46829 policies in database
Link to program      
2020-04-22
2020-04-24
Amazon Vulnerability Research Program logo
Thank
Gift
HOF
Reward

Reward

Amazon Vulnerability Research Program

Amazon Vulnerability Research Program (VRP) - Program Policy

Introduction

At Amazon, we take security and privacy very seriously. If you believe that you have found a security vulnerability that affects any Amazon product or service, please report it to us. You may report a vulnerability using the “Submit Report” button on this page. Reports that fall within scope of Amazon’s Vulnerability Research Program (VRP) are also eligible for a reward. We appreciate your efforts in helping protect customer trust and make Amazon more secure.

For vulnerabilities related to Amazon Web Services (AWS), please visit the AWS Vulnerability Reporting page.

What is VRP?

Amazon’s Vulnerability Research Program (VRP) is an initiative driven and managed by Amazon’s Information Security team.

Who Can Participate in the Program

Amazon customers and security researchers who discover a potential security finding within Amazon products or services can report it to the VRP program.

Amazon employees and contractors, as well as their immediate family members are strictly prohibited from participating in the public bounty program, or sharing information with an external security researcher to bypass this prohibition (in which case all parties are ineligible under this program).

How VRP Program Works

  • Security researchers and customers of Amazon are encouraged to report any behavior impacting the information security posture of Amazon products and services.

  • If you are performing research, you are required to use your own accounts and are not authorized to access or otherwise interact with other people’s accounts or data. If, during your testing, you discover a vulnerability that could allow you to bypass an authentication control and gain access to another account, you should report the vulnerability but not take further action with the other account or its data.

  • Document your findings thoroughly, providing steps to reproduce and send your report to us.

  • Reports with complete vulnerability details, including screenshots or video, are essential for a quick response.

  • We will contact you to confirm that we’ve received your report and trace your steps to reproduce your research.

  • We will work with the affected teams to validate the report.

  • We will issue bounty awards for eligible findings. To be eligible for rewards, reports must comply with all parts of this policy and you must be the first to report the issue to us. You must be 18 or older to be eligible for an award.

  • We will notify you of remediation and may reach out for questions or clarification. You must be available to provide additional information if needed by us to reproduce and investigate the report.

  • We will work with the affected teams to make necessary improvements and remediation.

  • Qualified researchers who will regularly submit high quality findings can be added to Amazon Private Program (invited researchers only).

Services and Products in Scope

Bounty eligible findings are limited to following marketplaces and mobile apps:

(Note: Please check Scopes section for complete details on latest in-scope assets)

All international retail marketplaces

  • Brazil: amazon.com.br

  • Canada: amazon.ca

  • Mexico: amazon.com.mx

  • United States: amazon.com

  • China: amazon.cn

  • India: amazon.in

  • Japan: amazon.co.jp

  • Singapore: amazon.sg

  • Turkey: amazon.com.tr

  • United Arab Emirates: amazon.ae

  • France: amazon.fr

  • Germany: amazon.de

  • Italy: amazon.it

  • Netherlands: amazon.nl

  • Spain: amazon.es

  • Sweden: amazon.se

  • United Kingdom: amazon.co.uk

  • Australia: amazon.com.au

  • Android and iOS Retail Apps (MShop)

 Android: com.amazon.mShop.android.shopping

 iOS: amazon-shopping-297606951

Security issues discovered in the AWS IP Space (https://ip-ranges.amazonaws.com/ip-ranges.json) are not in scope for Amazon Vulnerability Research Program. As an infrastructure provider, AWS customers operate assets in this space. Discovering and testing against AWS and AWS customer assets is strictly out of scope for Amazon Vulnerability Research Program and against the AWS AUP (https://aws.amazon.com/aup/).

You are not authorized to test any asset, domain, or IP address outside the scope of the Amazon Vulnerability Research Program. Individuals who otherwise become aware of an out-of-scope vulnerability may report the security finding for our review. If the researcher is not able to demonstrate the impact on bounty eligible assets then that finding will not be considered for the rewards.

Reports of zero-day vulnerabilities (vulnerabilities that were not previously known to the security community) within in-scope services and products will be eligible for an award at our discretion if the report provides significant insight that assists Amazon's security teams with remediation efforts, or has not previously been identified by another researcher on our own vulnerability response program.

