Apache Log4j(TM) is a versatile, industrial-grade Java logging framework composed of an API, its implementation, and components to assist the deployment for various use cases.
Log4j is used by 8% of the Maven ecosystem and is listed by the OpenSSF as one of the top 100 critical open-source software projects.
The project is actively maintained by a team of several volunteers and supported by a big community.
We are committed to protecting the security of our users and preventing the next Log4Shell by not only focusing on high-quality software but also improving
our security processes and practices.
With this bug bounty program, we aim to encourage security researchers to help us identify and fix security vulnerabilities in the Apache Log4j project.
This bug bounty program is paid for by the Sovereign Tech Resilience program.
We encourage all security researchers who identify weaknesses in our software to read about our security page first: Security Page
All security issues that are reported using this program are fairly rewarded.
You cannot attack our infrastructure, including our source code repositories.
We must be able to reproduce the system in our setup. We will not reward reports that we cannot reproduce.
We cannot reward duplicate reports. We will reward the first report of a vulnerability, which includes reports received outside of this program.
The triage team will use the "One Fix, One Reward" principle: if one or more components can be fixed using a single fix, only one issue will be eligible for a reward. All other reports will be closed as informative.
Please note that this process also applies across all the branches we maintain.
As a complement to the program rules and testing policy:
Please consider that your report will be made public at some point.
Please let us know if you have special requirements regarding your identity or the report.
Some components are out-of-scope, as described in this program's "out of scope" part.
Other project repositories are out-of-scope. The 3.x (main) branch of Log4j is currently out of scope and will be added when the first stable release is published:
The log4j-parent is considered out of scope since it is used for building the software only:
We thank everyone who submits valid reports.
However, only those who meet the following requirements can receive monetary rewards:
The triage team will rate all security reports sent here.
Once confirmed, we will follow the CVE process and forward the report to the Apache Security Team as described in the Apache Security page.
All vulnerabilities will be rated and disclosed after sufficient time has passed.
We will publish advisories on our mailing lists and the Apache Logging Services website.
Please keep the information you have received private until we have published the advisory. Don't disclose the information to others.
We will include researcher credits if requested.
Scope Type | Scope Name |
---|---|
undefined | Log4j 2.x |
undefined | Log4j API for Kotlin |
undefined | Log4j API for Scala |
undefined | Log4cxx |
undefined | Log4net |
Scope Type | Scope Name |
---|---|
undefined | Anything related to mailing lists or other ASF infrastructure topics. |
undefined | Cassandra Appender |
undefined | Kafka Appender |
undefined | CouchDB components |
undefined | JSP Tag library |
web_application | https://logging.apache.org |
web_application | Everything which is excluded on this page is also out-of-scope: https://logging.apache.org/security.html |
Firebounty have crawled on 2024-07-25 the program Apache Log4j - Bug Bounty Program on the platform Yeswehack.
FireBounty © 2015-2025