follow us on twitter . like us on facebook . follow us on instagram . subscribe to our youtube channel . announcements on telegram channel



Recent Posts

Pages: 1 ... 7 8 [9] 10
81
Bug bounty programs / Hack_the_Proxy Bug Bounty
« Last post by Angelina on July 20, 2023, 06:27:24 pm »
submit bug report
Hack the Proxy Bug Bounty Eligibility Rules
This is issued by CYBERCOM and DDS. The explicit intent is to find places where the many external DODIN touchpoints might be used by adversaries to surveil information that is internal to the network. As such, this will be focused on content intermediaries, such as proxies, VPNs, and virtual desktops.
The Hack the Proxy Bug Bounty will start on Sept 3rd at 12:00 (noon) Eastern Standard Time and end no later than Sep 13th at 17:00 Eastern Standard Time.
If you have information related to security vulnerabilities in the online services listed in scope below, we want to hear from you! We value the positive impact of your work and thank you in advance for your contribution. Please review all the participation and payment eligibility rules before you report a vulnerability. By participating in this challenge, you agree to be bound by all challenge rules.
General Participation and Payment Eligibility
Individuals from the public are eligible to participate if you meet the eligibility criteria below. Individuals from the public may be eligible to receive a payment award if you meet the payment eligibility criteria below. U.S. Government contractor personnel are considered individuals from the public and may be eligible to participate on your own personal time and using your own personal resources if you meet the eligibility criteria for individuals from the public below.
Up to 600 eligible applicants will be invited to participate in the challenge. Invitations will be issued to eligible participants during the challenge at regular intervals. For each invitation batch, approximately 70% of the participants will be determined by the HackerOne Reputation System while approximately 30% will be determined by random lottery. If you are selected, you will receive an electronic communication confirming your participation.
Participation and Payment Eligibility for Individuals from the Public
Individuals from the public, including U.S. Government contractor personnel, are eligible to participate only upon meeting ALL of the following conditions:
You must have successfully registered as a participant through this security page.
You must not reside in a country currently under U.S. trade sanctions.
U.S. persons as defined by the Internal Revenue Code Section 7701(a)(30) and to foreign nationals based on their Government passport, who are not on the U.S. Department of Treasury’s Specially Designated Nationals List, and who are not citizens of the following countries: China, Russia, Iran, and the Democratic People’s Republic of Korea.
If you submit a qualifying, validated vulnerability, you may be eligible to receive an award, pending a security and criminal background check. Specific information on payment eligibility will be provided upon acceptance into the challenge.
You may NOT participate in this challenge unless you comply with the relevant participation requirements described above.
Legal
In connection with your participation in this challenge, you agree to comply with all applicable federal, state, and local laws. We reserves the right to change or modify the terms of this challenge at any time. If accepted to participate in this challenge, please check back often for any updates to this challenge.
Acknowledgment
By clicking “Apply Here” to participate in this Hack the Proxy Bug Bounty challenge, you are confirming that you have read, understand, and agree to be bound by these rules and restrictions, that you meet all eligibility requirements listed above, and that you understand that if you are not in compliance with these rules and restrictions you may be subject to civil and/or criminal liability.
82
Bug bounty programs / Greenhouse Bug Bounty
« Last post by Angelina on July 20, 2023, 06:25:41 pm »
submit bug report: https://app.greenhouse.io

About#
Greenhouse is software to optimize your entire recruiting and onboarding process. Find better candidates, conduct more focused interviews, and make data-driven hiring decisions.
Through this security bug bounty program we collaborate with security researchers worldwide to identify and mitigate security vulnerabilities in our platform.
Find a security flaw in Greenhouse? Submit a report here. If we confirm it and it's within the guidelines below we'll send you a reward.
Guidelines#
Rewards are contingent on you operating within these guidelines and are granted at the discretion of Greenhouse:
Domains eligible for reward: app.greenhouse.io, api.greenhouse.io, boards.greenhouse.io, greenhouse.io, onboarding.greenhouse.io
If you're using your company's Greenhouse account, testing is not permitted without prior written authorization from Greenhouse.
We do not provide test accounts.
