Vulnerability Rating Criteria
The following issues are not included:
- Bugs that do not involve security issues. This includes, but is not limited to, product functionality defects, garbled text on web pages, style inconsistencies, directory traversal of static files, application compatibility issues, and so forth.
- Vulnerabilities that cannot be exploited. This includes CSRF vulnerabilities without sensitive operations, meaningless disclosure of exception information and intranet IP addresses/domain names.
- Other issues that cannot directly reflect vulnerabilities, including but not limited to issues that are purely user speculation.
Low-risk security issues:
Vulnerabilities that can cause some impact but cannot directly obtain device permissions or compromise data security, such as non-critical information disclosure, URL redirection, relatively difficult-to-exploit XSS vulnerabilities, common CSRF vulnerabilities, and so on.
Medium-risk security issues:
- Vulnerabilities requiring interaction to obtain user identity information. This includes but is not limited to stored XSS vulnerabilities;
- Arbitrary text operation vulnerabilities, including but not limited to any file reading, writing, deletion, downloading and other operations;
- Unauthorized access, including but not limited to bypassing restrictions to modify user information and perform user operations;
- Relatively serious information leakage vulnerabilities. This includes sensitive information file leakage, such as DB connection passwords.
High-risk security issues:
- Vulnerabilities that can directly obtain business server permissions, including but not limited to arbitrary command execution, webshell upload, and arbitrary code execution;
- Vulnerabilities that directly lead to serious information leakage, including but not limited to SQL injection vulnerabilities in core database;
- Logical vulnerabilities that directly lead to serious impacts, including but not limited to any account password change vulnerability;
- Vulnerabilities that directly steal user identity information in batches, including but not limited to SQL injection;
- Unauthorized access, including but not limited to bypassing authentication to access the backend.
Serious safety issues:
- Directly obtain core system permissions. These vulnerabilities that can directly harm the intranet include but are not limited to command execution, remote overflow, etc.
- Vulnerabilities that can obtain a large amount of user core data;
- Logical vulnerabilities that can directly lead to serious impacts, including but not limited to vulnerabilities that contain serious logic errors, can obtain large amounts of benefits and cause losses to the company and users.