We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| 13.x | ✅ |
| < 13.0 | ❌ |
Only the latest major version receives security updates. We strongly recommend keeping your installation up to date.
We take the security of Elyra Canvas seriously. If you believe you have found a security vulnerability in Elyra Canvas or any of its sub-projects, please report it to us responsibly.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities by email. Send details to jesus.rocha@ibm.com
Please include the following information in your report:
- Type of vulnerability (e.g., XSS, CSRF, injection, etc.)
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the vulnerability, including how an attacker might exploit it
- Initial Response: We will acknowledge receipt of your vulnerability report within 3 business days
- Status Updates: We will send you regular updates about our progress
- Resolution: We aim to resolve critical vulnerabilities within 90 days
- We follow the principle of coordinated disclosure
- We will work with you to understand and resolve the issue before any public disclosure
- We request that you do not publicly disclose the vulnerability until we have released a fix
- Once a fix is released, we will publicly acknowledge your responsible disclosure (unless you prefer to remain anonymous)
When using Elyra Canvas in your applications:
- Keep Dependencies Updated: Regularly update to the latest version to receive security patches
- Content Security Policy: Implement appropriate CSP headers when embedding canvas components
- Input Validation: Always validate and sanitize user inputs before passing them to canvas APIs
- Authentication: Implement proper authentication and authorization for canvas operations
- Data Sanitization: Be cautious with user-provided pipeline definitions and node configurations
- Pipeline Execution: Pipeline definitions may contain executable code. Always validate and sanitize pipeline definitions from untrusted sources
- Custom Nodes: Custom node implementations should be reviewed for security vulnerabilities
- Data Handling: Be mindful of sensitive data in pipeline configurations and node properties
Security updates will be released as patch versions and announced through:
- Release notes
- The project's main README
Thank you for helping keep Elyra Canvas and its users safe!