Aaj Kya Seekhenge?
- CVSS kya hai basics se
- CVSS 3.1 metrics ek ek samjho
- Score calculate karna step by step
- Real vulnerabilities ka CVSS examples
- Common mistakes avoid karo
- CVSS vs Bug Bounty Severity fark
Kyun zaroori hai? CVSS score = Bounty amount ka direct link! Companies CVSS ke basis pe P1/P2/P3/P4 decide karti hain! Ek wrong CVSS claim = Severity downgraded = $3,000 kam bounty! Sahi CVSS = Maximum bounty + credibility!
CVSS Kya Hai? Simple Samjho
CVSS = Common Vulnerability Scoring System
Ek standardized formula jo batata hai:
"Yeh vulnerability kitni dangerous hai?"
Score range: 0.0 β 10.0
0.0 = Koi risk nahi
0.1 - 3.9 = LOW
4.0 - 6.9 = MEDIUM
7.0 - 8.9 = HIGH
9.0 - 10.0= CRITICAL
CVSS 3.1 = Current version (2019 se)
CVSS 4.0 = Latest (2023 se β kuch platforms use kar rahe)
Bug bounty mein CVSS 3.1 standard hai!PART 1: CVSS 3.1 Metrics Teeno Groups
CVSS mein 3 metric groups hain:
1. BASE Metrics β Bug ki actual nature
(Fixed score β hamesha same)
2. TEMPORAL Metrics β Time-dependent factors
(Optional β bounty mein kam use)
3. ENVIRONMENTAL β Your specific org context
(Optional β companies khud set karti)
Bug bounty mein: Sirf BASE metrics = Score!PART 2: BASE Metrics Ek Ek Samjho
Metric 1: Attack Vector (AV) Kahan Se Attack?
Network (N) β Internet se attack possible
Score contribution: HIGHEST
Example: Remote SQLi, SSRF
Adjacent (A) β Same network se (WiFi, LAN)
Score contribution: Medium
Example: WiFi packet sniffing
Local (L) β Physically machine pe hona zaroori
Score contribution: Lower
Example: Local privilege escalation
Physical (P) β Physically touch karna zaroori
Score contribution: LOWEST
Example: USB-based attackBug bounty mein 90% bugs: AV:N (Network) = Highest score!
Metric 2: Attack Complexity (AC) Kitna Mushkil?
Low (L) β Koi special condition nahi
Attack hamesha kaam karta hai
Score: Higher β
Example: Direct SQLi, Open IDOR
High (H) β Special conditions chahiye
Race condition, specific config, etc.
Score: Lower
Example: Race condition exploitMetric 3: Privileges Required (PR) Auth Chahiye?
None (N) β Koi login nahi chahiye!
Score: HIGHEST β
Example: Unauthenticated SQLi
Low (L) β Normal user account chahiye
Score: Medium
Example: IDOR as logged-in user
High (H) β Admin/privileged account chahiye
Score: Lower
Example: Admin-only feature bugMetric 4: User Interaction (UI) Victim Ko Kuch Karna?
None (N) β Victim ko kuch nahi karna!
Attack automatically hota hai
Score: Higher β
Example: Stored XSS auto-execute
Required (R) β Victim ko click/visit karna padta hai
Score: Lower
Example: Reflected XSS (link click)Metric 5: Scope (S) Sirf Us App Tak Ya Aage?
Unchanged (U) β Attack sirf vulnerable app tak
Score: Normal
Example: SQLi sirf us DB tak
Changed (C) β Attack dusre systems bhi affect kare!
Score: MUCH HIGHER β
Example: SSRF β Internal network access
Container escape β Host serverScope Changed = Score dramatically badh jaata hai!
Metric 6: Confidentiality Impact Β© Data Exposure?
None (N) β Koi data expose nahi
High (H) β Poora data expose! All files readable!
Score: Maximum β
Example: /etc/shadow readable
Low (L) β Kuch data expose, limited accessMetric 7: Integrity Impact (I) Data Change?
None (N) β Data change nahi ho sakta
High (H) β Poora data modify/delete possible!
Score: Maximum β
Example: Admin without auth β delete records
Low (L) β Limited data modificationMetric 8: Availability Impact (A) Service Down?
