45466 policies in database
Link to program      
2018-04-11
2018-11-30
Chatwork logo
Thank
Gift
HOF
Reward

Reward

1000 ¥ 

Chatwork

Rules

Only test for vulnerabilities on application stipulated in scope section. Any vulnerabilities reported on applications out-of-scope are not eligible for bounty rewards.


This is a production environment. Do not create account more than necessary to perform tests, and please delete your account as soon as you finished your tests.

Please note that you should only perform tests against account you created, never other users account.

To be eligible for a bounty reward under this program you must to follow the rules stipulated above.


Any vulnerability test against domains out-of-scope are explicitly prohibited.

Any violation on the Terms of Service of the “BugBounty.jp” and/or performance of DoS (Denial of Service) attack or equivalent act that can degrade the performance of our service are also explicitly prohibited. ### Scope

Web applicationNameChatwork アプリケーションURL * https://www.chatwork.com/ * https://go.chatwork.com/

Domain * www.chatwork.com * go.chatwork.com * appdata.chatwork.com * assets.chatwork.com * front.chatwork.com * recruit.chatwork.com

iOS applicationNameChatworkURL * https://itunes.apple.com/jp/app/id463672966

Domain * www.chatwork.com

Android applicationNameChatworkURL * https://play.google.com/store/apps/details?id=jp.ecstudio.chatworkandroid

Domain * www.chatwork.com

Eligible For Bounty

  • Command Injection up to 100,000yen
  • Remote Code Execution up to 100,000yen
  • SQL Injection up to 100,000yen
  • Cross-Site Scripting up to 75,000yen
  • Authentication up to 50,000yen
  • Server-Side Request Forgery (SSRF) up to 47,000yen
  • other up to 30,000yen
  • Cross-Site Request Forgery (CSRF) up to 20,000yen
  • Path Traversal up to 13,000yen
  • Privilege Escalation up to 11,000yen
  • HTTP Response Splitting up to 11,000yen
  • Forced Browsing up to 11,000yen
  • Cleartext Transmission of Sensitive Information up to 11,000yen
  • Information Disclosure up to 5,000yen
  • Open Redirect up to 5,000yen
  • Session Fixation up to 5,000yen

Not Eligible For Bounty

  • Self XSS
  • Issues found through automated testing
  • Report without POC
  • Open Redirect with host header
  • Misconfiguration of SPF record, DMARC and DKIM
  • CSRF on logout
  • API Rate Limiting
  • Lack of autocomplete attribute on password form(s)

Notes

For eligibility details, please refer to the "Terms of Service Article 4" of this site.

In Scope

Scope Type Scope Name
android_application

https://play.google.com/store/apps/details?id=jp.ecstudio.chatworkandroid

android_application

www.chatwork.com

ios_application

https://itunes.apple.com/jp/app/id463672966

ios_application

www.chatwork.com

web_application

https://www.chatwork.com/

web_application

https://go.chatwork.com/

web_application

www.chatwork.com

web_application

go.chatwork.com

web_application

appdata.chatwork.com

web_application

assets.chatwork.com

web_application

front.chatwork.com

web_application

recruit.chatwork.com


Firebounty have crawled on 2018-04-11 the program Chatwork on the platform Bugbounty.Jp.

FireBounty © 2015-2024

Legal notices | Privacy policy