Have feedback on our program? Let us know here!
Global Payments is a Fortune 500 worldwide commerce ecosystem serving customers in over 100 countries! We have a team of 24,000 experts and innovators working to serve our customers—dedicated to solving complexity in commerce by providing simple, secure payments and software solutions that anticipate changing needs and carry our customers forward. We’re trusted in over 3.5 million customer locations and 1,300 financial institutions.
Global Payments Inc. (“Global Payments”) looks forward to working with the information security
community to find vulnerabilities in order to keep our businesses and customers safe. Please read this
Program Policy in its entirety.
The information security team at Global Payments is devoted to being a trusted security and assurance
partner across the enterprise.
Part of our vision is to develop and enable the organization to proactively identify and mitigate
information security risk to our assets and to evolve our core information security foundation. The VRP
will be a key element in achieving these goals.
You may not participate in the VRP if you are any of the following:
North Korea, Sudan, and Syria or Crimea, or a person designated in the U.S. Department of
the Treasury’s Specially Designated Nationals List.
family member (parent, sibling, spouse, or child) or household member of such an employee.
has worked in the past twelve (12) months with, Global Payments Inc. or a Global Payments
affiliate.
Global Payments will make a best effort to meet the following SLAs for security researchers participating
in the VRP:
| Type of Response | SLA in business days |
| ------------- | ------------- |
| First Response | 2 days |
| Time to Triage | 2 days |
| Time to Resolution | depends on severity and complexity |
We’ll try to keep you informed about our progress throughout the process.
All assets associated with our core enterprise are considered in scope. No VPN access nor credentials will be
provided for testing.
resolved ones) outside of the VRP without express consent from Global Payments.
Global Payments reserves the right to approve or deny any request for disclosure.
You agree to follow HackerOne's disclosure guidelines.
detailed to enable reproduction of the issue, the issue may not be triaged.
impact.
be fully reproduced).
Multiple vulnerabilities caused by one underlying issue will be treated as one valid report.
Social engineering (e.g. phishing, vishing, smishing) is prohibited.
Only interact with accounts you own or with explicit permission of the account holder.
Do not engage in any activity that can potentially or actually cause harm to Global Payments,
our customers, or our employees.
Payments’ services or assets.
required to prove that a vulnerability exists or to identify an indicator related to a
vulnerability.
Personally Identifiable Information (PII) is encountered, you should immediately halt your
activity, purge related data from your system, and contact Global Payments. This step
protects any potentially vulnerable data, and you.
When reporting vulnerabilities, please consider (1) attack scenario / exploitability, and (2) security
impact of the bug. The following issues are considered out of scope:
of concept
Any activity that could lead to the disruption of our service (DoS/DDOS).
Clickjacking on pages with no sensitive actions
Cross-Site Request Forgery (CSRF) on unauthenticated forms or forms with no sensitive
actions
Attacks requiring MITM or physical access to a user's device.
Previously known vulnerable libraries without a working Proof of Concept.
Comma Separated Values (CSV) injection without demonstrating a vulnerability.
Missing best practices in SSL/TLS configuration.
Content spoofing and text injection issues without showing an attack vector/without being
able to modify HTML/CSS
Rate limiting or bruteforce issues on non-authentication endpoints
Missing best practices in Content Security Policy
Missing HttpOnly or Secure flags on cookies
Missing email best practices (Invalid, incomplete or missing SPF/DKIM/DMARC records, etc.)
Vulnerabilities only affecting users of outdated or unpatched browsers (Less than 2 stable
versions behind the latest released stable version)
headers (e.g. stack traces, application or server errors).
Tabnabbing
Open redirect - unless an additional security impact can be demonstrated
Issues that require unlikely user interaction
Attempting any of the following could result in permanent disqualification from the VRP and possible
criminal and/or legal investigation. We do not allow any actions that could negatively impact the
experience on our websites, apps, or other assets for other Global Payments customers.
Disruption or denial-of-service attacks (Application and Network)
Social engineering attacks
Brute-force attacks
Exfiltration of data
Code injection on live systems
The compromise or testing of application accounts that are not your own
Any threats, attempts at coercion, or extortion of Global Payments employees, other partner
employees, or customers
Physical attacks against Global Payments, contractors, or customers
Any physical attempts against Global Payments property or data centers
Access the personal information of any other person without consent
Any other action that violates the law
Any action that endangers yourself or others
Aggressive vulnerability scans or automated scans on Global Payments servers (including
scans using tools such as Core Impact or Nessus)
You must otherwise comply with all applicable Federal, State, and local laws, regulations, and rules in connection with your security research activities. You may not engage in any security research or vulnerability disclosure activity that is inconsistent with terms and conditions of the VRP or the law. If you engage in any activities that are inconsistent with the terms and conditions of the VRP or the law, you will not be considered a security researcher and may be subject to criminal penalties and civil liability. Global Payments reserves all rights against any illegal use of the reported vulnerability information.
Any Global Payments information that you may encounter, view, acquire, or access, is owned by Global Payments or its customers, clients, or third-party providers. You have no rights, title, or ownership in any such information. Nothing in this Program Policy shall be deemed to constitute the grant to you of any license or other right to or in respect of any Global Payments or third-party product, service, patent, trademark, trade secret, or other intellectual property.
You have no obligation to provide Global Payments with the abovementioned security and vulnerability information. By submitting such information to Global Payments, you are indicating that you have read, understand, and agree to the terms and conditions of this Program Policy. Further, you agree that by submitting such information to Global Payments, even if the information is not eligible for a reward, you grant Global Payments a worldwide, perpetual, irrevocable, non-exclusive, transferable, sublicensable, fully-paid and royalty-free license under any and all intellectual property rights that you own or control to use, copy, modify, create derivative works based upon and otherwise exploit such information for any purpose.
Global Payments retains the right to obtain Personal Information (as defined in the HackerOne Privacy Policy)from HackerOne in the case of a significant security threat or incident to identify and resolve the security threat or incident. A 'significant security threat or incident' shall be defined by Global Payments in its sole discretion.
Additionally, Global Payments retains the right to obtain Personal Information from HackerOne, in Global
Payments’ sole discretion, to exercise or defend legal rights; to take precautions against liability; to protect the rights, property, or safety of Global Payments, of any other individuals, or of the general public; to maintain and protect the security and integrity of Global Payments’ assets or infrastructure; to protect Global Payments and our assets from fraudulent, abusive, or unlawful uses; or to investigate and defend Global Payments against third-party claims or allegations. By submitting a vulnerability report via the [Global Payments VDP (https://hackerone.com/global-payments) you consent to HackerOne sharing Personal Information with Global Payments, upon request, in the circumstances described in this paragraph.
Except where prohibited by law, this Policy, including all revisions and amendments thereto, is governed by the laws of the United States, State of Georgia, without regard to its conflict or choice of law principles which would require application of the laws of another jurisdiction.
Global Payments may modify the terms and conditions or terminate the VRP at any time.
Any activities conducted in a manner consistent with this policy will be considered authorized conduct and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.
Thank you for helping keep Global Payments and our users safe!
Scope Type | Scope Name |
---|---|
other | Heartland Payment Systems |
other | TSYS |
other | AdvancedMD |
other | GP eCom |
other | GPE |
other | UCS |
other | Bleep |
other | GP AUNZ |
other | Storman |
other | eWay |
other | Ezidebit |
other | Sentral |
other | Quickcliq |
other | GP Integrated |
other | PayGateway |
other | 3PointData / CX2 |
other | OpenEdge |
other | Cayan |
other | Callpop |
other | Global Payments Integrated |
other | Xenial (Xenial) |
other | SICOM |
other | Nextep |
other | Active Networks |
other | TouchNet |
other | Heartland Restaurant / Retail / Payroll / Human Capital Management (Get Hired) |
other | Greater Giving |
other | Micropayments |
other | Gaming |
other | ECSI |
other | Zego |
other | Commercia Global Payments |
other | MineralTree |
undefined | Analytics & Customer Engagement (ACE) |
Scope Type | Scope Name |
---|---|
other | Globalpaymentsinc.com and Globalpayments.com - OUT OF SCOPE |
This policy crawled by Onyphe on the 2021-03-30 is sorted as bounty.
FireBounty © 2015-2024