CVSS-Tampering: GitHub creates incorrect CVSS v4 scores #8042
AB-xdev
started this conversation in
False Detection
Replies: 1 comment 1 reply
-
I read through github/advisory-database#5032, and your comments make sense to me. However, other advisories also sometimes score unreasonable values. I think we have to discuss with the issuer for each advisory, although it's not ideal. GitHub might change their mind if many users complain about it. Since removing the GHSA would have a major impact, it might be a good idea to provide an option to select the severity source, like |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
IDs
Probably most recent CVEs in GitHub advisories database
Description
The problem
GitHub (Advisories) seems to create CVSS v4 scores for some advisories as I found out in github/advisory-database#5032 / github/advisory-database#5058.
There are some problem with that, here is a quick recap:
severity
This process seems to result in incorrect scores (some values do not match at all) and incorrect
severity
values, thus resulting in False Postives and Negatives.Spontaneously found examples:
severity
)SC
,SI
Vulnerable System Impact Metrics
seem to be missingVulnerable System Impact Metrics
seem to be missingFurther asked questions by me have been evaded/dismissed so far.
The persons responsible for creating CVSS v4 scores also seem to have some trouble in doing so as their proposed values have been incorrect now for 2 times despite having clear points on what specific metrics are wrong.
Recommended actions
GitHub Advisories seems to see 0 problems with this behavior as can be seen in the comments, so I don't expect them changing their opinion any time soon without further external aspects.
I would therefore propose that you exclude the GitHub's advisory database for now or ignore
CVSSv4
andseverity
and only use trustworthy alternatives like e.g. GitLab's database instead.Scanner
Vulnerability
Checklist
-f json
that shows data sources and confirmed that the security advisory in data sources was correctBeta Was this translation helpful? Give feedback.
All reactions