Exploit Disclosure and submission process.
Last Updated: Tuesday, 01 January 2017 02:43AM v091bh12
We always worked closely with Security Researches and awarded bug bounties to address possible and confirmed vulnerabilities.
We determine in our discretion whether a reward should be granted and the amount of the reward - in particular we may choose to pay higher rewards for unusually clever or severe vulnerabilities or lower rewards for vulnerabilities that require significant or unusual user interaction. This is not a contest or competition.
Rewards may be provided on an ongoing basis so long as this program is active.
Reporting Possible Vulnerabilities
-
You must report a qualifying vulnerability through email or phone to be eligible for a monetary reward.
-
If you have an issue that affects only your own (account) please supply exact steps to reproduce the vulnerability
- If you are researching security issues, especially those which may compromise the privacy of others, please use test accounts in order to respect our users’ privacy. When demonstrating a vulnerability, please do so in an unobtrusive manner to avoid drawing public attention to the vulnerability. Vulnerabilities that are exposed publicly as a part of putting together a proof of concept (e.g. website defacement, stored XSS on a public site) are not eligible for bounty.
Report Template
Please be aware that the quality of your report is critical to your submission. Your report must contain the following items:
- What type of issue are you reporting?
- Is it CWE or OWASP issue?
- How does a user reproduce your issue? (If this contains more than a few steps, please create a video so we can attempt to perform the same steps).
- What is the impact of your issue?
- What are some scenarios where an attacker would be able to leverage this vulnerability?
- What would be your suggested fix?
Eligibility and Responsible Disclosure
Only those that meet the following eligibility requirements may receive a monetary reward:
- You must be the first reporter of a vulnerability.
- The vulnerability must be a qualifying vulnerability (see below) associated with a site or application in scope (see above).
Accepted Issue Types:
- Cross Site Scripting (XSS)
- Cross Site Request Forgery (CSRF)
- Remote Code Execution (RCE)
- Unauthorized Access to Protected Areas
Non-Qualifying Vulnerabilities:
- Attacks requiring physical access to a infrastructure component or device
- Forms missing CSRF tokens (we require evidence of actual CSRF vulnerability)
- Logout CSRF
- Password and account recovery policies, such as reset link expiration or password complexity
- Invalid or missing SPF (Sender Policy Framework) records
- Content spoofing / text injection
- Issues without clearly identified security impact, such as clickjacking on a static website, missing security headers, or descriptive error messages