Actions

Security: Difference between revisions

From Mahara Wiki

No edit summary
 
(19 intermediate revisions by 3 users not shown)
Line 1: Line 1:
Security is very important to Mahara developers. As potential issues are reported to us, we will test, patch and release fixes as quickly as possible.
==Introduction==


In the past, we had a security bug bounty program in place that rewarded researchers for finding security issues and disclosing them to us.
Security is very important to the Mahara project team. As potential issues are reported to us, we will test, patch if necessary, and release fixes as quickly as possible to the Mahara software for organisations to patch their instances.


= Security announcements =
The Mahara team does not have a bug bounty program. We still appreciate security bug reports and will list their reporters in the [[Contributors#Security_researchers|Security researchers]] section of our contributors page as a thank you if issues are reported to us first via a responsible disclosure.


You can see the previous security issues on our [https://bugs.launchpad.net/mahara/+cve bug tracker] or subscribe to security announcements from [https://mahara.org/interaction/forum/view.php?id=43 this forum] via email or [https://mahara.org/interaction/forum/atom.php?type=f&id=43 RSS].
In particular, we appreciate reports that concern the Mahara software. While potential security issues concerning the Mahara infrastructure and supporting tools can be reported, we rely on the security improvements made by the projects who support and package these tools. For example, if you come across security issues in the wiki that is based on MediaWiki, you may wish to report the issue to the MediaWiki project.


= Mahara Security Bug Bounty Program =
==Security announcements==


The Mahara Security Bug Bounty Program was taken down on 27th Sept 2012
[https://mahara.org/interaction/forum/view.php?id=43 Security announcements] for issues in the Mahara software are made in separately to allow community members to subscribe to them and see them easily.


= How to report a security issue? =
==How do you test Mahara for security issues?==


Please email security issues to security@mahara.org and provide as many details as you can about the environment (Mahara version, database version, plugins used, etc.).
We do not approve test accounts on mahara.org and other project infrastructure maintained by the Mahara project team that are created for the purpose of finding security or other issues.


Alternatively, you can report security issues on our [https://bugs.launchpad.net/mahara/+filebug bug tracker] if you select the "This bug is a security vulnerability" option when reporting your bug (which will hide the bug and mark it as private). If you report the bug publicly, we will be unable to offer you the bounty.
Please [[Developer_Area/Developer_Environment |install a local copy of Mahara]] using the [https://mahara.org/download latest code] on your own infrastructure to test the software. It is open source and you do not incur any fees for installing it.


You will receive a response from a developer acknowledging receipt of your email, typically '''within 1 or 2 business days'''. If you do not receive a response, please do not assume we're ignoring you. It's quite possible your email didn't make it through a spam filter.
== How do you report a security issue? ==
You can report security bugs in two different ways:


We appreciate your patience. Some bugs take time to correct and the process may involve a review of the codebase for similar problems. Please do not disclose the vulnerability to anyone before the publication of the official [https://mahara.org/interaction/forum/view.php?id=43 Mahara security advisory].
#'''Preferred''': Send an email to [mailto:[email protected] [email protected]]. You will receive an automatic reply acknowledging receipt of your report. We do not include your original message.
#In our [https://bugs.launchpad.net/mahara/+filebug bug tracker]: If you think (or know) you have found a security bug, please '''make sure you click 'This bug is a security vulnerability'''' under the 'This bug contains information that is' on the bug tracker form.


= Security in our development process =
Before reporting any potential issues, please verify that


Mahara developers are committed to achieving the highest standard of security. All commits to the Mahara git repository are reviewed by at least one developer who will enforce the guidelines found in [[Developer_Area/How_to_Review_Code]].
* your report is not covered on our '[[Security/Responses to common security reports |Responses to common security reports]]' page.
* vulnerabilities with the infrastructure [[Contributors#Mahara_project_infrastructure |haven't already been reported]].  


Some of the developers are also members of the security team and follow [[Developer_Area/Security_Team|these guidelines]].
We keep a [https://mahara.org/interaction/forum/view.php?id=43 register of all vulnerabilities that have been addressed in the Mahara codebase].
 
== What should you include in your report? ==
For the Mahara team to investigate security reports, please provide the following information:
 
*Whether the issue affects the Mahara application (which version was tested?) or a part of the project infrastructure;
*Type of vulnerability and its impact and severity. We recommend determining the [https://www.first.org/cvss/calculator/3.0 CVSS vector string and score];
*Whether the vulnerability has already been published or shared with others;
*Description of the security issue;
*Step-by-step instructions or proof of concept to replicate the issue;
*Was personal information exposed? If so, what happened with it.
 
== What will we do? ==
Our team will investigate vulnerability reports and be in touch with you within 10 New Zealand business days either with follow-up questions or our assessment and next steps. We appreciate your patience. Some bugs take time to investigate and the process may involve a review of the codebase for similar problems.
 
