@@ -172,6 +172,51 @@ Your email will be acknowledged within 24 hours, and you’ll receive a more
172
172
detailed response to your email within 48 hours indicating the next steps in
173
173
handling your report.
174
174
175
+ There are no hard and fast rules to determine if a bug is worth reporting as
176
+ a security issue. The general rule is any issue worth reporting
177
+ must allow an attacker to compromise the confidentiality, integrity
178
+ or availability of the Node.js application or its system for which the attacker
179
+ does not already have the capability.
180
+
181
+ To illustrate the point, here are some examples of past issues and what the
182
+ Security Reponse Team thinks of them. When in doubt, however, please do send
183
+ us a report nonetheless.
184
+
185
+
186
+ ### Public disclosure preferred
187
+
188
+ - [ #14519 ] ( https://github.com/nodejs/node/issues/14519 ) : _ Internal domain
189
+ function can be used to cause segfaults_ . Causing program termination using
190
+ either the public Javascript APIs or the private bindings layer APIs requires
191
+ the ability to execute arbitrary Javascript code, which is already the highest
192
+ level of privilege possible.
193
+
194
+ - [ #12141 ] ( https://github.com/nodejs/node/pull/12141 ) : _ buffer: zero fill
195
+ Buffer(num) by default_ . The buffer constructor behaviour was documented,
196
+ but found to be prone to [ mis-use] ( https://snyk.io/blog/exploiting-buffer/ ) .
197
+ It has since been changed, but despite much debate, was not considered misuse
198
+ prone enough to justify fixing in older release lines and breaking our
199
+ API stability contract.
200
+
201
+ ### Private disclosure preferred
202
+
203
+ - [ CVE-2016 -7099] ( https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ ) :
204
+ _ Fix invalid wildcard certificate validation check_ . This is a high severity
205
+ defect that would allow a malicious TLS server to serve an invalid wildcard
206
+ certificate for its hostname and be improperly validated by a Node.js client.
207
+
208
+ - [ #5507 ] ( https://github.com/nodejs/node/pull/5507 ) : _ Fix a defect that makes
209
+ the CacheBleed Attack possible_ . Many, though not all, OpenSSL vulnerabilities
210
+ in the TLS/SSL protocols also effect Node.js.
211
+
212
+ - [ CVE-2016 -2216] ( https://nodejs.org/en/blog/vulnerability/february-2016-security-releases/ ) :
213
+ _ Fix defects in HTTP header parsing for requests and responses that can allow
214
+ response splitting_ . While the impact of this vulnerability is application and
215
+ network dependent, it is remotely exploitable in the HTTP protocol.
216
+
217
+ When in doubt, please do send us a report.
218
+
219
+
175
220
## Current Project Team Members
176
221
177
222
The Node.js project team comprises a group of core collaborators and a sub-group
0 commit comments