Action Details; Action Id, Action Display Id, Action Name, Action Release Date, Action Description, Action Affected Os, Action Affected Products, Action Affected Platforms, Action Category, Attack Module, Mitres, Unified Kill Chains, Module Based Details, Owasp, Reference Links

About

Reach details of the endpoint Action Details List using this endpoint as in Picus Threat Library. The endpoint returns data such as; Action Id, Release Date, Description, Affected OS, Affected Products, Affected Platforms, Category, Attack Module and other details including MITRE ATT&CK and Unified Kill Chain phases.

Example

Get action details for action id is 1.

curl --request GET \
     --url https://api.picussecurity.com/v1/threat-library/actions/1 \
     --header 'Accept: application/json' \
     --header 'Authorization: Bearer access_token'
{
    "id": 1,
    "created_at": 1634903854000,
    "updated_at": 1708095841354,
    "display_id": 541733,
    "name": "XSS Evasion via title HTML Tag",
    "description": "This attack contains a payload of the XSS which include title HTML tag. title tag doesn't interpret inline HTML and attacker can use this payload without using any quote char in attributes. An attacker can use such an XSS attack to send a malicious script to an unsuspecting user. Because the end user's browser thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by your browser and used with that site.",
    "release_date": 1635248233,
    "affected_os": [
        "Windows",
        "macOS",
        "Linux"
    ],
    "tags": [
        "XSS Evasion"
    ],
    "cwe": "CWE-79",
    "attack_category": "Web Application",
    "attack_module": "Web Application",
    "owasp": "Injection",
    "module_based_details": {},
    "references": {
        "cwe_reference": {
            "name": "CWE-79",
            "link": "https://cwe.mitre.org/data/definitions/79"
        }
    }
}
Language
Authorization
Header
Click Try It! to start a request and see the response here!