object7075626c6963204a736f6e4e6f646520726561645472656528526561646572207229.readTree(param0)))))))))));\n\n\tDeserializerCache object70726f746563746564204a736f6e446573657269616c697a65723c4f626a6563743e205f637265617465416e64436163686556616c7565446573657269616c697a657228446573657269616c697a6174696f6e436f6e7465787420637478742c446573657269616c697a6572466163746f727920666163746f72792c204a61766154797065207479706529 = new DeserializerCache();\n\tDeserializationContext param0 = new DeserializationContext();\n\tDeserializerFactory param1 = new DeserializerFactory();\n\tJavaType param2 = new JavaType();\n\tObject result = func0(func1(func2(func3(func4(func5(func6(func7(func8(func9(object70726f746563746564204a736f6e446573657269616c697a65723c4f626a6563743e205f637265617465416e64436163686556616c7565446573657269616c697a657228446573657269616c697a6174696f6e436f6e7465787420637478742c446573657269616c697a6572466163746f727920666163746f72792c204a61766154797065207479706529._createAndCacheValueDeserializer(param0, param1, param2)))))))))));\n\n\tBeanDeserializerFactory object70726f74656374656420766f6964205f76616c69646174655375625479706528446573657269616c697a6174696f6e436f6e7465787420637478742c204a6176615479706520747970652c4265616e4465736372697074696f6e206265616e4465736329 = new BeanDeserializerFactory();\n\tDeserializationContext param0 = new DeserializationContext();\n\tJavaType param1 = new JavaType();\n\tBeanDescription param2 = new BeanDescription();\n\tObject result = func0(func1(func2(func3(func4(func5(func6(func7(func8(func9(object70726f74656374656420766f6964205f76616c69646174655375625479706528446573657269616c697a6174696f6e436f6e7465787420637478742c204a6176615479706520747970652c4265616e4465736372697074696f6e206265616e4465736329._validateSubType(param0, param1, param2)))))))))));\n\n\tDeserializerCache object70726f746563746564204a736f6e446573657269616c697a65723c4f626a6563743e205f637265617465446573657269616c697a657228446573657269616c697a6174696f6e436f6e7465787420637478742c446573657269616c697a6572466163746f727920666163746f72792c204a61766154797065207479706529 = new DeserializerCache();\n\tDeserializationContext param0 = new DeserializationContext();\n\tDeserializerFactory param1 = new DeserializerFactory();\n\tJavaType param2 = new JavaType();\n\tObject result = func0(func1(func2(func3(func4(func5(func6(func7(func8(func9(object70726f746563746564204a736f6e446573657269616c697a65723c4f626a6563743e205f637265617465446573657269616c697a657228446573657269616c697a6174696f6e436f6e7465787420637478742c446573657269616c697a6572466163746f727920666163746f72792c204a61766154797065207479706529._createDeserializer(param0, param1, param2)))))))))));\n\n\tObjectMapper object7075626c6963204a736f6e4e6f64652072656164547265652855524c20736f7572636529 = new ObjectMapper();\n\tURL param0 = new URL();\n\tObject result = func0(func1(func2(func3(func4(func5(func6(func7(func8(func9(object7075626c6963204a736f6e4e6f64652072656164547265652855524c20736f7572636529.readTree(param0)))))))))));\n\n\tDeserializationContext object7075626c69632066696e616c204a736f6e446573657269616c697a65723c4f626a6563743e2066696e64526f6f7456616c7565446573657269616c697a6572284a61766154797065207479706529 = new DeserializationContext();\n\tJavaType param0 = new JavaType();\n\tObject result = func0(func1(func2(func3(func4(func5(func6(func7(func8(func9(object7075626c69632066696e616c204a736f6e446573657269616c697a65723c4f626a6563743e2066696e64526f6f7456616c7565446573657269616c697a6572284a61766154797065207479706529.findRootValueDeserializer(param0)))))))))));\n\n\t}\n}\n",
    "size": 10154
  },
  "success": true
}

失败响应示例

json
{
  "code": "100005",
  "message": "系统异常!",
  "data": null,
  "success": false
}

{
  "code": "120003",
  "message": "未找到任务执行实例",
  "data": null,
  "success": false
}

{
  "code": "160000",
  "message": "获取漏洞可达源码文件失败!",
  "data": null,
  "success": false
}

cssa统计指标数据查询

基本信息

  • Path:{{ host }} /cleansourcesca-community/vulnerability/coreIndicators
  • Method:POST

请求参数

Headers

参数名称参数值
Content-Typeapplication/json

Body

参数名称说明in是否必须类型schema
暂无

schema属性说明

请求示例

json

响应数据

响应状态码

状态码说明schema
100000OKCommonResult
201Created
401Unauthorized
403Forbidden
404Not Found
100005系统异常
  • 操作成功响应状态码:100000

  • 错误码描述:

    • 100005:系统异常!

响应参数

参数名称说明类型schema
codestring
dataCodeIndicatorsResponseCodeIndicatorsResponse
messagestring
successboolean

schema属性说明

CodeIndicatorsResponse

参数名称说明类型schema
averagePercertionDays平均提前CVE感知天数number
cssaIncrCount今日新增cssa漏洞计数int32
incrHighLevelCount今日新增超危、高危漏洞计数int32
longestPercertionDays最长提前CVE感知天数int32
publicPocVulCount当前可检索的poc漏洞计数int32
totalVulCount漏洞总数int32
highLevelTotalCount超危、高危漏洞总数int32
cssaTotalCountcssa漏洞总数int32

成功响应示例

json
{
  "code": "100000",
  "message": "操作成功",
  "data": {
    "totalVulCount": 294336,
    "highLevelTotalCount": 116181,
    "incrHighLevelCount": 116181,
    "publicPocVulCount": 85044,
    "cssaTotalCount": 1030,
    "cssaIncrCount": 1030,
    "longestPercertionDays": 399,
    "averagePercertionDays": 30.6
  },
  "success": true
}

失败响应示例

json
{
  "code": "100005",
  "message": "系统异常!",
  "data": null,
  "success": false
}

查询今日独家cssa新增信息

基本信息

  • Path:{{ host }} /cleansourcesca-community/vulnerability/cssa/dailyRecords
  • Method:POST

请求参数

Headers

参数名称参数值
Content-Typeapplication/json

Body

参数名称说明in是否必须类型schema
暂无

schema属性说明

请求示例

json

响应数据

响应状态码

状态码说明schema
100000OKCommonResult
201Created
401Unauthorized
403Forbidden
404Not Found
100005系统异常
  • 操作成功响应状态码:100000

  • 错误码描述:

    • 100005:系统异常!

响应参数

参数名称说明类型schema
codestring
dataCssaDailyResponseCssaDailyResponse
messagestring
successboolean

schema属性说明

CssaDailyResponse

参数名称说明类型schema
affectedTaskCount当前漏洞影响任务数int32
cnnvdDescription漏洞描述string
cnnvdFirms漏洞影响厂商string
cnnvdNum国家信息安全漏洞库的漏洞编号string
cnnvdVictims受影响实体(组件版本)array
cnnvdVulName漏洞名称string
cnnvdVulType漏洞类型string
cssaNumcssa唯一编号string
cvssLevel漏洞等级string