None (N) β Service chalta rehta hai
High (H) β Complete service crash/DoS!
Score: Maximum β
Example: Billion laughs XXE β server crash
Low (L) β Performance degradation, partial impactPART 3: Score Calculate Karo Real Examples!
Example 1: Unauthenticated SQLi
Vulnerability: SQL Injection β no login required
Remote database dump possible
Attack Vector: Network (N) β Internet se
Attack Complexity: Low (L) β Direct attack
Privileges Req: None (N) β No login!
User Interaction: None (N) β No victim needed
Scope: Unchanged (U) β Sirf DB affected
Confidentiality: High (H) β Full DB exposed
Integrity: High (H) β Data modify possible
Availability: High (H) β DB crash possible
CVSS Vector:
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 9.8 β CRITICAL! π΄
Bounty Expected: $3,000 - $15,000+Example 2: Stored XSS (Admin Impact)
Vulnerability: Stored XSS in profile bio
Executes in any visitor's browser
Admin also affected
Attack Vector: Network (N) β Internet se
Attack Complexity: Low (L) β Simple payload
Privileges Req: Low (L) β Need account
User Interaction: Required (R) β Victim must visit
Scope: Changed (C)! β Other users affected!
Confidentiality: High (H) β Cookie steal
Integrity: Low (L) β Limited modification
Availability: None (N) β No service impact
CVSS Vector:
AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N
CVSS Score: 8.7 β HIGH! π
Bounty Expected: $1,000 - $5,000Example 3: IDOR (Sensitive Data)
Vulnerability: IDOR β other users' invoices readable
Authenticated user needed
Attack Vector: Network (N)
Attack Complexity: Low (L)
Privileges Req: Low (L) β Need account
User Interaction: None (N) β No victim needed
Scope: Unchanged (U)
Confidentiality: High (H) β Financial data
Integrity: None (N) β Can't modify
Availability: None (N)
CVSS Vector:
AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS Score: 6.5 β MEDIUM π‘
Bounty Expected: $300 - $1,500
Note: Impact ke basis pe companies
High tak bhi de sakti hain!Example 4: SSRF β AWS Metadata
Vulnerability: SSRF β 169.254.169.254
AWS credentials accessible
Attack Vector: Network (N)
Attack Complexity: Low (L)
Privileges Req: None (N) β No auth!
User Interaction: None (N)
Scope: Changed (C)! β AWS cloud affected!
Confidentiality: High (H) β AWS keys stolen
Integrity: High (H) β AWS resources modify
Availability: High (H) β AWS resources delete
CVSS Vector:
AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CVSS Score: 10.0 β CRITICAL MAX! π΄π΄
Bounty Expected: $5,000 - $25,000+Example 5: Reflected XSS (Low Impact)
Vulnerability: Reflected XSS in search param
Only executes if victim clicks link
Attack Vector: Network (N)
Attack Complexity: Low (L)
Privileges Req: None (N)
User Interaction: Required (R) β Must click link
Scope: Unchanged (U)
Confidentiality: Low (L)
Integrity: Low (L)
Availability: None (N)
CVSS Vector:
AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
CVSS Score: 6.1 β MEDIUM π‘
Bounty Expected: $100 - $500PART 4: CVSS Quick Reference Table

PART 5: CVSS Calculator Tools
Tool 1: NVD CVSS Calculator (Official)
URL: https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
β
Official NIST calculator
β
Visual sliders
β
Vector string auto-generate
β
Score real-time calculate
β
Copy vector string karo report meinTool 2: First.org Calculator
URL: https://www.first.org/cvss/calculator/3.1
β
Simple interface
β
Explanation har metric ka
β
Temporal + Environmental bhiTool 3: HackerOne Built-in
HackerOne pe report submit karte waqt:
β Severity section mein
β "Use CVSS" option
β Built-in calculator!
β Score se automatically
Critical/High/Medium/Low select hota hai!PART 6: Common CVSS Mistakes Avoid Karo!
β Mistake 1: Har bug ko Critical claim karna
"Main maximum bounty chahta hoon"
β Triage team samajhti hai β credibility khatam!
