Skip to content

Commit 48d3165

Browse files
sarah-olson-mongodbSarah Olson
andauthored
DOCS-15078: Updates to the vulnerability report page (#836) (#906)
* DOCS-15078: Testing out the link markup * DOCS-15078: Removed outdated information * DOCS-15078: Minor tweak * DOCS-15078: Fix list formatting * DOCS-15078: Incorporate feedback * DOCS-15078: Minor wordsmith Co-authored-by: Sarah Olson <[email protected]> Co-authored-by: Sarah Olson <[email protected]>
1 parent 1a97e0c commit 48d3165

File tree

1 file changed

+9
-51
lines changed

1 file changed

+9
-51
lines changed

source/tutorial/create-a-vulnerability-report.txt

Lines changed: 9 additions & 51 deletions
Original file line numberDiff line numberDiff line change
@@ -12,62 +12,20 @@ Create a Vulnerability Report
1212

1313
If you believe you have discovered a vulnerability in MongoDB products
1414
or have experienced a security incident related to MongoDB products,
15-
please report the issue to aid in its resolution.
15+
please report the issue to aid in its resolution. For more information on
16+
vulnerability reports, see the following resources:
1617

17-
To report an issue, we strongly suggest filing a ticket in the
18-
:issue:`SECURITY <SECURITY>` project in JIRA. MongoDB, Inc
19-
responds to vulnerability notifications within 48 hours.
20-
21-
Create the Report in JIRA
22-
-------------------------
23-
24-
`Submit a Ticket
25-
<https://jira.mongodb.org/secure/CreateIssue!default.jspa?project-field=%22Security%22>`_
26-
in the :issue:`Security <SECURITY>` project on our JIRA.
27-
The ticket number will become the reference identification for the
28-
issue for its lifetime. You can use this identifier for tracking
29-
purposes.
30-
31-
Information to Provide
32-
----------------------
33-
34-
All vulnerability reports should contain as much information
35-
as possible so MongoDB's developers can move quickly to resolve the issue.
36-
In particular, please include the following:
37-
38-
- The name of the product.
39-
40-
- *Common Vulnerability* information, if applicable, including:
41-
42-
- CVSS (Common Vulnerability Scoring System) Score.
43-
44-
- CVE (Common Vulnerability and Exposures) Identifier.
45-
- Contact information, including an email address and/or phone number,
46-
if applicable.
47-
48-
49-
Send the Report via Email
50-
-------------------------
51-
52-
While JIRA is the preferred reporting method, you may also report
53-
vulnerabilities via email to `[email protected]
54-
55-
56-
You may encrypt email using MongoDB's public key at
57-
`https://docs.mongodb.com/10gen-security-gpg-key.asc <https://docs.mongodb.com/10gen-security-gpg-key.asc>`_.
58-
59-
MongoDB, Inc. responds to vulnerability reports sent via
60-
email with a response email that contains a reference number for a JIRA ticket
61-
posted to the :issue:`SECURITY` project.
18+
* `MongoDB Security information <https://www.mongodb.com/security>`__ on our website
19+
* `Webform <https://www.mongodb.com/bug-submission-form>`__ for vulnerability report submission
6220

6321
Evaluation of a Vulnerability Report
6422
------------------------------------
6523

66-
MongoDB, Inc. validates all submitted vulnerabilities and uses Jira
67-
to track all communications regarding a vulnerability,
68-
including requests for clarification or additional information. If
69-
needed, MongoDB representatives set up a conference call to exchange
70-
information regarding the vulnerability.
24+
MongoDB, Inc. validates all submitted vulnerabilities through internal
25+
investigation. If needed, MongoDB representatives will reach out to the
26+
reporter for further information and to provide the results of the
27+
investigation. Please allow MongoDB representatives up to one week to
28+
acknowledge submissions.
7129

7230
Disclosure
7331
----------

0 commit comments

Comments
 (0)