Banner object (1)

Hack and Take the Cash !

790 bounties in database
  Back Link to program      
21/07/2016
Fiat Chrysler Automobiles logo
Thanks
Gift
Hall of Fame
Reward

Reward

150 $ 

In Scope

Scope Type Scope Name
android_application https://play.google.com/store/apps/details?id=com.fcagroup.us.uconnect
android_application https://play.google.com/store/apps/details?id=com.acn.uconnectmobile&hl=en
android_application https://play.google.com/store/apps/details?id=com.acn.uc&hl=en
ios_application https://itunes.apple.com/us/app/uconnect/id1229236724?mt=8
ios_application https://itunes.apple.com/pl/app/panda-uconnect/id1117321678?mt=8
ios_application https://itunes.apple.com/gb/app/uconnect-live/id881830261?mt=8
other Vehicle Head Units, TPMS sensors, remote keyless entry, and any other system that is present in a hardware product that you own or are authorized to test against
web_application www.driveuconnect.com
web_application www.driveuconnect.eu

Out of Scope

Scope Type Scope Name
web_application m.driveuconnect.eu

Fiat Chrysler Automobiles

Fiat Chrysler Automobiles values engaging third party researchers to improve our products making them safer and more reliable. We have committed to formal recognition and compensation for discovery of reproducible and legitimate vulnerabilities, provided they are disclosed responsibly. Our goal with the Bug Bounty project is to foster a collaborative relationship with researchers to participate in responsible disclosure of vulnerabilities in FCA’s vehicles and connected services.

Responsible Disclosure Guidelines:

We will investigate legitimate reports and make every effort to correct any valid vulnerability as quickly as possible. In the spirit of encouraging responsible disclosure and reporting, we will not take legal action against nor ask law enforcement to investigate researchers participating in the program provided their compliance with the following Responsible Disclosure Guidelines:

  • Provide full details of the vulnerability, including information needed to reproduce and validate the issue by producing Proof of Concept (code, technical demos of vulnerability, or necessary steps needed to demonstrate your finding)
  • Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our services
  • Do not modify, access, or retain data that does not belong to you

This program is focused on the security of FCA’s connected vehicles, including the systems within them, and the external services and applications that interact with them.

Only the targets below are in scope -- DO NOT test anything outside of the specific domains/targets listed here:

Targets

In scope

Target name | Type
---|---
Vehicle Head Units, TPMS sensors, remote keyless entry, and any other system that is present in a hardware product that you own or are authorized to test against | Other
www.driveuconnect.com | Website
<https://play.google.com/store/apps/details?id=com.fcagroup.us.uconnect> | Android
<https://itunes.apple.com/us/app/uconnect/id1229236724?mt=8> | iOS
<https://itunes.apple.com/pl/app/panda-uconnect/id1117321678?mt=8> | iOS
<https://itunes.apple.com/gb/app/uconnect-live/id881830261?mt=8> | iOS
[https://play.google.com/store/apps/details?id=com.acn.uconnectmobile&hl=en](https://play.google.com/store/apps/details?id=com.acn.uconnectmobile&hl=en) | Android
[https://play.google.com/store/apps/details?id=com.acn.uc&hl=en](https://play.google.com/store/apps/details?id=com.acn.uc&hl=en) | Android
www.driveuconnect.eu | Website

Out of scope

Target name | Type
---|---
m.driveuconnect.eu | Other

Only the above domains and applications are in scope for the program. If the domain is not explicitly listed here, it is not considered in scope for the program and should NOT be tested.

Access

  • Before doing any testing that requires a Uconnect account, please create a test account that ends in @bugcrowdninja.com so that we know your activities are part of the Bug Bounty Program.

  • You can register for a new Uconnect account at: https://www.mopar.com/en-us/sign-in.html

This program uses a modified version of the standard priority guidelines presented in Bugcrowd's Vulnerability Rating Taxonomy.

The following finding types are specifically excluded from the bounty:

  • We appreciate the high volume of submissions for XSS. We are temporarily removing this vulnerably from scope as we work to fix those issues
  • Denial of Service attacks against any piece of FCA Infrastructure.
  • Cross Site Request Forgery on non-authenticated pages
  • Certificate strength issues
  • Error messages (Descriptive or otherwise)
  • HTTP Error pages
  • Public service disclosure, such as banner pages
  • Service Disruptions
  • Public files or directories, (e.g. robots.txt)
  • Clickjacking and issues only exploitable through clickjacking
  • Web browser functionality controlled by the client, such as saved passwords and auto completion
  • Login or Forgot Password page brute force and account lockout not enforced
  • Vulnerabilities identified with automated tools (including web scanners) that do not include POC code or a demonstrated exploit
  • Physical, social engineering, and phishing attempts

Fiat Chrysler Automobiles websites not affiliated with connected vehicle platforms, including brand, blog, and social media sites are explicitly out of scope. This includes brand sites, dealer websites, or marketing sites. Some examples of out-of scope sites are listed below; this is by no means an exhaustive list.

  • fcagroup.*
  • chrysler.*
  • dodge.*
  • fiat.*
  • fcaspace.*
  • alfaromeo.*
  • lancia.*
  • fiatprofessional.*
  • fiat-fleet.*
  • fcafleet-business.*
  • maserati.*
  • abarth.*
  • jeep.*
  • jeep-official.*
  • ram.*
  • mopar.*
  • blog.jeep.com
  • dealerconnect.chrysler.com
  • moparvehicleprotection.com
  • drivesrt.com
  • abarthcars.co.uk

The website list below that are linked in DriveUconnect are Out-Of-Scope including all brands site (different for country and language)

  • Alfa Romeo
  • Fiat
  • FiatProfessional
  • Jeep
  • Lancia
  • Abarth
  • TomTom
  • Aftersales.fiat.com
  • Mopar.eu
  • http://chrysler.ptcmanaged.com/

Program rules

This program follows Bugcrowd’s standard disclosure terms.

This program does not offer financial or point-based rewards for P5 — Informational findings. Learn more about Bugcrowd’s VRT.

FireBounty © 2015-2019

Legal notices