9575 policies in database
Link to program      
2014-04-21
2020-04-16
Mail.ru logo
Thank
Gift
HOF
Reward

Reward

100 $ 

Mail.ru

Accepted languages:
🇬🇧 English
🇷🇺 Русский


Scope rules

The program 's scope is limited to technical vulnerabilities in the company's critical web services or mobile apps.

To report problems accessing your account or non-security issues, please contact customers support .

These projects are covered by standalone bug bounty programs::

VKontakte - vk.com - https://hackerone.com/vkcom
Odnoklassniki - ok.ru - https://hackerone.com/ok
love.mail.ru - Wamba Bug Bounty Program

A list of the projects can be found here:
Mail.Ru: https://mail.ru/all
My.Com: https://my.com/

We will not pay a reward (and we will be really upset) if we detect:

  • Physical tampering with Mail.Ru Group's data centers or offices
  • Social engineering directed at the company's employees
  • Breaking into the company's infrastructure and using the information obtained to report vulnerabilities
  • Attempt to access arbitrary user's account or data or another vulnerability post-exploitation not required to demonstrate the bug presence
  • Distributed network/request flooding and another resources exhaustion attacks. Automated scanning tools must be limited to 5 request per second (300 requests per minute) to one target host summing up all tools and threads running in parallel and must not exceed 5 parallel requests at the same time (5 threads).

Please use your own accounts, phone numbers, etc to conduct your research. Do not try to gain access to others' accounts or any confidential information.

Re-active protection

Remember you are testing production environment which is being used, supported and monitored. To prevent negative reaction, conduct your research in responsible, less intrusive way and reasonably limit impact from your tests for users, moderators and administrators.
Aggressive security scans and tests may trigger alerts and result in re-active measures being enforced, e.g. account, phone number or IP may be blocked. Automated abuse reporting tools are not used by Mail.ru, but in some cases, if attack resembles the real intrusion attempt manual abuse report may be sent by administrator.
We believe moderation and monitoring processes must not be impacted by bug bounty and security team does not interfere with moderation and abuse reporting decisions for individual cases.

How do I submit a bug report?

A bug report must give a detailed description of the discovered vulnerability and brief steps to reproduce it, or a working proof-of-concept. Video and screenshots can illustrate bug report, but can not replace it.

If you do not describe the vulnerability in sufficient detail, the discovery process is significantly prolonged and that doesn't help anybody. It's also very desirable if researcher can explain how exactly he or she found a given vulnerability.

How are bug reports examined?

Reports about vulnerabilities are examined by our security analysts. Our analysis is always based on worst case exploitation of the vulnerability, as is the reward we pay.

Reports are reviewed within 15 days (this is a maximum period - we'll probably respond sooner).
If you prefer to remain anonymous, we recommend using an alias when submitting bug reports.

Participating reports

Only reports reported via HackerOne interface may be considered for a bounty. A date/time of HackerOne report is considered as a date/time of the report.

Duplicate reports

Different exploitation vectors for the same bug or similar bugs may be considered duplicating if security team believes information provided for a single vector/bug is enough to fix all vectors or bugs reported.
Report for known or duplicating vulnerability is considered as Duplicate. Duplicate report is not eligible for monetary reward. Report can be either a duplicate of another H1 report or a duplicate of the problem internally tracked by Mail.Ru security team . Usually, access to original report or some information from internal task tracker is provided to reporter of Duplicate. In some cases information may not be provided, if a Duplicate contains less information or less critical exploitation vector than original report.
The report is considered as a duplicated to another H1 report, if there is original report is in "New" or "Triaged" state with an earlier report date/time or lower report number of if it updates the report in "N/A" or "Need more info" state and original report is in "N/A" or "Need more info" state for less than 1 week or sufficient information is provided in original report by researcher since the report is transferred to "N/A" or "Need more info" state.
The report is considered as a duplicate to internal task if there is a task in internal task tracker which is tracked by Mail.Ru security team on the time of the duplicate report.

Also, public 0-day/1-day vulnerabilities may be considered as a duplicate within few days after vulnerability details publication, if vulnerability is known to our team from public sources and we are working to mitigate or patch it.

Invalid reports

Report in "N/A" or "Need more info" state which is stale in this state for more than a week without sufficient new information provided is considered as invalid and does not participate in bug bounty.

Reward payment

We will pay you a reward if you are the first person to report a given vulnerability.

A message will appear in your bug report, indicating that the vulnerability you reported has been confirmed and a reward has been granted.

Payments are made through HackerOne.

Vulnerability disclosure

Vulnerability must be disclosed only with accordance with HackerOne disclosure policy.
Request for vulnerability disclosure must be submitted via HackerOne report interface. We usually disclosure reports within 4 weeks after disclosure request or fixing time, but we can request up to 3 months of additional time before vulnerability details are published. This time is required to distribute the fixed version and check it for regressions.
No vulnerability disclosure, including partial is allowed before vulnerability is disclosed on HackerOne.
If any sensitive information including (but not limited to) infrastructure and implementation details, internal documentation procedures and interfaces, source code, user and employees data accidentally obtained during vulnerability research or demonstration must not be disclosed. Intentional access to this information is strongly prohibited.
Mail.ru does not disclosure and do not grant you any rights to disclosure vulnerabilities in 3rd party products or services, unless these rights are explicitly given to you by affected 3rd party.

In Scope

Scope Type Scope Name
android_application

Mail.ru Mail for Android

android_application

Mail.ru Cloud for Android

android_application

Mail.ru Calendar for Android

android_application

Код Доступа Mail.Ru for Android

android_application

MyMail for Android

android_application

ICQ for Android

application

https://browser.mail.ru/

ios_application

Mail.ru Mail for iOS

ios_application

Mail.ru Cloud for iOS

ios_application

Код Доступа Mail.Ru for iOS

ios_application

MyMail for iOS

ios_application

ICQ for IOS

other

Mail.Ru Mail

other

abuse@mcs.mail.ru

other

This scope covers services and products related or operated by Mail.ru but hosted outside of Mail.ru infrastructure: fresh and non-integrated acquisitions not mentioned for different scopes, different cloud services and externally hosted solutions. It also covers non-production hosts (e.g. staging and demo installations) of Mail.ru projects in MCS cloud hosting. Extended scope only awards critical serverside vulnerabilities, if vulnerability compromises the infrastructure (e.g. RCE, SQLi, LFR, SSRF, etc) or data outside of project's scope (e.g. personal information) via serverside vector. Clientside vulnerabilities (XSS, CSRF) and business logic specific bugs, including privilege escalations within the product are accepted without bounty. MitM and local attacks, user enumeration on registration/recovery, open redirections, insufficient session expiration, cookies working after logout etc are not accepted unless there are additional vectors identified (e.g. ability to steal the session token via remote vector for open redirection)

web_application

MY.GAMES

web_application

Main portal page

web_application

Cloud

web_application

Calendar

web_application

Mail for Business

web_application

ICQ for Mac

web_application

ICQ for Windows

web_application

Source code

web_application

this link

web_application

MCS Infra Cloud Computing services

web_application

Todo

web_application

Calls

web_application

Disk-o Cloud application

Out of Scope

Scope Type Scope Name
web_application

love.mail.ru

web_application

ok.ru

web_application

vk.com

web_application
web_application
web_application
web_application
web_application

http://corp.wamba.com/en/developer/security/


The public program Mail.ru on the platform Hackerone has been updated on 2020-04-16, The lowest reward is 100 $.

FireBounty © 2015-2020

Legal notices