Video highlights of the ASF Security Report: 2020 now available at https://youtu.be/Z7yudar_da0
Do enjoy, Sally - - - Vice President Marketing & Publicity Vice President Sponsor Relations The Apache Software Foundation On Mon, Jan 25, 2021, at 08:59, Sally Khudairi wrote: > [this report is available online at https://s.apache.org/SecurityReport2020 ] > > Synopsis: This report explores the state of security across all Apache > Software Foundation projects for the calendar year 2020. We review key > metrics, specific vulnerabilities, and the most common ways users of > ASF projects were affected by security issues. > > Released: January 2021 > > Author: Mark Cox, Vice President Security, Apache Software Foundation > > Background > The security committee of the Apache Software Foundation (ASF) oversees > and coordinates the handling of vulnerabilities across all of the 340+ > Apache projects. Established in 2002 and composed of all volunteers, > we have a consistent process https://s.apache.org/cveprocess for how > issues are handled, and this process includes how our projects must > disclose security issues. > > Anyone finding security issues in any Apache project can report them to > secur...@apache.org where they are recorded and passed on to the > relevant dedicated security teams > https://apache.org/security/projects.html or private project management > committees (PMC) to handle. The security committee monitors all the > issues reported across all the addresses and keeps track of the issues > throughout the vulnerability lifecycle. > > The security committee is responsible for ensuring that issues are > dealt with properly and will actively remind projects of their > outstanding issues and responsibilities. As a board committee, we have > the ability to take action including blocking their future releases or, > worst case, archiving a project if such projects are unresponsive to > handling their security issues. This, along with the Apache Software > License, are key parts of the ASF’s general oversight function around > official releases, allowing the ASF to protect individual developers > and giving users confidence to deploy and rely on ASF software. > > The oversight into all security reports, along with tools we have > developed, gives us the ability to easily create metrics on the issues. > Our last report covered the metrics for 2019 > https://s.apache.org/security2019 . > > Statistics for 2020 > In 2020 our security email addresses received in total 18,000 emails. > After spam filtering and thread grouping this was 946 (2019: 620) > non-spam threads. Unfortunately many security reports do look like > spam and so the security team are careful to review all messages to > ensure real reports are not missed for too long. > > [see image online at https://s.apache.org/SecurityReport2020 ] > > Diagram 1: Breakdown of ASF security email threads for calendar year 2020 > > Diagram 1 gives the breakdown of those 946 threads. 257 threads (27%) > were people confused by the Apache License. As many projects use the > Apache License, not just those under the ASF umbrella, people can get > confused when they see the Apache License and they don't understand > what it is. This is most common for example on mobile phones where the > licenses are displayed in the settings menu, usually due to the > inclusion of software by Google released under the Apache License. We > no longer reply to these emails. This is nearly double the number we > saw in 2019. > > The next 220 of the 946 (23%) are email threads with people asking > non-security (usually support-type) questions. > > The next 93 of those reports were researchers reporting issues in an > Apache web site. These are almost always false negatives; where a > researcher reports us having directory listings enabled, source code > visible, or the lack of various domain headers. These reports are > generally the unfiltered output of some publicly available scanning > tool, and often where the reporter asks us for some sort of monetary > reward (bounty) for their report. > > That left 376 (2019: 320) reports of new vulnerabilities in 2020, which > spanned across 101 of the top level projects. These 376 reports are a > mix of both external reporters and internal; for example where a > project has found an issue themselves and followed the ASF process to > assign it a CVE name and address it we’d still count it here. We don’t > keep metrics that would give the breakdown of internal vs external > reports. > > The next step is that the appropriate project triages the report to see > if it's really an issue or not. Invalid reports and reports of things > that are not actually vulnerabilities get rejected back to the > reporter. Of the remaining issues that are accepted they are assigned > appropriate CVE names and eventually fixes are released. > > As of January 1st 2021, 35 of those 376 reports were still under triage > (i.e. the project had not yet determined if the report is accepted or > rejected). > > The remaining closed 341 (2019: 301) reports led to us assigning 151 > (2019: 122) CVE names. Some vulnerability reports may include multiple > issues, some reports are across multiple projects, and some reports are > duplicates where the same issue is found by different reporters, so > there isn't an exact one-to-one mapping of accepted reports to CVE > names. The Apache Security committee handles CVE name allocation and > is a Mitre Candidate Naming Authority (CNA), so all requests for CVE > names in any ASF project are routed through us, even if the reporter is > unaware and contacts Mitre directly or goes public with an issue before > contacting us. > > Noteworthy events > During 2020 there were a few events worth discussion; either because > they were severe and high risk, they had readily available exploits, or > otherwise due to media attention. These included: > > - February: An issue in Tomcat CVE-2020-1938 > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1938 gained > press interest when it was given branding and a name (“Ghostcat”) and > was disclosed by a third-party coordination centre before Tomcat > released an advisory (although after the issue was fixed in new > releases of Tomcat). Although serious if exploited, it only affected > Tomcat installations which exposed an unprotected AJP Connector to > untrusted networks (which is already not a good thing to do even > without this issue). That limits the number of affected installations. > Various proof-of-concept exploits are public for this issue, including > a Metasploit exploit. > > - May: The Cybersecurity and