Aaj Kya Seekhenge?

  • CVSS kya hai basics se
  • CVSS 3.1 metrics ek ek samjho
  • Score calculate karna step by step
  • Real vulnerabilities ka CVSS examples
  • Common mistakes avoid karo
  • CVSS vs Bug Bounty Severity fark

Kyun zaroori hai? CVSS score = Bounty amount ka direct link! Companies CVSS ke basis pe P1/P2/P3/P4 decide karti hain! Ek wrong CVSS claim = Severity downgraded = $3,000 kam bounty! Sahi CVSS = Maximum bounty + credibility!

CVSS Kya Hai? Simple Samjho

CVSS = Common Vulnerability Scoring System

Ek standardized formula jo batata hai:
"Yeh vulnerability kitni dangerous hai?"

Score range: 0.0 β€” 10.0

0.0       = Koi risk nahi
0.1 - 3.9 = LOW
4.0 - 6.9 = MEDIUM
7.0 - 8.9 = HIGH
9.0 - 10.0= CRITICAL

CVSS 3.1 = Current version (2019 se)
CVSS 4.0 = Latest (2023 se β€” kuch platforms use kar rahe)

Bug bounty mein CVSS 3.1 standard hai!

PART 1: CVSS 3.1 Metrics Teeno Groups

CVSS mein 3 metric groups hain:

1. BASE Metrics     β†’ Bug ki actual nature
                      (Fixed score β€” hamesha same)

2. TEMPORAL Metrics β†’ Time-dependent factors
                      (Optional β€” bounty mein kam use)

3. ENVIRONMENTAL    β†’ Your specific org context
                      (Optional β€” companies khud set karti)

Bug bounty mein: Sirf BASE metrics = Score!

PART 2: BASE Metrics Ek Ek Samjho

Metric 1: Attack Vector (AV) Kahan Se Attack?

Network (N)        β†’ Internet se attack possible
                     Score contribution: HIGHEST
                     Example: Remote SQLi, SSRF

Adjacent (A)       β†’ Same network se (WiFi, LAN)
                     Score contribution: Medium
                     Example: WiFi packet sniffing

Local (L)          β†’ Physically machine pe hona zaroori
                     Score contribution: Lower
                     Example: Local privilege escalation

Physical (P)       β†’ Physically touch karna zaroori
                     Score contribution: LOWEST
                     Example: USB-based attack

Bug bounty mein 90% bugs: AV:N (Network) = Highest score!

Metric 2: Attack Complexity (AC) Kitna Mushkil?

Low (L)    β†’ Koi special condition nahi
             Attack hamesha kaam karta hai
             Score: Higher βœ…
             Example: Direct SQLi, Open IDOR

High (H)   β†’ Special conditions chahiye
             Race condition, specific config, etc.
             Score: Lower
             Example: Race condition exploit

Metric 3: Privileges Required (PR) Auth Chahiye?

None (N)   β†’ Koi login nahi chahiye!
             Score: HIGHEST βœ…
             Example: Unauthenticated SQLi

Low (L)    β†’ Normal user account chahiye
             Score: Medium
             Example: IDOR as logged-in user

High (H)   β†’ Admin/privileged account chahiye
             Score: Lower
             Example: Admin-only feature bug

Metric 4: User Interaction (UI) Victim Ko Kuch Karna?

None (N)   β†’ Victim ko kuch nahi karna!
             Attack automatically hota hai
             Score: Higher βœ…
             Example: Stored XSS auto-execute

Required (R) β†’ Victim ko click/visit karna padta hai
               Score: Lower
               Example: Reflected XSS (link click)

Metric 5: Scope (S) Sirf Us App Tak Ya Aage?

Unchanged (U) β†’ Attack sirf vulnerable app tak
                Score: Normal
                Example: SQLi sirf us DB tak

Changed (C)   β†’ Attack dusre systems bhi affect kare!
                Score: MUCH HIGHER βœ…
                Example: SSRF β†’ Internal network access
                         Container escape β†’ Host server

Scope Changed = Score dramatically badh jaata hai!

Metric 6: Confidentiality Impact Β© Data Exposure?

None (N)   β†’ Koi data expose nahi
High (H)   β†’ Poora data expose! All files readable!
             Score: Maximum βœ…
             Example: /etc/shadow readable
Low (L)    β†’ Kuch data expose, limited access

Metric 7: Integrity Impact (I) Data Change?

None (N)   β†’ Data change nahi ho sakta
High (H)   β†’ Poora data modify/delete possible!
             Score: Maximum βœ…
             Example: Admin without auth β†’ delete records
Low (L)    β†’ Limited data modification

Metric 8: Availability Impact (A) Service Down?

