Uber Bug Bounty Program
The scope for Uber’s Bug Bounty program includes most of our assets. If it is not explicitly out of scope and there is a security impact, we want to know about it. Issues without security impact that are submitted to our program will be closed. Please review the program’s Out of Scope section and all other policies before submitting a report.
Your participation in our Bug Bounty Program is voluntary. Before finding and reporting any vulnerabilities you are required to read and agree to the Bug Bounty Program Terms (the "Program Terms"). In these terms, references to "you" or "researcher" refer to a researcher that submits a high quality report in accordance with the Uber Bug Bounty Program Terms and "we" or "us" refers to Uber.
Table of Contents
I. Program Terms
Safe Harbor
Program Eligibility
Program Rules
Disclosure Policy and Confidentiality
Legal
II. Submitting Reports
Report Quality
Out of Scope
III. Bounty Awards
Pay At Triage
CVSS Scoring Exceptions
Additional Reward Policies
IV. Additional Info
SSRF Sheriff
FAQ
I. Program Terms
1. Safe Harbor
Any activities conducted in a manner consistent with this policy will be considered authorized conduct, and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will make it known that your actions were conducted in compliance with this policy. Uber reserves all legal rights in the event of noncompliance with this policy.
2. Program Eligibility
To be eligible to participate in our Bug Bounty Program, you must:
Be at least 18 years of age if you test using an Uber account.
Not be employed by Uber or any of its affiliates or an immediate family member of a person employed by Uber or any of its affiliates.
Not be a resident of, or make Submissions from, a country against which the United States has issued export sanctions or other trade restrictions.
Not be in violation of any national, state, or local law or regulation with respect to any activities directly or indirectly related to the Bug Bounty Program.
Not be using duplicate HackerOne accounts.
If (i) you do not meet the eligibility requirements above; (ii) you breach any of these Program Terms or any other agreements you have with Uber or its affiliates; or (iii) we determine that your participation in the Bug Bounty Program could adversely impact us, our affiliates or any of our users, employees or agents, we, in our sole discretion, may remove you from the Bug Bounty Program and disqualify you from receiving any benefit of the Bug Bounty Program.
3. Program Rules
Do:
Do abide by these Uber Bug Bounty Program Terms.
Do respect privacy & make a good faith effort not to access, process or destroy personal data.
Do be patient & make a good faith effort to provide clarifications to any questions we may have about your report.
Do be respectful when interacting with our team, and our team will do the same.
Do perform testing only using accounts that are your own personal/test accounts. By default, we expect your report to clearly reference your @wearehackerone.com
email address.
Do exercise caution when testing to avoid negative impact to customers and the services they depend on.
Do stop whenever unsure. If you think you may cause, or have caused, damage with testing a vulnerability, report your initial finding(s) and request authorization to continue testing.
Do NOT:
Do not leave any system in a more vulnerable state than you found it.
Do not brute force credentials or guess credentials to gain access to systems.
Do not participate in denial of service attacks.
Do not upload shells or create a backdoor of any kind.
Do not publicly disclose a Vulnerability without our explicit review and consent.
Do not engage in any form of social engineering of Uber employees, customers, or partners.
Do not engage or target any Uber employee, customer, or partner during your testing.
Do not attempt to extract, download, or otherwise exfiltrate data that may have PII or other sensitive data other than your own.
Do not change passwords of any account that is not yours or that you do not have explicit permission to change. If ever prompted to change a password of an account you did not register yourself or an account that was not provided to you, stop and report the finding immediately.
Do not do anything that would be considered a privacy violation, cause destruction of data, or interrupt or degrade our service.
Do not interact with accounts you do not own.
4. Disclosure Policy and Confidentiality
Any data you receive, obtain access to or collect about Uber, Uber affiliates or any Uber users, customers, employees or agents in connection with the Bug Bounty Program is considered Uber’s confidential information ("Confidential Information").
Confidential Information must be kept confidential and only used: (i) to make the disclosure to Uber under the Uber Bug Bounty Program; or (ii) to provide any additional information that may be required by Uber in relation to the submitted report. No further use or exploitation of Confidential Information is allowed. Upon Uber's request, you will permanently erase all Confidential Information for any systems and devices.
