Enterprise Edition

Performing common tasks with the GraphQL API

  • Last updated: October 31, 2024

  • Read time: 14 Minutes

This page details some common tasks that you can perform using Burp Suite Enterprise Edition's GraphQL API.

This document is intended to complement the API reference, which contains full reference information on the GraphQL API and a brief introduction to GraphQL itself.

Query and mutation names

You must specify a name for any queries and mutations you use in the API. Query and mutation names should be specified directly after the query or mutation keyword. For example:

query <QueryNameHere> { <query type> { <query content> } }

Note that, while all queries and mutations must have a name, that name can be anything you choose. As such, the query and mutation names given in these examples are entirely arbitrary.

Retrieving a list of scans

This scans query returns the id and status of all scans in the database. In this simplified example, the API has returned three successful scans.

Request

query GetScan { scans { id status } }

Example response

{ "data": { "scans": [ { "id": "21029", "status": "succeeded" }, { "id": "21028", "status": "succeeded" }, { "id": "21027", "status": "succeeded" } ] } }

The scan object contains many additional fields that could potentially be added to the request. You can also remove either of these fields from the request if required.

For a list of additional fields that the scans query can return, see the Scan Object page of the API reference.

Retrieving the most recent scan for a site

This scans query takes a site_id and returns details of the most recent scan that has been run for that site. Specifically, it generates a list of scans sorted in descending order of start date, and then limits the number of entries in that list to one.

As well as timing and status information, the query returns a new_issue_count field detailing the number of issues found by this scan that were not found by the previous scan.

In this example we can see that the most recent scan for site_id 28 was successful and found no new issues.

Request

query getScans { scans(site_id: 28, limit: 1, sort_column: start, sort_order: desc) { id, status, start_time, end_time, scan_delta { new_issue_count }, } }

Example response

{ "data": { "scans": [ { "id": "21110", "status": "succeeded", "start_time": "2021-11-08T14:35:12.190Z", "end_time": "2021-11-08T15:04:09.013Z", "scan_delta": { "new_issue_count": 0 } } ] } }

The scan object contains many additional fields that could potentially be added to the request. You can also remove most of these fields from the request if required.

For a list of additional fields that the scans query can return, see the Scan Object page of the API reference.

Retrieving basic details for a specific scan

This scan query takes the id of a particular scan and returns the number of issues at each level of severity found during that scan, as well as the scan's status and site name.

In this example we can see that scan 21029 found five high-severity issues, one low-severity issue, and six information-only issues.

Request

query GetScan { scan (id: 21029) { status site_name issue_counts { high { total } medium { total } low { total } info { total } } } }

Example response

{ "data": { "scan": { "status": "succeeded", "site_name": "vulnerable-website", "issue_counts": { "high": { "total": 5 }, "medium": { "total": 0 }, "low": { "total": 1 }, "info": { "total": 6 } } } } }

The scan object contains many additional fields that could potentially be added to the request. You could also remove most of the fields specified in the example from the request if required.

For a list of valid scan fields, see the Scan Object page of the API reference.

Retrieving a list of scan configurations

In Burp Suite Enterprise Edition, a scan configuration defines various settings that determine how a scan is performed, such as the maximum link depth of the crawl, what types of issues to report, and the maximum time that a scan will run.

This scan_configurations query lists the id and name of all scan configurations that you have set up in Burp. In this simplified example, the API has retrieved details of three scan configurations.

Request

query GetScanConfigurations { scan_configurations { id name } }

Example response

{ "data": { "scan_configurations": [ { "id": "31556c28-38c9-415d-9a00-d3df51470a22", "name": "Audit checks - all except JavaScript analysis" }, { "id": "d8018e42-0467-4b44-80a8-a159ec691ddf", "name": "Audit checks - all except time-based detection methods" }, { "id": "542322ab-1984-45a2-810e-6d3410e1e01a", "name": "Audit checks - light active" } ] } }

For a list of additional fields that the scan_configurations query can return (including the scan_configuration_fragment_json field, which returns the configuration itself in JSON format), see the Scan Configuration Object page of the API reference.

