Product Vulnerability Process

Overview

This document aims to provide guidance on the handling of product vulnerabilities. It describes the process and provides background information and definitions for the daily usage of all relevant stakeholders.

Goals

Establish and document a way of working that ensures:

  • Vulnerabilities are triaged efficiently and quickly

  • All parties are aligned around ownership and expectations

  • Patch releases are available within the agreed SLAs

  • Minimize the risk for Mattermost Cloud, on-premises customers, and Mattermost, Inc.

Scope

This process covers any vulnerabilities found in officially published Mattermost products or services that were either found internally, reported to us by a customer, or come in through the bug bounty program or via another third party.

Infrastructure vulnerabilities are explicitly out of scope for this process. Vulnerability management, as it relates to infrastructure, is owned by the Security Operations Team.

Process Definitions

Responsible Parties

  • Product Security Team: Process Ownership; Vulnerability Owner

  • Development Team: Vulnerability Remediation

  • Release Manager: Release Planning

  • Release Team: Build Process

  • Marketing Team: Security Updates Email Newsletter Distribution

  • Security Operations: Vulnerability mitigation for Mattermost Cloud, verification whether it’s been exploited in Mattermost Cloud.

Vulnerability Sources

Vulnerabilities are reported from a variety of sources that are explained below.

Internal Finding

The vulnerability has been discovered by the internal security, development, or QA team.

Security Automation

The vulnerability has been discovered by internal security automation tools such as Dependency Track or CodeQL

Responsible Disclosure

The vulnerability has been reported through our responsible disclosure program.

Bug Bounty Program

The vulnerability has been reported through our Bug Bounty program running on HackerOne.

Customer Report

The vulnerability has been reported from customers as part of an internal audit or on-going operations.

Public Leak

The vulnerability has not been officially reported, but released to the public without any notice. It is possible that it can contain reproduction steps or not.

Vulnerability Severity

Vulnerabilities must be scored according to the Common Vulnerability Scoring System Version 3.1 (CVSS 3.1). The CVSS is an industry-wide accepted standard to determine the impact of vulnerabilities in software products and takes impacts such as attack vector, complexity, user interaction, scope, and various other components into consideration. The Product Security Engineer may overwrite the CVSS severity if we think the risk to our customers is lower or higher than the calculated score. A justification must be provided in the vulnerability ticket.

FIRST provides a CVSS calculator at the following URL: https://www.first.org/cvss/calculator/3.1

The CVSS 3.1 provides a textural representation of the severity score in Section 5 of the Specification Document. The mapping is included below:

RatingCVSS Score

None

0.0

Low

0.1 - 3.9

Medium

4.0 - 6.9

High

7.0 - 8.9

Critical

9.0 - 10.0

Remediation SLAs

Refer to this internal matrix.

Issue Types

Vulnerabilities must be assigned one of the following vulnerability types:

Backport Policy

For Mattermost server, the following backport policy applies:

Vulnerabilities with Low Score:

  • Upcoming Release

  • Extended Support Release

Vulnerabilities with Medium to Critical Score:

  • Upcoming Release

  • Extended Support Release

  • Last 3 Releases

Notes:

  • The Mattermost server policy also applies to vulnerabilities in bundled plugins within the respective version

  • There is no backport policy for Desktop, Mobile and standalone plugins.

  • Bundled plugins are the plugins that are pre-installed in the Mattermost server. The list of bundled plugins can be found in Mattermost server's Makefile. Any other plugin is considered standalone.

Process Steps

Report

Vulnerability reports are received from internal or external parties via one of the methods outlined above. The Product Security Team must acknowledge to the reporter that it received the report within 48 hours on business days and will investigate whether it’s a valid issue.

After the report was received, a “Security Vulnerability” ticket must be created in the Jira ticket that contains the following information:

  • Title

  • Description

  • Category [If possible]

  • Reporter

  • Source

  • Component

The security engineer that acknowledges the initial report must create a Mattermost Playbook Run using the "Security Vulnerability Playbook" and follow the process steps documented to continue with the Triage step. The playbook links to the Jira ticket created above, ensures the right process steps are completed, and informs relevant parties.

If the vulnerability was published on a news site/blog/etc. and is considered a public leak the Head of Marketing and VP Legal should be notified and invited to the playbook run.

Triage

After a vulnerability report was acknowledged it must be confirmed whether it is a valid finding within 96 hours of receiving it on business days. The security engineer should determine:

  • Is the report a duplicate of a previous or current report from another reporter?

  • Does the report have a security impact?

  • Can the report be reproduced?

  • If neither of the above hold true, does the report have an impact on any production infrastructure or systems and thus should be reviewed nevertheless?

After confirming that the report is valid the Product Security Team member must move the report to the next stage, called “Remediation” and must fill in the following information in the ticket:

  • Vulnerability Category

  • Steps to Reproduce

  • Recommended Mitigation

  • Security Update Text

  • CVSS Score

  • CVSS Severity

  • Final Severity

  • Mattermost Team

  • Development Team

  • Playbook Run link

  • HackerOne Link

  • Affected On-Premises Versions [Text]

  • Affects Cloud [Yes/No]

Additional auto-populated fields

  • A Mattermost-specific vulnerability ID is automatically assigned when a report is moved from “Triage” to “Fix Development”.

  • A Due Date field is automatically populated when when a report is moved from “Triage” to “Fix Development” based on the Final Severity and the SLAs.