You may not use, disclose or distribute any such Confidential Information, including without limitation any information regarding your Bug Bounty submitted report, without our prior explicit consent. You must get explicit consent by submitting a disclosure request to our program. Please note, not all requests for public disclosure will be approved.
Any unauthorized public disclosure will result in a program ban.
Please review HackerOne's disclosure guidelines for general best practices. For any reports submitted to Uber, this policy supersedes any conflicting HackerOne policies.
5. Legal
Uber reserves the right to modify the terms and conditions of this program, and your participation in the Program constitutes acceptance of all terms.
By making a Submission, you represent and warrant that the Submission is original to you and you have the right to submit the Submission.
By making a Submission, you give us the right to use your Submission for any purpose.
Please check this site regularly as we routinely update our program terms and eligibility, which are effective upon posting. You can subscribe to receive email notifications when this policy is updated.
II. Submitting Reports
1. Report Quality
High quality submissions allow our team to understand the issue better and engage the appropriate teams to fix. The best reports provide enough actionable information to verify and validate the issue without requiring any follow up questions for more information or clarification.
Check the scope page before you begin writing your report to ensure the issue you are reporting is in scope for the program.
Think through the attack scenario and exploitability of the vulnerability and provide as many clear details as possible for our team to reproduce the issue (include screenshots if possible).
Please include your understanding of the security impact of the issue. Our bounty payouts are directly tied to security impact, so the more detail you can provide, the better. We cannot payout after the fact if we don’t have evidence and a mutual understanding of security impact.
In some cases, it may not be possible to have all of the context on the impact of a bug. If you’re unsure of the direct impact, but feel you may have found something interesting, feel free to submit a detailed report and ask.
Video only proof-of-concepts (PoCs) will not be considered.
A vulnerability must be verifiable and reproducible for us to be considered in-scope.
All reports must demonstrate security impact to be considered for bounty reward.
2. Out-of-Scope
In addition to the explicit Out of Scope list on our program page, reports of the following issues are also out of scope:
Physical or social engineering attempts (this includes phishing attacks against Uber employees)
Ability to send push notifications/SMS messages/emails without the ability to change content
Ability to take over social media pages (Twitter, Facebook, Linkedin, etc)
Negligible security impact
Unchained open redirects
Reports that state that software is out of date/vulnerable without a proof-of-concept
Highly speculative reports about theoretical damage
Vulnerabilities as reported by automated tools without additional analysis as to how they're an issue
Reports from automated web vulnerability scanners (Acunetix, Vega, etc.) that have not been validated
SSL/TLS scan reports (this means output from sites such as SSL Labs)
Open ports without an accompanying proof-of-concept demonstrating vulnerability
Subdomain takeovers - please demonstrate that you are able to take over the page by leaving a non-offensive message, such as your username
CSV injection
Best practices concerns
Protocol mismatch
Rate limiting
Exposed login panels
Dangling IPs
Vulnerabilities that cannot be used to exploit other users or Uber -- e.g. self-xss or having a user paste JavaScript into the browser console
Content injection issues
Missing cookie flags on non-authentication cookies
Cross-site Request Forgery (CSRF) with minimal security implications (Logout CSRF, etc.)
Reports that affect only outdated user agents or app versions -- we only consider exploits in the latest browser versions for Safari, FireFox, Chrome, Edge, IE and the versions of our application that are currently in the app stores
Issues that require physical access to a victim’s computer/device
Stack traces
Path disclosure
Directory listings
Banner grabbing issues (figuring out what web server we use, etc.)
If a site is abiding by the privacy policy, there is no vulnerability.
Enumeration/account oracles
UUID enumeration of any kind
Invite/Promo code enumeration
Gift card enumeration
Account oracles -- the ability to submit a phone number, email, UUID and receive back a message indicating an Uber account exists
Distributed denial of service attacks (DDOS)
III. Bounty Awards
1. Pay At Triage
We strive to reward valid reports within 14 days of acceptance, often sooner.
