Program

pixiv

¥

P

Total Reports 75

Total Valid Reports 36

  • Program
    pixiv
    Report Submission Period
    2016/04/01 〜 2017/12/31
    Bounty Range
    ¥5,000¥100,000
    Rules
    Only test for vulnerabilities on web application stipulated in scope section. Any vulnerabilities reported on web applications out-of-scope are not eligible for bounty rewards.

    ***************************************************************
    This is a production environment. Do not create account more than necessary to perform tests, and please delete your account as soon as you finished your tests.
    Please note that you should only perform tests against pages you created, never other users pages.
    To be eligible for a bounty reward under this program you must to follow the rules stipulated above.
    ***************************************************************

    Any vulnerability test against domains out-of-scope are explicitly prohibited.

    Any violation of the Terms of the Service of the “BugBounty.jp”, and/or performance of DoS (Denial of Service)attack or equivalent act that can degrade the performance of our service are also explicitly prohibited.
    Scope
    BOOTH – A fun and effortless way to sell your creations
    https://booth.pm/

    pixivFACTORY – A fun and effortless way to create your own items
    https://factory.pixiv.net/

    pixiv - 創作活動をもっとたのしく
    http://www.pixiv.net/

    The following domains are in-scope for this program.

    *.booth.pm
    factory.pixiv.net
    payment.pixiv.net
    accounts.pixiv.net
    app-api.pixiv.net
    bungei-api.pixiv.net
    comic-api.pixiv.net
    embed.pixiv.net
    m.pixiv.net
    pixiv.me
    oauth.secure.pixiv.net
    public-api.secure.pixiv.net
    sensei.pixiv.net
    source.pixiv.net
    ssl.pixiv.net
    touch.pixiv.net
    www.pixiv.net
    Eligible For Bounty
    The following vulnerabilities are eligible to receive bounty reward.

    (1) Remote Code Execution
    (2) Billing System Bypass
    (3) SQL Injection
    (4) Authentication Bypass
    (5) Cross-Site Scripting (XSS)
    (6) Cross-Site Request Forgery (CSRF)
    (7) Other
    Not Eligible For Bounty
    Reports related to the following issues are out-of-scope for this program.

    (1) Vulnerabilities found through automated scans or tools.
    (2) Hypothetical or theoretical vulnerabilities without actual verification code
    (3) Vulnerabilities with capability of Denial of Service attack
    (4) Vulnerabilities with capability of brute force against password or tokens
    (5) Password, email and account policies, such as email id verification, reset link expiration, password complexity
    (6) Login/Logout CSRF
    (7) CSRF on forms that are available to anonymous users (e.g. contact form)
    (8) Vulnerabilities found in domains out-of-scope
    (9) Vulnerabilities affecting outdated browsers or platforms
    (10) Presence of autocomplete attribute on web forms
    (11) Missing secure flags on non-sensitive cookies
    (12) Reports of insecure SSL/TLS ciphers
    (13) Vulnerabilities with capability of username/email enumeration
    (14) Descriptive error messages (e.g. Stack traces, application or server errors)
    (15) Banner disclosure on servers
    (16) Misconfiguration of SPF record, DMARC and DKIM
    (17) Invalid HTTP method
    (18) Vulnerabilities that need direct manipulation of victim’s device
    (19) https://en.wikipedia.org/wiki/Tabnabbing (No major websites seem to have made actions)
    Notes
    For eligibility details, please refer to the "Terms of Service Article 4" of this site.
    • paid for Private 's report
      granted for Private 's report
      2017/01/27 12:03

    • paid for Private 's report
      granted for Private 's report
      2017/01/27 11:42

    • paid for Private 's report
      granted for Private 's report
      2017/01/25 18:32

    • paid for uruma 's report
      granted for uruma 's report
      2017/01/24 17:42

    • paid for たじんなべ<s>sss 's report
      granted for たじんなべ<s>sss 's report
      2017/01/16 17:25

    • paid for Private 's report
      granted for Private 's report
      2016/12/09 16:14

    • paid for Private 's report
      granted for Private 's report
      2016/09/12 15:35

    • paid for Private 's report
      granted for Private 's report
      2016/08/01 17:33

    • paid for uruma 's report
      granted for uruma 's report
      2016/07/11 17:21

    • paid for Private 's report
      granted for Private 's report
      2016/07/11 17:08

    • paid for kusano 's report
      granted for kusano 's report
      2016/06/20 17:47

    • paid for shhnjk 's report
      granted for shhnjk 's report
      2016/06/16 19:13

    • paid for kusano 's report
      granted for kusano 's report
      2016/06/13 17:50

    • paid for shinkbr 's report
      granted for shinkbr 's report
      2016/06/07 19:46

    • paid for uruma 's report
      granted for uruma 's report
      2016/06/07 17:39

    • paid for shhnjk 's report
      granted for shhnjk 's report
      2016/05/31 17:23

    • paid for Private 's report
      granted for Private 's report
      2016/05/24 17:34

    • paid for yujitounai 's report
      granted for yujitounai 's report
      2016/05/24 17:06

    • paid for yujitounai 's report
      granted for yujitounai 's report
      2016/05/12 23:36

    • paid for Private 's report
      granted for Private 's report
      2016/04/11 17:43

    • paid for Private 's report
      granted for Private 's report
      2016/04/11 17:34

    • paid for Private 's report
      granted for Private 's report
      2016/04/11 17:30

    • paid for Private 's report
      granted for Private 's report
      2016/04/11 17:24