Welcome! Airbnb is committed to building and protecting the world's most trusted community. If you believe you have discovered a potential security vulnerability with Airbnb's online systems, we appreciate your help in disclosing the issue to us responsibly.
We ask the security research community to give us a reasonable opportunity to correct a vulnerability before publicly disclosing it. Please submit a detailed description of the issue and the steps you believe may be required to reproduce what you have observed. In doing so, please take the utmost care to protect our users' privacy, data confidentiality, and integrity. The privacy of our community is crucial, and we very much value your assistance in preserving it. Please understand that we cannot work with anyone who violates applicable laws or regulations, attempts to exploit a security issue, or access other user’s data.
Upon receipt of your report, we promise to review and address any security issues in a timely manner and to communicate with you during our investigation and upon resolution. Provided that you’ve made a good faith effort to abide by this policy, we will not take legal action against you or ask law enforcement to investigate you.
This program is dedicated to perceived online security issues that may affect many people on Airbnb. If you're having issues related to your individual account, then please visit our Help Center.
Certain vulnerabilities with a working proof of concept on some of our Android mobile app(s) may qualify for an additional bounty through the Google Play Security Rewards Program. To see which apps and vulnerabilities may qualify for a bounty, please refer to the Google Play Security Rewards Program’s Scope and Vulnerability Criteria.
Program Scope
Highest Impact Scope
Lower Impact Scope
Special Testing Requirements
Luckey Testing Requirements
HotelTonight Testing Requirements
Urbandoor Testing Requirements
Program Rules
Out of Scope Vulnerabilities (no reward)
Applicable to HotelTonight
Applicable to Luckey Homes
Eligibility
Rewards
Other Information
*.airbnb.com
All localized airbnb sites (e.g., es.airbnb.com
, it.airbnb.com
)
These properties are considered to have lower security impact on our users since they should not have access to Airbnb user sessions and generally cannot access user data. The bounties given for reports on these properties will therefore be significantly lower.
*.atairbnb.com
*.withairbnb.com
*.airbnbcitizen.com
*.airbnb.org
*.byairbnb.com
*.muscache.com
*.airbnb-aws.com
*.luxuryretreats.com
*.airbnbopen.com
demo.urbandoor.com
provider.demo.urbandoor.com
admin.demo.urbandoor.com
luckey.in
luckey.fr
luckey.es
luckey.ca
luckey.app
luckey.com
luckey.partners
hoteltonight-test.com
api.hoteltonight-test.com
places.hoteltonight-test.com
Hackerone testers can only browse the public login pages. We do not provide or approve Luckey Homes test accounts.
If you create a lead (contact form, signup, “estimate income modal = POST on /new_lead), please pass an additional parameter source with value luckey_test” This is executed at the end of the lead creation form on luckey.*.
If you post directly on the API endpoints, then add source=luckey_test
in your POST payload
Or browse to https://luckey.fr/?utm_source=luckey_test to automatically add source=luckey_test
to your post payloads.
If you skip this Testing Requirement, then you will be in violation of our program rules, and not eligible for bounty reward.
The above steps do not result in a test account. They simply allow you to test some functionality without causing disruption to our internal business support team.
Researchers can create customer accounts and book hotel rooms (test bookings) using a fake credit card on our staging environment, which doesn’t send out any emails notifications (activation or confirmation) to customers.
Hotel Tonight Mobile Web App
Hotel Tonight Mobile APIs
Mobile APIs that power our mobile apps are located at:
api.hoteltonight-test.com
places.hoteltonight-test.com
Hotel Tonight Cities and Inventory
On our staging environment, you should search for following cities to look for hotels:
San Francisco
Las Vegas
New York City
Hotel Tonight Access
You can create customer accounts using your emails (no activation emails will be sent), and use the following credit card for test booking a hotel room: - 4111111111111111 (Visa) with any expiration date in the future. Additional test payment methods available at https://developers.braintreepayments.com/reference/general/testing/ruby#credit-card-numbers (use only American Express, Discover, JCB, Mastercard, or Visa). All test bookings are not real bookings. We also suppress all emails for test bookings, so no email receipts will be sent to whatever email address is entered.
Hotel Tonight Credentials
Researchers will need to self-provision the customer accounts by signing up using their email on our mobile web app. You will not get any activation email from our staging environment.
Do NOT create requests and bookings at www.urbandoor.com or other urbandoor environments. We no longer approve or provide test accounts, requests or bookings in any urbandoor environment. You may browse our demo environments for vulnerabilities, but we no longer have a test account creation workflow.
Do not mass create accounts to perform testing against Airbnb applications and services.
Do not perform brute force testing to determine whether rate limiting is in place for particular APIs or pieces of functionality.
Social engineering (e.g. phishing, vishing, smishing) is prohibited.
Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.
Only interact with accounts you own or with explicit permission of the account holder.
Blocked Accounts: There are no guarantees we will be able to unblock any restricted account activity. You may submit a request for us to investigate and unblock your account through Hackerone. The Airbnb InfoSec team will review your request and notify you if any further action is taken.
