-
Notifications
You must be signed in to change notification settings - Fork 343
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[GHSA-xq3w-v528-46rv] Denial of Service attack on windows app using netty #5032
[GHSA-xq3w-v528-46rv] Denial of Service attack on windows app using netty #5032
Conversation
Hi there @normanmaurer! A community member has suggested an improvement to your security advisory. If approved, this change will affect the global advisory listed at github.com/advisories. It will not affect the version listed in your project repository. This change will be reviewed by our Security Curation Team. If you have thoughts or feedback, please share them in a comment here! If this PR has already been closed, you can start a new community contribution for this advisory |
Hey @AB-xdev, would it make more sense to update the cvss 4 score? I think I agree with you about the confidentiality and integrity scores and it looks like an error on our side when adding the v4 score. |
No, a CVSS v4 score was not declared in the original advisory as it uses CVSS v3, so the CVSS v4 was obviously made-up. Feel free to re-add a valid CVSSv4 score afterwards. |
@AB-xdev well... we added the cvss 4 score 😄 |
Okay, I'm a bit confused now. The current situation makes 0 sense to me. |
Well the goal isn't for them to be incorrect. Like I mentioned above I think we made a mistake here. We try to enrich data as we ingest it and some customers like having cvss 4 scores hence the v4 score.
Well, I'd rather simply correct the score since we're working on it now :) |
Sorry, but I have to object:
Okay.... I still see multiple problems here:
I think you guys should stop doing this immediately before more harm can be done by incorrect CVE scores. |
Ah you're very right about attack vector. On the attack requirements I took that to be access to either a local account or ability to get a config file into the local environment. AV:L is a better approach. Also apologies on To your series of questions. We do this as the advisories come up and we have these conversations in public as needed. This is a very manual process and its a balancing act to be sure. With respect to this advisory we're now talking about the cvss v4 score of |
It looks like this process is extremely nontransparent, which completely erodes (my) trust in this - security critical - system.
Again you are trying to change some unrelated metrics:
Did you read my original linked issue?
Change this and NOTHING else, as only these values are obviously incorrect - if you want to reintroduce CVSS v4 at all costs. I applied the changes myself (took me a few seconds to re-select 2 metrics on a website) and I get |
I've just submitted a PR questioning your CVSS 4 score in a similar manner, but this PR is much better, I hope you merge it ASAP. |
fd84ffd
into
AB-xdev/advisory-improvement-5032
Hi @AB-xdev! Thank you so much for contributing to the GitHub Advisory Database. This database is free, open, and accessible to all, and it's people like you who make it great. Thanks for choosing to help others. We hope you send in more contributions in the future! |
Ok, so in the interest of brevity we've gone ahead and merged an update. I think this aligns with how you see the severity as well as with the v3 score from the source document.
We're having a public conversation right now :) You are correct on the privileges. Setting that to none was an error on my part in copy+pasting things around and I would encourage you to give us a little empathy. We deal with a lot advisories on a daily basis as well as users telling us we're doing it wrong. We do our best and I'm glad we've done well enough to be regarded as So, with respect to the availability in both the primary and subsequent systems. The cvss v4 doc |
Thank you, however they got immediately overwritten by #5056 :(
I was referring to existing conversations.
No this repo is the database. It does not contain an easily observable change that describes the created CVSS v4 scores.
None of these links describes that you create CVSS v4 scores anywhere.
I understand that and I'm also glad that this database exists. However as iterated above, please be more transparent!
CVSS v4 specifies:
But yes that sounds like a design problem of CVSS v4, as it's quite hard to say what the "subsequent system" is (e.g. other machines relying on the service, other processes on affect machine). Sounds like another reason why we should maybe stick with the original scores then or write a description why the values have been chosen ;) Anyway I will spin off this PR into a separate issue to propose a general change. |
Did it? Looks correct to me on the main view
Here are a few of my favorites You do need to dig for them, but everything is indexed on the GHSA number so it should be easy to find on a per advisory basis.
It's a constant effort. There aren't many of us and the operational stuff always has priority. We do have updated and expanded docs ongoing and I'll link this thread in to the issue to try and give it more urgency. For any other specifics on how to improve transparency feel free to make some issues 👍
Right on. Again, not many of us so big changes might take a while to give a good/complete answer to. Also, if you feel strongly about severities it may make sense to reach out to the cvss group to iterate on the design |
You know that I'm talking about YOU CREATING CVSS v4 SCORES and not general communication or? Rest of your statements look fine :) |
Ah right. 🤦
It was ambiguous. You were talking about transparency in a fairly general way and I wanted to reassure you that we do try very hard to be transparent. It's something I personally care quite a bit about. I agree we can do better about documenting what enrichment we do independently and its valid to call out our shortcoming on that front. |
Updates
Comments
Removed CVSSv4 as it was never declared or used in the original report and contains incorrect values.
Used CVSSv3 instead which should have the correct values.
netty/netty#14473