From ee172978d1a233457d9b244bd08e283298612d3d Mon Sep 17 00:00:00 2001 From: n3rada <72791564+n3rada@users.noreply.github.com> Date: Sat, 27 Jul 2024 10:56:59 +0000 Subject: [PATCH 01/16] Refactor: Transform CVSS40 to a class-based design for better organization --- app.js | 211 +++++----- config.json | 732 +++++++++++++++++++++++++++++++++ cvss40.js | 1041 +++++++++++++++++++++++++++++++++++++++++++++++ cvss_config.js | 734 --------------------------------- cvss_details.js | 18 - cvss_lookup.js | 275 ------------- cvss_score.js | 379 ----------------- index.html | 20 +- max_composed.js | 35 -- max_severity.js | 30 -- metrics.js | 42 -- 11 files changed, 1876 insertions(+), 1641 deletions(-) create mode 100644 config.json create mode 100644 cvss40.js delete mode 100644 cvss_config.js delete mode 100644 cvss_details.js delete mode 100644 cvss_lookup.js delete mode 100644 cvss_score.js delete mode 100644 max_composed.js delete mode 100644 max_severity.js delete mode 100644 metrics.js diff --git a/app.js b/app.js index 70d8089..7f73b6c 100644 --- a/app.js +++ b/app.js @@ -4,186 +4,167 @@ const app = Vue.createApp({ data() { return { - cvssConfigData: cvssConfig, - maxComposedData: maxComposed, - maxSeverityData: maxSeverity, - expectedMetricOrder: expectedMetricOrder, - cvssMacroVectorDetailsData: cvssMacroVectorDetails, - cvssMacroVectorValuesData: cvssMacroVectorValues, + cvssConfigData: CVSS40.CONFIG, + maxComposedData: CVSS40.MAX_COMPOSED, + maxSeverityData: CVSS40.MAX_SEVERITY, + expectedMetricOrder: CVSS40.EXPECTED_METRIC_ORDER, + cvssMacroVectorDetailsData: CVSS40.MACRO_VECTOR_DETAILS, + cvssMacroVectorValuesData: CVSS40.MACRO_VECTOR_VALUES, showDetails: false, - cvssSelected: null, + vectorMetrics: null, header_height: 0, - lookup: cvssLookup_global, - macroVector: null + lookup: CVSS40.LOOKUP, + macroVector: null, + vectorString: null, + cvssInstance: null } }, methods: { buttonClass(isPrimary, big = false) { - result = "btn btn-m" + let result = "btn btn-m"; if (isPrimary) { - result += " btn-primary" + result += " btn-primary"; } if (!big) { - result += " btn-sm" + result += " btn-sm"; } - - return result + return result; }, scoreClass(qualScore) { - if (qualScore == "Low") { - return "c-hand text-success" + if (qualScore === "Low") { + return "c-hand text-success"; } - else if (qualScore == "Medium") { - return "c-hand text-warning" + else if (qualScore === "Medium") { + return "c-hand text-warning"; } - else if (qualScore == "High") { - return "c-hand text-error" + else if (qualScore === "High") { + return "c-hand text-error"; } - else if (qualScore == "Critical") { - return "c-hand text-error text-bold" + else if (qualScore === "Critical") { + return "c-hand text-error text-bold"; } else { - return "c-hand text-gray" + return "c-hand text-gray"; } }, copyVector() { - navigator.clipboard.writeText(this.vector) - window.location.hash = this.vector + navigator.clipboard.writeText(this.vector); + window.location.hash = this.vector; }, onButton(metric, value) { - this.cvssSelected[metric] = value - window.location.hash = this.vector + this.vectorMetrics[metric] = value; + window.location.hash = this.vector; + this.updateCVSSInstance(); }, setButtonsToVector(vector) { - this.resetSelected() - metrics = vector.split("/") - // Remove hash + CVSS v4.0 prefix - prefix = metrics[0].slice(1); - if (prefix != "CVSS:4.0") { - console.log("Error invalid vector, missing CVSS v4.0 prefix") - return - } - metrics.shift() + this.resetSelected(); + const metrics = vector.split("/"); + const prefix = metrics[0].slice(1); + if (prefix !== "CVSS:4.0") { + console.log("Error invalid vector, missing CVSS v4.0 prefix"); + return; + } + metrics.shift(); - // Ensure compliance first - toSelect = {} - oi = 0 - for (index in metrics) { - [key, value] = metrics[index].split(":") - - expected = Object.entries(this.expectedMetricOrder)[oi++] + const toSelect = {}; + let oi = 0; + for (const index in metrics) { + const [key, value] = metrics[index].split(":"); + let expected = Object.entries(this.expectedMetricOrder)[oi++]; while (true) { - // If out of possible metrics ordering, it not a valid value thus - // the vector is invalid - if (expected == undefined) { - console.log("Error invalid vector, too many metric values") - return + if (expected === undefined) { + console.log("Error invalid vector, too many metric values"); + return; } - if (key != expected[0]) { - // If not this metric but is mandatory, the vector is invalid - // As the only mandatory ones are from the Base group, 11 is the - // number of metrics part of it. + if (key !== expected[0]) { if (oi <= 11) { - console.log("Error invalid vector, missing mandatory metrics") - return + console.log("Error invalid vector, missing mandatory metrics"); + return; } - // If a non-mandatory, retry - expected = Object.entries(this.expectedMetricOrder)[oi++] - continue + expected = Object.entries(this.expectedMetricOrder)[oi++]; + continue; } - break + break; } - // The value MUST be part of the metric's values, case insensitive if (!expected[1].includes(value)) { - console.log("Error invalid vector, for key " + key + ", value " + value + " is not in " + expected[1]) - return + console.log(`Error invalid vector, for key ${key}, value ${value} is not in ${expected[1]}`); + return; } - if (key in this.cvssSelected) { - toSelect[key] = value + if (key in this.vectorMetrics) { + toSelect[key] = value; } } - // Apply iff is compliant - for (key in toSelect) { - this.cvssSelected[key] = toSelect[key] + for (const key in toSelect) { + this.vectorMetrics[key] = toSelect[key]; } - this.macroVector = macroVector(this.cvssSelected) - + this.updateCVSSInstance(); + }, + updateCVSSInstance() { + console.log(this.vector); + this.cvssInstance = new CVSS40(this.vector); + this.macroVector = this.cvssInstance.macroVectorResult; + console.log(this.cvssInstance); }, onReset() { - window.location.hash = "" + window.location.hash = ""; + this.resetSelected(); + this.updateCVSSInstance(); }, resetSelected() { - this.cvssSelected = {} - for ([metricType, metricTypeData] of Object.entries(this.cvssConfigData)) { - for ([metricGroup, metricGroupData] of Object.entries(metricTypeData.metric_groups)) { - for ([metric, metricData] of Object.entries(metricGroupData)) { - this.cvssSelected[metricData.short] = metricData.selected + this.vectorMetrics = {}; + for (const [metricType, metricTypeData] of Object.entries(this.cvssConfigData)) { + for (const [metricGroup, metricGroupData] of Object.entries(metricTypeData.metric_groups)) { + for (const [metric, metricData] of Object.entries(metricGroupData)) { + this.vectorMetrics[metricData.short] = metricData.selected; } } } }, splitObjectEntries(object, chunkSize) { - arr = Object.entries(object) - res = []; + const arr = Object.entries(object); + const res = []; for (let i = 0; i < arr.length; i += chunkSize) { - chunk = arr.slice(i, i + chunkSize) - res.push(chunk) + const chunk = arr.slice(i, i + chunkSize); + res.push(chunk); } - return res + return res; } }, computed: { vector() { - value = "CVSS:4.0" - for (metric in this.expectedMetricOrder) { - selected = this.cvssSelected[metric] - if (selected != "X") { - value = value.concat("/" + metric + ":" + selected) + let value = "CVSS:4.0"; + for (const metric in this.expectedMetricOrder) { + const selected = this.vectorMetrics[metric]; + if (selected !== "X") { + value = value.concat("/" + metric + ":" + selected); } } - return value + return value; }, score() { - return cvss_score( - this.cvssSelected, - this.lookup, - this.maxSeverityData, - this.macroVector) + return this.cvssInstance ? this.cvssInstance.baseScore : 0; }, qualScore() { - if (this.score == 0) { - return "None" - } - else if (this.score < 4.0) { - return "Low" - } - else if (this.score < 7.0) { - return "Medium" - } - else if (this.score < 9.0) { - return "High" - } - else { - return "Critical" - } - }, + return this.cvssInstance ? this.cvssInstance.baseSeverity : "None"; + } }, beforeMount() { - this.resetSelected() + this.resetSelected(); + this.updateCVSSInstance(); }, mounted() { - this.setButtonsToVector(window.location.hash) + this.setButtonsToVector(window.location.hash); window.addEventListener("hashchange", () => { - this.setButtonsToVector(window.location.hash) - }) + this.setButtonsToVector(window.location.hash); + }); const resizeObserver = new ResizeObserver(() => { - this.header_height = document.getElementById('header').clientHeight - }) + this.header_height = document.getElementById('header').clientHeight; + }); - resizeObserver.observe(document.getElementById('header')) + resizeObserver.observe(document.getElementById('header')); } -}) +}); -app.mount("#app") +app.mount("#app"); diff --git a/config.json b/config.json new file mode 100644 index 0000000..c43e781 --- /dev/null +++ b/config.json @@ -0,0 +1,732 @@ +{ + "Base Metrics": { + "fill": "supplier", + "metric_groups": { + "Exploitability Metrics": { + "Attack Vector (AV)": { + "tooltip": "This metric reflects the context by which vulnerability exploitation is possible. This metric value (and consequently the resulting severity) will be larger the more remote (logically, and physically) an attacker can be in order to exploit the vulnerable system. The assumption is that the number of potential attackers for a vulnerability that could be exploited from across a network is larger than the number of potential attackers that could exploit a vulnerability requiring physical access to a device, and therefore warrants a greater severity.", + "short": "AV", + "options": { + "Network (N)": { + "tooltip": "The vulnerable system is bound to the network stack and the set of possible attackers extends beyond the other options listed below, up to and including the entire Internet. Such a vulnerability is often termed “remotely exploitable” and can be thought of as an attack being exploitable at the protocol level one or more network hops away (e.g., across one or more routers).", + "value": "N" + }, + "Adjacent (A)": { + "tooltip": "The vulnerable system is bound to a protocol stack, but the attack is limited at the protocol level to a logically adjacent topology. This can mean an attack must be launched from the same shared proximity (e.g., Bluetooth, NFC, or IEEE 802.11) or logical network (e.g., local IP subnet), or from within a secure or otherwise limited administrative domain (e.g., MPLS, secure VPN within an administrative network zone).", + "value": "A" + }, + "Local (L)": { + "tooltip": "The vulnerable system is not bound to the network stack and the attacker’s path is via read/write/execute capabilities. Either the attacker exploits the vulnerability by accessing the target system locally (e.g., keyboard, console), or through terminal emulation (e.g., SSH); or the attacker relies on User Interaction by another person to perform actions required to exploit the vulnerability (e.g., using social engineering techniques to trick a legitimate user into opening a malicious document).", + "value": "L" + }, + "Physical (P)": { + "tooltip": "The attack requires the attacker to physically touch or manipulate the vulnerable system. Physical interaction may be brief (e.g., evil maid attack) or persistent.", + "value": "P" + } + }, + "selected": "N" + }, + "Attack Complexity (AC)": { + "tooltip": "This metric captures measurable actions that must be taken by the attacker to actively evade or circumvent existing built-in security-enhancing conditions in order to obtain a working exploit. These are conditions whose primary purpose is to increase security and/or increase exploit engineering complexity. A vulnerability exploitable without a target-specific variable has a lower complexity than a vulnerability that would require non-trivial customization. This metric is meant to capture security mechanisms utilized by the vulnerable system.", + "short": "AC", + "options": { + "Low (L)": { + "tooltip": "The attacker must take no measurable action to exploit the vulnerability. The attack requires no target-specific circumvention to exploit the vulnerability. An attacker can expect repeatable success against the vulnerable system.", + "value": "L" + }, + "High (H)": { + "tooltip": "The successful attack depends on the evasion or circumvention of security-enhancing techniques in place that would otherwise hinder the attack. These include: Evasion of exploit mitigation techniques, for example, circumvention of address space randomization (ASLR) or data execution prevention (DEP) must be performed for the attack to be successful; Obtaining target-specific secrets. The attacker must gather some target-specific secret before the attack can be successful. A secret is any piece of information that cannot be obtained through any amount of reconnaissance. To obtain the secret the attacker must perform additional attacks or break otherwise secure measures (e.g. knowledge of a secret key may be needed to break a crypto channel). This operation must be performed for each attacked target.", + "value": "H" + } + }, + "selected": "L" + }, + "Attack Requirements (AT)": { + "tooltip": "This metric captures the prerequisite deployment and execution conditions or variables of the vulnerable system that enable the attack. These differ from security-enhancing techniques/technologies (ref Attack Complexity) as the primary purpose of these conditions is not to explicitly mitigate attacks, but rather, emerge naturally as a consequence of the deployment and execution of the vulnerable system.", + "short": "AT", + "options": { + "None (N)": { + "tooltip": "The successful attack does not depend on the deployment and execution conditions of the vulnerable system. The attacker can expect to be able to reach the vulnerability and execute the exploit under all or most instances of the vulnerability.", + "value": "N" + }, + "Present (P)": { + "tooltip": "The successful attack depends on the presence of specific deployment and execution conditions of the vulnerable system that enable the attack. These include: a race condition must be won to successfully exploit the vulnerability (the successfulness of the attack is conditioned on execution conditions that are not under full control of the attacker, or the attack may need to be launched multiple times against a single target before being successful); the attacker must inject themselves into the logical network path between the target and the resource requested by the victim (e.g. vulnerabilities requiring an on-path attacker).", + "value": "P" + } + }, + "selected": "N" + }, + "Privileges Required (PR)": { + "tooltip": "This metric describes the level of privileges an attacker must possess prior to successfully exploiting the vulnerability. The method by which the attacker obtains privileged credentials prior to the attack (e.g., free trial accounts), is outside the scope of this metric. Generally, self-service provisioned accounts do not constitute a privilege requirement if the attacker can grant themselves privileges as part of the attack.", + "short": "PR", + "options": { + "None (N)": { + "tooltip": "The attacker is unauthorized prior to attack, and therefore does not require any access to settings or files of the vulnerable system to carry out an attack.", + "value": "N" + }, + "Low (L)": { + "tooltip": "The attacker requires privileges that provide basic capabilities that are typically limited to settings and resources owned by a single low-privileged user. Alternatively, an attacker with Low privileges has the ability to access only non-sensitive resources.", + "value": "L" + }, + "High (H)": { + "tooltip": "The attacker requires privileges that provide significant (e.g., administrative) control over the vulnerable system allowing full access to the vulnerable system’s settings and files.", + "value": "H" + } + }, + "selected": "N" + }, + "User Interaction (UI)": { + "tooltip": "This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable system. This metric determines whether the vulnerability can be exploited solely at the will of the attacker, or whether a separate user (or user-initiated process) must participate in some manner.", + "short": "UI", + "options": { + "None (N)": { + "tooltip": "The vulnerable system can be exploited without interaction from any human user, other than the attacker.", + "value": "N" + }, + "Passive (P)": { + "tooltip": "Successful exploitation of this vulnerability requires limited interaction by the targeted user with the vulnerable system and the attacker’s payload. These interactions would be considered involuntary and do not require that the user actively subvert protections built into the vulnerable system.", + "value": "P" + }, + "Active (A)": { + "tooltip": "Successful exploitation of this vulnerability requires a targeted user to perform specific, conscious interactions with the vulnerable system and the attacker’s payload, or the user’s interactions would actively subvert protection mechanisms which would lead to exploitation of the vulnerability.", + "value": "A" + } + }, + "selected": "N" + } + }, + "Vulnerable System Impact Metrics": { + "Confidentiality (VC)": { + "tooltip": "This metric measures the impact to the confidentiality of the information managed by the VULNERABLE SYSTEM due to a successfully exploited vulnerability. Confidentiality refers to limiting information access and disclosure to only authorized users, as well as preventing access by, or disclosure to, unauthorized ones.", + "short": "VC", + "options": { + "High (H)": { + "tooltip": "There is a total loss of confidentiality, resulting in all information within the Vulnerable System being divulged to the attacker. Alternatively, access to only some restricted information is obtained, but the disclosed information presents a direct, serious impact. For example, an attacker steals the administrator's password, or private encryption keys of a web server.", + "value": "H" + }, + "Low (L)": { + "tooltip": "There is some loss of confidentiality. Access to some restricted information is obtained, but the attacker does not have control over what information is obtained, or the amount or kind of loss is limited. The information disclosure does not cause a direct, serious loss to the Vulnerable