gus-asf commented on code in PR #168:
URL: https://github.com/apache/solr-site/pull/168#discussion_r3070275573


##########
content/pages/security-reporting.md:
##########
@@ -0,0 +1,209 @@
+Title: Solr™ Vulnerability Reporting Procedure
+URL: security-reporting.html
+save_as: security-reporting.html
+template: security-reporting
+
+This page documents the procedure for reporting a security vulnerability in 
Apache Solr and
+explains what happens after a report is submitted. It also provides canned 
email templates
+for PMC members to use when responding to reports.
+
+Apache Solr is maintained by volunteers. The PMC will make every effort to 
respond promptly,
+but cannot guarantee specific response times. We appreciate your patience and 
your contribution
+to the security of the project.
+
+If you have concerns about how the project team is handling a report, you may 
also contact
+[[email protected]](mailto:[email protected]) directly.
+For PMC members, the ASF provides detailed
+[committer guidance on vulnerability 
handling](https://www.apache.org/security/committers.html).
+
+<h2 id="before-you-report">Before You Report <a class="headerlink" 
href="#before-you-report" title="Permanent link">¶</a></h2>
+
+Ensure you have tested against a [supported Solr 
version](https://solr.apache.org/downloads.html)
+with both **authentication** and **authorization** properly configured.
+Solr's admin level APIs are designed to be used only by authenticated and 
trusted administrators.
+
+<h2 id="submission-rules">Submission Rules <a class="headerlink" 
href="#submission-rules" title="Permanent link">¶</a></h2>
+
+A valid security report to 
[[email protected]](mailto:[email protected]) must:
+
+1. **Be sent as plaintext** — no zip file attachments, no links to Google 
Docs, Dropbox, or similar services
+2. **Cover exactly one vulnerability** — if you have multiple findings, send 
one email per issue
+3. **Include step-by-step reproduction steps** — scanner output alone is not a 
report
+4. **Demonstrate the issue with authentication and authorization enabled** — 
running Solr
+   without authentication is a misconfiguration, not a vulnerability
+5. **Target a [supported Solr 
version](https://solr.apache.org/downloads.html)** — reports
+   against unsupported versions will not be accepted
+
+<h2 id="workflow">Workflow <a class="headerlink" href="#workflow" 
title="Permanent link">¶</a></h2>
+
+<figure class="workflow-figure">
+  <img src="{{ SITEURL }}/theme/images/security-vuln-process.png"
+       alt="Flowchart showing the Solr vulnerability reporting process: 
reporter submits plaintext email, PMC triages within 7 days (reject / needs 
changes / accepted), accepted reports get a private JIRA and ACK email, 
followed by full investigation up to 30 days, then either won't fix or 
confirmed vuln leading to fix, coordinated disclosure, CVE publication, and 
credit in advisory." />
+  <figcaption>Solr vulnerability reporting workflow</figcaption>
+</figure>
+
+<h2 id="what-to-expect">What to Expect <a class="headerlink" 
href="#what-to-expect" title="Permanent link">¶</a></h2>
+
+| Step | Who | Timeframe |
+|------|-----|-----------|
+| Initial triage / acknowledgment | PMC volunteers | Up to 7 days |
+| Full investigation | PMC volunteers | Up to 30 days |
+| CVE ID allocation | PMC + ASF Security Team (CNA) | During fix development |
+| Fix + CVE publication | PMC + ASF Security Team | Coordinated with you, the 
reporter |
+| Credit in advisory | PMC | At public disclosure |
+
+Public disclosure follows the ASF standard process and is announced on the
+[oss-security mailing 
list](https://oss-security.openwall.org/wiki/mailing-lists/oss-security).
+
+---
+**For PMC members:** The following section documents the internal triage 
process and provides email templates for responding to incoming reports.
+
+<h2 id="canned-responses">Canned Email Responses <a class="headerlink" 
href="#canned-responses" title="Permanent link">¶</a></h2>
+
+The following templates are provided for PMC members responding to incoming 
reports.
+Click each entry to expand and view the template.
+
+<details>
+<summary>Response A: Acknowledgment — report received and under 
review</summary>
+<pre>
+Subject: Re: [Original Subject]
+
+Thank you for your security report.
+
+We have received your report and created a private issue to track it.
+The Solr PMC will review your report and aim to update you within 30 days.
+We will keep you informed through this email thread.
+
+Please do not discuss this report on public channels (mailing lists,
+GitHub, social media) until we have coordinated public disclosure with you.
+
+If you have additional information, please reply to this email.
+
+Apache Solr Security Team
[email protected]
+https://solr.apache.org/security.html
+</pre>
+</details>
+
+<details>
+<summary>Response B: Reject — scanner output without reproduction 
steps</summary>
+<pre>
+Subject: Re: [Original Subject]

Review Comment:
   ```suggestion
   
   ```



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to