Infrastructure Security Agency (CISA) > released a list of Top 10 Routinely Exploited Vulnerabilities > https://us-cert.cisa.gov/ncas/alerts/aa20-133a including CVE-2017-5638 > https://nvd.nist.gov/vuln/detail/CVE-2017-5638 , the remote command > execution (RCE) vulnerability in Apache Struts 2 disclosed and fixed in > 2017. This issue is known to be exploited in the wild > https://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html > , however the first exploitation was discovered after the advisory and > fix was published. > > - July: Versions of Apache Guacamole 1.1.0 and earlier were vulnerable > to issues in RDP, CVE-2020-9497 > https://lists.apache.org/thread.html/r3f071de70ea1facd3601e0fa894e6cadc960627ee7199437b5a56f7f@%3Cannounce.apache.org%3E > and CVE-2020-9498 > https://lists.apache.org/thread.html/r26fb170edebff842c74aacdb1333c1338f0e19e5ec7854d72e4680fc@%3Cannounce.apache.org%3E > . If a user connects to a malicious or compromised RDP server it could lead > to memory disclosure and possible remote code execution. > > - August: A vulnerability in Apache Struts (CVE-2019-0230 > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0230 ) could > lead to arbitrary code execution. In order to exploit the > vulnerability, an attacker would need to inject malicious Object-Graph > Navigation Language (OGNL) expressions into an attribute that is used > within an OGNL expression. Although Struts has mitigations to address > potential injected expressions, versions before 2.5.22 left an attack > vector open which was fixed in updates for this issue > https://cwiki.apache.org/confluence/display/WW/S2-059 . A metasploit > exploit exists for this issue. > > - November: Previously each ASF project was responsible for writing up > their own CVE entries and submitting them to Mitre. This leads to many > delays in the CVE database being updated with Apache issues as entries > are often rejected as the legacy format causes issues. We released an > internal tool providing projects dealing with security issues a way to > edit, validate, and submit their entries to Mitre. We aim to have the > CVE database updated within a day of an issue being published. > > - December: The CVE project released a new automation API and the ASF > became the first organisation to get a live CVE name using it. Instead > of the security team holding a pool of names requested in advance we > now allocate them on demand, with the service taking care of emails to > the PMC and other previously manual parts of the process. We expect > more automation available during 2021 allowing us to streamline the CVE > process for projects even further. > > Proof of Concepts or Metasploit exploits were also released for 2020 > issues in Apache OFBiz (CSRF, CVE-2019-0235 > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0235 ), Apache > OpenMeetings (DoS, CVE-2020-13951 > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13951 ), Apache > Flink (arbitrary read/write RCE CVE-2020-17518 > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17518 , > CVE-2020-17519 > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17519 ) > > Timescales > Our security teams and project management teams are all volunteers and > so we do not give any formal SLA on handling of issues. However we can > break down our aims and goals for each part of the process: > > Triage: Our aim is to handle incoming mails to the secur...@apache.org > alias within three working days. We do not measure or report on this > because we assess the severity of each incoming issue and apply the > limited resources we have appropriately. The alias is staffed by a > very small number of volunteers taken from the different project PMCs. > After the security team forward a report to a PMC they will reply to > the reporter. Therefore if you have reported an issue to us and not > received any response after a week please send us a followup email. > Sometimes reporters send reports attaching large PDF files or even > movies of exploitation that don’t make it to us, so please ensure any > follow ups are a simple plain text email. > > Investigation: Once a report is sent to the private list of the > projects management committee, the process of triage and investigation > varies in time depending on the project, availability of resources, and > number of issues to be assessed. As we send reports to this private > list it does not reach every project committer, so there is a much > smaller limited set of people in each project able to investigate and > respond. As a general guideline we try to ensure projects have triaged > issues within 90 days of the report. The ASF security team chase any > untriaged issues over 90 days old. > > Fix: Once a security issue is triaged and accepted, the timeline for > the fixing of issues depends on the schedules of the projects > themselves. Issues of lower severity are most often held to future > pre-planned releases. > > Announcement: Our process allows projects up to a few days between a > fix release being pushed and the announcement of the vulnerability, to > let mirrors catch up. All vulnerabilities are announced via the > announce@apache.org list. We now aim to have them appear in the public > Mitre list within a day of the announcement. > > Conclusion > Apache Software Foundation projects are highly diverse and independent. > They have different languages, communities, management, and security > models. However one of the things every project has in common is a > consistent process for how reported security issues are handled. The > ASF Security Committee works closely with the project teams, > communities, and reporters to ensure that issues get handled quickly > and correctly. This responsible oversight is a principle of The Apache > Way and helps ensure Apache software is stable and can be trusted. > > This report gave metrics for calendar year 2020 showing from the 18,000 > emails received we triaged over 370 vulnerability reports relating to > ASF projects, leading to fixing 151 (CVE) issues. The number of > non-spam threads dealt with was up 53% from 2019 with the number of > actual vulnerability reports up 13% and assigned CVE up 24%. > > If you have vulnerability information you would like to share with or > comments on this report please contact us > http://apache.org/security/#reporting-a-vulnerability . > > # # # > > NOTE: you are receiving this message because you are subscribed to the > announce@apache.org distribution list. To unsubscribe, send email from > the recipient account to announce-unsubscr...@apache.org with the word > "Unsubscribe" in the subject line.