On Thu, Sep 23, 2021 at 11:02 PM Steven M Christey <co...@mitre.org> wrote:
> Just a couple quick comments since it’s late for me :) > > > > CWE-435: Improper Interaction Between Multiple Correctly-Behaving Entities > seems to cover the original question. CWE-435’s description says “An > interaction error occurs when two entities have correct behavior when > running independently of each other, but when they are integrated as > components in a larger system or process, they introduce incorrect > behaviors that may cause resultant weaknesses.” It’s interesting that this > weakness is not so easily found with keyword searches on the CWE web site, > but I suspect that part of the difficulty is that there is no widely-used > term for this kind of issue. (Similar for, say, “confused deputy” – you can > only find it if you know the term.) CWE-435 *is* a Pillar, however, so > hierarchical-based browsing in view 1000 might have allowed it to be > discovered more quickly. > > I'd forgotten this one. One comment: the multiple entities don't always behave correctly, e.g. they might be slightly out of spec, not enough to be a security issue on their own, but like a slightly misthreaded bolt plus a slightly misthreaded hole... (and the bolt vibrates out and stuff falls off your car). > > > Over the years, I’ve had a general unease about the desire to describe > weaknesses as “configuration” problems, but in the past year or two, I’ve > started thinking more about characterizing the mistake that’s reflected in > “what the configuration does” – just like what a coding error does, or a > design flaw. For example, “running with excessive privileges” can be done > in coding or in configuration (or be required by design) – the > behavior/mistake is still the same, regardless of the phase of the SDLC in > which it occurs or who introduced the mistake. > Also in the system, the number of docker containers that run everything as root now... sigh. > > > - Steve > > > > > > *From:* Kurt Seifried <k...@seifried.org> > *Sent:* Thursday, September 23, 2021 11:20 PM > *To:* Walton, Jeffrey <noloa...@gmail.com> > *Cc:* CWE Research Discussion <cwe-research-list@mitre.org> > *Subject:* Re: Cross-configuration attacks > > > > I assume by CVE you meant CWE, and no there isn't a CWE for "intersection" > or "mismatch" attacks. I don't like the term cross-configuration unless > it's actually applied to issues that are created by configuration issues, > my concern would be technically any intersection vulnerability can be > classed as a config issue because you could disable most things > somehow/somwhere. > > > > Perhaps we need CWE to not just cover weaknesses but normal behaviours so > we can better describe "normal behaviour A + normal behavior B = weakness > [described if not specific term exists). > > > > Do we have a list of CVE "intersection" vulns to look at as a data set to > see what is causing these? E.g. configs? badly written specifications that > result in different interpretations? One good keyword is "conjunction" but > also a lot of false positives: > > > > > https://nvd.nist.gov/vuln/search/results?form_type=Basic&results_type=overview&query=conjunction&search_type=all&isCpeNameSearch=false > > > > > > > > On Thu, Sep 23, 2021 at 8:16 PM Jeffrey Walton <noloa...@gmail.com> wrote: > > Hi Everyone, > > This made my radar recently: https://eprint.iacr.org/2021/923.pdf. The > interesting thing about the attack is, App A is considered secure in > isolation, and App B is considered secure in isolation, but when > interacting App A and B produce an insecure result. > > We've seen bad interactions among components within the same app > before, like incorrectly combining authentication and encryption. But > in this case it is not the same app. Rather, the vulnerability is a > product of two distinct apps using slightly different implementation > details sharing data. > > I'm wondering if there's a CVE to cover the scenario. Looking through > existing CVEs I don't see one that jumps out at me. > > ----- > > Here's from the abstract of the paper: > > ... ElGamal encryption has been used in many > different contexts, chiefly among them by the OpenPGP standard. > Despite its simplicity, or perhaps because of it, in reality there is a > large degree of ambiguity on several key aspects of the cipher. Each > library in the OpenPGP ecosystem seems to have implemented a > slightly different “flavour” of ElGamal encryption. While –taken in > isolation– each implementation may be secure, we reveal that in the > interoperable world of OpenPGP, unforeseen cross-configuration > attacks become possible. Concretely, we propose different such > attacks and show their practical efficacy by recovering plaintexts > and even secret keys. > > > > > -- > > Kurt Seifried (He/Him) > k...@seifried.org > -- Kurt Seifried (He/Him) k...@seifried.org