Created on 24 October 2024, about 2 months ago

Problem/Motivation

Drupal is a CVE CNA and our scope is currently:

All projects hosted under drupal.org only

It could be good to update this description:

  • We're discussing whether to issue CVEs for EOL branches
  • While we cover code hosted under drupal.org, it's also only projects that are fully opted in with a fully/supported release. We could consider adding that into the scope somehow?

Proposed resolution

Once we agree on a new scope we can email it to mitre and they will update our listing.

A proposed version:

All projects hosted under drupal.org, including the Drupal 7 End Of Life EOL code.

Remaining tasks

Workshop and get agreement.
Submit to mitre.

๐Ÿ“Œ Task
Status

Needs review

Version

1.0

Component

Code

Created by

๐Ÿ‡บ๐Ÿ‡ธUnited States greggles Denver, Colorado, USA

Live updates comments and jobs are added and updated live.
Sign in to follow issues

Comments & Activities

  • Issue created by @greggles
  • ๐Ÿ‡บ๐Ÿ‡ธUnited States greggles Denver, Colorado, USA
  • ๐Ÿ‡บ๐Ÿ‡ธUnited States greggles Denver, Colorado, USA

    An example we can draw from is Amazon.

  • ๐Ÿ‡บ๐Ÿ‡ธUnited States greggles Denver, Colorado, USA

    Noting that this implies the ability to post some kind of page (i.e. advisory) for any vulnerabilities in EOL so we can make that page a reference in the CVE. There's a lot TBD about how that will work, but I guess that will shake out as we get closer to the EOL period and the vendors firm up their plans.

  • ๐Ÿ‡บ๐Ÿ‡ธUnited States cmlara

    https://www.cve.org/Resources/General/End-of-Life-EOL-Assignment-Process... was written for v3 of the CNA rules however it covers logic of why a CNA should consider publishing CVEโ€™s for EOL releases. It also discusses how if the Drupal CNA chooses to not include them in its scope that they can still be published through the CNA of Last Resort (MITRE) taking the ability to control the message out of the hands of the Drupal community.

    In short: The DST does not have to, however it may regret not publishing the CVE if it goes through alternative channels.

    Linking ๐Ÿ’ฌ Publication of CVE-2024-45440 by MITRE Active as an example of what happens in a worse scenario (not EOL software) when a vulnerability is published outside of DST control.

    Suggestion:

    - including the Drupal 7 End Of Life EOL code.
    + including End Of Life (EOL) code.

    There is really no reason to call out Drupal 7 explicitly and will just lead to a need to update the scope again.

    I have more opinions about the scope I will post latter.

  • ๐Ÿ‡บ๐Ÿ‡ธUnited States greggles Denver, Colorado, USA

    There is really no reason to call out Drupal 7 explicitly and will just lead to a need to update the scope again.

    I can be convinced of this point, but there's no intention to write CVEs for 6, 8, 9 so this sets the purpose of the change explicitly.

  • ๐Ÿ‡บ๐Ÿ‡ธUnited States greggles Denver, Colorado, USA

    I thought about it some more and am adjusting it to not specify Drupal 7. I think that gives more flexibility and there's not (much) harm in starting off broad. If we see harm we can address that.

  • ๐Ÿ‡ฌ๐Ÿ‡งUnited Kingdom mcdruid ๐Ÿ‡ฌ๐Ÿ‡ง๐Ÿ‡ช๐Ÿ‡บ

    +1 to make the scope broad so that there's an option to assign CVEs for EoL versions if that makes sense in particular cases.

    I think possibly we could make it clear somewhere that this is not an invitation to file security issues for ancient unmaintained branches, but that doesn't necessarily need to be included in docs on the CNA scope.

  • ๐Ÿ‡ธ๐Ÿ‡ฐSlovakia poker10

    As mentioned on the Slack, I am +1 to update the CNA scope as proposed. This can give us some flexibility in terms of potential security issues discovered after D7 EOL (still 300k+ sites out there) and hopefully also some possibility to have a bit control over the process of CVE publishing and coordination (together with D7ES vendors).

  • ๐Ÿ‡บ๐Ÿ‡ธUnited States cmlara

    I keep forgetting to come here and comment.

    At first I thought we were doing a full evaluation of the CNA scope, latter messaging made it more clear we are more just trying to make the scope match with what policy is with some small changes to scope.

    Anything thatโ€™s in our rules regarding exclusions should probaly be added to the scope if we are going to keep them. This includes the question above about projects must be opted in being included in scope wording.

    There is some discussion in ๐Ÿ“Œ Create CVEs for contributed projects in 2024 Active , if we are going to keep the 10,000 install limit, If we do it should likley be in the CNA scope too.

    Additionally our excluded vulnerability types would be good to add.

    All of the above allows the DST to ignore the issues and defer them to another CNA for issuance without having to go through the CVE Dispute procedure (and allows other CNAโ€™s to quickly take up the issues as the policy is formally published with the CNA secretary).

  • ๐Ÿ‡บ๐Ÿ‡ธUnited States greggles Denver, Colorado, USA

    Thanks for the thoughts in #10.

    I'm inclined to take small steps here and see how the process of updating it this time goes before we make a big change to the scope. Most of the other organization scopes I reviewed have rather brief and broad scope statements, so I'm hesitant to enshrine too much of the project's practices into the scope.

    I guess a good system would be to revisit this periodically (every year or so?) to ensure it matches the current practices.

  • ๐Ÿ‡บ๐Ÿ‡ธUnited States cmlara

    Most of the other organization scopes I reviewed have rather brief and broad scope statements

    We have a large number of Drupalisms, policies Iโ€™ve seen in no other CNA. Most tend to follow the CNA rules and be as open as possible, we have a number of policies that contradict the security industry norms.

    An example is the security opt-in, compare that to GitHub and GitLab CNA. Neither require a maintainer to pass a test and opt in.

    These policies likley always should have been in the scope and not the procedure document. It is confusing to reporters.

    This is especially true if the DST claims to be overworked and understaffed as the dispute process will pull effort away just to enforce the inevitable โ€œwe refuse to publish even if our parent CNA consider this a vulnerabilityโ€

    I'm hesitant to enshrine too much of the project's practices into the
    scope.

    These are not really practices, they are defined policies about what the DST wants/will consider issuing advisories for.

    I guess a good system would be to revisit this periodically

    Does not hurt to do, though any security policy change should be coupled with a scope review to avoid it ever getting out of sync.

Production build 0.71.5 2024