Retrieving basic site tree details

In Burp Suite Enterprise Edition, the site tree is the hierarchical structure containing all sites and folders that are currently configured.

Each site and folder in the tree has a unique id and a parent_id. The tree structure is defined using these two fields. For example, if a folder has an id of 1 then any folders or sites located directly within that folder would have a parent_id of 1.

This site_tree query returns the id, parent_id, and name of all sites and folders in the tree. In this example, the API has returned four folders: 0 (root), 1, 2, and 3. 1 and 2 are top-level folders (i.e. direct children of root), and 3 is located within 2. There are also four sites, one located at the root level, two located within folder 1, and one located within folder 3.

Request

query SitesAndFolderInfo { site_tree { sites { id parent_id name } folders { id parent_id name } } }

Example response

{ "data": { "site_tree": { "sites": [ { "id": "81", "parent_id": "0", "name": "Global" }, { "id": "82", "parent_id": "1", "name": "Northern US" }, { "id": "38", "parent_id": "1", "name": "Southern US" }, { "id": "39", "parent_id": "3", "name": "UK" } ], "folders": [ { "id": "0", "parent_id": null, "name": "All Sites" }, { "id": "1", "parent_id": "0", "name": "US Sites" }, { "id": "2", "parent_id": "0", "name": "Europe Sites" }, { "id": "3", "parent_id": "2", "name": "UK Sites" } ] } } }

For a list of additional site fields that the site_tree query can return, see the Site Tree Object page of the API reference.

Retrieving scan issue information

This query gives an overview of the issue types found in a particular scan. Specifically, it returns three pieces of information:

  • The type_index of each high-severity issue type found during the scan. Note that, if required, you can amend or remove the severities field to change the severity of the issues returned.
  • A count of the total number of issues found during the scan
  • Further details on all issue instances that have a specific type_index, including a description and a serial number for each individual instance of the issue.

This example shows a request for information on scan 21029, with further details of all issue instances that have a type_index of 3146256 (External Service Interaction - HTTP). In this case, we can see that there were three different types of high-severity issue reported. Of the 12 total issue instances returned, one was an instance of an External Service Interaction - HTTP issue.

Looking up type indexes

A type_index is an identifier for a particular type of issue (as opposed to a specific instance of an issue). You can look up issue type values on the Issue Definitions page of the PortSwigger Support Center.

Please note that while we provide type indexes in both hexadecimal and decimal formats for reference purposes, the API only accepts decimal type_index values.

Request

query ScanInfo { scan(id: 21029) { issue_type_groups(severities: high) { issue_type { type_index } severity } issue_counts { total } issues(start: 0, count: 44, type_index: "3146256") { description_html path remediation_html serial_number } } }

Example response

{ "data": { "scan": { "issue_type_groups": [ { "issue_type": { "type_index": "3146240" }, "severity": "high" }, { "issue_type": { "type_index": "3146256" }, "severity": "high" }, { "issue_type": { "type_index": "1051648" }, "severity": "high" } ], "issue_counts": { "total": 12 }, "issues": [ { "description_html": "It is possible to induce the application to perform server-side HTTP requests to arbitrary domains.<br><br>The payload <b>http://929xszo277xq82vclxu5rykbr2xvlmca2ytlj98.burpcollaborator.net/?foo</b> was submitted in the <b>q</b> field.<br><br>The application performed an HTTP request to the specified domain.<br><br>Burp Infiltrator detected that input is being passed to a potentially unsafe API.", "path": "/http-collaborator", "remediation_html": null, "serial_number": "6150599811840047104" } ] } } }

The scan object contains many additional fields that could potentially be added to the request. You could also remove most of the example fields from the request if required. For a list of valid scan fields, see the Scan Object page of the API reference.