Only issues that might impact the security of our data and supporting systems are in-scope; usability, functionality, and programming bugs are out-of-scope.
Social engineering attacks against employees are out-of-bounds and will not be accepted.
Any research or testing that impacts our application's performance or exposes confidential information to anyone else is out-of-bounds and will not be accepted.
Output copied from any scanning, auditing, or attack tool without supporting evidence or a proof-of-concept will not be accepted as original work and will not be accepted.
If we catch you using a scanner against our applications you may be subject to being banned from our bounty
You are not an individual on, or residing in any country on, any U.S. sanctions lists.
You must provide a clear, detailed, and working proof of concept (PoC) that exploits the security issue
Submissions without a working PoC will likely be rejected
Response Times#
Action   Target   
Time to first response   3 days   
Time to triage   7 days   
Known Issues, Ineligible For Reward#
These issues are not eligible for reward due to design decisions, limitations of third-party services we use, etc.
Login/Logout CSRF/XSRF
Email configuration (SPF, DKIM, DMARC)
SSL/TLS ciphers or denial of service issues
Diffie-Hellman parameters
Clickjacking/UI Redress on boards.greenhouse.io (X-Frame-Options) or login pages
No Strict-Transport-Security header
Content Security Policy configuration issues
Issue related to links or forms outside of the greenhouse.io or grnh.se domains
Broken links on our company landing page, blog or marketing webpages
Problems related to widely publicized CVE's
DDoS
Downstream providers we do not control (e.g. Marketo)
Denial of service issues on form input length
io.greenhouse.recruiting (Mobile Applications)
83
Bug bounty programs / Harvest Bug Bounty
« Last post by Angelina on July 15, 2023, 10:30:42 am »
submit bug report: http://getharvest.com

At Harvest security is very important, our customers trust us with their data and we take this trust extremely seriously. With this security bounty system, we aim to reward the work of security researchers who find issues with Harvest’s suite of applications. Our team is committed to addressing all security issues in a responsible and timely manner.
Rules for reporting
If you find a security issue let us know and we will make every effort to resolve the issue as soon as possible. Please do not publicly disclose any details until Harvest has confirmed the bug has been fixed. If you provide us a reasonable amount of time to resolve it, we promise to get back to you quickly at each step of the resolution process.
All bug reports should include
A detailed step-by-step explanation of how to replicate the issue.
Attack Scenario to demonstrate the risk.
Rules for testing security issues on Harvest
Use test accounts. Please add +hackerone to your email address before the @, e.g. researcher+hackerone@example.com
Avoid security scanners or tools which may cause DoS, DDoS or scraping-like behaviour.
Do not use automatic tools against contact or support forms
Do not comment on the blog while testing
NEVER try to gain access to real user's account or data.
You must not leak, manipulate, or destroy any user data.
Do not impact users with your testing
Do not perform denial of service attacks, mail bombing, spam, scraping, brute force, or automated attacks with programs like Burp Intruder.
Do not attempt non-technical attacks such as social engineering, phishing, or physical attacks against our employees, users, or infrastructure.
Any vulnerability found must be reported no later than 48 hours after discovery.
If you have any doubt please write to us: security@getharvest.com
What we are looking for
In general any vulnerability which could negatively affect the security of our users like:
Cross-site Scripting (XSS)
Cross-site Request Forgery
Server-Side Request Forgery (SSRF)
SQL Injection
Server-side Remote Code Execution (RCE)
XML External Entity Attacks (XXE)
Access Control Issues (Insecure Direct Object Reference issues, etc)
Exposed Administrative Panels that don't require login credentials
Directory Traversal Issues
Local File Disclosure (LFD)
Anything not listed but important.
Concatenating bugs to increase the attack scenario is encouraged. We do not allow by any means escalations such as port scanning internal networks or privilege escalation attempts. Never download or access private data.
