Honeywell Customer TestimonialStructure all processes within a common platform and facilite the...
SECURITY VULNERABILITY REWARD PROGRAM
BeesApps is committed to keeping their SaaS solution Beesy secure and awards responsible disclosed vulnerabilities according to these rules.
At BeesApps we take security very seriously. If you believe that you have found a security vulnerability on Beesy.com, we encourage you to let us know straight away.
We believe that no technology is perfect and that working with skilled security researchers is crucial to identify weaknesses in our technology. If you believe you’ve found a security bug in our service, we are happy to work with you to resolve the issue promptly and ensure you are fairly rewarded for your discovery.
Let us know as soon as possible upon discovery of a potential security issue, and we’ll make every effort to quickly resolve the issue. Provide us a reasonable amount of time to resolve the issue before any disclosure to the public or a third-party.
Test vulnerabilities only against accounts that you own or accounts that you have permission from the account holder to test against.
Never use a finding to compromise/ex-filtrate data or pivot to other systems. Use a proof of concept only to demonstrate an issue.
If sensitive information — such as personal information, credentials, etc. — is accessed as part of a vulnerability, it must not be saved, stored, transferred, or otherwise accessed after initial discovery. All sensitive information must be returned to BeesApps and any copies of such information must not be retained.
Any type of denial of service (DDoS) attacks is strictly prohibited, as well as any interference with network equipment and BeesApps infrastructure.
Do not try to over exploit the bug and access internal data for further vulnerabilities. We will determine the severity and reward accordingly.
If you find the same vulnerability several times, please create only one report and eventually use comments. You’ll be rewarded accordingly to your findings.
Violation of any of these rules can result in ineligibility for a bounty and/or removal from the program.
investigate all legitimate reports and do our best to quickly fix the problem.
How to submit your report
Please submit your report via email to [email protected]
Your submission will be reviewed and validated by a member of the Product Security Team.
When investigating a vulnerability, please, only ever target your own accounts. Never attempt to access anyone else’s data and do not engage in any activity that would be disruptive or damaging to other users. Depending upon the severity of your issue, it may take us time to respond to you.
- When submitting a vulnerability, please provide concise steps to reproduce that are easily understood.
- In the case the same vulnerability is present on multiple products, please combine and send one report.
- When duplicates occur, we consider the first report that was received to be treated as unique, and subsequent reports will be marked as a duplicate.
Provide your IP address in the bug report. We will keep this data private and only use it to review logs related to your testing activity.
Include a custom HTTP header in all your traffic. Burp and other proxies allow the easy automatic addition of headers to all outbound requests. Report to us what header you set so we can identify it easily. For instance:
- A header that includes your username:
- A header that includes a unique or identifiable flag
When testing for a bug, please also keep in mind:
- Use test accounts so as not to inadvertently compromise the privacy of our users.
- When attempting to demonstrate root permissions with the following primitives in a vulnerable process please use the following commands:
Minimize the mayhem. Adhere to program rules at all times. Do not use automated scanners/tools — these tools include payloads that could trigger state changes or damage production systems and/or data.
Before causing damage or potential damage: Stop, report what you’ve found and request additional testing permission.
Services in scope
We reward vulnerabilities submissions for the following system
- Our Web Application www.beesy.me
- Our Mobile app IOS
- Our backend APIs on api.beesy.me
- Our DNS configuration.
Not in scope:
- Our public static websites www.beesapps.com , www.beesy.academy
- Third party services leaking customer servers metadata and/or credentials (e.g. GitHub, Prometheus, Grafana)
- Presence or absence of DMARC/SPF/other DNS records.
- Denial of service attacks.
- Lack of rate limiting.
- Brute force attacks.
- Self inflicted attacks.
- Vulnerabilities in third application that we use, please report responsibly directly to the project in question
Proof of concepts
- XSS: For XSS, a simple alert(document.domain) should suffice.
- RCE: Please only execute harmless code. Please refer to the Testing section.
- SQLi: Report it as soon as you have a SQL error that indicates SQL injection or you are able to disclose the SQL server’s version number.
- Unvalidated redirect: Set the redirect endpoint to
- CSRF: Either attach a file to demonstrate the issue or paste the code in a code block in your report.
- SSRF: Do not go playing around on any internal networks. Report as soon as you believe that you have a potential SSRF issue and we will look into it for you.
- LFI: The same applies here — please do not go against the guideline listed in the Program Rules section. We investigate LFI reports in a dev environment to make sure it is valid.
Any design or implementation issue that substantially affects the confidentiality or integrity of user data is likely to be in scope for the program. Common examples include:
- SQL Injection.
- Finding unwanted numeric user id (even yours) in views, that allow you to forge requests.
- Exposure of Sensitive members information
- Exposure of internal tools.
- Exposure of configuration files or secrets.
- Directory Traversal Issues.
- Local files access and manipulation (LFI, RFI, XXE, SSRF, XSPA).
- Local File Disclosure (LFD).
- Code injections (HTML, JS, SQL, PHP, …).
- Cross-Site Scripting (XSS).
- Cross-Site Requests Forgery (CSRF) with real security impact.
- Mixed-content scripts
- Server-Side Request Forgery (SSRF).
- Open redirect.
- Remote Code Execution (RCE).
- Broken authentication & session management.
- Insecure direct object references.
- CORS with real security impact.
- Missing “secure” flags on authentication cookies.
- Access Control Issues.
- Horizontal and vertical privilege escalation.
