pwndoc / pwndoc

Pentest Report Generator
https://pwndoc.github.io/pwndoc
MIT License
2.2k stars 415 forks source link

Update CVSS Scoring to CVSS 4 #484

Open GetSun2EZ opened 1 year ago

GetSun2EZ commented 1 year ago

Recently, CVSS 4 scoring was released. It adds a certain number of metrics in addition to CVSS 3.1 and which are relevant.

Would it be possible to add CVSS 4 scoring in pwndoc?

Thanks

wantafanta commented 1 year ago

https://www.first.org/cvss/v4-0/

The CVSS v4.0 Public Preview comment period began on June 8, 2023, and runs through July 31, 2023. All feedback will be reviewed and addressed by August 31, 2023, with a target official publication date of October 1, 2023.

Might be a waste of someones time until its official.

Xitro01 commented 10 months ago

It's out now, but PLEASE make this OPTIONAL.

I'm not happy about the changes, so will stick to CVSS 3.1 for a while.

Just to make an example, why I'm not a fan: Let's say you completely takeover the crown jewels, the SQL database of a website. The SQL database is on a different server, which you can fully takeover. But you can't do anything on the webserver itself. Then this will be the outcome: signal-2023-11-02-094827_002

So that will mean that you found a high vulnerability and not a critical.

randshell commented 9 months ago

@Xitro01 in the example you brought, the vulnerable system is the DB as it's the one directly impacted by your payload. Thus the VC, VI and VA are on High. The Subsequent System in this case could be the underlying server. If there is no xp_cmdshell or alike that can be used, then SC, SI and SA will be on None, making the issue a 9.3 one.

I agree that the new way of identifying Subsequent Systems takes a bit to get used to. :slightly_smiling_face: What helped me are the new examples provided at https://www.first.org/cvss/v4.0/examples.

image

Xitro01 commented 7 months ago

@Xitro01 in the example you brought, the vulnerable system is the DB as it's the one directly impacted by your payload. Thus the VC, VI and VA are on High. The Subsequent System in this case could be the underlying server. If there is no xp_cmdshell or alike that can be used, then SC, SI and SA will be on None, making the issue a 9.3 one.

I agree that the new way of identifying Subsequent Systems takes a bit to get used to. 🙂 What helped me are the new examples provided at https://www.first.org/cvss/v4.0/examples.

For the example I gave: fair enough. Yet, looking at the examples at first.org: if you ask me it doesn't really add much. Just a slightly different way to calculate the value. There are just a few exotic vulnerabilities which make use of the subsequent metrics, for most the "Changed/Unchanged" value would have sufficed.

Anyways, hopefully it will still be release optional. That will ease the migration towards 4.0, as our database has over 200 findings with CVSS 3.1. Just need to slightly adjust our report template so that the new CVSS 4.0 string will fit and that's it.

MaxNad commented 1 month ago

I started a branch implementing CVSSv4 (https://github.com/pwndoc/pwndoc/tree/cvss4)

The scoring method could be selected from the settings and both could be used at the same time to allow for a transition period.