|
1 | 1 | Vulnerability Disclosure
|
2 | 2 | ========================
|
3 | 3 |
|
4 |
| -If you think you have found a potential security vulnerability in requests, |
5 |
| -please email ` Nate < mailto:[email protected]>`_ and ` Seth < mailto:@[email protected]>`_ directly. ** Do not file a public issue.** |
6 |
| - |
7 |
| -Our PGP Key fingerprints are: |
8 |
| - |
9 |
| -- 8722 7E29 AD9C FF5C FAC3 EA6A 44D3 FF97 B80D C864 (`@nateprewitt <https://keybase.io/nateprewitt>`_) |
10 |
| - |
11 |
| -- EDD5 6765 A9D8 4653 CBC8 A134 51B0 6736 1740 F5FC (`@sethmlarson <https://keybase.io/sethmlarson>`_) |
12 |
| - |
13 |
| -You can also contact us on `Keybase <https://keybase.io/>`_ with the |
14 |
| -profiles above if desired. |
15 |
| - |
16 |
| -If English is not your first language, please try to describe the problem and |
17 |
| -its impact to the best of your ability. For greater detail, please use your |
18 |
| -native language and we will try our best to translate it using online services. |
19 |
| - |
20 |
| -Please also include the code you used to find the problem and the shortest |
21 |
| -amount of code necessary to reproduce it. |
22 |
| - |
23 |
| -Please do not disclose this to anyone else. We will retrieve a CVE identifier |
24 |
| -if necessary and give you full credit under whatever name or alias you provide. |
25 |
| -We will only request an identifier when we have a fix and can publish it in a |
26 |
| -release. |
27 |
| - |
28 |
| -We will respect your privacy and will only publicize your involvement if you |
29 |
| -grant us permission. |
30 |
| - |
31 |
| -Process |
32 |
| -------- |
33 |
| - |
34 |
| -This following information discusses the process the requests project follows |
35 |
| -in response to vulnerability disclosures. If you are disclosing a |
36 |
| -vulnerability, this section of the documentation lets you know how we will |
37 |
| -respond to your disclosure. |
38 |
| - |
39 |
| -Timeline |
40 |
| -~~~~~~~~ |
41 |
| - |
42 |
| -When you report an issue, one of the project members will respond to you within |
43 |
| -two days *at the outside*. In most cases responses will be faster, usually |
44 |
| -within 12 hours. This initial response will at the very least confirm receipt |
45 |
| -of the report. |
46 |
| - |
47 |
| -If we were able to rapidly reproduce the issue, the initial response will also |
48 |
| -contain confirmation of the issue. If we are not, we will often ask for more |
49 |
| -information about the reproduction scenario. |
50 |
| - |
51 |
| -Our goal is to have a fix for any vulnerability released within two weeks of |
52 |
| -the initial disclosure. This may potentially involve shipping an interim |
53 |
| -release that simply disables function while a more mature fix can be prepared, |
54 |
| -but will in the vast majority of cases mean shipping a complete release as soon |
55 |
| -as possible. |
56 |
| - |
57 |
| -Throughout the fix process we will keep you up to speed with how the fix is |
58 |
| -progressing. Once the fix is prepared, we will notify you that we believe we |
59 |
| -have a fix. Often we will ask you to confirm the fix resolves the problem in |
60 |
| -your environment, especially if we are not confident of our reproduction |
61 |
| -scenario. |
62 |
| - |
63 |
| -At this point, we will prepare for the release. We will obtain a CVE number |
64 |
| -if one is required, providing you with full credit for the discovery. We will |
65 |
| -also decide on a planned release date, and let you know when it is. This |
66 |
| -release date will *always* be on a weekday. |
67 |
| - |
68 |
| -At this point we will reach out to our major downstream packagers to notify |
69 |
| -them of an impending security-related patch so they can make arrangements. In |
70 |
| -addition, these packagers will be provided with the intended patch ahead of |
71 |
| -time, to ensure that they are able to promptly release their downstream |
72 |
| -packages. Currently the list of people we actively contact *ahead of a public |
73 |
| -release* is: |
74 |
| - |
75 |
| -- Python Maintenance Team, Red Hat ( [email protected]) |
76 |
| -- Daniele Tricoli, Debian (@eriol) |
77 |
| - |
78 |
| -We will notify these individuals at least a week ahead of our planned release |
79 |
| -date to ensure that they have sufficient time to prepare. If you believe you |
80 |
| -should be on this list, please let one of the maintainers know at one of the |
81 |
| -email addresses at the top of this article. |
82 |
| - |
83 |
| -On release day, we will push the patch to our public repository, along with an |
84 |
| -updated changelog that describes the issue and credits you. We will then issue |
85 |
| -a PyPI release containing the patch. |
86 |
| - |
87 |
| -At this point, we will publicise the release. This will involve mails to |
88 |
| -mailing lists, Tweets, and all other communication mechanisms available to the |
89 |
| -core team. |
90 |
| - |
91 |
| -We will also explicitly mention which commits contain the fix to make it easier |
92 |
| -for other distributors and users to easily patch their own versions of requests |
93 |
| -if upgrading is not an option. |
94 |
| - |
95 |
| -Previous CVEs |
96 |
| -------------- |
97 |
| - |
98 |
| -- Fixed in 2.20.0 |
99 |
| - - `CVE 2018-18074 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-18074>`_ |
100 |
| - |
101 |
| -- Fixed in 2.6.0 |
102 |
| - |
103 |
| - - `CVE 2015-2296 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-2296>`_, |
104 |
| - reported by Matthew Daley of `BugFuzz <https://bugfuzz.com/>`_. |
105 |
| - |
106 |
| -- Fixed in 2.3.0 |
107 |
| - |
108 |
| - - `CVE 2014-1829 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-1829>`_ |
109 |
| - |
110 |
| - - `CVE 2014-1830 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-1830>`_ |
| 4 | +The latest vulnerability disclosure information can be found on GitHub in our |
| 5 | +`Security Policy <https://github.com/psf/requests/blob/main/.github/SECURITY.md>`_. |
0 commit comments