None (N)   β†’ Service chalta rehta hai
High (H)   β†’ Complete service crash/DoS!
             Score: Maximum βœ…
             Example: Billion laughs XXE β†’ server crash
Low (L)    β†’ Performance degradation, partial impact

PART 3: Score Calculate Karo Real Examples!

Example 1: Unauthenticated SQLi

Vulnerability: SQL Injection β€” no login required
                Remote database dump possible

Attack Vector:     Network (N)    β†’ Internet se
Attack Complexity: Low (L)        β†’ Direct attack
Privileges Req:    None (N)       β†’ No login!
User Interaction:  None (N)       β†’ No victim needed
Scope:             Unchanged (U)  β†’ Sirf DB affected
Confidentiality:   High (H)       β†’ Full DB exposed
Integrity:         High (H)       β†’ Data modify possible
Availability:      High (H)       β†’ DB crash possible

CVSS Vector:
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score: 9.8 β€” CRITICAL! πŸ”΄
Bounty Expected: $3,000 - $15,000+

Example 2: Stored XSS (Admin Impact)

Vulnerability: Stored XSS in profile bio
               Executes in any visitor's browser
               Admin also affected

Attack Vector:     Network (N)    β†’ Internet se
Attack Complexity: Low (L)        β†’ Simple payload
Privileges Req:    Low (L)        β†’ Need account
User Interaction:  Required (R)   β†’ Victim must visit
Scope:             Changed (C)!   β†’ Other users affected!
Confidentiality:   High (H)       β†’ Cookie steal
Integrity:         Low (L)        β†’ Limited modification
Availability:      None (N)       β†’ No service impact

CVSS Vector:
AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N

CVSS Score: 8.7 β€” HIGH! 🟠
Bounty Expected: $1,000 - $5,000

Example 3: IDOR (Sensitive Data)

Vulnerability: IDOR β€” other users' invoices readable
               Authenticated user needed

Attack Vector:     Network (N)
Attack Complexity: Low (L)
Privileges Req:    Low (L)        β†’ Need account
User Interaction:  None (N)       β†’ No victim needed
Scope:             Unchanged (U)
Confidentiality:   High (H)       β†’ Financial data
Integrity:         None (N)       β†’ Can't modify
Availability:      None (N)

CVSS Vector:
AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSS Score: 6.5 β€” MEDIUM 🟑
Bounty Expected: $300 - $1,500

Note: Impact ke basis pe companies
      High tak bhi de sakti hain!

Example 4: SSRF β†’ AWS Metadata

Vulnerability: SSRF β†’ 169.254.169.254
               AWS credentials accessible

Attack Vector:     Network (N)
Attack Complexity: Low (L)
Privileges Req:    None (N)       β†’ No auth!
User Interaction:  None (N)
Scope:             Changed (C)!   β†’ AWS cloud affected!
Confidentiality:   High (H)       β†’ AWS keys stolen
Integrity:         High (H)       β†’ AWS resources modify
Availability:      High (H)       β†’ AWS resources delete

CVSS Vector:
AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVSS Score: 10.0 β€” CRITICAL MAX! πŸ”΄πŸ”΄
Bounty Expected: $5,000 - $25,000+

Example 5: Reflected XSS (Low Impact)

Vulnerability: Reflected XSS in search param
               Only executes if victim clicks link

Attack Vector:     Network (N)
Attack Complexity: Low (L)
Privileges Req:    None (N)
User Interaction:  Required (R)   β†’ Must click link
Scope:             Unchanged (U)
Confidentiality:   Low (L)
Integrity:         Low (L)
Availability:      None (N)

CVSS Vector:
AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

CVSS Score: 6.1 β€” MEDIUM 🟑
Bounty Expected: $100 - $500

PART 4: CVSS Quick Reference Table

None

PART 5: CVSS Calculator Tools

Tool 1: NVD CVSS Calculator (Official)

URL: https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator

βœ… Official NIST calculator
βœ… Visual sliders
βœ… Vector string auto-generate
βœ… Score real-time calculate
βœ… Copy vector string karo report mein

Tool 2: First.org Calculator

URL: https://www.first.org/cvss/calculator/3.1

βœ… Simple interface
βœ… Explanation har metric ka
βœ… Temporal + Environmental bhi

Tool 3: HackerOne Built-in

HackerOne pe report submit karte waqt:
β†’ Severity section mein
β†’ "Use CVSS" option
β†’ Built-in calculator!
β†’ Score se automatically
   Critical/High/Medium/Low select hota hai!

PART 6: Common CVSS Mistakes Avoid Karo!

