docs/BUG-BOUNTY: bug bounty time [skip ci]
Introducing the curl bug bounty program on hackerone. We now recommend filing security issues directly in the hackerone ticket system which only is readable to curl security team members. Assisted-by: Daniel Gustafsson Closes #3488
This commit is contained in:
parent
eb84ca3ea8
commit
10e4dd6a7b
5
.github/ISSUE_TEMPLATE
vendored
5
.github/ISSUE_TEMPLATE
vendored
@ -1,5 +1,6 @@
|
|||||||
<!-- Only file bugs here! Ask questions on the mailing list https://curl.haxx.se/mail/
|
<!-- Only file bugs here! Ask questions on the mailing lists https://curl.haxx.se/mail/
|
||||||
Do not file security vulnerabilities here, e-mail curl-security at haxx.se
|
|
||||||
|
SECURITY RELATED? Post it here: https://hackerone.com/curl
|
||||||
|
|
||||||
There are collections of known issues to be aware of:
|
There are collections of known issues to be aware of:
|
||||||
https://curl.haxx.se/docs/knownbugs.html
|
https://curl.haxx.se/docs/knownbugs.html
|
||||||
|
|||||||
@ -50,6 +50,11 @@ To download the very latest source from the Git server do this:
|
|||||||
|
|
||||||
(you'll get a directory named curl created, filled with the source code)
|
(you'll get a directory named curl created, filled with the source code)
|
||||||
|
|
||||||
|
## Security problems
|
||||||
|
|
||||||
|
Report supected security problems on [our hackerone
|
||||||
|
page](https://hackerone.com/curl) and not in public!
|
||||||
|
|
||||||
## Notice
|
## Notice
|
||||||
|
|
||||||
Curl contains pieces of source code that is Copyright (c) 1998, 1999 Kungliga
|
Curl contains pieces of source code that is Copyright (c) 1998, 1999 Kungliga
|
||||||
|
|||||||
89
docs/BUG-BOUNTY.md
Normal file
89
docs/BUG-BOUNTY.md
Normal file
@ -0,0 +1,89 @@
|
|||||||
|
# The curl bug bounty
|
||||||
|
|
||||||
|
The curl project runs a bug bounty program in association with
|
||||||
|
[HackerOne](https://www.hackerone.com/).
|
||||||
|
|
||||||
|
# How does it work?
|
||||||
|
|
||||||
|
Start out by posting your suspected security vulnerability directly to [curl's
|
||||||
|
hackerone security bug tracker](https://www.hackerone.com/curl).
|
||||||
|
|
||||||
|
After you have reported a security issue, it has been deemed credible and a
|
||||||
|
patch and advisory has been made public you can be eligible for a bounty from
|
||||||
|
this program.
|
||||||
|
|
||||||
|
See all details at [https://hackerone.com/curl](https://hackerone.com/curl)
|
||||||
|
|
||||||
|
This bounty is relying on funds from sponsors. If you use curl professionally,
|
||||||
|
consider help funding this!
|
||||||
|
|
||||||
|
# How much money is the bounty at
|
||||||
|
|
||||||
|
The curl projects offer monetary compensation for reported and published
|
||||||
|
security vulnerabilities. The amount of money that is rewarded depends on how
|
||||||
|
serious the flaw is determined to be.
|
||||||
|
|
||||||
|
We offer reward money *up to* a certain amount per severity. The curl security
|
||||||
|
team determines the severity of each reported flaw on a case by case basis and
|
||||||
|
the exact amount rewarded to the reporter is then decided.
|
||||||
|
|
||||||
|
At the start of the program, the award amounts are:
|
||||||
|
|
||||||
|
Critical: 2,000 USD
|
||||||
|
High: 1,500 USD
|
||||||
|
Medium: 1,000 USD
|
||||||
|
Low: 500 USD
|
||||||
|
|
||||||
|
# Who's eligible for a reward
|
||||||
|
|
||||||
|
Everyone and anyone who reports a security problem in a released curl version
|
||||||
|
that hasn't already been reported can ask for a bounty.
|
||||||
|
|
||||||
|
Vulnerabilities in features which are off by default and documented as
|
||||||
|
experimental, are not eligible for a reward.
|
||||||
|
|
||||||
|
The vulnerability has to be fixed and publicly announced (by the curl project)
|
||||||
|
before a bug bounty will be considered.
|
||||||
|
|
||||||
|
Bounties need to be requested within twelve months from the publication of the
|
||||||
|
vulnerability.
|
||||||
|
|
||||||
|
The vulnerabilities must not have been made public before February 1st, 2019.
|
||||||
|
We do not retroactively pay for old, already known and published security
|
||||||
|
problems.
|
||||||
|
|
||||||
|
# Product vulnerabilities only
|
||||||
|
|
||||||
|
This bug bounty only concerns the curl and libcurl products and thus their
|
||||||
|
respective source codes - when running on existing hardware. It does not
|
||||||
|
include documentation, web sites or other infrastructure.
