
{"id":1055,"date":"2024-07-20T15:17:47","date_gmt":"2024-07-20T05:17:47","guid":{"rendered":"https:\/\/whispir.wpengine.com\/?post_type=terms&#038;p=1055"},"modified":"2024-12-23T14:23:10","modified_gmt":"2024-12-23T03:23:10","slug":"vulnerability-disclosure-policy","status":"publish","type":"terms","link":"https:\/\/www.whispir.com\/en-sg\/terms\/vulnerability-disclosure-policy","title":{"rendered":"Vulnerability Disclosure Policy"},"content":{"rendered":"<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">At Whispir our data security and privacy policies and processes reflect industry best practice however, we acknowledge software isn\u2019t always flawless. If you believe you\u2019ve discovered a security vulnerability within one of our products, we strongly encourage you disclose it to us as quickly as possible and in a responsible manner.<\/p>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">To encourage responsible disclosure, we will not take legal action against security researchers in relation to the discovery and reporting of a security vulnerability that complies with this Responsible Vulnerability Disclosure Policy. In the event of any non-compliance, we reserve all of our legal rights.<\/p>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">If in doubt, please contact the Whispir Information Security team by sending an email to\u00a0<a class=\"underline font-bold text-body text-primary\" href=\"mailto:infosec@www.whispir.com\" target=\"_blank\" rel=\"noopener noreferrer\">infosec@www.whispir.com<\/a>.<\/p>\n<h3 class=\"ts-h3 text-primary | mt-[1.14em] first:mt-0\">Responsible Vulnerability Disclosure Guidelines<\/h3>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">We will investigate legitimate reports and make every effort to quickly mitigate or remediate any vulnerability where security researchers meet the following guidelines:<\/p>\n<ul class=\"RichText_UnorderedList__QrZdu text-body text-primary\">\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Avoid privacy violations, destruction of data, and interruption or degradation of our services;<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Do not modify, access or exfiltrate data that does not belong to you;<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Do not conduct social engineering (including phishing) of Whispir employees, contractors or customers or any other party;<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Do not post, transmit, upload, or link malware, viruses or similar harmful software that could impact our services, products or customers or any other third party;<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Do not test third party websites, applications or services that integrate with our services or products;<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Give Whispir a reasonable time to correct the issue before making any information public;<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Do not undertake any activity that violates any law.<\/p>\n<\/li>\n<\/ul>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">The following finding types are excluded from our Responsible Vulnerability Disclosure Policy:<\/p>\n<ul class=\"RichText_UnorderedList__QrZdu text-body text-primary\">\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Reports from automated vulnerability scanners;<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">HTTP 404 codes or pages, or other HTTP non-200 codes or pages;<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Fingerprinting or banner disclosure on common and public services;<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Disclosure of known public files or directories, such as robots.txt;<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Self-exploitation issues (such as self XSS, cookie reuse, self denial of service, etc).<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Issues submitted without working proof of concept<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Missing HTTP security headers<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Weak password policy implementation<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Outdated or vulnerable libraries, frameworks in use<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">CSRF token missing on public pages, login pages or contact forms<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Error messages such as web server stack traces, application errors<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Lack of flags such as &#8216;secure&#8217;, &#8216;httpOnly&#8217;, &#8216;Cache-Control&#8217;, &#8216;Pragma&#8217;<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Insecure TLS\/SSL configuration without working proof of concept<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Issues related to rate limiting, brute forcing<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">DMARC, SPF, DKIM email security<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Enabled HTTP methods such as OPTIONS, TRACE, DELETE, PUT, WEBDAV, etc<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Public files exposed by forced browsing<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Account lockout not enforced<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">HTTP or DNS cache poisoning<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Clickjacking<\/p>\n<\/li>\n<\/ul>\n<h3 class=\"ts-h3 text-primary | mt-[1.14em] first:mt-0\">How to Responsibly Report a Vulnerability<\/h3>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">You can responsibly disclose security vulnerabilities to the Whispir Information Security team by emailing\u00a0<a class=\"underline font-bold text-body text-primary\" href=\"mailto:infosec@www.whispir.com\" target=\"_blank\" rel=\"noopener noreferrer\">infosec@www.whispir.com<\/a>\u00a0using our PGP key below to encrypt sensitive information:<\/p>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\"><a class=\"underline font-bold text-body text-primary\" href=\"https:\/\/assets.ctfassets.net\/9kxenxp0ev0j\/7vyw1zSkT76seDwPj4YqjO\/637601fed589ef23fcaf86ede00c2425\/WhispirPGPkey.txt\" target=\"_blank\" rel=\"noopener noreferrer\">Download PGP Key<\/a><\/p>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">When reporting a security vulnerability, please include as much information as possible, including:<\/p>\n<ul class=\"RichText_UnorderedList__QrZdu text-body text-primary\">\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Details of the security vulnerability including the products or services that may be affected;<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">The steps required to reproduce and validate the vulnerability and a Proof of Concept (POC);<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">The names of any test accounts you have created (where applicable); and<\/p>\n<\/li>\n<li>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Your contact information.<\/p>\n<\/li>\n<\/ul>\n<h3 class=\"ts-h3 text-primary | mt-[1.14em] first:mt-0\">Third-party vulnerabilities<\/h3>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">If issues reported via our Responsible Vulnerability Disclosure Policy affect a third-party library, external project, or another vendor, Whispir reserves the right to forward details of the issue to that party without approval from the researcher. We will do our best to coordinate and communicate with you through this process.<\/p>\n<h3 class=\"ts-h3 text-primary | mt-[1.14em] first:mt-0\">What happens next?<\/h3>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Once you have reported a security vulnerability, we will contact you to acknowledge your submission and keep you informed of our plans to remediate or otherwise mitigate legitimate vulnerabilities.<\/p>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">We ask that you maintain confidentiality and do not make your research public until we have completed our investigation and, if necessary, have remediated or mitigated the security vulnerability.<\/p>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">If a report is found to be a duplicate or is otherwise already known to us, the report will not be eligible for public recognition.<\/p>\n<h3 class=\"ts-h3 text-primary | mt-[1.14em] first:mt-0\">Recognition<\/h3>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">While we do not compensate researchers for identifying security vulnerabilities we recognize and thank the following contributors who have helped keep our products safe by reporting security vulnerabilities responsibly in accordance with our Responsible Vulnerability Disclosure Policy:<\/p>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\"><strong><span class=\"font-bold\">Jan 2023<\/span><\/strong><\/p>\n<p class=\"ts-body text-primary mt-[1.5em] first:mt-0\">Shaun Budding @pudsec \/ Vulnerability class &#8211; sub domain takeover<\/p>\n","protected":false},"template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","_links_to":"","_links_to_target":""},"class_list":["post-1055","terms","type-terms","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/www.whispir.com\/en-sg\/wp-json\/wp\/v2\/terms\/1055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whispir.com\/en-sg\/wp-json\/wp\/v2\/terms"}],"about":[{"href":"https:\/\/www.whispir.com\/en-sg\/wp-json\/wp\/v2\/types\/terms"}],"wp:attachment":[{"href":"https:\/\/www.whispir.com\/en-sg\/wp-json\/wp\/v2\/media?parent=1055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}