IN-SCOPE VULNERABILITIES WEB
We are interested in the following vulnerabilities:
- Business logic issues
- Payments manipulation
- Remote code execution (RCE)
- Injection vulnerabilities (SQL, XXE)
- File inclusions (Local & Remote)
- Access Control Issues (IDOR, Privilege Escalation, etc)
- Leakage of sensitive information
- Server-Side Request Forgery (SSRF)
- Cross-Site Request Forgery (CSRF)
- Cross-Site Scripting (XSS)
- Directory traversal
- Other vulnerability with a clear potential loss
OUT OF SCOPE: WEB VULNERABILITIES
Vulnerabilities found in out of scope resources are unlikely to be rewarded unless they present a serious business risk (at our sole discretion). In general, the following vulnerabilities do not correspond to the severity threshold:
- Vulnerabilities in third-party applications
- Assets that do not belong to the company
- Best practices concerns
- Recently (less than 30 days) disclosed 0day vulnerabilities
- Vulnerabilities affecting users of outdated browsers or platforms
- Social engineering, phishing, physical, or other fraud activities
- Publicly accessible login panels without proof of exploitation
- Reports that state that software is out of date/vulnerable without a proof of concept
- Reports that generated by scanners or any automated or active exploit tools
- Vulnerabilities involving active content such as web browser add-ons
- Most brute-forcing issues without clear impact
- Denial of service (DoS/DDoS)
- Theoretical issues
- Moderately Sensitive Information Disclosure
- Spam (sms, email, etc)
- Missing HTTP security headers
- Infrastructure vulnerabilities, including:
- Certificates/TLS/SSL-related issues;
- DNS issues (i.e. MX records, SPF records, DMARC records etc.);
- Server configuration issues (i.e., open ports, TLS, etc.)
- Open redirects
- Session fixation
- User account enumeration
- Clickjacking/Tapjacking and issues only exploitable through clickjacking/tap jacking
- Descriptive error messages (e.g. Stack Traces, application or server errors)
- Self-XSS that cannot be used to exploit other users
- Login & Logout CSRF
- Weak Captcha/Captcha Bypass
- Lack of Secure and HTTPOnly cookie flags
- Username/email enumeration via Login/Forgot Password Page error messages
- CSRF in forms that are available to anonymous users (e.g. the contact form)
- OPTIONS/TRACE HTTP method enabled
- Host header issues without proof-of-concept demonstrating the vulnerability
- Content spoofing and text injection issues without showing an attack vector/without being able to modify HTML/CSS
- Content Spoofing without embedded links/HTML
- Reflected File Download (RFD)
- Mixed HTTP Content
- HTTPS Mixed Content Scripts
- Manipulation with Password Reset Token
- MitM and local attacks
IN-SCOPE VULNERABILITIES MOBILE
We are interested in the following vulnerabilities:
- Business logic issues
- Payments manipulation
- Arbitrary code execution:
- Attacker gaining full control, meaning code can be downloaded from the network and executed
- Overwriting a .so file with a malicious .so file that is executed by the victim app
- Executing Java code in order to call exec and thus run arbitrary native ARM code
Tricking a user into installing an app and executing code within that app itself does not qualify.
- Injection vulnerabilities (SQL, XXE)
- File inclusions (Local & Remote)
- Access Control Issues (IDOR, Privilege Escalation, etc)
- Embedded third-party and cryptography secrets with a PoC demonstrating clear security impact
- Leakage of sensitive information. For the scope of this program, sensitive data is classified as:
- Data that results in unauthorized access to a user’s account (e.g. login credentials, authentication tokens that are able to perform sensitive state-changing actions that result in non-trivial damage to the victim).
- Sensitive user-generated data: contact list information, photos (unless made public by default), content of a user’s messages (email, instant messages, text messages), call/SMS logs, web history (being able to profile or enumerate a specific user based on their web history), or browser bookmarks.
- Information that is linked or linkable to an individual, such as medical, educational, financial or payment data, and employment information.
- Server-Side Request Forgery (SSRF)
- Cross-Site Request Forgery (CSRF)
- Cross-App Scripting:
- Theft of sensitive data via Cross-App Scripting, i.e. apps that load untrusted URLs from other apps into their WebViews that match a certain form (e.g., javascript:, file:///path/to/private, symlinks, custom deeplinks), allowing malicious JavaScript code execution, and code execution via JavaScript interfaces.
- Private data and files overwrite due to path traversal
- Other vulnerability with a clear potential loss
OUT OF SCOPE: MOBILE VULNERABILITIES
- Attacks requiring physical access to a user's device
- Tricking a user into installing a malicious app without READ_ EXTERNAL_ STORAGE or WRITE_ EXTERNAL_ STORAGE permissions that abuses a victim app to gain those permissions.
- Vulnerabilities that require root/jailbreak
- Vulnerabilities requiring extensive user interaction
- Vulnerabilities which affects EoL and outdated platforms
- Exposure of non-sensitive data on the device
- Reports from static analysis of the binary without PoC that impacts business logic
- Lack of obfuscation/binary protection/root(jailbreak) detection
- Bypass certificate pinning on rooted devices
- Lack of Exploit mitigations i.e., PIE, ARC, or Stack anaries
- Sensitive data in URLs/request bodies when protected by TLS
- Path disclosure in the binary
- OAuth & app secret hard-coded/recoverable in IPA, APK
- Sensitive information retained as plaintext in the device’s memory
- Crashes due to malformed URL Schemes or Intents sent to exported Activity/Service/Broadcast * Receiver (exploiting these for sensitive data leakage is commonly in scope)
- Any kind of sensitive data stored in-app private directory
- Runtime hacking exploits using tools like but not limited to Frida/ Appmon (exploits only possible in a jailbroken environment)
- Shared links leaked through the system clipboard
- Any URIs leaked because a malicious app has permission to view URIs opened.
- Exposure of API keys with no security impact (Google Maps API keys etc.)