follow us on twitter . like us on facebook . follow us on instagram . subscribe to our youtube channel . announcements on telegram channel



Author Topic: Matomo Bug Bounty [$222-$242]  (Read 13945 times)

Angelina

  • Moderator
  • Experienced Member
  • *****
  • Posts: 357
    • View Profile
Matomo Bug Bounty [$222-$242]
« on: April 20, 2023, 07:35:07 pm »
Submit bug report: https://matomo.org
@matomo_org

Matomo is the leading open analytics platform for Web+Mobile (formerly Piwik). The open alternative to Google Analytics. Privacy is built-in.


Critical security issues will be rewarded up to 10,000 USD. Critical issue in Matomo means an issue in our latest official release at: https://builds.matomo.org/latest.zip as installed on a typical server (and possibly using any of our official plugins by Matomo or InnoCraft from the Marketplace).
If you can gain remote code execution on the server (i.e. RCE), or if you're able to delete data with a SQL Injection (via a HTTPS request), this may qualify as a Critical issue. (Note: If a Remote Code Execution (RCE) is only available when logged in as a Super User, the issue will qualify as "High" and not "Critical".)
High security issues that can cause a direct attack (CSRF, XSS, Auth bypass, etc.) will be rewarded with up to 1,000 USD.
Other issues will typically be rewarded by 555 USD (or more or less depending on the impact.)
Note: We are currently in the process of migrating our software from using AngularJS to Vue.JS. All AngluarJS related parts are suspect to be removed soon. We therefor handle any AngularJS related security issues with lower severity.


Policy

No technology is perfect, and Matomo believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product or service, we encourage you to notify us. We welcome working with you to resolve the issue promptly.
Disclosure Policy
Let us know as soon as possible upon discovery of a potential security issue, and we'll make every effort to quickly resolve the issue.
Provide us a reasonable amount of time to resolve the issue before any disclosure to the public or a third-party.
Reported security issues must be original and previously unreported
Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with explicit permission of the account holder.
Please don't run automated tools against live servers without contacting us first. If you want to test out Matomo you can easily set up your own instance
Please don't test contact forms and similar actions that send out emails
Please don't sign up for more than one free trial on InnoCraft cloud.
Out-of-scope Vulnerabilities
The following issues are outside the scope of our rewards program:
Path disclosure
Clickjacking
Information disclosure
Version disclosure
The token_auth acts as the user's password and is used to authenticate in API requests (see FAQ).
Open Directory Listing
CORS related issues in any of our *.matomo.org websites.
Application Errors on pages
Crime/beast attack and Lack of HTTP security headers (CSP, X-XSS, etc.)
Security issues as a result of running a Matomo instance without HTTPS
Brute force, DoS, DDoS, phishing, text injection, or social engineering attacks.
Output from automated scans - please manually verify issues and include a valid proof of concept
Missing cookie flags on non-sensitive cookies.
Users with super user privileges can post arbitrary JavaScript
Vulnerabilities affecting users of outdated browsers or platforms.
Issues related to world writable files in a shared hosting environment
Race conditions to bypass limits/quotas.
Blind Server-Side Request Forgery
HSTS or CSP headers
SPF, DMARC records missing
Vulnerabilities due to an older version of PHP, or MySQL (or MariaDB), or in the web server (Apache/Nginx), or Operating System (Linux/Windows).
Vulnerabilities caused by not applying Matomo security best practises
Vulnerabilities in third party plugins (not authored by Matomo nor InnoCraft)
Please make sure that the referenced file is thus also existent in our final releases. Vulnerabilities in code that is not packaged in the Matomo installation zip (such as tests) unless they affect the final release.
CLI is out out scope (including the Matomo console commands)