成功响应示例

json
{
  "code": "100000",
  "message": "操作成功",
  "data": [
    {
      "cnnvdNum": null,
      "cnnvdVulName": " Awesome-AI-Dev-Platform-OpenSource PHP配置页敏感信息泄露致Cloudflare防护失效",
      "cssaNum": "CSSA-2025-63272",
      "cvssLevel": null,
      "cnnvdVulType": "",
      "cnnvdDescription": "该漏洞源于服务器未正确配置对/phpinfo.php路径的访问控制,当外部实体解析目标域名为Cloudflare节点时,仍可通过解析获得的真实IP直接访问相同路径获取相同内容,由此披露PHP版本、扩展模块清单及主机物理位置等元数据信息,攻击方可据此规避WAF规则,实施定向拒绝服务、横向扫描邻近资产或基于版本差异的供应链污染攻击,从而突破最小信任边界造成连续穿透式入侵。",
      "affectedTaskCount": 0,
      "cnnvdVictims": [],
      "cnnvdFirms": ""
    },
    {
      "cnnvdNum": null,
      "cnnvdVulName": " HamGPU资源分配无限制漏洞允许远程未授权访问导致服务质量下降",
      "cssaNum": "CSSA-2025-86121",
      "cvssLevel": null,
      "cnnvdVulType": "",
      "cnnvdDescription": "漏洞本质在于当Coresreq0参数输入时,调度器会因条件判断逻辑缺陷判定计算资源始终充足,致使此类Pod在调度阶段无需竞争检测即获准入队。运行态下该参数会被解析为100性能限额,实际形成零限制效果。攻击者可批量提交这类Pod申请,突破物理核数边界,既可抢占显式带宽保障的合法负载配额,又能无限叠加消耗剩余计算容量,进而触发跨租户资源劫持、服务响应延迟指数级增长等连锁故障。",
      "affectedTaskCount": 0,
      "cnnvdVictims": [],
      "cnnvdFirms": ""
    }
  ],
  "success": true
}

失败响应示例

json
{
  "code": "100005",
  "message": "系统异常!",
  "data": null,
  "success": false
}

查询今日cssa关联cve新增信息

基本信息

  • Path:{{ host }} /cleansourcesca-community/vulnerability/cssaCveMapping/dailyRecords
  • Method:POST

请求参数

Headers

参数名称参数值
Content-Typeapplication/json

Body

参数名称说明in是否必须类型schema
暂无

schema属性说明

请求示例

json

响应数据

响应状态码

状态码说明schema
100000OKCommonResult
201Created
401Unauthorized
403Forbidden
404Not Found
100005系统异常
  • 操作成功响应状态码:100000

  • 错误码描述:

    • 100005:系统异常!

响应参数

参数名称说明类型schema
codestring
dataCommonPage«CssaVulMappingResponse»CommonPage«CssaVulMappingResponse»
messagestring
successboolean

schema属性说明

CommonPage«CssaVulMappingResponse»

参数名称说明类型schema
list结果集合arrayCssaVulMappingResponse
pageNum当前页码int32
pageSize每页数据量int32
total总数int64
totalPage总页数int32

CssaVulMappingResponse

参数名称说明类型schema
affectedTaskCount影响任务数int32
cnnvdDescription漏洞描述string
cnnvdFirms漏洞影响厂商string
cnnvdHomePage国家信息安全漏洞库的漏洞官方地址string
cnnvdNum国家信息安全漏洞库的漏洞编号string
cnnvdVictims受影响实体(组件版本)array
cnnvdVulName漏洞名称string
cnnvdVulType漏洞类型string
cssaNumcssa唯一漏洞编号string
cssaPublishDateCSSA感知时间date-time
cveHomePagecve漏洞官方链接string
cveNumcve漏洞编号string
cvssLevel漏洞风险等级string
dayAdvanceCSSA提前感知天数string