System.", + "value": "L" + }, + "None (N)": { + "tooltip": "There is no loss of confidentiality within the Vulnerable System.", + "value": "N" + } + }, + "selected": "N" + }, + "Integrity (VI)": { + "tooltip": "This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information. Integrity of the VULNERABLE SYSTEM is impacted when an attacker makes unauthorized modification of system data. Integrity is also impacted when a system user can repudiate critical actions taken in the context of the system (e.g. due to insufficient logging).", + "short": "VI", + "options": { + "High (H)": { + "tooltip": "There is a total loss of integrity, or a complete loss of protection. For example, the attacker is able to modify any/all files protected by the vulnerable system. Alternatively, only some files can be modified, but malicious modification would present a direct, serious consequence to the vulnerable system.", + "value": "H" + }, + "Low (L)": { + "tooltip": "Modification of data is possible, but the attacker does not have control over the consequence of a modification, or the amount of modification is limited. The data modification does not have a direct, serious impact to the Vulnerable System.", + "value": "L" + }, + "None (N)": { + "tooltip": "There is no loss of integrity within the Vulnerable System.", + "value": "N" + } + }, + "selected": "N" + }, + "Availability (VA)": { + "tooltip": "This metric measures the impact to the availability of the VULNERABLE SYSTEM resulting from a successfully exploited vulnerability. While the Confidentiality and Integrity impact metrics apply to the loss of confidentiality or integrity of data (e.g., information, files) used by the system, this metric refers to the loss of availability of the impacted system itself, such as a networked service (e.g., web, database, email). Since availability refers to the accessibility of information resources, attacks that consume network bandwidth, processor cycles, or disk space all impact the availability of a system.", + "short": "VA", + "options": { + "High (H)": { + "tooltip": "There is a total loss of availability, resulting in the attacker being able to fully deny access to resources in the Vulnerable System; this loss is either sustained (while the attacker continues to deliver the attack) or persistent (the condition persists even after the attack has completed). Alternatively, the attacker has the ability to deny some availability, but the loss of availability presents a direct, serious consequence to the Vulnerable System (e.g., the attacker cannot disrupt existing connections, but can prevent new connections; the attacker can repeatedly exploit a vulnerability that, in each instance of a successful attack, leaks a only small amount of memory, but after repeated exploitation causes a service to become completely unavailable).", + "value": "H" + }, + "Low (L)": { + "tooltip": "Performance is reduced or there are interruptions in resource availability. Even if repeated exploitation of the vulnerability is possible, the attacker does not have the ability to completely deny service to legitimate users. The resources in the Vulnerable System are either partially available all of the time, or fully available only some of the time, but overall there is no direct, serious consequence to the Vulnerable System.", + "value": "L" + }, + "None (N)": { + "tooltip": "There is no impact to availability within the Vulnerable System.", + "value": "N" + } + }, + "selected": "N" + } + }, + "Subsequent System Impact Metrics": { + "Confidentiality (SC)": { + "tooltip": "This metric measures the impact to the confidentiality of the information managed by the SUBSEQUENT SYSTEM due to a successfully exploited vulnerability. Confidentiality refers to limiting information access and disclosure to only authorized users, as well as preventing access by, or disclosure to, unauthorized ones.", + "short": "SC", + "options": { + "High (H)": { + "tooltip": "There is a total loss of confidentiality, resulting in all resources within the Subsequent System being divulged to the attacker. Alternatively, access to only some restricted information is obtained, but the disclosed information presents a direct, serious impact. For example, an attacker steals the administrator's password, or private encryption keys of a web server.", + "value": "H" + }, + "Low (L)": { + "tooltip": "There is some loss of confidentiality. Access to some restricted information is obtained, but the attacker does not have control over what information is obtained, or the amount or kind of loss is limited. The information disclosure does not cause a direct, serious loss to the Subsequent System.", + "value": "L" + }, + "None (N)": { + "tooltip": "There is no loss of confidentiality within the Subsequent System or all confidentiality impact is constrained to the Vulnerable System.", + "value": "N" + } + }, + "selected": "N" + }, + "Integrity (SI)": { + "tooltip": "This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information. Integrity of the SUBSEQUENT SYSTEM is impacted when an attacker makes unauthorized modification of system data. Integrity is also impacted when a system user can repudiate critical actions taken in the context of the system (e.g. due to insufficient logging).", + "short": "SI", + "options": { + "High (H)": { + "tooltip": "There is a total loss of integrity, or a complete loss of protection. For example, the attacker is able to modify any/all files protected by the Subsequent System. Alternatively, only some files can be modified, but malicious modification would present a direct, serious consequence to the Subsequent System.", + "value": "H" + }, + "Low (L)": { + "tooltip": "Modification of data is possible, but the attacker does not have control over the consequence of a modification, or the amount of modification is limited. The data modification does not have a direct, serious impact to the Subsequent System.", + "value": "L" + }, + "None (N)": { + "tooltip": "There is no loss of integrity within the Subsequent System or all integrity impact is constrained to the Vulnerable System.", + "value": "N" + } + }, + "selected": "N" + }, + "Availability (SA)": { + "tooltip": "This metric measures the impact to the availability of the SUBSEQUENT SYSTEM resulting from a successfully exploited vulnerability. While the Confidentiality and Integrity impact metrics apply to the loss of confidentiality or integrity of data (e.g., information, files) used by the system, this metric refers to the loss of availability of the impacted system itself, such as a networked service (e.g., web, database, email). Since availability refers to the accessibility of information resources, attacks that consume network bandwidth, processor cycles, or disk space all impact the availability of a system.", + "short": "SA", + "options": { + "High (H)": { + "tooltip": "There is a total loss of availability, resulting in the attacker being able to fully deny access to resources in the Subsequent System; this loss is either sustained (while the attacker continues to deliver the attack) or persistent (the condition persists even after the attack has completed). Alternatively, the attacker has the ability to deny some availability, but the loss of availability presents a direct, serious consequence to the Subsequent System (e.g., the attacker cannot disrupt existing connections, but can prevent new connections; the attacker can repeatedly exploit a vulnerability that, in each instance of a successful attack, leaks a only small amount of memory, but after repeated exploitation causes a service to become completely unavailable).", + "value": "H" + }, + "Low (L)": { + "tooltip": "Performance is reduced or there are interruptions in resource availability. Even if repeated exploitation of the vulnerability is possible, the attacker does not have the ability to completely deny service to legitimate users. The resources in the Subsequent System are either partially available all of the time, or fully available only some of the time, but overall there is no direct, serious consequence to the Subsequent System.", + "value": "L" + }, + "None (N)": { + "tooltip": "There is no impact to availability within the Subsequent System or all availability impact is constrained to the Vulnerable System.", + "value": "N" + } + }, + "selected": "N" + } + } + } + }, + "Supplemental Metrics": { + "fill": "supplier", + "metric_groups": { + "": { + "Safety (S)": { + "tooltip": "When a system does have an intended use or fitness of purpose aligned to safety, it is possible that exploiting a vulnerability within that system may have Safety impact which can be represented in the Supplemental Metrics group. Lack of a Safety metric value being supplied does NOT mean that there may not be any Safety-related impacts.", + "short": "S", + "options": { + "Not Defined (X)": { + "tooltip": "The metric has not been evaluated.", + "value": "X" + }, + "Negligible (N)": { + "tooltip": "Consequences of the vulnerability meet definition of IEC 61508 consequence category \"negligible.\"", + "value": "N" + }, + "Present (P)": { + "tooltip": "Consequences of the vulnerability meet definition of IEC 61508 consequence categories of \"marginal,\" \"critical,\" or \"catastrophic.\"", + "value": "P" + } + }, + "selected": "X" + }, + "Automatable (AU)": { + "tooltip": "The “ The “Automatable” metric captures the answer to the question “Can an attacker automate exploitation events for this vulnerability across multiple targets?” based on steps 1-4 of the kill chain [Hutchins et al., 2011]. These steps are reconnaissance, weaponization, delivery, and exploitation.", + "short": "AU", + "options": { + "Not Defined (X)": { + "tooltip": "The metric has not been evaluated.", + "value": "X" + }, + "No (N)": { + "tooltip": "Attackers cannot reliably automate all 4 steps of the kill chain for this vulnerability for some reason. These steps are reconnaissance, weaponization, delivery, and exploitation.", + "value": "N" + }, + "Yes (Y)": { + "tooltip": "Attackers can reliably automate all 4 steps of the kill chain. These steps are reconnaissance, weaponization, delivery, and exploitation (e.g., the vulnerability is “wormable”).", + "value": "Y" + } + }, + "selected": "X" + }, + "Recovery (R)": { + "tooltip": "Recovery describes the resilience of a system to recover services, in terms of performance and availability, after an attack has been performed.", + "short": "R", + "options": { + "Not Defined (X)": { + "tooltip": "The metric has not been evaluated.", + "value": "X" + }, + "Automatic (A)": { + "tooltip": "The system recovers services automatically after an attack has been performed.", + "value": "A" + }, + "User (U)": { + "tooltip": "The system requires manual intervention by the user to recover services, after an attack has been performed.", + "value": "U" + }, + "Irrecoverable (I)": { + "tooltip": "The system services are irrecoverable by the user, after an attack has been performed.", + "value": "I" + } + }, + "selected": "X" + }, + "Value Density (V)": { + "tooltip": "Value Density describes the resources that the attacker will gain control over with a single exploitation event.", + "short": "V", + "options": { + "Not Defined (X)": { + "tooltip": "The metric has not been evaluated.", + "value": "X" + }, + "Diffuse (D)": { + "tooltip": "The vulnerable system has limited resources. That is, the resources that the attacker will gain control over with a single exploitation event are relatively small. An example of Diffuse (think: limited) Value Density would be an attack on a single email client vulnerability.", + "value": "D" + }, + "Concentrated (C)": { + "tooltip": "The vulnerable system is rich in resources. Heuristically, such systems are often the direct responsibility of “system operators” rather than users. An example of Concentrated (think: broad) Value Density would be an attack on a central email server.", + "value": "C" + } + }, + "selected": "X" + }, + "Vulnerability Response Effort (RE)": { + "tooltip": "The intention of the Vulnerability Response Effort metric is to provide supplemental information on how difficult it is for consumers to provide an initial response to the impact of vulnerabilities for deployed products and services in their infrastructure. The consumer can then take this additional information on effort required into consideration when applying mitigations and/or scheduling remediation.", + "short": "RE", + "options": { + "Not Defined (X)": { + "tooltip": "The metric has not been evaluated.", + "value": "X" + }, + "Low (L)": { + "tooltip": "The effort required to respond to a vulnerability is low/trivial. Examples include: communication on better documentation, configuration workarounds, or guidance from the vendor that does not require an immediate update, upgrade, or replacement by the consuming entity, such as firewall filter configuration.", + "value": "L" + }, + "Moderate (M)": { + "tooltip": "The actions required to respond to a vulnerability require some effort on behalf of the consumer and could cause minimal service impact to implement. Examples include: simple remote update, disabling of a subsystem, or a low-touch software upgrade such as a driver update.", + "value": "M" + }, + "High (H)": { + "tooltip": "The actions required to respond to a vulnerability are significant and/or difficult, and may possibly lead to an extended, scheduled service impact. This would need to be considered for scheduling purposes including honoring any embargo on deployment of the selected response. Alternatively, response to the vulnerability in the field is not possible remotely. The only resolution to the vulnerability involves physical replacement (e.g. units deployed would have to be recalled for a depot level repair or replacement). Examples include: a highly privileged driver update, microcode or UEFI BIOS updates, or software upgrades requiring careful analysis and understanding of any potential infrastructure impact before implementation. A UEFI BIOS update that impacts Trusted Platform Module (TPM) attestation without impacting disk encryption software such as Bit locker is a good recent example. Irreparable failures such as non-bootable flash subsystems, failed disks or solid-state drives (SSD), bad memory modules, network devices, or other non-recoverable under warranty hardware, should also be scored as having a High effort.", + "value": "H" + } + }, + "selected": "X" + }, + "Provider Urgency (U)": { + "tooltip": "To facilitate a standardized method to incorporate additional provider-supplied assessment, an optional “pass-through” Supplemental Metric called Provider Urgency is available. Note: While any assessment provider along the product supply chain may provide a Provider Urgency rating. The Penultimate Product Provider (PPP) is best positioned to provide a direct assessment of Provider Urgency.", + "short": "U", + "options": { + "Not Defined (X)": { + "tooltip": "The metric has not been evaluated.", + "value": "X" + }, + "Clear": { + "tooltip": "Provider has assessed the impact of this vulnerability as having no urgency (Informational).", + "value": "Clear" + }, + "Green": { + "tooltip": "Provider has assessed the impact of this vulnerability as having a reduced urgency.", + "value": "Green" + }, + "Amber": { + "tooltip": "Provider has assessed the impact of this vulnerability as having a moderate urgency.", + "value": "Amber" + }, + "Red": { + "tooltip": "Provider has assessed the impact of this vulnerability as having the highest urgency.", + "value": "Red" + } + }, + "selected": "X" + } + } + } + }, + "Environmental (Modified Base Metrics)": { + "fill": "consumer", + "metric_groups": { + "Exploitability Metrics": { + "Attack Vector (MAV)": { + "tooltip": "These metrics enable the consumer analyst to override individual Base metric values based on specific characteristics of a user’s environment. This metric reflects the context by which vulnerability exploitation is possible. This metric value (and consequently the resulting severity) will be larger the more remote (logically, and physically) an attacker can be in order to exploit the vulnerable system. The assumption is that the number of potential attackers for a vulnerability that could be exploited from across a network is larger than the number of potential attackers that could exploit a vulnerability requiring physical access to a device, and therefore warrants a greater severity.", + "short": "MAV", + "options": { + "Not Defined (X)": { + "tooltip": "The metric has not been evaluated.", + "value": "X" + }, + "Network (N)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "N" + }, + "Adjacent (A)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "A" + }, + "Local (L)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "L" + }, + "Physical (P)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "P" + } + }, + "selected": "X" + }, + "Attack Complexity (MAC)": { + "tooltip": "These metrics enable the consumer analyst to override individual Base metric values based on specific characteristics of a user’s environment. This metric captures measurable actions that must be taken by the attacker to actively evade or circumvent existing built-in security-enhancing conditions in order to obtain a working exploit. These are conditions whose primary purpose is to increase security and/or increase exploit engineering complexity. A vulnerability exploitable without a target-specific variable has a lower complexity than a vulnerability that would require non-trivial customization. This metric is meant to capture security mechanisms utilized by the vulnerable system.", + "short": "MAC", + "options": { + "Not Defined (X)": { + "tooltip": "The metric has not been evaluated.", + "value": "X" + }, + "Low (L)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "L" + }, + "High (H)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "H" + } + }, + "selected": "X" + }, + "Attack Requirements (MAT)": { + "tooltip": "These metrics enable the consumer analyst to override individual Base metric values based on specific characteristics of a user’s environment. This metric captures the prerequisite deployment and execution conditions or