What we are NOT looking for
Hyperlink injection on emails
Best practices concerns (we require evidence of a security vulnerability)
Sessions not being invalidated when a best practice says so
Wordpress XMLRPC brute force attacks
CSV/Excel command injection issues
Vulnerabilities only affecting users of outdated or unpatched browsers and platforms
Race conditions that don't compromise the security of Harvest or our customers
Reports about theoretical damage without a real risk
The output of automated scanners without explanation
window.opener Related Issues
CSRF with no security implications (like Login/logout/unauthenticated CSRF)
Missing cookie flags on non-security sensitive cookies
Attacks requiring physical access to a user's device
Missing security headers not related to a security vulnerability
Reports of insecure SSL/TLS ciphers unless you have a working proof of concept
Banner grabbing issues to figure out the stack we use or software version disclosure
Open ports without a vulnerability
Password and account recovery policies, such as reset link expiration or password complexity
Invalid or missing SPF (Sender Policy Framework) records
Disclosure of known public files or directories, (e.g. robots.txt)
Reports of spam
User enumeration
DNS misconfiguration
Presence of autocomplete attribute on web forms
DNSSEC settings
HSTS or CSP headers
Host header injection unless you can show how a third-party can exploit it.
Vulnerabilities that require a rooted, jailbroken or software emulated device
If you really feel that something listed above will have a great impact on our security, and you have a working proof of concept, please feel free to report it explaining the attack scenario that we are missing, otherwise it will be classified as Not Applicable.
What is explicitly out of scope
Any submitted reports related to these applications will be closed as N/A:
harveststatus.com
help.getharvest.com
getharvest.com/contact
support.forecastapp.com
To qualify for a bounty
You must be the first reporter
It must not be a duplicate or known issue
Your report must be within scope
You should not disclose the issue before its resolution
You should not access another user’s data without permission
The report should describe an attack scenario and a real risk for the user.
If you have any doubt please write us: security@getharvest.com
What is ineligible for a bounty, but appreciated
Recently disclosed 0 day vulnerabilities
Use of a known-vulnerable library
Reflected XSS
Open redirects
Self-XSS (making users attack themselves generally is not a security issue)
Significant Content Spoofing - Text Injection attacks
Any low severity issue (not listed on "What we are not looking for" section)
Thank you for helping keep Harvest and our users safe.
Happy bug hunting!
84
Bug bounty programs / MegaPrivacy Bug Bounty
« Last post by Angelina on July 15, 2023, 10:29:28 am »
submit bug report: http://mega.co.nz

Immediately after our launch, our security model and implementation came under intense crossfire, most of which turned out to be damp squibs. We have, however, also suffered three direct hits, and we want more! To improve MEGA's security, we are offering rewards to anyone reporting a previously unknown security-relevant bug or design flaw.
How much can I earn?
We offer up to EUR 10,000 per bug, depending on its complexity and impact potential.
Who is eligible?
The first finder of the bug. Bugs reported by third parties are typically not considered for a reward.
What is the disclosure policy?
You are free to disclose your finding to the general public after we confirm to you that the issue has been resolved.
Who makes the decision?
The decision whether you qualify and how much you earn is at our discretion, and while we will be fair and generous, you agree to accept our verdict as final.
How do I submit my finding?
Send an e-mail to bugs@mega.co.nz.
Policy: https://mega.co.nz/#blog_6
Domains
mega.co.nz
mega.nz
85
Bug bounty programs / F-secure Bug Bounty
« Last post by Angelina on July 15, 2023, 10:27:56 am »
submit bug report: https://www.f-secure.com

We want to hear about any security vulnerabilities in our products and services. In order to reward security researchers, we offer monetary rewards for eligible security vulnerability reports that are disclosed to us in a coordinated way. However, there are certain rules that need to be followed to ensure that your security research does not cause security risk to other users or their data, and to decrease the likelihood that your research would be flagged as a malicious intrusion attempt by our monitoring. We also want to be clear about certain aspects relating to acceptance of reports and payment of rewards in order to avoid any surprises.
A "security vulnerability" is defined as an issue that causes a breach of confidentiality, integrity, or availability of the service or data, or applies to personal data (privately identifiable information) being stored or processed in a way that is not compliant with the current Finnish data protection legislation.
