-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Multiple Vulnerability Reports and security email address issue #3215
Comments
I've also contacted benoitc on Twitter/X a few months ago about the security@ email address issue but it still isn't fixed. |
Thank you for your efforts in securing Gunicorn. I understand your comment as the unilateral announcement of a preliminary disclosure date (at an unspecified time of the UTC day) 2024-05-24. As a non-maintainer I look forward to your report.
References:
|
email have been fixed. There was a dns misconfiguration. Reports should be done there , please send those who have been created on your service using the security features that have bene opened in github. This ease the support and ensure all the info is collected on the project and would trigger some review. @pajod would you be interrested to join the project to help me on this? |
@benoitc I will be glad to assist. I suspect it is about fixing / continuing what Ben started (#3059/#3113) earlier anyway, I spent some time getting familiar with that code. Or if there are any other PRs you would like to see rebased, tested and/or reviewed - ping me. I have recently tried the "private fork" feature myself recently, it is reasonably functional: you'll find buttons beneath submitted reports to add or revoke access. That way you can grant access to editing specific advisory drafts and private forks without granting project-level permissions or risking ambiguous/overlapping CVE assignment. |
I appears that these "vulnerabilities" requires me to open an account to the huntr website. I don't find this approach very useful. Reports should be made there or by mail and not force the authors to open an account. Can you forward me properly this report to my mail or open a private disclosure there? Otherwise I will just wait for the public release of these reports to read it myself. @sirkonst has opened an account tthough can you help him to figure how to use it? |
@pajod that is an interresting approach. Let me figure by the end of the day. Some vulnerabilities are indeed related to HTTP parsing. i will review the tickets above. |
hey @benoitc , you don't need to open an account on Huntr to view the reports. We usually send automated magic links to maintainers to view reports without having to create an account. You didn't receive because of the email issues. I just resent the magic link to the security@ address. Thanks |
@byt3bl33d3r thanks. Looking at them now. |
Heya,
I work for ProtectAI and we run a bug bounty platform Huntr. We received multiple reports for Gunicorn (the oldest one dating back to December 2023). W'eve been trying to contact the security@ email address since last year but it seems to be misconfigured and the email bounces with an error. I also sent an email to all of the core maintainers listed in the MAINTAINERS file with no response.
Just FYI that we'll be validating and making these reports public by the end of this week unless someone gets back to us as we've more than exceeded the timeline for responsible disclosure. You can either login to Huntr or check your email(s) (sender is [email protected]) to get access to the reports.
Thanks
The text was updated successfully, but these errors were encountered: