This is an automated email from the ASF dual-hosted git repository.

dpgaspar pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/superset.git


The following commit(s) were added to refs/heads/master by this push:
     new 165afee55a docs: update security policy and add CVE info (#24769)
165afee55a is described below

commit 165afee55a816e2e084ba2dac4cad7d5cb7d2a57
Author: Daniel Vaz Gaspar <[email protected]>
AuthorDate: Wed Jul 26 14:21:26 2023 +0100

    docs: update security policy and add CVE info (#24769)
---
 .github/SECURITY.md                   | 38 +++++++++++++++++++++++++++++++++++
 docs/docs/security/_category_.json    |  4 ++++
 docs/docs/security/cves.mdx           | 27 +++++++++++++++++++++++++
 docs/docs/{ => security}/security.mdx |  4 ++--
 4 files changed, 71 insertions(+), 2 deletions(-)

diff --git a/.github/SECURITY.md b/.github/SECURITY.md
new file mode 100644
index 0000000000..f35b9c48f0
--- /dev/null
+++ b/.github/SECURITY.md
@@ -0,0 +1,38 @@
+# Security Policy
+
+This is a project of the [Apache Software Foundation](https://apache.org) and 
follows the
+ASF [vulnerability handling 
process](https://apache.org/security/#vulnerability-handling).
+
+## Reporting Vulnerabilities
+
+**⚠️ Please do not file GitHub issues for security vulnerabilities as they are 
public! ⚠️**
+
+
+Apache Software Foundation takes a rigorous standpoint in annihilating the 
security issues
+in its software projects. Apache Superset is highly sensitive and forthcoming 
to issues
+pertaining to its features and functionality.
+If you have any concern or believe you have found a vulnerability in Apache 
Superset,
+please get in touch with the Apache Security Team privately at
+e-mail address [[email protected]](mailto:[email protected]).
+
+More details can be found on the ASF website at
+[ASF vulnerability reporting 
process](https://apache.org/security/#reporting-a-vulnerability)
+
+We kindly ask you to include the following information in your report:
+- Apache Superset version that you are using
+- A sanitized copy of your `superset_config.py` file or any config overrides
+- Detailed steps to reproduce the vulnerability
+
+Note that Apache Superset is not responsible for any third-party dependencies 
that may
+have security issues. Any vulnerabilities found in third-party dependencies 
should be
+reported to the maintainers of those projects. Results from security scans of 
Apache
+Superset dependencies found on its official Docker image can be remediated at 
release time
+by extending the image itself.
+
+**Your responsible disclosure and collaboration are invaluable.**
+
+## Extra Information
+
+ - [Apache Superset documentation](https://superset.apache.org/docs/security)
+ - [Common Vulnerabilities and Exposures by 
release](https://superset.apache.org/docs/security/cves)
+ - [How Security Vulnerabilities are Reported & Handled in Apache Superset 
(Blog)](https://preset.io/blog/how-security-vulnerabilities-are-reported-and-handled-in-apache-superset/)
diff --git a/docs/docs/security/_category_.json 
b/docs/docs/security/_category_.json
new file mode 100644
index 0000000000..7d24a44873
--- /dev/null
+++ b/docs/docs/security/_category_.json
@@ -0,0 +1,4 @@
+{
+  "label": "Security",
+  "position": 10
+}
diff --git a/docs/docs/security/cves.mdx b/docs/docs/security/cves.mdx
new file mode 100644
index 0000000000..148af09c54
--- /dev/null
+++ b/docs/docs/security/cves.mdx
@@ -0,0 +1,27 @@
+---
+title: CVEs by release
+hide_title: true
+sidebar_position: 2
+---
+
+#### Version 2.1.0
+
+| CVE            | Title                                                       
            | Affected          |
+| :------------- | 
:---------------------------------------------------------------------- | 
-----------------:|
+| CVE-2023-25504 | Possible SSRF on import datasets                            
            | <= 2.1.0          |
+| CVE-2023-27524 | Session validation vulnerability when using provided 
default SECRET_KEY | <= 2.1.0          |
+| CVE-2023-27525 | Incorrect default permissions for Gamma role                
            | <= 2.1.0          |
+| CVE-2023-30776 | Database connection password leak                           
            | <= 2.1.0          |
+
+
+#### Version 2.0.1
+
+| CVE            | Title                                                       
| Affected          |
+| :------------- | :---------------------------------------------------------- 
| -----------------:|
+| CVE-2022-41703 | SQL injection vulnerability in adhoc clauses                
| < 2.0.1 or <1.5.2 |
+| CVE-2022-43717 | Cross-Site Scripting on dashboards                          
| < 2.0.1 or <1.5.2 |
+| CVE-2022-43718 | Cross-Site Scripting vulnerability on upload forms          
| < 2.0.1 or <1.5.2 |
+| CVE-2022-43719 | Cross Site Request Forgery (CSRF) on accept, request access 
| < 2.0.1 or <1.5.2 |
+| CVE-2022-43720 | Improper rendering of user input                            
| < 2.0.1 or <1.5.2 |
+| CVE-2022-43721 | Open Redirect Vulnerability                                 
| < 2.0.1 or <1.5.2 |
+| CVE-2022-45438 | Dashboard metadata information leak                         
| < 2.0.1 or <1.5.2 |
diff --git a/docs/docs/security.mdx b/docs/docs/security/security.mdx
similarity index 99%
rename from docs/docs/security.mdx
rename to docs/docs/security/security.mdx
index ab6d41e895..5934af51df 100644
--- a/docs/docs/security.mdx
+++ b/docs/docs/security/security.mdx
@@ -1,7 +1,7 @@
 ---
-title: Security
+title: Role based Access
 hide_title: true
-sidebar_position: 10
+sidebar_position: 1
 ---
 
 ### Roles

Reply via email to