成功响应示例

json
{
  "code": "100000",
  "message": "操作成功",
  "data": [
    {
      "cnnvdNum": "CNNVD-202508-2882",
      "cssaNum": "CSSA-2025-39158",
      "cnnvdVulName": "lrzip 安全漏洞",
      "cnnvdHomePage": "https://www.cnnvd.org.cn/home/globalSearch?keyword=CNNVD-202508-2882",
      "cveNum": "CVE-2025-9396",
      "cveHomePage": "https://nvd.nist.gov/vuln/detail/CVE-2025-9396",
      "cvssLevel": "MEDIUM",
      "dayAdvance": "13",
      "cssaPublishDate": null,
      "cnnvdVulType": "其他",
      "cnnvdDescription": "lrzip是Con Kolivas个人开发者的一个压缩实用程序。\r\nlrzip 0.651及之前版本存在安全漏洞,该漏洞源于strtol_l.c文件中的__GI_____strtol_l_internal函数存在空指针取消引用。",
      "affectedTaskCount": 0,
      "cnnvdVictims": [],
      "cnnvdFirms": "LIVE555"
    },
    {
      "cnnvdNum": "CNNVD-202508-2884",
      "cssaNum": "CSSA-2025-11283",
      "cnnvdVulName": "PoDoFo 安全漏洞",
      "cnnvdHomePage": "https://www.cnnvd.org.cn/home/globalSearch?keyword=CNNVD-202508-2884",
      "cveNum": "CVE-2025-9394",
      "cveHomePage": "https://nvd.nist.gov/vuln/detail/CVE-2025-9394",
      "cvssLevel": "MEDIUM",
      "dayAdvance": "13",
      "cssaPublishDate": null,
      "cnnvdVulType": "其他",
      "cnnvdDescription": "PoDoFo是PoDoFo开源的一个免费的可移植 C++ 库。\r\nPoDoFo 1.1.0-dev版本存在安全漏洞,该漏洞源于src/podofo/main/PdfTokenizer.cpp文件中的PdfTokenizer::DetermineDataType函数存在释放后重用。",
      "affectedTaskCount": 0,
      "cnnvdVictims": [],
      "cnnvdFirms": "Polkadot EVM"
    }
  ],
  "success": true
}

失败响应示例

json
{
  "code": "100005",
  "message": "系统异常!",
  "data": null,
  "success": false
}

查询漏洞影响组件

基本信息

  • Path:{{ host }} /cleansourcesca-community/vulnerability/victims_component/query
  • Method:POST

请求参数

Headers

参数名称参数值
Content-Typeapplication/json

Body

参数名称说明in是否必须类型schema
requestrequestbodytrueVictimsComponentRequestVictimsComponentRequest

schema属性说明

VictimsComponentRequest

参数名称说明in是否必须类型schema
componentName组件名称(精确查询)bodyfalsestring
pageNum当前页码int32true
pageSize每页数据量int32true
version组件版本(精确查询)bodyfalsestring
vulNum漏洞编号bodytruestring

请求示例

json
{
	"pageNum": 1,
	"pageSize": 3,
	"vulNum": "CVE-2022-26520"
}

响应数据

响应状态码

状态码说明schema
100000OKCommonResult
201Created
401Unauthorized
403Forbidden
404Not Found
100005系统异常
  • 操作成功响应状态码:100000

  • 错误码描述:

    • 100005:系统异常!

响应参数说明:

参数名称说明类型schema
codestring
dataCommonPage«VictimsComponentVersion»CommonPage«VictimsComponentVersion»
messagestring
successboolean

schema属性说明

CommonPage«VictimsComponentVersion»

参数名称说明类型schema
list返回结果集合arrayVictimsComponentVersion
pageNum当前页码int32
pageSize每页数据量int32
total总数int64
totalPage总页数int32

VictimsComponentVersion

参数名称说明类型schema
component组件名称string
componentId组件IDstring
componentVersion组件版本string
countProject影响任务数int32

成功响应示例

json
{
  "code": "100000",
  "message": "操作成功",
  "data": {
    "pageNum": 1,
    "pageSize": 3,
    "totalPage": 131,
    "total": 391,
    "list": [
      {
        "componentId": "d36faaa15ad24f005e0e8be33cfb2118",
        "component": "postgresql",
        "componentVersion": "42.1.4",
        "countProject": 15
      },
      {
        "componentId": "fa54a00dead6a49b8f8ac577e2876bf7",
        "component": "postgresql",
        "componentVersion": "42.1.1",
        "countProject": 13
      },
      {
        "componentId": "7477a1f55d5d842c9b51eb25e6aeeaa7",
        "component": "postgresql",
        "componentVersion": "42.2.2",
        "countProject": 8
      }
    ]
  },
  "success": true
}

