-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathindex.html
210 lines (204 loc) · 16.3 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
<!DOCTYPE html>
<html>
<head>
<link href="https://cdn.jsdelivr.net/npm/[email protected]/dist/css/bootstrap.min.css" rel="stylesheet" integrity="sha384-gH2yIJqKdNHPEq0n4Mqa/HGKIhSkIHeL5AyhkYV8i59U5AR6csBvApHHNl/vI1Bx" crossorigin="anonymous" />
<link href="missing-security-controls.css" rel="stylesheet" />
</head>
<body>
<div class="container">
<div class="row">
<div id="before" class="col">
<fieldset>
<legend>
Attack Vector (AV)
</legend>
<div class="btn-group">
<input name="av-before" id="av-before-n" type="radio" data-field="av" data-value="n" checked />
<label for="av-before-n" data-toggle="tooltip" data-placement="top" class="btn btn-secondary btn-round-left" title="A vulnerability exploitable with Network access means the vulnerable component is bound to the network stack and the attacker's path is through OSI layer 3 (the network layer). Such a vulnerability is often termed 'remotely exploitable' and can be thought of as an attack being exploitable one or more network hops away (e.g. across layer 3 boundaries from routers).">Network
(AV:N)</label>
<input name="av-before" id="av-before-a" type="radio" data-field="av" data-value="a" />
<label for="av-before-a" data-toggle="tooltip" data-placement="top" class="btn btn-secondary" title="A vulnerability exploitable with Adjacent Network access means the vulnerable component is bound to the network stack, however the attack is limited to the same shared physical (e.g. Bluetooth, IEEE 802.11), or logical (e.g. local IP subnet) network, and cannot be performed across an OSI layer 3 boundary (e.g. a router).">Adjacent
Network (AV:A)</label>
<input name="av-before" id="av-before-l" type="radio" data-field="av" data-value="l" />
<label for="av-before-l" data-toggle="tooltip" data-placement="top" class="btn btn-secondary" title="A vulnerability exploitable with Local access means that the vulnerable component is not bound to the network stack, and the attacker's path is via read/write/execute capabilities. In some cases, the attacker may be logged in locally in order to exploit the vulnerability, or may rely on User Interaction to execute a malicious file.">Local
(AV:L)</label>
<input name="av-before" id="av-before-p" type="radio" data-field="av" data-value="p" />
<label for="av-before-p" data-toggle="tooltip" data-placement="top" class="btn btn-secondary" title="A vulnerability exploitable with Physical access requires the attacker to physically touch or manipulate the vulnerable component, such as attaching an peripheral device to a system.">Physical
(AV:P)</label>
</div>
</fieldset>
<fieldset>
<legend>
Attack Complexity (AC)
</legend>
<div class="btn-group">
<input name="ac-before" id="ac-before-l" type="radio" data-field="ac" data-value="l" checked />
<label for="ac-before-l" data-toggle="tooltip" data-placement="top" class="btn btn-secondary btn-round-left" title="Specialized access conditions or extenuating circumstances do not exist. An attacker can expect repeatable success against the vulnerable component.">Low
(AC:L)</label>
<input name="ac-before" id="ac-before-h" type="radio" data-field="ac" data-value="h" />
<label for="ac-before-h" data-toggle="tooltip" data-placement="top" class="btn btn-secondary" title="A successful attack depends on conditions beyond the attacker's control. That is, a successful attack cannot be accomplished at will, but requires the attacker to invest in some measurable amount of effort in preparation or execution against the vulnerable component before a successful attack can be expected.">High
(AC:H)</label>
</div>
</fieldset>
<fieldset>
<legend>
Privileges Required (PR)
</legend>
<div class="btn-group">
<input name="pr-before" id="pr-before-n" type="radio" data-field="pr" data-value="n" checked />
<label for="pr-before-n" data-toggle="tooltip" data-placement="top" class="btn btn-secondary btn-round-left" title="The attacker is unauthorized prior to attack, and therefore does not require any access to settings or files to carry out an attack.">None
(PR:N)</label>
<input name="pr-before" id="pr-before-l" type="radio" data-field="pr" data-value="l" />
<label for="pr-before-l" data-toggle="tooltip" data-placement="top" class="btn btn-secondary" title="The attacker is authorized with (i.e. requires) privileges that provide basic user capabilities that could normally affect only settings and files owned by a user. Alternatively, an attacker with Low privileges may have the ability to cause an impact only to non-sensitive resources.">Low
(PR:L)</label>
<input name="pr-before" id="pr-before-h" type="radio" data-field="pr" data-value="h" />