|
||||||
|
|
||||||
|
The curl security team will be the sole arbiter if a reported flaw can be
|
||||||
|
subject to a bounty or not.
|
||||||
|
|
||||||
|
# How are vulnerabilities graded
|
||||||
|
|
||||||
|
The grading of each reported vulnerability that makes a reward claim will be
|
||||||
|
performed by the curl security team. The grading will be based on the CVSS
|
||||||
|
(Common Vulnerability Scoring System) 3.0.
|
||||||
|
|
||||||
|
# How are reward amounts determined
|
||||||
|
|
||||||
|
The curl security team first gives the vulnerability a score, as mentioned
|
||||||
|
above, and based on that level we set an amount depending on the specifics of
|
||||||
|
the individual case. Other sponsors of the program might also get involved and
|
||||||
|
can raise the amounts depending on the particular issue.
|
||||||
|
|
||||||
|
# What happens if the bounty fund is drained
|
||||||
|
|
||||||
|
The bounty fund depends on sponsors. If we pay out more bounties than we add,
|
||||||
|
the fund will eventually drain. If that end up happening, we will simply not
|
||||||
|
be able to pay out as high bounties as we would like and hope that we can
|
||||||
|
convince new sponsors to help us top up the fund again.
|
||||||
|
|
||||||
|
# Regarding taxes etc on the bounties
|
||||||
|
|
||||||
|
In the event that the individual receiving a curl bug bounty needs to pay
|
||||||
|
taxes on the reward money, that's something for the receiver to work out and
|
||||||
|
handle together with hackerone. The curl project or its security team never
|
||||||
|
actually receive any of this money, hold the money or pay out the money.
|
||||||
11
docs/BUGS
11
docs/BUGS
@ -61,9 +61,14 @@ BUGS
|
|||||||
using our security development process.
|
using our security development process.
|
||||||
|
|
||||||
Security related bugs or bugs that are suspected to have a security impact,
|
Security related bugs or bugs that are suspected to have a security impact,
|
||||||
should be reported by email to curl-security@haxx.se so that they first can
|
should be reported on the curl security tracker at HackerOne:
|
||||||
be dealt with away from the public to minimize the harm and impact it will
|
|
||||||
have on existing users out there who might be using the vulnerable versions.
|
https://hackerone.com/curl
|
||||||
|
|
||||||
|
This ensures that the report reaches the curl security team so that they
|
||||||
|
first can be deal with the report away from the public to minimize the harm
|
||||||
|
and impact it will have on existing users out there who might be using the
|
||||||
|
vulnerable versions.
|
||||||
|
|
||||||
The curl project's process for handling security related issues is
|
The curl project's process for handling security related issues is
|
||||||
documented here:
|
documented here:
|
||||||
|
|||||||
@ -44,6 +44,7 @@ EXTRA_DIST = \
|
|||||||
$(noinst_man_MANS) \
|
$(noinst_man_MANS) \
|
||||||
ALTSVC.md \
|
ALTSVC.md \
|
||||||
BINDINGS.md \
|
BINDINGS.md \
|
||||||
|
BUG-BOUNTY.md \
|
||||||
BUGS \
|
BUGS \
|
||||||
CHECKSRC.md \
|
CHECKSRC.md \
|
||||||
CIPHERS.md \
|
CIPHERS.md \
|
||||||
|
|||||||
@ -10,9 +10,8 @@ Publishing Information
|
|||||||
All known and public curl or libcurl related vulnerabilities are listed on
|
All known and public curl or libcurl related vulnerabilities are listed on
|
||||||
[the curl web site security page](https://curl.haxx.se/docs/security.html).
|
[the curl web site security page](https://curl.haxx.se/docs/security.html).
|
||||||
|
|
||||||
Security vulnerabilities should not be entered in the project's public bug
|
Security vulnerabilities **should not** be entered in the project's public bug
|
||||||
tracker unless the necessary configuration is in place to limit access to the
|
tracker.
|
||||||
issue to only the reporter and the project's security team.
|
|
||||||
|
|
||||||
Vulnerability Handling
|
Vulnerability Handling
|
||||||
----------------------
|
----------------------
|
||||||
@ -23,20 +22,20 @@ No information should be made public about a vulnerability until it is
|
|||||||
formally announced at the end of this process. That means, for example that a
|
formally announced at the end of this process. That means, for example that a
|
||||||
bug tracker entry must NOT be created to track the issue since that will make
|
bug tracker entry must NOT be created to track the issue since that will make
|
||||||
the issue public and it should not be discussed on any of the project's public
|
the issue public and it should not be discussed on any of the project's public
|
||||||
mailing lists. Also messages associated with any commits should not make
|
mailing lists. Also messages associated with any commits should not make any
|
||||||
any reference to the security nature of the commit if done prior to the public
|
reference to the security nature of the commit if done prior to the public
|
||||||
announcement.
|
announcement.
|
||||||
|
|
||||||
- The person discovering the issue, the reporter, reports the vulnerability
|
- The person discovering the issue, the reporter, reports the vulnerability on
|
||||||
privately to `curl-security@haxx.se`. That's an email alias that reaches a
|
https://hackerone.com/curl. Issues filed there reach a handful of selected
|
||||||
handful of selected and trusted people.
