Mendix looks forward to working with the security community to find vulnerabilities in order to keep our businesses and customers safe.
Maintaining the security of our applications and networks is a high priority for Mendix. If you have information related to security vulnerabilities of Mendix products and services, please submit a report in accordance with the guidelines below.
The vulnerabilities identified in the HackerOne reports will be classified using CVSSv3 (https://www.first.org/cvss/specification-document).
Please ensure you sign up using your wearehackerone domain and for testing to avoid us blocking you.
Do not try to further pivot into the network by using a vulnerability. The rules around Remote Code Execution (RCE), SQL Injection (SQLi), and FileUpload vulnerabilities are listed below.
Do not try to exploit service providers we use, prohibited actions include, but are not limited to bruteforcing login credentials of Domain Registrars, DNS Hosting Companies, Email Providers and/or others. The Firm does not authorize you to perform any actions to a non-Mendix owned property/system/service/data.
If you encounter Personally Identifiable Information (PII) contact us at security@mendix.com immediately. Do not proceed with access and immediately purge any local information, if applicable.
Please limit any automated scanning to 60 requests per second. Aggressive testing that causes service degradation will be grounds for removal from the program.
Mendix will make a best effort to meet the following SLAs for hackers participating in our program:
| Type of Response | SLA in business days |
| ------------- | ------------- |
| First Response | 2 days |
| Time to Triage | 2 days |
| Time to Resolution | depends on severity and complexity |
We’ll try to keep you informed about our progress throughout the process.
As this is a private program, please do not discuss this program or any vulnerabilities (even resolved ones) outside of the program without express consent from the organization.
Mendix will not be publicly disclosing reports at this time. If and when Mendix does disclose a report, it will be mutually agreed upon with the hacker.
Mendix reserves the right to deny any request for public disclosure.
Please provide detailed reports with reproducible steps. If the report is not detailed enough to reproduce the issue, the issue may not be marked as triaged.
Submit one vulnerability per report, unless you need to chain vulnerabilities to provide impact.
When duplicates occur, we only triage the first report that was received (provided that it can be fully reproduced).
Multiple vulnerabilities caused by one underlying issue will be treated as one valid report.
Social engineering (e.g. phishing, vishing, smishing) is prohibited.
Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with the explicit permission of the account holder.
Please note: Multiple vulnerabilities caused by one underlying issue will be awarded one bounty.
You must comply with all applicable Federal, State, and local laws in connection with your security research activities or other participation in this vulnerability disclosure program.
You agree that You shall not, without the prior written consent of Mendix in each instance (i) use in advertising, publicity or otherwise the name of Mendix or its Affiliates or any trade name, trademark, trade device, service mark, symbol or any abbreviation, contraction or simulation thereof owned by Mendix or its Affiliates, or (ii) represent, directly or indirectly, any service or work provided by You as approved or endorsed by Mendix or its Affiliates.
You agree that any and all information acquired or accessed by You as part of this exercise is strictly confidential to Mendix and You shall hold the Confidential Information in strict confidence and shall not copy, reproduce, sell, assign, license, market, transfer or otherwise dispose of, give or disclose such information to third parties or use such information for any purposes other than for the performance of your work.
You acknowledge and agree that any and all information you encounter is owned by Mendix or its third party providers, clients or customers. You have no rights, title or ownership to any information that you may encounter.
Mendix may modify the terms of this policy or terminate the policy at any time.
By clicking Submit Report, you consent to Your Information being transferred to and stored in the United States and acknowledge that you have read and accepted the Terms, Privacy Policy and Disclosure Guidelines presented to you when you created your account.
Please use your own account for testing or research purposes. Do not attempt to gain access to another user’s account or confidential information.
Please do not test for spam, social engineering or denial of service issues. Your testing must not violate any law, or disrupt or compromise any data that is not your own.
Vulnerabilities which allow execution of code on the application server or shell command on the server itself should be run in accordance to this policy.
Prohibited actions when conducting RCE attempts:
Altering or uploading files on the web server. (In case of file-upload functionality upload of webshells is prohibited, try uploading echo, info or any variable/info-based invocation code)
Altering file permissions
Reading sensitive files on the system (e.g /etc/shadow) and/or snooping through the file/folder structure (Same applies to XXE, LFI and Path Traversal, or any other vulnerability which allows you to read underlying file/folder structure)
Altering/Modifying/Deleting any files on the system.
