[GHSA-998c-q8hh-h8gv] Update CVSS 4 Attack Complexity from Low to High #5166
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Summary
The vulnerability described in GHSA-998c-q8hh-h8gv / CVE-2024-8660 requires a rogue administrator for a successful attack:
Based on the CVSS 4 specification, this vulnerability should have an Attack Complexity (AC) rating of High, not Low, because the attack relies on the privileges and knowledge of an administrator to bypass built-in security mechanisms.
Rationale
Alignment with CVSS 4 Specification
The CVSS 4 specification defines Attack Complexity = High as follows:
To execute the attack successfully, the attacker must either possess insider knowledge exclusive to an administrator or steal the administrator’s credentials. This requirement aligns with the CVSS 4 definition of Attack Complexity = High.
Comparision with Similar Vulnerabilities
Several similar vulnerabilities in Concrete CMS were rated with Attack Complexity = High and Attack Requirement = None, including:
These similar CVEs have been rated as Attack Complexity = High. Consistency demands that the GHSA-998c-q8hh-h8gv / CVE-2024-8660 vulnerability also be rated as High for Attack Complexity.