rapid7 / attackerkb

Repo for creating-and-tracking issues related to AttackerKB
11 stars 2 forks source link

Mark some tags as being conflicting with one another - MIGRATED ISSUE #19

Open pbarry-r7 opened 4 years ago

pbarry-r7 commented 4 years ago

General feedback

Please leave any general feedback about AttackerKB here:


Specific feedback

Please provide the AttackerKB page URL where you are experiencing problems or wish to leave feedback on:

https://attackerkb.com/topics/cve-2020-6841?referrer=home

Steps to reproduce

  1. Create an issue
  2. Mark an issue as both "Easy to Develop" and "High Barrier to Exploitation"
  3. Realize that despite these two being polar opposites of one another, its still possible to create the issue.
  4. View https://attackerkb.com/topics/cve-2020-6841 and look at @kevthehermit's comment where these two tags are both applied to one issue.

Expected behavior

Each tag should have an equivalent opposite tag and it should not be possible to assign both tags to one issue.

Current behavior

Its currently possible to assign one issue with two tags that are polar opposites of each other.

Browser and OS information

pbarry-r7 commented 4 years ago

"Totally makes sense! Thank you for the feedback here. We'll see if we can get this added in soon."

pbarry-r7 commented 4 years ago

"I think there is some confusion on tags.

I think it is possible for both of theses to be true depending on context. As an example.

It is easy to develop a POC as there is already a public script

It has a High Barrier to Exploitation because it is Post Authentication or needs local access or chained with another exploit.

This is also why i asked for more tags :)"

pbarry-r7 commented 4 years ago

"Fair point on the more tags, though I think my opinion was more on the fact that the rating should be the overall difficulty. The PoC could be out but if it was hard to develop that PoC that may give a more accurate view of the vulnerability. Or where you thinking more along the lines of "okay now the PoC is out everyone can develop it"? I suppose it also depends on the quality of the PoC and how much it can assist an attacker in doing a generic exploitation of the target. Really quite a lot of factors to consider here but I'm open to ideas."