Retrieving all issues for a scan

This scan query returns the serial_number and the name of the relevant issue_type for all issue instances found by a particular scan.

In this example, we can see that scan 21029 found 12 individual issues, of which all had a different issue_type.

Request

query GetScan { scan(id: 21029) { issues(start: 0, count: 1000) { issue_type { name } serial_number } } }

Example response

{ "data": { "scan": { "issues": [ { "issue_type": { "name": "External service interaction (DNS)" }, "serial_number": "432120106538718976" }, { "issue_type": { "name": "External service interaction (HTTP)" }, "serial_number": "6150595811840047104" }, { "issue_type": { "name": "JavaScript injection (DOM-based)" }, "serial_number": "4716073395305441280" }, { "issue_type": { "name": "PHP code injection" }, "serial_number": "540804386956503040" }, { "issue_type": { "name": "SQL injection" }, "serial_number": "17259916985675520" }, { "issue_type": { "name": "Unencrypted communications" }, "serial_number": "3974375729790973952" }, { "issue_type": { "name": "HTML does not specify charset" }, "serial_number": "4889966492298873856" }, { "issue_type": { "name": "Credit card numbers disclosed" }, "serial_number": "2403021217137964032" }, { "issue_type": { "name": "Email addresses disclosed" }, "serial_number": "5872016766220388352" }, { "issue_type": { "name": "Input returned in response (stored)" }, "serial_number": "4102206774889574400" }, { "issue_type": { "name": "File path traversal" }, "serial_number": "2466965706342529024" }, { "issue_type": { "name": "Suspicious input transformation (stored)" }, "serial_number": "3364917051419260928" } ] } } }

The issue object contains many additional fields that could potentially be added to the request. For a list of valid issue fields, see the Issue Object page of the API reference.

Retrieving detailed information about a specific issue

This query returns detailed information on a specified issue instance.

This example shows a request for information on an issue instance with the serial_number 6150599811840047104, as found by scan 21029. The response shows that this is an instance of an External Service Interaction - HTTP issue, and gives extensive information on the circumstances in which the issue was discovered.

Request

query Issue { issue(scan_id: 21029, serial_number: 6150599811840047104) { issue_type { type_index name description_html remediation_html vulnerability_classifications_html references_html } confidence display_confidence serial_number description_html remediation_html severity path origin novelty evidence { ... on Request { request_index request_count request_segments { ... on DataSegment { data_html } ... on HighlightSegment { highlight_html } ... on SnipSegment { snip_length } } } ... on Response { response_index response_count response_segments { ... on DataSegment { data_html } ... on HighlightSegment { highlight_html } ... on SnipSegment { snip_length } } } ... on HttpInteraction { title description_html request { ... on DataSegment { data_html } ... on HighlightSegment { highlight_html } ... on SnipSegment { snip_length } } response { ... on DataSegment { data_html } ... on HighlightSegment { highlight_html } ... on SnipSegment { snip_length } } } ... on DescriptiveEvidence { title description_html } } } }

Example response

{ "data":{ "issue":{ "issue_type":{ "type_index":"3146256", "name":"External service interaction (HTTP)", "description_html":"<p>External service interaction arises when it is possible to induce an application to interact with an arbitrary external service, such as a web or mail server. The ability to trigger arbitrary external service interactions does not constitute a vulnerability in its own right, and in some cases might even be the intended behavior of the application.\nHowever, in many cases, it can indicate a vulnerability with serious consequences.</p>\n<p>The ability to send requests to other systems can allow the vulnerable server to be used as an attack proxy.\n By submitting suitable payloads, an attacker can cause the application server to attack other systems that it can interact with. \n This may include public third-party systems, internal systems within the same organization, or services available on the local loopback adapter of the application server itself. \n Depending on the network architecture, this may expose highly vulnerable internal services that are not otherwise accessible to external attackers. </p>", "remediation_html":"<p>You should review the purpose and intended use of the relevant application functionality, \n and determine whether the ability to trigger arbitrary external service interactions is intended behavior. \n If so, you should be aware of the types of attacks that can be performed via this behavior and take appropriate measures. \n These measures might include blocking network access from the application server to other internal systems, and hardening the application server itself to remove any services available on the local loopback adapter.</p>\n<p>If the ability to trigger arbitrary external service interactions is not intended behavior, then you should implement a whitelist of permitted services and hosts, and block any interactions that do not appear on this whitelist.</p>\n\n<p>Out-of-Band Application Security Testing (OAST) is highly effective at uncovering high-risk features, to the point where finding the root cause of an interaction can be quite challenging. To find the source of an external service interaction, try to identify whether it is triggered by specific application functionality, or occurs indiscriminately on all requests. If it occurs on all endpoints, a front-end CDN or application firewall may be responsible, or a back-end analytics system parsing server logs. In some cases, interactions may originate from third-party systems; for example, a HTTP request may trigger a poisoned email which passes through a link-scanner on its way to the recipient.</p>", "vulnerability_classifications_html":"<ul>\n<li><a href=\"https://cwe.mitre.org/data/definitions/918.html\">CWE-918: Server-Side Request Forgery (SSRF)</a></li>\n<li><a href=\"https://cwe.mitre.org/data/definitions/406.html\">CWE-406: Insufficient Control of Network Message Volume (Network Amplification)</a></li>\n</ul>", "references_html":"<ul>\n <li><a href=\"https://portswigger.net/blog/introducing-burp-collaborator\">Burp Collaborator</a></li>\n <li><a href=\"https://portswigger.net/burp/application-security-testing/oast\">Out-of-band application security testing (OAST)</a></li>\n <li><a href=\"https://portswigger.net/research/cracking-the-lens-targeting-https-hidden-attack-surface\">PortSwigger Research: Cracking the Lens</a></li>\n</ul>" }, "confidence":"certain", "display_confidence":null, "serial_number":"6150599811840047104", "description_html":"It is possible to induce the application to perform server-side HTTP requests to arbitrary domains.<br><br>The payload <b>http://929xszo277xq82vclxu5rykbr2xvlmca2ytlj98.burpcollaborator.net/?foo</b> was submitted in the <b>q</b> field.<br><br>The application performed an HTTP request to the specified domain.