Bounty rewards will be calculated according to CVSS 3.1 as applicable and using the bounty ranges published on our program page.
The official CVSS 3.1 reference used by our program is:
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
At our discretion as program owners, some report types will not receive rewards based on CVSS 3.1 score. These reports will receive either a fixed amount reward or the reward will be determined on a case-by-case basis. See Section 2 below.
2. CVSS Scoring Exceptions
The report types listed below will receive rewards without calculating a CVSS 3.1 score:
| Type | Reward |
| :------: | :---------: |
| Subdomain Takeover | $500 |
| 3rd Party Info Disclosures (Prezi, Trello, Google Doc, etc) | Case by case |
3. Additional Reward Policies
Previous bounty amounts are not considered a precedent for future bounty amounts. Bounty awards are not additive and are subject to change as our internal environment evolves. We determine the upper bound for security impact and award based on that impact.
When determining bounty amounts, we consider the security impact of any given issue -- things that influence security impact are the scale of exposure and the various mitigating and multiplying factors.
Bounty payouts and amounts, if any, will be determined by us in our sole discretion. In no event are we obligated to provide a payout for any Submission. The format, currency and timing of all bounty payouts shall be determined by us in our sole discretion. You are solely responsible for any tax implications related to any bounty payouts you may receive.
If we receive several reports for the same issue, only the earliest valid report that meets requirements and provides enough actionable information to identify the issue may be considered for a bounty.
IV. Additional Info
1. SSRF Sheriff
We have set up a "sheriff" service for SSRF testing. If you believe you have an SSRF in production, please use either of the following IP/port combinations for testing:
This service will accept HTTP requests to any endpoint, of any request type, and will return a secret token in both headers and response body. It also responds with valid response types for all of the file extensions listed below (just append the extension to your request path, e.g. /foobar.json):
xml
json
gif, png, jpg/jpeg
html
txt
mp4
csv
For additional information about the SSRF Sheriff Service, including the source code, see: https://github.com/teknogeek/ssrf-sheriff
2. FAQ
Can I get Uber swag?
Uber does not currently offer swag.
Can Uber provide me with a pre-configured test account?
If credentials are necessary to access any of our assets, this will be included in our policy page under test plan or test instructions. If you do not see any instructions about test accounts in our policy, none are available or provided.
What is required when submitting a report?
https://docs.hackerone.com/hackers/submitting-reports.html
How do I make my report great?
https://docs.hackerone.com/hackers/quality-reports.html
I submitted a report. Now what? I have questions.
https://www.hackerone.com/blog/how-bug-bounty-reports-work
What causes a report to be closed as Informative, Duplicate, N/A, or Spam?
https://docs.hackerone.com/hackers/report-states.html
What is an example of an accepted vulnerability?
Valid and accepted vulnerabilities would be the type of report that identifies a unique security impact on this program’s specific scope. The report must also meet any submission criteria outlined in the policy, such as test plan instructions and a working proof of concept.
Scope Type | Scope Name |
---|---|
other | Uber Assets |
Scope Type | Scope Name |
---|---|
application | Postmates |
other | UT |
other | Transplace |
other | Routematch |
other | HKTaxi |
other | Drizly |
other | Autocab |
other | Fraud Reports |
other | Cornershop |
other | Careem |
other | Car Next Door |
web_application | et.uber.com |
web_application | people.uber.com |
web_application | eng.uber.com |
web_application | drive.uber.com |
web_application | love.uber.com |
web_application | newsroom.uber.com |
web_application | bizblog.uber.com |
web_application | uber.onelogin.com |
web_application | *.support-uber.com |
web_application | *.lioncityrentals.com.sg |
web_application | *.xchangeleasing.com |
web_application | *.uber.com.cn |
web_application | *.sobi.io |
web_application | *.uberscoot.us |
web_application | *.ot.to |
web_application | *.ubertransit.io |
web_application | *.carnextdoor.com.au |
The progam has been crawled by Firebounty on 2016-03-22 and updated on 2020-04-07, 1198 reports have been received so far.
FireBounty © 2015-2024