Giter VIP home page Giter VIP logo

security-research's Introduction

Jonathan Leitschuh - Security Research

Public disclosure channel for disclosing security vulnerabilities I've discovered.

Take me to the research!

Why

I report a relatively high number of security vulnerabilities. Particularly to OSS projects.

Unfortunately, I've discovered that I'm spending a lot of my time chasing down maintainers, asking them to open GitHub Security Advisories, or trying to make contact via email. I've realized that this "making contact" phase is where a majority of my time/resources/energy was being spent. Additionally, my time/resources are spent ensuring the maintainers follow up on fixes and that disclosure occurs. I find that I'm not spending time on actual security research.

The goal of this repository is to invert the relationship. I create advisories, and invite the maintainers to participate in the advisory.

Should the maintainer wish to move the discussion/fix/disclosure to a GitHub Security Advisory against their own repository, I'm happy to do that. However, this channel provides an easy way for me to enforce my disclosure policy in a consistent and fair way.

Coordinated Disclosure Process

  1. When a vulnerability is uncovered, that vulnerability is written up as a GHSA here. This advisory is written for public consumption and communicates both the impact of the vulnerability and the source locations impacted.
  2. An attempt to contact the maintainer is made via email or other communication channel (eg. HackerOne, BugCrowd, Twitter, ect...). The maintainer is invited to the newly created GHSA. The initial contact contains a high-level description of the vulnerability but no more. Disclosure and communication about the vulnerability happens via GHSA. If the maintainer would like to open a GHSA against their own GitHub repository, this is also acceptable and the contents of the original GHSA will be copied over.
    1. If the maintainer chooses not to accept the vulnerability disclosure via GHSA, or can't be reached via issue/email or other communication channels, the top 6 contributors to the project from the past 3 years are added to the GHSA. If no one confirms the vulnerability after 30 days, the vulnerability is automatically disclosed publicly.
    2. If the maintainer chooses not to accept the vulnerability disclosure via GHSA, the vulnerability is automatically publicly disclosed and a CVE will be requested.
  3. Collaboration on the GHSA between myself and the maintainer over the disclosure contents occurs via the GHSA.
  4. Disclosure occurs when the disclosure conditions are met, either from the maintainers GHSA or the original GHSA.

My Disclosure Policy

My vulnerability disclosure follows Google's 90-day vulnerability disclosure policy (I'm not an employee of Google, I just like their policy). Full disclosure will occur either at the end of the 90-day deadline or whenever a patch is made widely available, whichever occurs first.

security-research's People

Contributors

daltz333 avatar dependabot[bot] avatar jlleitschuh avatar okundzich avatar sambsnyd avatar smehta23 avatar zieka avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar

security-research's Issues

Is this responsible disclosure?

As a maintainer of one repo that has a PR request automatically created by you, I am wondering if the process that was followed was to announce these issues was "responsible"?

The text on the PR was quite direct:

First question, do we need to perform vulnerability disclosure? It depends!

Is the vulnerable code only in tests or example code? No disclosure required!
Is the vulnerable code in code shipped to your end users? Vulnerability disclosure is probably required!

For the people that are affected by the final line, should there not have been some element of "responsible disclosure" of these issues, before the PRs were created for anyone to see?

To be clear: notifying people about these kind of issues is great (so I have no issue with you finding the problem in our code base); the concern I have here is that the metaphorical cat is immediately "out of the bag" after you raised the PR, giving us no chance to deal with the issue in a timely and "secure" manner.

See, e.g., https://en.wikipedia.org/wiki/Coordinated_vulnerability_disclosure

B

These programs were installed remotely by 2 cyber stalkers. It's been going on for over 3vl years. I know who they are! One is a super Google admin and his girl that my husband had an affair with is a developer, IAM NO ADMIN OR DEVELOPER I AM DESPERATE FOR HELP BUT HAVE NO IDEA WHAT ANYTHING MEANS OR DOES! I NEED HELP TO REMOVE ALL THESE PROGRAMS HE HAD LOADED IN NOT ONE BUT 20 PHONES AND DISTROYED THEM ,EVEN MY LAP TOP. CALLED SHERIFF ,THE INVESTIGATION WAS DONE BY A MAN THAT DIDN'T KNOW WHAT A HOT SPOT WAS OR THAT WIFI WAS IN CARS!!!?!! Someone take my hand and help me please

Stop reporting problems in test code

It is not a security issue when code creates a temp file with test data that's right their in the open source code, and then tests. These are false positives. I have yet to see even an arguable true positive in test code.

66

These programs were installed remotely by 2 cyber stalkers. It's been going on for over 3vl years. I know who they are! One is a super Google admin and his girl that my husband had an affair with is a developer, IAM NO ADMIN OR DEVELOPER I AM DESPERATE FOR HELP BUT HAVE NO IDEA WHAT ANYTHING MEANS OR DOES! I NEED HELP TO REMOVE ALL THESE PROGRAMS HE HAD LOADED IN NOT ONE BUT 20 PHONES AND DISTROYED THEM ,EVEN MY LAP TOP. CALLED SHERIFF ,THE INVESTIGATION WAS DONE BY A MAN THAT DIDN'T KNOW WHAT A HOT SPOT WAS OR THAT WIFI WAS IN CARS!!!?!! Someone take my hand and help me please

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.