Skip to content

Commit db652b6

Browse files
kemister85Karl Kemister-SheppardFarzad Hayatbakhsh
authored
SEC-281: Add awareness of HSTS to secutiry.adoc for strict transport security. (#3574)
* SEC-281: Add awareness of HSTS to secutiry.adoc for strict transport security. * SEC-281: Add suggestions from code review * SEC-281: Use {productname} attribute instead of "TinyMCE" and add "hsts, https" page keywords --------- Co-authored-by: Karl Kemister-Sheppard <[email protected]> Co-authored-by: Farzad Hayatbakhsh <[email protected]>
1 parent de0dd33 commit db652b6

File tree

1 file changed

+27
-10
lines changed

1 file changed

+27
-10
lines changed

modules/ROOT/pages/security.adoc

Lines changed: 27 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,19 @@
11
= Security guide
22
:navtitle: Security guide
3-
:description_short: Security information for TinyMCE.
4-
:description: Information on reporting security issues, what TinyMCE does to protect users, and what you can do to protect your users.
5-
:keywords: security, xss, scripting, vulnerability, hack, hacker, csp, mitigation, protection, protect
3+
:description_short: Security information for {productname}.
4+
:description: Information on reporting security issues, what {productname} does to protect users, and what you can do to protect your users.
5+
:keywords: security, xss, scripting, vulnerability, hack, hacker, csp, mitigation, protection, protect, hsts, https
66

77
NOTE: The following is _general_ security advice that may be relevant to a website or application using {productname}.
88

99
== Overview
1010

11-
* xref:reporting-tinymce-security-issues[Reporting TinyMCE security issues]
12-
* xref:what-we-do-to-maintain-security-for-tinymce[What we do to maintain security for TinyMCE]
11+
* xref:reporting-tinymce-security-issues[Reporting {productname} security issues]
12+
* xref:what-we-do-to-maintain-security-for-tinymce[What we do to maintain security for {productname}]
1313
** xref:scripts-and-xss-vulnerabilities[Scripts and XSS vulnerabilities]
1414
** xref:keeping-dependencies-up-to-date[Keeping dependencies up-to-date]
15-
* xref:configuring-content-security-policy-csp-for-tinymce[Configuring Content Security Policy (CSP) for TinyMCE]
15+
* xref:enforcing-https-with-hsts[Enforcing HTTPS with HSTS]
16+
* xref:configuring-content-security-policy-csp-for-tinymce[Configuring Content Security Policy (CSP) for {productname}]
1617
* xref:general-security-risks-for-user-input-elements[General security risks for user input elements]
1718
** xref:cross-site-scripting-xss[Cross-Site Scripting (XSS)]
1819
** xref:injection[Injection]
@@ -25,7 +26,7 @@ NOTE: The following is _general_ security advice that may be relevant to a websi
2526

2627
// Note: The reportingtinymcesecurityissues anchor is needed for older external links
2728
[[reporting-tinymce-security-issues]]
28-
== [[reportingtinymcesecurityissues]] Reporting TinyMCE security issues
29+
== [[reportingtinymcesecurityissues]] Reporting {productname} security issues
2930

3031
{companyname} values the work of security researchers in improving the security of technology products worldwide. We welcome researchers who wish to responsibly disclose vulnerabilities in our products or systems.
3132

@@ -35,15 +36,16 @@ To report a potential security vulnerability, contact our Security team at mailt
3536

3637
In line with the United States National Infrastructure Advisory Council (NIAC) https://dhs.gov/xlibrary/assets/vdwgreport.pdf[Vulnerability Disclosure Framework] (PDF link), Tiny requests community members reporting potential security vulnerabilities maintain the confidentiality of their report and discovery until Tiny has investigated the issue and taken action to fix it.
3738

38-
Tiny will communicate with you regarding the status of your report and will, with your permission, publicly attribute the security issues discovery to you after the issue has been fixed and disclosed.
39+
Tiny will communicate with you regarding the status of your report and will, with your permission, publicly attribute the security issue's discovery to you after the issue has been fixed and disclosed.
3940

4041
[[what-we-do-to-maintain-security-for-tinymce]]
41-
== What we do to maintain security for TinyMCE
42+
== What we do to maintain security for {productname}
4243

4344
To protect {productname} users, {companyname}:
4445

4546
* Patches Cross-Site Scripting (XSS) vulnerabilities,
4647
* Keeps {productname} dependencies up to date, and
48+
* Provides recommendations about enforcing HTTPS with HSTS, and
4749
* Provides information about how to configure a Content Security Policy that works with {productname}.
4850

4951
[[scripts-and-xss-vulnerabilities]]
@@ -58,7 +60,22 @@ From the 1st of January 2020, Security Advisories for patched XSS vulnerabilitie
5860
[[keeping-dependencies-up-to-date]]
5961
=== Keeping dependencies up-to-date
6062

61-
To protect our users, {companyname} ensures that the TinyMCE dependencies are updated before the next version (major or minor) is released.
63+
To protect our users, {companyname} ensures that the {productname} dependencies are updated before the next version (major or minor) is released.
64+
65+
[[enforcing-https-with-hsts]]
66+
== Enforcing HTTPS with HSTS
67+
68+
The {companyname} security team strongly recommends that customers embedding {productname} configure their web servers to include the HTTP Strict Transport Security (HSTS) header for websites served over HTTPS. This can be achieved by updating the server configurations to enable HSTS.
69+
70+
HSTS ensures that encrypted communications are exclusively used, mitigates downgrade attacks, and enhances the protection of user data. While integrating HSTS is optional for {productname}, adopting this best practice significantly reduces the risk of vulnerabilities in projects utilizing {productname}.
71+
72+
[IMPORTANT]
73+
Without HSTS, users accessing a website may be vulnerable to man-in-the-middle (MITM) attacks. Attackers can exploit this vulnerability by intercepting unencrypted HTTP traffic, redirecting users to malicious sites, or executing downgrade attacks to force connections over HTTP instead of HTTPS. This lack of encryption jeopardizes sensitive user data, including credentials, session cookies, and personal information. By enabling HSTS, these risks are effectively mitigated, as the browser enforces secure HTTPS connections for all future interactions with the site.
74+
75+
For comprehensive guidance on implementing HSTS, refer to the following resources:
76+
77+
* link:https://cheatsheetseries.owasp.org/cheatsheets/HTTP_Strict_Transport_Security_Cheat_Sheet.html[OWASP HSTS Cheat Sheet]
78+
* link:https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security[MDN Documentation on HSTS]
6279

6380
include::partial$misc/general-csp.adoc[]
6481

0 commit comments

Comments
 (0)