Kestrel
tcp/443
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1aad035499487f24f02bb9c78984440b37d40fb4772d8061c
Public Swagger UI/API detected at path: /swagger/index.html - sample paths:
GET /api/Mottaker/Sak/{sakId}
GET /api/Mottaker/Sak/{sakId}/Dialog
GET /api/Produkteier/Sak/{sakId}
GET /api/Produkteier/Sak/{sakId}/Dialog
GET /api/SakWizard/ExecuteSakTestCommand/{commandSessionId}
GET /api/SakWizard/Files/GetUploadSas
GET /api/SakWizard/GetAttachments
GET /api/SakWizard/GetMottakerListItems
GET /api/SakWizard/LastSakKontakter/{produktEierGln}/produkteier
GET /api/SakWizard/ProduktSearch
GET /api/SakWizard/ProduktSearchEpd
GET /api/SakWizard/Sak/{tag}
GET /api/SakerList/ByMottaker/{tsKundeId}/ProduktEierList
GET /api/SakerList/ByProduktEier/{id}/MottakereList
GET /api/User/AccessModel
GET /api/User/MottakerList
GET /api/User/ProduktEierList
GET /api/User/getRecallUser
POST /api/Mottaker/Sak/{sakId}/Dialog/SendMessage
POST /api/Produkteier/Sak/Add
POST /api/Produkteier/Sak/{sakId}/Dialog/SendMessage
POST /api/SakWizard/CommandCompleted/{commandSessionId}
POST /api/SakWizard/Files/UploadSuccess
POST /api/SakWizard/GrossistSearch
POST /api/SakWizard/HandleSakCommand/{commandName}
POST /api/SakWizard/HandleSakCommandArray
POST /api/SakWizard/KundeSearch
POST /api/SakWizard/SendPdfToEmails
POST /api/SakerList/ByMottaker/{tsKundeId}
POST /api/SakerList/ByProduktEier/{gln}
PUT /api/Mottaker/Sak/{sakId}/statusKode/{statusKode}/Update
PUT /api/Produkteier/Sak/{sakId}/Update/{updateCode}
Open service 20.50.2.68:443 · recallapi-dev.tradesolution.no
2026-01-23 10:25
HTTP/1.1 302 Found Content-Length: 0 Connection: close Date: Fri, 23 Jan 2026 10:26:05 GMT Server: Kestrel Location: /swagger x-ms-middleware-request-id: 00000000-0000-0000-0000-000000000000 Request-Context: appId=cid-v1:12d49249-f02c-4608-b3cd-b9f7cfdc985c
Open service 20.50.2.68:80 · recallapi-dev.tradesolution.no
2026-01-10 21:56
HTTP/1.1 301 Moved Permanently Content-Length: 0 Connection: close Date: Sat, 10 Jan 2026 21:57:09 GMT Location: https://recallapi-dev.tradesolution.no/
Open service 20.50.2.68:443 · recallapi-dev.tradesolution.no
2026-01-10 21:56
HTTP/1.1 302 Found Content-Length: 0 Connection: close Date: Sat, 10 Jan 2026 21:57:09 GMT Server: Kestrel Location: /swagger x-ms-middleware-request-id: 00000000-0000-0000-0000-000000000000 Request-Context: appId=cid-v1:12d49249-f02c-4608-b3cd-b9f7cfdc985c