Report security bugs in Node.js via HackerOne.
Normally, your report will be acknowledged within 5 days, and you'll receive a more detailed response to your report within 10 days indicating the next steps in handling your submission. These timelines may extend when our triage volunteers are away on holiday, particularly at the end of the year.
After the initial reply to your report, the security team will endeavor to keep you informed of the progress being made towards a fix and full announcement, and may ask for additional information or guidance surrounding the reported issue.
Node.js bug bounty programThe Node.js project engages in an official bug bounty program for security researchers and responsible public disclosures. The program is managed through the HackerOne platform. See https://hackerone.com/nodejs for further details.
Reporting a bug in a third-party moduleSecurity bugs in third-party modules should be reported to their respective maintainers.
Here is the security disclosure policy for Node.js
The security report is received and is assigned a primary handler. This person will coordinate the fix and release process. The problem is validated against all supported Node.js versions. Once confirmed, a list of all affected versions is determined. Code is audited to find any potential similar problems. Fixes are prepared for all supported releases. These fixes are not committed to the public repository but rather held locally pending the announcement.
A suggested embargo date for this vulnerability is chosen and a CVE (Common Vulnerabilities and Exposures (CVE®)) is requested for the vulnerability.
On the embargo date, a copy of the announcement is sent to the Node.js security mailing list. The changes are pushed to the public repository and new builds are deployed to nodejs.org. Within 6 hours of the mailing list being notified, a copy of the advisory will be published on the Node.js blog.
Typically, the embargo date will be set 72 hours from the time the CVE is issued. However, this may vary depending on the severity of the bug or difficulty in applying a fix.
This process can take some time, especially when we need to coordinate with maintainers of other projects. We will try to handle the bug as quickly as possible; however, we must follow the release process above to ensure that we handle disclosure consistently.
When reporting security vulnerabilities, reporters must adhere to the following guidelines:
Code of Conduct Compliance: All security reports must comply with our Code of Conduct. Reports that violate our code of conduct will not be considered and may result in being banned from future participation.
No Harmful Actions: Security research and vulnerability reporting must not:
Responsible Testing: When testing potential vulnerabilities:
Report Quality
Failure to follow these guidelines may result in:
In the Node.js threat model, there are trusted elements such as the underlying operating system. Vulnerabilities that require the compromise of these trusted elements are outside the scope of the Node.js threat model.
For a vulnerability to be eligible for a bug bounty, it must be a vulnerability in the context of the Node.js threat model. In other words, it cannot assume that a trusted element (such as the operating system) has been compromised.
Being able to cause the following through control of the elements that Node.js does not trust is considered a vulnerability:
If Node.js loads configuration files or runs code by default (without a specific request from the user), and this is not documented, it is considered a vulnerability. Vulnerabilities related to this case may be fixed by a documentation update.
Node.js does NOT trust:
In other words, if the data passing through Node.js to/from the application can trigger actions other than those documented for the APIs, there is likely a security vulnerability. Examples of unwanted actions are polluting globals, causing an unrecoverable crash, or any other unexpected side effects that can lead to a loss of confidentiality, integrity, or availability.
For example, if trusted input (like secure application code) is correct, then untrusted input must not lead to arbitrary JavaScript code execution.
Node.js trusts everything else. Examples include:
JSON.parse()
.node:wasi
module does not currently provide the comprehensive file system security properties provided by some WASI runtimes.Any unexpected behavior from the data manipulation from Node.js Internal functions may be considered a vulnerability if they are exploitable via untrusted resources.
In addition to addressing vulnerabilities based on the above, the project works to avoid APIs and internal implementations that make it "easy" for application code to use the APIs incorrectly in a way that results in vulnerabilities within the application code itself. While we don’t consider those vulnerabilities in Node.js itself and will not necessarily issue a CVE, we do want them to be reported privately to Node.js first. We often choose to work to improve our APIs based on those reports and issue fixes either in regular or security releases depending on how much of a risk to the community they pose.
Examples of vulnerabilities Improper Certificate Validation (CWE-295)Experimental features are eligible to reports as any other stable feature of Node.js. They will also be susceptible to receiving the same severity score as any other stable feature.
Receiving security updatesSecurity notifications will be distributed via the following methods.
If you have suggestions on how this process could be improved, please visit the nodejs/security-wg repository.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4