This is an automated email from the ASF dual-hosted git repository.
zhangliang pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/shardingsphere.git
The following commit(s) were added to refs/heads/master by this push:
new 7a54e32510a Update documents about security (#20977)
7a54e32510a is described below
commit 7a54e32510a4a86f3f308f2db1396095f5c817a9
Author: 吴伟杰 <[email protected]>
AuthorDate: Wed Sep 14 18:39:25 2022 +0800
Update documents about security (#20977)
---
docs/community/content/security/_index.cn.md | 30 ++++++++++++++++++++++++++++
docs/community/content/security/_index.en.md | 30 ++++++++++++++++++++++++++++
2 files changed, 60 insertions(+)
diff --git a/docs/community/content/security/_index.cn.md
b/docs/community/content/security/_index.cn.md
index 4f3c3c987d2..04bfb374a52 100644
--- a/docs/community/content/security/_index.cn.md
+++ b/docs/community/content/security/_index.cn.md
@@ -11,3 +11,33 @@ Apache Software Foundation 在消除其软件项目中的安全问题方面采
在邮件中请指明项目名称为 ShardingSphere 和其旗下产品名称 ShardingSphere-JDBC 或
ShardingSphere-Proxy,并提供相关问题或潜在威胁的描述。同时推荐重现和复制安全问题的方法。在评估和分析调查结果后,Apache 安全团队和
ShardingSphere 社区将直接与您回复。
**请注意** 在提交安全邮件之前,请勿在公共领域披露安全电子邮件报告的安全问题。
+
+ShardingSphere-JDBC 并不直接对外提供服务,需要用户编写代码才能够使用。由于用户场景复杂多样,ShardingSphere
无法控制用户如何编写使用 ShardingSphere-JDBC 的代码。因此,ShardingSphere 社区**不接受任何因使用不当导致
ShardingSphere-JDBC 被利用的安全问题报告**。
+例如,用户在项目中引入了存在安全漏洞的 MySQL Connector/J,并信任了外部输入的 JDBC URL 作为
ShardingSphere-JDBC 的数据源配置。
+
+ShardingSphere-Proxy
以数据库协议对外提供服务,并提供了基于用户密码的认证方式。用户需要自行保证用户密码安全。因此,ShardingSphere 社区**不接受任何以攻击者已知
ShardingSphere-Proxy 用户密码为前提的安全问题报告**。
+
+ShardingSphere 集群模式依赖 ZooKeeper 等中间件,且信任用户提供的中间件。对于 ZooKeeper
等中间件的安全防护,用户需要自行保障。因此,ShardingSphere 社区**不接受 ZooKeeper 等中间件被攻击导致 ShardingSphere
被利用的安全问题报告**。
+
+第三方依赖安全建议:
+对于 ShardingSphere 发布版本默认不包含的依赖,需要用户自行保证依赖的安全性。
+例如:ShardingSphere 发布版本默认不包含 MySQL Connector/J,因此 ShardingSphere 不接受任何由于 MySQL
Connector/J 本身漏洞导致 ShardingSphere 被利用的安全问题报告。
+对于其他 ShardingSphere 发布版本默认不包含的依赖同理。
+
+对于 ShardingSphere 子项目的安全建议:
+由于 ShardingSphere-UI 已不再维护,ShardingSphere 社区将**不再接受任何与 ShardingSphere-UI
相关的安全问题报告**。
+
+ElasticJob 依赖 ZooKeeper,且信任用户提供的 ZooKeeper。对于 ZooKeeper
等中间件的安全防护,用户需要自行保障。因此,ShardingSphere 社区**不接受 ZooKeeper 被攻击导致 ElasticJob
被利用的安全问题报告**。
+
+ElasticJob-UI
旨在为用户提供一个便捷的作业管控平台。该平台向开发、运维人员提供服务,并非直接为互联网用户提供服务,建议用户仅在内网部署,并避免用户密码泄漏。ShardingSphere
社区**不接受任何以攻击者已知用户密码为前提的安全问题报告**。
+
+在提交安全问题报告之前,请参考 ShardingSphere 及子项目过去已发布的 CVE,避免重复提交。
+
+ShardingSphere:
+[CVE-2020-1947](https://www.cve.org/CVERecord?id=CVE-2020-1947)
+
+ShardingSphere-UI:
+[CVE-2021-26558](https://www.cve.org/CVERecord?id=CVE-2021-26558)
+
+ElasticJob-UI
+[CVE-2022-22733](https://www.cve.org/CVERecord?id=CVE-2022-22733)
diff --git a/docs/community/content/security/_index.en.md
b/docs/community/content/security/_index.en.md
index 7d824be18e8..bd6abd13b4e 100644
--- a/docs/community/content/security/_index.en.md
+++ b/docs/community/content/security/_index.en.md
@@ -16,3 +16,33 @@ You are also urged to recommend how to reproduce and
replicate the issue.