Policy: https://www.f-secure.com/en/business/programs/vulnerability-reward-program
Security advisories: https://www.f-secure.com/en/business/programs/vulnerability-reward-program
Hall of Fame: https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame
86
Bug bounty programs / Exodus Bug Bounty
« Last post by Angelina on July 15, 2023, 10:24:38 am »
submit bug report: https://www.exodus.com

When reporting vulnerabilities, please consider (1) attack scenario / exploitability, and (2) security impact of the bug/vulnerability. The Google Bug Hunters University guide may be useful in considering whether an issue has security impact.
Submit one vulnerability per report. WARNING: If the same exploit occurs across multiple endpoints, please include those endpoints under your single submission. Do NOT file multiple reports for the same exploit.
Multiple vulnerabilities caused by one underlying issue will be awarded one bounty (see above item).
When duplicates occur, we only award the first report that was received (provided that it can be fully reproduced).
Social engineering (e.g. phishing, vishing, smishing) is prohibited.
Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service (including denial of service). Only interact with accounts you own or with explicit permission of the account holder. If you do accidentally cause some noticeable interruption of service, please immediately email us so we can handle it accordingly hack1@exodusmovement.opsgenie.net and please include the subject title "HackerOne Outage: <description>" for the alert to trigger.
Rewards
Reward decisions are up to the discretion of Exodus.
Minimum reward for a vulnerability report: $100
Maximum reward for a vulnerability report: $100,000
In scope vulnerabilities
Technical vulnerabilities or security-related problems in any of our company's internet public surface (websites and subdomains underneath Exodus's control)
Technical vulnerabilities or security-related problems in our company's Desktop Wallet application.
External Dependencies
Exodus makes use of a number of open (and closed) source libraries. If you discover a vulnerability in
an open source dependent library or OS component, we advise you to follow responsible disclosure procedures directly with the library or OS vendor. We will not pay bounties on undisclosed vulnerabilities in dependent components. However, if one of those libraries included you can demonstrate a serious vulnerability of any of our software/servers as a result of that library with a working Proof of Concept, we will on a case-by-case basis consider this in-scope and grant rewards.
Out of scope vulnerabilities
If you find a vulnerability that is not part of the In scope vulnerabilities, please report it and we will investigate it and depending on the severity of the vulnerability, you will be listed in our Hall of Fame and may be eligible for a reward. Any rewards for out of scope vulnerabilities will be granted on a case by case basis.
The following issues are currently considered out of scope:
Weaknesses that would require Email Phishing or Social Engineering
Attacks requiring MITM or physical access to a user's device.
Previously known vulnerable libraries without a working Proof of Concept.
Content spoofing and text injection issues without showing an attack vector/without being able to modify HTML/CSS
Sites/Software that is run entirely by another company that is simply subdomain-ed or linked to from our company. Eg: Constant Contact, Zendesk, etc.
Missing email best practices (Invalid, incomplete or missing SPF/DKIM/DMARC records, etc.)
Vulnerabilities only affecting users of outdated or unpatched browsers or wallets [Less than 3 stable versions behind the latest released stable version]
Public Zero-day vulnerabilities that have had an official patch for less than 1 month will be awarded on a case by case basis.
Package include/dependency vulnerabilities without demonstrating a vulnerability.
Issues that require unlikely user interaction
(KNOWN ISSUE) Disclosure of methods/endpoints/api keys involving 3rd party blockchain APIs (ex. bitcoin, tezos, waves etc) including known embedded API key, and known outdated swaggerhub / openapi issue. (also mentioned in specific scopes for increased awareness)
The following issues are currently considered do not attempt without permission:
Extended testing/attacks of Exodus servers or infrastructure
Rate limiting or brute-force attacks on exodus backend infrastructure
Any activity that could lead to the disruption of our service (DoS).
To request permission, please email bugbounty@exodus.com and mention the details of your test including what endpoint(s) you will be hitting, what type of scan/attack/etc you would like to try, and what you're trying to achieve. We will respond within 2 working days, ideally less to your request. As long as it is reasonably well thought out and we don't see a risk on our end, we will approve the request.
Safe Harbor
Any activities conducted in a manner consistent with this policy will be considered authorized conduct and we will not report to any law enforcement agencies or initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, Exodus will take steps to make it known that your actions were conducted in compliance with this policy.
