Annotation of embedaddon/curl/docs/BUG-BOUNTY.md, revision 1.1
1.1 ! misho 1: # The curl bug bounty
! 2:
! 3: The curl project runs a bug bounty program in association with
! 4: [HackerOne](https://www.hackerone.com) and the [Internet Bug
! 5: Bounty](https://internetbugbounty.org).
! 6:
! 7: # How does it work?
! 8:
! 9: Start out by posting your suspected security vulnerability directly to [curl's
! 10: HackerOne program](https://hackerone.com/curl).
! 11:
! 12: After you have reported a security issue, it has been deemed credible, and a
! 13: patch and advisory has been made public, you may be eligible for a bounty from
! 14: this program.
! 15:
! 16: See all details at [https://hackerone.com/curl](https://hackerone.com/curl)
! 17:
! 18: This bounty is relying on funds from sponsors. If you use curl professionally,
! 19: consider help funding this! See
! 20: [https://opencollective.com/curl](https://opencollective.com/curl) for
! 21: details.
! 22:
! 23: # What are the reward amounts?
! 24:
! 25: The curl projects offer monetary compensation for reported and published
! 26: security vulnerabilities. The amount of money that is rewarded depends on how
! 27: serious the flaw is determined to be.
! 28:
! 29: We offer reward money *up to* a certain amount per severity. The curl security
! 30: team determines the severity of each reported flaw on a case by case basis and
! 31: the exact amount rewarded to the reporter is then decided.
! 32:
! 33: Check out the current award amounts at [https://hackerone.com/curl](https://hackerone.com/curl)
! 34:
! 35: # Who is eligible for a reward?
! 36:
! 37: Everyone and anyone who reports a security problem in a released curl version
! 38: that hasn't already been reported can ask for a bounty.
! 39:
! 40: Vulnerabilities in features that are off by default and documented as
! 41: experimental are not eligible for a reward.
! 42:
! 43: The vulnerability has to be fixed and publicly announced (by the curl project)
! 44: before a bug bounty will be considered.
! 45:
! 46: Bounties need to be requested within twelve months from the publication of the
! 47: vulnerability.
! 48:
! 49: The vulnerabilities must not have been made public before February 1st, 2019.
! 50: We do not retroactively pay for old, already known, or published security
! 51: problems.
! 52:
! 53: # Product vulnerabilities only
! 54:
! 55: This bug bounty only concerns the curl and libcurl products and thus their
! 56: respective source codes - when running on existing hardware. It does not
! 57: include documentation, websites, or other infrastructure.
! 58:
! 59: The curl security team will be the sole arbiter if a reported flaw can be
! 60: subject to a bounty or not.
! 61:
! 62: # How are vulnerabilities graded?
! 63:
! 64: The grading of each reported vulnerability that makes a reward claim will be
! 65: performed by the curl security team. The grading will be based on the CVSS
! 66: (Common Vulnerability Scoring System) 3.0.
! 67:
! 68: # How are reward amounts determined?
! 69:
! 70: The curl security team first gives the vulnerability a score, as mentioned
! 71: above, and based on that level we set an amount depending on the specifics of
! 72: the individual case. Other sponsors of the program might also get involved and
! 73: can raise the amounts depending on the particular issue.
! 74:
! 75: # What happens if the bounty fund is drained?
! 76:
! 77: The bounty fund depends on sponsors. If we pay out more bounties than we add,
! 78: the fund will eventually drain. If that end up happening, we will simply not
! 79: be able to pay out as high bounties as we would like and hope that we can
! 80: convince new sponsors to help us top up the fund again.
! 81:
! 82: # Regarding taxes, etc. on the bounties
! 83:
! 84: In the event that the individual receiving a curl bug bounty needs to pay
! 85: taxes on the reward money, the responsibility lies with the receiver. The
! 86: curl project or its security team never actually receive any of this money,
! 87: hold the money, or pay out the money.
! 88:
! 89: ## Bonus levels
! 90:
! 91: In cooperation with [Dropbox](https://www.dropbox.com) the curl bug bounty can
! 92: offer the highest levels of rewards if the issue covers one of the interest
! 93: areas of theirs - and only if the bug is graded *high* or *critical*. A
! 94: non-exhaustive list of vulnerabilities Dropbox is interested in are:
! 95:
! 96: - RCE
! 97: - URL parsing vulnerabilities with demonstrable security impact
! 98:
! 99: Dropbox would generally hand out rewards for critical vulnerabilities ranging
! 100: from 12k-32k USD where RCE is on the upper end of the spectrum.
! 101:
! 102: URL parsing vulnerabilities with demonstrable security impact might include
! 103: incorrectly determining the authority of a URL when a special character is
! 104: inserted into the path of the URL (as a hypothetical). This type of
! 105: vulnerability would likely yield 6k-12k unless further impact could be
! 106: demonstrated.
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>