variables of the vulnerable system that enable the attack. These differ from security-enhancing techniques/technologies (ref Attack Complexity) as the primary purpose of these conditions is not to explicitly mitigate attacks, but rather, emerge naturally as a consequence of the deployment and execution of the vulnerable system.", + "short": "MAT", + "options": { + "Not Defined (X)": { + "tooltip": "The metric has not been evaluated.", + "value": "X" + }, + "None (N)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "N" + }, + "Present (P)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "P" + } + }, + "selected": "X" + }, + "Privileges Required (MPR)": { + "tooltip": "These metrics enable the consumer analyst to override individual Base metric values based on specific characteristics of a user’s environment. This metric describes the level of privileges an attacker must possess prior to successfully exploiting the vulnerability. The method by which the attacker obtains privileged credentials prior to the attack (e.g., free trial accounts), is outside the scope of this metric. Generally, self-service provisioned accounts do not constitute a privilege requirement if the attacker can grant themselves privileges as part of the attack.", + "short": "MPR", + "options": { + "Not Defined (X)": { + "tooltip": "The metric has not been evaluated.", + "value": "X" + }, + "None (N)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "N" + }, + "Low (L)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "L" + }, + "High (H)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "H" + } + }, + "selected": "X" + }, + "User Interaction (MUI)": { + "tooltip": "These metrics enable the consumer analyst to override individual Base metric values based on specific characteristics of a user’s environment. This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable system. This metric determines whether the vulnerability can be exploited solely at the will of the attacker, or whether a separate user (or user-initiated process) must participate in some manner.", + "short": "MUI", + "options": { + "Not Defined (X)": { + "tooltip": "The metric has not been evaluated.", + "value": "X" + }, + "None (N)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "N" + }, + "Passive (P)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "P" + }, + "Active (A)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "A" + } + }, + "selected": "X" + } + }, + "Vulnerable System Impact Metrics": { + "Confidentiality (MVC)": { + "tooltip": "These metrics enable the consumer analyst to override individual Base metric values based on specific characteristics of a user’s environment. This metric measures the impact to the confidentiality of the information managed by the VULNERABLE SYSTEM due to a successfully exploited vulnerability. Confidentiality refers to limiting information access and disclosure to only authorized users, as well as preventing access by, or disclosure to, unauthorized ones.", + "short": "MVC", + "options": { + "Not Defined (X)": { + "tooltip": "The metric has not been evaluated.", + "value": "X" + }, + "High (H)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "H" + }, + "Low (L)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "L" + }, + "None (N)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "N" + } + }, + "selected": "X" + }, + "Integrity (MVI)": { + "tooltip": "These metrics enable the consumer analyst to override individual Base metric values based on specific characteristics of a user’s environment. This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information. Integrity of the VULNERABLE SYSTEM is impacted when an attacker makes unauthorized modification of system data. Integrity is also impacted when a system user can repudiate critical actions taken in the context of the system (e.g. due to insufficient logging).", + "short": "MVI", + "options": { + "Not Defined (X)": { + "tooltip": "The metric has not been evaluated.", + "value": "X" + }, + "High (H)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "H" + }, + "Low (L)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "L" + }, + "None (N)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "N" + } + }, + "selected": "X" + }, + "Availability (MVA)": { + "tooltip": "These metrics enable the consumer analyst to override individual Base metric values based on specific characteristics of a user’s environment. This metric measures the impact to the availability of the VULNERABLE SYSTEM resulting from a successfully exploited vulnerability. While the Confidentiality and Integrity impact metrics apply to the loss of confidentiality or integrity of data (e.g., information, files) used by the system, this metric refers to the loss of availability of the impacted system itself, such as a networked service (e.g., web, database, email). Since availability refers to the accessibility of information resources, attacks that consume network bandwidth, processor cycles, or disk space all impact the availability of a system.", + "short": "MVA", + "options": { + "Not Defined (X)": { + "tooltip": "The metric has not been evaluated.", + "value": "X" + }, + "High (H)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "H" + }, + "Low (L)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "L" + }, + "None (N)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "N" + } + }, + "selected": "X" + } + }, + "Subsequent System Impact Metrics": { + "Confidentiality (MSC)": { + "tooltip": "These metrics enable the consumer analyst to override individual Base metric values based on specific characteristics of a user’s environment. This metric measures the impact to the confidentiality of the information managed by the SUBSEQUENT SYSTEM due to a successfully exploited vulnerability. Confidentiality refers to limiting information access and disclosure to only authorized users, as well as preventing access by, or disclosure to, unauthorized ones.", + "short": "MSC", + "options": { + "Not Defined (X)": { + "tooltip": "The metric has not been evaluated.", + "value": "X" + }, + "": { + }, + "High (H)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "H" + }, + "Low (L)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "L" + }, + "Negligible (N)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "N" + } + }, + "selected": "X" + }, + "Integrity (MSI)": { + "tooltip": "These metrics enable the consumer analyst to override individual Base metric values based on specific characteristics of a user’s environment. This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information. Integrity of the SUBSEQUENT SYSTEM is impacted when an attacker makes unauthorized modification of system data. Integrity is also impacted when a system user can repudiate critical actions taken in the context of the system (e.g. due to insufficient logging). In addition to the logical systems defined for System of Interest, Subsequent Systems can also include impacts to humans.", + "short": "MSI", + "options": { + "Not Defined (X)": { + "tooltip": "The metric has not been evaluated.", + "value": "X" + }, + "Safety (S)": { + "tooltip": "The exploited vulnerability will result in integrity impacts that could cause serious injury or worse (categories of “Marginal” or worse as described in IEC 61508) to a human actor or participant.", + "value": "S" + }, + "High (H)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "H" + }, + "Low (L)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "L" + }, + "Negligible (N)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "N" + } + }, + "selected": "X" + }, + "Availability (MSA)": { + "tooltip": "These metrics enable the consumer analyst to override individual Base metric values based on specific characteristics of a user’s environment. This metric measures the impact to the availability of the SUBSEQUENT SYSTEM resulting from a successfully exploited vulnerability. While the Confidentiality and Integrity impact metrics apply to the loss of confidentiality or integrity of data (e.g., information, files) used by the system, this metric refers to the loss of availability of the impacted system itself, such as a networked service (e.g., web, database, email). Since availability refers to the accessibility of information resources, attacks that consume network bandwidth, processor cycles, or disk space all impact the availability of a system. In addition to the logical systems defined for System of Interest, Subsequent Systems can also include impacts to humans.", + "short": "MSA", + "options": { + "Not Defined (X)": { + "tooltip": "The metric has not been evaluated.", + "value": "X" + }, + "Safety (S)": { + "tooltip": "The exploited vulnerability will result in availability impacts that could cause serious injury or worse (categories of \"Marginal\" or worse as described in IEC 61508) to a human actor or participant.", + "value": "S" + }, + "High (H)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "H" + }, + "Low (L)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "L" + }, + "Negligible (N)": { + "tooltip": "This metric values has the same definition as the Base Metric value defined above.", + "value": "N" + } + }, + "selected": "X" + } + } + } + }, + "Environmental (Security Requirements)": { + "fill": "consumer", + "metric_groups": { + "": { + "Confidentiality Requirements (CR)": { + "tooltip": "This metric enables the consumer to customize the assessment depending on the importance of the affected IT asset to the analyst’s organization, measured in terms of Confidentiality. That is, if an IT asset supports a business function for which Confidentiality is most important, the analyst can assign a greater value to Confidentiality metrics relative to Integrity and Availability.", + "short": "CR", + "options": { + "Not Defined (X)": { + "tooltip": "Assigning this value indicates there is insufficient information to choose one of the other values, and has no impact on the overall Environmental Score", + "value": "X" + }, + "High (H)": { + "tooltip": "Loss of Confidentiality is likely to have a catastrophic adverse effect on the organization or individuals associated with the organization.", + "value": "H" + }, + "Medium (M)": { + "tooltip": "Loss of Confidentiality is likely to have a serious adverse effect on the organization or individuals associated with the organization.", + "value": "M" + }, + "Low (L)": { + "tooltip": "Loss of Confidentiality is likely to have only a limited adverse effect on the organization or individuals associated with the organization.", + "value": "L" + } + }, + "selected": "X" + }, + "Integrity Requirements (IR)": { + "tooltip": "This metric enables the consumer to customize the assessment depending on the importance of the affected IT asset to the analyst’s organization, measured in terms of Integrity. That is, if an IT asset supports a business function for which Integrity is most important, the analyst can assign a greater value to Integrity metrics relative to Confidentiality and Availability.", + "short": "IR", + "options": { + "Not Defined (X)": { + "tooltip": "Assigning this value indicates there is insufficient information to choose one of the other values, and has no impact on the overall Environmental Score", + "value": "X" + }, + "High (H)": { + "tooltip": "Loss of Integrity is likely to have a catastrophic adverse effect on the organization or individuals associated with the organization.", + "value": "H" + }, + "Medium (M)": { + "tooltip": "Loss of Integrity is likely to have a serious adverse effect on the organization or individuals associated with the organization.", + "value": "M" + }, + "Low (L)": { + "tooltip": "Loss of Integrity is likely to have only a limited adverse effect on the organization or individuals associated with the organization.", + "value": "L" + } + }, + "selected": "X" + }, + "Availability Requirements (AR)": { + "tooltip": "This metric enables the consumer to customize the assessment depending on the importance of the affected IT asset to the analyst’s organization, measured in terms of Availability. That is, if an IT asset supports a business function for which Availability is most important, the analyst can assign a greater value to Availability metrics relative to Confidentiality and Integrity.", + "short": "AR", + "options": { + "Not Defined (X)": { + "tooltip": "Assigning this value indicates there is insufficient information to choose one of the other values, and has no impact on the overall Environmental Score", + "value": "X" + }, + "High (H)": { + "tooltip": "Loss of Availability is likely to have a catastrophic adverse effect on the organization or individuals associated with the organization.", + "value": "H" + }, + "Medium (M)": { + "tooltip": "Loss of Availability is likely to have a serious adverse effect on the organization or individuals associated with the organization.", + "value": "M" + }, + "Low (L)": { + "tooltip": "Loss of Availability is likely to have only a limited adverse effect on the organization or individuals associated with the organization.", + "value": "L" + } + }, + "selected": "X" + } + } + } + }, + "Threat Metrics": { + "fill": "consumer", + "metric_groups": { + "": { + "Exploit Maturity (E)": { + "tooltip": "This metric measures the likelihood of the vulnerability being attacked, and is typically based on the current state of exploit techniques, exploit code availability, or active, \"in-the-wild\" exploitation. It is the responsibility of the CVSS consumer to populate the values of Exploit Maturity (E) based on information regarding the availability of exploitation code/processes and the state of exploitation techniques. This information will be referred to as \"threat intelligence\".", + "short": "E", + "options": { + "Not Defined (X)": { + "tooltip": "The Exploit Maturity metric is not being used. Reliable threat intelligence is not available to determine Exploit Maturity characteristics.", + "value": "X" + }, + "Attacked (A)": { + "tooltip": "Based on threat intelligence sources either of the following must apply:\n· Attacks targeting this vulnerability (attempted or successful) have been reported\n· Solutions to simplify attempts to exploit the vulnerability are publicly or privately available (such as exploit toolkits)", + "value": "A" + }, + "POC (P)": { + "tooltip": "Based on threat intelligence sources each of the following must apply:\n· Proof-of-concept is publicly available\n· No knowledge of reported attempts to exploit this vulnerability\n· No knowledge of publicly available solutions used to simplify attempts to exploit the vulnerability", + "value": "P" + }, + "Unreported (U)": { + "tooltip": "Based on threat intelligence sources each of the following must apply:\n· No knowledge of publicly available proof-of-concept\n· No knowledge of reported attempts to exploit this vulnerability\n· No knowledge of publicly available solutions used to simplify attempts to exploit the vulnerability", + "value": "U" + } + }, + "selected": "X" + } + } + } + } + } + \ No newline at end of file diff --git a/cvss40.js b/cvss40.js new file mode 100644 index 0000000..0710b3b --- /dev/null +++ b/cvss40.js @@ -0,0 +1,1041 @@ +// Copyright FIRST, Red Hat, and contributors +// SPDX-License-Identifier: BSD-2-Clause + + +/** + * Loads and parses a JSON configuration file synchronously. + * + * This function sends a synchronous GET request to load a JSON file and parses + * its content into a JavaScript object. If the request fails, it logs an error + * and returns null. + * + * @param {string} filename - The name of the JSON configuration file (without the .json extension). + * @returns {object|null} - The parsed JSON object if the request is successful; otherwise, null. + */ +function loadConfig(filename) { + let request = new XMLHttpRequest(); + // false makes the request synchronous + request.open('GET', './' + filename + '.json', false); + request.send(null); + + if (request.status === 200) { + return JSON.parse(request.responseText); + } else { + console.error('Error loading config data:', request.statusText); + return null; + } +} + + +class CVSS40 { + + + static LOOKUP = { + "000000": 10, + "000001": 9.9, + "000010": 9.8, + "000011": 9.5, + "000020": 9.5, + "000021": 9.2, + "000100": 10, + "000101": 9.6, + "000110": 9.3, + "000111": 8.7, + "000120": 9.1, + "000121": 8.1, + "000200": 9.3, + "000201": 9, + "000210": 8.9, + "000211": 8, + "000220": 8.1, + "000221": 6.8, + "001000": 9.8, + "001001": 9.5, + "001010": 9.5, + "001011": 9.2, + "001020": 9, + "001021": 8.4, + "001100": 9.3, + "001101": 9.2, + "001110": 8.9, + "001111": 8.1, + "001120": 8.1, + "001121": 6.5, + "001200": 8.8, + "001201": 8, + "001210": 7.8, + "001211": 7, + "001220": 6.9, + "001221": 4.8, + "002001": 9.2, + "002011": 8.2, + "002021": 7.2, + "002101": 7.9, + "002111": 6.9, + "002121": 5, + "002201": 6.9, + "002211": 5.5, + "002221": 2.7, + "010000": 9.9, + "010001": 9.7, + "010010": 9.5, + "010011": 9.2, + "010020": 9.2, + "010021": 8.5, + "010100": 9.5, + "010101": 9.1, + "010110": 9, + "010111": 8.3, + "010120": 8.4, + "010121": 7.1, + "010200": 9.2, + "010201": 8.1, + "010210": 8.2, + "010211": 7.1, + "010220": 7.2, + "010221": 5.3, + "011000": 9.5, + "011001": 9.3, + "011010": 9.2, + "011011": 8.5, + "011020": 8.5, + "011021": 7.3, + "011100": 9.2, + "011101": 8.2, + "011110": 8, + "011111": 7.2, + "011120": 7, + "011121": 5.9, + "011200": 8.4, + "011201": 7, + "011210": 7.1, + "011211": 5.2, + "011220": 5, + "011221": 3, + "012001": 8.6, + "012011": 7.5, + "012021": 5.2, + "012101": 7.1, + "012111": 5.2, + "012121": 2.9, + "012201": 6.3, + "012211": 2.9, + "012221": 1.7, + "100000": 9.8, + "100001": 9.5, + "100010": 9.4, + "100011": 8.7, + "100020": 9.1, + "100021": 8.1, + "100100": 9.4, + "100101": 8.9, + "100110": 8.6, + "100111": 7.4, + "100120": 7.7, + "100121": 6.4, + "100200": 8.7, + "100201": 7.5, + "100210": 7.4, + "100211": 6.3, + "100220": 6.3, + "100221": 4.9, + "101000": 9.4, + "101001": 8.9, + "101010": 8.8, + "101011": 7.7, + "101020": 7.6, + "101021": 6.7, + "101100": 8.6, + "101101": 7.6, + "101110": 7.4, + "101111": 5.8, + "101120": 5.9, + "101121": 5, + "101200": 7.2, + "101201": 5.7, + "101210": 5.7, + "101211": 