失败响应示例

json
{
  "code": "100005",
  "message": "系统异常!",
  "data": null,
  "success": false
}

查询漏洞详情

基本信息

  • Path:{{ host }} /cleansourcesca-community/vulnerability/detail
  • Method:POST

请求参数

Headers

参数名称参数值
Content-Typeapplication/json

Body

参数名称说明in是否必须类型schema
param查询任务详情入参bodytrueVulDetailQueryParamVulDetailQueryParam

schema属性说明

VulDetailQueryParam

参数名称说明in是否必须类型schema
componentId组件IDbodyfalsestring
taskInstanceId任务实例IDbodyfalseint64
vulNum漏洞编号bodyfalsestring
vulType漏洞编号类型(cssa、cve)bodyfalsestring

请求示例

json
{
	"componentId": "6b7042dcef71fbbfd174992f621b1ddc",
	"taskInstanceId": 33163,
	"vulNum": "CVE-2025-7763",
	"vulType": "cve"
}

响应数据

响应状态码

状态码说明schema
100000OKCommonResult
201Created
401Unauthorized
403Forbidden
404Not Found
100005系统异常
  • 操作成功响应状态码:100000

  • 错误码描述:

    • 100005:系统异常!

响应参数

参数名称说明类型schema
codestring
dataVulListResponseVulListResponse
messagestring
successboolean

schema属性说明

VulListResponse

参数名称说明类型schema
affectedTaskCount漏洞影响任务数int32
cnnvdNum国家信息安全漏洞库的漏洞编号string
cnnvdHomePage国家信息安全漏洞库的漏洞官方地址string
cveHomePage漏洞标识官网地址string
cnnvdVulName漏洞名称string
cnnvdVulType漏洞类型string
cssaNumcssa漏洞编号string
cveNumcve漏洞编号string
cvssLevel漏洞风险等级(CRITICAL:超危;HIGH:高危;MEDIUM:中危;LOW:低危)string
exploited是否在野利用(1:是,0:不是)string
isExclusive是否为CSSA独家漏洞(1:是,0:不是)int32
reachable组件漏洞是否可达(REACHABLE:可达;UNREACHABLE:不可达;UNKNOWN:未知)string
vulList当前漏洞关联影响的所有漏洞信息集合arrayVulBaseInfoDto
vulNumList当前漏洞关联影响的所有漏洞编号集合array

VulBaseInfoDto

参数名称说明类型schema
cnnvdHomePage国家信息安全漏洞库的漏洞官方地址string
cnnvdNum国家信息安全漏洞库的漏洞编号string
cnnvdVulName漏洞名string
cnnvdVulType漏洞类型string
cveHomePage漏洞标识官网地址string
cvssLevel漏洞等级,CRITICAL:超危;HIGH:高危;MEDIUM:中危;LOW:低危string
exploited是否在野利用(1:是,0:不是)string
isExclusive是否为CSSA独家漏洞(1:是,0:不是)int32
num漏洞编号string
vulType漏洞编号类型(cssa、cve)string
cnnvdVictimList漏洞影响厂商集合array
cnnvdFirms漏洞影响产品(受影响实体)string
cnnvdDescription漏洞描述string
affectedTaskCount使用到当前漏洞的任务数int32