<label for="pr-before-h" data-toggle="tooltip" data-placement="top" class="btn btn-secondary" title="The attacker is authorized with (i.e. requires) privileges that provide significant (e.g. administrative) control over the vulnerable component that could affect component-wide settings and files.">High
(PR:H)</label>
</div>
</fieldset>
<fieldset>
<legend>
User Interaction (UI)
</legend>
<div class="btn-group">
<input name="ui-before" id="ui-before-n" type="radio" data-field="ui" data-value="n" checked />
<label for="ui-before-n" data-toggle="tooltip" data-placement="top" class="btn btn-secondary btn-round-left" title="The vulnerable system can be exploited without interaction from any user.">None (UI:N)</label>
<input name="ui-before" id="ui-before-r" type="radio" data-field="ui" data-value="r" />
<label for="ui-before-r" data-toggle="tooltip" data-placement="top" class="btn btn-secondary" title="Successful exploitation of this vulnerability requires a user to take some action before the vulnerability can be exploited, such as convincing a user to click a link in an email.">Required
(UI:R)</label>
</div>
</fieldset>
<fieldset>
<legend>
Scope (S)
</legend>
<div class="btn-group">
<input name="s-before" id="s-before-u" type="radio" data-field="s" data-value="u" checked />
<label for="s-before-u" data-toggle="tooltip" data-placement="top" class="btn btn-secondary btn-round-left" title="An exploited vulnerability can only affect resources managed by the same authority. In this case the vulnerable component and the impacted component are the same.">Unchanged
(S:U)</label>
<input name="s-before" id="s-before-c" type="radio" data-field="s" data-value="c" />
<label for="s-before-c" data-toggle="tooltip" data-placement="top" class="btn btn-secondary" title="An exploited vulnerability can affect resources beyond the authorization privileges intended by the vulnerable component. In this case the vulnerable component and the impacted component are different.">Changed
(S:C)</label>
</div>
</fieldset>
<div class="text-center">Score: <span class="score">0.0</span></div>
</div>
<div class="col col-1 text-center mt-auto mb-auto large-arrow">
→
</div>
<div id="after" class="col">
<fieldset>
<legend>
Attack Vector (AV)
</legend>
<div class="btn-group">
<input name="av-after" id="av-after-n" type="radio" data-field="av" data-value="n" checked />
<label for="av-after-n" data-toggle="tooltip" data-placement="top" class="btn btn-secondary btn-round-left" title="A vulnerability exploitable with Network access means the vulnerable component is bound to the network stack and the attacker's path is through OSI layer 3 (the network layer). Such a vulnerability is often termed 'remotely exploitable' and can be thought of as an attack being exploitable one or more network hops away (e.g. across layer 3 boundaries from routers).">Network
(AV:N)</label>
<input name="av-after" id="av-after-a" type="radio" data-field="av" data-value="a" />
<label for="av-after-a" data-toggle="tooltip" data-placement="top" class="btn btn-secondary" title="A vulnerability exploitable with Adjacent Network access means the vulnerable component is bound to the network stack, however the attack is limited to the same shared physical (e.g. Bluetooth, IEEE 802.11), or logical (e.g. local IP subnet) network, and cannot be performed across an OSI layer 3 boundary (e.g. a router).">Adjacent
Network (AV:A)</label>
<input name="av-after" id="av-after-l" type="radio" data-field="av" data-value="l" />
<label for="av-after-l" data-toggle="tooltip" data-placement="top" class="btn btn-secondary" title="A vulnerability exploitable with Local access means that the vulnerable component is not bound to the network stack, and the attacker's path is via read/write/execute capabilities. In some cases, the attacker may be logged in locally in order to exploit the vulnerability, or may rely on User Interaction to execute a malicious file.">Local
(AV:L)</label>
<input name="av-after" id="av-after-p" type="radio" data-field="av" data-value="p" />
<label for="av-after-p" data-toggle="tooltip" data-placement="top" class="btn btn-secondary" title="A vulnerability exploitable with Physical access requires the attacker to physically touch or manipulate the vulnerable component, such as attaching an peripheral device to a system.">Physical
(AV:P)</label>
</div>
</fieldset>
<fieldset>
<legend>
Attack Complexity (AC)
</legend>
<div class="btn-group">
<input name="ac-after" id="ac-after-l" type="radio" data-field="ac" data-value="l" checked />
<label for="ac-after-l" data-toggle="tooltip" data-placement="top" class="btn btn-secondary btn-round-left" title="Specialized access conditions or extenuating circumstances do not exist. An attacker can expect repeatable success against the vulnerable component.">Low
(AC:L)</label>
<input name="ac-after" id="ac-after-h" type="radio" data-field="ac" data-value="h" />