5.2, + "101220": 5.2, + "101221": 2.5, + "102001": 8.3, + "102011": 7, + "102021": 5.4, + "102101": 6.5, + "102111": 5.8, + "102121": 2.6, + "102201": 5.3, + "102211": 2.1, + "102221": 1.3, + "110000": 9.5, + "110001": 9, + "110010": 8.8, + "110011": 7.6, + "110020": 7.6, + "110021": 7, + "110100": 9, + "110101": 7.7, + "110110": 7.5, + "110111": 6.2, + "110120": 6.1, + "110121": 5.3, + "110200": 7.7, + "110201": 6.6, + "110210": 6.8, + "110211": 5.9, + "110220": 5.2, + "110221": 3, + "111000": 8.9, + "111001": 7.8, + "111010": 7.6, + "111011": 6.7, + "111020": 6.2, + "111021": 5.8, + "111100": 7.4, + "111101": 5.9, + "111110": 5.7, + "111111": 5.7, + "111120": 4.7, + "111121": 2.3, + "111200": 6.1, + "111201": 5.2, + "111210": 5.7, + "111211": 2.9, + "111220": 2.4, + "111221": 1.6, + "112001": 7.1, + "112011": 5.9, + "112021": 3, + "112101": 5.8, + "112111": 2.6, + "112121": 1.5, + "112201": 2.3, + "112211": 1.3, + "112221": 0.6, + "200000": 9.3, + "200001": 8.7, + "200010": 8.6, + "200011": 7.2, + "200020": 7.5, + "200021": 5.8, + "200100": 8.6, + "200101": 7.4, + "200110": 7.4, + "200111": 6.1, + "200120": 5.6, + "200121": 3.4, + "200200": 7, + "200201": 5.4, + "200210": 5.2, + "200211": 4, + "200220": 4, + "200221": 2.2, + "201000": 8.5, + "201001": 7.5, + "201010": 7.4, + "201011": 5.5, + "201020": 6.2, + "201021": 5.1, + "201100": 7.2, + "201101": 5.7, + "201110": 5.5, + "201111": 4.1, + "201120": 4.6, + "201121": 1.9, + "201200": 5.3, + "201201": 3.6, + "201210": 3.4, + "201211": 1.9, + "201220": 1.9, + "201221": 0.8, + "202001": 6.4, + "202011": 5.1, + "202021": 2, + "202101": 4.7, + "202111": 2.1, + "202121": 1.1, + "202201": 2.4, + "202211": 0.9, + "202221": 0.4, + "210000": 8.8, + "210001": 7.5, + "210010": 7.3, + "210011": 5.3, + "210020": 6, + "210021": 5, + "210100": 7.3, + "210101": 5.5, + "210110": 5.9, + "210111": 4, + "210120": 4.1, + "210121": 2, + "210200": 5.4, + "210201": 4.3, + "210210": 4.5, + "210211": 2.2, + "210220": 2, + "210221": 1.1, + "211000": 7.5, + "211001": 5.5, + "211010": 5.8, + "211011": 4.5, + "211020": 4, + "211021": 2.1, + "211100": 6.1, + "211101": 5.1, + "211110": 4.8, + "211111": 1.8, + "211120": 2, + "211121": 0.9, + "211200": 4.6, + "211201": 1.8, + "211210": 1.7, + "211211": 0.7, + "211220": 0.8, + "211221": 0.2, + "212001": 5.3, + "212011": 2.4, + "212021": 1.4, + "212101": 2.4, + "212111": 1.2, + "212121": 0.5, + "212201": 1, + "212211": 0.3, + "212221": 0.1 + } + + + // The following defines the index of each metric's values. + // It is used when looking for the highest vector part of the + // combinations produced by the MacroVector respective highest + static METRIC_LEVELS = { + "AV": {"N": 0.0, "A": 0.1, "L": 0.2, "P": 0.3}, + "PR": {"N": 0.0, "L": 0.1, "H": 0.2}, + "UI": {"N": 0.0, "P": 0.1, "A": 0.2}, + "AC": {'L': 0.0, 'H': 0.1}, + "AT": {'N': 0.0, 'P': 0.1}, + "VC": {'H': 0.0, 'L': 0.1, 'N': 0.2}, + "VI": {'H': 0.0, 'L': 0.1, 'N': 0.2}, + "VA": {'H': 0.0, 'L': 0.1, 'N': 0.2}, + "SC": {'H': 0.1, 'L': 0.2, 'N': 0.3}, + "SI": {'S': 0.0, 'H': 0.1, 'L': 0.2, 'N': 0.3}, + "SA": {'S': 0.0, 'H': 0.1, 'L': 0.2, 'N': 0.3}, + "CR": {'H': 0.0, 'M': 0.1, 'L': 0.2}, + "IR": {'H': 0.0, 'M': 0.1, 'L': 0.2}, + "AR": {'H': 0.0, 'M': 0.1, 'L': 0.2}, + "E": {'U': 0.2, 'P': 0.1, 'A': 0} + } + + // CVSS v4.0 metrics ordering and valid values + static EXPECTED_METRIC_ORDER = { + // Base (11 metrics) + "AV": ["N", "A", "L", "P"], + "AC": ["L", "H"], + "AT": ["N", "P"], + "PR": ["N", "L", "H"], + "UI": ["N", "P", "A"], + "VC": ["H", "L", "N"], + "VI": ["H", "L", "N"], + "VA": ["H", "L", "N"], + "SC": ["H", "L", "N"], + "SI": ["H", "L", "N"], + "SA": ["H", "L", "N"], + // Threat (1 metric) + "E": ["X", "A", "P", "U"], + // Environmental (14 metrics) + "CR": ["X", "H", "M", "L"], + "IR": ["X", "H", "M", "L"], + "AR": ["X", "H", "M", "L"], + "MAV": ["X", "N", "A", "L", "P"], + "MAC": ["X", "L", "H"], + "MAT": ["X", "N", "P"], + "MPR": ["X", "N", "L", "H"], + "MUI": ["X", "N", "P", "A"], + "MVC": ["X", "H", "L", "N"], + "MVI": ["X", "H", "L", "N"], + "MVA": ["X", "H", "L", "N"], + "MSC": ["X", "H", "L", "N"], + "MSI": ["X", "S", "H", "L", "N"], + "MSA": ["X", "S", "H", "L", "N"], + // Supplemental (6 metrics) + "S": ["X", "N", "P"], + "AU": ["X", "N", "Y"], + "R": ["X", "A", "U", "I"], + "V": ["X", "D", "C"], + "RE": ["X", "L", "M", "H"], + "U": ["X", "Clear", "Green", "Amber", "Red"], + }; + + static MAX_COMPOSED = { + // EQ1 + "eq1": { + 0: ["AV:N/PR:N/UI:N/"], + 1: ["AV:A/PR:N/UI:N/", "AV:N/PR:L/UI:N/", "AV:N/PR:N/UI:P/"], + 2: ["AV:P/PR:N/UI:N/", "AV:A/PR:L/UI:P/"] + }, + // EQ2 + "eq2": { + 0: ["AC:L/AT:N/"], + 1: ["AC:H/AT:N/", "AC:L/AT:P/"] + }, + // EQ3+EQ6 + "eq3": { + 0: { "0": ["VC:H/VI:H/VA:H/CR:H/IR:H/AR:H/"], "1": ["VC:H/VI:H/VA:L/CR:M/IR:M/AR:H/", "VC:H/VI:H/VA:H/CR:M/IR:M/AR:M/"] }, + 1: { "0": ["VC:L/VI:H/VA:H/CR:H/IR:H/AR:H/", "VC:H/VI:L/VA:H/CR:H/IR:H/AR:H/"], "1": ["VC:L/VI:H/VA:L/CR:H/IR:M/AR:H/", "VC:L/VI:H/VA:H/CR:H/IR:M/AR:M/", "VC:H/VI:L/VA:H/CR:M/IR:H/AR:M/", "VC:H/VI:L/VA:L/CR:M/IR:H/AR:H/", "VC:L/VI:L/VA:H/CR:H/IR:H/AR:M/"] }, + 2: { "1": ["VC:L/VI:L/VA:L/CR:H/IR:H/AR:H/"] }, + }, + // EQ4 + "eq4": { + 0: ["SC:H/SI:S/SA:S/"], + 1: ["SC:H/SI:H/SA:H/"], + 2: ["SC:L/SI:L/SA:L/"] + + }, + // EQ5 + "eq5": { + 0: ["E:A/"], + 1: ["E:P/"], + 2: ["E:U/"], + }, + }; + + // max severity distances in EQs MacroVectors (+1) + static MAX_SEVERITY = { + "eq1": { + 0: 1, + 1: 4, + 2: 5 + }, + "eq2": { + 0: 1, + 1: 2 + }, + "eq3eq6": { + 0: { 0: 7, 1: 6 }, + 1: { 0: 8, 1: 8 }, + 2: { 1: 10 } + }, + "eq4": { + 0: 6, + 1: 5, + 2: 4 + }, + "eq5": { + 0: 1, + 1: 1, + 2: 1 + }, + }; + + static MACRO_VECTOR_DETAILS = { + "Exploitability": 0, + "Complexity": 1, + "Vulnerable system": 2, + "Subsequent system": 3, + "Exploitation": 4, + "Security requirements": 5 + }; + + static MACRO_VECTOR_VALUES = { + "0": "High", + "1": "Medium", + "2": "Low", + "3": "None" + }; + + static CONFIG = loadConfig('config'); + + /** + * Constructs a CVSS40 object and initializes its properties. + * + * This constructor validates the provided CVSS v4.0 vector string against the CVSS v4.0 schema, + * extracts the metrics from the vector string, computes the equivalency vector, + * and calculates the base score. + * + * For more information on the CVSS v4.0 schema, refer to: + * https://www.first.org/cvss/cvss-v4.0.json + * + * @param {string} vectorString - The CVSS v4.0 vector string (e.g., "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/MAV:A/AU:N/R:A"). + * Defaults to an empty string if not provided. + * @throws {Error} - Throws an error if the vector string is invalid according to the CVSS v4.0 schema. + */ + constructor(vectorString = "") { + this.vectorString = vectorString; + + // Initialize vectorMetrics with all metrics set to "X" + this.vectorMetrics = this.initializeVectorMetrics(); + + // Extract the metrics from the vector string and update vectorMetrics + this.updateVectorMetricsFromStringVector(vectorString); + + // Compute the equivalency vector + this.macroVectorResult = this.getEquivalencyVector(); + + // Calculate the base score + this.baseScore = this.calculateScore(); + + // Save the base severity + this.baseSeverity = this.calculateSeverityRating(this.baseScore); + } + + + initializeVectorMetrics() { + const selected = {}; + for (let metricType in CVSS40.CONFIG) { + for (let metricGroup in CVSS40.CONFIG[metricType].metric_groups) { + for (let metric in CVSS40.CONFIG[metricType].metric_groups[metricGroup]) { + selected[CVSS40.CONFIG[metricType].metric_groups[metricGroup][metric].short] = "X"; + } + } + } + return selected; + } + + + /** + * Validates a CVSS v4.0 vector string. + * + * This method checks the structure of a given CVSS v4.0 vector string to ensure it adheres to the expected format and values. + * It verifies the presence of the "CVSS:4.0" prefix, the mandatory metrics, and their valid values. + * + * @param {string} vector - The CVSS v4.0 vector string to validate (e.g., "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/MAV:A/AU:N/R:A"). + * @returns {boolean} - Returns true if the vector is valid, otherwise false. + */ + validateStringVector(vector) { + const metrics = vector.split('/'); + + // Check if the prefix is correct + if (metrics.shift() !== "CVSS:4.0") { + console.log("Error: invalid vector, missing CVSS v4.0 prefix from vector: " + vector); + return false; + } + + const expectedMetrics = Object.entries(CVSS40.EXPECTED_METRIC_ORDER); + let mandatoryMetricIndex = 0; + + for (let metric of metrics) { + const [key, value] = metric.split(':'); + + // Check if there are too many metric values + if (!expectedMetrics[mandatoryMetricIndex]) { + console.log("Error: invalid vector, too many metric values"); + return false; + } + + // Find the current expected metric + while (expectedMetrics[mandatoryMetricIndex] && expectedMetrics[mandatoryMetricIndex][0] !== key) { + // Check for missing mandatory metrics + if (mandatoryMetricIndex < 11) { + console.log("Error: invalid vector, missing mandatory metrics"); + return false; + } + mandatoryMetricIndex++; + } + + // Check if the value is valid for the given metric + if (!expectedMetrics[mandatoryMetricIndex][1].includes(value)) { + console.log(`Error: invalid vector, for key ${key}, value ${value} is not in ${expectedMetrics[mandatoryMetricIndex][1]}`); + return false; + } + + mandatoryMetricIndex++; + } + + return true; + } + + + + /** + * Builds an object representing the selected CVSS metrics from a string vector. + * + * This method parses a CVSS v4.0 vector string and constructs an object where + * each key is a metric and each value is the corresponding value from the vector. + * + * @param {string} vector - The CVSS v4.0 vector string (e.g., "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/MAV:A/AU:N/R:A"). + * @returns {object} - An object with keys as metric abbreviations and values as their corresponding values. + */ + updateVectorMetricsFromStringVector(vector) { + // Validate the CVSS v4.0 string vector + if (!this.validateStringVector(vector)) { + throw new Error("Invalid CVSS v4.0 vector"); + } + + + let metrics = vector.split('/'); + + // Remove the "CVSS:4.0" prefix + metrics.shift(); + + // Iterate through each metric and update the vectorMetrics object + for (let metric of metrics) { + let [key, value] = metric.split(':'); + this.vectorMetrics[key] = value; + } + + return this.vectorMetrics; + } + + /** + * Calculates the qualitative severity rating based on the CVSS score. + * + * The rating is determined according to the following scale: + * - None: 0.0 + * - Low: 0.1 - 3.9 + * - Medium: 4.0 - 6.9 + * - High: 7.0 - 8.9 + * - Critical: 9.0 - 10.0 + * + * @param {number} score - The CVSS score. + * @returns {string} - The qualitative severity rating. + */ + calculateSeverityRating(score) { + if (score === 0.0) { + return "None"; + } else if (score >= 0.1 && score <= 3.9) { + return "Low"; + } else if (score >= 4.0 && score <= 6.9) { + return "Medium"; + } else if (score >= 7.0 && score <= 8.9) { + return "High"; + } else if (score >= 9.0 && score <= 10.0) { + return "Critical"; + } + return "Unknown"; // In case of an unexpected score value + } + + + /** + * Rounds a number to one decimal place using the "Round Half Up" method. + * + * Examples: + * roundHalfUp(4.945833333333333) -> 4.9 + * roundHalfUp(4.25) -> 4.3 + * roundHalfUp(6.748571428571428) -> 6.7 + * + * @param {number} value - The number to be rounded. + * @return {number} - The rounded number to one decimal place. + */ + roundHalfUp(value) { + // Multiply the value by 10 to shift the decimal place + // Math.round will round to the nearest whole number + // Divide by 10 to shift the decimal place back to its original position + return Math.round(value * 10) / 10; + } + + + /** + * Calculates the severity distances between the effective metric values and the extracted metric values + * for a given maximum vector. + * + * This method computes the difference between the effective value of each metric in the CVSS vector and + * the corresponding value in the provided maximum vector. The differences are stored in an object where + * the keys are the metric names and the values are the calculated distances. + * + * @param {string} maxVector - The maximum vector string representing the highest severity levels. + * @returns {object} - An object with keys as metric names and values as the calculated severity distances. + */ + calculateSeverityDistances(maxVector) { + const distances = {}; + for (const metric in CVSS40.METRIC_LEVELS) { + const effectiveMetricValue = this.getEffectiveMetricValue(metric); + const extractedMetricValue = this.extractValueMetric(metric, maxVector); + distances[metric] = CVSS40.METRIC_LEVELS[metric][effectiveMetricValue] - CVSS40.METRIC_LEVELS[metric][extractedMetricValue]; + } + return distances; + } + + + + /** + * Calculates the CVSS v4.0 base score for the given vector. + * + * This method follows the CVSS v4.0 specification to determine the base score for a given vector. + * It handles the case where there is no impact on the system by returning a score of 0.0. + * Otherwise, it calculates the score based on the maximal scoring differences (MSD) for each EQ + * (Equivalency) and the severity distances from the highest severity vector in the same MacroVector. + * + * The process involves the following steps: + * 1. Determine the maximal scoring difference (MSD) for each EQ by computing the difference between + * the current MacroVector and the next lower MacroVector. + * 2. Retrieve the highest severity vectors for each EQ and compute the severity distances from the + * to-be-scored vector. + * 3. Calculate the current severity distances for each EQ and determine the proportion of the distance. + * 4. Compute the mean of the proportional distances. + * 5. Subtract the mean distance from the score of the highest severity vector to obtain the final score. + * + * For detailed information on the CVSS v4.0 specification, refer to: + * https://www.first.org/cvss/v4.0/specification-document + * + * @returns {number} - The calculated CVSS v4.0 base score, rounded to one decimal place. + */ + calculateScore() { + + // Constants + const NO_IMPACT_METRICS = ["VC", "VI", "VA", "SC", "SI", "SA"]; + const STEP = 0.1; + + // Exception for no impact on system + if (NO_IMPACT_METRICS.every((metric) => this.getEffectiveMetricValue(metric) === "N")) { + return 0.0; + } + + let value = CVSS40.LOOKUP[this.macroVectorResult] + + // 1. For each of the EQs: + // a. The maximal scoring difference is determined as the difference + // between the current MacroVector and the lower MacroVector. + // i. If there is no lower MacroVector the available distance is + // set to NaN and then ignored in the further calculations. + + // EQ values + const [eq1, eq2, eq3, eq4, eq5, eq6] = this.macroVectorResult.split('').map(Number); + + + // compute next lower macro, it can also not exist + const eq1_next_lower_macro = `${eq1 + 1}${eq2}${eq3}${eq4}${eq5}${eq6}`; + const eq2_next_lower_macro = `${eq1}${eq2 + 1}${eq3}${eq4}${eq5}${eq6}`; + + let eq3eq6_next_lower_macro; + let eq3eq6_next_lower_macro_left; + let eq3eq6_next_lower_macro_right; + + // eq3 and eq6 are related + if (eq3 == 1 && eq6 == 1) { + // 11 --> 21 + eq3eq6_next_lower_macro = "".concat(eq1, eq2, eq3 + 1, eq4, eq5, eq6) + } else if (eq3 == 0 && eq6 == 1) { + // 01 --> 11 + eq3eq6_next_lower_macro = "".concat(eq1, eq2, eq3 + 1, eq4, eq5, eq6) + } else if (eq3 == 1 && eq6 == 0) { + // 10 --> 11 + eq3eq6_next_lower_macro = "".concat(eq1, eq2, eq3, eq4, eq5, eq6 + 1) + } else if (eq3 == 0 && eq6 == 0) { + // 00 --> 01 + // 00 --> 10 + eq3eq6_next_lower_macro_left = "".concat(eq1, eq2, eq3, eq4, eq5, eq6 + 1) + eq3eq6_next_lower_macro_right = "".concat(eq1, eq2, eq3 + 1, eq4, eq5, eq6) + } else { + // 21 --> 32 (do not exist) + eq3eq6_next_lower_macro = "".concat(eq1, eq2, eq3 + 1, eq4, eq5, eq6 + 1) + } + + const eq4_next_lower_macro = `${eq1}${eq2}${eq3}${eq4 + 1}${eq5}${eq6}`; + const eq5_next_lower_macro = `${eq1}${eq2}${eq3}${eq4}${eq5 + 1}${eq6}`; + + // get their score, if the next lower macro score do not exist the result is NaN + const score_eq1_next_lower_macro = CVSS40.LOOKUP[eq1_next_lower_macro] + const score_eq2_next_lower_macro = CVSS40.LOOKUP[eq2_next_lower_macro] + + let score_eq3eq6_next_lower_macro; + if (eq3 == 0 && eq6 == 0) { + // multiple path take the one with higher score + const score_eq3eq6_next_lower_macro_left = CVSS40.LOOKUP[eq3eq6_next_lower_macro_left] + const score_eq3eq6_next_lower_macro_right = CVSS40.LOOKUP[eq3eq6_next_lower_macro_right] + + score_eq3eq6_next_lower_macro = Math.max(score_eq3eq6_next_lower_macro_left, score_eq3eq6_next_lower_macro_right); + } else { + score_eq3eq6_next_lower_macro = CVSS40.LOOKUP[eq3eq6_next_lower_macro] + } + + + const score_eq4_next_lower_macro = CVSS40.LOOKUP[eq4_next_lower_macro] + const score_eq5_next_lower_macro = CVSS40.LOOKUP[eq5_next_lower_macro] + + // b. The severity distance of the to-be scored vector from a + // highest severity vector in the same MacroVector is determined. + const eqMaxes = [ + this.getMaxSeverityVectorsForEQ(this.macroVectorResult, 1), + this.getMaxSeverityVectorsForEQ(this.macroVectorResult, 2), + this.getMaxSeverityVectorsForEQ(this.macroVectorResult, 3)[eq6], + this.getMaxSeverityVectorsForEQ(this.macroVectorResult, 4), + this.getMaxSeverityVectorsForEQ(this.macroVectorResult, 5) + ]; + + + // Compose maximum vectors + const maxVectors = []; + for (const eq1Max of eqMaxes[0]) { + for (const eq2Max of eqMaxes[1]) { + for (const eq3Max of eqMaxes[2]) { + for (const eq4Max of eqMaxes[3]) { + for (const eq5Max of eqMaxes[4]) { + maxVectors.push(eq1Max + eq2Max + eq3Max + eq4Max + eq5Max); + } + } + } + } + } + + + // Find the max vector to use i.e. one in the combination of all the highest + // that is greater or equal (severity distance) than the to-be scored vector. + let maxVector, distances; + for (const vector of maxVectors) { + distances = this.calculateSeverityDistances(vector); + if (Object.values(distances).every(distance => distance >= 0)) { + maxVector = vector; + break; + } + } + + // Calculate the current severity distances + const current_severity_distance_eq1 = distances["AV"] + distances["PR"] + distances["UI"]; + const