52235 policies in database
Link to program      
2021-03-29
Federal Reserve logo
Thank
Gift
HOF
Reward

Federal Reserve

As the nation’s central bank, the Federal Reserve has 12 regional Reserve Banks working together with the Federal Reserve’s Board of Governors in Washington, D.C., to support a healthy economy. The Fed ensures our nation’s financial system is safe and sound and provides a secure and efficient way to transfer funds electronically.

Maintaining a strong information security posture is crucial to maintaining the ongoing mission of the Federal Reserve. Working with the security research community strengthens this posture, and this Vulnerability Disclosure Program (VDP) seeks to foster this partnership by simplifying responsible disclosure reporting and feedback channels.

Response Targets

The Federal Reserve will make a best effort to meet the following Service Level Agreements (SLAs) for reported vulnerabilities:

| Type of Response | SLA in business days |

| ------------- | ------------- |

| First Response | 1 days |

| Time to Triage | 2 days |

Resolution time depends on severity and complexity. Progress updates will be provided through the process as appropriate.

Disclosure Policy

The Federal Reserve commits to acknowledging disclosed vulnerabilities promptly and working with the security research community to mitigate or remediate weaknesses.

The Federal Reserve asks participating security researchers to:

  • Provide the Federal Reserve reasonable time to fix reported issue before disclosing issues to outside parties

  • Not publicly disclose vulnerabilities or related details without explicit written authorization from the Federal Reserve

  • Not include sensitive or identifying data in any public disclosures

  • Adhere to the HackerOne disclosure guidelines

Additional policy details may be found in the root-level /.well-known/security.txt file on some Federal Reserve domains.

Program Rules

  • Avoid mass scanning Federal Reserve domains. Offending IP addresses may be blocked.

  • Please provide detailed reports of the process you used and vulnerabilities identified with reproducible steps. If the report is not detailed enough to reproduce the issue, the issue may not be marked as triaged.

  • Submit one vulnerability per report, unless you need to chain vulnerabilities to provide impact.

  • When duplicates occur, the Federal Reserve only triages the first report that was received (provided it can be fully reproduced).

  • Multiple vulnerabilities caused by one underlying issue will be treated as one valid report.

  • Do not engage in social engineering (e.g., phishing, vishing, smishing).

  • Avoid violating individual privacy rights, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with explicit permission of the account holder.

  • Do not exploit beyond what is necessary to demonstrate vulnerability presence.

  • Avoid accessing content of communications, data, or information on Federal Reserve information systems except to the extent that information directly relates to the vulnerability and is necessary to prove the vulnerability exists.

  • Do not store or share non-public data obtained through testing except to the extent necessary to communicate the finding to the Federal Reserve.

  • Do not submit a high-volume of low-quality reports.

  • If you are uncertain whether to continue testing, please engage with our team at federal-reserve-program@hackerone.com.

Scope

In-Scope Targets

Any publicly-accessible system owned, operated, or controlled by the Federal Reserve System or Federal Reserve Banks, including any Federal Reserve owned web applications or services hosted on those systems.

Federal Reserve Bank sites use non-government top-level domains such as .com, .org, .net, etc.

Federal Reserve Bank domains include, but are not limited to:

  • federalreserveonline.org, etc.

  • atlantafed.org, etc.

  • bostonfed.org, etc.

  • chicagofed.org, etc.

  • clevelandfed.org, etc.

  • dallasfed.org, etc.

  • kansascityfed.org, etc.

  • minneapolisfed.org, etc.

  • newyorkfed.org, etc.

  • philadelphiafed.org, etc.

  • richmondfed.org, etc.

  • sanfranciscofed.org, etc.

  • stlouisfed.org, etc.

Out-of-Scope Targets

This VDP applies to the private sector Federal Reserve Banks (generally .com and .org sites) and not the public sector Federal Reserve Board of Governors (.gov sites).