Thank you for helping keep Exodus and our users safe!
87
Bug bounty programs / Elisa Bug Bounty
« Last post by Angelina on July 15, 2023, 10:21:30 am »
submit bug report: http://www.elisa.fi

About Elisa bug bounty program
Elisa is a telecommunications, ICT and online service company serving 2.3 million consumer, corporate and public administration organisation customers. In Finland, Elisa is the market leader in its field.
Customer trust is the foundation of our business and therefore the company is committed to treating customers’ data with the utmost care. We encourage security researchers to put the security of our services to the test. We look forward to working with the security community to find security vulnerabilities through responsible disclosure in order to keep our users safe.
We have been running an invite-only bug bounty program on HackerOne since May 2018. Services currently included in our program are Elisa Viihde, Elisa Kirja, Elisa-tunnus, Oma Elisa and Elisa Webshop. For all other services we have a separate responsible disclosure form.
Contact our security team if you are interested in joining the program (include your h1 username). Invitations are sent based on selection criteria like the researcher's reputation, and is at Elisa's sole discretion.
For general information about Elisa, please see our main website https://www.elisa.fi
Policy: https://elisa.fi/vulnerabilities/
88
Bug bounty programs / Eureka Bug Bounty
« Last post by Angelina on July 15, 2023, 10:20:03 am »
submit bug report: https://eure.jp

Eureka Bug Bounty Program Terms
Security is a priority at Eureka. If you believe you've found a security bug in our in-scope applications or infrastructure, we are happy to work with you to resolve the issue promptly and ensure you are fairly rewarded for your discovery.
Your participation in our Bug Bounty Program is voluntary and by invitation-only. By joining our Bug Bounty Program, submitting a report or otherwise disclosing a vulnerability to us (“Submission”), you are indicating that you have read and agree to follow the rules set forth on this page (“Program Terms”).
If (i) you do not meet the eligibility requirements below; (ii) you breach any of these Program Terms or any other agreements you have with Eureka or its affiliates; or (iii) we determine that your participation in our Bug Bounty Program could adversely impact us, our affiliates or any of our users, employees or agents, we, in our sole and absolute discretion, may remove you from our Bug Bounty Program and disqualify you from receiving any benefit of our Bug Bounty Program.
Confidentiality
Regardless of the manner (whether as a direct result of you finding and/or investigating a security bug in our in-scope applications/infrastructure or received/collected through other methods) and timing (whether after or before you joined the Bug Bounty Program) in which it was obtained, any information about us, our services, our affiliates or any of our users, employees or agents in connection with our Bug Bounty Program (“Confidential Information”) must be kept confidential, only used in connection with the Bug Bounty Program and not disclosed to any third party. You may not use, disclose or distribute any such Confidential Information, including without limitation any information regarding your participation in our Bug Bounty Program and any Submission.
By joining our Bug Bounty Program, you represent and warrant that you have not used and will not use Confidential Information for any purpose other than in connection with the Bug Bounty Program and that you have not shared and will not share such Confidential Information with any third party.
At any time after a Submission is made, Eureka reserves the right to request that you securely and irreversibly delete any data related to such Submission, including, without limitation, any data about us, our services, our affiliates or any of our users, employees or agents.
Upon making a Submission, you accept the responsibility to fully comply with any such request.
Additionally, you agree to securely and irreversibly delete any data related to the Submission immediately upon it no longer being reasonably necessary to retain for the purposes of conveying the impact or scope of the reported issue, after verifying with Eureka that it is no longer necessary, and/or if the Submission is closed, regardless of outcome.
Eligibility to Participate
To participate in our Bug Bounty Program, you must:
Be at least 18 years of age if you test using an account in "Pairs" app, or otherwise be the age of majority in your jurisdiction of residence.
Be at least 13 years old and have the consent of your parent or guardian to participate in our Bug Bounty Program if you are under the age of majority in your jurisdiction of residence.
Not be a resident of, or make a Submission to our Bug Bounty Program from, a country against which the United States has issued export sanctions or other trade restrictions.