成功响应示例

json
{
  "code": "100000",
  "message": "操作成功",
  "data": {
    "cnnvdVulName": "Thinkgem JeeSite 输入验证错误漏洞",
    "cveNum": "CVE-2025-7763",
    "cssaNum": null,
    "cvssLevel": "MEDIUM",
    "cnnvdVulType": "输入验证错误",
    "cnnvdHomePage": "https://www.cnnvd.org.cn/home/globalSearch?keyword=CNNVD-202507-2375",
    "cveHomePage": "https://nvd.nist.gov/vuln/detail/CVE-2025-7763",
    "cnnvdNum": "CNNVD-202507-2375",
    "exploited": "1",
    "isExclusive": 0,
    "affectedTaskCount": 1,
    "reachable": "UNKNOWN",
    "vulNumList": [
      "CVE-2025-7763",
      "CVE-2025-7763",
      "CSSA-2025-86356",
      "CSSA-2025-62841",
      "CSSA-2025-78420"
    ],
    "vulList": [
      {
        "cnnvdNum": "CNNVD-202507-2375",
        "cnnvdVulName": "Thinkgem JeeSite 输入验证错误漏洞",
        "cnnvdHomePage": "https://www.cnnvd.org.cn/home/globalSearch?keyword=CNNVD-202507-2375",
        "cnnvdDescription": "Thinkgem JeeSite是中国卓源(Thinkgem)公司的一套开源的Java EE企业级快速开发平台。该平台包括系统权限组件、数据权限组件、数据字典组件、核心工具组件、视图操作组件、工作流组件和代码生成组件等。\r\nThinkgem JeeSite 5.12.0及之前版本存在输入验证错误漏洞,该漏洞源于组件Site Controller/SSO处理不当导致开放重定向。",
        "cnnvdVictimList": [],
        "cnnvdFirms": "卓源",
        "num": "CVE-2025-7763",
        "vulType": "cve",
        "cveHomePage": "https://nvd.nist.gov/vuln/detail/CVE-2025-7763",
        "cvssLevel": "MEDIUM",
        "cnnvdVulType": "输入验证错误",
        "vulSource": null,
        "exploited": "1",
        "isExclusive": 0,
        "affectedTaskCount": 1
      },
      {
        "cnnvdNum": "CNNVD-202507-2375",
        "cnnvdVulName": "Thinkgem JeeSite 输入验证错误漏洞",
        "cnnvdHomePage": "https://www.cnnvd.org.cn/home/globalSearch?keyword=CNNVD-202507-2375",
        "cnnvdDescription": "Thinkgem JeeSite是中国卓源(Thinkgem)公司的一套开源的Java EE企业级快速开发平台。该平台包括系统权限组件、数据权限组件、数据字典组件、核心工具组件、视图操作组件、工作流组件和代码生成组件等。\r\nThinkgem JeeSite 5.12.0及之前版本存在输入验证错误漏洞,该漏洞源于组件Site Controller/SSO处理不当导致开放重定向。",
        "cnnvdVictimList": [],
        "cnnvdFirms": "卓源",
        "num": "CVE-2025-7763",
        "vulType": "cve",
        "cveHomePage": "https://nvd.nist.gov/vuln/detail/CVE-2025-7763",
        "cvssLevel": "MEDIUM",
        "cnnvdVulType": "输入验证错误",
        "vulSource": null,
        "exploited": "1",
        "isExclusive": 0,
        "affectedTaskCount": 1
      },
      {
        "cnnvdNum": "CNNVD-202507-2375",
        "cnnvdVulName": "Thinkgem JeeSite 输入验证错误漏洞",
        "cnnvdHomePage": "https://www.cnnvd.org.cn/home/globalSearch?keyword=CNNVD-202507-2375",
        "cnnvdDescription": "Thinkgem JeeSite是中国卓源(Thinkgem)公司的一套开源的Java EE企业级快速开发平台。该平台包括系统权限组件、数据权限组件、数据字典组件、核心工具组件、视图操作组件、工作流组件和代码生成组件等。\r\nThinkgem JeeSite 5.12.0及之前版本存在输入验证错误漏洞,该漏洞源于组件Site Controller/SSO处理不当导致开放重定向。",
        "cnnvdVictimList": [],
        "cnnvdFirms": "卓源",
        "num": "CVE-2025-7763",
        "vulType": "cve",
        "cveHomePage": "https://nvd.nist.gov/vuln/detail/CVE-2025-7763",
        "cvssLevel": "MEDIUM",
        "cnnvdVulType": "输入验证错误",
        "vulSource": null,
        "exploited": "1",
        "isExclusive": 0,
        "affectedTaskCount": 1
      }
    ]
  },
  "success": true
}

失败响应示例

json
{
  "code": "100005",
  "message": "系统异常!",
  "data": null,
  "success": false
}