follow us on twitter . like us on facebook . follow us on instagram . subscribe to our youtube channel . announcements on telegram channel



Author Topic: ICANN Bug Bounty  (Read 14484 times)

Angelina

  • Moderator
  • Experienced Member
  • *****
  • Posts: 357
    • View Profile
ICANN Bug Bounty
« on: July 20, 2023, 06:34:09 pm »
submit bug report: http://www.icann.org

ICANN looks forward to working with the community to find security vulnerabilities in order to keep our businesses and customers safe.
SLA
ICANN will make a best effort to meet the following SLAs for hackers participating in our program:
Time to first response (from report submit) - 5 business days
Time to triage (from report submit) - 10 business days We’ll try to keep you informed about our progress throughout the process.
Disclosure Policy
As this is a private program, please do not discuss this program or any vulnerabilities (even resolved ones) outside of the program without express consent from the organization
Follow HackerOne's disclosure guidelines
Program Rules
Please provide detailed reports with reproducible steps
Submit one vulnerability per report, unless you need to chain vulnerabilities to provide impact
Social engineering (e.g. phishing, vishing, smishing) is prohibited
Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service
Only interact with accounts you own or with explicit permission of the account holder.
Prohibited Actions
Uploading files that allow arbitrary commands ( e.g., a webshell)
Modifying any files or data, including permissions
Creating and maintaining a persistent connection to the server
Intentionally viewing any files or data beyond what is needed to prove the vulnerability
Failing to disclose any actions taken or applicable required information
Out of Scope Assets
ICANN has numerous assets which are out of scope due to the hosting provider
Verify the asset is in scope by checking the DNS records, as ICANN may have a redirect to an out of scope IP
Out of Scope Vulnerabilities
When reporting vulnerabilities, please consider (1) attack scenario / exploitability, and (2) security impact of the bug. The following issues are considered out of scope:
Clickjacking on pages with no sensitive actions
Unauthenticated/logout/login CSRF
Attacks requiring MITM or physical access to a user's device
Previously known vulnerable libraries without a working Proof of Concept
Comma Separated Values (CSV) injection without demonstrating a vulnerability
Missing best practices in SSL/TLS configuration
Missing best practices in SPF/DMARC/DKIM configuration
Content spoofing and text injection issues without showing an attack vector/without being able to modify HTML/CSS
Any activity that could lead to the disruption/denial of our service (DoS)
Except those that can be described as "CWE-20: Improper Input Validation" type
Availability and Denial of Service Bugs
The Availability environment score modifier has been set to “Low” for all in scope systems. Impact to Availability will not elevate a bug to a Critical level, only the scores for Confidentiality and/or Integrity can elevate a bug to the Critical rating.
If a bug were to achieve a Critical rating due to the Availability score being Low or High, the impact will be noted but it will not raise the total score to a Critical rating.
Valid bug submissions which center around Availability and fall under CWE-20 may have their severity manually adjusted to reflect compensating controls or processes that are not visible to the submitter.
This represents the organizations compensating controls and risk tolerance for Availability of services.
Safe Harbor
Any activities conducted in a manner consistent with this policy will be considered authorized conduct and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.
Failure to meet the above conditions and requirements may be considered a breach of responsible disclosure guidelines and eliminate any potential recognition of the submitted research contribution.
Thank you for helping keep ICANN and our users safe!