mailing list archives
RE: Re: CVE Request - Zope / Plone: Multiple vectors corrected within 20121106 fix
From: "Christey, Steven M." <coley () mitre org>
Date: Fri, 9 Nov 2012 20:55:22 +0000
Note that CVE tries to maintain some amount of consistency across the space of ALL disclosures, and in some cases, that
means merging multiple flaws together even when we know they are distinct. See the section here:
It sounds like there's a reasonable argument to split issues 14 and 15 because of the differences between CWEs 407 and
For 01 and 02, the CVSS differences are not relevant - at least, not from a CVE perspective. But, if one is about
"incomplete security declarations" and the other is not, that also seems reasonable to split.
From: Matthew Wilkes [mailto:matthew.wilkes () plone org]
Sent: Friday, November 09, 2012 11:40 AM
To: Assign a CVE Identifier
Cc: oss-security () lists openwall com; jpokorny () redhat com; security () plone org
Subject: Re: [oss-security] Re: CVE Request - Zope / Plone: Multiple vectors corrected within 20121106 fix
It looks like some of these can be CVE merged, e.g. 14 and 15, 1 and
5, can you confirm that these should not be merged?
Thanks for constructing this comprehensive table, but please do not
merge 14 and 15, or 1 and 5.
I agree. It's our opinion that these are distinct flaws, and we would
prefer to keep them tracked independently.
CVE assignment by MITRE most often has merges when the available
information suggests one of these two situations:
A. Flaw types that have been used for many years and are thought to
be well understood. At present, a large fraction of our merges
are for XSS, SQL injection, CSRF, buffer overflows, integer
overflows, use-after-free issues, and directory traversal.
However, a merge can occur correctly for any flaw type.
Indeed, we do like to keep similar flaws with very different causes
separate, though. In the particular case of 1/5 and 14/15 we don't see
any similarities, but in general we've tried hard here to request CVEs
in a way that accurately reflects discrete vulnerabilities in the stack.
At this point in the history of CWE, a discloser's choice of the same
CWE identifier for two different bugs might not be a strong indication
that a CVE merge should occur.
The CWE dictionary is huge, I would very much appreciate any feedback
anyone can give me on the appropriateness of my choices here. I have
been working on a Plone specific CWE dictionary but it's slow going.
For example, some CVE consumers don't like situations in
which a vendor publishes multiple disclosure documents that explain
different aspects of the same CVE.
We will bow to your advice here. If you tell us that our merge
recommendations are poor we will make sure that we don't issue multiple
guidance documents in future. For now, our list reflects our best
understanding of the CVE guidance documents.
14 and 15: One might argue that these are different because 14 is
about algorithmic complexity but 15 isn't.
Indeed, I did consider CWE-407 here, but 749 is one of our go-to choices
as it's a common error in Zope. I think, if I had to come down one side
or another, then 15 is complexity whereas 14 is allowing users to
circumvent caching on an expensive function. They are both similar
outcomes, in that they're expensive pages, but for very different reasons.
01 and 05: One might argue that these are different because 05 is
about incomplete security declarations but 01 isn't.
Indeed. Also, 05 is a AC:H Au:S whereas 01 is AC:L Au:N. 05 allows an
escalation of privileges in the sandbox whereas 01 allows unauthorised
authoring of code which happens to only ever be run in a higher
privilege set. 01 is a write-once persistent single statement whereas 05
is an editable file with multiple statements available. The privilege
set that 01 escalates to is the un-escalated set for 05.