Banner object (1)

Hack and Take the Cash !

844 bounties in database
  Back Link to program      
20/10/2015
Kenna Security logo
Thanks
Gift
Hall of Fame
Reward

Reward

50 $ 

Kenna Security

About Our Platform

Kenna Security is a leader in risk-based vulnerability management. The Kenna Security Platform enables organizations to measure, prioritize, and predict cyber risk. Kenna leverages Cyber Risk Context Technology™ to track and predict real-world exploitations, focusing security and IT operations teams on what matters most.

Reward Range

Last updated 11 Nov 2019 21:23:33 UTC

Technical severity | Reward range
---|---
p1 Critical | $3,000 - $4,500
p2 Severe | $1,500 - $1,750
p3 Moderate | $150 - $300
p4 Low | $50 - $100

P5 submissions do not receive any rewards for this program.

Targets

In scope

Target name | Type
---|---
https://[your-subdomain].kennasecurity.com | Website
<https://www.kennasecurity.com> | Website
<https://api.kennasecurity.com> | API
Any Host Verified To Be Owned By Kenna (Domains/IP space/etc.) | Other

Out of scope

Target name | Type
---|---
Any Kenna Security Platform Subdomain Not Created By You | Website

Researcher Platform Sign-Up:
https://app.kennasecurity.com/signup?bugcrowd
DO NOT USE THE KENNA SECURITY SIGNUP PAGE WITHOUT ?bugcrowd IN THE URL.

Focus Areas:

  • Authentication and Authorization weaknesses.
  • Cross-account data leakage or unauthorized access
  • Stored/Reflected/DOM-based Cross-Site Scripting (XSS)
  • SQL Injection (SQLi)
  • Server-side Remote Code Execution (RCE)
  • Server-side Request Forgery (SSRF)
  • Broken access controls (insecure direct object references, etc.)

Out Of Scope:

  • Any testing/submissions against Kenna Security customer subdomains is strictly prohibited, not eligible for a reward.
  • Distributed Denial of Service and Application Level Denial of Service Attacks.
  • Accessible Non-sensitive files and directories (e.g., README.TXT, CHANGES.TXT, robots.txt, gitignore, etc.).
  • Social engineering/phishing attacks.
  • Self XSS.
  • Text injection.
  • Email spoofing (including lack of SPF, DKIM, From: spoofing, and visually similar, and related issues).
  • Descriptive error messages (e.g., stack traces, application or server errors, path disclosure).
  • Clickjacking and issues only exploitable through clickjacking. CSRF issues that don't impact the integrity of an account (e.g., login or out, contact forms and other publicly accessible forms) Lack of Secure and HTTPOnly cookie flags
  • Missing HTTP security headers.
  • TLS/SSL Issues, including BEAST BREACH, insecure renegotiation, bad cipher suite, expired certificates.
  • Out-of-date software.

Third-Party Bugs

If issues reported to our bug bounty program affect a third-party library, external project, or another vendor, Kenna Security reserves the right to forward details of the issue to that party without further discussion with the researcher. We will do our best to coordinate and communicate with researchers through this process.

Coordinated Disclosure Guidelines

We will investigate legitimate reports and make every effort to quickly correct any vulnerability. To encourage responsible reporting, we will not take legal action against you nor ask law enforcement to investigate you provided you comply with the following guidelines:

Coordinated Disclosure Guidelines

  • Provide details of the vulnerability, including information needed to reproduce and validate the vulnerability and a Proof of Concept (POC).
  • Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our services.
  • Do not modify or access data that does not belong to you.
  • Give Kenna Security a reasonable time to correct the issue before requesting an update or taking any additional action.

Program rules

This program follows Bugcrowd’s standard disclosure terms.

This program does not offer financial or point-based rewards for P5 — Informational findings. Learn more about Bugcrowd’s VRT.

In Scope

Scope Type Scope Name
other

Any Host Verified To Be Owned By Kenna (Domains/IP space/etc.)

web_application

https://[your-subdomain].kennasecurity.com

web_application

https://www.kennasecurity.com

web_application

https://api.kennasecurity.com

Out of Scope

Scope Type Scope Name
web_application

Any Kenna Security Platform Subdomain Not Created By You


This programe feature scope type like web_application.

FireBounty © 2015-2019

Legal notices