Welcome to the Lazada public program. We know you want to start hunting ASAP. However, we also do not want you to miss out important information in the program rules. To make it easier, we have summarized key ideas for the different sections. Note: It should not be seen as a substitute for reading the actual text!
This section lists rules/requirements on specific vulnerabilities:
This section contains:
We have a long list of non-qualifying vulnerabilities. Please have a second look before submitting your reports. Repeated submissions from non-qualifying vulnerabilities would be marked as "Invalid" and result in deduction of points
Last but not least, please append to your user-agent header the following value: 'LZD_YWH_BBP_PUBLIC'.
Participants are permitted to perform any tests and investigations on the systems, as long as they act in good faith and respect the scope and rules described below.
Please read the following rules carefully, especially the information regarding the scopes of this program and the corresponding reporting requirements.
We are happy to thank everyone who submits valid reports which help us improve the security of Lazada. However, only those that meet the following eligibility requirements may receive a monetary reward:
Reports about vulnerabilities are examined by our security analysts. Our analysis is always based on worst case exploitation of the vulnerability, as is the reward we pay.
Demonstrating impact on RCE/SQLi/SSRF: Please use the following approved actions for your PoC. If we would like you to go further, we will mention it directly on your report
Domain variation: The following domains lead to different applications sharing the same code base and subject to "OneFixOneReward".
( www | pages | checkout | store | cart | member | member-m | my | my-m | acs-m | sellercenter | m.sellercenter | nest.sellercenter | api.sellercenter | gsp | bms ).lazada.(com.my|com.ph|co.id|co.th|vn|sg)
Subdomain takeover without interaction on a production environment will be considered as max CVSS High
Example: A subdomain takeover can be used to perform a external resource hijacking (JavaScript file for example) which will be loaded on another domain, no interaction is needed by victim user to execute this malicious JS.
Subdomain takeover with interaction on a production environment will be considered as max CVSS Medium
Example: A subdomain takeover can be performed but it's only visible if a victim user visits this domain.
Subdomain takeover, DNS dangling, Cache Poisoning...: If you find multiple similar issues across multiple scopes at the same time, we recommend submitting all the affected assets in a single report. We will, on a case-to-case basis, consider increasing the bounty amount accordingly.
Discovered vulnerabilities must not have any impact on other users' activities, or modify the application. E.g. : stored XSS should use console.log() instead of the usual alert(), confirm(), prompt()
Authorization bypass / IDOR: We would only consider cross-seller (two different shops) vulnerabilities to be valid or of higher severity. Please use two separate Seller accounts from two different shops for this purpose as seller accounts belonging to the same shop are treated as having the trust of the shop to a certain extent.
We are mostly focusing on HIGH and CRITICAL vulnerabilities.
Here are a few example of practical impacts that we would rate as MAX CRITICAL (max $10000):
Here are some examples of practical impacts that we would rate as CRITICAL (max $3000) :
Here are some examples of practical impacts that we would rate as HIGH (max $1600):
Some scoped assets contain multiple applications with different security and business impacts. These scopes will be marked with the security requirements: (+++), (++), (+). A vulnerability on these scopes will be determined by its corresponding impact.
Eg: A vulnerability discovered on .lel.global* that has no direct impact on our customers, vendors or Lazada capabilities will be processed as the scope .lel.global (+)* and rewarded based on Reward grid for other Applications (+).
For the list of known subdomains and their corresponding reward grids, please refer to: known-subdomains.txt
Impact: Direct impact on our customers or vendors
Rating | CVSS score | Bounty |
---|---|---|
None | 0.0 | $0 |
Low | 0.1 - 3.9 | $0 |
Medium | 4.0 - 6.9 | $200 - 400 |
High | 7.0 - 8.9 | $800 - 1600 |
Critical | 9.0 - 10.0 | $2000 - 3000 |
MAX Critical | 9.0 - 10.0 | $3000 - 10000 |
Impact: Indirect impact on our customers or vendors, but direct impact on Lazada capabilities
Rating | CVSS score | Bounty |
---|---|---|
None | 0.0 | $0 |
Low | 0.1 - 3.9 | $0 |
Medium | 4.0 - 6.9 | $100 - 200 |
High | 7.0 - 8.9 | $400 – 800 |
Critical | 9.0 - 10.0 | $1600 - 2000 |
Impact: No direct impact on our customers, vendors, or Lazada capabilities
Rating | CVSS score | Bounty |
---|---|---|
None | 0.0 | $0 |
Low | 0.1 - 3.9 | $0 |
Medium | 4.0 - 6.9 | $50 - 100 |
High | 7.0 - 8.9 | $200 – 400 |
Critical | 9.0 - 10.0 | $800 - 1000 |
Scope Type | Scope Name |
---|---|
android_application | https://play.google.com/store/apps/details?id=com.lazada.android&hl=en_SG |
android_application | https://play.google.com/store/apps/details?id=com.sc.lazada&hl=en_SG |
ios_application | https://apps.apple.com/us/app/lazada-best-shopping-online/id785385147 |
ios_application | https://apps.apple.com/sg/app/lazada-seller-center/id1315605408 |
web_application | *.lazada.(sg|vn|co.id|co.th|com|com.ph|com.my) (+++) |
web_application | *.lazada.(sg|vn|co.id|co.th|com|com.ph|com.my) (++) |
web_application | *.lazada.(sg|vn|co.id|co.th|com|com.ph|com.my) (+) |
web_application | *.redmart.com (+++) |
web_application | *.redmart.com (++) |
web_application | *.redmart.com (+) |
web_application | *.lel.asia (+++) |
web_application | *.lel.asia (++) |
web_application | *.lel.asia (+) |
web_application | *.lex.(co.id|com.my|in.th|ph|vn) (+++) |
web_application | *.lex.(co.id|com.my|in.th|ph|vn) (++) |
web_application | *.lex.(co.id|com.my|in.th|ph|vn) (+) |
web_application | *.lazada-seller.cn |
web_application | *.lazlogistics.(co.id|in.th|sg|vn|my|ph) |
Scope Type | Scope Name |
---|---|
undefined | In-scope subdomains that are running 3rd party services (i.e. SaaS). When in doubt, please raise a report to confirm the application is in scope |
undefined | *-lel-(vn|id|in|th|ph|my|sg)-stg.lazada.(vn|id|in|th|ph|my|sg) |
undefined | *.pickmee.(vn|id|in.th|ph|my|sg) |
undefined | sellercenter.lazada.(sg|vn|co.id|co.th|com|com.ph|com.my) User Management Access Control issues within the same shop |
web_application | sellersupport.redmart.com |
web_application | fms.lazada.com |
Firebounty have crawled on 2021-06-01 the program Lazada on the platform Yeswehack.
FireBounty © 2015-2025