current_severity_distance_eq2 = distances["AC"] + distances["AT"]; + const current_severity_distance_eq3eq6 = distances["VC"] + distances["VI"] + distances["VA"] + distances["CR"] + distances["IR"] + distances["AR"]; + const current_severity_distance_eq4 = distances["SC"] + distances["SI"] + distances["SA"]; + const current_severity_distance_eq5 = 0; // EQ5 is always 0 in this context + + + // if the next lower macro score do not exist the result is Nan + // Rename to maximal scoring difference (aka MSD) + const available_distance_eq1 = value - score_eq1_next_lower_macro + const available_distance_eq2 = value - score_eq2_next_lower_macro + const available_distance_eq3eq6 = value - score_eq3eq6_next_lower_macro + const available_distance_eq4 = value - score_eq4_next_lower_macro + const available_distance_eq5 = value - score_eq5_next_lower_macro + + let percent_to_next_eq1_severity = 0 + let percent_to_next_eq2_severity = 0 + let percent_to_next_eq3eq6_severity = 0 + let percent_to_next_eq4_severity = 0 + let percent_to_next_eq5_severity = 0 + + // some of them do not exist, we will find them by retrieving the score. If score null then do not exist + let n_existing_lower = 0 + + let normalized_severity_eq1 = 0 + let normalized_severity_eq2 = 0 + let normalized_severity_eq3eq6 = 0 + let normalized_severity_eq4 = 0 + let normalized_severity_eq5 = 0 + + // multiply by step because distance is pure + const maxSeverity_eq1 = CVSS40.MAX_SEVERITY["eq1"][eq1] * STEP + const maxSeverity_eq2 = CVSS40.MAX_SEVERITY["eq2"][eq2] * STEP + const maxSeverity_eq3eq6 = CVSS40.MAX_SEVERITY["eq3eq6"][eq3][eq6] * STEP + const maxSeverity_eq4 = CVSS40.MAX_SEVERITY["eq4"][eq4] * STEP + + // c. The proportion of the distance is determined by dividing + // the severity distance of the to-be-scored vector by the depth + // of the MacroVector. + // d. The maximal scoring difference is multiplied by the proportion of + // distance. + if (!isNaN(available_distance_eq1)) { + n_existing_lower = n_existing_lower + 1 + percent_to_next_eq1_severity = (current_severity_distance_eq1) / maxSeverity_eq1 + normalized_severity_eq1 = available_distance_eq1 * percent_to_next_eq1_severity + } + + if (!isNaN(available_distance_eq2)) { + n_existing_lower = n_existing_lower + 1 + percent_to_next_eq2_severity = (current_severity_distance_eq2) / maxSeverity_eq2 + normalized_severity_eq2 = available_distance_eq2 * percent_to_next_eq2_severity + } + + if (!isNaN(available_distance_eq3eq6)) { + n_existing_lower = n_existing_lower + 1 + percent_to_next_eq3eq6_severity = (current_severity_distance_eq3eq6) / maxSeverity_eq3eq6 + normalized_severity_eq3eq6 = available_distance_eq3eq6 * percent_to_next_eq3eq6_severity + } + + if (!isNaN(available_distance_eq4)) { + n_existing_lower = n_existing_lower + 1 + percent_to_next_eq4_severity = (current_severity_distance_eq4) / maxSeverity_eq4 + normalized_severity_eq4 = available_distance_eq4 * percent_to_next_eq4_severity + } + + if (!isNaN(available_distance_eq5)) { + // for eq5 is always 0 the percentage + n_existing_lower = n_existing_lower + 1 + percent_to_next_eq5_severity = 0 + normalized_severity_eq5 = available_distance_eq5 * percent_to_next_eq5_severity + } + + // 2. The mean of the above computed proportional distances is computed. + let meanDistance; + if (n_existing_lower == 0) { + meanDistance = 0 + } else { // sometimes we need to go up but there is nothing there, or down but there is nothing there so it's a change of 0. + meanDistance = (normalized_severity_eq1 + normalized_severity_eq2 + normalized_severity_eq3eq6 + normalized_severity_eq4 + normalized_severity_eq5) / n_existing_lower + } + + // 3. The score of the vector is the score of the MacroVector + // (i.e. the score of the highest severity vector) minus the mean + // distance so computed. This score is rounded to one decimal place. + return this.roundHalfUp(Math.max(0, Math.min(10, value - meanDistance))); + } + + + /** + * Utility method to get the maximum vectors for a given equivalency (EQ) number. + * + * This method retrieves the highest severity vectors corresponding to the provided + * EQ number based on the lookup table. + * + * @param {string} macroVector - The macro vector string representing the equivalency vector. + * @param {number} eqNumber - The EQ number to look up (1-based index). + * @returns {Array} - An array of highest severity vectors for the given EQ number. + * @throws {Error} - Throws an error if the lookup key is not found for the given EQ number. + */ + getMaxSeverityVectorsForEQ(macroVector, eqNumber) { + return CVSS40.MAX_COMPOSED["eq" + eqNumber][macroVector[eqNumber - 1]]; + } + + + /** + * Extracts the value of a specified metric from a given string. + * + * This method finds the value of the specified metric within the provided string. + * The metric value is expected to be followed by a colon and may be terminated by a slash. + * + * @param {string} metric - The metric to extract the value for. + * @param {string} str - The string containing the metric and its value. + * @returns {string} - The extracted metric value. + */ + extractValueMetric(metric, str) { + const metricIndex = str.indexOf(metric) + metric.length + 1; + const extracted = str.slice(metricIndex); + return extracted.indexOf('/') > 0 ? extracted.substring(0, extracted.indexOf('/')) : extracted; + } + + /** + * Gets the effective value for a given CVSS metric. + * + * This method determines the effective value of a metric, considering any + * modifications and defaults to the worst-case scenario for certain metrics. + * + * @param {string} metric - The metric for which to get the effective value. + * @returns {string} - The effective metric value. + */ + getEffectiveMetricValue(metric) { + // Default worst-case scenarios for specific metrics + const worstCaseDefaults = { + "E": "A", // If E=X, it defaults to E=A + "CR": "H", // If CR=X, it defaults to CR=H + "IR": "H", // If IR=X, it defaults to IR=H + "AR": "H" // If AR=X, it defaults to AR=H + }; + + // Check if the metric has a worst-case default + if (this.vectorMetrics[metric] === "X" && worstCaseDefaults.hasOwnProperty(metric)) { + return worstCaseDefaults[metric]; + } + + // Check for environmental metrics that overwrite base score values + const modifiedMetric = "M" + metric; + if (this.vectorMetrics.hasOwnProperty(modifiedMetric) && this.vectorMetrics[modifiedMetric] !== "X") { + return this.vectorMetrics[modifiedMetric]; + } + + // Return the selected value for the metric + return this.vectorMetrics[metric]; + } + + + /** + * Computes the equivalency vector for the given CVSS metrics. + * + * This method aggregates multiple detailed security metrics into a higher-level + * equivalency vector that represents the overall security posture. + * + * @returns {string} - The equivalency vector (e.g., "002201"). + */ + getEquivalencyVector() { + // Helper function to compute EQ1 + const computeEQ1 = () => { + const AV = this.getEffectiveMetricValue("AV"); + const PR = this.getEffectiveMetricValue("PR"); + const UI = this.getEffectiveMetricValue("UI"); + + if (AV === "N" && PR === "N" && UI === "N") { + return "0"; + } + if ((AV === "N" || PR === "N" || UI === "N") && + !(AV === "N" && PR === "N" && UI === "N") && + AV !== "P") { + return "1"; + } + if (AV === "P" || !(AV === "N" || PR === "N" || UI === "N")) { + return "2"; + } + }; + + // Helper function to compute EQ2 + const computeEQ2 = () => { + const AC = this.getEffectiveMetricValue("AC"); + const AT = this.getEffectiveMetricValue("AT"); + + return (AC === "L" && AT === "N") ? "0" : "1"; + }; + + // Helper function to compute EQ3 + const computeEQ3 = () => { + const VC = this.getEffectiveMetricValue("VC"); + const VI = this.getEffectiveMetricValue("VI"); + const VA = this.getEffectiveMetricValue("VA"); + + if (VC === "H" && VI === "H") { + return "0"; + } + if (!(VC === "H" && VI === "H") && (VC === "H" || VI === "H" || VA === "H")) { + return "1"; + } + if (!(VC === "H" || VI === "H" || VA === "H")) { + return "2"; + } + }; + + // Helper function to compute EQ4 + const computeEQ4 = () => { + const MSI = this.getEffectiveMetricValue("MSI"); + const MSA = this.getEffectiveMetricValue("MSA"); + const SC = this.getEffectiveMetricValue("SC"); + const SI = this.getEffectiveMetricValue("SI"); + const SA = this.getEffectiveMetricValue("SA"); + + if (MSI === "S" || MSA === "S") { + return "0"; + } + if (!(MSI === "S" || MSA === "S") && (SC === "H" || SI === "H" || SA === "H")) { + return "1"; + } + return "2"; + }; + + // Helper function to compute EQ5 + const computeEQ5 = () => { + const E = this.getEffectiveMetricValue("E"); + if (E === "A") return "0"; + if (E === "P") return "1"; + if (E === "U") return "2"; + }; + + // Helper function to compute EQ6 + const computeEQ6 = () => { + const CR = this.getEffectiveMetricValue("CR"); + const VC = this.getEffectiveMetricValue("VC"); + const IR = this.getEffectiveMetricValue("IR"); + const VI = this.getEffectiveMetricValue("VI"); + const AR = this.getEffectiveMetricValue("AR"); + const VA = this.getEffectiveMetricValue("VA"); + + if ((CR === "H" && VC === "H") || (IR === "H" && VI === "H") || (AR === "H" && VA === "H")) { + return "0"; + } + return "1"; + }; + + // Compute all equivalency values + const eq1 = computeEQ1(); + const eq2 = computeEQ2(); + const eq3 = computeEQ3(); + const eq4 = computeEQ4(); + const eq5 = computeEQ5(); + const eq6 = computeEQ6(); + + // Combine all EQ values into the equivalency vector + return eq1 + eq2 + eq3 + eq4 + eq5 + eq6; + } + + +} \ No newline at end of file diff --git a/cvss_config.js b/cvss_config.js deleted file mode 100644 index ee36e96..0000000 --- a/cvss_config.js +++ /dev/null @@ -1,734 +0,0 @@ -// Copyright FIRST, Red Hat, and contributors -// SPDX-License-Identifier: BSD-2-Clause - -cvssConfig = { - "Base Metrics": { - "fill": "supplier", - "metric_groups": { - "Exploitability Metrics": { - "Attack Vector (AV)": { - "tooltip": "This metric reflects the context by which vulnerability exploitation is possible. This metric value (and consequently the resulting severity) will be larger the more remote (logically, and physically) an attacker can be in order to exploit the vulnerable system. The assumption is that the number of potential attackers for a vulnerability that could be exploited from across a network is larger than the number of potential attackers that could exploit a vulnerability requiring physical access to a device, and therefore warrants a greater severity.", - "short": "AV", - "options": { - "Network (N)": { - "tooltip": "The vulnerable system is bound to the network stack and the set of possible attackers extends beyond the other options listed below, up to and including the entire Internet. Such a vulnerability is often termed “remotely exploitable” and can be thought of as an attack being exploitable at the protocol level one or more network hops away (e.g., across one or more routers).", - "value": "N" - }, - "Adjacent (A)": { - "tooltip": "The vulnerable system is bound to a protocol stack, but the attack is limited at the protocol level to a logically adjacent topology. This can mean an attack must be launched from the same shared proximity (e.g., Bluetooth, NFC, or IEEE 802.11) or logical network (e.g., local IP subnet), or from within a secure or otherwise limited administrative domain (e.g., MPLS, secure VPN within an administrative network zone).", - "value": "A" - }, - "Local (L)": { - "tooltip": "The vulnerable system is not bound to the network stack and the attacker’s path is via read/write/execute capabilities. Either the attacker exploits the vulnerability by accessing the target system locally (e.g., keyboard, console), or through terminal emulation (e.g., SSH); or the attacker relies on User Interaction by another person to perform actions required to exploit the vulnerability (e.g., using social engineering techniques to trick a legitimate user into opening a malicious document).", - "value": "L" - }, - "Physical (P)": { - "tooltip": "The attack requires the attacker to physically touch or manipulate the vulnerable system. Physical interaction may be brief (e.g., evil maid attack) or persistent.", - "value": "P" - } - }, - "selected": "N" - }, - "Attack Complexity (AC)": { - "tooltip": "This metric captures measurable actions that must be taken by the attacker to actively evade or circumvent existing built-in security-enhancing conditions in order to obtain a working exploit. These are conditions whose primary purpose is to increase security and/or increase exploit engineering complexity. A vulnerability exploitable without a target-specific variable has a lower complexity than a vulnerability that would require non-trivial customization. This metric is meant to capture security mechanisms utilized by the vulnerable system.", - "short": "AC", - "options": { - "Low (L)": { - "tooltip": "The attacker must take no measurable action to exploit the vulnerability. The attack requires no target-specific circumvention to exploit the vulnerability. An attacker can expect repeatable success against the vulnerable system.", - "value": "L" - }, - "High (H)": { - "tooltip": "The successful attack depends on the evasion or circumvention of security-enhancing techniques in place that would otherwise hinder the attack. These include: Evasion of exploit mitigation techniques, for example, circumvention of address space randomization (ASLR) or data execution prevention (DEP) must be performed for the attack to be successful; Obtaining target-specific secrets. The attacker must gather some target-specific secret before the attack can be successful. A secret is any piece of information that cannot be obtained through any amount of reconnaissance. To obtain the secret the attacker must perform additional attacks or break otherwise secure measures (e.g. knowledge of a secret key may be needed to break a crypto channel). This operation must be performed for each attacked target.", - "value": "H" - } - }, - "selected": "L" - }, - "Attack Requirements (AT)": { - "tooltip": "This metric captures the prerequisite deployment and execution conditions or variables of the vulnerable system that enable the attack. These differ from security-enhancing techniques/technologies (ref Attack Complexity) as the primary purpose of these conditions is not to explicitly mitigate attacks, but rather, emerge naturally as a consequence of the deployment and execution of the vulnerable system.", - "short": "AT", - "options": { - "None (N)": { - "tooltip": "The successful attack does not depend on the deployment and execution conditions of the vulnerable system. The attacker can expect to be able to reach the vulnerability and execute the exploit under all or most instances of the vulnerability.", - "value": "N" - }, - "Present (P)": { - "tooltip": "The successful attack depends on the presence of specific deployment and execution conditions of the vulnerable system that enable the attack. These include: a race condition must be won to successfully exploit the vulnerability (the successfulness of the attack is conditioned on execution conditions that are not under full control of the attacker, or the attack may need to be launched multiple times against a single target before being successful); the attacker must inject themselves into the logical network path between the target and the resource requested by the victim (e.g. vulnerabilities requiring an on-path attacker).", - "value": "P" - } - }, - "selected": "N" - }, - "Privileges Required (PR)": { - "tooltip": "This metric describes the level of privileges an attacker must possess prior to successfully exploiting the vulnerability. The method by which the attacker obtains privileged credentials prior to the attack (e.g., free trial accounts), is outside the scope of this metric. Generally, self-service provisioned accounts do not constitute a privilege requirement if the attacker can grant themselves privileges as part of the attack.", - "short": "PR", - "options": { - "None (N)": { - "tooltip": "The attacker is unauthorized prior to attack, and therefore does not require any access to settings or files of the vulnerable system to carry out an attack.", - "value": "N" - }, - "Low (L)": { - "tooltip": "The attacker requires privileges that provide basic capabilities that are typically limited to settings and resources owned by a single low-privileged user. Alternatively, an attacker with Low privileges has the ability to access only non-sensitive resources.", - "value": "L" - }, - "High (H)": { - "tooltip": "The attacker requires privileges that provide significant (e.g., administrative) control over the vulnerable system allowing full access to the vulnerable system’s settings and files.", - "value": "H" - } - }, - "selected": "N" - }, - "User Interaction (UI)": { - "tooltip": "This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable system. This metric determines whether the vulnerability can be exploited solely at the will of the attacker, or whether a separate user (or user-initiated process) must participate in some manner.", - "short": "UI", - "options": { - "None (N)": { - "tooltip": "The vulnerable system can be exploited without interaction from any human user, other than the attacker.", - "value": "N" - }, - "Passive (P)": { - "tooltip": "Successful exploitation of this vulnerability requires limited interaction by the targeted user with the vulnerable system and the attacker’s payload. These interactions would be considered involuntary and do not require that the user actively subvert protections built into the vulnerable system.", - "value": "P" - }, - "Active (A)": { - "tooltip": "Successful exploitation of this vulnerability requires a targeted user to perform specific, conscious interactions with the vulnerable system and the attacker’s payload, or the user’s interactions would actively subvert protection mechanisms which would lead to exploitation of the vulnerability.", - "value": "A" - } - }, - "selected": "N" - } - }, - "Vulnerable System Impact Metrics": { - "Confidentiality (VC)": { - "tooltip": "This metric measures the impact to the confidentiality of the information managed by the VULNERABLE