<label for="ac-after-h" data-toggle="tooltip" data-placement="top" class="btn btn-secondary" title="A successful attack depends on conditions beyond the attacker's control. That is, a successful attack cannot be accomplished at will, but requires the attacker to invest in some measurable amount of effort in preparation or execution against the vulnerable component before a successful attack can be expected.">High
(AC:H)</label>
</div>
</fieldset>
<fieldset>
<legend>
Privileges Required (PR)
</legend>
<div class="btn-group">
<input name="pr-after" id="pr-after-n" type="radio" data-field="pr" data-value="n" checked />
<label for="pr-after-n" data-toggle="tooltip" data-placement="top" class="btn btn-secondary btn-round-left" title="The attacker is unauthorized prior to attack, and therefore does not require any access to settings or files to carry out an attack.">None
(PR:N)</label>
<input name="pr-after" id="pr-after-l" type="radio" data-field="pr" data-value="l" />
<label for="pr-after-l" data-toggle="tooltip" data-placement="top" class="btn btn-secondary" title="The attacker is authorized with (i.e. requires) privileges that provide basic user capabilities that could normally affect only settings and files owned by a user. Alternatively, an attacker with Low privileges may have the ability to cause an impact only to non-sensitive resources.">Low
(PR:L)</label>
<input name="pr-after" id="pr-after-h" type="radio" data-field="pr" data-value="h" />
<label for="pr-after-h" data-toggle="tooltip" data-placement="top" class="btn btn-secondary" title="The attacker is authorized with (i.e. requires) privileges that provide significant (e.g. administrative) control over the vulnerable component that could affect component-wide settings and files.">High
(PR:H)</label>
</div>
</fieldset>
<fieldset>
<legend>
User Interaction (UI)
</legend>
<div class="btn-group">
<input name="ui-after" id="ui-after-n" type="radio" data-field="ui" data-value="n" checked />
<label for="ui-after-n" data-toggle="tooltip" data-placement="top" class="btn btn-secondary btn-round-left" title="The vulnerable system can be exploited without interaction from any user.">None (UI:N)</label>
<input name="ui-after" id="ui-after-r" type="radio" data-field="ui" data-value="r" />
<label for="ui-after-r" data-toggle="tooltip" data-placement="top" class="btn btn-secondary" title="Successful exploitation of this vulnerability requires a user to take some action before the vulnerability can be exploited, such as convincing a user to click a link in an email.">Required
(UI:R)</label>
</div>
</fieldset>
<fieldset>
<legend>
Scope (S)
</legend>
<div class="btn-group">
<input name="s-after" id="s-after-u" type="radio" data-field="s" data-value="u" checked />
<label for="s-after-u" data-toggle="tooltip" data-placement="top" class="btn btn-secondary btn-round-left" title="An exploited vulnerability can only affect resources managed by the same authority. In this case the vulnerable component and the impacted component are the same.">Unchanged
(S:U)</label>
<input name="s-after" id="s-after-c" type="radio" data-field="s" data-value="c" />
<label for="s-after-c" data-toggle="tooltip" data-placement="top" class="btn btn-secondary" title="An exploited vulnerability can affect resources beyond the authorization privileges intended by the vulnerable component. In this case the vulnerable component and the impacted component are different.">Changed
(S:C)</label>
</div>
</fieldset>
<div class="text-center">Score: <span class="score">0.0</span></div>
</div>
</div>
</div>
<div class="row">
<div class="col text-center">
Delta: <span class="delta">0.0</span>
</div>
</div>
<div class="row">
<div class="col text-center">
<span class="rating" data-content="Informational">Informational</span>
</div>
</div>
<script src="https://cdn.jsdelivr.net/npm/[email protected]/dist/js/bootstrap.bundle.min.js" integrity="sha384-A3rJD856KowSb7dwlZdYEkO39Gagi7vIsF0jrRAoQmDKKtQBHUuLZ9AsSv4jD4Xa" crossorigin="anonymous"></script>
<script src="https://code.jquery.com/jquery-3.6.0.slim.min.js" integrity="sha256-u7e5khyithlIdTpu22PHhENmPcRdFiHRjhAuHcs05RI=" crossorigin="anonymous"></script>
<script src="missing-security-controls.js"></script>
<script>
function updateScore(elem) {
var score = calculate(elem);
$(elem).parent().parent().parent().find('.score').text(score);
var delta = ($(".score")[0].innerText - $(".score")[1].innerText).toFixed(2);
$(".delta").text(delta);
if (delta >= 2.8) {
$(".rating").text("High");
} else if (delta >= 1.3 && delta < 2.8) {
$(".rating").text("Medium");
} else if (delta >= 0.1 && delta < 1.3) {
$(".rating").text("Low");
} else {
$(".rating").text("Informational");
}
$(".rating").attr("data-content", $(".rating").text());
}
updateScore($("#av-before-n"));
updateScore($("#av-after-n"));
$("input").click(function() {
updateScore(this);
});
</script>
</body>
</html>