Team RabbitMQ will investigate all responsibly disclosed vulnerabilities that affect a recent version in one of the supported release series. We ask all reporters to provide a reasonable amount of information that can be used to reproduce the observed behavior.
RabbitMQ Core team really appreciates responsible vulnerability reports from security researchers and our user community.
To responsibly disclose a vulnerability, please email security@rabbitmq.com
or
sign up for RabbitMQ community Slack and
send a DM to @michaelklishin. For reports received via Slack, a separate private
channel will be set up so that multiple RabbitMQ maintainers can access the disclosed
information.
In case you'd prefer to encrypt your report, use the RabbitMQ release signing public key.
When reporting a vulnerability, please including the following information:
- Supported RabbitMQ version used
- Any relevant environment information (e.g. operating system and Erlang version used)
- A set of steps to reproduce the problem
- Why do you think this behavior is a security vulnerability
A received vulnerability report will be acknowledged by a RabbitMQ core team or VMware R&D staff member.
As the security issue moves from triage, to identified fix, to release planning we will keep the reporter updated.
- You think you discovered a potential security vulnerability in RabbitMQ
- You think you discovered a potential security vulnerability in one of RabbitMQ client libraries or dependencies
- For projects with their own vulnerability reporting and disclosure process (e.g. Erlang/OTP), please report it directly there
- Not enough information is available to triage (try to reliably reproduce) the issue
- You need help tuning RabbitMQ for security. See Commercial Services
- You need help applying security related updates. See Upgrades
A warning from a security scanner does not necessarily indicate a vulnerability in RabbitMQ. Many of such warnings are specific to a certain environment. RabbitMQ core team does not have access to most commercial security scanners or enough information about the deployment, so security scan results alone will not be considered sufficient evidence of a vulnerability.
Publicly disclosed vulnerabilities (e.g. publicly filed issues with repoduction steps or scripts) will be removed or otherwise taken private as irresponsibly disclosed.
A public disclosure date is negotiated by the RabbitMQ core team and the vulnerability reporter. In most cases disclosure happens within two weeks after a patch release of RabbitMQ is made available. When VMware products that depend on RabbitMQ are also affected, the disclosure period can be extended further to allow those projects to ship patch releases.
Tanzu RabbitMQ is covered by the VMware Security Response Policy.
Vulnerabilities found in Tanzu RabbitMQ can be reported to the RabbitMQ core team or via the VMware Security Response Center.