Hi,
Threads related to this topic :
- Display security issues directly inside XWiki Standard
- Dashboard for Security issues inside XWiki Standard
- Source of CVEs for the security dashboard
Recently, we introduced a Security Dashboard in XWiki instances. This dashboard is helpful for displaying the list of known security vulnerabilities coming from XWiki or one of its dependencies.
However, I have a little bit of a concern when it comes to the adoption of XWiki. Hear me out :
Today, I downloaded XWiki 15.8 with Jetty/HSQLDB. 15.8 was released yesterday, so it’s supposed to be the most up-to-date version of XWiki. Within 5 mins after starting the XWiki instance, an error message appeared in the notifications menu, indicating that some security vulnerabilities were identified in this XWiki version.
While there’s a clear added benefit of providing security insights on the XWiki instance, I fear that the way we implemented the security dashboard for now has a serious impact on how new users get a first impression of XWiki. If I put myself in the shoes of a new user, just trying things out, the following points could make me just want to stop using XWiki, and not continue my tests :
- I can be confused by this error message because the version I installed is actually the latest one. While it is true that many software are released with existing vulnerabilities, it’s not exactly what first-time users expect to see in their first 5 mins of using the software.
- When going in the security dashboard, I see that vulnerabilities are coming from provided extensions, and that currently, no fix exist for resolving them. Why should these be listed if we don’t provide any option to fix them ?
- I cannot discard the alert about security vulnerabilities without disabling the security scans completely. So basically, if I choose to stay in this situation and not disable the scans, my notifications bell will be permanently red, with a red notification message at the top of the notifications.
A 4th point, which requires a bit more digging, is that the three “extensions vulnerabilities” reported do not seem to be part of the roadmap for the upcoming version. As such, a new user may have trouble understanding :
- The real impact of the security vulnerabilities that are presented in the administration
- When these vulnerabilities are expected to be fixed
My feeling is that we should look into how to answer the 3 points listed above before we go in LTS. What do you think about them ? Do we agree that the points above are legitimate ?
In my case, the vulnerabilities that were reported are the following :
For extension vulnerabilities :
org.xerial.snappy:snappy-java/1.1.10.3
corresponding to GHSA-55g7-9cwv-5qfvnet.sourceforge.htmlcleaner:htmlcleaner/2.24
corresponding to GHSA-jv4x-j47q-6qvporg.jdom:jdom/1.1.3
corresponding to GHSA-2363-cqg2-863c
For environment vulnerabilities :
org.eclipse.jetty:jetty-xml/10.0.15
corresponding to GHSA-58qw-p7qm-5rvhorg.eclipse.jetty:jetty-http/10.0.15
corresponding to GHSA-hmr7-m48g-48f6
I don’t know what would be the behavior if I did not have any extension vulnerabilities, but still some environment vulnerabilities.
Thanks,
Clément