Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update CVSS Scoring to CVSS 4 #484

Open
GetSun2EZ opened this issue Jul 12, 2023 · 4 comments
Open

Update CVSS Scoring to CVSS 4 #484

GetSun2EZ opened this issue Jul 12, 2023 · 4 comments
Labels
enhancement New feature or request

Comments

@GetSun2EZ
Copy link

Recently, CVSS 4 scoring was released. It adds a certain number of metrics in addition to CVSS 3.1 and which are relevant.

Would it be possible to add CVSS 4 scoring in pwndoc?

Thanks

@GetSun2EZ GetSun2EZ added the enhancement New feature or request label Jul 12, 2023
@wantafanta
Copy link

https://www.first.org/cvss/v4-0/

The CVSS v4.0 Public Preview comment period began on June 8, 2023, and runs through July 31, 2023. All feedback will be reviewed and addressed by August 31, 2023, with a target official publication date of October 1, 2023.

Might be a waste of someones time until its official.

@Xitro01
Copy link

Xitro01 commented Nov 2, 2023

It's out now, but PLEASE make this OPTIONAL.

I'm not happy about the changes, so will stick to CVSS 3.1 for a while.

Just to make an example, why I'm not a fan:
Let's say you completely takeover the crown jewels, the SQL database of a website.
The SQL database is on a different server, which you can fully takeover. But you can't do anything on the webserver itself.
Then this will be the outcome:
signal-2023-11-02-094827_002

So that will mean that you found a high vulnerability and not a critical.

@randshell
Copy link

randshell commented Nov 17, 2023

@Xitro01 in the example you brought, the vulnerable system is the DB as it's the one directly impacted by your payload. Thus the VC, VI and VA are on High. The Subsequent System in this case could be the underlying server. If there is no xp_cmdshell or alike that can be used, then SC, SI and SA will be on None, making the issue a 9.3 one.

I agree that the new way of identifying Subsequent Systems takes a bit to get used to. 🙂 What helped me are the new examples provided at https://www.first.org/cvss/v4.0/examples.

image

@Xitro01
Copy link

Xitro01 commented Jan 24, 2024

@Xitro01 in the example you brought, the vulnerable system is the DB as it's the one directly impacted by your payload. Thus the VC, VI and VA are on High. The Subsequent System in this case could be the underlying server. If there is no xp_cmdshell or alike that can be used, then SC, SI and SA will be on None, making the issue a 9.3 one.

I agree that the new way of identifying Subsequent Systems takes a bit to get used to. 🙂 What helped me are the new examples provided at https://www.first.org/cvss/v4.0/examples.

For the example I gave: fair enough. Yet, looking at the examples at first.org: if you ask me it doesn't really add much. Just a slightly different way to calculate the value. There are just a few exotic vulnerabilities which make use of the subsequent metrics, for most the "Changed/Unchanged" value would have sufficed.

Anyways, hopefully it will still be release optional. That will ease the migration towards 4.0, as our database has over 200 findings with CVSS 3.1. Just need to slightly adjust our report template so that the new CVSS 4.0 string will fit and that's it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

4 participants