If the vulnerability is not confirmed valid or considered a duplicate, the security engineer must notify the reporter about the decision. If we don’t consider it a vulnerability, the justification for our decision should be included both in the response to the reporter and as a comment in the Product Vulnerability ticket. The ticket should afterwards be closed either as duplicate or as invalid.

If the report is deemed a security improvement (but not vulnerability), a development ticket should be created and the security vulnerability ticket closed with the development ticket added as a reference. A report is considered a security improvement when it is not exploitable without the presence of any additional vulnerabilities or only increases the general security posture.

Remediation

The Product Security Engineer must create a development ticket and link it to the vulnerability ticket. The Lead Engineer and the Product Manager of the feature team responsible for the vulnerability fix and the Release Manager should be invited in the vulnerability’s playbook run channel and be informed about the vulnerability and its severity. The Lead Engineer must acknowledge the report and assign the development ticket to an engineer. The Lead Engineer should work together with the Product Manager on the prioritization of the reported security vulnerability.

The development team is responsible for the development of the fix. The assigned Product Security Engineer is responsible to notify the developer teams if an agreed SLAs is at risk for the fix development and document once the SLA is broken. Developers should work together with the assigned Product Security Engineer during the vulnerability remediation to clarify questions and mitigation approaches. Once the development team finishes the development of the fix for the current version, the assigned Product Security Engineer should review that the fix properly mitigates the vulnerability. The fix must then be backported to previous releases. This is not the case if:

  • The affected feature did not exist in the version in question

  • The vulnerability has a low severity

If in doubt, refer to the Backport Policy section above. After the fix development has finished and has been reviewed by peers, security and QA, a new dot release must be prepared.

In parallel with the development of the fix by the Engineering team, the Product Security Engineer must invite in the playbook run channel the Security Operations team, if the vulnerability is of “High” or “Critical” severity or if cloud installations are at risk of exploitation. If cloud installations are at risk of exploitation, the Security Operations team must look at possible no-code mitigation steps to prevent the vulnerability from being exploited in the cloud until a fix is deployed. If the vulnerability is of “High” or “Critical” severity, the Security Operations team must investigate for any exploitation attempts with the guidance of Product Security. If exploitation is confirmed, a separate process will be triggered which is outside of the scope of this document. The Product Security Engineer may invite the Security Operations team to look for exploitation attempts for “Medium” severity vulnerabilities on a case by case manner.

Release Preparation

After reviews have been completed, the developer must notify the Cloud SRE team and the Release Manager that a new cloud release version can be cut. Cloud rings soak times for patches with vulnerability fixes can be found in this internal matrix. Once the cloud release patch with the fix has been rolled out in the cloud, the Release Manager must cut a new dot release for all versions that received the security fix and release it. In case there are any problems during the release, the Delivery team should be notified to fix potential issues.

After the new versions are released, the Release Manager must update the hall of fame list based on the Reporter field from the Jira ticket.

Post Mortem

The Product Security Engineer must conduct a post mortem using the provided template for any vulnerabilities with “High” or “Critical” severity. The Product Security Engineer and the Lead Engineer of the feature team responsible for the vulnerability fix should meet and discuss:

  • Why did this vulnerability occur?

  • How can we verify that the vulnerability doesn’t exist in other parts of the product?

  • What actions do we need to take to prevent it from happening again?

The outcome of the post mortem must be action items based on the answers to the questions above. The Product Security Engineer must then fill the retrospective of the playbook run based on the answers in the above questions and create backlog tickets with the agreed action items.

The Release Manager must create a draft for the email newsletter. The Marketing team and Product Security Engineering Lead must review the draft and send it out to all subscribers of the Security Updates mailing list.

Responsible Disclosure

This section is applicable if the vulnerability affects publicly released software artifacts.

Once the versions with the vulnerability fix are released, the Product Security Engineer must verify that all required information is included in the initial vulnerability ticket. The Release Manager must publish the security update notes for the vulnerabilities that have been fixed and released in the Mattermost Security Updates page. No details must be added in the “Issue Details”. Instead the following message must be posted: “Details on the security update will be posted here on DATE, as per our Responsible Disclosure Policy.” The DATE refers to 30 days after the release day.

The Product Security Engineer must prepare for a CVE disclosure. Specifically the Product Security Engineer must create a JSON file with all the needed CVE information. A tool like vulnogram can be used for this purpose. A CVE ID can be reserved using the cvelib library.

30 days after the release with the vulnerability fix, the Product Security Engineer must publish the CVE details using the cvelib library. At the same time, the release manager must update the security update notes for vulnerabilities released in the Mattermost Security Updates page, this time properly populating the content of the “Issue Details” column.

Responsibilities Matrix

Product SecurityDevelopment TeamRelease ManagerSecurity OperationsMarketingSRE

Triage Vulnerability

x

Product Vulnerability & Development fix Jira tickets creation

x

Product Vulnerability Jira status progression & fields completion

x

Security Vulnerability Playbook run creation & administration

x

Vulnerability fix development

x

Discovery of exploitation attempts (High/Critical only)

x

Security Review of the fix

x

Notify the Release Manager for a new release version cut

x

Cloud Release Preparation

x

x

Self Hosted Release Preparation

x

Post Mortem discussion (High/Critical only)

x

x

Post Mortem documentation & action items Jira tickets creation (High/Critical only)

x

Email newsletter draft

x

x

Review newsletter draft & send it to the Security Updates mailing list

x

Release of the security update notes

x

Prepare and publish CVE

x

Last updated