Not be in violation of any national, state, or local law or regulation with respect to any activities directly or indirectly related to our Bug Bounty Program.
Not be employed by Eureka or any of its affiliates or an immediate family member of a person employed by Eureka or any of its affiliates.
You are responsible for any tax implications of a reward from our Bug Bounty Program depending on your country of residency and citizenship.
Program Ground Rules
Don’t mass create accounts to perform testing against our applications and services.
Don’t conduct automated testing - under no circumstance is automated testing allowed and will result in disqualification of the security bug(s).
Don’t engage in social engineering (e.g. phishing, vishing, smishing).
Don’t attempt to extort us.
Don’t leave any system in a more vulnerable state than you found it.
Don’t publicly disclose vulnerabilities.
Do respect our users’ privacy.
Do research vulnerabilities and disclose vulnerabilities to us in good faith.
Do be respectful when interacting with our team.
Bounty Eligibility
Eureka reserves the right to decide if the minimum severity threshold is met and whether the vulnerability was previously reported.
To qualify for a reward under this program, you must:
Send a clear textual vulnerability description of the bug along with the steps to reproduce the vulnerability.
Include attachments such as screenshots and proof of concept code as necessary. A clear description and proof of concept helps you prove that the security bug is legitimate and speeds up the reward process.
Be the first to report a specific vulnerability.
Disclose the vulnerability report directly and exclusively to us. Reminder: you are not permitted to disclose vulnerabilities to third parties -- including vulnerability brokers.
Stay in scope.
Do not attempt to elevate privileges, or explore a system beyond the minimum necessary to prove access or attempt to pivot in any way. This will disqualify you from receiving a bounty.
In general, the following would not meet the threshold for inclusion:
Vulnerabilities on sites hosted by third-parties unless they lead to a vulnerability on the main website / application
Denial of service
Social engineering
Spamming
Homographs, RTLO, or other types of UI issues
Content spoofing and text injection issues without showing an attack vector/without being able to modify HTML/CSS
Click-jacking, or issues only exploitable via click-jacking
Disclosure of known public files or directories (.htaccess, robots.txt, etc)
Third-party vulnerabilities (e.g. Wordpress) that have recently become publicly known will generally be out of scope for a period of 30 days from the public release of an official patch or workaround.
Missing or misconfigured security headers which do not lead directly to a vulnerability
Overly verbose responses (errors, banners, etc.), which cannot be directly used in an exploit
Software version disclosure without proof of exploitability
Reports from automated tools or scans
Lack of certificate pinning, or HSTS
TLS/SSL version, configuration, weak ciphers or expired certificates
Lack of Secure, or HTTPOnly flags on cookies
Lack of, or weak, Captcha, or rate-limiting
Tap-jacking
Tab-nabbing
SPF/DKIM/DMARC related issues, including missing SPF records on subdomains
Scenarios that require unlikely user interaction and/or outdated OS or software version
Self-XSS
Login/Logout CSRF
Unrestricted file uploads without a clear impact, beyond resource consumption, DoS, undesirable content, etc.
Third-party API Keys/Secrets embedded in mobile applications, without a clear impact, as many third-parties require this for their own client attribution purposes.
The ability to obtain multiple promotional items by opening multiple accounts
Most GPS spoofing related issues
Attacks against corporate IT infrastructure (e.g. firewalls and their software)
Attacks against employees (phishing, stealing laptops, physical security issues, etc.)
Host header injection without a clearly exploitable condition
Mobile client issues requiring a rooted device and/or outdated OS version
Attacks requiring MITM or physical access to a user's device.
Comma Separated Values (CSV) injection without demonstrating a vulnerability.
Program Updates and Licenses
We may modify the Program Terms or cancel our Bug Bounty Program at any time in our sole and absolute discretion.
As a condition of participation in the our Bug Bounty Program, you hereby grant Eureka and its affiliates a perpetual, irrevocable, worldwide, royalty-free, transferrable, sublicensable and exclusive license to use, reproduce, adapt, modify, publish, distribute, publicly perform, create derivative work from, make, use, sell, offer for sale and import the Submission, as well as any materials submitted to Eureka in connection therewith, for any purpose. You should not send us any Submission that you do not wish to license to us. You hereby represent and warrant that the Submission is original to you and you own all right, title and interest in and to the Submission.
