46829 policies in database
Link to program      
2022-04-01
SHEIN logo
Thank
Gift
HOF
Reward

Reward

SHEIN

SHEIN looks forward to working with the security community to find security vulnerabilities in order to keep our businesses and customers safe.

Response Targets

SHEIN will make a best effort to meet the following response targets for hackers participating in our program:

| Type of Response | SLA in business days |

| ------------- | ------------- |

| First Response | 2 days |

| Time to Triage | 2 days |

| Time to Bounty | 5 days |

We’ll try to keep you informed about our progress throughout the process.


Disclosure Policy


Program Rules

  • Please provide detailed reports with reproducible steps. If the report is not detailed enough to reproduce the issue, the issue will not be eligible for a reward.

  • Submit one vulnerability per-report, unless you need to chain vulnerabilities to provide impact.

  • When duplicates occur, we only award the first report that was received (provided that it can be fully reproduced).

  • Multiple vulnerabilities caused by one underlying issue will be awarded one bounty.

  • Social engineering (e.g. phishing, vishing, smishing) is prohibited.

  • Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with the explicit permission of the account holder.


Test Plan

Researchers are free to set up accounts for testing but please note that testing should be limited to the accounts you own. We also highly encourage you to register an account with your HackerOne Email alias [H1username@wearehackerone.com].


Important guidelines regarding cross-host vulnerabilities

Please note that .shein.com_ and _.romwe.com , (inclusive of each domain’s localised sites stated in the scope section) have overlapping backend development. This simply means that the same vulnerability occurring on .shein.com_ endpoint may also appear on a similar _.romwe.com endpoint . In such cases, the second report/asset to be submitted and is the same vulnerability will be eligible for 25% of the original bounty.

This guideline is also applicable to the SHEIN and ROMWE Mobile apps (inclusive of both the iOS and Android Apps). Ie: SHEIN iOS app has overlapping backend development with the ROMWE iOS app, while the SHEIN Android app has overlapping backend development with the ROMWE Android App. We will only apply this guideline if the reports are of the same exact issue.

Please read below for some example scenarios and how we will determine if 2 reports are cross-host vulnerabilities.

Example Scenario:

  • Report A submitted for .shein.com with Vulnerability X receives $400 in bounty.

  • Subsequently, Report B submitted for .romwe.com also with Vulnerability X is submitted to the program. Report B will be awarded $100 (25% of the original bounty for Vulnerability X).

Conditions and other terms:

  • Both reports do not have to come from the same researcher.

  • Both reports will be marked as triaged

  • When the same vulnerability occurs on both hosts, the first valid report submitted (for either host) will receive the original bounty amount

  • If the program receives a report on the other host, it will then be escalated to the SHEIN Team for internal validation, in the event that it is the same exact vulnerability.

  • In the case that the 2 reports are distinct unique vulnerabilities, the second report will be treated as a separate report and awarded accordingly.

  • Duplicate reports received thereafter will be treated as such.


Out of scope vulnerabilities

When reporting vulnerabilities, please consider (1) attack scenario / exploitability, and (2) security impact of the bug. The following issues are considered out of scope:

  • Reflected Cross-site Scripting (XSS)

  • DOM Cross-site Scripting (XSS)

  • Domain names belonging to SHEIN, however the DNS resolution was not deleted in time, thus resolving to other services.

    • Such reports will not be accepted as the sub-domain could not be exploited and taken over by attackers to host malicious content. If you are able to prove otherwise (taking over the sub-domain and host malicious content), we will consider the report to be valid.
  • Domain names belonging to SHEIN, but resolves to third-party hosted services.

    • Code/configuration related vulnerabilities belonging to third-parties and requiring their fix will not be accepted as SHEIN does not have permissions to modify them. Such vulnerabilities should be reported to the relevant third party.
  • Clickjacking on pages with no sensitive actions

  • Cross-Site Request Forgery (CSRF) on unauthenticated forms or forms with no sensitive actions

  • Attacks requiring MITM or physical access to a user's device.

  • Previously known vulnerable libraries without a working Proof of Concept.

  • Comma Separated Values (CSV) injection without demonstrating a vulnerability.

  • Missing best practices in SSL/TLS configuration.

  • Any activity that could lead to the disruption of our service (DoS).

  • HTML Injection.

  • Rate limiting or bruteforce issues, unless it is for brute-forcing of a pass token with insufficient entropy (e.g. 6 digit passcode without invalidation and rate-limiting)

  • Missing best practices in Content Security Policy.

  • Missing HttpOnly or Secure flags on cookies

  • Missing email best practices (Invalid, incomplete or missing SPF/DKIM/DMARC records, etc.)

  • Vulnerabilities only affecting users of outdated or unpatched browsers [Less than 2 stable versions behind the latest released stable version]

  • Software version disclosure / Banner identification issues / Descriptive error messages or headers (e.g. stack traces, application or server errors).

  • Public Zero-day vulnerabilities that have had an official patch for less than 1 month will be awarded on a case by case basis.

  • Tabnabbing

  • Open redirect - unless an additional security impact can be demonstrated

  • Issues that require unlikely user interaction


Safe Harbor

Any activities conducted in a manner consistent with this policy will be considered authorized conduct and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.

Thank you for helping keep SHEIN and our users safe!

In Scope

Scope Type Scope Name
android_application

com.zzkko

android_application

com.romwe

ios_application

878577184

ios_application

1080248000

web_application

*.shein.com

web_application

*.romwe.com


This program crawled on the 2022-04-01 is sorted as bounty.

FireBounty © 2015-2024

Legal notices | Privacy policy