Total Reports:89
Total Valid Reports:23



  Bounty Point
chat application
Program Logo
Program Logo
2017/06/28 〜 2019/01/31
Bounty Range
Only test for vulnerabilities on web application stipulated in scope section. Any vulnerabilities reported on web applications out-of-scope are not eligible for bounty rewards.

Rewards for this program are points only. There is no monetary reward.

This is a production environment. Do not create account more than necessary to perform tests, and please delete your account as soon as you finished your tests.
Please note that you should only perform tests against account you created, never other users account.
To be eligible for a bounty reward under this program you must to follow the rules stipulated above.

Any vulnerability test against domains out-of-scope are explicitly prohibited.

Any violation on the Terms of Service of the “BugBounty.jp” and/or performance of DoS (Denial of Service) attack or equivalent act that can degrade the performance of our service are also explicitly prohibited.
Web application
チャットワーク アプリケーション
  • https://www.chatwork.com/
  • www.chatwork.com
For Bounty
  • Authentication 〜50,000yen
  • Command Injection 〜50,000yen
  • Cross-Site Request Forgery (CSRF) 〜50,000yen
  • Remote Code Execution 〜50,000yen
  • SQL Injection 〜50,000yen
  • Server-Side Request Forgery (SSRF) 〜47,000yen
  • Cross-Site Scripting 〜40,000yen
  • other 〜30,000yen
  • Path Traversal 〜13,000yen
  • Privilege Escalation 〜11,000yen
  • HTTP Response Splitting 〜11,000yen
  • Forced Browsing 〜11,000yen
  • Cleartext Transmission of Sensitive Information 〜11,000yen
  • Information Disclosure 〜5,000yen
  • Open Redirect 〜5,000yen
  • Session Fixation 〜5,000yen
  • Not Eligible
    For Bounty
  • Vulnerabilities found through automated scans or tools
  • Hypothetical or theoretical vulnerabilities without actual verification code
  • Vulnerabilities with capability of Denial of Service attack
  • Vulnerabilities with capability of brute force against password or tokens
  • Password, email and account policies, such as email id verification, reset link expiration, password complexity
  • Login/Logout CSRF
  • CSRF on forms that are available to anonymous users (e.g. contact form)
  • Vulnerabilities found in domains out-of-scope
  • Vulnerabilities affecting outdated browsers or platforms
  • Presence of autocomplete attribute on web forms
  • Missing secure flags on non-sensitive cookies
  • Reports of insecure SSL/TLS ciphers
  • Vulnerabilities with capability of username/email enumeration
  • Descriptive error messages (e.g. Stack traces, application or server errors)
  • Banner disclosure on servers
  • Misconfiguration of SPF record, DMARC and DKIM
  • Invalid HTTP method
  • 被害者の端末を直接操作する必要がある脆弱性
  • https://en.wikipedia.org/wiki/Tabnabbing (主要なウェブサービスが未対策のため)
  • Notes
    For eligibility details, please refer to the "Terms of Service Article 4" of this site.
    Report Bug

    Bounty Reward History

    • 2018/02/19 14:18

      ¥10,000 (10 pts) was paid for kusano 's report

      報奨金 ポイント
    • 2018/02/19 12:58

      ¥20,000 (20 pts) was paid for Private 's report

      報奨金 ポイント
    • 2018/02/19 11:27

      ¥50,000 (50 pts) was paid for kongwenbin 's report

      報奨金 ポイント
    • 2018/02/19 10:20

      ¥5,000 (5 pts) was paid for Private 's report

      報奨金 ポイント
    • 2018/02/13 09:07

      ¥5,000 (5 pts) was paid for Private 's report

      報奨金 ポイント
    • 2018/02/05 10:07

      ¥1,000 (1 pts) was paid for ♠ Spade ♠ 's report

      報奨金 ポイント
    • 2018/01/30 20:15

      ¥1,000 (1 pts) was paid for zer0 's report

      報奨金 ポイント
    Report Bug

    ChatWork Inc.

    Available Program:
    Closed Program:
    Bounties Range:
    ¥ 1,000¥ 50,000
    Reward Type:
    Bounty Point

    Top Hackers