get_vulnerability_configurations
Retrieve precise configuration details for a specific vulnerability using CPE standards. Identify affected systems, products, and versions to plan targeted remediation, map asset vulnerabilities, and filter false positives. Input a CVE ID to access vulnerable configurations, including vendor, product, version range, and platform specifics.
Instructions
Get configuration information for a specific vulnerability
Use this tool when you need to understand exactly which systems, products, or versions are affected by a vulnerability. This information is essential for:
Determining if your specific product versions are vulnerable
Planning targeted remediation efforts
Conducting accurate asset vulnerability mapping
Filtering out false positives in vulnerability scanning
Understanding the scope of affected software/hardware configurations
The configuration data follows CPE (Common Platform Enumeration) standards to precisely identify affected systems.
Args: identifier (str): The unique CVE ID or UUID of the vulnerability to retrieve. Example formats: "CVE-2023-1234" or "123e4567-e89b-12d3-a456-426614174000"
Returns: Dict[str, Any]: List of vulnerable configurations for the specified vulnerability, where each configuration contains: - uuid: Unique identifier for this configuration record - cpe_id: Identifier for this CPE configuration - set_id: Identifier for the set this configuration belongs to - is_vulnerable: Boolean indicating if this configuration is vulnerable - vendor/vendor_display_name: The vendor of the affected product - product/product_display_name: The affected product name - product_type: Type of product (e.g., "application", "os") - Version range indicators: - versionStartIncluding/versionStartExcluding: Minimum affected version - versionEndIncluding/versionEndExcluding: Maximum affected version - updateStartIncluding/updateEndIncluding: Update version specifiers - Platform details: - edition: Edition of the product - language: Language of the product - sw_edition: Software edition information - target_sw: Target software environment (e.g., "wordpress") - target_hw: Target hardware environment - other: Additional targeting information - created_at/updated_at: Timestamps for record management - cve_id: The CVE identifier associated with this configuration
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| identifier | Yes |
Implementation Reference
- The complete handler function for the 'get_vulnerability_configurations' MCP tool. It is registered via the @mcp.tool() decorator and includes error handling via @handle_api_errors. The function takes a vulnerability identifier (CVE or UUID) and delegates to the malloryai_client to fetch vulnerable configurations, providing detailed CPE-based affected systems/products/versions information.@mcp.tool() @handle_api_errors async def get_vulnerability_configurations( identifier: str, ) -> Dict[str, Any]: """Get configuration information for a specific vulnerability Use this tool when you need to understand exactly which systems, products, or versions are affected by a vulnerability. This information is essential for: - Determining if your specific product versions are vulnerable - Planning targeted remediation efforts - Conducting accurate asset vulnerability mapping - Filtering out false positives in vulnerability scanning - Understanding the scope of affected software/hardware configurations The configuration data follows CPE (Common Platform Enumeration) standards to precisely identify affected systems. Args: identifier (str): The unique CVE ID or UUID of the vulnerability to retrieve. Example formats: "CVE-2023-1234" or "123e4567-e89b-12d3-a456-426614174000" Returns: Dict[str, Any]: List of vulnerable configurations for the specified vulnerability, where each configuration contains: - uuid: Unique identifier for this configuration record - cpe_id: Identifier for this CPE configuration - set_id: Identifier for the set this configuration belongs to - is_vulnerable: Boolean indicating if this configuration is vulnerable - vendor/vendor_display_name: The vendor of the affected product - product/product_display_name: The affected product name - product_type: Type of product (e.g., "application", "os") - Version range indicators: - versionStartIncluding/versionStartExcluding: Minimum affected version - versionEndIncluding/versionEndExcluding: Maximum affected version - updateStartIncluding/updateEndIncluding: Update version specifiers - Platform details: - edition: Edition of the product - language: Language of the product - sw_edition: Software edition information - target_sw: Target software environment (e.g., "wordpress") - target_hw: Target hardware environment - other: Additional targeting information - created_at/updated_at: Timestamps for record management - cve_id: The CVE identifier associated with this configuration An empty list indicates no specific configuration information is available. """ return await malloryai_client.vulnerabilities.get_vulnerability_configurations( identifier=identifier )
- malloryai/mcp/tools/vulnerabilities.py:185-185 (registration)The @mcp.tool() decorator registers the get_vulnerability_configurations function as an MCP tool.@mcp.tool()
- The function signature defines the input schema (identifier: str) and output type (Dict[str, Any]), with comprehensive documentation in the docstring describing parameters and return structure.async def get_vulnerability_configurations( identifier: str, ) -> Dict[str, Any]:
- The @handle_api_errors decorator provides error handling for API calls within the tool handler.@handle_api_errors