45466 policies in database
Link to program      
2019-04-25
2019-10-03
Lob logo
Thank
Gift
HOF
Reward

Reward

100 $ 

Lob

Policy

Lob looks forward to working with the security community to find vulnerabilities in order to keep our businesses and customers safe.

Rewards

These values are indicative and we reserve the right to award a different amount or whether a reward should be granted at all. At the end of the day we care about protecting our users' data, and the rewards correspond to how much user data is put at risk by your findings.

We typically reward lower amounts for low-quality reports without sufficient details, vulnerabilities that require significant user interaction, or vulnerabilities that only work on outdated browsers and platforms. We also might pay higher rewards for clever or severe vulnerabilities. We aim to pay out rewards within two weeks of triage. Here are some example rewards for vulnerabilities affecting the core Lob application:

|Vulnerabilities|Reward|

|-|-|

|RCE*|$5000|

|SQLi, SSRF*, LFI, etc|$2500|

|XSS, CSRF on sensitive actions, etc|$500|

|Application logic resulting in data exposure, Privilege escalation, CSRF on non-sensitive actions, etc|$100-$500|

|Minor misconfigurations, mixed-content issues, other low severity issues|$100|

RCE Note: One of the most likely places in our architecture for a RCE to occur is in our content rendering pipeline. As a result we have sandboxed all rendering, such that even if you have full code execution you cannot read the mail content of other customers. Therefore RCEs in our rendering pipeline will only pay out $1500, unless you can find a sandbox escape to read other customers' data, which would then qualify for a full $5000. Any RCE outside of our rendering pipeline would also get a full $5000.

SSRF Note: There are many places in our application that accept an external url as input and fetch it. This is intentional behavior. For your SSRF ticket to be triaged as valid you must be able to access a host on our internal network.

Program Rules

To promote the discovery and reporting of vulnerabilities and increase user safety, we ask that you:

  • Only do security testing from accounts with a "@wearehackerone.com" email tied to it. Accounts with this email get full account features enabled (i.e. teams, etc). If you test from a non-hackerone account we will deactivate your Lob account.

  • Do not access or modify our data or our users’ data, without explicit permission of the owner. Only interact with your own accounts

  • Contact us immediately if you do inadvertently encounter user data. Do not view, alter, save, store, transfer, or otherwise access the data, and immediately purge any local information upon reporting the vulnerability to Lob

  • Act in good faith to avoid privacy violations, destruction of data, and interruption or degradation of our services, including denial of service

  • Do not submit vulnerability reports or attempt to escalate tickets through our customer support channels - we will only triage and pay out for reports through Hackerone.

We will not negotiate in response to duress or threats (e.g., we will not negotiate the payout amount under threat of withholding the vulnerability details or threat of releasing the vulnerability or any exposed data to the public).

You are welcome to blog about any issues you’ve found, after the issues have been resolved. We appreciate any advance notice and/or blog content you can share with us prior to publication. If you disclose an issue prior to resolution you will be removed from the program.

Lob employees and their family members are not eligible for bounties.

Out-of-scope Vulnerabilities

  • General presence/absence of headers, DNS records, TLS versions, cookie flags, or other best practices, without concrete evidence of exploitability

  • Password, email and account policies, such as email id verification, reset link expiration, password complexity, etc

  • Attacks requiring physical access to a user's computer

  • Reports from automated tools or scans

  • Reports of spam

  • CSV injection

  • Directory listing

  • Denial of service

  • Vulnerabilities affecting users of outdated browsers or platforms

  • Social engineering of Lob employees, contractors, or users

  • Absence of rate limiting, unless related to authentication

  • Hyperlink injection or any link injection in emails

  • "rel=noopener" or other tab-nabbing issues

  • Content/text spoofing vulnerabilities

  • Self-XSS

  • login/logout CSRF, unless as part of a larger exploit chain

  • xmlrpc reports for Wordpress properties

  • user/admin enumeration

  • editable github wikis

Safe Harbor

We will not pursue civil action or initiate a complaint to law enforcement for accidental, good faith violations of this policy. We consider activities conducted consistent with this policy to constitute “authorized” conduct under the Computer Fraud and Abuse Act. To the extent your activities are inconsistent with certain restrictions in our Terms of Service and Acceptable Use Policy, we waive those restrictions for the limited purpose of permitting security research under this policy. We will not bring a DMCA claim against you for circumventing the technological measures we have used to protect the applications in scope.

If legal action is initiated by a third party against you and you have complied with Lob's bug bounty policy, Lob will take steps to make it known that your actions were conducted in compliance with this policy.

Please understand that if your security research involves the networks, systems, information, applications, products, or services of another party (which is not Lob), that third party may determine whether to pursue legal action. We cannot and do not authorize security research in the name of other entities.

We will not share your report with a third-party without your permission and/or gaining their commitment they will not pursue legal action against you. Please note again that we can’t authorize out-of-scope testing in the name of third parties and such testing is beyond the scope of the program.

Please submit a HackerOne report to us before engaging in conduct that may be inconsistent with or unaddressed by this policy.

In order to encourage the adoption of bug bounty programs and promote uniform security best practices across the industry, Lob reserves no rights in this bug bounty policy and so you are free to copy and modify it for your own purposes.

In Scope

Scope Type Scope Name
web_application

address-autocomplete.lob.com

web_application

api.lob.com

web_application

lob-assets.com

web_application

usps-sftp.lob.com

web_application

dora.lob.com

web_application

arcade.lob.com

web_application

dashboard.lob.com

web_application

www.lob.com

web_application

woody.lob.com

web_application

vpn.lob.com

web_application

signal.lob.com

web_application

sftp.lob.com

web_application

redshift.lob.com

web_application

pizza-planet.lob.com

web_application

partners.lob.com

web_application

blog.lob.com

web_application

docs.lob.com

web_application

mock.lob.com

web_application

lob.com

Out of Scope

Scope Type Scope Name
other

wp.lob.com and lob.com/blog

other

live_pub*

web_application

cio.lob.com

web_application

library.lob.com

web_application

https://lob.com/careers/*

web_application

email.lob.com

web_application

status.lob.com

web_application

get.lob.com

web_application

https://lob.com/support/contact

web_application

support.lob.com

web_application

go.lob.com

web_application

lob.com/sales

web_application

runkit.com


This program feature scope type like web_application.

FireBounty © 2015-2024

Legal notices | Privacy policy