<br><br>Burp Infiltrator detected that input is being passed to a potentially unsafe API.", "remediation_html":null, "severity":"high", "path":"/http-collaborator", "origin":"http://vulnerable-website.com", "novelty":"regression", "evidence":[ { "request_index":0, "request_count":2, "request_segments":[ { "data_html":"GET /http-collaborator?q=" }, { "highlight_html":"http%3a%2f%2f929xszo277xq82vclxu5rykbr2xvlmca2ytlj98.burpcollaborator.net%2f%3ffoo" }, { "data_html":" HTTP/1.1\r\nHost: vulnerable-website.com\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nAccept-Language: en-US,en-GB;q=0.9,en;q=0.8\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.54 Safari/537.36\r\nConnection: close\r\nCache-Control: max-age=0\r\nReferer: http://vulnerable-website.com/http-collaborator\r\n\r\n" } ] }, { "response_index":0, "response_count":2, "response_segments":[ { "data_html":"HTTP/1.1 200 OK\r\nDate: Wed, 03 Nov 2021 13:48:49 GMT\r\nContent-Type: text/html; charset=UTF-8\r\nContent-Length: 94\r\nConnection: close\r\nX-frame-options: DENY\r\n\r\n<html><h1>HTTP Collaborator Evidence</h1><body><a href='?q=foo'>collaborator</a></body></html>" } ] }, { "request_index":1, "request_count":2, "request_segments":[ { "data_html":"GET /http-collaborator?q=" }, { "highlight_html":"http%3a%2f%2fvkjjal6optfcqody3jcr9k2x9ofh38uwkkb71vq.burpcollaborator.net%2f%3ffoo" }, { "data_html":" HTTP/1.1\r\nHost: vulnerable-website.com\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nAccept-Language: en-US,en-GB;q=0.9,en;q=0.8\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.54 Safari/537.36\r\nConnection: close\r\nCache-Control: max-age=0\r\nReferer: http://vulnerable-website.com/http-collaborator\r\n\r\n" } ] }, { "response_index":1, "response_count":2, "response_segments":[ { "data_html":"HTTP/1.1 200 OK\r\nDate: Wed, 03 Nov 2021 13:48:50 GMT\r\nContent-Type: text/html; charset=UTF-8\r\nContent-Length: 94\r\nConnection: close\r\nX-frame-options: DENY\r\n\r\n<html><h1>HTTP Collaborator Evidence</h1><body><a href='?q=foo'>collaborator</a></body></html>" } ] }, { "title":"Collaborator HTTP interaction", "description_html":"<div>\n<p>\nThe Collaborator server received an HTTP request.<br><br> The request was received from IP address 52.211.196.189 at 2021-Nov-03 13:48:49 UTC.\n</p>\n</div>", "request":[ { "data_html":"GET /?foo HTTP/1.1\r\nUser-Agent: Java/1.8.0_212\r\nHost: " }, { "highlight_html":"929xszo277xq82vclxu5rykbr2xvlmca2ytlj98.burpcollaborator.net" }, { "data_html":"\r\nAccept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2\r\nConnection: keep-alive\r\n\r\n" } ], "response":[ { "data_html":"HTTP/1.1 200 OK\r\nServer: Burp Collaborator https://burpcollaborator.net/\r\nX-Collaborator-Version: 4\r\nContent-Type: text/html\r\nContent-Length: 62\r\n\r\n<html><body>giuovbxib34f2id10pll5zzjlgjjgigjfigz</body></html>" } ] }, { "title":"Unsafe API call", "description_html":"<div class=\"unsafe-api-call-description\">\n<p>Burp Infiltrator detected that input is being passed to the following API:</p>\n<pre class=\"code\">java.net.URLConnection java.net.URL.openConnection() throws java.io.IOException</pre>\n\n<p>\nThe following value was passed to the object's constructor:\n</p>\n\n<pre class=\"code\">http://vkjjal6optfcqody3jcr9k2x9ofh38uwkkb71vq.burpcollaborator.net/?foo</pre>\n\n<p>The call stack when the API was invoked was:</p>\n<pre class=\"code\">net.portswigger.VulnerableServer$HttpCollaborator.getResponse(VulnerableServer.java:428)\nnet.portswigger.VulnerableServer$AbstractHttpHandler.handle(VulnerableServer.java:175)\ncom.sun.net.httpserver.Filter$Chain.doFilter(Filter.java:79)\nsun.net.httpserver.AuthFilter.doFilter(AuthFilter.java:83)\ncom.sun.net.httpserver.Filter$Chain.doFilter(Filter.java:82)\nsun.net.httpserver.ServerImpl$Exchange$LinkHandler.handle(ServerImpl.java:675)\ncom.sun.net.httpserver.Filter$Chain.doFilter(Filter.java:79)\nsun.net.httpserver.ServerImpl$Exchange.run(ServerImpl.java:647)\njava.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)\njava.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)\njava.lang.Thread.run(Thread.java:748)\n</pre>\n</div>" } ] } } }