Copying any files from the system and disclosing them to a non Mendix site or entity
Interacting with underlying OS-level data and/or databases.
Interacting with other services running on the OS-level and/or any remote hosts residing on the network.
Interrupting the normal operation of the server.
Any type of establishment for persistent connection mechanisms (netcat, ssh reverse tunnel, etc) are prohibited.
Allowed actions when conducting RCE attempts - Unix:
Executing 'ifconfig', 'hostname', 'whoami', 'uptime', 'top' or any metrics commands
Reading content of the '/etc/passwd' file
Using 'echo' to pipe characters into a file located in the "/tmp/", reading the file and then removing it right after confirmation.
Allowed actions when conducting RCE attempts - Windows:
Executing 'ipconfig', 'hostname', 'whoami' or any metrics commands
Reading content of the 'drive:/boot.ini', 'drive:/install.ini' or 'drive:/Windows/System32/drivers/etc/networks'
Using 'echo' to pipe characters into a file located in the drive:/temp, reading the file (type) and then removing it right after confirmation.
Vulnerabilities which allow injection of attacker controlled parts of the SQL query should be run in accordance to this policy.
Prohibited actions when conducting SQLi attempts:
Reading sensitive files on the system (e.g /etc/shadow) and/or snooping through the file/folder structure (SELECT LOAD_FILE)
Reading specific sensitive database records
Creating/Altering/Modifying/Deleting any files/records on the system/database. This includes use of INTO OUTFILE
Command Execution (xp_cmdshell, uploading .so or any action that leads to command execution)
Creating/Deleting Users
Reading/Altering Username and Password information (includes password hashes)
Interrupting the normal operation of the server and the database.
Allowed actions when conducting SQLi attempts:
Executing SELECT queries such as "@@version", "user();" "system_user();", "database();", "@@hostname"
Listing Databases names from schema, listing Columns, Table names
Executing Mathematical, conversion or logical queries, such as:
ASCII Value -> Char (SELECT char(65); # returns A)
Char -> ASCII Value (SELECT ascii(‘A’); # returns 65)
String Concatenation (SELECT CONCAT(‘A’,'B’,'C’); # returns ABC)
Case Statement (SELECT CASE WHEN (1=1) THEN ‘A’ ELSE ‘B’ END; # returns A)
SELECT 0×414243; # returns ABC
Time Delay (SELECT BENCHMARK(1000000,MD5(‘A’)); SELECT SLEEP(5); )
Using Logic and time in Server Responses
Using output responses
Vulnerabilities which allow upload of files through any means (f.g PUT HTTP Method, File-upload functionality/module., etc.) are subjected to these rules
Prohibited actions when conducting File-upload attempts:
Altering/Modifying/Deleting/Replacing any files on the system. (f.g. defacement)
Uploading files to the account of a user which is not owned by you and you are not authorized by (does not apply to system users or web users like www-data f.g)
Uploading files which deliberately introduce additional exploitation vectors (f.g html code with cross-site scripting code on it etc.)
Uploading files which can cause Denial of Service (f.g. over-sized files or unlimited amount of files resulting in running out of Disk Quota)
Allowed actions when conducting File-upload attempts:
Chained exploitation vectors allowing you to jump out from the upload folder using f.g. path traversal or path manipulation that do not violate prohibited actions mentioned in File-Upload Policy.
Upload of a file (any extension) with no content, simple string, integer or a special character.
Reports from automated tools or scans
Reports affecting outdated browsers
Denial of Service or brute force attacks
Issues without clearly identified security impact (such as clickjacking on a static website) or
speculative theoretical exploitability
lack of security headers, missing flags on cookies, descriptive errors, server/technology
disclosure - without clear and working exploit)
presence/misconfigurations in these.
AngularJS (without clear and working exploit)
Self-exploitation (cookie reuse, self cookie-bomb, self denial-of-service etc.)
Self Cross-site Scripting vulnerabilities without evidence on how the vulnerability can be used
to attack another user
Lack of HTTPS
Reports about insecure SSL / TLS configuration
Password complexity requirements, account/email enumeration, or any report that discusses
how you can learn whether a given username or email address has a Mendix-related account
Presence/Lack of autocomplete attribute on web forms/password managers.
