Coder Social home page Coder Social logo

cve's Issues

Microsoft MotW under-assignment

Microsoft assigned two quite-different vulnerabilities to CVE-2022-41049. CNA rules state:

7.2.1 CNAs MUST NOT assign the same CVE ID to more than one independently fixable vulnerability.

CVE IDs are meant to track vulnerabilities not fixes.

CC @wdormann

Qualifcations for being a CNA

Review and discuss criteria for becoming a CNA, to include mergers and acquisitions, and other criteria, including motivations and intent to overly abuse or misuse CVE.

CNA activity

Collecting several discussions, there are questions about how CNA membership is maintained.

ossf/wg-vulnerability-disclosures#139

Required activity, publishing CVE Records within a period of time?
Does the Program send heartbeat notifications?
Practice may be that CNAs are only removed if there is a complaint or specific reason (and perhaps also lack of publication)?

This may warrant explanation in the CNA Operational Rules revision.

insufficient evidence to determine vulnerabillty CVE-2023-33517

CVE-2023-33517 probably should not meet the requirement for "sufficient evidence" of a vulnerability. Check the vulnerability determination rules section.

Description:
"carRental 1.0 is vulnerable to Incorrect Access Control (Arbitrary File Read on the Back-end System)."

References:
https://gist.github.com/wushigudan/288ab32566615d8897c1da7ce7204838

Contents of that gist:

[CVE ID]
CVE-2023-33517
[PRODUCT]
carRental v1.0
[IVERSION]
v1.0
[PROBLEM TYPE]
Incorrect Access Control
[DESCRIPTION]
Arbitrary File Read on Back-end System

(This may be the affected Product: https://github.com/yeqifu/carRental)

EOL Policy: remove Temporary EOL Rules Inconsistency

The 'Temporary Rules Inconsistency' (Section 3 of EOL Vulnerability Assignment Process) has been addressed in the new CNA Operational Rules. Section 3.1.11 "Scope Definitions for EOL Products" now reflects the suggested wording from the EOL Vulnerability Assignment Process:

  • "A CNA MAY specify in its Scope Definition whether or not the CNA assigns CVE IDs for EOL Products.

  • If a CNA Scope Definition 1) specifies that the CNA does assign for EOL Products or 2) does not specify whether or not the CNA assigns for EOL Products, then vulnerabilities that may affect EOL products MUST be reported through the CNA’s vulnerability reporting and disclosure processes.

  • If a CNA Scope Definition 3) specifies that the CNA does not assign for EOL Products, then CVE assignment requests MUST be handled by an appropriate CNA-LR as described in the End-of-Life Vulnerability Assignment Process.

As the rules inconsistency is addressed in the new CNA Operational Rules, it should be removed from the EOL Vulnerability Assignment Process when new rules are published.

Secretariat should have complete editorial control

We very carefully and intentionally balance the CNA value proposition. Particularly for "vendor" CNAs, the CNA has significant influence (editorial control) over CVE Record content. This sometimes involves languages about "ownership." In return, the Program benefits greatly from additional and distributed resources and efficient volunteer effort, since "vendor" CNAs are the least cost avoider (most likely to know the most about the vulnerabilities affecting their products).

With this in mind, as part of the current CNA Operational Rules revision, consider adding rules that make it clear that the Program owns all the content and the Secretariat retains complete editorial and content control.

Personal opinion, we're dabbling in a lot of complexity (more JSON, ADPs) when a simpler solution may be to let the Secretariat just make changes when needed.

(from CVEProject/strategic-planning-working-group#5)

cvelib-howto: update to demonstrate new features

cvelib-howto is old, probably missing new features. For example, CVE Services and JSON will soon support ADP.

Current CVE Services client help is focused on a Vulnogram how-to document for less-experienced users, may not be worth the effort to update cvelib-howto.

Dispute Policy: Change CNA ownership in case of incorrect scope

This is not specifically addressed in the CVE Program Policy and Procedure for Disputing a CVE Record, maybe it should be?

From CNA rules 3.0 https://www.cve.org/ResourcesSupport/AllResources/CNARules#appendix_c-1_dispute:

In the case the CVE Record was published by an out-of-scope CNA, the offending CNA’s Root shall invite the in-scope CNA to review and edit the CVE Record as appropriate. If at all possible, the originally published CVE ID should be preserved. If this results in a duplicate, split, or merged CVE Record, the rules on handling those conditions listed below shall apply.

Microsoft MotW indistinguishable descriptions

The descriptions for CVE-2022-41049 and CVE-2022-41091 are identical except for description text stating that each is not the other and the descriptions do not convey sufficient information to uniquely identify vulnerabilities.

CVE-2022-41049 description:

Windows Mark of the Web Security Feature Bypass Vulnerability. This CVE ID is unique from CVE-2022-41091.

CVE-2022-41091 description:

Windows Mark of the Web Security Feature Bypass Vulnerability. This CVE ID is unique from CVE-2022-41049.

These descriptions do seem to meet the minimum requirements in 8.2.3 (Vulnerability Type is provided):

8.2.3 MUST include one of the following:
a. Vulnerability Type
b. Root Cause
c. Impact

https://cve.mitre.org/cve/cna/CNA_Rules_v3.0.pdf

CC @wdormann

CNA (non) performance

Possibly in SPWG, a dicussion came up about CNAs that do not assign and publish much, or even at all. Should some action be taken for such CNAs?

The proposed CNA Rules reqire that CNAs are responsive to probes but there is no assignment or publication rate requirement.

CNAs who do not assign or publish (much) are essentially no cost to the Program, unless a non-responsive action is needed.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.