• CramHacks
  • Posts
  • CramHacks Chronicles #35: GPT Exploits 87% of Sampled Vulnerabilities

CramHacks Chronicles #35: GPT Exploits 87% of Sampled Vulnerabilities

Building an AppSec Program, AI Exploiting Vulns, Compliance as Code, Artifact Attestations

šŸ„³ Happy Monday! šŸ„³

I hope those attending BSides SF / RSA are having a great time! I tell myself I should go every year, but I never do.

May 15th, 2024, Iā€™ll be co-presenting How to Shift Left with the Semgrep AppSec Platform; come learn how to keep engineers sane while promoting secure code!

May 21st, 2024, Iā€™ll be on the Absolute AppSec Podcast! Iā€™m excited to complain about all things software supply chain security šŸ¤£.

Free Training!!!
Building An Application Security Program, Level 1
An introductory course to teach application security from scratch. Taught by none other than Semgrepā€™s Tanya Janca šŸ„³.

Table of Contents

General News

The npm package ā€˜requestā€™ is the 3rd most depended-on project in the npm ecosystem, used by over 35,000 open-source projects. It has been fully deprecated since Feb 2020.

Drataā€™s Acquisition of oak9 Ushers in New Era of Compliance as Code
Monitoring compliance pre-and post-production, automating risk alerts, remediation, and aligning with frameworks like SOC 2, ISO 27001, HIPAA, and PCI DSS.

šŸ‘‹ I canā€™t speak to the quality of oak9ā€™s technology, but this was a well-timed acquisition, in my opinion. Iā€™ve noticed an uptick in discussions around Vanta code security integrations.

CVEĀ® Numbering Authority (CNA) Operational Rules v4.0
CNAs have new rules to follow and have 90 days to adopt them.

ā€œThere is a fundamental concept embedded throughout the rules, and also explicitly defined in section ā€œ4.2.1 First Refusal.ā€ It goes like this:

The CNA with the most appropriate scope gets the first opportunity to assign. This is often the Supplier (vendor, developer) CNA. This CNA also gets the first opportunity to not assign. If the CNA does not assign, for any reason (including but not limited to EOL), then another CNA with appropriate scope can assign. For already Publicly Disclosed vulnerabilities, prefer CNA-LRs to assign, to reduce the chances of duplicate assignments.ā€

New CVE Record Format Enables Additional Data Fields at Time of Disclosure
The CVE Program has expanded its record format to include additional data elements like CVSS, CWE, and CPE directly from authoritative sources, enhancing automation and data accuracy in vulnerability management.

šŸ‘‹ This will maybe alleviate some of the workload for NISTā€™s NVD, which has historically had to enrich CVEs themselves. That said, people have actually to leverage this for it to be worth anything šŸ¤·.

Malware / Exploits

LLM Agents can Autonomously Exploit One-day Vulnerabilities
Richard Fang, Rohan Bindu, Akul Gupta, and Daniel Kang, the authors of Llm agents who can autonomously hack websites, disclose that providing GPT-4 CVE descriptions resulted in an 87% success rate for exploiting 15 one-day vulnerabilities.

šŸ‘‹ I reviewed some of the CVEs included in the research. Are these incredibly difficult to exploit? No, not at all. But, this does mean the skill bar for exploiting new vulnerabilities is lowering. What a time to be a script kiddie!

1,400 GitLab Servers Impacted by Exploited Vulnerability
CVE-2023-7028 has officially been added to CISAā€™s Known Exploited Vulnerabilities (KEV) Catalog. Shadowserver suggests that 1,400 internet-accessible servers are vulnerable.

ā€œGitLab Community and Enterprise Editions contain an improper access control vulnerability. This allows an attacker to trigger password reset emails to be sent to an unverified email address to ultimately facilitate an account takeover.ā€

Open-Source Tooling

GitHub: Introducing Artifact Attestationsā€“now in public beta
GitHub has introduced the public beta of Artifact Attestations, a new feature that allows project maintainers to create secure links between software artifacts and their origins, utilizing Sigstore.

šŸ‘‹ The versatility with this is šŸ”„ - Iā€™ll likely cover this more in future weeks.

Vulnerability Management

Are you familiar with the Exploit Prediction Scoring System (EPSS) model? You might find this discussion interesting regarding whether EPSS scores are meaningful for vulnerabilities impacting transitive dependencies. The comments offer some great insights!

State of Exploitation - A Peek into the Last Decade of Vulnerability Exploitation
VulnCheckā€™s Patrick Garrity digs into vulnerability disclosure and exploitation trends between 2014 and 2023, highlighting a significant increase in known exploited vulnerabilities (19.7%) and publicly available Proof-of-Concept exploits (11.8%).

On the Effect of Transitivity and Granularity on Vulnerability Propagation in the Maven Ecosystem
Amir M. Mir, Mehdi Keshani, and Sebastian Proksch of Delft University of Technology evaluated the effect of transitivity and how vulnerabilities propagate to projects. The study employed call graphs to analyze reachability. ā€œPotentially affectedā€ means a vulnerable version was used, while ā€œActually affectedā€ indicates a call path to the vulnerable function in a transitive dependency.

šŸ‘‹ Call graph analysis is impactful in this context, but ā€œActually affectedā€ is a misleading label (in my opinion). Call graph analysis omits other conditions required for a project to be impacted. Thank you, Jeffrey Luszcz, for letting me know about this study!

Until Next Time! šŸ‘‹ 

Hey, you made it to the bottom ā€“ thanks for sticking around!

Questions, ideas, or want to chat? Slide into my inbox! šŸ’Œ

Donā€™t hesitate to forward if someone could benefit from this.

See you next Monday!
-Kyle