Open-Xchange is a leading provider of communication, security and productivity platforms. We are committed to a borderless Internet that is open, safe and free, allowing users to protect their own data and privacy. To achieve this goal, we build open-source software, which is the sole scope of this bounty program. OX App Suite is our SaaS-based web service to collaborate and manage business information.
Since our APIs and source code are both publicly documented and exposed, we rely on strong authentication, crypto implementations and do not support the concept of security by obscurity. At the same time, we're delivering our software in a way that it comes with secure defaults. For this program, we offer access to a hosted sandbox and also invite you to install our software on your premises for research, contribution and usage.
We also run bug-bounty programs for our other products:
Moreover you must avoid:
Vulnerabilities which have already been reported to us (including reports received outside YesWeHack, for example from -customers or penetration tests) are considered as "Duplicate" in case they describe a similar attack type, regardless of which component is affected.
The triage team will use the "One Fix One Reward" process: if two or more endpoints use the same code base and a single fix can be deployed to fix all the others weaknesses, only one endpoint will be considered as eligible for a reward and other reports will be closed as Informative. We reward based on vulnerability, not per endpoint.
We are happy to thank everyone who submits valid reports which help us improve the security of App Suite, however, only those that meet the following eligibility requirements may receive a monetary reward.
In the context of this program, we do not intend to encourage, accept or reward reports of leaks that are not applicable to our program scope and identified outside of our program scope, such as:
Also, in order not to encourage dark and grey economies, in particular the purchase, resale and trade of identifiers or stolen information, as well as all types of dangerous behavior (e.g. social engineering, ...), we will not accept or reward any report based on information whose source is not the result of failure on the part of our organization or one of our employees.
This excludes, but is not limited to:
Source of leak is in-scope | Source of leak belongs to Open-Xchange but is out-of-scope | Source of leak does not belong to Open-Xchange and is out-of-scope | |
---|---|---|---|
Impact is in-scope (e.g. valid credentials on an in-scope asset) | Eligible | Eligible | Not Eligible |
Impact is out-of-scope (e.g. valid credentials for an out-of-scope asset) | Eligible | Not Eligible | Not Eligible |
As a complement to the program rules and testing policy :
We're offering a hosted sandbox environment for you to execute research using shared accounts. Please note that other researchers may access and use your data on a shared account. The environment will reset each Sunday at 06:00 UTC, so please make sure to keep backups of your research.
Mail delivery on this environment is inbound and local-only, which means you cannot send mail to external addresses. However, you can send E-Mail to the accounts, between the accounts as well as using IMAP and SMTP to connect to the mailbox using the same host and credentials as used for web access. Furthermore no anti-virus or anti-spam solution is being used to ease research.
You can obtain user-level access to the sandbox installation using credentials from the list below.
Access is controlled through user-accounts, like "user.one@sandbox-1.open-xchange.com". Besides the obvious representation as an E-Mail Address, this format has semantics which are valuable to know for your research.
The @ is a user and "context" (tenant) delimiter, where the first part represents the user account and the second part defines the context. All users within the same context can "see" each other within the application, but are separated from other contexts. As an example, "user.one@sandbox-1.open-xchange.com" and "user.one@sandbox-2.open-xchange.com" are two fully separated user accounts, while "user.one@sandbox-1.open-xchange.com" and "user.two@sandbox-1.open-xchange.com" can work together within the same context and are supposed to access shared data.
Using UA identifier tokens of popular CalDAV/CardDAV/WebDAV clients (e.g. "Lightning" or "DataAccess") will internally redirect requests at https://sandbox.open-xchange.com/ to our DAV servlet rather than providing access to the web interface. For research, you can use https://sandbox.open-xchange.com/servlet/dav directly. Using https://sandbox.open-xchange.com/servlet/webdav.infostore grants access to WebDAV based file access to "Drive".
You can use on-premise installations of our software free of charge and have a look at its inner workings. We expect that you're using up-to-date versions of our software and related services, hardened configurations as well as a set of strong credentials.
Learn more from overviews and guides at https://oxpedia.org/ and find an installation script at https://gitlab.open-xchange.com/qa/ox-installer. Technical documentation is provided at https://documentation.open-xchange.com/.
Source-code can be cloned via Git from our public GitLab repositories:
Mind that each component has various integration points, APIs and subcomponents that are in scope. Mind that not all repositories are in scope for this program (See: "Out-Of-Scope"). Please refer to our documentation to learn more.
We use CWE, CVE, CVSS to rate and categorize vulnerabilities. Any vulnerability will be publicly disclosed after sufficient time has passed for operators to deploy updates. Advisories use CSAF and will be published on our update sites, mailing-lists and external mailing-lists like fulldisclosure. Please understand that we handle the full disclosure process and expect that you do not disclose any findings yourself, we will include researcher credits if requested.
Scope Type | Scope Name |
---|---|
api | https://sandbox.open-xchange.com |
undefined | GitLab and GitHub repos listed on this page |
web_application | https://sandbox.open-xchange.com |
Scope Type | Scope Name |
---|---|
undefined | All domains which are not listed as "Scopes", especially any production system operated by customers |
undefined | Everything that is not directly related to the application or source-code in scope (e.g. GitHub, domain settings) |
undefined | The components "imageconverter", "documentconverter", "spellchecker" and "cacheservice" are temporarily out of scope. |
undefined | Antivirus and anti-spam filtering on the sandbox environment, this has been disabled to avoid research disruption |
This program have been found on Yeswehack on 2023-01-16.
FireBounty © 2015-2025