|
| 1 | +# Incident Response Plan |
| 2 | + |
| 3 | +## Reporting a Vulnerability |
| 4 | + |
| 5 | +Please see [the latest guidelines](https://github.com/ohmyzsh/ohmyzsh/blob/master/SECURITY.md) for instructions. |
| 6 | + |
| 7 | +## Phases |
| 8 | + |
| 9 | +### Triage |
| 10 | + |
| 11 | +1. Is this a valid security vulnerability? |
| 12 | + |
| 13 | + - [ ] It affects our CI/CD or any of our repositories. |
| 14 | + - [ ] For ohmyzsh/ohmyzsh, it affects the latest commit. |
| 15 | + - [ ] For others, it affects the latest commit on the default branch. |
| 16 | + - [ ] It affects a third-party dependency: |
| 17 | + - [ ] Zsh or git |
| 18 | + - [ ] For a plugin, the vulnerability is a result of our usage of the dependency. |
| 19 | + |
| 20 | +2. What's the scope of the vulnerability? |
| 21 | + |
| 22 | + - [ ] Our codebase. |
| 23 | + - [ ] A direct third-party dependency (Zsh, git, other plugins). |
| 24 | + - [ ] An indirect third-party dependency. |
| 25 | + - [ ] Out of scope, a third-party dependency that is the responsibility of the user. |
| 26 | + - [ ] Out of scope, any other case (edit this plan and add the details). |
| 27 | + |
| 28 | +3. Is the vulnerability actionable? |
| 29 | + |
| 30 | + - [ ] Yes, we can submit a fix. |
| 31 | + - [ ] Yes, we can disable a feature. |
| 32 | + - [ ] Yes, we can mitigate the risk. |
| 33 | + - [ ] Yes, we can remove a vulnerable dependency. |
| 34 | + - [ ] Yes, we can apply a workaround. |
| 35 | + - [ ] Yes, we can apply a patch to a vulnerable dependency ([example for CVE-2021-45444](https://github.com/ohmyzsh/ohmyzsh/blob/cb72d7dcbf08b435c7f8a6470802b207b2aa02c3/lib/vcs_info.zsh)). |
| 36 | + - [ ] No, the vulnerability is not actionable. |
| 37 | + |
| 38 | +4. What's the impact of the vulnerability? |
| 39 | + |
| 40 | + Assess using the *CIA* triad: |
| 41 | + |
| 42 | + - **Confidentiality**: example: report or sharing of secrets. |
| 43 | + - **Integrity**: affects the integrity of the system (deletion, corruption or encryption of data, OS file corruption, etc.). |
| 44 | + - **Availability**: denial of login, deletion of required files to boot / login, etc. |
| 45 | + |
| 46 | +5. What's the exploitability of the vulnerability? |
| 47 | + |
| 48 | + Consider how easy it is to exploit, and if it affects all users or requires specific configurations. |
| 49 | + |
| 50 | +6. What's the severity of the vulnerability? |
| 51 | + |
| 52 | + You can use the [CVSS v3.1](https://www.first.org/cvss/specification-document) to assess the severity of the vulnerability. |
| 53 | + |
| 54 | +7. When was the vulnerability introduced? |
| 55 | + |
| 56 | + - Find the responsible code path. |
| 57 | + - Find the commit or Pull Request that introduced the vulnerability. |
| 58 | + |
| 59 | +8. Who are our security contacts? |
| 60 | + |
| 61 | + Assess upstream or downstream contacts, and their desired channels of security. |
| 62 | + |
| 63 | + > TODO: add a list of contacts. |
| 64 | +
|
| 65 | +### Mitigation |
| 66 | + |
| 67 | +- **Primary focus:** removing possibility of exploitation fast. |
| 68 | +- **Secondary focus:** addressing the root cause. |
| 69 | + |
| 70 | +> [!IMPORTANT] |
| 71 | +> Make sure to test that the mitigation works as expected, and does not introduce new vulnerabilities. |
| 72 | +> When deploying a patch, make sure not to disclose the vulnerability in the commit message or PR description. |
| 73 | +
|
| 74 | +> TODO: introduce a fast-track update process for security patches. |
| 75 | +
|
| 76 | +### Disclosure |
| 77 | + |
| 78 | +Primary goal: inform our users about the vulnerability, and whether they are affected or not affected based on information they should be able to check themselves in a straightforward way. |
| 79 | + |
| 80 | +> TODO: add a vulnerability disclosure template. |
| 81 | +
|
| 82 | +### Learn |
| 83 | + |
| 84 | +- Document the vulnerability, steps performed, and lessons learned. |
| 85 | +- Document the timeline of events. |
| 86 | +- Document and address improvements on the Security Incident Response Plan. |
| 87 | +- Depending on the severity of the vulnerability, consider disclosing the root cause or not based on likely impact on users and estimated potential victims still affected. |
0 commit comments