Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

The CVE List cannot be the first point of publication for any information. #26

Open
EvansJonathan opened this issue Jul 26, 2017 · 21 comments

Comments

@EvansJonathan
Copy link
Contributor

GOAL: Transparency
CHANGE: The CVE List cannot be the first point of publication for any information, i.e. anything said in a CVE entry must be backed up by a reference.
OUTCOME: Document current policy

@kurtseifried
Copy link

What is the "CVE List"? I assume CVE database? All CVE's already require a working reference URL, so by definition this is already covered, or?

@EvansJonathan
Copy link
Contributor Author

Just because there is a URL does not mean that all of the information in the CVE entry is also in the URL. For example, the entry for CVE-2016-10392 was published with a URL, but the URL says nothing about CVE-2016-10392. CVE-2016-10392 is the most extreme example. We have had other instances where the URL does talk about the vulnerability, but the description submitted to MITRE has additional details, e.g. affected component. All of these are technically valid under the current CNA rules.

@david-waltermire
Copy link

While we can set a guideline to be transparent in this way, I don't see a reasonable way to enforce a requirement for all information in a CVE entry is covered by the resource pointed to by a URL. If we cannot enforce a requirement without significant human resource costs, we may not want to have it as a requirement. This is even more difficult when we deal with 3rd party information in the CVE. Does this information also need to follow this rule? If so, how is that requirement enforced? At what cost?

Instead, we may want to express this concept as part of a set of goals for a CVE entry and allow the community and market to drive behavior if these goals are valued.

@EvansJonathan
Copy link
Contributor Author

EvansJonathan commented Aug 29, 2017

Proactive enforcement of the rule would certainly slow down the submission process and make automation impossible. However, making this a rule allows us to require a CNA to update their entry with a useful reference when someone points out that the reference does not match the entry. Guidelines don't give you that level of authority.

@david-waltermire
Copy link

david-waltermire commented Aug 29, 2017 via email

@EvansJonathan
Copy link
Contributor Author

I am not sure what such a rule would look like. As far as I can tell, none of our current rules do, include the rule not to assign multiple CVE IDs to the same vulnerability. Could you provide an example rule that meets your criteria?

@attritionorg
Copy link

Including provenance (an external point of reference for the vuln info/disclosure) has been a cornerstone of CVE for 90% of its time. Changing to allow CVE to become the point of disclosure may be an option, but if so, should have some flag or indication that is the case.

Further, this is potentially problematic because external provenance typically gives people a way to contact the researcher in case there are questions or disputes on the disclosure. This change means that MITRE would be receiving those mails and having to mediate or do virtual introductions, provided they are willing to give up the reporting party contact information.

@ghost
Copy link

ghost commented Sep 15, 2017

@attritionorg this is one reason I require a working (at least long enough to agree to the CVE ToU) email associated with DWF assignments.

@attritionorg
Copy link

@kseifriedredhat good in theory, but when they don't answer those emails? that has happened with a few DWF requesters I have contacted for clarity and provenance already.

@attritionorg
Copy link

Generally speaking, one thing I don't think most of the Board is aware of is the recent shift in how CVEs are perceived among many 'researchers'. The number of cases where people are using them on their LinkedIn profiles and resumes is growing; more specifically, they are using reserved CVE IDs. It doesn't matter what the vuln is or if it is open, it comes across as them finding legitimate vulns. Hiring managers see the CVE IDs and assume the same thing. There is now a false equivalency between having a CVE ID and it also meaning that it a valid vulnerability approved by the CVE entity. In one case I tried to track down, the reservations were from 2014 and the researcher had not published details despite saying the vendor fixed the issues, and little interest in publishing after I contacted him.

@ghost
Copy link

ghost commented Sep 15, 2017

That's not a false equivalency, that's how it used to be (CAN -> CVE), then that went but CVE's were still verified to some degree, now we have a claims based system, but I've not meet a single person that knew about it yet. The one thing we have is publishing in the official database, which is clearly a concern for many resume padders (based on some of the emails I get), but like I said before, if it incentivizes people to find good flaws and publish the details then I'm ok with that.

@attritionorg
Copy link

My point is that the current system is being used (I won't go so far as to say it incentivizes) as resume fodder where we don't know if they are good flaws, because they aren't published. Hell, we don't know if they are flaws at all.

@ghost
Copy link

ghost commented Sep 15, 2017

@attritionorg yup so I would argue it's kind of our job to educate people that the good flaws are 1) published with good reports/details and 2) also included in reputable websites (e.g. https://access.redhat.com/security/security-updates/#/cve or https://cve.mitre.org/)

@attritionorg
Copy link

Through the various mechanisms to request one (MITRE form, DWF email, etc), having some language that encourages them to actually publish their findings and not sit on the RESERVED CVE for five years might help.

@dadinolfi
Copy link
Contributor

We will be updating the CVE Form to include language strongly encouraging requesters to update us with references ASAP. Even if the rules about first publication change, this language will be relevant at least until the end of the calendar year under the current rules.

@dadinolfi
Copy link
Contributor

Add to Appendix B:

[REFERENCES] should be URLs pointing to a world-wide-web-based resource. For CSV and flat-file formats, they should be separated by a space. References should point to content that is relevant to the vulnerability and include at least all the details included in the CVE entry. Ideally, references should include the CVE ID itself whenever possible.

@EvansJonathan
Copy link
Contributor Author

For the last sentence, are you suggesting that the URL should contain the CVE ID or that the content the URL points to contains the CVE ID?

@dadinolfi
Copy link
Contributor

Should be the latter, of course. Fixing to clarify:

Ideally, references should point to content that includes the CVE ID itself whenever possible.

@attritionorg
Copy link

Do you want to add anything regarding 'publicly available'? e.g. does not require authentication.

@dadinolfi
Copy link
Contributor

In section 2.1.1, we have:


Note: for a vulnerability to be considered "public", the following conditions must be met:
• There must be a URL including information about the vulnerability accessible from the internet.
• The Terms of Use of the website must allow the CVE List to link to the URL.
• The document linked by the URL must contain the minimum required information for a CVE Entry (see Appendix B).
Registration and login requirements are acceptable, but there cannot be other restrictions for accessing that content. Also, advisories that require payment for access are not considered public. That said, if you have a public advisory with the minimum required details with additional details available through paid access, the vulnerability is still considered public.


We can add a "See section 2.2.1" line to link these in both directions. Does that work?

@attritionorg
Copy link

That would be great, thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants