|
| 1 | +# Security Policy |
| 2 | + |
| 3 | +## Supported Versions |
| 4 | + |
| 5 | +OWASP CRS has two types of releases, Major releases (3.0.0, 3.1.0, 3.2.0 etc.) and point releases (3.0.1, 3.0.2 etc.). |
| 6 | +For more information see our [wiki](https://github.com/SpiderLabs/owasp-modsecurity-crs/wiki/Release-Policy). |
| 7 | +The OWASP CRS officially supports the two point releases with security patching preceding the current major release . |
| 8 | +We are happy to receive and merge PR's that address security issues in older versions of the project, but the team itself may choose not to fix these. |
| 9 | +Along those lines, OWASP CRS team may not issue security notifications for unsupported software. |
| 10 | + |
| 11 | +| Version | Supported | |
| 12 | +| --------- | ------------------ | |
| 13 | +| 3.3.x-dev | :white_check_mark: | |
| 14 | +| 3.2.x | :white_check_mark: | |
| 15 | +| 3.1.x | :white_check_mark: | |
| 16 | +| 3.0.x | :x: | |
| 17 | + |
| 18 | +## Reporting a Vulnerability |
| 19 | + |
| 20 | +We strive to make the OWASP ModSecurity CRS accessible to a wide audience of beginner and experienced users. |
| 21 | +We welcome bug reports, false positive alert reports, evasions, usability issues, and suggestions for new detections. |
| 22 | +Submit these types of non-vulnerability related issues via Github. |
| 23 | +Please include your installed version and the relevant portions of your audit log. |
| 24 | +False negative or common bypasses should [create an issue](https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/new) so they can be addressed. |
| 25 | + |
| 26 | +Do this before submitting a vulnerability using our email: |
| 27 | +1) Verify that you have the latest version of OWASP CRS. |
| 28 | +2) Validate which Paranoia Level this bypass applies to. If it works in PL4, please send us an email. |
| 29 | +3) If you detected anything that causes unexpected behavior of the engine via manipulation of existing CRS provided rules, please send it by email. |
| 30 | + |
| 31 | +Our email is [[email protected]](mailto:[email protected]). You can send us encrypted email using [this key ](https://coreruleset.org/security.asc), (fingerprint: `3600 6F0E 0BA1 6783 2158 8211 38EE ACA1 AB8A 6E72`). |
| 32 | + |
| 33 | +We are happy to work with the community to provide CVE identifiers for any discovered security issues if requested. |
| 34 | + |
| 35 | +If in doubt, feel free to reach out to us! |
0 commit comments