Server Banner Disclosure/Technology used Disclosure
CSRF on logout or insignificant functionalities
Publicly accessible login panels
Clickjacking
CSS Injection attacks. (Unless it gives you the ability to read anti-CSRF tokens or other sensitive
information)
Tabnabbing
Host Header Injection (Unless it gives you access to interim proxies)
Cache Poisoning
Reflective File Download
Cross-Origin Resource Sharing (CORS) Access-Control-Allow-Origin: * or accepting of custom
Origin header that does not specifically show a valid attack scenario
scenario - for example stealing CSRF-tokens)
which do not specifically show a valid attack scenario
improperly scoped
Open ports which do not lead directly to a vulnerability unless it is an unsecure port
Our policies on presence/absence of SPF / DKIM / DMARC records
Lack of DNS CAA and DNS-related configurations
Social engineering of Mendix employees or contractors
Any physical/wireless attempt against Mendix property or data centers
Open redirects
Wp-admin related issues
cool-accp.mendix.com
cool.mendix.com
compass-cbc-accp.mendix.com
compass-cbc.mendix.com
maat-accp.mendix.com
maat.mendix.com
oscar-accp.mendix.com
oscar.mendix.com
dhb-abco2-accp.mendix.com
dhb-abco2.mendix.com
mijndsi-test.mendix.com
mijndsi.mendix.com
create-it-accp.mendix.com
create-it.mendix.com
angelaweb-accp.mendix.com
angelaweb.mendix.com
freedomfood-test.mendix.com
freedomfood.mendix.com
dnb-cdp-accp.mendix.com
dnb-cdp.mendix.com
drs.dnb.com
mrpayout-test.mendix.com
mrpayout.mendix.com
i2-dhbtt-accp.mendix.com
i2-dhbtt.mendix.com
compass-klachtafhandeling.mendix.com
brokerportal.mendix.com
www.lvbroker.co.uk
nza-zorgfraude-accp.mendix.com
nza-zorgfraude.mendix.com
compass-osf-accp.mendix.com
postnl-integrator-accp.mendix.com
postnl-integrator.mendix.com
shell-accp.mendix.com
shell.mendix.com
yahoodecisionmaker.mendix.com
Any activities conducted in a manner consistent with this policy will be considered authorized conduct and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.
Thank you for helping keep Mendix and our users safe!
Scope Type | Scope Name |
---|---|
web_application | *.mendix.com |
web_application | event.us-east-1.sws.siemens.com |
web_application | o0pv3l7chl.execute-api.us-east-1.amazonaws.com/dev |
web_application | gateway.us-east-1.sws.siemens.com |
web_application | servicemanagement-accp.mendixcloud.com |
web_application | poh0v3odoi.execute-api.eu-central-1.amazonaws.com |
web_application | https://react.vis.pre2.usea1.devops.sws.siemens.com/sample/dist/index.html |
web_application | 3dvis.mendixcloud.com |
web_application | slm.store.mendix.com |
web_application | contributor.mendixcloud.com |
web_application | dealservice.mendixcloud.com |
web_application | dataprivacy.mendixcloud.com |
web_application | datalake-sync.apps.mendix.com |
web_application | alm.mendixcloud.com |
web_application | deskallocation.mendixcloud.com |
web_application | simplate.mendixcloud.com |
web_application | mxpeople.mendixcloud.com |
web_application | employees.mendix.com |
web_application | 3s.mendixcloud.com |
web_application | revenuedatahub.mendixcloud.com |
web_application | mxbpconfig.mendixcloud.com |
web_application | provisioning.servicemanagement.mendix.com |
web_application | k8s-licbrk-licenseb-11d216e80e-384217420.eu-central-1.elb.amazonaws.com |
web_application | *.timeseries.com |
web_application | *.timeseries.nl |
web_application | *.timeseriesgroup.com |
web_application | marketplaceadmin.mendixcloud.com |
web_application | https://i1tv7nddaa.execute-api.eu-central-1.amazonaws.com/prod |
This policy crawled by Onyphe on the 2021-03-29 is sorted as bounty.
FireBounty © 2015-2024