BugBounty.jp

Program

Total Reports:13
Total Valid Reports:7

Zaim(iOS/Android)

  Bounty Point
Program
Zaim(iOS/Android)
Online household account book service
Program Logo
Program Logo
Period
2018/06/20 〜 2018/08/31
Bounty Range
¥1,000¥132,000
Rules
Only test for vulnerabilities on application stipulated in scope section. Any vulnerabilities reported on applications out-of-scope are not eligible for bounty rewards.

**************************************
This is a production environment. Do not create account more than necessary to perform tests, and please delete your account as soon as you finished your tests.
Please note that you should only perform tests against account you created, never other users account.
To be eligible for a bounty reward under this program you must to follow the rules stipulated above.
**************************************

Any vulnerability test against domains out-of-scope are explicitly prohibited.

Any violation on the Terms of Service of the “BugBounty.jp” and/or performance of DoS (Denial of Service) attack or equivalent act that can degrade the performance of our service are also explicitly prohibited.
Scope
iOS application
Name
Zaim
URL
  • https://itunes.apple.com/jp/app/zaim-wu-liaono-jia-ji-bu-zhi/id445850671
Domain
  • api.zaim.net
  • auth.zaim.net
Android application
Name
Zaim
URL
  • https://play.google.com/store/apps/details?id=net.zaim.android
Domain
  • api.zaim.net
  • auth.zaim.net
Eligible
For Bounty
  • Remote Code Execution up to 132,000yen
  • Authentication up to 122,000yen
  • SQL Injection up to 114,000yen
  • Cross-Site Scripting up to 27,000yen
  • Privilege Escalation up to 27,000yen
  • Forced Browsing up to 27,000yen
  • Open Redirect up to 12,000yen
  • Information Disclosure up to 11,000yen
  • Cross-Site Request Forgery (CSRF) up to 9,000yen
  • other up to 5,000yen
  • Not Eligible
    For Bounty
  • Vulnerabilities found through automated scans or tools
  • Hypothetical or theoretical vulnerabilities without actual verification code
  • Vulnerabilities with capability of Denial of Service attack
  • Vulnerabilities with capability of brute force against password or tokens
  • Password, email and account policies, such as email id verification, reset link expiration, password complexity
  • Login/Logout CSRF
  • Missing CSRF tokens
  • CSRF on forms that are available to anonymous users (e.g. contact form)
  • Missing security headers
  • Vulnerabilities found in domains out-of-scope
  • Vulnerabilities affecting outdated browsers or platforms
  • Presence of autocomplete attribute on web forms
  • Missing secure flags on non-sensitive cookies
  • Reports of insecure SSL/TLS ciphers
  • Vulnerabilities with capability of username/email enumeration
  • Descriptive error messages (e.g. Stack traces, application or server errors)
  • Banner disclosure on servers
  • Misconfiguration of SPF record, DMARC and DKIM
  • Invalid HTTP method
  • Notes
    For eligibility details, please refer to the "Terms of Service Article 4" of this site.
    Not accepting reports

    Bounty Reward History

    • 2018/09/05 16:19

      paid for Private 's report

      報奨金 ポイント
    • 2018/09/04 20:11

      paid for Private 's report

      報奨金 ポイント
    • 2018/09/04 20:07

      paid for brdoors 's report

      報奨金 ポイント
    • 2018/08/23 19:44

      paid for no1zy 's report

      報奨金 ポイント
    • 2018/08/17 15:14

      paid for niwasaki 's report

      報奨金 ポイント
    • 2018/08/17 15:08

      paid for niwasaki 's report

      報奨金 ポイント
    • 2018/08/17 14:47

      paid for brdoors 's report

      報奨金 ポイント
    Not accepting reports

    Zaim Inc.

    Available Program:
    0
    Closed Program:
    3
    Bounties Range:
    ¥ 1,000¥ 132,000
    Reward Type:
    Bounty Point

    Top Hackers

    ALL RANKING