Rules of Engagement

  • Provide details of the vulnerability finding, including information needed to reproduce and validate the report

  • Do not attempt to conduct post-exploitation, including modification or destruction of data, and interruption or degradation of Amazon services

  • Do not attempt to perform brute-force attacks, denial-of-service attacks

  • Do not compromise or test Amazon accounts that are not your own

  • Do not attempt to target Amazon employees or its customers, including social engineering attacks, phishing attacks or physical attacks

  • This applies even if it appears to be an automated chat system.

  • Do not perform physical attacks against any Amazon facility

  • Do not threaten or try to extort Amazon. Do not act in bad faith and make ransom requests. You should simply report the vulnerability to us.

  • Please make sure to use the User-Agent string amazonvrpresearcher_yourh1username while testing

  • Except as applied to CVE-2021-44228, limited usage of automated scanners/tools is allowed with above User-Agent applied and scanners/tools must be configured to not send more than 5 requests per second to any particular service. Use of automated scanners/tools for CVE-2021-44228 testing is prohibited.

  • Please note, use of scanning tools without the User-agent string amazonvrpresearcher_yourh1username may result in your account/IP getting blocked by automated protections. It can take time to reinstate these so please make sure to include it.

  • If you encounter user information that is not your own in the course of your research, please stop and report this activity to our team so we can investigate. Please report to us what information was accessed and delete the data. Do not save, copy, transfer, or otherwise use this data. Continuing to access another person’s data may be regarded as evidence of a lack of good faith.

NOTE: Please do not use 3rd party sites when doing testing (for instance, <yourdomains>@xss.ht) - we understand the use case (and value of this testing), but ask that when doing blind XSS (or any) testing, that you only utilize assets that you explicitly own (and control) yourself. While we support blind XSS (SSRF, etc.) testing, please make sure that all of it goes through domains on you have control over. Thanks!

For other Types of Issues

  • For unknown, suspicious, or fraudulent purchases, orders, or credit card transactions, suspicious password changes, account changes, or potential fraud please contact Customer Service.

  • For Amazon Web Services (AWS) related issues, please report via click here.

  • To report Copyright Infringement related issues, please report via click here.

Creating Accounts for Vulnerability Research

Please create accounts using a HackerOne email to help us track security research activity. You can create accounts on Amazon by using <yourh1username@wearehackerone.com>

Also, while testing please forward the string amazonvrpresearcher_yourh1username in your User-Agent header. You can create match and replace proxy rule in Burp by going to Proxy >> Options >> Match and Replace with the following options:

Type: Request header

Match: ^User-Agent.*$

Replace: User-Agent: amazonvrpresearcher_yourh1username

Legal Safe Harbor

Amazon will not bring any legal action against anyone who makes a good faith effort to comply with program policies, or for any accidental or good faith violation of this policy. This includes any claim under the Digital Millennium Copyright Act (DMCA) for circumventing technological measures to protect the services and applications eligible under this policy.

As long as you comply with this policy:

  • We consider your security research to be "authorized" under the Computer Fraud and Abuse Act and related laws. This limited authorization does not provide you with authorization to access company data or another person’s account.

  • We waive any restrictions in our applicable Terms of Service and Acceptable Use Policy that would prohibit your participation in this program in accordance with the terms of, for the limited purpose of your security research under this policy.

Amazon cannot authorize any activity on third-party products or guarantee they won’t pursue legal action against you. We aren’t responsible for your liability from actions performed on third parties.

Don’t do anything illegal or unethical. You are responsible for complying with local laws, restrictions, regulations, etc.

To protect your privacy, we will not, unless served with legal process or to address a violation of this policy:

  • Share your PII with third parties

  • Share your research without your permission

  • Share your HackerOne points, or participation without your permission

If Your Account is Banned or Blocked by Vulnerability Research Activities

  • Follow on-screen instructions when you log in into your Amazon account for recovery

  • Be prepared with a recent card statement available to prove ownership

  • The account will typically be restored within 24 hours

Research Guidance

Reference HackerOne guidance on writing quality reports:

  • https://docs.hackerone.com/hackers/quality-reports.html

  • https://www.hacker101.com/sessions/good_reports

Responsible Disclosure Policy

Thank you for joining us in supporting ethical and responsible disclosure. By participating in this program, you agree not to share publicly or privately any details or descriptions of your findings with any party. Do not threaten or attempt to extort Amazon.

Amazon commits to timely remediation of your findings, and prompt response to relevant questions.

