Banner object (1)

Hack and Take the Cash !

816 bounties in database
  Back Link to program      
27/05/2019
Zaim(iOS/Android) logo
Thanks
Gift
Hall of Fame
Reward

Reward

1000 ¥ 

Zaim(iOS/Android)

Rules

Only test for vulnerabilities on application stipulated in scope section. Any vulnerabilities reported on applications out-of-scope are not eligible for bounty rewards.

This is a production environment. Please note the following things:

- Do not create account more than necessary to perform tests, and please delete your account as soon as you finished your tests.
- Repetitive processing with tools are prohibited.

To be eligible for a bounty reward under this program you must to follow the rules stipulated above.


Any vulnerability test against domains out-of-scope are explicitly prohibited.

Any violation on the Terms of Service of the “BugBounty.jp” and/or performance of DoS (Denial of Service) attack or equivalent act that can degrade the performance of our service are also explicitly prohibited.

2019/09/27 update
The following domain is out of scope.
zaim.net

2019/08/16 update
The following domain is out of scope.
zaim.co.jp

Scope

iOS application

Name

Zaim

URL

  • https://itunes.apple.com/jp/app/zaim/id445850671

Domain

  • api.zaim.net
  • auth.zaim.net

Android application

Name

Zaim

URL

  • https://play.google.com/store/apps/details?id=net.zaim.android

Domain

  • api.zaim.net
  • auth.zaim.net

Eligible For Bounty

  • Cross-Site Request Forgery (CSRF) up to 132,000yen
  • Remote Code Execution up to 132,000yen
  • Authentication up to 122,000yen
  • SQL Injection up to 114,000yen
  • Command Injection up to 50,000yen
  • Cross-Site Scripting up to 27,000yen
  • Privilege Escalation up to 27,000yen
  • Forced Browsing up to 27,000yen
  • Open Redirect up to 12,000yen
  • Information Disclosure up to 11,000yen
  • other up to 5,000yen

Not Eligible For Bounty

  • Missing security headers
  • Vulnerabilities found in domains out-of-scope
  • Vulnerabilities affecting outdated browsers or platforms
  • Presence of autocomplete attribute on web forms
  • Missing secure flags on non-sensitive cookies
  • Reports of insecure SSL/TLS ciphers
  • Vulnerabilities with capability of username/email enumeration
  • Descriptive error messages (e.g. Stack traces, application or server errors)
  • Banner disclosure on servers
  • Misconfiguration of SPF record, DMARC and DKIM
  • Invalid HTTP method
  • Vulnerabilities found through automated scans or tools
  • Hypothetical or theoretical vulnerabilities without actual verification code
  • Vulnerabilities with capability of Denial of Service attack
  • Vulnerabilities with capability of brute force against password or tokens
  • Password, email and account policies, such as email id verification, reset link expiration, password complexity
  • Login/Logout CSRF
  • Missing CSRF tokens
  • CSRF on forms that are available to anonymous users (e.g. contact form)

Notes

For eligibility details, please refer to the "Terms of Service Article 4" of this site.

In Scope

Scope Type Scope Name
android_application

https://play.google.com/store/apps/details?id=net.zaim.android

android_application

api.zaim.net

android_application

auth.zaim.net

ios_application

https://itunes.apple.com/jp/app/zaim/id445850671

ios_application

api.zaim.net

ios_application

auth.zaim.net

web_application

auth.zaim.net


The public program Zaim(iOS/Android) on the platform Bugbounty.Jp has been updated on 2019-08-16, The lowest reward is 1000 ¥.

FireBounty © 2015-2019

Legal notices