Program

BugBounty.jp

¥

P

Total Reports 73

Total Valid Reports 21

  • Program
    BugBounty.jp
    Created by Sprout, “BugBounty.jp” is the first bug bounty program platform in Japan that forms a unique relationship between companies and hackers around the world. Companies can receive assistance from “friendly-hackers” to find vulnerabilities in their web services and applications, and receive reports on those vulnerabilities under the conditions defined by your company.
    Report Submission Period
    2015/12/09 〜 2017/03/31
    Total Bounties
    ¥3,000,000
    Bounty Range
    ¥5,000¥500,000
    Rules
    Sprout have prepared verification environment to perform tests. Perform tests only against verification environment.
    Reports of test performed outside of verification environment are not eligible for bounty rewards.
    Only functions available to researchers are in-scope for the BugBounty website.
    Scope
    The following web services are in-scope for this program.

    ・BugBounty.jp
     https://pt.bugbounty.jp

    Any vulnerability test against domains outside of verification environment are out-of-scope for this program.
    Eligible For Bounty
    The following vulnerabilities are eligible to receive bounty rewards.

    (1) Remote Code Execution
    (2) SQL Injection
    (3) Authentication Bypass
    (4) Cross-Site Scripting (XSS)
    (5) Cross-Site Request Forgery (CSRF)
    (6) Other

    The following guidelines the bounty amount for in-scope vulnerabilities.

    (1) ¥500,000〜  Remote Code Execution
    (2) ¥200,000〜  SQL Injection
    (3) ¥200,000〜  Authentication Bypass
    (4) ¥50,000〜  Cross-Site Scripting (XSS)
    (5) ¥10,000〜  Cross-Site Request Forgery (CSRF)
    (6) ¥5,000〜   Other
    Not Eligible For Bounty
    Reports related to the following issues are out-of-scope for this program.

    (1) Vulnerabilities found through automated scans or tools
    (2) Hypothetical or theoretical vulnerabilities without actual verification code
    (3) Vulnerabilities with capability of Denial of Service attack
    (4) Vulnerabilities with capability of brute force against password or tokens
    (5) Password, email and account policies, such as email id verification, reset link expiration, password complexity
    (6) Login/Logout CSRF
    (7) Missing CSRF tokens
    (8) CSRF on forms that are available to anonymous users (e.g. the contact us form)
    (9) Missing security headers
    (10) Vulnerabilities found in domains out-of-scope
    (11) Vulnerabilities affecting outdated browsers or platforms
    (12) Presence of autocomplete attribute on web forms
    (13) Missing secure flags on non-sensitive coolies
    (14) Reports of insecure SSL/TLS ciphers
    (15) Vulnerabilities with capability of username/email enumeration
    (16) Descriptive error messages (e.g. Stack traces, application or server errors)
    (17) Banner disclosure on servers
    (18) Text Injection
    Notes
    To participate in this Bug Bounty Program, you must satisfy the following requirements:

    (1) You have never carried out any project related with Sprout Inc.

    For eligibility other than listed above, please refer to the "Terms of Service Article 4" of this site.
    • paid for mage 's report
      granted for mage 's report
      2016/09/29 11:59

    • paid for Private 's report
      granted for Private 's report
      2016/04/28 17:27

    • paid for Private 's report
      granted for Private 's report
      2016/04/28 17:23

    • paid for Private 's report
      granted for Private 's report
      2016/04/25 15:22

    • paid for Private 's report
      granted for Private 's report
      2016/04/14 18:22

    • paid for Private 's report
      granted for Private 's report
      2016/04/14 16:07

    • paid for uruma 's report
      granted for uruma 's report
      2016/02/10 15:13

    • paid for Private 's report
      granted for Private 's report
      2016/01/27 17:24

    • paid for g_sato 's report
      granted for g_sato 's report
      2016/01/27 17:22

    • paid for shhnjk 's report
      granted for shhnjk 's report
      2016/01/26 16:28

    • granted for g_sato 's report
      2016/01/18 14:59

    • paid for Private 's report
      granted for Private 's report
      2016/01/18 14:35

    • paid for Private 's report
      granted for Private 's report
      2016/01/18 14:31

    • paid for mage 's report
      granted for mage 's report
      2016/01/06 18:39

    • paid for mage 's report
      granted for mage 's report
      2015/12/25 19:55

    • paid for kusano 's report
      granted for kusano 's report
      2015/12/21 19:02

    • paid for yujitounai 's report
      granted for yujitounai 's report
      2015/12/18 18:12

    • granted for shhnjk 's report
      2015/12/18 17:47