Scan details
The Scan Details Page provides detailed insights into a specific scan execution for an API collection. It contains three main sections: Scan Information, Statistics (with a Pie Chart), and the Vulnerability List Tab. Below is a detailed explanation of each section.
1. Scan Information
This section displays metadata related to the specific scan execution. It helps users identify the details of the scan.
- URL: The base URL of the API that was scanned (e.g.,
http://haircutkart.com/routes
). - Started: The date and time when the scan began (e.g.,
Dec 21, 2024, 1:14 PM
). - Started By: The name or identifier of the user who initiated the scan (e.g.,
daisy m
). - Duration: The total time taken to complete the scan (e.g.,
1m 47s
).
2. Statistics (with Pie Chart)
This section summarizes the scan results, providing an overview of the vulnerabilities detected and endpoint details.
Components:
- Pie Chart: Visual representation of the severity levels of vulnerabilities detected.
- Color-Coded Sections:
- Amber: Critical vulnerabilities.
- Red: High vulnerabilities.
- Yellow: Medium vulnerabilities.
- Green: Low vulnerabilities.
- Statistics Summary: This section provides a quick summary of scan performance and outcomes, helping prioritize actions based on severity.
- Vulnerabilities: The total number of vulnerabilities detected in this scan (e.g.,
34
). - Attack Requests Sent: Total number of requests made to test the endpoints (e.g.,
996
). - Endpoints: The total number of endpoints scanned (e.g.,
60
). - Authenticated: Number of endpoints secured with authentication mechanisms (e.g.,
31
). - Overall Security Status:
- Highlighted in red as Critical to indicate the overall risk level for this scan.
3. Vulnerability List Tab
The Vulnerability List Tab provides a detailed breakdown of vulnerabilities detected during the scan. It allows users to analyze and address each issue.
Columns:
- Severity:
- Displays the severity level of the vulnerability (e.g., Critical, High, Medium).
- Icons and colors are used for quick identification:
- Amber: Critical
- Red: High
- Yellow: Medium
- Green: Low
- Title:
- The name or description of the vulnerability.
- Includes a unique identifier (e.g.,
#H4PRCN
) for easier reference. - Example: "Malicious JavaScript Injection via Supply Chain Attack (polyfill.io)".
- Endpoint:
- The specific endpoint where the vulnerability was detected (e.g.,
https://haircutkart.com/routes/service
). - Links allow users to trace the vulnerability back to its source.
- Status:
- Displays the current state of the vulnerability, defaulting to Open.
- A dropdown menu allows users to update the status (e.g., Open, False Positive and Accepted Risk).
4. Ignored Vulnerability
It is the list of vulnerabilities with False Positive and Accepted Risk
The Execution Details Page is designed to give a comprehensive view of a scan execution, helping users understand the vulnerabilities detected, their severity, and where they occur. It aids in prioritizing security tasks and ensures that API vulnerabilities are managed effectively.