Hack and Take the Cash !

744 bounties in database

Reward

100 $

Upserve



Policy



Upserve is committed to protecting the privacy and security of our users. We recognize the valuable role security researchers play in making our services more secure and are committed to working with you to verify and resolve legitimate security vulnerabilities. We ask that you carefully review this policy and scope to ensure the best experience for all involved.

Important Notes



Do not test with the live upserve.com site. Please review the scope for details on the test site URL specific for security research
Do not run automated scans without checking with us first. They are often very noisy and disruptive.

Public Disclosure Policy



Upserve supports public disclosure of most vulnerabilities following resolution. We ask that you not share vulnerability details with anyone other than Upserve or HackerOne prior to approved public disclosure through the HackerOne platform.

* In most cases, Upserve will allow public disclosure of vulnerabilities within 30 days of resolution.
* In some cases, Upserve will request that public disclosure be delayed. (for example if we need to conduct private notifications first)
* In limited cases, Upserve may request that a report remain private. In these cases we will maintain open communicaton with the researcher about why we feel this is important.
* Follow HackerOne's disclosure guidelines.

Report Quality



Please consider the attack scenario and exploitability of the bug.
Please provide detailed reports with reproducible steps and demonstrable impact. If the report is not detailed enough to reproduce the issue, the issue will not be eligible for a reward.
If you’re unsure of the direct impact, but feel you may have found something interesting, please submit a detailed report and ask.
Submit one vulnerability per report, unless you need to chain vulnerabilities to provide impact.

Program Rules



Please check the list of out-of-scope vulnerabilities and known issues before submitting a report.
Do not run automated scans without checking with us first. They are often very noisy and disruptive.
Social engineering (e.g. phishing, vishing, smishing) is prohibited.
Make every effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.
Only interact with accounts you own or with explicit permission of the account holder.
Bounty amounts below are the minimum we will pay per category for bounty eligible assets. We aim to be fair; all reward amounts are at our discretion and based on demonstrable impact.
If we receive several reports for the same issue, we offer the bounty to the earliest report for which we had enough actionable information to identify the issue.
Multiple vulnerabilities caused by one underlying issue will be awarded one bounty.

Rewards



Our rewards are based on the demonstrable impact of a vulnerability. Things that influence the impact of an issue are the scale of exposure, mitigating factors, and multiplying factors. All valid reports are eligible to receive a HackerOne reputation reward. For assets eligible for a paid bounty, Upserve may provide rewards based on the impact of a vulnerability. Please note these are general guidelines and examples, and that reward decisions are up to the discretion of Upserve.

| Critical | High | Medium | Low |
|----------|--------|---------|------|
| $2,500 | $1,500 | $500 | $100 |

Critical severity bugs - minimum $2500:

Examples of issues that Upserve would consider critical impact include:

Gaining unauthorized access to any merchant’s account or data (e.g. credit card numbers, transaction information, etc.)
Gaining unauthorized access to any customer’s account or data (e.g. credit card numbers, etc.)
Gaining unauthorized access to any production systems (e.g. shell access, code execution, etc.)
Exposed credentials that could result in access to production systems or deployment pipelines (e.g. API keys, access tokens, etc.)
The ability to cause monetary impact to Upserve, a merchant, or a customer (e.g. creating orders with a payment method you don't own, issue refunds, manipulating order totals, etc.)

High severity bugs - minimum $1500:

Examples of issues that Upserve would consider high impact include:

Targeted attacks that result in access to an individual merchant or customer’s account or data (e.g. reflected XSS that requires social engineering)
Direct object references to sensitive information
Medium severity bugs - minimum $500:
Examples of issues that Upserve would consider medium impact include:
Issues that impact less sensitive assets, such as the public marketing sites
Being able to modify a merchant or customer’s settings without their permission
Content injection that allows for convincing phishing attacks (e.g. HTML injection or XSS in an unauthenticated domain)
Open URL redirection

Low severity bugs - minimum $100:

Examples of issues that Upserve would consider low impact include:

Leaks of less sensitive information that has a demonstrable impact
Directory traversal

Test Plans



Read carefully for instructions and tips on testing:

* Upserve Loyalty (https://app.upserve.com/b/swipely-bistro) is a React application with a Ruby on Rails backend. REST API calls are made to app.upserve.com/c/ and cards.swipely.com. The application allows a consumer to register an account and enroll one or more credit cards in to a restaurant's loyalty program. Purchases made by the consumer at the restaurant are tracked in the loyalty program and a reward is given when the consumer's account reaches a specified level. It is not currently possible for researchers to generate sales that apply to the loyalty program. We are interested in vulnerabilities that would allow a consumer to fraudulently add points to their own account or steal points from other accounts. Use the provided test restaurant Swipely Bistro only. Testing on any other restaurant is prohibited without approval from Upserve.

* To create a customer account, navigate to https://app.upserve.com/b/swipely-bistro, enter in your email address, enter in a credit card number (either your own, or you can use a credit card generator to create a fake one). The application will reject duplicate card numbers.
* cards.swipely.com provides an endpoint for adding payment cards to the vault. The endpoint returns a token which should not be reversable. This API should not be able to provide back full payment card numbers.

