Viewing 6 replies - 1 through 6 (of 6 total)
  • Plugin Author Gagan Deep Singh

    (@gagan0123)

    @caordawebsol

    We have confirmed that the concern raised was not a security issue, and at no point was there any compromise to the sites using Nginx Helper.

    Following our detailed communication, Patchstack has re-evaluated the situation and has accordingly removed the entry from their database.

    Therefore, we are marking this ticket as resolved. Thank you for your attention to this matter and notifying us.

    I do not believe this is resolved as Blogvault is now reporting a vulnerability in the WordPress Nginx Helper plugin <= 2.2.3 too. Please advise.

    Plugin Author Gagan Deep Singh

    (@gagan0123)

    @dpitzer

    Well, thats what happens when services blindly trust third-party databases and apply caching on top of that.

    @gagan0123

    Do you mean the leading reporter of CVEs? https://jerrygamblin.com/2024/01/03/2023-cve-data-review/

    There’s a gaping hole of observability on WordPress plugin security issues and data leakage. So instead of a full disclosure of what was reported and why you consider it irrelevant, you simply made the decision for everyone who utilizes your plugin. Your plugin is open source, and as such you should be more transparent about reports like this, even if they’re incorrect.

    Also, Patchstack removed the report. No hate, I’m sure you would want other developers and companies to be transparent about this same subject.

    Plugin Author Gagan Deep Singh

    (@gagan0123)

    @jordantrizz

    To shed more light on the issue, a concern was initially reported to Patchstack about our plugin’s logging functionality. After investigation, we clarified to Patchstack that the logging feature of our plugin, when enabled, does not record sensitive information. Instead, it only logs routine activities like the purging of specific URLs from the cache. This information is standard for operational logs when debugging and does not pose a security risk or contain any sensitive information.

    Also, our plugin requires explicit action from administrator account to activate logging, and by default, it does not generate or expose any data. Furthermore, in our extensive testing with various respected hosting providers, we found that they already have measures in place to block public access to all log files, adding an additional layer of security.

    Based on the detailed information and analysis we provided, Patchstack reassessed the report and concluded that it was not a security issue. Consequently, they have removed the entry from their database.

    We understand the importance of security to our users and assure you that we uphold the highest standards in safeguarding our plugin. Your trust in our commitment to security is invaluable, and we remain dedicated to transparent communication about any such concerns.

    If you have further questions or need more information, please feel free to reach out to us.

    @gagan0123

    Thank you for the reply and for providing a more in-depth update. What was the specific concern of the reporter? I’ve never used this feature, so I’m interested in why they thought it was a security concern.

Viewing 6 replies - 1 through 6 (of 6 total)
  • The topic ‘Security issue’ is closed to new replies.