SYSTEM due to a successfully exploited vulnerability. Confidentiality refers to limiting information access and disclosure to only authorized users, as well as preventing access by, or disclosure to, unauthorized ones.", - "short": "VC", - "options": { - "High (H)": { - "tooltip": "There is a total loss of confidentiality, resulting in all information within the Vulnerable System being divulged to the attacker. Alternatively, access to only some restricted information is obtained, but the disclosed information presents a direct, serious impact. For example, an attacker steals the administrator's password, or private encryption keys of a web server.", - "value": "H" - }, - "Low (L)": { - "tooltip": "There is some loss of confidentiality. Access to some restricted information is obtained, but the attacker does not have control over what information is obtained, or the amount or kind of loss is limited. The information disclosure does not cause a direct, serious loss to the Vulnerable System.", - "value": "L" - }, - "None (N)": { - "tooltip": "There is no loss of confidentiality within the Vulnerable System.", - "value": "N" - } - }, - "selected": "N" - }, - "Integrity (VI)": { - "tooltip": "This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information. Integrity of the VULNERABLE SYSTEM is impacted when an attacker makes unauthorized modification of system data. Integrity is also impacted when a system user can repudiate critical actions taken in the context of the system (e.g. due to insufficient logging).", - "short": "VI", - "options": { - "High (H)": { - "tooltip": "There is a total loss of integrity, or a complete loss of protection. For example, the attacker is able to modify any/all files protected by the vulnerable system. Alternatively, only some files can be modified, but malicious modification would present a direct, serious consequence to the vulnerable system.", - "value": "H" - }, - "Low (L)": { - "tooltip": "Modification of data is possible, but the attacker does not have control over the consequence of a modification, or the amount of modification is limited. The data modification does not have a direct, serious impact to the Vulnerable System.", - "value": "L" - }, - "None (N)": { - "tooltip": "There is no loss of integrity within the Vulnerable System.", - "value": "N" - } - }, - "selected": "N" - }, - "Availability (VA)": { - "tooltip": "This metric measures the impact to the availability of the VULNERABLE SYSTEM resulting from a successfully exploited vulnerability. While the Confidentiality and Integrity impact metrics apply to the loss of confidentiality or integrity of data (e.g., information, files) used by the system, this metric refers to the loss of availability of the impacted system itself, such as a networked service (e.g., web, database, email). Since availability refers to the accessibility of information resources, attacks that consume network bandwidth, processor cycles, or disk space all impact the availability of a system.", - "short": "VA", - "options": { - "High (H)": { - "tooltip": "There is a total loss of availability, resulting in the attacker being able to fully deny access to resources in the Vulnerable System; this loss is either sustained (while the attacker continues to deliver the attack) or persistent (the condition persists even after the attack has completed). Alternatively, the attacker has the ability to deny some availability, but the loss of availability presents a direct, serious consequence to the Vulnerable System (e.g., the attacker cannot disrupt existing connections, but can prevent new connections; the attacker can repeatedly exploit a vulnerability that, in each instance of a successful attack, leaks a only small amount of memory, but after repeated exploitation causes a service to become completely unavailable).", - "value": "H" - }, - "Low (L)": { - "tooltip": "Performance is reduced or there are interruptions in resource availability. Even if repeated exploitation of the vulnerability is possible, the attacker does not have the ability to completely deny service to legitimate users. The resources in the Vulnerable System are either partially available all of the time, or fully available only some of the time, but overall there is no direct, serious consequence to the Vulnerable System.", - "value": "L" - }, - "None (N)": { - "tooltip": "There is no impact to availability within the Vulnerable System.", - "value": "N" - } - }, - "selected": "N" - } - }, - "Subsequent System Impact Metrics": { - "Confidentiality (SC)": { - "tooltip": "This metric measures the impact to the confidentiality of the information managed by the SUBSEQUENT SYSTEM due to a successfully exploited vulnerability. Confidentiality refers to limiting information access and disclosure to only authorized users, as well as preventing access by, or disclosure to, unauthorized ones.", - "short": "SC", - "options": { - "High (H)": { - "tooltip": "There is a total loss of confidentiality, resulting in all resources within the Subsequent System being divulged to the attacker. Alternatively, access to only some restricted information is obtained, but the disclosed information presents a direct, serious impact. For example, an attacker steals the administrator's password, or private encryption keys of a web server.", - "value": "H" - }, - "Low (L)": { - "tooltip": "There is some loss of confidentiality. Access to some restricted information is obtained, but the attacker does not have control over what information is obtained, or the amount or kind of loss is limited. The information disclosure does not cause a direct, serious loss to the Subsequent System.", - "value": "L" - }, - "None (N)": { - "tooltip": "There is no loss of confidentiality within the Subsequent System or all confidentiality impact is constrained to the Vulnerable System.", - "value": "N" - } - }, - "selected": "N" - }, - "Integrity (SI)": { - "tooltip": "This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information. Integrity of the SUBSEQUENT SYSTEM is impacted when an attacker makes unauthorized modification of system data. Integrity is also impacted when a system user can repudiate critical actions taken in the context of the system (e.g. due to insufficient logging).", - "short": "SI", - "options": { - "High (H)": { - "tooltip": "There is a total loss of integrity, or a complete loss of protection. For example, the attacker is able to modify any/all files protected by the Subsequent System. Alternatively, only some files can be modified, but malicious modification would present a direct, serious consequence to the Subsequent System.", - "value": "H" - }, - "Low (L)": { - "tooltip": "Modification of data is possible, but the attacker does not have control over the consequence of a modification, or the amount of modification is limited. The data modification does not have a direct, serious impact to the Subsequent System.", - "value": "L" - }, - "None (N)": { - "tooltip": "There is no loss of integrity within the Subsequent System or all integrity impact is constrained to the Vulnerable System.", - "value": "N" - } - }, - "selected": "N" - }, - "Availability (SA)": { - "tooltip": "This metric measures the impact to the availability of the SUBSEQUENT SYSTEM resulting from a successfully exploited vulnerability. While the Confidentiality and Integrity impact metrics apply to the loss of confidentiality or integrity of data (e.g., information, files) used by the system, this metric refers to the loss of availability of the impacted system itself, such as a networked service (e.g., web, database, email). Since availability refers to the accessibility of information resources, attacks that consume network bandwidth, processor cycles, or disk space all impact the availability of a system.", - "short": "SA", - "options": { - "High (H)": { - "tooltip": "There is a total loss of availability, resulting in the attacker being able to fully deny access to resources in the Subsequent System; this loss is either sustained (while the attacker continues to deliver the attack) or persistent (the condition persists even after the attack has completed). Alternatively, the attacker has the ability to deny some availability, but the loss of availability presents a direct, serious consequence to the Subsequent System (e.g., the attacker cannot disrupt existing connections, but can prevent new connections; the attacker can repeatedly exploit a vulnerability that, in each instance of a successful attack, leaks a only small amount of memory, but after repeated exploitation causes a service to become completely unavailable).", - "value": "H" - }, - "Low (L)": { - "tooltip": "Performance is reduced or there are interruptions in resource availability. Even if repeated exploitation of the vulnerability is possible, the attacker does not have the ability to completely deny service to legitimate users. The resources in the Subsequent System are either partially available all of the time, or fully available only some of the time, but overall there is no direct, serious consequence to the Subsequent System.", - "value": "L" - }, - "None (N)": { - "tooltip": "There is no impact to availability within the Subsequent System or all availability impact is constrained to the Vulnerable System.", - "value": "N" - } - }, - "selected": "N" - } - } - } - }, - "Supplemental Metrics": { - "fill": "supplier", - "metric_groups": { - "": { - "Safety (S)": { - "tooltip": "When a system does have an intended use or fitness of purpose aligned to safety, it is possible that exploiting a vulnerability within that system may have Safety impact which can be represented in the Supplemental Metrics group. Lack of a Safety metric value being supplied does NOT mean that there may not be any Safety-related impacts.", - "short": "S", - "options": { - "Not Defined (X)": { - "tooltip": "The metric has not been evaluated.", - "value": "X" - }, - "Negligible (N)": { - "tooltip": "Consequences of the vulnerability meet definition of IEC 61508 consequence category \"negligible.\"", - "value": "N" - }, - "Present (P)": { - "tooltip": "Consequences of the vulnerability meet definition of IEC 61508 consequence categories of \"marginal,\" \"critical,\" or \"catastrophic.\"", - "value": "P" - } - }, - "selected": "X" - }, - "Automatable (AU)": { - "tooltip": "The “ The “Automatable” metric captures the answer to the question ”Can an attacker automate exploitation events for this vulnerability across multiple targets?” based on steps 1-4 of the kill chain [Hutchins et al., 2011]. These steps are reconnaissance, weaponization, delivery, and exploitation.", - "short": "AU", - "options": { - "Not Defined (X)": { - "tooltip": "The metric has not been evaluated.", - "value": "X" - }, - "No (N)": { - "tooltip": "Attackers cannot reliably automate all 4 steps of the kill chain for this vulnerability for some reason. These steps are reconnaissance, weaponization, delivery, and exploitation.", - "value": "N" - }, - "Yes (Y)": { - "tooltip": "Attackers can reliably automate all 4 steps of the kill chain. These steps are reconnaissance, weaponization, delivery, and exploitation (e.g., the vulnerability is “wormable”).", - "value": "Y" - } - }, - "selected": "X" - }, - "Recovery (R)": { - "tooltip": "Recovery describes the resilience of a system to recover services, in terms of performance and availability, after an attack has been performed.", - "short": "R", - "options": { - "Not Defined (X)": { - "tooltip": "The metric has not been evaluated.", - "value": "X" - }, - "Automatic (A)": { - "tooltip": "The system recovers services automatically after an attack has been performed.", - "value": "A" - }, - "User (U)": { - "tooltip": "The system requires manual intervention by the user to recover services, after an attack has been performed.", - "value": "U" - }, - "Irrecoverable (I)": { - "tooltip": "The system services are irrecoverable by the user, after an attack has been performed.", - "value": "I" - } - }, - "selected": "X" - }, - "Value Density (V)": { - "tooltip": "Value Density describes the resources that the attacker will gain control over with a single exploitation event.", - "short": "V", - "options": { - "Not Defined (X)": { - "tooltip": "The metric has not been evaluated.", - "value": "X" - }, - "Diffuse (D)": { - "tooltip": "The vulnerable system has limited resources. That is, the resources that the attacker will gain control over with a single exploitation event are relatively small. An example of Diffuse (think: limited) Value Density would be an attack on a single email client vulnerability.", - "value": "D" - }, - "Concentrated (C)": { - "tooltip": "The vulnerable system is rich in resources. Heuristically, such systems are often the direct responsibility of \“system operators\” rather than users. An example of Concentrated (think: broad) Value Density would be an attack on a central email server.", - "value": "C" - } - }, - "selected": "X" - }, - "Vulnerability Response Effort (RE)": { - "tooltip": "The intention of the Vulnerability Response Effort metric is to provide supplemental information on how difficult it is for consumers to provide an initial response to the impact of vulnerabilities for deployed products and services in their infrastructure. The consumer can then take this additional information on effort required into consideration when applying mitigations and/or scheduling remediation.", - "short": "RE", - "options": { - "Not Defined (X)": { - "tooltip": "The metric has not been evaluated.", - "value": "X" - }, - "Low (L)": { - "tooltip": "The effort required to respond to a vulnerability is low/trivial. Examples include: communication on better documentation, configuration workarounds, or guidance from the vendor that does not require an immediate update, upgrade, or replacement by the consuming entity, such as firewall filter configuration.", - "value": "L" - }, - "Moderate (M)": { - "tooltip": "The actions required to respond to a vulnerability require some effort on behalf of the consumer and could cause minimal service impact to implement. Examples include: simple remote update, disabling of a subsystem, or a low-touch software upgrade such as a driver update.", - "value": "M" - }, - "High (H)": { - "tooltip": "The actions required to respond to a vulnerability are significant and/or difficult, and may possibly lead to an extended, scheduled service impact. This would need to be considered for scheduling purposes including honoring any embargo on deployment of the selected response. Alternatively, response to the vulnerability in the field is not possible remotely. The only resolution to the vulnerability involves physical replacement (e.g. units deployed would have to be recalled for a depot level repair or replacement). Examples include: a highly privileged driver update, microcode or UEFI BIOS updates, or software upgrades requiring careful analysis and understanding of any potential infrastructure impact before implementation. A UEFI BIOS update that impacts Trusted Platform Module (TPM) attestation without impacting disk encryption software such as Bit locker is a good recent example. Irreparable failures such as non-bootable flash subsystems, failed disks or solid-state drives (SSD), bad memory modules, network devices, or other non-recoverable under warranty hardware, should also be scored as having a High effort.", - "value": "H" - } - }, - "selected": "X" - }, - "Provider Urgency (U)": { - "tooltip": "To facilitate a standardized method to incorporate additional provider-supplied assessment, an optional “pass-through” Supplemental Metric called Provider Urgency is available. Note: While any assessment provider along the product supply chain may provide a Provider Urgency rating. The Penultimate Product Provider (PPP) is best positioned to provide a direct assessment of Provider Urgency.", - "short": "U", - "options": { - "Not Defined (X)": { - "tooltip": "The metric has not been evaluated.", - "value": "X" - }, - "Clear": { - "tooltip": "Provider has assessed the impact of this vulnerability as having no urgency (Informational).", - "value": "Clear" - }, - "Green": { - "tooltip": "Provider has assessed the impact of this vulnerability as having a reduced urgency.", - "value": "Green" - }, - "Amber": { - "tooltip": "Provider has assessed the impact of this vulnerability as having a moderate urgency.", - "value": "Amber" - }, - "Red": { - "tooltip": "Provider has assessed the impact of this vulnerability as having the highest urgency.", - "value": "Red" - } - }, - "selected": "X" - } - } - } - }, - "Environmental (Modified Base Metrics)": { - "fill": "consumer", - "metric_groups": { - "Exploitability Metrics": { - "Attack Vector (MAV)": { - "tooltip": "These metrics enable the consumer analyst to override individual Base metric values based on specific characteristics of a user’s environment. This metric reflects the context by which vulnerability exploitation is possible. This metric value (and consequently the resulting severity) will be larger the more remote (logically, and physically) an attacker can be in order to exploit the vulnerable system. The assumption is that the number of potential attackers for a vulnerability that could be exploited from across a network is larger than the number of potential attackers that could exploit a vulnerability requiring physical access to a device, and therefore warrants a greater severity.", - "short": "MAV", - "options": { - "Not Defined (X)": { - "tooltip": "The metric has not been evaluated.", - "value": "X" - }, - "Network (N)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "N" - }, - "Adjacent (A)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "A" - }, - "Local (L)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "L" - }, - "Physical (P)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "P" - } - }, - "selected": "X" - }, - "Attack Complexity (MAC)": { - "tooltip": "These metrics enable the consumer analyst to override individual Base metric values based on specific characteristics of a user’s environment. This metric captures measurable actions that must be taken by the attacker to actively evade or circumvent