* Upserve Online Ordering (OLO) (https://app.upserve.com/s/upserve-lounge-test-providence-2) is a React application with a Ruby on Rails backend. REST API calls are made to orders.upserve.com and payments.upserve.com. Orders can be submitted to the test restaurant linked in this plan using any valid credit card number. Credit cards will not be charged or authorized with this restaurant. Testing on any other restaurant is prohibited without approval from Upserve.

* You may create an account or you can place orders without an account
* You may use any validly formatted credit card number - either your own, or you can use a credit card generator to create a fake one.
* Orders placed are submitted to the Breadcrumb POS service and will most likely be rejected after 20 minutes unless someone at Upserve is actively working with this test restaurant
* payments.upserve.com provides an endpoint for adding payment cards to the vault. The endpoint returns a payment method token which is used by the OLO API. The token should not be reversable and should only be usable to the restaurant it was generated for.

* Upserve.com, RestaurantInsider.com (https://645892349820.vulnerbug.com) is a Wordpress application hosted by WPEngine. Do not test upserve.com or restaurantinsider.com directly. Please only test https://645892349820.vulnerbug.com/. Our primary concern here would be defacement, but there isn’t much sensitive data or functionality here - as such, reward amounts for this property will typically be lower.

* theacademy.upserve.com is a Wordpress application hosting customer education materials. The application allows users to search for and view videos.

* teamhelp.upserve.com is a Wordpress application for internal use by team members. Users are required to sign-in with their Upserve Google account to access the information. There is non-public information on this site. Our primary concern here would be access to non-public information or defacement. Reward amounts for this property will typically be lower than our customer facing applications.

* auditmyprocessor.com is a Wordpress application for restaurants to calculate their payment processing fees.

* Upserve HQ (https://app.upserve.com/partners/) is a Ruby on Rails application used by restaurants to view operational, sales, marketing, and finance information.
* Without credentials only authentication bypass can be tested. Credentials are provided by invite only at this time (please don't ask).

* Breadcrumb HQ (https://hq.breadcrumb.com/) is a Ruby on Rails application used by restaurants to manage their point of sale tablets and view sales reports.
* Without credentials only authentication bypass can be tested. Credentials are provided by invite only at this time (please don't ask).

* Upserve Live Mobile App - This app is for restaurants to view operational and sales information.
* Without credentials only authentication bypass can be tested. Credentials are provided by invite only at this time (please don't ask).

* Breadcrumb Pro iPad App - This app is our point of sale app for restaurants.
* Without credentials only authentication bypass can be tested. Credentials are provided by invite only at this time (please don't ask).

Out of scope vulnerabilities



The following issues are considered out of scope:
Wordpress user enumeration
Clickjacking on pages with no sensitive actions.
Unauthenticated/logout/login CSRF.
Attacks requiring MITM or physical access to a user's device.
Previously known vulnerable libraries without a working Proof of Concept.
Comma Separated Values (CSV) injection without demonstrating a vulnerability.
Missing best practices in SSL/TLS configuration.
Any activity that could lead to the disruption of our service (DoS).
Content spoofing and text injection issues without showing an attack vector/without being able to modify HTML/CSS
Account oracles -- the ability to submit a phone number, email, UUID and receive back a message indicating an Upserve account exists.
Vulnerabilities as reported by automated tools without additional analysis as to how they're an issue.
Reports from automated web vulnerability scanners (Acunetix, Vega, etc.) that have not been validated.
Banner grabbing issues
Rate limiting issues
Missing best practices in email configuration (DMARC, SPF, DKIM, etc)
Known Issues
The following issues are already known to our team - please do not submit new reports related to them, as they will be considered duplicates.
* Sessions do not expire after password change/reset
* Attacker can enroll credit cards in another user's loyalty accounts
* xmlrpc available on Wordpress sites (and associated DoS issues)
* phpMyAdmin accessible on teamhelp.upserve.com

Safe Harbor



We will not pursue civil action or initiate a complaint to law enforcement for accidental, good faith violations of this policy. We consider activities conducted consistent with this policy to constitute “authorized” conduct under the Computer Fraud and Abuse Act. To the extent your activities are inconsistent with certain restrictions in our Terms & Conditions (https://upserve.com/terms/), we waive those restrictions for the limited purpose of permitting security research under this policy. We will not bring a DMCA claim against you for circumventing the technological measures we have used to protect the applications in scope.

If legal action is initiated by a third party against you and you have complied with Upserve's bug bounty policy, Upserve will take steps to make it known that your actions were conducted in compliance with this policy.

Please understand that if your security research involves the networks, systems, information, applications, products, or services of another party (which is not us), that third party may determine whether to pursue legal action. We cannot and do not authorize security research in the name of other entities.

We will not share your report with a third-party without your permission and/or gaining their commitment they will not pursue legal action against you. Please note again that we can’t authorize out-of-scope testing in the name of third parties and such testing is beyond the scope of the program.

Please submit a HackerOne report to us before engaging in conduct that may be inconsistent with or unaddressed by this policy.

Thank you for helping keep Upserve and our users safe! If you have a question that is not answered on this page, please contact bugbounty@upserve.com

In order to encourage the adoption of bug bounty programs and promote uniform security best practices across the industry, Upserve reserves no rights in this bug bounty policy and so you are free to copy and modify it for your own purposes.
.

 

Thanks
Gift
Hall of Fame
Reward


List your Bug Bounty for free immediately!

Contact us if you want more information.

FireBounty (c) 2016