|
and trusted people.
|
||||||
|
|
||||||
- Messages that do not relate to the reporting or managing of an undisclosed
|
- Messages that do not relate to the reporting or managing of an undisclosed
|
||||||
security vulnerability in curl or libcurl are ignored and no further action
|
security vulnerability in curl or libcurl are ignored and no further action
|
||||||
is required.
|
is required.
|
||||||
|
|
||||||
- A person in the security team sends an e-mail to the original reporter to
|
- A person in the security team responds to the original report to acknowledge
|
||||||
acknowledge the report.
|
that a human has seen the report.
|
||||||
|
|
||||||
- The security team investigates the report and either rejects it or accepts
|
- The security team investigates the report and either rejects it or accepts
|
||||||
it.
|
it.
|
||||||
@ -51,9 +50,9 @@ announcement.
|
|||||||
should involve the reporter as much as possible.
|
should involve the reporter as much as possible.
|
||||||
|
|
||||||
- The release of the information should be "as soon as possible" and is most
|
- The release of the information should be "as soon as possible" and is most
|
||||||
often synced with an upcoming release that contains the fix. If the
|
often synchronized with an upcoming release that contains the fix. If the
|
||||||
reporter, or anyone else, thinks the next planned release is too far away
|
reporter, or anyone else involved, thinks the next planned release is too
|
||||||
then a separate earlier release for security reasons should be considered.
|
far away, then a separate earlier release should be considered.
|
||||||
|
|
||||||
- Write a security advisory draft about the problem that explains what the
|
- Write a security advisory draft about the problem that explains what the
|
||||||
problem is, its impact, which versions it affects, solutions or workarounds,
|
problem is, its impact, which versions it affects, solutions or workarounds,
|
||||||
@ -61,12 +60,14 @@ announcement.
|
|||||||
Figure out the CWE (Common Weakness Enumeration) number for the flaw.
|
Figure out the CWE (Common Weakness Enumeration) number for the flaw.
|
||||||
|
|
||||||
- Request a CVE number from
|
- Request a CVE number from
|
||||||
|
[Hackerone](https://docs.hackerone.com/programs/cve-requests.html)
|
||||||
|
|
||||||
|
- Consider informing
|
||||||
[distros@openwall](https://oss-security.openwall.org/wiki/mailing-lists/distros)
|
[distros@openwall](https://oss-security.openwall.org/wiki/mailing-lists/distros)
|
||||||
when also informing and preparing them for the upcoming public security
|
to prepare them about the upcoming public security vulnerability
|
||||||
vulnerability announcement - attach the advisory draft for information. Note
|
announcement - attach the advisory draft for information. Note that
|
||||||
that 'distros' won't accept an embargo longer than 14 days and they do not
|
'distros' won't accept an embargo longer than 14 days and they do not care
|
||||||
care for Windows-specific flaws. For windows-specific flaws, request CVE
|
for Windows-specific flaws.
|
||||||
directly from MITRE.
|
|
||||||
|
|
||||||
- Update the "security advisory" with the CVE number.
|
- Update the "security advisory" with the CVE number.
|
||||||
|
|
||||||
@ -93,6 +94,9 @@ announcement.
|
|||||||
curl-security (at haxx dot se)
|
curl-security (at haxx dot se)
|
||||||
------------------------------
|
------------------------------
|
||||||
|
|
||||||
|
This is a private mailing list for discussions on and about curl security
|
||||||
|
issues.
|
||||||
|
|
||||||
Who is on this list? There are a couple of criteria you must meet, and then we
|
Who is on this list? There are a couple of criteria you must meet, and then we
|
||||||
might ask you to join the list or you can ask to join it. It really isn't very
|
might ask you to join the list or you can ask to join it. It really isn't very
|
||||||
formal. We basically only require that you have a long-term presence in the
|
formal. We basically only require that you have a long-term presence in the
|
||||||
@ -124,12 +128,5 @@ Publishing Security Advisories
|
|||||||
Hackerone Internet Bug Bounty
|
Hackerone Internet Bug Bounty
|
||||||
-----------------------------
|
-----------------------------
|
||||||
|
|
||||||
The curl project does not run any bounty program on its own, but there are
|
See [BUG-BOUNTY](BUG-BOUNTY.md) for specific details on the bug bounty
|
||||||
outside organizations that do. First report your issue the normal way and
|
program.
|
||||||
proceed as described in this document.
|
|
||||||
|
|
||||||
Then, if the issue is [critical](https://hackerone.com/ibb-data), you are
|
|
||||||
eligible to apply for a bounty from Hackerone for your find.
|
|
||||||
|
|
||||||
Once your reported vulnerability has been publicly disclosed by the curl
|
|
||||||
project, you can submit a [report to them](https://hackerone.com/ibb-data).
|
|
||||||
|
|||||||
Loading…
Reference in New Issue
Block a user