β Future reports pe bhi doubt aayega!
β Mistake 2: Scope:Changed galat use karna
Scope:Changed sirf tab jab
dusra security domain affect ho!
(Browser β App = Changed)
(App β App = Unchanged usually)
β Mistake 3: UI:None jab interaction chahiye
Reflected XSS mein victim ko link click karna padta hai
β UI:Required hoga β UI:None nahi!
β Mistake 4: PR:None jab auth chahiye
IDOR ke liye account chahiye
β PR:Low hoga β PR:None nahi!
β Mistake 5: Availability overestimate karna
Sirf ek endpoint slow ho = A:Low
Full server down = A:HighPART 7: CVSS vs Platform Severity
CVSS score aur platform severity hamesha match nahi karte!
CVSS Score | NVD Rating | HackerOne | Bugcrowd
------------|------------|-----------|----------
9.0 - 10.0 | Critical | Critical | P1
7.0 - 8.9 | High | High | P2
4.0 - 6.9 | Medium | Medium | P3
0.1 - 3.9 | Low | Low | P4
Important Notes:
β Companies apna adjustment karti hain!
β Business context matter karta hai!
β CVSS 6.5 IDOR β Company High de sakti hai
(agar sensitive data involved ho)
β CVSS 8.0 β Company Medium de sakti hai
(agar impact limited ho unke context mein)
Tumhara kaam: Sahi CVSS calculate karo
+ Impact section mein justify karo!PART 8: Report Mein CVSS Kaise Add Karo
## Severity
**CVSS 3.1 Score: 8.7 (High)**
**Vector String:**
`CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N`
**Score Justification:**
- **AV:Network** β Vulnerability remotely exploitable
via internet, no physical access required
- **AC:Low** β No special conditions needed,
attack works consistently
- **PR:Low** β Requires basic authenticated account
(free registration available)
- **UI:Required** β Victim must visit attacker's profile
- **S:Changed** β Attack escapes vulnerable component
and affects other users' browser sessions
- **C:High** β Session cookies fully accessible,
leading to complete account takeover
- **I:Low** β Limited data modification possible
via DOM manipulation
- **A:None** β No availability impact
**Calculator Link:**
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?
vector=AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N&version=3.1Quick Revision
π CVSS = 0-10 score, vulnerability danger measure
π’ Base Metrics = AV, AC, PR, UI, S, C, I, A
π AV:Network = Internet se = Highest score!
π PR:None = No auth needed = Higher score!
π S:Changed = Other systems affected = BIG boost!
π― Calculator = nvd.nist.gov/vuln-metrics/cvss
β Avoid = Overclaiming Critical har baar
β
Always = Justify each metric in report
π° Result = Correct CVSS = Fair bounty + credibility!
CVSS Ranges:
9.0-10.0 = Critical π΄
7.0-8.9 = High π
4.0-6.9 = Medium π‘
0.1-3.9 = Low π’Meri Baatβ¦
Pehli baar SSRF mila excited hokar CVSS calculate kiya:
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N = 7.5 (High)Triager ne response diya: "Severity downgraded to Medium"
Maine socha kya galti hui?
Galti: S:Unchanged maine socha sirf app affected hai!
Lekin SSRF se main AWS metadata access kar raha tha Cloud infrastructure = Different security domain = S:Changed!
Correct CVSS:
AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H = 10.0 (CRITICAL!)Triager ko explain kiya Severity Critical pe update ho gayi!
Bounty: $6,000 sirf ek metric ka difference! π
Lesson: Scope:Changed ko kabhi mat bhulo SSRF, XSS to other users, container escape sab mein S:C hoga!
Agle article mein Real Bug Reports HackerOne public disclosures se seekhte hain actual reports analyze karenge! π₯
HackerMD Bug Bounty Hunter | Cybersecurity Researcher GitHub: BotGJ16 | Medium: @HackerMD
Previous: Article #25 Perfect Bug Report Next: Article #27 Real Bug Reports: HackerOne Disclosures Se Seekho!
#CVSS #BugBounty #VulnerabilityScoring #EthicalHacking #Hinglish #HackerOne #HackerMD