Administrator Posted December 9, 2013 Posted December 9, 2013 In order to show its appreciation for security researchers who followresponsible disclosure principles, cPanel, Inc. is offering a monetary rewardprogram for researchers who provide assistance with identifying and correctingcertain Qualifying Vulnerabilities within the scope of this program. Software Covered by this Program- ——————————– * The cPanel & WHM and EasyApache software.* Configuration, setup, and customizations of third-party applications performedby the cPanel & WHM and EasyApache software. Software not Covered by this Program- ———————————— * Third-party applications and software (including those distributed with, usedby, or integrated into cPanel & WHM or EasyApache.)* Vulnerabilities that exist in the operating system onto which cPanel & WHM isinstalled.* Vulnerabilities in software produced or maintained by companies owned by oraffiliated with cPanel. Vulnerabilities in this software should be reported tothese companies directly and are not within the scope of this bounty program. Responsible Disclosure of Vulnerabilities in cPanel & WHM- ——————————————————— To be eligible for a bounty under this program, you must be the first to reporta Qualifying Vulnerability within the scope of this program. You must alsoadhere to cPanel’s Responsible Disclosure policy. This means: * After discovering a vulnerability in the covered software, you must submit theinitial report to security@cpanel.net. Reports of vulnerabilities submittedvia other channels may not be considered eligible for any bounty reward.* cPanel’s Security Team will evaluate your report to determine whether or notit is a vulnerability in the covered software.* cPanel’s Security Team may ask for additional clarification from the reporter,assistance in replicating the vulnerability, or assistance in determining thebest course of action for mitigating the vulnerability. The reporter isexpected to provide timely responses to these inquiries.* cPanel’s Security Team will implement fixes for the vulnerability, ifnecessary.* cPanel’s Security Team will distribute the fixes to customers.* After sufficient time has passed for our customers to upgrade to fixedversions of our software, cPanel will release a detailed disclosure statementthat explains the scope of the vulnerabilities that have been addressed.* After the detailed disclosure has been released, cPanel will provide a rewardto the researchers who have maintained confidentiality with cPanel throughoutthe process.* cPanel will not discuss whether a vulnerability is within the scope of thisprogram or any payout terms before the full Responsible Disclosure process hasbeen completed. Examples of Qualifying Vulnerabilities- ————————————– Any design or implementation issue within cPanel & WHM that substantiallyaffects the confidentiality or integrity of user data or the system is likely tobe within the scope of this program. Common examples include: * Cross-Site Scripting* Cross-Site Request Forgery* Privilege escalation* Authentication or Authorization flaws* Information disclosure flaws that allow users with limited privileges to viewdata they should not have access to* SQL injection flaws that cross privilege boundaries Examples of Non-Qualifying Vulnerabilities- —————————————— Although cPanel assesses each report on a case-by-case basis, some reportssimply do not qualify for reward. Common examples of reports that typically donot qualify for reward include: * Execution of code or JavaScript supplied in themes, translations, andbrandings that were installed by accounts with appropriate authorization.* Local Denial of Service attacks. cPanel may consider vulnerabilities withinthis category to merit a bounty if they allow users with very limitedprivileges to disable services without sustained effort.* Logout Cross-Site Request Forgery attacks.* Flaws which require the use of out of date browsers, plugins, operatingsystems, or other client-side applications.* Flaws which exist only in unsupported versions of cPanel & WHM.* Vulnerabilities that are only exploitable when security controls in thesoftware are intentionally disabled.* Vulnerabilities that require physical access to the systems being attacked.* Any actions performed intentionally by a user with proper authorization.* Any vulnerabilities that require an element of social engineering to succeed.* Aspects of the software that are not directly exploitable, but constitutepotential hardening measures. While we appreciate input about methods toharden cPanel & WHM, such discussions are not within the scope of thisprogram.* Behaviors or vulnerabilities within third-party software shipped with or usedby cPanel & WHM that has not been modified by cPanel. Confidentiality During the Responsible Disclosure Process- ——————————————————— cPanel strives to address vulnerabilities in a timely and responsible fashion inorder to protect our customers from unnecessary risk. We expect researchers toshare this goal and maintain full confidentiality of any vulnerabilities theydiscover until these flaws are fully remediated and responsibly disclosed.Failure to maintain confidentiality with cPanel regarding a vulnerability duringthe full timeframe required for cPanel to evaluate, fix, and disclose thevulnerability will be considered a breach of trust by the researcher and willresult in the loss of any bounty that would otherwise be due for the discoveryof the vulnerability. cPanel considers ANY public discussion of a vulnerability, even hints at theexistence of such a vulnerability, to be a breach of these confidentialityrequirements. Further, sharing information regarding a vulnerability with anythird-parties during the time required for cPanel to address the vulnerabilitywill also be considered a breach. Failure to maintain confidentiality during theresolution of a vulnerability will result in disqualification of the specificvulnerability disclosed and may result in the reporter being barred from anyfuture rewards under this program. Reward Eligibility- —————— Any tax consequences resulting from the payment of a reward are the recipient’ssole responsibility. Depending on the recipient’s country of residency andcitizenship, additional restrictions (such as international and local laws) maylimit the ability of a reporter to receive a reward or impose additionalrequirements on cPanel or the reporter. When direct payment is not possible ordesired, reporters of qualifying vulnerabilities will be given the option todonate the bounty reward to a non-profit charity of their choosing from a listof eligible charities provided by cPanel. cPanel, in its sole discretion, shall determine the eligibility of allsubmissions and amount of any final reward offered. Additionally, cPanel maydiscontinue the reward program at any time with or without notice. cPanel, Inc.staff and their family, friends, neighbors, associates, etc., are not eligibleto receive any rewards under this program. In cases where multiple parties (including cPanel itself) independently discoverthe same vulnerability, only the first party to discover the vulnerability willbe credited for the finding or awarded any bounty under this program. cPanel likes to give public recognition to individuals and companies that assistwith fixing security vulnerabilities, but understands that some vulnerabilityreporters do not desire public acknowledgement. If you desire to remainanonymous, meaning no public mention of you or your company, please let us know. For the PGP-signed message, see bounty-program. View the full article
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now