Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Bug Bounty Hunting Reporting

Essential Elements of a good Bug Report

ElementDescription
Vulnerability TitleIncluding vuln type, affected domain/parameter/endpoint, impact etc.
CWE & CVSS ScoreFor communicating the characteristics and severity of the vuln
Vulnerability DescriptionBetter understanding of the vuln cause
PoCSteps to reproduce exploiting the identified clearly and concisely
ImpactElaborate more on what an attacker can achieve by fully exploiting the vulnerability; business impact and maximum damage should be included in the impact statement
RemediationOptional in BBP, but goot to have

CWE & CVSS

CWE (Common Weakness Enumeration)

A community-developed list of software and hardware weakness types. It serves as a common language, a measuring stick for security tools, and as a baseline for weakness identification, mitigation, and prevention efforts.

CVSS (Common Vulnerability Scoring System)

When it comes to communicating the severity of an identified vuln, the CVSS should be used, as it is a published standard used by organizations worldwide.

CVSS Calculator

Can be found here.

CVSS Structure

Attack Vector

Shows how the vuln can be exploited.

  • Network (N)
    • Attackers can only exploit this vuln through the network layer
  • Adjacent (A)
    • Attackers can exploit this vuln only if they reside in the same physical or logical network
  • Local (L)
    • Attackers can exploit this vuln only by accessing the target system locally or remotely or through user interaction
  • Physical (P)
    • Attackers can exploit this vuln through physical interaction/manipulation

Attack Complexity

Depicts the conditions beyond the attackers’ control and must be present to exploit the vuln successfully.

  • Low (L)
    • No special preparations should take place to exploit the vuln successfully; the attackers can exploit the vuln repeatedly without any issue
  • High (H)
    • Special preparations and information gathering should take place to exploit the vuln successfully

Privileges Required

Show the level of privileges the attacker must have to exploit the vuln successfully.

  • None (N)
    • No special access related to settings or files is required to exploit the vuln successfully; the vuln can be exploited from an unauthorized perspective
  • Low (L)
    • Attackers should posses standard user privileges to exploit the vuln successfully; the exploitation in this case usually affects files and settings owned by a user or non-sensitive assets
  • High (H)
    • Attacker should possess admin-level privileges to exploit the vuln successfully; the exploitation in this case usually affects the entire vulnerable system

User Interaction

Shows if the attacker can successfully exploit the vuln on their own or user interaction is required.

  • None (N)
    • Attackers can successfully exploit the vuln independently
  • Required (R)
    • A user should take some action before the attacker can successfully exploit the vuln

Scope

Shows if successful exploitation of the vuln can affect components other than the affected one.

  • Unchanged (U)
    • Successful exploitation of the vuln affects the vulnerable components or affects resources managed by the same security authority
  • Changed (C)
    • Successful exploitation of the vuln can affect components other than the affected one or resources beyond the scope of the affected component’s security authority

Confidentiality

Shows how much the vulnerable component’s confidentiality is affected upon successfully exploiting the vuln; confidentiality limits information access and disclosure to authorized users only and prevents unauthorized users from accessing information.

  • None (N)
    • The confidentiality of the vulnerable component does not get impacted
  • Low (L)
    • The vulnerable component will experience some loss of confidentiality upon successfully exploitation of the vuln; in this case, the attackers do not have control over what information is obtained
  • High (H)
    • The vulnerable component will experience total (or serious) loss of confidentiality upon successfully exploiting the vuln; in this case, the attackers have total (or some) control over what information is obtained

Integrity

Shows how much the vulnerable component’s integrity is affected upon successfully exploiting the vuln. Integrity refers to the trustworthiness and veracity of information.

  • None (N)
    • The integrity of the vulnerable component does not get impacted
  • Low (L)
    • Attackers can modify data in a limited manner on the vulnerable component upon successfully exploiting the vuln; attackers do not have control over the consequence of a modification, and the vulnerable component does not get seriously affected in this case
  • High (H)
    • Attacker can modify all or critical data on the vulnerable component upon successfully exploiting the vuln; attackers have control over the consequences of a modification, and the vulnerable component will experience a total loss of integrity

Availability

Shows how much the vulnerable component’s availability is affected upon successfully exploiting the vuln; availability refers to the accessibility of information resources in terms of network bandwith, disk space, processor cycles, etc.

  • None (N)
    • The availability of the vulnerable component does not get impacted
  • Low (L)
    • The vulnerable component will experience some loss of availability upon successfully exploiting the vuln; the attacker does not have complete control over the vulnerable component’s availability and cannot deny the service to users, and performance is just reduced
  • High (H)
    • The vulnerable component will experience total (or sever) availability loss upon successfully exploiting the vuln; the attacker has complete (or significant) control over the vulnerable component’s availability and can deny the service to users; performance is significantly reduced

Good Report Examples