Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Invalid CVSS v2 and v4 implementations #1382

Open
pandatix opened this issue Aug 18, 2024 · 0 comments · May be fixed by #1386
Open

Invalid CVSS v2 and v4 implementations #1382

pandatix opened this issue Aug 18, 2024 · 0 comments · May be fixed by #1386

Comments

@pandatix
Copy link

Hey, follow up on #1230, #1232 and its comments.

The current implementation is still invalid for both CVSS v2 and v4.0.

CVSS v2.0

Vectors like AV:A/AC:L/Au:N/A:C/I:C/C:C are invalid due to invalid metric order (C, I then A is valid, anything else is not).
The current implementation validates such inputs, which makes it inconsistent and non-compliant according to the FIRST.ORG spec.

CVSS v4.0

Vectors like CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:H/CR:X should produce a score of 4.1 according to the official FIRST.ORG calculator, but the current implementation returns a 4.7.
Same impact as for v2, inconsistency and non-compliance.

Moreover, it is a big issue for Vulnerability Management policies, as many of them considers CVSS scores thresholds for prioritization. Those large deltas could pollute the security efforts of the consumers.

@hdonnay hdonnay linked a pull request Aug 20, 2024 that will close this issue
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging a pull request may close this issue.

1 participant