You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
SEC-281: Add awareness of HSTS to secutiry.adoc for strict transport security. (#3574)
* SEC-281: Add awareness of HSTS to secutiry.adoc for strict transport security.
* SEC-281: Add suggestions from code review
* SEC-281: Use {productname} attribute instead of "TinyMCE" and add "hsts, https" page keywords
---------
Co-authored-by: Karl Kemister-Sheppard <[email protected]>
Co-authored-by: Farzad Hayatbakhsh <[email protected]>
{companyname} values the work of security researchers in improving the security of technology products worldwide. We welcome researchers who wish to responsibly disclose vulnerabilities in our products or systems.
31
32
@@ -35,15 +36,16 @@ To report a potential security vulnerability, contact our Security team at mailt
35
36
36
37
In line with the United States National Infrastructure Advisory Council (NIAC) https://dhs.gov/xlibrary/assets/vdwgreport.pdf[Vulnerability Disclosure Framework] (PDF link), Tiny requests community members reporting potential security vulnerabilities maintain the confidentiality of their report and discovery until Tiny has investigated the issue and taken action to fix it.
37
38
38
-
Tiny will communicate with you regarding the status of your report and will, with your permission, publicly attribute the security issue’s discovery to you after the issue has been fixed and disclosed.
39
+
Tiny will communicate with you regarding the status of your report and will, with your permission, publicly attribute the security issue's discovery to you after the issue has been fixed and disclosed.
39
40
40
41
[[what-we-do-to-maintain-security-for-tinymce]]
41
-
== What we do to maintain security for TinyMCE
42
+
== What we do to maintain security for {productname}
* Keeps {productname} dependencies up to date, and
48
+
* Provides recommendations about enforcing HTTPS with HSTS, and
47
49
* Provides information about how to configure a Content Security Policy that works with {productname}.
48
50
49
51
[[scripts-and-xss-vulnerabilities]]
@@ -58,7 +60,22 @@ From the 1st of January 2020, Security Advisories for patched XSS vulnerabilitie
58
60
[[keeping-dependencies-up-to-date]]
59
61
=== Keeping dependencies up-to-date
60
62
61
-
To protect our users, {companyname} ensures that the TinyMCE dependencies are updated before the next version (major or minor) is released.
63
+
To protect our users, {companyname} ensures that the {productname} dependencies are updated before the next version (major or minor) is released.
64
+
65
+
[[enforcing-https-with-hsts]]
66
+
== Enforcing HTTPS with HSTS
67
+
68
+
The {companyname} security team strongly recommends that customers embedding {productname} configure their web servers to include the HTTP Strict Transport Security (HSTS) header for websites served over HTTPS. This can be achieved by updating the server configurations to enable HSTS.
69
+
70
+
HSTS ensures that encrypted communications are exclusively used, mitigates downgrade attacks, and enhances the protection of user data. While integrating HSTS is optional for {productname}, adopting this best practice significantly reduces the risk of vulnerabilities in projects utilizing {productname}.
71
+
72
+
[IMPORTANT]
73
+
Without HSTS, users accessing a website may be vulnerable to man-in-the-middle (MITM) attacks. Attackers can exploit this vulnerability by intercepting unencrypted HTTP traffic, redirecting users to malicious sites, or executing downgrade attacks to force connections over HTTP instead of HTTPS. This lack of encryption jeopardizes sensitive user data, including credentials, session cookies, and personal information. By enabling HSTS, these risks are effectively mitigated, as the browser enforces secure HTTPS connections for all future interactions with the site.
74
+
75
+
For comprehensive guidance on implementing HSTS, refer to the following resources:
0 commit comments