|
| 1 | +========================== |
| 2 | +Vulnerability Notification |
| 3 | +========================== |
| 4 | + |
| 5 | +10gen values the privacy and security of all users of MongoDB, and we |
| 6 | +work very hard to ensure that MongoDB and related tools minimize risk |
| 7 | +exposure and increase the security and integrity of data and |
| 8 | +environments using MongoDB. |
| 9 | + |
| 10 | +Notification |
| 11 | +------------ |
| 12 | + |
| 13 | +If you believe you've discovered a vulnerability in MongoDB or a |
| 14 | +related product, have experienced a security incident related to |
| 15 | +MongoDB, please report these issues so that 10gen can respond |
| 16 | +appropriately and work to prevent additional issues in the |
| 17 | +future. All vulnerability reports should contain as much information |
| 18 | +as possible so that we can move easily to resolve the issue, in |
| 19 | +particular, include the following: |
| 20 | + |
| 21 | +- The name of the product. |
| 22 | + |
| 23 | +- *Common Vulnerability* information, if applicable, including: |
| 24 | + |
| 25 | + - CVSS (Commong Vulnerability Scoring System) Score |
| 26 | + |
| 27 | + - CVE (Common Vulnerability and Exposures) Identifier. |
| 28 | + |
| 29 | +- Contact information, including an email address and/or phone number, |
| 30 | + if applicable. |
| 31 | + |
| 32 | +10gen guarantees a response to all vulnerability notifications within |
| 33 | +48 hours. |
| 34 | + |
| 35 | +Jira |
| 36 | +~~~~ |
| 37 | + |
| 38 | +10gen prefers `jira.mongodb.org <https://jira.mongodb.org>`_ for all |
| 39 | +communication regarding MongoDB and related products. |
| 40 | + |
| 41 | +Submit a ticket in the "`Core Server Security |
| 42 | +<https://jira.mongodb.org/SECURITY/>`_" project, at: |
| 43 | +<https://jira.mongodb.org/SECURITY/>. The ticket number will become |
| 44 | +reference identification for the issue for the lifetime of the issue, |
| 45 | +and you can use this identifier for tracking purposes. |
| 46 | + |
| 47 | +10gen will respond to any vulnerability notification received in a |
| 48 | +Jira case posted to the `SECURITY |
| 49 | +<https://jira.mongodb.org/SECURITY/>`_ project. |
| 50 | + |
| 51 | +Email |
| 52 | +~~~~~ |
| 53 | + |
| 54 | +While Jira is the preferred communication vector, you may also report |
| 55 | +vulnerabilities via email to < [email protected]>. |
| 56 | + |
| 57 | +You may encrypt email using our `public key |
| 58 | +<http://docs.mongodb.org/10gen-gpg-key.asc>`_, to ensure the privacy |
| 59 | +of a any sensitive information in your vulnerability report. |
| 60 | + |
| 61 | +10gen will respond to any vulnerability notification received via |
| 62 | +email via email which will contain a reference number (i.e. a ticket |
| 63 | +from the SECURITY project,) Jira case posted to the `SECURITY |
| 64 | +<https://jira.mongodb.org/SECURITY/>`_ project. |
| 65 | + |
| 66 | +Evaluation |
| 67 | +~~~~~~~~~~ |
| 68 | + |
| 69 | +10gen will validate all submitted vulnerabilities. 10gen will use Jira |
| 70 | +to track all communication regarding the vulnerability, which may |
| 71 | +include requests for clarification and additional information. If |
| 72 | +needed 10gen representatives can set up a conference call to exchange |
| 73 | +information regaining the vulnerability. |
| 74 | + |
| 75 | +Disclosure |
| 76 | +~~~~~~~~~~ |
| 77 | + |
| 78 | +10gen requests that you do *not* publicly disclose any information |
| 79 | +regarding the vulnerability or exploit, until 10gen has had the |
| 80 | +opportunity to analyze the vulnerability, respond to the notification, |
| 81 | +and if needed to notify key users, customers, and partners. |
| 82 | + |
| 83 | +The amount of time required to validate a reported vulnerability |
| 84 | +depends on the complexity and severity of the issue. 10gen takes all |
| 85 | +required vulnerabilities very seriously, and will always ensure that |
| 86 | +there is a clear and open channel of communication with the reporter |
| 87 | +of the vulnerability. |
| 88 | + |
| 89 | +After validating the issue, 10gen will coordinate public disclosure of |
| 90 | +the issue with the reporter in a mutually agreed timeframe and |
| 91 | +format. If required or requested, the reporter of a vulnerability will |
| 92 | +receive credit in the published security bulletin. |
0 commit comments