Domains
*.pairs.lv
*.pairs.tw
*.pairs-korea.com
*.pairs.kr
*.eure.jp
89
Bug bounty programs / Cryptocat Bug Bounty
« Last post by Angelina on July 15, 2023, 10:18:13 am »
submit bug report: http://crypto.cat

Help make Cryptocat safer, get rewards and eternal greatness!

Cryptocat is launching a bug hunt and we need your help! Look through our source code and squish security bugs. You'll be helping make free, open source software more secure and you'll get t-shirts, stickers, money and a mention on our Wall of Unquestionable Greatness!
Source code repositories:
Cryptocat (expected status: stable, should not have critical bugs.)
Cryptocat for iPhone (expected status: stable, should not have critical bugs.)
Cryptocat for Android (expected status: public beta, needs looking into.)
What we're looking for
We're looking for any bug maliciously impacts the security of our users, within the confines of our threat model. XSS bugs, crypto implementation bugs, arbitrary code execution and so on. Bigger bugs get bigger rewards, but all good bugs will be rewarded!
How do I report bugs?
We strongly believe in full disclosure. Please file a bug report on our GitHub repository. If you'd rather be private (there's no need!) email nadim at crypto cat.
Policy: https://github.com/cryptocat/cryptocat/issues/
Domains
crypto.cat
90
Bug bounty programs / Cloudbees Bug Bounty
« Last post by Angelina on July 15, 2023, 10:16:41 am »
submit bug report: https://www.cloudbees.com

CloudBees takes security very seriously and investigates all reported vulnerabilities. We want to keep our software and services safe for everybody. We welcome working with the security community to resolve valid issues promptly.
Bounty Program
CloudBees offers monetary bounties for reports of qualifying security vulnerabilities. Reward amounts will vary based on the severity of the report, and eligibility is at our sole discretion. Not all submitted items will be in scope for a reward. Duplicate issues will be merged.
Our determination of what is in scope or not is final. Awarded bounties are not negotiable, including the decision to not pay out a bounty.
Program Scope
CloudBees oversees a large scope of products. Some projects fall under the scope of the open source Jenkins project, and as such will be handled by that security team following their documented processes at https://jenkins.io/security/. Any submissions to the CloudBees HackerOne program that fall under the scope of the Jenkins project will be forwarded to that team for further analysis, and follow-up will be handled via that team. Such reported vulnerabilities MAY be subject to bounties at the discretion of the CloudBees security team.
Within the CloudBees portfolio, the following products are in scope:
CloudBees Console (app.cloudbees.com, id.cloudbees.com, and associated services)
CloudBees CI and associated plugins (aka CloudBees Core)
CloudBees CD (aka Flow)
CloudBees Feature Management (FM, aka Rollout - app.rollout.io, x-api.rollout.io, push.rollout.io and analytics.rollout.io)
CloudBees CodeShip (SaaS service - codeship.com)
CloudBees Websites (www.cloudbees.com, support.cloudbees.com)
For a more detailed list, see “Scopes” (visible only to invited testers). Vulnerabilities reported against unlisted domains MAY be subject to bounties at the sole discretion of the CloudBees security team.
Please note that just because you find the same issue within multiple domains in our portfolio, it does not mean we will treat them as separate issues. Please don't open multiple tickets for the same issue for each domain, as we will just mark them as duplicates
Testing accounts and traffic categorisation
When performing testing on our SaaS applications, please ensure the testing accounts registered on our applications follow either format below. Not following this guidance might be a reason for disqualifying your finding.
Use a +h1 suffix on the username, for example “<username>+h1@<domain>”; OR
Use the @wearehackerone.com e-mail address assigned to your HackerOne account
Researchers must add headers to requests such as: “X-HackerOne-Research: [H1 username]”
Other good practices on this can be found (although not mandatory) here
Third-party applications behind CloudBees domains
At CloudBees we rely on many third-party SaaS applications to help us deliver final services or products. Many of those might be behind domains we control such as the list below, although not limited to it:
http://id.cloudbees.com
http://support.cloudbees.com
http://feedback.cloudbees.com
Our stance on such applications is that they are partially in-scope. Issues related to how CloudBees has configured and integrated with these services will be considered in scope. Testers reporting flaws that lie fully within the third party service will be redirected to the security programs of the respective service. The CloudBees security team makes the final determination of whether a report is in scope.