The following are beyond the scope of this VDP:

  • *.gov

  • This includes any United States government system, application, or service such as those pertaining to the Federal Reserve Board of Governors or the United States Department of the Treasury

  • People, including Federal Reserve employees, contractors, and vendors

  • Physical assets, including Federal Reserve property, facilities, and physical security controls

  • Federal Reserve Board of Governors

Activities

In-Scope Activities

Activities are limited exclusively to:

  • Testing to detect a vulnerability or identify an indicator related to a vulnerability

  • Sharing or receiving Federal Reserve information about a vulnerability or an indicator related to a vulnerability

All testing activities should abide by relevant laws

Header identification:

Sometimes abnormal traffic can be considered malicious. Please provide the following header to allow us to correctly identify your traffic:

  • VDP-HackerOne-Researcher: username

  • Also, please append HackerOne/username to the User Agent String

Out-of-Scope Activities

  • Do not harm the Federal Reserve, its customers, employees, or contractors

  • Do not intentionally compromise the privacy or safety of Federal Reserve personnel or any third parties

  • Do not intentionally compromise the intellectual property or other commercial or financial interests of any Federal Reserve personnel or entities, or any third parties

  • Do not exfiltrate or retain any data or sensitive information under any circumstances

  • Do not detrimentally compromise/alter, or destroy Federal Reserve or customer data

  • Do not perform physical testing

  • Do not perform social engineering, including phishing

  • Do not perform denial of service testing, including resource exhaustion

  • Do not hijack or intentionally disrupt legitimate user sessions

  • Do not degrade the quality of Federal Reserve assets, resources, or information

  • Do not conduct or initiate fraudulent financial transactions

  • Do not perform automated scanning

Vulnerabilities

In-Scope Vulnerabilities

All vulnerabilities are in scope for disclosure excepting those explicitly listed as out-of-scope below.

Out-of-Scope Vulnerabilities

When reporting vulnerabilities, please consider (1) attack scenario / exploitability, and (2) security impact of the bug. The following issues are considered out of scope:

  • Clickjacking on pages with no sensitive actions

  • Cross-Site Request Forgery (CSRF) on unauthenticated forms or forms with no sensitive actions

  • Attacks requiring Man in the Middle (MITM) or physical access to a user's device.

  • Previously known vulnerable libraries without a working Proof of Concept.

  • Comma Separated Values (CSV) injection without demonstrating a vulnerability.

  • Missing best practices in SSL/TLS configuration without proof of concept/demonstrating a vulnerability.

  • Any activity that could lead to the disruption of service (DoS) for the Federal Reserve

  • Content spoofing and text injection issues without showing an attack vector/without being able to modify HTML/CSS

  • Rate limiting or bruteforce issues on non-authentication endpoints

  • Missing best practices in Content Security Policy without demonstrating a vulnerability.

  • Missing HttpOnly or Secure flags on cookies not related to authentication or sessions

  • Missing email best practices (invalid, incomplete or missing SPF/DKIM/DMARC records, etc.)

  • Vulnerabilities only affecting users of outdated or unpatched browsers (More than 2 stable versions behind the latest released stable version)

  • Software version disclosure / banner identification issues / descriptive error messages or headers (e.g. stack traces, application or server errors).

  • Tabnabbing (persuading users to submit login details and passwords by impersonating a Federal Reserve website)

  • Open redirect - unless an additional security impact can be demonstrated

  • Issues that require unlikely user interaction unless an additional security impact can be demonstrated

Safe Harbor

We understand the reluctance some researchers have to share information about vulnerabilities they find because of the potential for criminal or civil liability. To encourage responsible research and disclosure of security vulnerabilities, we do not intend to assert claims under the Computer Fraud and Abuse Act or claims of trespass or similar legal theories against researchers who undertake in good faith to test our systems for vulnerabilities and who bring their findings promptly to our attention. You are expected, as always, to comply with all laws applicable to you and not to disrupt or compromise any data beyond what this VDP permits.

We reserve the right in our sole discretion to determine whether your actions are taken in good faith, are consistent with this policy, or are an inadvertent violation. Please contact us before engaging in conduct that you think may be inconsistent with or unaddressed by this policy. Your efforts to proactively contact us before engaging in any action inconsistent with or unaddressed by this policy will be an important factor in our determination.

Thank you for helping keep the Federal Reserve and our users safe!

In Scope

Scope Type Scope Name
web_application

federalreserveonline.org

web_application

atlantafed.org

web_application

bostonfed.org

web_application

chicagofed.org

web_application

clevelandfed.org

web_application

dallasfed.org

web_application

kansascityfed.org

web_application

minneapolisfed.org

web_application

newyorkfed.org

web_application

philadelphiafed.org

web_application

richmondfed.org

web_application

frbsf.org

web_application

stlouisfed.org

web_application

alfred.stlouisfed.org

Out of Scope

Scope Type Scope Name
web_application

*.gov

web_application

https://www.federalreserve.gov/


This program have been found on Hackerone on 2021-03-29.

FireBounty © 2015-2024

Legal notices | Privacy policy