Skip to content

Commit c7a2954

Browse files
committed
Update verbiage because we have a list of CWE-IDs per issue 529.
1 parent 85bcad6 commit c7a2954

File tree

1 file changed

+2
-4
lines changed

1 file changed

+2
-4
lines changed

docs/topics/information_sources.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -89,11 +89,9 @@ This ambiguity makes it impossible to cleanly map the [*Technical Impact*](../re
8989

9090
As mentioned in the discussion of [*Exploitation*](../reference/decision_points/exploitation.md), [CWE](https://cwe.mitre.org/) could be used to inform one of the conditions that satisfy [*proof of concept*](../reference/decision_points/exploitation.md).
9191
For some classes of vulnerabilities, the proof of concept is well known because the method of exploitation is already part of open-source tools.
92-
For example, on-path attacker scenarios for intercepting TLS certificates.
92+
An example of this is on-path attacker scenarios for intercepting TLS certificates.
9393
These scenarios are a cluster of related vulnerabilities.
94-
Since CWE classifies clusters of related vulnerabilities, the community could likely curate a list of CWE-IDs for which this condition of well known exploit technique is satisfied.
95-
Once that list were curated, it could be used to automatically populate a CVE-ID as [*proof of concept*](../reference/decision_points/exploitation.md) if the CWE-ID of which it is an instance is on the list.
96-
Such a check could not be exhaustive, since there are other conditions that satisfy [*proof of concept*](../reference/decision_points/exploitation.md).
94+
We provide a non-exhaustive [list of CWE-IDs with known proofs of concept](../reference/decision_points/exploitation/#cwe-ids-for-poc). This is list is non-exhaustive becuase there are other conditions that satisfy [*proof of concept*](../reference/decision_points/exploitation.md).
9795
If paired with automatic searches for exploit code in public repositories, these checks would cover many scenarios.
9896
If paired with active exploitation feeds discussed above, then the value of [*Exploitation*](../reference/decision_points/exploitation.md) could be determined almost entirely from available information without direct analyst involvement at each organization.
9997

0 commit comments

Comments
 (0)