I was on chat with a professional for an advice, and while looking through my profile he mocked my XSS CVE, atleast i went out of my way and found something and reported it to officials.
Finding a CVE that is reported to MITRE shows a person’s initiative, ability to research, create proofs of concept, write technically, and manage client communications
WordPress is a free and famous open source CMS(Content management system), which is used to create flexible websites thus used by approximately 75 million websites.
We can download and install wordpress locally
https://bitnami.com/stack/wordpress/installer
Open Mozilla Firefox browser and type localhost/127.0.0.1 and hit enter. Page as shown below will appear, you need to click on Access WordPress.
Open the WordPress admin page just append wp-admin/admin after the URL and login
http://localhost/wordpress/wp-admin
After logging into the WordPress admin dashboard, go to Plugin » Add New, and enter the plugin name in the search field to install it. Once installed, activate the plugin by clicking on Activate Plugin. With the plugin installed and activated, you can start testing with basic XSS.
The process for applying for a CVE can feel daunting, especially due to the lack of references on the process. Here’s how it typically works:
To obtain the CVE-ID, the first step is to raise the request in https://cveform.mitre.org/
Reporting the Vulnerability: Using the CVE Form: Imagine the product you’ve found a vulnerability in isn’t listed. No worries, just head over to https://cveform.mitre.org/. Opt for “Report Vulnerability/Request CVE ID” and fill in vital information — vulnerability type, vendor, product, version, attack type, impact, and description. Then, wait for the next steps to unfold..
Earning Your Temporary CVE Number: In around 15–20 days, if your discovery aligns with the criteria, you’ll receive a temporary CVE number — a validation of your findings and their significance.
Sharing Your Publication: Sharing Insights: To bring your CVE ID to life, translate your findings into a well-structured write-up. Platforms like Medium, GitHub, or Exploit-DB are excellent choices. Your write-up isn’t just documentation; it’s an avenue for sharing knowledge and raising awareness.
To publish your exploit, you are to send a mail to the exploit DB team. The team will review the exploit and will publish it.
Make use of template to send the exploit details.
Email id: **submit@offsec.com**
# Google Dork:
# Date:
# Exploit Author:
# Vendor Homepage:
# Software Link:
# Version:
# Tested on Windows
# Patched Version:
# Category: Web Application
# CVE:XXX
# Exploit link:
Notifying CVE About Your Publication: Final Step: Back to https://cveform.mitre.org/, but this time, select “Notify CVE About a Publication.” Share the link to your write-up. The CVE team verifies the publication and updates their database, cementing your contribution.
The Final Countdown: Your CVE Goes Live: Now, here’s the exciting part: The CVE team will acknowledge receipt of the information. In a few short hours, your CVE will go live, contributing to the collective digital security effort.
NIST will also assess the findings and update resources with a CVSS score
CVE Numbering Authorities (CNAs)
CNAs are vendor, researcher, open source, CERT, hosted service, bug bounty provider, and consortium organizations authorized by the CVE Program to assign CVE IDs to vulnerabilities and publish CVE Records within their own specific scopes of coverage.
They are Authorized to assign CVE IDs to vulnerabilities affecting products within a distinct, agreed-upon scope.
Update your LinkedIn biography and resume with those two, or a blog if you have one.
As I mentioned, obtaining a CVE involves more than just acquiring a name and a number. The entire process proves you’ve conducted thorough research and identified something noteworthy, something that hasn’t been reported before.
Discovering a CVE and reporting it to MITRE demonstrates an individual’s initiative, research capabilities, proficiency in creating proofs of concept, technical writing skills, and ability to manage client communications.