follow us on twitter . like us on facebook . follow us on instagram . subscribe to our youtube channel . announcements on telegram channel



Author Topic: Buzzfeed Bug Bounty  (Read 15225 times)

Angelina

  • Moderator
  • Experienced Member
  • *****
  • Posts: 357
    • View Profile
Buzzfeed Bug Bounty
« on: July 15, 2023, 10:11:27 am »
submit bug report: https://www.buzzfeed.com

BuzzFeed is a cross-platform, global network for news and entertainment that generates seven billion views each month. BuzzFeed creates and distributes content for a global audience and utilizes proprietary technology to continuously test, learn and optimize.
No technology is perfect, and BuzzFeed believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product or service, we encourage you to notify us. We welcome working with you to resolve the issue promptly. By participating in this program, you agree to be bound by these rules.
Rewards
BuzzFeed, at its sole discretion, may provide rewards to researchers for confirmed and resolved qualifying vulnerability reports.
If we receive more than one report for the same issue, we only reward the first researcher to report a vulnerability. You are responsible for any tax associated with any bounty payment.
Disclosure Policy
You are responsible for complying with any applicable laws. You are not eligible to participate in this program if (i) you are a resident of any OFAC sanctioned country, (ii) you are an employee or immediate family member of an employee of BuzzFeed, Inc., or (iii) you are under 18 years of age. We ask that you:
Let us know as soon as possible upon discovery of a potential security issue, and we'll make every effort to quickly resolve the issue.
Provide sufficient detail and steps to reproduce so that we can confirm and triage the issue.
Provide us a reasonable amount of time to resolve the issue before any disclosure to the public or a third-party.
Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.
Only interact with accounts you own or with explicit permission of the account holder.
Please note that public disclosure of a vulnerability prior to resolution will result in disqualification from the program. Any information you receive or collect about BuzzFeed, our affiliates or any of our users, employees or agents in connection with this program (“Confidential Information”) must be kept confidential and only used in connection with this program. You may not use, disclose or distribute any such Confidential Information, including without limitation any information regarding your submission, without BuzzFeed’s prior written consent.
Exclusions
While researching, we kindly ask you to refrain from:
Denial of service
Spamming
Social engineering (including phishing) of BuzzFeed staff or contractors
Any physical attempts against BuzzFeed property or data centers
Excluded report types
Trivial error page injection reports will not be accepted due to low risk and low security concern. An example of the kind of report we will not be accepting might be: a 404 page where it is possible to inject plain text via url manipulation with no links or active content.
HTTP Strict Transport Security (HSTS) reports will not be accepted due to low risk and low security concern. i.e. reports regarding the lack of the response header 'Strict-Transport-Security' and the value 'max-age=expireTime'.
Clickjacking vulnerabilities on static pages will no longer be accepted, as they do not present a credible security risk.
Reports of missing CSRF tokens require demonstration of an actual security exploit or vulnerability.
Reports of missing HTTP headers require demonstration of an actual security exploit or vulnerability that the header would protect against. This includes but is not limited to headers such as X-XSS-Protection or Content-Security-Policy.
Reports of self-reflective XSS requires demonstration of an actual security exploit or vulnerability.
Information disclosures regarding server versions and types require demonstration of an actual security exploit or vulnerability that is made possible by an attacker obtaining this information.
Reports of phishing by navigating browser tabs aka tabnabbing via manipulation of target="_blank" and manipulation of window.opener will not be accepted. See related information here. We agree with the assessment: "this class of attacks is inherent to the current design of web browsers and can't be meaningfully mitigated by any single website."
Reports of abandoned social media accounts from all users will not be accepted.
BuzzFeed reserves the right to modify the terms of this program or terminate this program at any time. Thank you for helping keep BuzzFeed and our users safe!
Domains
buzzfeed.com
buzzfeednews.com
tasty.co
huffpost.com