Vulnerability Types
  • 05 Sep 2024
  • 2 Minutes to read
  • PDF

Vulnerability Types

  • PDF

Article summary

Vulnerability Types are the security weaknesses in your application that Traceable can detect during API security testing. Traceable checks for these weaknesses as they may be potential threats, such as a JWT anomaly or local file inclusion. Traceable allows you to configure and manage vulnerability types according to your requirements.


The vulnerability types are divided into two categories:

  • Traceable — This category lists the out-of-the-box vulnerability types Traceable provides. These vulnerability types help you identify some of the most common threats. While default values are assigned to each attribute in a vulnerability type, you can edit some of these attributes according to your requirements. For more information, see Traceable vulnerability type.

  • Custom — This category lists the vulnerability types you create by defining logic, such as severity and tags, according to your requirements. For more information, see Custom vulnerability type.

While creating a policy, you can select the vulnerability type you want Traceable to check for in your APIs. Based on your selection, Traceable checks for vulnerabilities as part of suite scans. For more information on how Traceable scans your APIs, see Working of API Security Testing.

Note

Custom vulnerability types should be linked to a custom plugin for it to be visible while creating a policy.


Traceable vulnerability type

Traceable, by default, provides you with some vulnerability types on the Vulnerability Types page. On this page, under the Traceable tab, you can view the following:

  • Vulnerability Type — The type of vulnerability Traceable can detect.

  • Plugin Sources — The test plugin that detects the vulnerability type. For more information, see Test and Custom Plugins.

  • Severity — The severity assigned to the vulnerability type.

You can also edit some attributes in these pre-defined vulnerabilities to fine-tune them according to your requirements. To edit a pre-defined vulnerability type, complete the following steps:

  1. Click the Ellipse (traceable_ellipse_icon) icon corresponding to the vulnerability type you want to edit.

  2. Click Edit.

  3. In the Edit Vulnerability Type screen, do the following according to your requirements:

    • Update the Severity, for example, Critical.

    • Update the CVSS string, for example, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.

    • Update the CVSS score, for example, 9.8.

    • Update the Estimated Fix Time (hours), for example, 18.

    • Add Custom Tags, for example, Key as Compliance and Value as PCI DSS, Personal.

  4. Click Update.

You can reset the vulnerability type to its original state by clicking the Ellipse (traceable_ellipse_icon) icon → Reset.


Custom vulnerability type

You can create custom vulnerability types by specifying various attributes according to your requirements. You can use these vulnerability types while creating a custom plugin.

To define a custom vulnerability type, complete the following steps:

  1. In the page’s top right corner, click Create.

  2. In the code block, define your custom logic for the vulnerability type, such as name, tags, severity, and mitigation.

    Note

    You cannot change the name attribute of the custom vulnerability type post-creation.

  3. Click Create.

You can view the created vulnerability type under the Custom tab. You can also click the Ellipse (traceable_ellipse_icon) icon corresponding to a vulnerability type to edit or delete it.


Was this article helpful?