Security

Reporting New Security Problems with Apache JSPWiki#

The Apache Software Foundation takes a very active stance in eliminating security problems and denial of service attacks against its products.

We strongly encourage folks to report such problems to the private security mailing list first, before disclosing them in a public forum.

Please note that the security mailing list should only be used for reporting undisclosed security vulnerabilities and managing the process of fixing such vulnerabilities. We cannot accept regular bug reports or other queries at this address. All mail sent to this address that does not relate to an undisclosed security problem in our source code will be ignored.

If you need to report a bug that isn't an undisclosed security vulnerability, please use the project's JIRA issue tracker.

The private security mailing address is: security@apache.org.

The process of handling a possible vulnerability is described here.

Asking Questions About Known Security Problems#

Questions about:

should be addressed to the users mailing list. Please see the mailing lists page for details of how to subscribe.

Known Security Vulnerabilities#

Known security vulnerabilities fixed in released versions of Apache JSPWiki are listed at the CVE page.

If you have encountered an unlisted security vulnerability or other unexpected behavior that has security impact, or if the descriptions in one of the pages are incomplete, please report them privately to the Apache Security Team. Thank you.

Errors and Omissions#

Please report any errors or omissions to the dev mailing list.

Hardening Guidance#

The term Hardening in the software industry is effectively ensuring that your installation is as secure as possible against attack, i.e. hardened from attackers. That said, we've have attempted to keep the default settings secure by default (specifically starting with version 3.0.0, however security is always a trade off between making the system useful for your users and making it secure.

This section will be updated once version v3 of JSPWiki is completed and released as there are still many pending updates and new capabilities in development.

That said, here's some guidance to get you going.

Threat Models#

Known threat models for JSPWiki

Managing spam on public facing servers#

TODO - more content is needed here.

Use Captcha plugins

Use the rate limiting plugin

Disk space allocation#

Wiki pages do not currently have any way to restrict the total number of attachments, or the total size of attachments. Monitor disk space usage as needed and beat up your users with high disk space usage. Attachments by default are version controlled, so each version of an uploaded file is retained.

Injection attacks#

JSPWiki will let you NOT let you inject javascript into a wiki page, assuming jspwiki.translatorReader.allowHTML=false which is the default however cascading style sheet content can be inserted wiki pages. This is primarily used to stylize or override specific parts of the UI's styling, but some malicious activity could be possible here.

Wiki plugins also have protections built in to help stop all known attack vectors for injection attacks, however 3rd party plugins may not have those safe guards in place. Do not install untrusted 3rd party plugins without performing a security assessment.

Ports Protocols and Services#

Other than that, JSPWiki really does NOT connect to anything else (i.e. there's no reach back to Apache or the Internet for that matter).

Some plugins may reach out to other servers to pull information and format it for display. Once such is the JiraPlugin.

To summarize: