Banner object (1)

Hack and Take the Cash !

800 bounties in database
  Back Link to program      
25/04/2019
Tube8 logo
Thanks
Gift
Hall of Fame
Reward

Reward

50 $ 

In Scope

Scope Type Scope Name
web_application https://www.tube8.com/
web_application https://jp.tube8.com/
web_application https://de.tube8.com/
web_application https://www.tube8.es/
web_application https://www.tube8.fr/

Tube8

Security is a top priority at Tube8. We love to work with skilled security researchers to improve the security of our service. If you believe you've found a security bug in the services listed in our scope, we will be happy to work with you to resolve the issue promptly and ensure you are fairly rewarded for your discovery.

Scope

At this time, the scope of this program is limited to security vulnerabilities found on Tube8.com and its associated language-based domains and sub-domains. Vulnerabilities reported on other properties or applications are currently not eligible for monetary reward. High impact vulnerabilities outside of this scope might be considered on a case by case basis.

In-Scope Sub-Domains:

Out-of-Scope Sub-Domains:

For account access issues or visual layout and website functionality bugs, please work with our Customer Support __which will resolve those issues independently.

Note: Contacting our support team about the status of a HackerOne report will result in an immediate disqualification from receiving a reward. All communications must be conducted through the HackerOne system only.

Eligibility

You will qualify for a reward only if you are the first person to responsibly disclose an unknown issue. The Tube8 security team has 30 days to respond to the report, and up to 120 days to implement a fix based on the severity of the report.

Please allow for this process to fully complete before attempting to contact us again. Note that posting details or conversations about the report or posting details that reflect negatively on the program and the Tube8 brand will result in immediate removal from the program.

  • Any vulnerability found must be reported no later than 24 hours after discovery.
  • You are not allowed to disclose details about the vulnerability anywhere else.
  • You must avoid tests that could cause degradation or interruption of our service.
  • You must not leak, manipulate, or destroy any user data.
  • You are only allowed to test against accounts you own yourself.
  • The use of automated tools or scripted testing is not allowed. This includes vulnerability scanning tools such as OWASP ZAP and Vega, or any tools or scripts which may result in heavy traffic or flooding of any of our services.

Rewards

Tube8 may provide rewards to eligible reporters of qualifying vulnerabilities. Our minimum reward is $50 USD, and our maximum reward amount is $25,000 USD. Reward amounts may vary depending upon the severity of the vulnerability reported.

Swag may be awarded as a bonus to qualifying, in-scope reports. We allow one swag item per researcher. We will not respond to repeated requests to be awarded swag under any circumstances.

The following table outlines the average rewards for specific classes of vulnerabilities:

Vulnerability Types | Core Tube8 *
---|---
Remote Shell / Command Execution | $15,000
Remote Code Execution | $10,000
SQL Injection (with output) | $5,000
Significant Authentication Bypass | $5,000
Local file Inclusion | $2,500
SQL Injection (blind) | $2,500
Insecure Direct Object References | $1,500
Server Side Request Forgery | $1,500
Stored Cross Site Scripting | $1,500
Other Cross Site Scripting | $250

** Core Tube8 covers tube8.com and its associated language-based domains and sub-domains (https://www.tube8.fr __, https://www.tube8.es __, https://de.tube8.com __, https://jp.tube8.com __). It does not include any other domains, sub-domains, or services such as the Tube8 Blog ( https://blog.tube8.com __).

Tube8 reserves the right to decide if the minimum severity threshold is met and whether it was previously reported. Rewards are granted entirely at the discretion of Tube8.

To qualify for a reward under this program, you should:

  • Be the first to report a vulnerability.
  • Send a clear textual description of the report along with steps to reproduce the vulnerability.
  • Include attachments such as screenshots or proof of concept code as necessary.
  • Disclose the vulnerability report directly and exclusively to us.

A good bug report should include the following information at a minimum:

  • List the URL and any affected parameters
  • Describe the browser, OS, and/or app version
  • Describe the perceived impact. How could the bug potentially be exploited?

Exceptions & Rules

Our bug bounty program is limited strictly to technical security vulnerabilities of Tube8 services listed in the scope. Any activity that would disrupt, damage or adversely affect any third-party data or account is not allowed.

Please do not mass create accounts to perform testing against Tube8 applications and services. Also do not perform brute force testing to determine whether rate limiting is in place for particular APIs or pieces of functionality.

The following are strictly prohibited:

  • Denial of Service attacks.
  • Physical attacks against offices and data centers.
  • Social engineering of our service desk, employees or contractors.
  • Compromise of a Tube8 user's or employee's account.
  • Automated tools or scans, botnet, compromised site, end-clients or any other means of large automated exploitation or use of a tool that generates a significant volume of traffic.

Additionally, the following vulnerabilities will not be considered for bounty:

  • Cross site request forgery (CSRF)
  • Cross domain leakage
  • Information disclosure
  • Software version disclosure
  • Self-XSS and XSS without impact
  • Missing SPF or DMARC records
  • HttpOnly and Secure cookie flags
  • SSL/TLS related (such as HSTS, GET over HTTP, Password sent in HTTP)
  • Password and account recovery policies
  • Session timeout
  • Session Hijacking (cookie reuse)
  • Missing X-Frame or X-Content headers
  • Account enumeration
  • Click-jacking
  • Rate-limiting
  • Downloading video
  • Confirmation Email (anything related with)

Legal Notes:

You must be at least 18 years old to participate in our Bug bounty Program.

Payments are made through HackerOne only. You are responsible for paying any taxes associated with rewards.

Employees of the Company, its affiliates, subsidiaries, agencies and divisions, partners, and their respective employees and immediate family members can responsibly disclose vulnerabilities by participating in our Bug Bounty Program but are not eligible for monetary rewards. The term “immediate family” includes spouses, siblings, parents, children, grandparents, and grandchildren, whether as “in-laws,” or by current or past marriages(s), remarriage(s), adoption, co-habitation or other family extension, and any other persons residing at the same household whether or not related.

We reserve the right to modify the terms of this program or terminate this program at any time. By participating in this program, you agree to be bound by these rules. You must comply with all applicable laws in connection with your participation in this program.

Thank you for helping keep Tube8 safe!

FireBounty © 2015-2019

Legal notices