|
@@ -20,9 +20,9 @@ We believe that the future of software is online SaaS. This means software are m
|
|
|
|
|
|
If you believe you've found a security bug in our service, we are happy to work with you to resolve the issue promptly and ensure you are fairly rewarded for your discovery.
|
|
If you believe you've found a security bug in our service, we are happy to work with you to resolve the issue promptly and ensure you are fairly rewarded for your discovery.
|
|
|
|
|
|
-Any type of denial of service attacks is strictly forbidden, as well as any interference with network equipment and Dolibarr infrastructure.
|
|
|
|
|
|
+Any type of denial-of-service attack is strictly forbidden, as well as any interference with network equipment and Dolibarr infrastructure.
|
|
|
|
|
|
-We recommand to install Dolibarr ERP CRM on your own server (as most Open Source software, download and use is free: [https://www.dolibarr.org/download](https://www.dolibarr.org/download)) to get access on every side of application.
|
|
|
|
|
|
+We recommend to install Dolibarr ERP CRM on your own server (as most Open Source software, download and use is free: [https://www.dolibarr.org/download](https://www.dolibarr.org/download)) to get access on every side of application.
|
|
|
|
|
|
### User Agent
|
|
### User Agent
|
|
|
|
|
|
@@ -30,7 +30,7 @@ If you try to find bug on Dolibarr, we recommend to append to your user-agent he
|
|
|
|
|
|
### Account access
|
|
### Account access
|
|
|
|
|
|
-You can install the web application yourself on your own platform/server so you get full access to application and sources. Download the zip of the files to put into your own web server virtual host from [https://www.dolibarr.org/download](https://www.dolibarr.org/download)
|
|
|
|
|
|
+You can install the web application yourself on your own platform/server so you get full access to application and sources. Download the zip of the files to put in your own web server virtual host from [https://www.dolibarr.org/download](https://www.dolibarr.org/download)
|
|
|
|
|
|
## Eligibility and Responsible Disclosure
|
|
## Eligibility and Responsible Disclosure
|
|
|
|
|
|
@@ -38,7 +38,7 @@ We are happy to thank everyone who submits valid reports which help us improve t
|
|
|
|
|
|
You must be the first reporter of the vulnerability (duplicate reports are closed).
|
|
You must be the first reporter of the vulnerability (duplicate reports are closed).
|
|
|
|
|
|
-You must avoid tests that could cause degradation or interruption of our service (refrain from using automated tools, and limit yourself about requests per second), that's why we recommand to install software on your own platform.
|
|
|
|
|
|
+You must avoid tests that could cause degradation or interruption of our service (refrain from using automated tools, and limit yourself about requests per second), that's why we recommend to install software on your own platform.
|
|
|
|
|
|
You must not leak, manipulate, or destroy any user data of third parties to find your vulnerability.
|
|
You must not leak, manipulate, or destroy any user data of third parties to find your vulnerability.
|
|
|
|
|
|
@@ -48,27 +48,27 @@ Reports are processed around once a month.
|
|
|
|
|
|
ONLY vulnerabilities discovered, when the following setup on test platform is used, are "valid":
|
|
ONLY vulnerabilities discovered, when the following setup on test platform is used, are "valid":
|
|
|
|
|
|
-* The version to analyze must be the last version available into "develop" branch or into last stable "vX.Y" released version. Reports on vulnerabilities already fixed (so already reported) into the develop branch will not be validated.
|
|
|
|
-* $dolibarr_main_prod must be set to 1 into conf.php
|
|
|
|
-* $dolibarr_nocsrfcheck must be kept to the value 0 into conf.php (this is the default value)
|
|
|
|
|
|
+* The version to analyze must be the last version available in the "develop" branch or in the last stable "vX.Y" released version. Reports on vulnerabilities already fixed (so already reported) in the develop branch will not be validated.
|
|
|
|
+* $dolibarr_main_prod must be set to 1 in conf.php
|
|
|
|
+* $dolibarr_nocsrfcheck must be kept to the value 0 in conf.php (this is the default value)
|
|
* $dolibarr_main_force_https must be set to something else than 0.
|
|
* $dolibarr_main_force_https must be set to something else than 0.
|
|
-* The constant MAIN_SECURITY_CSRF_WITH_TOKEN must be set to 3 into backoffice menu Home - Setup - Other (this protection should be set to 3 soon by default). CSRF attacks are accepted but
|
|
|
|
|
|
+* The constant MAIN_SECURITY_CSRF_WITH_TOKEN must be set to 3 in the backoffice menu Home - Setup - Other (this protection should be set to 3 soon by default). CSRF attacks are accepted but
|
|
double check that you have set MAIN_SECURITY_CSRF_WITH_TOKEN to value 3.
|
|
double check that you have set MAIN_SECURITY_CSRF_WITH_TOKEN to value 3.
|
|
-* ONLY security reports on modules provided by default and with the "stable" status are valid (troubles into "experimental", "developement" or external modules are not valid vulnerabilities).
|
|
|
|
|
|
+* ONLY security reports on modules provided by default and with the "stable" status are valid (troubles in "experimental", "development" or external modules are not valid vulnerabilities).
|
|
* The root of web server must link to htdocs and the documents directory must be outside of the web server root (this is the default when using the default installer but may differs with external installer).
|
|
* The root of web server must link to htdocs and the documents directory must be outside of the web server root (this is the default when using the default installer but may differs with external installer).
|
|
* The web server setup must be done so that only the documents directory is in write mode. The root directory called htdocs must be read-only.
|
|
* The web server setup must be done so that only the documents directory is in write mode. The root directory called htdocs must be read-only.
|
|
* The modules DebugBar and ModuleBuilder must NOT be enabled. (by default, these modules are not enabled. They are developer tools)
|
|
* The modules DebugBar and ModuleBuilder must NOT be enabled. (by default, these modules are not enabled. They are developer tools)
|
|
-* Ability for a high level user to edit web site pages into the CMS by including HTML or Javascript is an expected feature. Vulnerabilities into the website module are validated only if HTML or Javascript injection can be done by a non allowed user.
|
|
|
|
-* Fail2ban rules for rate limit on the login page,password forgotten page, api calls and all public pages (/public/*) must be installed as recommendend into the section "About - Admin tools - Section Access limits and mitigation".
|
|
|
|
|
|
+* Ability for a high-level user to edit web site pages in the CMS by including HTML or JavaScript is an expected feature. Vulnerabilities in the website module are validated only if HTML or JavaScript injection can be done by a non-allowed user.
|
|
|
|
+* Fail2ban rules for rate limit on the login page, forgotten password page, API calls and all public pages (/public/*) must be installed as recommended in the section "About - Admin tools - Section Access limits and mitigation".
|
|
|
|
|
|
-Scope is the web application (back office) and the APIs.
|
|
|
|
|
|
+Scope is the web application (backoffice) and the APIs.
|
|
|
|
|
|
## Examples of vulnerabilities that are Qualified for reporting.
|
|
## Examples of vulnerabilities that are Qualified for reporting.
|
|
|
|
|
|
* Remote code execution (RCE)
|
|
* Remote code execution (RCE)
|
|
* Local files access and manipulation (LFI, RFI, XXE, SSRF, XSPA)
|
|
* Local files access and manipulation (LFI, RFI, XXE, SSRF, XSPA)
|
|
* Code injections (JS, SQL, PHP). HTML are covered only for fields that are not description, notes or comments fields (where rich content is allowed on purpose).
|
|
* Code injections (JS, SQL, PHP). HTML are covered only for fields that are not description, notes or comments fields (where rich content is allowed on purpose).
|
|
-* Cross-Site Scripting (XSS), except from setup page of module "External web site" (allowing any content here, editable by admin user only, is accepted on purpose) and except into module "Web site" when permission to edit website content is allowed (injecting any data in this case is allowed too).
|
|
|
|
|
|
+* Cross-Site Scripting (XSS), except from setup page of module "External web site" (allowing any content here, editable by admin user only, is accepted on purpose) and except in the module "Web site" when permission to edit website content is allowed (injecting any data in this case is allowed too).
|
|
* Cross-Site Requests Forgery (CSRF) with real security impact (when using GET URLs, CSRF are qualified only for creating, updating or deleting data from pages restricted to admin users)
|
|
* Cross-Site Requests Forgery (CSRF) with real security impact (when using GET URLs, CSRF are qualified only for creating, updating or deleting data from pages restricted to admin users)
|
|
* Open redirect
|
|
* Open redirect
|
|
* Broken authentication & session management
|
|
* Broken authentication & session management
|
|
@@ -76,8 +76,8 @@ Scope is the web application (back office) and the APIs.
|
|
* Cross-Origin Resource Sharing (CORS) with real security impact
|
|
* Cross-Origin Resource Sharing (CORS) with real security impact
|
|
* Horizontal and vertical privilege escalation
|
|
* Horizontal and vertical privilege escalation
|
|
* "HTTP Host Header" XSS
|
|
* "HTTP Host Header" XSS
|
|
-* Software version disclosure (for non admin users only)
|
|
|
|
-* Stack traces or path disclosure (for non admin users only)
|
|
|
|
|
|
+* Software version disclosure (for non-admin users only)
|
|
|
|
+* Stack traces or path disclosure (for non-admin users only)
|
|
|
|
|
|
## Examples of vulnerabilities that are Non-qualified for reporting.
|
|
## Examples of vulnerabilities that are Non-qualified for reporting.
|
|
|
|
|
|
@@ -95,5 +95,5 @@ Scope is the web application (back office) and the APIs.
|
|
* Reports on features flagged as "experimental" or "development"
|
|
* Reports on features flagged as "experimental" or "development"
|
|
* Software version or private IP disclosure when logged-in user is admin
|
|
* Software version or private IP disclosure when logged-in user is admin
|
|
* Stack traces or path disclosure when logged-in user is admin
|
|
* Stack traces or path disclosure when logged-in user is admin
|
|
-* Any vulnerabilities due to a configuration different than the one defined into chapter "Scope for qualified vulnerabilities".
|
|
|
|
|
|
+* Any vulnerabilities due to a configuration different than the one defined in chapter "Scope for qualified vulnerabilities".
|
|
* Brute force attacks on login page, password forgotten page or any public pages (/public/*) are not qualified if the fail2ban recommended fail2ban rules were not installed.
|
|
* Brute force attacks on login page, password forgotten page or any public pages (/public/*) are not qualified if the fail2ban recommended fail2ban rules were not installed.
|