existing built-in security-enhancing conditions in order to obtain a working exploit. These are conditions whose primary purpose is to increase security and/or increase exploit engineering complexity. A vulnerability exploitable without a target-specific variable has a lower complexity than a vulnerability that would require non-trivial customization. This metric is meant to capture security mechanisms utilized by the vulnerable system.", - "short": "MAC", - "options": { - "Not Defined (X)": { - "tooltip": "The metric has not been evaluated.", - "value": "X" - }, - "Low (L)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "L" - }, - "High (H)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "H" - } - }, - "selected": "X" - }, - "Attack Requirements (MAT)": { - "tooltip": "These metrics enable the consumer analyst to override individual Base metric values based on specific characteristics of a user’s environment. This metric captures the prerequisite deployment and execution conditions or variables of the vulnerable system that enable the attack. These differ from security-enhancing techniques/technologies (ref Attack Complexity) as the primary purpose of these conditions is not to explicitly mitigate attacks, but rather, emerge naturally as a consequence of the deployment and execution of the vulnerable system.", - "short": "MAT", - "options": { - "Not Defined (X)": { - "tooltip": "The metric has not been evaluated.", - "value": "X" - }, - "None (N)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "N" - }, - "Present (P)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "P" - } - }, - "selected": "X" - }, - "Privileges Required (MPR)": { - "tooltip": "These metrics enable the consumer analyst to override individual Base metric values based on specific characteristics of a user’s environment. This metric describes the level of privileges an attacker must possess prior to successfully exploiting the vulnerability. The method by which the attacker obtains privileged credentials prior to the attack (e.g., free trial accounts), is outside the scope of this metric. Generally, self-service provisioned accounts do not constitute a privilege requirement if the attacker can grant themselves privileges as part of the attack.", - "short": "MPR", - "options": { - "Not Defined (X)": { - "tooltip": "The metric has not been evaluated.", - "value": "X" - }, - "None (N)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "N" - }, - "Low (L)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "L" - }, - "High (H)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "H" - } - }, - "selected": "X" - }, - "User Interaction (MUI)": { - "tooltip": "These metrics enable the consumer analyst to override individual Base metric values based on specific characteristics of a user’s environment. This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable system. This metric determines whether the vulnerability can be exploited solely at the will of the attacker, or whether a separate user (or user-initiated process) must participate in some manner.", - "short": "MUI", - "options": { - "Not Defined (X)": { - "tooltip": "The metric has not been evaluated.", - "value": "X" - }, - "None (N)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "N" - }, - "Passive (P)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "P" - }, - "Active (A)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "A" - } - }, - "selected": "X" - } - }, - "Vulnerable System Impact Metrics": { - "Confidentiality (MVC)": { - "tooltip": "These metrics enable the consumer analyst to override individual Base metric values based on specific characteristics of a user’s environment. This metric measures the impact to the confidentiality of the information managed by the VULNERABLE SYSTEM due to a successfully exploited vulnerability. Confidentiality refers to limiting information access and disclosure to only authorized users, as well as preventing access by, or disclosure to, unauthorized ones.", - "short": "MVC", - "options": { - "Not Defined (X)": { - "tooltip": "The metric has not been evaluated.", - "value": "X" - }, - "High (H)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "H" - }, - "Low (L)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "L" - }, - "None (N)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "N" - } - }, - "selected": "X" - }, - "Integrity (MVI)": { - "tooltip": "These metrics enable the consumer analyst to override individual Base metric values based on specific characteristics of a user’s environment. This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information. Integrity of the VULNERABLE SYSTEM is impacted when an attacker makes unauthorized modification of system data. Integrity is also impacted when a system user can repudiate critical actions taken in the context of the system (e.g. due to insufficient logging).", - "short": "MVI", - "options": { - "Not Defined (X)": { - "tooltip": "The metric has not been evaluated.", - "value": "X" - }, - "High (H)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "H" - }, - "Low (L)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "L" - }, - "None (N)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "N" - } - }, - "selected": "X" - }, - "Availability (MVA)": { - "tooltip": "These metrics enable the consumer analyst to override individual Base metric values based on specific characteristics of a user’s environment. This metric measures the impact to the availability of the VULNERABLE SYSTEM resulting from a successfully exploited vulnerability. While the Confidentiality and Integrity impact metrics apply to the loss of confidentiality or integrity of data (e.g., information, files) used by the system, this metric refers to the loss of availability of the impacted system itself, such as a networked service (e.g., web, database, email). Since availability refers to the accessibility of information resources, attacks that consume network bandwidth, processor cycles, or disk space all impact the availability of a system.", - "short": "MVA", - "options": { - "Not Defined (X)": { - "tooltip": "The metric has not been evaluated.", - "value": "X" - }, - "High (H)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "H" - }, - "Low (L)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "L" - }, - "None (N)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "N" - } - }, - "selected": "X" - } - }, - "Subsequent System Impact Metrics": { - "Confidentiality (MSC)": { - "tooltip": "These metrics enable the consumer analyst to override individual Base metric values based on specific characteristics of a user’s environment. This metric measures the impact to the confidentiality of the information managed by the SUBSEQUENT SYSTEM due to a successfully exploited vulnerability. Confidentiality refers to limiting information access and disclosure to only authorized users, as well as preventing access by, or disclosure to, unauthorized ones.", - "short": "MSC", - "options": { - "Not Defined (X)": { - "tooltip": "The metric has not been evaluated.", - "value": "X" - }, - "": { - }, - "High (H)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "H" - }, - "Low (L)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "L" - }, - "Negligible (N)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "N" - }, - }, - "selected": "X" - }, - "Integrity (MSI)": { - "tooltip": "These metrics enable the consumer analyst to override individual Base metric values based on specific characteristics of a user’s environment. This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information. Integrity of the SUBSEQUENT SYSTEM is impacted when an attacker makes unauthorized modification of system data. Integrity is also impacted when a system user can repudiate critical actions taken in the context of the system (e.g. due to insufficient logging). In addition to the logical systems defined for System of Interest, Subsequent Systems can also include impacts to humans.", - "short": "MSI", - "options": { - "Not Defined (X)": { - "tooltip": "The metric has not been evaluated.", - "value": "X" - }, - "Safety (S)": { - "tooltip": "The exploited vulnerability will result in integrity impacts that could cause serious injury or worse (categories of \"Marginal\" or worse as described in IEC 61508) to a human actor or participant.", - "value": "S" - }, - "High (H)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "H" - }, - "Low (L)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "L" - }, - "Negligible (N)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "N" - } - }, - "selected": "X" - }, - "Availability (MSA)": { - "tooltip": "These metrics enable the consumer analyst to override individual Base metric values based on specific characteristics of a user’s environment. This metric measures the impact to the availability of the SUBSEQUENT SYSTEM resulting from a successfully exploited vulnerability. While the Confidentiality and Integrity impact metrics apply to the loss of confidentiality or integrity of data (e.g., information, files) used by the system, this metric refers to the loss of availability of the impacted system itself, such as a networked service (e.g., web, database, email). Since availability refers to the accessibility of information resources, attacks that consume network bandwidth, processor cycles, or disk space all impact the availability of a system. In addition to the logical systems defined for System of Interest, Subsequent Systems can also include impacts to humans.", - "short": "MSA", - "options": { - "Not Defined (X)": { - "tooltip": "The metric has not been evaluated.", - "value": "X" - }, - "Safety (S)": { - "tooltip": "The exploited vulnerability will result in availability impacts that could cause serious injury or worse (categories of \"Marginal\" or worse as described in IEC 61508) to a human actor or participant.", - "value": "S" - }, - "High (H)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "H" - }, - "Low (L)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "L" - }, - "Negligible (N)": { - "tooltip": "This metric values has the same definition as the Base Metric value defined above.", - "value": "N" - } - }, - "selected": "X" - } - } - } - }, - "Environmental (Security Requirements)": { - "fill": "consumer", - "metric_groups": { - "": { - "Confidentiality Requirements (CR)": { - "tooltip": "This metric enables the consumer to customize the assessment depending on the importance of the affected IT asset to the analyst’s organization, measured in terms of Confidentiality. That is, if an IT asset supports a business function for which Confidentiality is most important, the analyst can assign a greater value to Confidentiality metrics relative to Integrity and Availability.", - "short": "CR", - "options": { - "Not Defined (X)": { - "tooltip": "Assigning this value indicates there is insufficient information to choose one of the other values, and has no impact on the overall Environmental Score", - "value": "X" - }, - "High (H)": { - "tooltip": "Loss of Confidentiality is likely to have a catastrophic adverse effect on the organization or individuals associated with the organization.", - "value": "H" - }, - "Medium (M)": { - "tooltip": "Loss of Confidentiality is likely to have a serious adverse effect on the organization or individuals associated with the organization.", - "value": "M" - }, - "Low (L)": { - "tooltip": "Loss of Confidentiality is likely to have only a limited adverse effect on the organization or individuals associated with the organization.", - "value": "L" - } - }, - "selected": "X" - }, - "Integrity Requirements (IR)": { - "tooltip": "This metric enables the consumer to customize the assessment depending on the importance of the affected IT asset to the analyst’s organization, measured in terms of Integrity. That is, if an IT asset supports a business function for which Integrity is most important, the analyst can assign a greater value to Integrity metrics relative to Confidentiality and Availability.", - "short": "IR", - "options": { - "Not Defined (X)": { - "tooltip": "Assigning this value indicates there is insufficient information to choose one of the other values, and has no impact on the overall Environmental Score", - "value": "X" - }, - "High (H)": { - "tooltip": "Loss of Integrity is likely to have a catastrophic adverse effect on the organization or individuals associated with the organization.", - "value": "H" - }, - "Medium (M)": { - "tooltip": "Loss of Integrity is likely to have a serious adverse effect on the organization or individuals associated with the organization.", - "value": "M" - }, - "Low (L)": { - "tooltip": "Loss of Integrity is likely to have only a limited adverse effect on the organization or individuals associated with the organization.", - "value": "L" - } - }, - "selected": "X" - }, - "Availability Requirements (AR)": { - "tooltip": "This metric enables the consumer to customize the assessment depending on the importance of the affected IT asset to the analyst’s organization, measured in terms of Availability. That is, if an IT asset supports a business function for which Availability is most important, the analyst can assign a greater value to Availability metrics relative to Confidentiality and Integrity.", - "short": "AR", - "options": { - "Not Defined (X)": { - "tooltip": "Assigning this value indicates there is insufficient information to choose one of the other values, and has no impact on the overall Environmental Score", - "value": "X" - }, - "High (H)": { - "tooltip": "Loss of Availability is likely to have a catastrophic adverse effect on the organization or individuals associated with the organization.", - "value": "H" - }, - "Medium (M)": { - "tooltip": "Loss of Availability is likely to have a serious adverse effect on the organization or individuals associated with the organization.", - "value": "M" - }, - "Low (L)": { - "tooltip": "Loss of Availability is likely to have only a limited adverse effect on the organization or individuals associated with the organization.", - "value": "L" - } - }, - "selected": "X" - } - } - } - }, - "Threat Metrics": { - "fill": "consumer", - "metric_groups": { - "": { - "Exploit Maturity (E)": { - "tooltip": "This metric measures the likelihood of the vulnerability being attacked, and is typically based on the current state of exploit techniques, exploit code availability, or active, \"in-the-wild\" exploitation. It is the responsibility of the CVSS consumer to populate the values of Exploit Maturity (E) based on information regarding the availability of exploitation code/processes and the state of exploitation techniques. This information will be referred to as \"threat intelligence\".", - "short": "E", - "options": { - "Not Defined (X)": { - "tooltip": "The Exploit Maturity metric is not being used. Reliable threat intelligence is not available to determine Exploit Maturity characteristics.", - "value": "X" - }, - "Attacked (A)": { - "tooltip": "Based on threat intelligence sources either of the following must apply:\n· Attacks targeting this vulnerability (attempted or successful) have been reported\n· Solutions to simplify attempts to exploit the vulnerability are publicly or privately available (such as exploit toolkits)", - "value": "A" - }, - "POC (P)": { - "tooltip": "Based on threat intelligence sources each of the following must apply:\n· Proof-of-concept is publicly available\n· No knowledge of reported attempts to exploit this vulnerability\n· No knowledge of publicly available solutions used to simplify attempts to exploit the vulnerability", - "value": "P" - }, - "Unreported (U)": { - "tooltip": "Based on threat intelligence sources each of the following must apply:\n· No knowledge of publicly available proof-of-concept\n· No knowledge of reported attempts to exploit this vulnerability\n· No knowledge of publicly available solutions used to simplify attempts to exploit the vulnerability", - "value": "U" - } - }, - "selected": "X" - } - } - } - } -} diff --git a/cvss_details.js b/cvss_details.js deleted file mode 100644 index 3b68bc7..0000000 --- a/cvss_details.js +++ /dev/null @@ -1,18 +0,0 @@ -// Copyright FIRST, Red Hat, and contributors -// SPDX-License-Identifier: BSD-2-Clause - -cvssMacroVectorDetails = { - "Exploitability": 0, - "Complexity": 1, - "Vulnerable system": 2, - "Subsequent system": 3, - "Exploitation": 4, - "Security requirements": 5 -} - -cvssMacroVectorValues = { - "0": "High", - "1": "Medium", - "2": "Low", - "3": "None", -} diff --git a/cvss_lookup.js b/cvss_lookup.js deleted file mode 100644 index aecacfc..0000000 --- a/cvss_lookup.js +++ /dev/null @@ -1,275 +0,0 @@ -// Copyright FIRST, Red Hat, and contributors -// SPDX-License-Identifier: BSD-2-Clause - -cvssLookup_global = { - "000000": 10, - "000001": 9.9, - "000010": 9.8, - "000011": 9.5, - "000020": 9.5, - "000021": 9.2, - "000100": 10, - "000101": 9.6, - "000110": 9.3, - "000111": 8.7, - "000120": 9.1, - "000121": 8.1, - "000200": 9.3, - "000201": 9, - "000210": 8.9, - "000211": 8, - "000220": 8.1, - "000221": 6.8, - "001000": 9.8, - "001001": 9.5, - "001010": 9.5, - "001011": 9.2, - "001020": 9, - "001021": 8.4, - "001100": 9.3, - "001101": 9.2, - "001110": 8.9, - "001111": 8.1, - "001120": 8.1, - "001121": 6.5, - "001200": 8.8, - "001201": 8, - "001210": 7.8, - "001211": 7, - "001220": 6.9, - "001221": 4.8, - "002001": 9.2, - "002011": 8.2, - "002021": 7.2, - "002101": 7.9, - "002111": 6.9, - "002121": 5, - "002201": 6.9, - "002211": 5.5, - "002221": 2.7, - "010000": 9.9, - "010001": 9.7, - "010010": 9.5, - "010011": 9.2, - "010020": 9.2, - "010021": 8.5, - "010100": 9.5, - "010101": 9.1, - "010110": 9, - "010111": 8.3, - "010120": 8.4, - "010121": 7.1, - "010200": 9.2, - "010201": 8.1, - "010210": 8.2, - "010211": 7.1, - "010220": 7.2, - "010221": 5.3, - "011000": 9.5, - "011001": 9.3, - "011010": 9.2, - "011011": 8.5, - "011020": 8.5, - "011021": 7.3, - "011100": 9.2, - "011101": 8.2, - "011110": 8, - "011111": 7.2, - "011120": 7, - "011121": 5.9, - "011200": 8.4, - "011201": 7, - "011210": 7.1, - "011211": 5.2, - "011220": 5, - "011221": 3, - "012001": 8.6, - "012011": 7.5, - "012021": 5.2, - "012101": 