Banner object (1)

Hack and Take the Cash !

844 bounties in database
  Back Link to program      
29/08/2015
ownCloud logo
Thanks
Gift
Hall of Fame
Reward

Reward

50 $ 

ownCloud

We created the ownCloud Security Bug Bounty Program to reward security researchers for finding issues in the ownCloud Server, and in so doing help strengthen ownCloud Server for customers, users and the community.

Rewards

If the bug is identified as meaningful and qualifies for the program, and the reporter has followed the Disclosure Policy, the bug bounty is paid out on the following schedule by bug severity:

Impact | Definition | Reward
---|---|---
Critical | Gaining remote code execution on the server as a non-admin user. (i.e. RCE) | $5000
High | Gaining access to complete user data of any other user. (i.e. Auth Bypass) or SQL Injection with critical effects | $2000
Medium | Allowing the adversary to gain complete control over a single user session. (Stored XSS with CSP bypass / Critical CSRF / …) | $500
Low | Vulnerabilities that can only be exploited in very rare cases or have marginal impact. (High amount of unlikely user interaction / …) | $50
Very Low | Vulnerabilities that affects our servers (Trace Method on, Directory Listening...) | Swag

The severity of the bug is determined at the discretion of ownCloud and the ownCloud security team.
All bounties will be paid using the HackerOne platform, a site that manages bug bounty payouts and security contacts for software vendors.

Disclosure Policy

  • Let us know as soon as possible upon discovery of a potential security issue, and we'll make every effort to quickly resolve the issue.
  • Provide us a reasonable amount of time to resolve the issue before any disclosure to the public or a third-party.
  • Only test for vulnerabilities on your own installation of ownCloud server, desktop or related mobile applications.
  • Do not publish information related to the vulnerability until ownCloud has made an announcement to the community.

In case of duplicate reports we only reward the first reporter of the vulnerability. Public disclosure prior to resolution and without explicit confirmation by the ownCloud Security Team will result in disqualification for the bounty program.

We believe in transparency and will publicly disclose each applicable report.

Note that we consider any bug caused by an already known and fixed PHP issues as a non-issue. This means that you should always test using the latest available PHP release (of the 5.5, 5.6 or 7.0 branch) running on mod_php.

Found a bug in one of our websites or so? While we can't offer you any monetary reward we will acknowledge the issue and happily accept reports for it via this platform as well. But please do not run any Denial of Service attacks against our infrastructure or extract user data. Please do also refrain from using automated testing tools against our infrastructure.

In Scope

Scope Type Scope Name
android_application

com.owncloud.android

android_application

https://play.google.com/store/apps/details?id=com.owncloud.android __

ios_application

owncloud.iosapp

web_application

https://github.com/owncloud/user_ldap __

web_application

Code from: https://github.com/owncloud/user_ldap __ This application enables administrators to connect ownCloud to an LDAP-based user directory for authentication and provisioning users, groups and user attributes. Admins can configure this application to connect to one or more LDAP directories or Active Directories via an LDAP interface. Attributes such as user quota, email, avatar pictures, group memberships and more can be pulled into ownCloud from a directory with the appropriate queries and filters.

web_application

https://github.com/owncloud/richdocuments __

web_application

https://github.com/owncloud/guests __

web_application

https://github.com/owncloud/oauth2 __

web_application

https://github.com/owncloud/core __

web_application

https://github.com/owncloud/customgroups __

web_application

https://github.com/owncloud/updater __

web_application

https://github.com/owncloud/gallery __

web_application

https://github.com/owncloud/notifications __

web_application

https://github.com/owncloud/files __

web_application

https://github.com/owncloud/activity __

web_application

https://github.com/owncloud/android __

web_application

https://owncloud.org/install/#install-clients __

web_application

https://github.com/owncloud/client __

web_application

https://itunes.apple.com/en/app/owncloud/id543672169 __

web_application

https://github.com/owncloud/ios __

Out of Scope

Scope Type Scope Name
web_application

*.owncloud.org

web_application

*.owncloud.com


Firebounty have crawled on 2015-08-29 the programe ownCloud on the platform Hackerone.

FireBounty © 2015-2019

Legal notices