Closed jeFF0Falltrades closed 1 week ago
Some additional context:
It looks like the model was revised in the latest spec update and significantly reduced, which explains the second output using the latest commit I posted above:
The root cause in release v0.6.0 is captured in this commit:
where it appears the 2 CVSS base fields are both labeled as string types, when they should ostensibly be some kind of struct/object.
@jeFF0Falltrades good catch and you're absolutely correct. It looks like the model for this is probably being defined by two different endpoints and causing a mismatch similar to #425 the actual model defined in the api spec could also be wrong which is why v0.6.0
is incorrect.
I'll need some time to dig into this and figure out what exactly is happening. Thank you for reporting the issue!
Thanks so much for the confirmation and quick response @ffalor ! Best of luck in the fix
hey @jeFF0Falltrades this should be fixed in v0.9.0
thanks for your help on this!
hey @jeFF0Falltrades this should be fixed in
v0.9.0
thanks for your help on this!
You did all the hard work - Thank you!!
I am attempting to utilize
Intel.GetVulnerabilities()
to query a vulnerability by CVE ID and retrieve intelligence on that vulnerability, similar to the example shown in the "Vulnerability Intelligence APIs" documentation, but usinggofalcon
.Every request appears to return an unmarshaling error due to the type of
DomainVulnerability.resources.cvss_v2_base
, as seen in this simple example:I confirmed the same API call using curl returns the expected output:
Since
cvss_v2_base
appears to be a JSON object, I'm wondering if somewhere it's being incorrectly labeled/unmarshaled as a string object.Interestingly, if I use the latest commit in the repo instead of the published v0.6.0 release, the call is successful, and returns a DomainVulnerability object:
But that doesn't appear to be the desired output I want if I am POST'ing to
/intel/entities/vulnerabilities/GET/v1
- According to the API documentation, it should be more like the above output which includes general intelligence on that CVE, not anything about impacted assets.Perhaps there is a model-mismatch somewhere that is causing issues with Swagger?