7.1, - "012111": 5.2, - "012121": 2.9, - "012201": 6.3, - "012211": 2.9, - "012221": 1.7, - "100000": 9.8, - "100001": 9.5, - "100010": 9.4, - "100011": 8.7, - "100020": 9.1, - "100021": 8.1, - "100100": 9.4, - "100101": 8.9, - "100110": 8.6, - "100111": 7.4, - "100120": 7.7, - "100121": 6.4, - "100200": 8.7, - "100201": 7.5, - "100210": 7.4, - "100211": 6.3, - "100220": 6.3, - "100221": 4.9, - "101000": 9.4, - "101001": 8.9, - "101010": 8.8, - "101011": 7.7, - "101020": 7.6, - "101021": 6.7, - "101100": 8.6, - "101101": 7.6, - "101110": 7.4, - "101111": 5.8, - "101120": 5.9, - "101121": 5, - "101200": 7.2, - "101201": 5.7, - "101210": 5.7, - "101211": 5.2, - "101220": 5.2, - "101221": 2.5, - "102001": 8.3, - "102011": 7, - "102021": 5.4, - "102101": 6.5, - "102111": 5.8, - "102121": 2.6, - "102201": 5.3, - "102211": 2.1, - "102221": 1.3, - "110000": 9.5, - "110001": 9, - "110010": 8.8, - "110011": 7.6, - "110020": 7.6, - "110021": 7, - "110100": 9, - "110101": 7.7, - "110110": 7.5, - "110111": 6.2, - "110120": 6.1, - "110121": 5.3, - "110200": 7.7, - "110201": 6.6, - "110210": 6.8, - "110211": 5.9, - "110220": 5.2, - "110221": 3, - "111000": 8.9, - "111001": 7.8, - "111010": 7.6, - "111011": 6.7, - "111020": 6.2, - "111021": 5.8, - "111100": 7.4, - "111101": 5.9, - "111110": 5.7, - "111111": 5.7, - "111120": 4.7, - "111121": 2.3, - "111200": 6.1, - "111201": 5.2, - "111210": 5.7, - "111211": 2.9, - "111220": 2.4, - "111221": 1.6, - "112001": 7.1, - "112011": 5.9, - "112021": 3, - "112101": 5.8, - "112111": 2.6, - "112121": 1.5, - "112201": 2.3, - "112211": 1.3, - "112221": 0.6, - "200000": 9.3, - "200001": 8.7, - "200010": 8.6, - "200011": 7.2, - "200020": 7.5, - "200021": 5.8, - "200100": 8.6, - "200101": 7.4, - "200110": 7.4, - "200111": 6.1, - "200120": 5.6, - "200121": 3.4, - "200200": 7, - "200201": 5.4, - "200210": 5.2, - "200211": 4, - "200220": 4, - "200221": 2.2, - "201000": 8.5, - "201001": 7.5, - "201010": 7.4, - "201011": 5.5, - "201020": 6.2, - "201021": 5.1, - "201100": 7.2, - "201101": 5.7, - "201110": 5.5, - "201111": 4.1, - "201120": 4.6, - "201121": 1.9, - "201200": 5.3, - "201201": 3.6, - "201210": 3.4, - "201211": 1.9, - "201220": 1.9, - "201221": 0.8, - "202001": 6.4, - "202011": 5.1, - "202021": 2, - "202101": 4.7, - "202111": 2.1, - "202121": 1.1, - "202201": 2.4, - "202211": 0.9, - "202221": 0.4, - "210000": 8.8, - "210001": 7.5, - "210010": 7.3, - "210011": 5.3, - "210020": 6, - "210021": 5, - "210100": 7.3, - "210101": 5.5, - "210110": 5.9, - "210111": 4, - "210120": 4.1, - "210121": 2, - "210200": 5.4, - "210201": 4.3, - "210210": 4.5, - "210211": 2.2, - "210220": 2, - "210221": 1.1, - "211000": 7.5, - "211001": 5.5, - "211010": 5.8, - "211011": 4.5, - "211020": 4, - "211021": 2.1, - "211100": 6.1, - "211101": 5.1, - "211110": 4.8, - "211111": 1.8, - "211120": 2, - "211121": 0.9, - "211200": 4.6, - "211201": 1.8, - "211210": 1.7, - "211211": 0.7, - "211220": 0.8, - "211221": 0.2, - "212001": 5.3, - "212011": 2.4, - "212021": 1.4, - "212101": 2.4, - "212111": 1.2, - "212121": 0.5, - "212201": 1, - "212211": 0.3, - "212221": 0.1, -} diff --git a/cvss_score.js b/cvss_score.js deleted file mode 100644 index 80ba4ba..0000000 --- a/cvss_score.js +++ /dev/null @@ -1,379 +0,0 @@ -function cvss_score(cvssSelected, lookup, maxSeverityData, macroVectorResult) { - // The following defines the index of each metric's values. - // It is used when looking for the highest vector part of the - // combinations produced by the MacroVector respective highest vectors. - AV_levels = {"N": 0.0, "A": 0.1, "L": 0.2, "P": 0.3} - PR_levels = {"N": 0.0, "L": 0.1, "H": 0.2} - UI_levels = {"N": 0.0, "P": 0.1, "A": 0.2} - - AC_levels = {'L': 0.0, 'H': 0.1} - AT_levels = {'N': 0.0, 'P': 0.1} - - VC_levels = {'H': 0.0, 'L': 0.1, 'N': 0.2} - VI_levels = {'H': 0.0, 'L': 0.1, 'N': 0.2} - VA_levels = {'H': 0.0, 'L': 0.1, 'N': 0.2} - - SC_levels = {'H': 0.1, 'L': 0.2, 'N': 0.3} - SI_levels = {'S': 0.0, 'H': 0.1, 'L': 0.2, 'N': 0.3} - SA_levels = {'S': 0.0, 'H': 0.1, 'L': 0.2, 'N': 0.3} - - CR_levels = {'H': 0.0, 'M': 0.1, 'L': 0.2} - IR_levels = {'H': 0.0, 'M': 0.1, 'L': 0.2} - AR_levels = {'H': 0.0, 'M': 0.1, 'L': 0.2} - - E_levels = {'U': 0.2, 'P': 0.1, 'A': 0} - - - // Exception for no impact on system (shortcut) - if (["VC", "VI", "VA", "SC", "SI", "SA"].every((metric) => m(cvssSelected, metric) == "N")) { - return 0.0 - } - - value = lookup[macroVectorResult] - - // 1. For each of the EQs: - // a. The maximal scoring difference is determined as the difference - // between the current MacroVector and the lower MacroVector. - // i. If there is no lower MacroVector the available distance is - // set to NaN and then ignored in the further calculations. - eq1 = parseInt(macroVectorResult[0]) - eq2 = parseInt(macroVectorResult[1]) - eq3 = parseInt(macroVectorResult[2]) - eq4 = parseInt(macroVectorResult[3]) - eq5 = parseInt(macroVectorResult[4]) - eq6 = parseInt(macroVectorResult[5]) - - // compute next lower macro, it can also not exist - eq1_next_lower_macro = "".concat(eq1 + 1, eq2, eq3, eq4, eq5, eq6) - eq2_next_lower_macro = "".concat(eq1, eq2 + 1, eq3, eq4, eq5, eq6) - - // eq3 and eq6 are related - if (eq3 == 1 && eq6 == 1) { - // 11 --> 21 - eq3eq6_next_lower_macro = "".concat(eq1, eq2, eq3 + 1, eq4, eq5, eq6) - } else if (eq3 == 0 && eq6 == 1) { - // 01 --> 11 - eq3eq6_next_lower_macro = "".concat(eq1, eq2, eq3 + 1, eq4, eq5, eq6) - } else if (eq3 == 1 && eq6 == 0) { - // 10 --> 11 - eq3eq6_next_lower_macro = "".concat(eq1, eq2, eq3, eq4, eq5, eq6 + 1) - } else if (eq3 == 0 && eq6 == 0) { - // 00 --> 01 - // 00 --> 10 - eq3eq6_next_lower_macro_left = "".concat(eq1, eq2, eq3, eq4, eq5, eq6 + 1) - eq3eq6_next_lower_macro_right = "".concat(eq1, eq2, eq3 + 1, eq4, eq5, eq6) - } else { - // 21 --> 32 (do not exist) - eq3eq6_next_lower_macro = "".concat(eq1, eq2, eq3 + 1, eq4, eq5, eq6 + 1) - } - - eq4_next_lower_macro = "".concat(eq1, eq2, eq3, eq4 + 1, eq5, eq6) - eq5_next_lower_macro = "".concat(eq1, eq2, eq3, eq4, eq5 + 1, eq6) - - // get their score, if the next lower macro score do not exist the result is NaN - score_eq1_next_lower_macro = lookup[eq1_next_lower_macro] - score_eq2_next_lower_macro = lookup[eq2_next_lower_macro] - - if (eq3 == 0 && eq6 == 0) { - // multiple path take the one with higher score - score_eq3eq6_next_lower_macro_left = lookup[eq3eq6_next_lower_macro_left] - score_eq3eq6_next_lower_macro_right = lookup[eq3eq6_next_lower_macro_right] - - if (score_eq3eq6_next_lower_macro_left > score_eq3eq6_next_lower_macro_right) { - score_eq3eq6_next_lower_macro = score_eq3eq6_next_lower_macro_left - } else { - score_eq3eq6_next_lower_macro = score_eq3eq6_next_lower_macro_right - } - } else { - score_eq3eq6_next_lower_macro = lookup[eq3eq6_next_lower_macro] - } - - - score_eq4_next_lower_macro = lookup[eq4_next_lower_macro] - score_eq5_next_lower_macro = lookup[eq5_next_lower_macro] - - // b. The severity distance of the to-be scored vector from a - // highest severity vector in the same MacroVector is determined. - eq1_maxes = getEQMaxes(macroVectorResult, 1) - eq2_maxes = getEQMaxes(macroVectorResult, 2) - eq3_eq6_maxes = getEQMaxes(macroVectorResult, 3)[macroVectorResult[5]] - eq4_maxes = getEQMaxes(macroVectorResult, 4) - eq5_maxes = getEQMaxes(macroVectorResult, 5) - - // compose them - max_vectors = [] - for (eq1_max of eq1_maxes) { - for (eq2_max of eq2_maxes) { - for (eq3_eq6_max of eq3_eq6_maxes) { - for (eq4_max of eq4_maxes) { - for (eq5max of eq5_maxes) { - max_vectors.push(eq1_max + eq2_max + eq3_eq6_max + eq4_max + eq5max) - } - } - } - } - } - - // Find the max vector to use i.e. one in the combination of all the highests - // that is greater or equal (severity distance) than the to-be scored vector. - for (let i = 0; i < max_vectors.length; i++) { - max_vector = max_vectors[i] - severity_distance_AV = AV_levels[m(cvssSelected, "AV")] - AV_levels[extractValueMetric("AV", max_vector)] - severity_distance_PR = PR_levels[m(cvssSelected, "PR")] - PR_levels[extractValueMetric("PR", max_vector)] - severity_distance_UI = UI_levels[m(cvssSelected, "UI")] - UI_levels[extractValueMetric("UI", max_vector)] - - severity_distance_AC = AC_levels[m(cvssSelected, "AC")] - AC_levels[extractValueMetric("AC", max_vector)] - severity_distance_AT = AT_levels[m(cvssSelected, "AT")] - AT_levels[extractValueMetric("AT", max_vector)] - - severity_distance_VC = VC_levels[m(cvssSelected, "VC")] - VC_levels[extractValueMetric("VC", max_vector)] - severity_distance_VI = VI_levels[m(cvssSelected, "VI")] - VI_levels[extractValueMetric("VI", max_vector)] - severity_distance_VA = VA_levels[m(cvssSelected, "VA")] - VA_levels[extractValueMetric("VA", max_vector)] - - severity_distance_SC = SC_levels[m(cvssSelected, "SC")] - SC_levels[extractValueMetric("SC", max_vector)] - severity_distance_SI = SI_levels[m(cvssSelected, "SI")] - SI_levels[extractValueMetric("SI", max_vector)] - severity_distance_SA = SA_levels[m(cvssSelected, "SA")] - SA_levels[extractValueMetric("SA", max_vector)] - - severity_distance_CR = CR_levels[m(cvssSelected, "CR")] - CR_levels[extractValueMetric("CR", max_vector)] - severity_distance_IR = IR_levels[m(cvssSelected, "IR")] - IR_levels[extractValueMetric("IR", max_vector)] - severity_distance_AR = AR_levels[m(cvssSelected, "AR")] - AR_levels[extractValueMetric("AR", max_vector)] - - - // if any is less than zero this is not the right max - if ([severity_distance_AV, severity_distance_PR, severity_distance_UI, severity_distance_AC, severity_distance_AT, severity_distance_VC, severity_distance_VI, severity_distance_VA, severity_distance_SC, severity_distance_SI, severity_distance_SA, severity_distance_CR, severity_distance_IR, severity_distance_AR].some((met) => met < 0)) { - continue - } - // if multiple maxes exist to reach it it is enough the first one - break - } - - current_severity_distance_eq1 = severity_distance_AV + severity_distance_PR + severity_distance_UI - current_severity_distance_eq2 = severity_distance_AC + severity_distance_AT - current_severity_distance_eq3eq6 = severity_distance_VC + severity_distance_VI + severity_distance_VA + severity_distance_CR + severity_distance_IR + severity_distance_AR - current_severity_distance_eq4 = severity_distance_SC + severity_distance_SI + severity_distance_SA - current_severity_distance_eq5 = 0 - - step = 0.1 - - // if the next lower macro score do not exist the result is Nan - // Rename to maximal scoring difference (aka MSD) - available_distance_eq1 = value - score_eq1_next_lower_macro - available_distance_eq2 = value - score_eq2_next_lower_macro - available_distance_eq3eq6 = value - score_eq3eq6_next_lower_macro - available_distance_eq4 = value - score_eq4_next_lower_macro - available_distance_eq5 = value - score_eq5_next_lower_macro - - percent_to_next_eq1_severity = 0 - percent_to_next_eq2_severity = 0 - percent_to_next_eq3eq6_severity = 0 - percent_to_next_eq4_severity = 0 - percent_to_next_eq5_severity = 0 - - // some of them do not exist, we will find them by retrieving the score. If score null then do not exist - n_existing_lower = 0 - - normalized_severity_eq1 = 0 - normalized_severity_eq2 = 0 - normalized_severity_eq3eq6 = 0 - normalized_severity_eq4 = 0 - normalized_severity_eq5 = 0 - - // multiply by step because distance is pure - maxSeverity_eq1 = maxSeverityData["eq1"][eq1] * step - maxSeverity_eq2 = maxSeverityData["eq2"][eq2] * step - maxSeverity_eq3eq6 = maxSeverityData["eq3eq6"][eq3][eq6] * step - maxSeverity_eq4 = maxSeverityData["eq4"][eq4] * step - - // c. The proportion of the distance is determined by dividing - // the severity distance of the to-be-scored vector by the depth - // of the MacroVector. - // d. The maximal scoring difference is multiplied by the proportion of - // distance. - if (!isNaN(available_distance_eq1)) { - n_existing_lower = n_existing_lower + 1 - percent_to_next_eq1_severity = (current_severity_distance_eq1) / maxSeverity_eq1 - normalized_severity_eq1 = available_distance_eq1 * percent_to_next_eq1_severity - } - - if (!isNaN(available_distance_eq2)) { - n_existing_lower = n_existing_lower + 1 - percent_to_next_eq2_severity = (current_severity_distance_eq2) / maxSeverity_eq2 - normalized_severity_eq2 = available_distance_eq2 * percent_to_next_eq2_severity - } - - if (!isNaN(available_distance_eq3eq6)) { - n_existing_lower = n_existing_lower + 1 - percent_to_next_eq3eq6_severity = (current_severity_distance_eq3eq6) / maxSeverity_eq3eq6 - normalized_severity_eq3eq6 = available_distance_eq3eq6 * percent_to_next_eq3eq6_severity - } - - if (!isNaN(available_distance_eq4)) { - n_existing_lower = n_existing_lower + 1 - percent_to_next_eq4_severity = (current_severity_distance_eq4) / maxSeverity_eq4 - normalized_severity_eq4 = available_distance_eq4 * percent_to_next_eq4_severity - } - - if (!isNaN(available_distance_eq5)) { - // for eq5 is always 0 the percentage - n_existing_lower = n_existing_lower + 1 - percent_to_next_eq5_severity = 0 - normalized_severity_eq5 = available_distance_eq5 * percent_to_next_eq5_severity - } - - // 2. The mean of the above computed proportional distances is computed. - if (n_existing_lower == 0) { - mean_distance = 0 - } else { // sometimes we need to go up but there is nothing there, or down but there is nothing there so it's a change of 0. - mean_distance = (normalized_severity_eq1 + normalized_severity_eq2 + normalized_severity_eq3eq6 + normalized_severity_eq4 + normalized_severity_eq5) / n_existing_lower - } - - // 3. The score of the vector is the score of the MacroVector - // (i.e. the score of the highest severity vector) minus the mean - // distance so computed. This score is rounded to one decimal place. - value -= mean_distance; - if (value < 0) { - value = 0.0 - } - if (value > 10) { - value = 10.0 - } - return Math.round(value * 10) / 10 -} - -function getEQMaxes(lookup, eq) { - return maxComposed["eq" + eq][lookup[eq - 1]] -} - -function extractValueMetric(metric, str) { - // indexOf gives first index of the metric, we then need to go over its size - extracted = str.slice(str.indexOf(metric) + metric.length + 1) - // remove what follow - if (extracted.indexOf('/') > 0) { - metric_val = extracted.substring(0, extracted.indexOf('/')); - } - else { - // case where it is the last metric so no ending / - metric_val = extracted - } - return metric_val -} - -function m(cvssSelected, metric) { - selected = cvssSelected[metric] - - // If E=X it will default to the worst case i.e. E=A - if (metric == "E" && selected == "X") { - return "A" - } - // If CR=X, IR=X or AR=X they will default to the worst case i.e. CR=H, IR=H and AR=H - if (metric == "CR" && selected == "X") { - return "H"; - } - // IR:X is the same as IR:H - if (metric == "IR" && selected == "X") { - return "H" - } - // AR:X is the same as AR:H - if (metric == "AR" && selected == "X") { - return "H" - } - - // All other environmental metrics just overwrite base score values, - // so if they’re not defined just use the base score value. - if (Object.keys(cvssSelected).includes("M" + metric)) { - modified_selected = cvssSelected["M" + metric] - if (modified_selected != "X") { - return modified_selected - } - } - - return selected -} - -function macroVector(cvssSelected) { - // EQ1: 0-AV:N and PR:N and UI:N - // 1-(AV:N or PR:N or UI:N) and not (AV:N and PR:N and UI:N) and not AV:P - // 2-AV:P or not(AV:N or PR:N or UI:N) - - if (m(cvssSelected, "AV") == "N" && m(cvssSelected, "PR") == "N" && m(cvssSelected, "UI") == "N") { - eq1 = "0" - } - else if ((m(cvssSelected, "AV") == "N" || m(cvssSelected, "PR") == "N" || m(cvssSelected, "UI") == "N") - && !(m(cvssSelected, "AV") == "N" && m(cvssSelected, "PR") == "N" && m(cvssSelected, "UI") == "N") - && !(m(cvssSelected, "AV") == "P")) { - eq1 = "1" - } - else if (m(cvssSelected, "AV") == "P" - || !(m(cvssSelected, "AV") == "N" || m(cvssSelected, "PR") == "N" || m(cvssSelected, "UI") == "N")) { - eq1 = "2" - } - - // EQ2: 0-(AC:L and AT:N) - // 1-(not(AC:L and AT:N)) - - if (m(cvssSelected, "AC") == "L" && m(cvssSelected, "AT") == "N") { - eq2 = "0" - } - else if (!(m(cvssSelected, "AC") == "L" && m(cvssSelected, "AT") == "N")) { - eq2 = "1" - } - - // EQ3: 0-(VC:H and VI:H) - // 1-(not(VC:H and VI:H) and (VC:H or VI:H or VA:H)) - // 2-not (VC:H or VI:H or VA:H) - if (m(cvssSelected, "VC") == "H" && m(cvssSelected, "VI") == "H") { - eq3 = 0 - } - else if (!(m(cvssSelected, "VC") == "H" && m(cvssSelected, "VI") == "H") - && (m(cvssSelected, "VC") == "H" || m(cvssSelected, "VI") == "H" || m(cvssSelected, "VA") == "H")) { - eq3 = 1 - } - else if (!(m(cvssSelected, "VC") == "H" || m(cvssSelected, "VI") == "H" || m(cvssSelected, "VA") == "H")) { - eq3 = 2 - } - - // EQ4: 0-(MSI:S or MSA:S) - // 1-not (MSI:S or MSA:S) and (SC:H or SI:H or SA:H) - // 2-not (MSI:S or MSA:S) and not (SC:H or SI:H or SA:H) - - if (m(cvssSelected, "MSI") == "S" || m(cvssSelected, "MSA") == "S") { - eq4 = 0 - } - else if (!(m(cvssSelected, "MSI") == "S" || m(cvssSelected, "MSA") == "S") && - (m(cvssSelected, "SC") == "H" || m(cvssSelected, "SI") == "H" || m(cvssSelected, "SA") == "H")) { - eq4 = 1 - } - else if (!(m(cvssSelected, "MSI") == "S" || m(cvssSelected, "MSA") == "S") && - !((m(cvssSelected, "SC") == "H" || m(cvssSelected, "SI") == "H" || m(cvssSelected, "SA") == "H"))) { - eq4 = 2 - } - - // EQ5: 0-E:A - // 1-E:P - // 2-E:U - - if (m(cvssSelected, "E") == "A") { - eq5 = 0 - } - else if (m(cvssSelected, "E") == "P") { - eq5 = 1 - } - else if (m(cvssSelected, "E") == "U") { - eq5 = 2 - } - - // EQ6: 0-(CR:H and VC:H) or (IR:H and VI:H) or (AR:H and VA:H) - // 1-not[(CR:H and VC:H) or (IR:H and VI:H) or (AR:H and VA:H)] - - if ((m(cvssSelected, "CR") == "H" && m(cvssSelected, "VC") == "H") - || (m(cvssSelected, "IR") == "H" && m(cvssSelected, "VI") == "H") - || (m(cvssSelected, "AR") == "H" && m(cvssSelected, "VA") == "H")) { - eq6 = 0 - } - else if (!((m(cvssSelected, "CR") == "H" && m(cvssSelected, "VC") == "H") - || (m(cvssSelected, "IR") == "H" && m(cvssSelected, "VI") == "H") - || (m(cvssSelected, "AR") == "H" && m(cvssSelected, "VA") == "H"))) { - eq6 = 1 - } - - return eq1 + eq2 + eq3 + eq4 + eq5 + eq6 -} diff --git a/index.html b/index.html index 67f76e6..cd97fae 100644 --- a/index.html +++ b/index.html @@ -29,13 +29,7 @@