Annotation of embedaddon/curl/docs/BUG-BOUNTY.md, revision 1.1

1.1     ! misho       1: # The curl bug bounty
        !             2: 
        !             3: The curl project runs a bug bounty program in association with
        !             4: [HackerOne](https://www.hackerone.com) and the [Internet Bug
        !             5: Bounty](https://internetbugbounty.org).
        !             6: 
        !             7: # How does it work?
        !             8: 
        !             9: Start out by posting your suspected security vulnerability directly to [curl's
        !            10: HackerOne program](https://hackerone.com/curl).
        !            11: 
        !            12: After you have reported a security issue, it has been deemed credible, and a
        !            13: patch and advisory has been made public, you may be eligible for a bounty from
        !            14: this program.
        !            15: 
        !            16: See all details at [https://hackerone.com/curl](https://hackerone.com/curl)
        !            17: 
        !            18: This bounty is relying on funds from sponsors. If you use curl professionally,
        !            19: consider help funding this! See
        !            20: [https://opencollective.com/curl](https://opencollective.com/curl) for
        !            21: details.
        !            22: 
        !            23: # What are the reward amounts?
        !            24: 
        !            25: The curl projects offer monetary compensation for reported and published
        !            26: security vulnerabilities. The amount of money that is rewarded depends on how
        !            27: serious the flaw is determined to be.
        !            28: 
        !            29: We offer reward money *up to* a certain amount per severity. The curl security
        !            30: team determines the severity of each reported flaw on a case by case basis and
        !            31: the exact amount rewarded to the reporter is then decided.
        !            32: 
        !            33: Check out the current award amounts at [https://hackerone.com/curl](https://hackerone.com/curl)
        !            34: 
        !            35: # Who is eligible for a reward?
        !            36: 
        !            37: Everyone and anyone who reports a security problem in a released curl version
        !            38: that hasn't already been reported can ask for a bounty.
        !            39: 
        !            40: Vulnerabilities in features that are off by default and documented as
        !            41: experimental are not eligible for a reward.
        !            42: 
        !            43: The vulnerability has to be fixed and publicly announced (by the curl project)
        !            44: before a bug bounty will be considered.
        !            45: 
        !            46: Bounties need to be requested within twelve months from the publication of the
        !            47: vulnerability.
        !            48: 
        !            49: The vulnerabilities must not have been made public before February 1st, 2019.
        !            50: We do not retroactively pay for old, already known, or published security
        !            51: problems.
        !            52: 
        !            53: # Product vulnerabilities only
        !            54: 
        !            55: This bug bounty only concerns the curl and libcurl products and thus their
        !            56: respective source codes - when running on existing hardware. It does not
        !            57: include documentation, websites, or other infrastructure.
        !            58: 
        !            59: The curl security team will be the sole arbiter if a reported flaw can be
        !            60: subject to a bounty or not.
        !            61: 
        !            62: # How are vulnerabilities graded?
        !            63: 
        !            64: The grading of each reported vulnerability that makes a reward claim will be
        !            65: performed by the curl security team. The grading will be based on the CVSS
        !            66: (Common Vulnerability Scoring System) 3.0.
        !            67: 
        !            68: # How are reward amounts determined?
        !            69: 
        !            70: The curl security team first gives the vulnerability a score, as mentioned
        !            71: above, and based on that level we set an amount depending on the specifics of
        !            72: the individual case. Other sponsors of the program might also get involved and
        !            73: can raise the amounts depending on the particular issue.
        !            74: 
        !            75: # What happens if the bounty fund is drained?
        !            76: 
        !            77: The bounty fund depends on sponsors. If we pay out more bounties than we add,
        !            78: the fund will eventually drain. If that end up happening, we will simply not
        !            79: be able to pay out as high bounties as we would like and hope that we can
        !            80: convince new sponsors to help us top up the fund again.
        !            81: 
        !            82: # Regarding taxes, etc. on the bounties
        !            83: 
        !            84: In the event that the individual receiving a curl bug bounty needs to pay
        !            85: taxes on the reward money, the responsibility lies with the receiver. The
        !            86: curl project or its security team never actually receive any of this money,
        !            87: hold the money, or pay out the money.
        !            88: 
        !            89: ## Bonus levels
        !            90: 
        !            91: In cooperation with [Dropbox](https://www.dropbox.com) the curl bug bounty can
        !            92: offer the highest levels of rewards if the issue covers one of the interest
        !            93: areas of theirs - and only if the bug is graded *high* or *critical*. A
        !            94: non-exhaustive list of vulnerabilities Dropbox is interested in are:
        !            95: 
        !            96:  - RCE
        !            97:  - URL parsing vulnerabilities with demonstrable security impact
        !            98: 
        !            99: Dropbox would generally hand out rewards for critical vulnerabilities ranging
        !           100: from 12k-32k USD where RCE is on the upper end of the spectrum.
        !           101: 
        !           102: URL parsing vulnerabilities with demonstrable security impact might include
        !           103: incorrectly determining the authority of a URL when a special character is
        !           104: inserted into the path of the URL (as a hypothetical). This type of
        !           105: vulnerability would likely yield 6k-12k unless further impact could be
        !           106: demonstrated.

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>