Consider the case of exposed storage buckets, for example. We welcome reports of misconfiguration issues, but if there is a flaw in the core storage service, the best target for such a report would be the cloud provider since they are in the best position to fix it.
We will assess the reports the same way we do it with other reports, although if we don’t find any data compromise on such applications it is unlikely we will take it as a report for our program.
Areas of highest interest
We are most interested in, and will pay higher bounties for:
OWASP top 10 related issues, such as demonstrated XSS
Anything that allows bypass of the authentication system (aside from brute forcing or DoS style attacks)
Things that would expose private user data in ways that are not intended.
Ability to modify or inject content into any of our public web properties
Cloud Security configuration issues related to cloud infrastructure used by our SaaS services (AWS, Google Cloud, Kubernetes), leading to exploitable vulnerabilities.
Areas of lowest interest
We are not particularly interested in:
Blatant dumps of information from scanning tools. Do not dump your burp suite findings with links to public pages about why that finding is bad. You must demonstrate an actual exploitable issue.
CVEs for versions of software you may identify we are running unless you can point to an actual vulnerability
Reports of best practices you feel CloudBees should be following
Reports involving low or medium issues surrounding our authentication/login system (including things like best practices, rate limiting, etc).
Reports of sub-domain takeovers or dangling domains (will likely be pay low at most)
Common Reports we get that are out of scope
Any and all reports regarding password complexity
DKIM/SPF/DMARC/etc settings for email of domains we own
Clickjacking on pages with no sensitive actions.
Unauthenticated/logout/login CSRF.
Attacks requiring MITM or physical access to a user's device.
Previously known vulnerable libraries without a working Proof of Concept.
Comma Separated Values (CSV) injection without demonstrating a vulnerability.
Missing best practices in SSL/TLS configuration.
Any activity that could lead to the disruption of our service (DoS).
Content sniffing and text injection issues without showing an attack vector/without being able to modify HTML/CSS
Open redirects unless there's an actual security issue associated with it. Manually changing the URL in a redirect is not sufficient cause for a security issue. Tampering with an existing redirect that legitimately tricks an actual user to a different site IS valid.
Information disclosure-looking vulnerabilities for keys and tokens that are supposed to be client/browser bound.
While researching we ask that you do not perform the following:
Any type of Denial of Service
Spamming/Messaging
Social Engineering attempts on CloudBees employees or contractors
Any physical attempts to access to CloudBees offices
Disclosure Policy
As this is a private program, please do not discuss this program or any vulnerabilities (even resolved ones) outside of the program without express consent from the organisation.
Follow HackerOne's disclosure guidelines.
What we expect from you
Strictly follow this policy and the H1's (code of conduct](https://www.hackerone.com/policies/code-of-conduct)
What to expect from us
Our goal is to triage your report as per the program response targets. We will work with our engineering teams to take scope of severity, business impact, and how we fit any potential fixes into our work queue. Please note that most reported items are not business critical, and as such it takes some time for our teams to determine exactly the scope of the issue, and how it will be addressed. Once we have a good idea of how it will be fixed and the overall severity, we will pay a bounty. Our preference is to pay a bounty at the same time we validate resolution of the issue as it allows us to make sure the amount of the bounty is appropriately tied to the actual problem.
In some cases the item filed may be (by our team) considered more of a bug than a security issue. We may still elect to fix and pay out bounties for such items, but there is no particular timeline for addressing them as our product management teams will be scoping them into the product plan details.
While we appreciate your reports, asking the status of when we will respond, fix the item, or post a bounty will not receive a response. Repeated attempts at asking for status of such reports may result in banning from continued participation in our program.
This program page may be updated at any time.
Policy: https://www.cloudbees.com/security-policy

Pages: 1 ... 7 8 [9] 10