You can remove most of the fields in this example to filter the information returned if required. For information on the structure of the issue object, see the Issue Object page of the API reference.

Generating a scan remediation report

This scan_report query returns a Scan Remediation report for a specified scan. The Scan Remediation report is a web page containing a breakdown of the issues that were returned by the scan, including background, remediation advice, and the location at which the issue was found.

This example shows a request to get the scan report for scan 21029, with any false positives returned by that scan omitted. Note that this example omits the HTML content of the report itself for space reasons.

Request

query GetScanReport { scan_report(scan_id: 21029, include_false_positives: false) { report_html } }

Example response

{ "data": { "scan_report": { "report_html": "<html></html>" } } }

The scan_report query has several additional fields that you can use to filter the information included in the scan. For a full list of these fields, see the Queries page of the API reference.

Unescaping the report HTML

The HTML returned by the scan_report query is JSON-escaped. The escaped characters are necessary in order to transfer the report safely.

As such, you will need to perform some processing on the HTML in order to view it as a web page. To do so:

  1. Extract the HTML content from the API response by copying everything between the two <html> tags and pasting it into a text file.
  2. JSON-unescape the HTML. There are various tools online that you can use for this purpose.
  3. Save the unescaped HTML into a .html file.
  4. Open the .html file in a web browser to view the report.

Creating a site

The create_site mutation creates a new site within Burp Suite Enterprise Edition's site tree. This example shows a successful request to create a new site. The API response contains confirmation of the site details that were provided in the request.

Note

You need to set a valid parent_id for the location of your new site. If you set parent_id: to 0, the site is created in the root folder.

Request

mutation CreateSite { create_site(input: {name: "MyVulnerableWebsite", parent_id: 0, application_logins: {login_credentials: [], recorded_logins: []} , scope_v2: {start_urls: "https://vulnerable-website.com/", protocol_options: USE_SPECIFIED_PROTOCOLS}}) { site { id parent_id scope_v2 { start_urls protocol_options } application_logins { login_credentials { id label username } recorded_logins { id label } } email_recipients { email } } } }

Example response

{ "data": { "create_site": { "site": { "id": "89", "parent_id": "0", "scope_v2": { "start_urls": [ "https://vulnerable-website.com/" ], "protocol_options": "USE_SPECIFIED_PROTOCOLS" }, "application_logins": { "login_credentials": [], "recorded_logins": [] }, "email_recipients": [] } } } }

The fields that can be used when creating a new site are defined by the CreateSiteInput object. For more information on available fields when creating a new site, see the Create Site Input Object page of the API reference.

Note

In this example we have added two addresses as email recipients. These addresses will automatically receive a scan report whenever a scan finishes for the site.

Your SMTP server must be configured in order for Burp Suite Enterprise Edition to send email notifications. For more information on how to set up your SMTP server, see Configuring your SMTP server.

Scheduling a new scan

This create_schedule_item mutation enables you to schedule a scan for a particular site.

The example shows a request to schedule a scan for site_id 2.

Request

mutation CreateScheduleItem { create_schedule_item(input: {site_id: "2"}) { schedule_item { id schedule { rrule initial_run_time } scheduled_run_time } } }

Example response

{ "data":{ "create_schedule_item":{ "schedule_item":{ "id":"21042", "schedule":{ "rrule":null, "initial_run_time":"2021-11-04T11:07:25.664Z" }, "scheduled_run_time":null } } } }

If required, you can specify scheduling and configuration information within the create_schedule_item mutation. For information on the fields accepted by create_schedule_item, see the Create Schedule Item Mutation page of the API reference.

Moving a site to a new folder

The move_site mutation moves a given site to a different location within the site tree hierarchy. Specifically, it enables you to specify a new parent_id for the specified site.

This example shows a request to move a site with an id of 89 to the root folder (i.e. the folder with an id of 0).

Request

mutation MoveSitetoSpecFolder { move_site(input: {site_id: 89, parent_id: 0}) { site { id name parent_id scope_v2 { start_urls } scan_configurations { id } } }

Example response

{ "data":{ "move_site":{ "site":{ "id":"89", "name":"MyVulnerableWebsite", "parent_id":"0", "scope_v2":{ "start_urls":[ "https://vulnerable-website.com/" ] }, "scan_configurations":[ ] } } } }

The move_site mutation can return various other site fields if required. For a list of these fields, see the Site Object page of the API reference.

Was this article helpful?