[GHSA-9gqh-q4cx-f2h9] Update the CVSS 3.x Attack Complexity from Low to High #5168
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Summary
The CVSS 3.x Attack Complexity for CVE-2016-1059 / GHSA-9gqh-q4cx-f2h9 should be classified as High instead of Low, based on the requirement for the attacker to obtain a privileged network position. This aligns directly with the CVSS 3.x definition of High Attack Complexity, which states that a successful attack demands “some measurable amount of effort […] in preparation or execution against the vulnerable component before a successful attack can be expected.”
Supporting Examples
The following CVEs have similar phrasing and CVSS 3.x Attack Complexity = High:
ipip-coffee
insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. This could impact the integrity and availability of the data being used to make geolocation decisions by an application. [...]prebuild-lwip
insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. [...]ibapi
insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system runningibapi
. [...]dwebp-bin
insecurely download an executable over an unencrypted HTTP connection. **In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system runningdwebp-bin
. [...]node-browser
insecurely downloads resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. [...]apk-parser2
insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system runningapk-parser2
. [...]dalek-browser-ie-canary
insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system runningdalek-browser-ie-canary
. [...]dalek-browser-ie
insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system runningdalek-browser-ie
. [...]mystem
insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system runningmystem
. [...]They further underscore the need to reclassify the Attack Complexity for CVE-2016-1059 / GHSA-9gqh-q4cx-f2h9 to High.