In-Scope Vulnerabilities

| | Vulnerability | Severity Range |

|---------- |------------ |-------- |

| 1 | Remote Code Execution | Critical |

| 2 | SQL Injection | High - Critical |

| 3 | XXE | High - Critical |

| 4 | XSS | Medium - High |

| 5 | Server-Side Request Forgery | Low - Critical |

| 6 | Directory Traversal - Local File Inclusion | Medium - High |

| 7 | Authentication/Authorization Bypass (Broken Access Control) | Medium - High |

| 8 | Privilege Escalation | Medium - High |

| 9 | Insecure Direct Object Reference | Medium - Critical |

| 10 | Misconfiguration | Low - High |

| 11 | Web Cache Deception | Low - Medium |

| 12 | CORS Misconfiguration | Low - Medium |

| 13| CRLF Injection | Low - Medium |

| 14 | Cross Site Request Forgery | Low - Medium |

| 15 | Open Redirect | Low - Medium |

| 16 | Information Disclosure | Low - Medium |

| 17 | Request smuggling | Low – Medium |

| 18 | Mixed Content | Low |

Non-eligible Vulnerabilities

| | Vulnerability |

|---------- |------------ |

| 1 | Subdomain Takeover |

| 2 | Clickjacking |

| 3 | Self XSS |

| 4 | Email Spoofing - SPF Records Misconfiguration |

Out-of-Scope Issues

  • Security Practices where other mitigating controls exist i.e. missing security headers, etc.

  • Social Engineering, Phishing

  • Physical Attacks

  • Missing Cookie Flags

  • CSRF with minimal impact i.e. Login CSRF, Logout CSRF, etc.

  • Content Spoofing

  • Stack Traces, Path Disclosure, Directory Listings

  • SSL/TLS controls where other mitigating controls exist

  • Banner Grabbing

  • CSV Injection

  • Reflected File Download

  • Reports on Out of dated browsers

  • Reports on outdated version/builds of in-scope Mobile Apps

  • DOS/DDOS

  • Host header Injection without a demonstrable impact

  • Scanner Outputs

  • Vulnerabilities on Third-Party Products

  • User Enumeration

  • Password Complexity

  • HTTP Trace Method

  • Discovering and testing against AWS customer assets

Out-of-Scope Assets

| Category| Asset |

|------------|----------------------------- |

| Physical Stores | Amazon Go Mobile Apps, Whole Foods Apps, anything related to Physical Stores will be out-of-scope |

|AWS | All AWS related services and products will be out-of-scope - See AWS security reporting at https://aws.amazon.com/security/vulnerability-reporting/|

In Scope

Scope Type Scope Name
android_application

com.amazon.mShop.android.shopping

ios_application

297606951

other

Other Amazon Retail Sites (Please only actively test explicitly stated scope)

other

Other Amazon Retail Mobile Apps (Please only actively test explicitly stated scope)

other

Amazon Retail Subsidiaries (Please only actively test explicitly stated scope)

other

Other Amazon Retail Assets (Please only actively test explicitly stated scope)

web_application

https://smile.amazon.*

web_application

https://flex.amazon.*

web_application

https://logistics.amazon.*

web_application

https://org.amazon.*

web_application

www.amazon.*

web_application

https://primenow.amazon.*

web_application

https://pay.amazon.*

web_application

https://fresh.amazon.*

web_application

https://photos.amazon.*

web_application

https://prime.amazon.*

web_application

https://music.amazon.com

web_application

https://manufacturing.amazon.*

web_application

https://freight.amazon.*

web_application

https://shopbylook.amazon.*

web_application

chat.amazon.com

web_application

https://affiliate-program.amazon.com

web_application

https://track.amazon.com

web_application

https://api.amazon.com

web_application

https://manufacturing.amazon.com

web_application

https://www.amazon.com/dppui/*

web_application

https://www.amazon.com/gp/buy/*

web_application

www.amazon.com/cpe/yourpayments/wallet

web_application

https://www.amazon.com/amazoncash

web_application

apay-us.amazon.com

web_application

payments.amazon.*

Out of Scope

Scope Type Scope Name
web_application

https://amazongames.com/

web_application

https://www.twitch.tv/

web_application

https://tsologic.com/

web_application

Amazon Web Services (AWS)


This program crawled on the 2020-04-22 is sorted as bounty.

FireBounty © 2015-2024

Legal notices | Privacy policy