GitLab is committed to working with security experts across the globe to stay up to date with the latest security techniques. Feel free to inspect our source code and web assets. If you have discovered a security issue that you believe we should know about, we’d welcome working with you. Please let us know about it and we'll make every effort to quickly correct the issue.
We have different rewards depending on the business impact of each asset. A more complete description of each asset will be in the scope section, but in general GitLab.com and all our products' source code is rewarded the highest, then non-production environments have reduced bounties and our static websites have the lowest payouts.
See the Rewards section above for our bounty ranges. For reports with critical or high severity we pay $1000 at the time the report is triaged, and for medium severity reports we pay $500. The remainder, if any, will be paid when the report is resolved or 45 days after triage, whichever happens earlier. The calculator we use to calculate CVSS-based bounty amounts is accessible to everyone.
Reports about intended behavior resulting in an update of our documentation will be rewarded with a $100 bounty, as long as this update is security related.
GitLab assigns CVE identifiers to vulnerabilities affecting GitLab products. While the CVSS score for those should generally align with the severity set in the HackerOne report, sometimes they will differ depending on our assessment of the business impact based on existing mitigations, the sensitivity of the impacted data, and number of impacted customers among other factors.
While we try to be as consistent as possible with rewards, our program is also evolving and rewards may change accordingly to how our program evolves with time.
We recently raised our bounty amounts and finding a CVSS 10.0 vulnerability on GitLab will lead to, what we think, is a pretty good pay day. However, we've noticed that some vulnerabilities with very high business impacts don't receive as high of a CVSS score as a remote code execution vulnerability would because they "only" impact confidentiality.
This is why we're introducing a capture the flag contest!
The private group gitlab-h1-bbp-ctf-group
(group ID 55842926) contains a private project which contains a file with a flag. The format of the flag is {gitlab-bounty-flag-XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX}
. Use a permission-related issue to bypass access control; without user interaction, then read the flag and the $20,000 bonus is yours!
At the moment there is one (1) flag available. The bonus will be awarded to the first person to find the flag and file a report on our Bug Bounty Program with the steps to successfully reproduce. We will update this policy when the flag is found.To stay informed, subscribe to our program to receive policy updates and be notified when the flag has been claimed. At that time, our CTF will be paused, while we test and improve our defenses. Once we're ready we'll re-enable the flag and update our policy to indicate that the CTF is open again.
Reporters which have submitted three or more valid findings to our program are eligible to receive a one year self-hosted Ultimate license supporting up to five users. If you believe you're eligible, please request the Ultimate license via a comment in one of your reports mentioning the assigned security engineer, and include links to your other two valid reports. Once verified, the license will be sent to your [username]@wearehackerone.com
email address. Any further valid submissions in that year will extend you the next year's license for free too.
Upon receipt of the finding, we will conduct an internal investigation to understand the full impact of the vulnerability. We then assess the severity using the Common Vulnerability Scoring System (CVSS) and score according to the guidelines you can see in the "help & definitions" section of our CVSS calculator. Note that even if GitLab.com allows self-registration, most GitLab instances in the wild don't -- which makes vulnerabilities that are exploitable without authentication a lot more impactful. For this reason, any vulnerability that requires an account will not be scored with "Privilege Required: None".
Reports for security issues that aren't vulnerabilities in our systems and where CVSS isn't appropriate (for example a leaked confidential document) will receive a discretionary bounty based on our assessment of the impact of the finding.
For different attack vectors that result in the same mitigation, GitLab reserves the right to reward the first report that is validated for that fix. All subsequent reports that are addressed by that mitigation will be considered as duplicates, regardless of the attack vector.
When researching security issues, especially those which may compromise the privacy of others, you must use only test accounts in order to respect our users’ privacy. Accessing private information of other users, performing actions that may negatively affect GitLab’s users (e.g., spam, denial of service) will disqualify the report. Activity that is disruptive to GitLab operations will result in account bans and disqualification of the report. Examples of disruptive activity include, but are not limited to: - Generating abuse requests - Submission of support, sales or other requests to 3rd party systems - Mass creation of users, groups, and projects - Typosquatting or other namesquatting - Spam-like or other high volume activity
Sending reports from automated tools without verifying them will immediately disqualify the report.
Disruptive activity such as that listed above can be researched freely on your own installation of gitlab
. GitLab is an open-core company, with the source code powering gitlab.com available at https://gitlab.com/gitlab-org/gitlab-foss and https://gitlab.com/gitlab-org/gitlab. You are encouraged to install your own standalone instance for researching vulnerabilities. Screen captures, logs, and videos showing vulnerabilities against your own GitLab installation are encouraged.