- Authentication or authorization flaws
- Server-side code execution bugs
Out of concern for the availability of our services to all users, please do not attempt to carry out DoS attacks, leverage black hat SEO techniques, spam people, brute force authentication, or do other similarly questionable things. We also discourage the use of any vulnerability testing tools that automatically generate very significant volumes of traffic.
Depending on their impact, some of the reported issues may not qualify. Although we review them on a case-by-case basis, here are some of the issues that typically do not earn a monetary reward:
- Any hypothetical flaw or best practices without exploitable POC.
- Login, logout, unauthenticated or low-value CSRF.
- Missing security-related HTTP headers which do not lead directly to a vulnerability.
- Presence/absence of SPF/DMARC records.
- Reports of insecure SSL/TLS ciphers (unless you have a working proof of concept).
- Mixed content warnings.
- Brute force / password reuse attacks.
- User enumeration attacks.
- Premium phone numbers attacks.
- Disclosure of known public files or directories, (e.g. robots.txt).
- Massive automated actions on the platform through robots/crawling (except if it gathers sensitive information from members).
- “Self” XSS.
- Missing cookie flags.
- SSL/TLS best practices.
- Mixed content warnings.
- Denial of Service attacks.
- “HTTP Host Header” XSS.
- Clickjacking/UI redressing.
- Software version disclosure.
- Stack traces or path disclosure.
- Physical or social engineering attempts.
- Recently disclosed 0-day vulnerabilities.
- Presence of autocomplete attribute on web forms.
- Vulnerabilities affecting outdated browsers or platforms.
- Issues that require physical access to a victim’s computer/device.
- Logout and other instances of low-severity Cross-Site Request Forgery.
- Missing security-related HTTP headers which do not lead directly to a vulnerability.
- Reports from automated web vulnerability scanners (Acunetix, Vega, etc.) that have not been validated.
- Reports about third-party applications we provide to our customers but aren’t part of our system directly (phpMyAdmin, Roundcube Webmail, etc.), if the vulnerability doesn’t directly exposes customers data and/or metadatas.
- Reports on third-party applications that we provide to our customers but are not directly part of our system (phpMyAdmin, Webmail Roundcube, etc.), unless the vulnerability that exposes user data and/or metadata is fixed for more than a month in the upstream version and we are not up to date.
- Reports about know vulnerabilities in sub-component parts (e.g. OpenSSH) that are just being disclosed. We aim to apply security patches in 30 days or less, so reports that concern to recent disclosed vulnerabilities are not relevant.
- Reports about sites or applications hosted by our customer, except if the vulnerability is due to our platform in conjunction with the customer application.
- Reports about vulnerabilities from third-party applications that we use that are either unknown, unfixed or fixed in unreleased versions.
- Bugs requiring exceedingly unlikely user interaction
- Non security related bugs (e.g. disclosure of server/software versions)
Eligibility and Responsible Disclosure
We are happy to thank everyone who submits valid reports which help us improve the security of BeesApps . However, only those that meet the following eligibility requirements may receive a monetary reward:
- You must be the first reporter of a vulnerability.
- The vulnerability must be a qualifying vulnerability (see above).
- Any vulnerability found must be reported no later than 24 hours after discovery and exclusively through an email send to [email protected]
- You must send a clear textual description of the report along with steps to reproduce the issue using standard Linux tools. We may ask you to send a proof of concept that reproduces the vulnerability (e.g. a shell script).
- You must avoid tests that could cause degradation or interruption of our service (refrain from using automated tools, and limit yourself about requests per second).
- You must not leak, manipulate, or destroy any user data.
- You must not be a former (1 year) or current employee of BeesApps, or one of its contractor.
REWARD AMOUNTS FOR SECURITY VULNERABILITIES
Our rewards are based on severity per CVSS v3.1 Ratings. In the event of duplicate reports, we award a bounty to the first person to submit an issue. For a critical severity you additionally need to demonstrate that your attack could compromise the confidentiality or integrity of all Beesy users without any user interaction needed
to be discuss, case by case
Our analysis is always based on worst case exploitation of the vulnerability, as is the reward we pay.
Time to first response: 2 business days or less.
Time to triage: 3 business days or less.
We are continuously working to evolve our bug bounty program. We aim to respond to incoming submissions as quickly as possible and make every effort to have bugs fixed within 10 days of being triaged. Rewards will be paid when patch is applied, so you should expect a payment for confirmed vulnerabilities within two weeks.
No vulnerability disclosure, including partial, is allowed before the patch is applied and we agree the publication.
We will not pursue civil action or initiate a complaint to law enforcement for accidental, good faith violations of this policy. We consider activities conducted consistent with this policy to constitute “authorized” conduct. We will not bring a claim against you for circumventing the technological measures we have used to protect the applications in scope of this program.
If legal action is initiated by a third party against you and you have complied with this security policy, we will take steps to make it known that your actions were conducted in compliance with this policy.
It is also important to note, we will not take legal action against you simply for providing us with a proof of concept of the security vulnerability. Please follow the guidelines listed in the Proof of concepts section above to ensure that your proof of concept is detailed enough to demonstrate the issue and still follows the guideline listed above.
We are unable to issue rewards to individuals who are on sanctions lists, or who are in countries (e.g. Cuba, Iran, North Korea, Sudan and Syria) on sanctions lists. You are responsible for any tax implications depending on your country of residency and citizenship. There may be additional restrictions on your ability to enter depending upon your local law. This is not a competition, but rather an experimental and discretionary rewards program. You should understand that we can cancel the program at any time and the decision as to whether or not to pay a reward has to be entirely at our discretion. Of course, your testing must not violate any law, or disrupt or compromise any data that is not your own.