Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. lol

lol

Scheduled Pinned Locked Moved Uncategorized
8 Posts 5 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • cr0w@infosec.exchangeC This user is from outside of this forum
    cr0w@infosec.exchangeC This user is from outside of this forum
    cr0w@infosec.exchange
    wrote last edited by
    #1

    RE: https://infosec.exchange/@cR0w/116483262430297764

    lol

    favicon

    (www.cve.org)

    thief_of_fire@infosec.exchangeT scottwilson@infosec.exchangeS 2 Replies Last reply
    0
    • cr0w@infosec.exchangeC cr0w@infosec.exchange

      RE: https://infosec.exchange/@cR0w/116483262430297764

      lol

      favicon

      (www.cve.org)

      thief_of_fire@infosec.exchangeT This user is from outside of this forum
      thief_of_fire@infosec.exchangeT This user is from outside of this forum
      thief_of_fire@infosec.exchange
      wrote last edited by
      #2

      @cR0w love that someone just dropped that in their github issues

      nyanbinary@infosec.exchangeN 1 Reply Last reply
      0
      • thief_of_fire@infosec.exchangeT thief_of_fire@infosec.exchange

        @cR0w love that someone just dropped that in their github issues

        nyanbinary@infosec.exchangeN This user is from outside of this forum
        nyanbinary@infosec.exchangeN This user is from outside of this forum
        nyanbinary@infosec.exchange
        wrote last edited by
        #3

        @thief_of_fire @cR0w I'm honestly kinda annoyed by their response in the issue? Like, looking at their linked policy this IS the way things should be reported, right??
        https://github.com/gchq/CyberChef/blob/master/SECURITY.md

        2bfair@infosec.exchange2 1 Reply Last reply
        0
        • nyanbinary@infosec.exchangeN nyanbinary@infosec.exchange

          @thief_of_fire @cR0w I'm honestly kinda annoyed by their response in the issue? Like, looking at their linked policy this IS the way things should be reported, right??
          https://github.com/gchq/CyberChef/blob/master/SECURITY.md

          2bfair@infosec.exchange2 This user is from outside of this forum
          2bfair@infosec.exchange2 This user is from outside of this forum
          2bfair@infosec.exchange
          wrote last edited by
          #4

          @nyanbinary @thief_of_fire @cR0w

          If you feel that the vulnerability is significant enough to warrant a private disclosure, please email...

          Do you not think a high severity CVE is significant enough to warrant private disclosure?

          nyanbinary@infosec.exchangeN 1 Reply Last reply
          0
          • 2bfair@infosec.exchange2 2bfair@infosec.exchange

            @nyanbinary @thief_of_fire @cR0w

            If you feel that the vulnerability is significant enough to warrant a private disclosure, please email...

            Do you not think a high severity CVE is significant enough to warrant private disclosure?

            nyanbinary@infosec.exchangeN This user is from outside of this forum
            nyanbinary@infosec.exchangeN This user is from outside of this forum
            nyanbinary@infosec.exchange
            wrote last edited by
            #5

            @2Bfair @thief_of_fire @cR0w No, not necessarily. CVSS severity levels are great for bulk classification & priorisation but do not always correctly reflect individual findings - pretty much every pentester I know constantly complains about customers wanting cvss claasifications because of this. Additionally I kinda disagree with this CVSS string in this case, given it assumes UI:N which I always find iffy for reflected XSS.

            cr0w@infosec.exchangeC 1 Reply Last reply
            0
            • cr0w@infosec.exchangeC cr0w@infosec.exchange

              RE: https://infosec.exchange/@cR0w/116483262430297764

              lol

              favicon

              (www.cve.org)

              scottwilson@infosec.exchangeS This user is from outside of this forum
              scottwilson@infosec.exchangeS This user is from outside of this forum
              scottwilson@infosec.exchange
              wrote last edited by
              #6

              @cR0w If even the GCHQ can’t get it right, what chance do the rest of us have?

              cr0w@infosec.exchangeC 1 Reply Last reply
              0
              • nyanbinary@infosec.exchangeN nyanbinary@infosec.exchange

                @2Bfair @thief_of_fire @cR0w No, not necessarily. CVSS severity levels are great for bulk classification & priorisation but do not always correctly reflect individual findings - pretty much every pentester I know constantly complains about customers wanting cvss claasifications because of this. Additionally I kinda disagree with this CVSS string in this case, given it assumes UI:N which I always find iffy for reflected XSS.

                cr0w@infosec.exchangeC This user is from outside of this forum
                cr0w@infosec.exchangeC This user is from outside of this forum
                cr0w@infosec.exchange
                wrote last edited by
                #7

                @nyanbinary @2Bfair @thief_of_fire It's XSS. I wouldn't think twice about dropping it on Mastodon let alone in the issues.

                1 Reply Last reply
                1
                0
                • R relay@relay.infosec.exchange shared this topic
                • scottwilson@infosec.exchangeS scottwilson@infosec.exchange

                  @cR0w If even the GCHQ can’t get it right, what chance do the rest of us have?

                  cr0w@infosec.exchangeC This user is from outside of this forum
                  cr0w@infosec.exchangeC This user is from outside of this forum
                  cr0w@infosec.exchange
                  wrote last edited by
                  #8

                  @scottwilson Yeah but I was more laughing about the timing. The CVE was published the same day that v11.0.0 was released, which was the same day the GCHQ-hosted instance was offline for most ( all? ) of the day.

                  1 Reply Last reply
                  1
                  0
                  Reply
                  • Reply as topic
                  Log in to reply
                  • Oldest to Newest
                  • Newest to Oldest
                  • Most Votes


                  • Login

                  • Login or register to search.
                  • First post
                    Last post
                  0
                  • Categories
                  • Recent
                  • Tags
                  • Popular
                  • World
                  • Users
                  • Groups