❌ Mistake 1: Har bug ko Critical claim karna
"Main maximum bounty chahta hoon"
β†’ Triage team samajhti hai β€” credibility khatam!
β†’ Future reports pe bhi doubt aayega!

❌ Mistake 2: Scope:Changed galat use karna
Scope:Changed sirf tab jab
dusra security domain affect ho!
(Browser β†’ App = Changed)
(App β†’ App = Unchanged usually)

❌ Mistake 3: UI:None jab interaction chahiye
Reflected XSS mein victim ko link click karna padta hai
β†’ UI:Required hoga β€” UI:None nahi!

❌ Mistake 4: PR:None jab auth chahiye
IDOR ke liye account chahiye
β†’ PR:Low hoga β€” PR:None nahi!

❌ Mistake 5: Availability overestimate karna
Sirf ek endpoint slow ho = A:Low
Full server down = A:High

PART 7: CVSS vs Platform Severity

CVSS score aur platform severity hamesha match nahi karte!

CVSS Score  | NVD Rating | HackerOne | Bugcrowd
------------|------------|-----------|----------
9.0 - 10.0  | Critical   | Critical  | P1
7.0 - 8.9   | High       | High      | P2
4.0 - 6.9   | Medium     | Medium    | P3
0.1 - 3.9   | Low        | Low       | P4

Important Notes:
β†’ Companies apna adjustment karti hain!
β†’ Business context matter karta hai!
β†’ CVSS 6.5 IDOR β†’ Company High de sakti hai
  (agar sensitive data involved ho)
β†’ CVSS 8.0 β†’ Company Medium de sakti hai
  (agar impact limited ho unke context mein)

Tumhara kaam: Sahi CVSS calculate karo
              + Impact section mein justify karo!

PART 8: Report Mein CVSS Kaise Add Karo

## Severity

**CVSS 3.1 Score: 8.7 (High)**

**Vector String:**
`CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N`

**Score Justification:**
- **AV:Network** β€” Vulnerability remotely exploitable
  via internet, no physical access required
- **AC:Low** β€” No special conditions needed,
  attack works consistently
- **PR:Low** β€” Requires basic authenticated account
  (free registration available)
- **UI:Required** β€” Victim must visit attacker's profile
- **S:Changed** β€” Attack escapes vulnerable component
  and affects other users' browser sessions
- **C:High** β€” Session cookies fully accessible,
  leading to complete account takeover
- **I:Low** β€” Limited data modification possible
  via DOM manipulation
- **A:None** β€” No availability impact

**Calculator Link:**
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?
vector=AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N&version=3.1

Quick Revision

πŸ“Š CVSS        = 0-10 score, vulnerability danger measure
πŸ”’ Base Metrics = AV, AC, PR, UI, S, C, I, A
🌐 AV:Network  = Internet se = Highest score!
πŸ”“ PR:None     = No auth needed = Higher score!
πŸ”„ S:Changed   = Other systems affected = BIG boost!
🎯 Calculator  = nvd.nist.gov/vuln-metrics/cvss
❌ Avoid       = Overclaiming Critical har baar
βœ… Always      = Justify each metric in report
πŸ’° Result      = Correct CVSS = Fair bounty + credibility!

CVSS Ranges:
9.0-10.0 = Critical πŸ”΄
7.0-8.9  = High 🟠
4.0-6.9  = Medium 🟑
0.1-3.9  = Low 🟒

Meri Baat…

Pehli baar SSRF mila excited hokar CVSS calculate kiya:

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N = 7.5 (High)

Triager ne response diya: "Severity downgraded to Medium"

Maine socha kya galti hui?

Galti: S:Unchanged maine socha sirf app affected hai!

Lekin SSRF se main AWS metadata access kar raha tha Cloud infrastructure = Different security domain = S:Changed!

Correct CVSS:

AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H = 10.0 (CRITICAL!)

Triager ko explain kiya Severity Critical pe update ho gayi!

Bounty: $6,000 sirf ek metric ka difference! πŸŽ‰

Lesson: Scope:Changed ko kabhi mat bhulo SSRF, XSS to other users, container escape sab mein S:C hoga!

Agle article mein Real Bug Reports HackerOne public disclosures se seekhte hain actual reports analyze karenge! πŸ”₯

HackerMD Bug Bounty Hunter | Cybersecurity Researcher GitHub: BotGJ16 | Medium: @HackerMD

Previous: Article #25 Perfect Bug Report Next: Article #27 Real Bug Reports: HackerOne Disclosures Se Seekho!

#CVSS #BugBounty #VulnerabilityScoring #EthicalHacking #Hinglish #HackerOne #HackerMD