46829 policies in database
Link to program      
2013-12-03
2019-08-02
Django logo
Thank
Gift
HOF
Reward

Reward

250 $ 

Django

Django is used to power some of the most important sites on the web and its increasing popularity has made it a critical piece of internet infrastructure. If you’ve found a security bug that could potentially impact the security of these sites, you have our thanks and might be eligible for a cash reward.

The Fine Print

==========

  • Responsibly disclose a previously unknown vulnerability using the HackerOne platform, or directly to us while following our guidelines for reporting security issues

  • The vulnerability must significantly compromise the security of a typical Django installation.

  • Low priority vulnerabilities, such as Denial of Service attacks, are unlikely to qualify.

  • Vulnerabilities in dependencies may qualify only if they are exploitable in the context of a typical Django installation.

  • You should install Django on a server you own and test locally. Testing against a server without permission is grounds for disqualification. For help, see our Getting Started Guide

  • We maintain a detailed archive of security issues to provide examples of the type of issues we’re interested in learning about.

  • If you’re also a developer, you can optionally send us a patch for the issue. If we end up accepting your patch, we may add an extra bonus to your bounty depending on the complexity and completeness of the patch.

YOU MAY NOT TEST AGAINST SERVERS YOU DO NOT HAVE EXPLICIT PERMISSION TO TEST. YOU DO NOT HAVE PERMISSION TO SCAN THE DJANGOPROJECT.COM SERVERS.

IF YOU TEST AGAINST THE DJANGOPROJECT.COM SERVERS, YOU WILL NOT BE REWARDED ANY BOUNTY.

Bounty

===========

The Django team reserves the right to make the final call on the severity for any issue, but to give you an idea of our priorities, here are some rough ranges, and the types of issues we expect would fall into each range:

Severe issues

  • Remote code execution

  • SQL injection

Moderate issues

  • XSS

  • CSRF

  • Broken authentication

Low severity issues

  • Sensitive data exposure

  • Broken session management

  • Unvalidated redirects/forwards

  • Issues requiring an uncommon configuration option

No Reward

  • Any behavior which is clearly documented

  • Any behavior which is the result of deliberate misconfiguration

  • Issues in third-party libraries (please report issues directly to the maintainers)

  • Issues discovered while scanning without permission

  • The OPTIONS header

The Internet Bug Bounty awards security research on Django. If your vulnerability meets the eligibility criteria, you can submit the post-fix information to the IBB for payout. As the IBB supports the whole vulnerability lifecycle, these bounty awards are awarded as an 80/20 split, where 80% will go to you, the finder, and 20% will be given to the Django Software Foundation (https://www.djangoproject.com/foundation/) to continue to support the vulnerability remediation efforts.

To submit eligible vulnerabilities for a payout go to https://hackerone.com/ibb for submission instructions after the project maintainers have resolved the vulnerability.

The project maintainers have final decision on which issues constitute security vulnerabilities. The IBB team will respect their decision, and we ask that you do as well.


The progam has been crawled by Firebounty on 2013-12-03 and updated on 2019-08-02, 8 reports have been received so far.

FireBounty © 2015-2024

Legal notices | Privacy policy