If you found a security vulnerability in the Mahara codebase that requires mitigation, we will request a CVE, credit you as reporter in the CVE and on our [[Contributors#Security researchers|security contributor page]] (if you like), and provide a timeline for fixing the problem through publishing a security release for all currently supported versions of Mahara. We aim to address security vulnerabilities as quickly as possible and make fixes available to the Mahara community, allowing organisations to patch their own installations of Mahara. We may prioritise the fixing of issues based on scope and severity of the vulnerability.
 
We make security release announcements via our [https://mahara.org/interaction/forum/view.php?id=43 official Mahara security advisory forum].
 
== What should you keep in mind? ==
We ask that you verify that security issues found by automated tools are not '''false positives'''. For example, reports of 'possible sensitive information in source code' are unlikely to apply to JavaScript files intentionally downloaded by a web browser and stored in our public source code repository.
 
If you want to report a '''TLS configuration''' issue, we expect to have an A or A+ rating on [https://ssllabs.com/ SSLLabs]. We will only take reports into consideration where our rating would drop below A when caused by TLS configuration issues.
 
Please note that the Mahara team can only request a '''CVE''' for security issues in the Mahara application itself. The Mahara project is unable to request CWE numbers for security issues.
 
The Mahara project '''does not run a bug bounty''' and cannot compensate for time spent.
 
==Security in our development process==
 
Mahara developers are committed to achieving the highest standard of security. All commits to the Mahara git repository are reviewed by at least one developer who will enforce the guidelines found in [[Developer_Area/How_to_Review_Code|our code review guidelines]].
 
Some of the developers are also members of the security team and follow [[Developer_Area/Security_Team|the security guidelines]].

Latest revision as of 15:15, 27 Haziran 2022

Introduction

Security is very important to the Mahara project team. As potential issues are reported to us, we will test, patch if necessary, and release fixes as quickly as possible to the Mahara software for organisations to patch their instances.

The Mahara team does not have a bug bounty program. We still appreciate security bug reports and will list their reporters in the Security researchers section of our contributors page as a thank you if issues are reported to us first via a responsible disclosure.

In particular, we appreciate reports that concern the Mahara software. While potential security issues concerning the Mahara infrastructure and supporting tools can be reported, we rely on the security improvements made by the projects who support and package these tools. For example, if you come across security issues in the wiki that is based on MediaWiki, you may wish to report the issue to the MediaWiki project.

Security announcements

Security announcements for issues in the Mahara software are made in separately to allow community members to subscribe to them and see them easily.

How do you test Mahara for security issues?

We do not approve test accounts on mahara.org and other project infrastructure maintained by the Mahara project team that are created for the purpose of finding security or other issues.

Please install a local copy of Mahara using the latest code on your own infrastructure to test the software. It is open source and you do not incur any fees for installing it.

How do you report a security issue?

You can report security bugs in two different ways:

  1. Preferred: Send an email to [email protected]. You will receive an automatic reply acknowledging receipt of your report. We do not include your original message.
  2. In our bug tracker: If you think (or know) you have found a security bug, please make sure you click 'This bug is a security vulnerability' under the 'This bug contains information that is' on the bug tracker form.

Before reporting any potential issues, please verify that

We keep a register of all vulnerabilities that have been addressed in the Mahara codebase.

What should you include in your report?

For the Mahara team to investigate security reports, please provide the following information:

  • Whether the issue affects the Mahara application (which version was tested?) or a part of the project infrastructure;
  • Type of vulnerability and its impact and severity. We recommend determining the CVSS vector string and score;
  • Whether the vulnerability has already been published or shared with others;
  • Description of the security issue;
  • Step-by-step instructions or proof of concept to replicate the issue;
  • Was personal information exposed? If so, what happened with it.

What will we do?

Our team will investigate vulnerability reports and be in touch with you within 10 New Zealand business days either with follow-up questions or our assessment and next steps. We appreciate your patience. Some bugs take time to investigate and the process may involve a review of the codebase for similar problems.

If you found a security vulnerability in the Mahara codebase that requires mitigation, we will request a CVE, credit you as reporter in the CVE and on our security contributor page (if you like), and provide a timeline for fixing the problem through publishing a security release for all currently supported versions of Mahara. We aim to address security vulnerabilities as quickly as possible and make fixes available to the Mahara community, allowing organisations to patch their own installations of Mahara. We may prioritise the fixing of issues based on scope and severity of the vulnerability.

We make security release announcements via our official Mahara security advisory forum.

What should you keep in mind?

We ask that you verify that security issues found by automated tools are not false positives. For example, reports of 'possible sensitive information in source code' are unlikely to apply to JavaScript files intentionally downloaded by a web browser and stored in our public source code repository.

If you want to report a TLS configuration issue, we expect to have an A or A+ rating on SSLLabs. We will only take reports into consideration where our rating would drop below A when caused by TLS configuration issues.

Please note that the Mahara team can only request a CVE for security issues in the Mahara application itself. The Mahara project is unable to request CWE numbers for security issues.

The Mahara project does not run a bug bounty and cannot compensate for time spent.

Security in our development process

Mahara developers are committed to achieving the highest standard of security. All commits to the Mahara git repository are reviewed by at least one developer who will enforce the guidelines found in our code review guidelines.

Some of the developers are also members of the security team and follow the security guidelines.