Behave professionally. Failure to follow HackerOne's policies, such as the Code of Conduct, may result in the report being ineligible for a bounty at GitLab's sole discretion, in addition to any enforcement action HackerOne may decide to take.
When testing on GitLab.com, your @wearehackerone.com
address must be associated with the testing account. If separate accounts are necessary, you can use an alias. This will help us separate testing from other forms of abuse, and help inform the decision of blocking an account. Note that this does not provide immunity and the Rules of engagement must be followed at all times.
GitLab will make a best effort to meet the following SLAs for hackers participating in our program:
Time to first response (from report submit) - 1 business day
Time to triage (from report submit) - 5 business days
Time to bounty (from triage) - between 5 and 45 business days
The only appropriate place to inquire about a HackerOne report's status is on the report itself. Please refrain from submitting your report or inquiring about its status through additional channels including any other unrelated HackerOne report, as this unnecessarily binds resources in the security team.
All GitLab Inc. products are in scope unless explicitly noted otherwise.
Testing on subdomains that are neither explicitly in scope nor out of scope isn't encouraged, but if you can find a vulnerability with business impact on such a subdomain please report it. We normally close sufficiently clear reports as Informative
so there will be no negative effect on your reputation score if we decide that it's out of scope. However, remember that GitLab subdomains that are running third party services are strictly out of scope.
We release new features on the 22nd of every month. You can learn more about our release process, see the latest monthly release blog post and see what's coming in future releases. If you're bug hunting, might we suggest a newly released feature? ?
Reports on vulnerabilities in third-party software which GitLab depends on will be accepted and a bounty rewarded if and only if:
The report includes a new vulnerability, for which a patch is not available, or
A patch has been available for more than 30 days.
It has a clear and working proof of concept that illustrates the impact to GitLab.
It has Critical or High impact to GitLab.
This does not include websites of third party software and services and only includes dependencies & packaged software.
gitlab.cn
and the JiHu-specific GitLab distribution which are property of GitLab Information Technology (Hubei) Co., Ltd. (JiHu), security issues in those products should be reported to security@gitlab.cn
/api/v4/user
API)Rules of Engagement, Testing, and Proof-of-concepts
for the rules concerning testing for Denial of Service (DoS) and other potentially disruptive activities)All Resolved
reports will be made public via issues on GitLab.com 30 days after releasing a fix. We will redact all information we consider sensitive (such as cookies or tokens), but do not hesitate to let us know if additional content should be hidden. If you also want the report to be disclosed via HackerOne, please request disclosure.
Informative
or self-closed reports that are determined to be bugs or new feature requests with no current security impact may be imported as public issues in our issue tracker at https://gitlab.com/gitlab-org/gitlab/issues.
Any activities conducted in a manner consistent with this policy will be considered authorized conduct and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.
You are responsible for complying with any applicable laws. You are not eligible to participate in this program if you are currently an employee of GitLab, Inc. or any of its subsidiaries. Reports from former employees, immediate family of current employees, or other associates of GitLab.com that may present a conflict of interest of the goals of the program will be more thoroughly reviewed and may not qualify for the stated bounty awards at GitLab's discretion.
Scope Type | Scope Name |
---|---|
other | Your Own GitLab Instance |
other | Other non-production infrastructure |
web_application | customers.gitlab.com |
web_application | gitlab.com |
web_application | registry.gitlab.com |
web_application | https://gitlab.com/gitlab-org/gitlab |
web_application | https://gitlab.com/gitlab-org/gitlab-runner |
web_application | https://gitlab.com/gitlab-org/gitaly |
web_application | https://gitlab.com/gitlab-org/gitlab-pages |
web_application | https://gitlab.com/gitlab-org/gitlab-shell |
web_application | https://gitlab.com/gitlab-org/gitlab-vscode-extension |
web_application | *.gitlab.net |
web_application | *.gitlab.org |
web_application | *.gitlap.com |
web_application | about.gitlab.com |
web_application | docs.gitlab.com |
web_application | design.gitlab.com |
web_application | advisories.gitlab.com |
Scope Type | Scope Name |
---|---|
web_application | status.gitlab.com |
web_application | forum.gitlab.com |
web_application | shop.gitlab.com |
web_application | support.gitlab.com |
web_application | alerts.gitlab.com |
web_application | dashboards.gitlab.com |
web_application | partners.gitlab.com |
web_application | aptly.gitlab.com |
web_application | translate.gitlab.com |
web_application | federal-support.gitlab.com |
web_application | us-federal-gitlab.com |
web_application | ir.gitlab.com |
web_application | https://gitlab.com/gitlab-org/opstrace/ |
web_application | levelup.gitlab.com |
This program have been found on Hackerone on 2016-02-06.
FireBounty © 2015-2024