Amounts below are the minimum we will pay per category. We aim to be fair; all reward amounts are at our discretion.
No testing on real user data permitted for any Urbandoor, Hotel Tonight, or Gaest assets.
When reporting vulnerabilities, please consider the attack scenario, exploitability, and security impact of the bug. The following issues are considered out of scope, and we will NOT accept any of the following types of attacks:
Denial of service attacks
Phishing attacks
Social engineering attacks
Reflected file download
Software version disclosure
Issues requiring direct physical access
Issues requiring exceedingly unlikely user interaction
Flaws affecting out-of-date browsers and plugins
Publicly accessible login panels
CSV injection
Email enumeration / account oracles
CSP Weaknesses
Email Spoofing
Content redaction bypasses where the redacted content is replaced by the string (Hidden by Airbnb)
(other content redaction vulnerabilities are in scope)
Techniques allowing you to view user profile photos (these are considered public)
Broken links or unclaimed social media accounts (unless chained with an impactful exploit)
hoteltonight.com
hoteltonight.build
Our partners site (partners.hoteltonight.com
)
iOS mobile app
Single Sign On (Google or Facebook). This doesn’t work reliably on our staging environment
Do not send questions/requests to their customer support team for help with your testing. This is considered an interruption to the business.
Airbnb reserves the right to decide if the minimum severity threshold is met, and whether the vulnerability was previously reported. Rewards are granted entirely at the discretion of Airbnb.
To qualify for a reward under this program, you should:
Be the first to report a vulnerability.
Send a clear textual description of the report along with steps to reproduce the vulnerability.
Include attachments such as screenshots or proof of concept code as necessary.
Disclose the vulnerability report directly and exclusively to us.
A good bug report should include the following information at a minimum:
List the affected endpoints, URL(s), and any additional parameters
Directions so we can reproduce the finding to verify the vulnerability
Full written details of the finding
Our maximum bounty is $15,000 USD.
Reward amounts may vary depending upon the severity, difficulty to exploit, and impact of the vulnerability reported. Please allow up to 2 weeks from time of triage to receive your bounty. The following table outlines the average rewards for specific classes of vulnerabilities:
|Vulnerability Type|Average Bounty for high-priority asset|Average Bounty for lower-priority asset|
|-------------------|-----------------|-----------------|
| Remote Code Execution (RCE) | $15,000 | $5,000 |
| SQL Injection | $10,000 | $3,000 |
| Significant Authentication Bypass | $5,000 | $1,500 |
| Server Side Request Forgery (SSRF) | $3,500 | $1,000 |
| Local file Inclusion | $2,500 | $750 |
| Stored Cross Site Scripting | $3,500 | $500 |
| Reflected/Other Cross Site Scripting | $2,500 | $500 |
| Sensitive Data Exposure| $1,500 | $500 |
| Authorization Flaw | $1,500 | $500 |
| Cross-Site Request Forgery (CSRF) | $1,500| $500 |
| Open Redirect on Sensitive Parameter | $1,500 | $500 |
| Improper Direct Object Reference (IDOR) | $1,500 | $300 |
| Open Redirect | $500 | $150 |
Please remember that reward decisions are up to the discretion of Airbnb. We do not reward for duplicate reports. Examples of issues that may be considered to be lower severity given additional context include: a reflected XSS that has minimal impact (only works in some browsers, can’t be used to steal session information); self-XSS; or an RCE on an asset that doesn’t house production data. Assets listed as "low-priority" in the program scope will generally receive a significantly lower bounty compared to the values on the table above.
Scope Type | Scope Name |
---|---|
android_application | com.airbnb.android |
ios_application | com.luxuryretreats.ios |
ios_application | com.airbnb.app |
other | Localized airbnb sites listed at the link below: |
web_application | *.byairbnb.com |
web_application | www.airbnb.com |
web_application | *.withairbnb.com |
web_application | *.muscache.com |
web_application | *.airbnb-aws.com |
web_application | *.atairbnb.com |
web_application | *.luxuryretreats.com |
web_application | support-api.airbnb.com |
web_application | api.airbnb.com |
web_application | *.airbnbcitizen.com |
web_application | *.airbnb.com |
web_application | callbacks.airbnb.com |
web_application | open.airbnb.com |
web_application | one.airbnb.com |
web_application | omgpro.airbnb.com |
web_application | m.airbnb.com |
web_application | assets.airbnb.com |
web_application | next.airbnb.com |
web_application | luckey.in |
web_application | luckey.app |
web_application | luckey.fr |
web_application | luckeyhomes.com |
web_application | admin.demo.urbandoor.com |
web_application | provider.demo.urbandoor.com |
web_application | demo.urbandoor.com |
web_application | *.hoteltonight-test.com |
web_application | luckey.partners |
The progam has been crawled by Firebounty on 2015-02-27 and updated on 2020-01-14, 521 reports have been received so far.
FireBounty © 2015-2024