-
Notifications
You must be signed in to change notification settings - Fork 349
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[GHSA-36xx-7vf6-7mv3] Silverstripe Framework: Members with no password can be created and bypass custom login forms #2575
Conversation
Hi there @emteknetnz and @maxime-rainville! A community member has suggested an improvement to your security advisory. If approved, this change will affect the global advisory listed at github.com/advisories. It will not affect the version listed in your project repository. This change will be reviewed by our highly-trained Security Curation Team. If you have thoughts or feedback, please share them in a comment here! If this PR has already been closed, you can start a new community contribution for this advisory |
Hey 👋 , the cvss scoring system is used to determine severity should an attack be pulled off. Section 2.3.3 reads as
https://www.first.org/cvss/v3.1/user-guide Hence our score on this issue. |
A configuration that allows an empty password to be used to authenticate a user is not a reasonable configuration. But beyond that, implementing custom authentication logic goes beyond "a configuration". The security of that authentication logic is the responsibility of the person Iimplementing it. There is no vulnerable logic within the application that this CVE was raised for. Any vulnerable logic is being introduced by custom implementations beyond the scope of this repository (which does come with its own secure authentication logic) We would appreciate if you would reconsider the cvss score with that in mind. |
Ok fair. For this one I can go ahead change the impact down to Also, given that I suspect readers will be a bit confused by a zero impact advisory do you think you can flesh out some text on what a user would need to do to be affected? I can add that in to the description as well 😄 |
Thank you. Here is our information about severity ratings, including the (non) impact of a CVSS of 0: https://docs.silverstripe.org/en/5/contributing/release_process/#severity-rating Please see also https://nvd.nist.gov/vuln-metrics/cvss which documents that CVSS scores of 0 are valid according to NIST, and https://docs.veracode.com/r/review_severity_exploitability which shows that other organisations are also using CVSS scores of 0 (or at least consider them to be valid). If you have some clear documentation showing CVSS scores of 0 being an "abuse" of the CVSS system we'd be happy to review it to help improve our processes. |
42c220a
into
maxime-rainville/advisory-improvement-2575
Hi @maxime-rainville! Thank you so much for contributing to the GitHub Advisory Database. This database is free, open, and accessible to all, and it's people like you who make it great. Thanks for choosing to help others. We hope you send in more contributions in the future! |
I don't. You're right that other orgs do use 0.0 and it's an active talking point in the CVE world as to if it's a correct use of the system or not. Again I'll say that out GHSA system has no such requirement. As for this one. You can see the updated severity on the CVE here |
Thanks for that @darakian. I'm satisfied with this outcome - and this is the first time we've ever had an issue we considered to be a CVSS of 0. We're not likely to have another one any time soon so I'm happy to call this concluded for now and we'll see what state things are in if/when we have another one - though @maxime-rainville may have his own questions. |
Totally fair and ya it's a weird one for sure. If you do end up having another 0.0 feel free to reach out ahead of publication as well. Happy to help guide things or give feedback or to be someone to yell at or whatever 😄 |
Hi @darakian, we've had a new development with this and I'd like some advice if you're keen to give it. The good folks at NVD decided that this should have a higher CVSS score, and when we had a similar discussion with them they said (among other things):
Based on this, our opinion has now changed on this advisory. Specifically, we will be going with the intepretation above that because this "has no impacts it should not qualify as a CVE". The advice I'd like from you is how to go about invalidating the CVE associated with this advisory. |
Had to refresh my memory, but looks like you all requested the CVE from us so I just need to loop in my team and we can handle it all on our end. We'll reject the CVE with mitre so that anyone reading from the CVE system will see it as The repo advisory is a different object altogether and edits to that are entirely under your control. You can update the text or blank it our or whatever. So, that's the basic process if you wanna head down that route 😄 |
Awesome, thank you. For clarity, we'd like to keep the advisory. We want to revoke the CVE but keep the description in the advisory system, the same as if we'd just published it in the advisory system without having ever requested a CVE in the first place. If you could go ahead and start that process that would be great. |
Mmmmmm I think our system will still show the CVE number, but when clicking through it should show rejected. Let me double check and get back to you in the morning (PST), this might be the first time we've ever done a reject of a CVE without also pulling the advisory. It should work though 👍 |
It's fine if it shows the CVE and says it was rejected - the main thing is that the advisory itself is still there and still "functions" (i.e. has or doesn't have the same side-effects on any systems like dependabot) the same as it would if we had never requested a CVE. |
@GuySartorelli ok I just put through the rejection |
Fantastic, thank you for all your help with this. |
Happy to help. Also, if you want this sort of behavior in the future just skip asking for a CVE. 😄 |
Yup, that's the plan, now that we know what a headache that can be lol |
I'll make sure to bring it up with them too. This is the sort of thing I hate in the system where well meaning developers essentially get punished by bureaucracy. No promises or timelines on changes, but I'll at least give them an earful 😉 |
Updates
Comments
As indicated in the notice, there's no confidentiality, integrity or availability impact on a vanilla install using the built in authenticator. The problem will only be present if a project has implemented a custom authenticator doesn't validate if a password is present.
GHSA-36xx-7vf6-7mv3