The Apache Security Team and the ShardingSphere community will get back to you
after assessing and analyzing the findings.
**Please note** that the security issue should be reported on the security
email first, before disclosing it on any public domain.
+
+ShardingSphere-JDBC does not directly provide external services, and users
need to write code to use it. Due to the complexity and variety of user
scenarios, ShardingSphere cannot control how users write code that uses
ShardingSphere-JDBC. Therefore, the ShardingSphere community **does not accept
any security issue reports that ShardingSphere-JDBC is exploited due to
improper use**.
+For example, the user introduced MySQL Connector/J with security
vulnerabilities in the project, and trusted the externally input JDBC URL as
the data source configuration of ShardingSphere-JDBC.
+
+ShardingSphere-Proxy provides external services through database protocol and
provides authentication method based on user password. Users need to ensure the
security of user passwords by themselves. Therefore, the ShardingSphere
community **does not accept any security issue report that presupposes that the
attacker knows the ShardingSphere-Proxy user password**.
+
+ShardingSphere cluster mode relies on middleware such as ZooKeeper, and trusts
the middleware provided by users. For the security protection of middleware
such as ZooKeeper, users need to protect themselves. Therefore, the
ShardingSphere community **does not accept security issue reports that
ShardingSphere is exploited due to middleware such as ZooKeeper being
attacked**.
+
+Third-party dependency security advice:
+For dependencies that are not included by default in the ShardingSphere
release version, users are required to ensure the security of dependencies.
+For example, the release version of ShardingSphere does not include MySQL
Connector/J by default, so ShardingSphere does not accept any security issue
report that ShardingSphere is exploited due to the vulnerability of MySQL
Connector/J itself.
+The same is true for dependencies that are not included by default in other
ShardingSphere releases.
+
+Security recommendations for the ShardingSphere subproject:
+Since ShardingSphere-UI is no longer maintained, the ShardingSphere community
**will no longer accept any security issue reports related to
ShardingSphere-UI**.
+
+ElasticJob relies on ZooKeeper and trusts the ZooKeeper provided by the user.
For the security protection of middleware such as ZooKeeper, users need to
protect themselves. Therefore, the ShardingSphere community **does not accept
the security issue report of ElasticJob being exploited due to ZooKeeper
attack**.
+
+ElasticJob-UI aims to provide users with a convenient job management and
control platform. The platform provides services to developers and operation
and maintenance personnel, not directly to Internet users. It is recommended
that users deploy only on the intranet and avoid leakage of user passwords. The
ShardingSphere community **does not accept any security issue reports that
presuppose that the attacker knows the user's password**.
+
+Before submitting a security issue report, please refer to the CVEs released
by ShardingSphere and its sub-projects in the past to avoid repeated
submissions.
+
+ShardingSphere:
+[CVE-2020-1947](https://www.cve.org/CVERecord?id=CVE-2020-1947)
+
+ShardingSphere-UI:
+[CVE-2021-26558](https://www.cve.org/CVERecord?id=CVE-2021-26558)
+
+ElasticJob-UI
+[CVE-2022-22733](https://www.cve.org/CVERecord?id=CVE-2022-22733)