Outscale Cockpit bug bounty program Founded in 2010, strategic partner to Dassault Systèmes and CMSP Advanced certified by Cisco Systems, Outscale provides enterprise-class Cloud Computing services (IaaS) that meet regulatory and local requirements internally.

Informations

80€ Minimum bounty

Reports Accepted 12

Reward types : Bounty Gift Hall Of Fame

Rules

Introduction

Founded in 2010, strategic partner to Dassault Systèmes and CMSP Advanced certified by Cisco Systems, Outscale provides enterprise-class Cloud Computing services (IaaS) that meet regulatory and local requirements internally. Outscale offers solutions to clients that are seeking to boost Business Agility and rapidly deploy value-enhancing business models. Investing 15% of revenues in R&D, from the very beginning, Outscale is commited to offer services that combine excellence and thoroughness, which have won over more than 800 corporate clients in France, USA, and China, as well as several hundred users working for the well-known multinationals via Dassault Systèmes. Outscale has received ISO security certification 27001-2013 for all its French locations.

Outscale develops its own Cloud orchestrator,TINA OS, with strong security requirements and provide many additional product around this infrastructure.

Scope

The target is the cloud customer interface cockpit of the eu-west-2 region reachable at https://cockpit-eu-west-2.outscale.com

Cockpit is the cloud webinterface developed to help Outscale customer to use the IaaS service.

The scope of this bounty is focused on the cockpit service of the eu-west-2 region. The service is available at https://cockpit-eu-west-2.outscale.com. Other subdomains on outscale.com are not concerned by this bounty. You can find documentations here:

The point of focus on the vulnerability must be on confidentiality, integrity, and traceability. The availability of the scope is not covered by this bounty (no denial of services is allowed). Only exploitable vulnerability are covered. A proof of concept must be provided regarding the vulnerability in the report.

Customers with cloud resources are not concerned by this bounty. Snapshots and images provided by Outscale are not concerned, either.

Keep in mind this is a production environment,no data alteration are allowed inside Outscale infrastructure or on Outscale customer Cloud infrastructure, and, therefore,you mustn’t affect the availability of the platform.

Out of scope

  • IaaS API
  • Social engineering of Outscale employees and contractors
  • Attack against Outscale office (malware, backdoor, DoS, …)
  • Vulnerabilities which are already publicly known or variations of such
  • Denial of service attacks
  • Vulnerabilities on other product or service than Cockpit
  • Issues in our DNS and NTP
  • Issues not leading to a confidentiality, traceability or integrity problem. You can report it to support@outscale.com. This can help you to have a better experience and help you in your research
  • Same behavior as Amazon Web Services

Other

  • You must agree and comply to our Program rules
  • You must not publicly disclose the vulnerability without our consentment

Our security team will review each committed finding and establish communication as soon as possible to reproduce and solve the reported vulnerability. Please allow 5 working days for our initial response. We ask you to make a good faith effort to avoid privacy violations, destruction of data and interruption or degradation of our service during your research.

Vulnerabilities

  • Broken Authentication and Session Management
  • Cross Site Scripting (XSS)
  • Insecure Direct Object Reference
  • Sensitive Data Exposure
  • Security Misconfiguration
  • Missing Function Level Access Control
  • Cross Site Request Forgeries
  • Using Components With Known Vulnerabilities
  • Unvalidated Redirects and Forwards

Rewards

Rating CVSS score Bounty
None 0.0 No bounty
Low 0.1 - 3.9 Goodies
Medium 4.0 - 6.9 80 €
High 7.0 - 8.9 300 €
Critical 9.0 - 10.0 800 €

Outscale will determine, in its discretion, whether a reward should be granted and the amount of the reward. In particular, we may choose to pay higher rewards for severe vulnerabilities or lower rewards for vulnerabilities that are considered less severe. This is not a contest or competition.

Goodies are resources on our IaaS (reduction on the invoice), which will help you to find higher vulnerabilities.

Others

The registration process is outside of the scope of the bounty. If you want your account to be successfully created, you must provide correct information. The system will deny the registration if it detect abnormal information.

In case of problem, you can send a mail to bugbounty@outscale.com.

Hall Of Fame
Thanks to the following hunters for reporting important security issues.
  • SaxX
    #1
  • Rbcafe
    #2
  • BZHash
    #3
  • n0rb3r7
    #4
  • s4y0b
    #5
  • onemore
    #6
  • mehulrana67
    #7
  • ardy
    #8
  • sohelpathan
    #9
  • Sajibekanti
    #10
  • LaLaKhan
    #11
  • Dextor
    #12
  • brdoors
    #13
  • saurabh
    #14
  • pratikluhana
    #15
  • cureWeb
    #16
  • Spade
    #17
  • ashhp1
    #18
  • Mubassir1337
    #19
  • sunil_yedla
    #20