Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
505,179 coordinated disclosures
276,072 fixed vulnerabilities
700 bug bounties with 1,400 websites
14,294 researchers, 1057 honor badges

Kiva Microfunds Bug Bounty Program

Kiva Microfunds runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of Kiva Microfunds

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between Kiva Microfunds and researchers.

Bug bounty program allow private and public submissions.

Bug Bounty Scope

The following websites are within the scope of the program:

*.kiva.org

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

No general requirements.

Testing Requirements:

No testing requirements.

Possible Awards:

Kiva provides a monetary reward in the form of a Kiva card. This can be used to make a loan which will then pay back to you and can then be withdrawn to PayPal after each repayment.

There of course is also the award of good karma for helping a non-profit to keep its site secure in service to the mission of helping those who are less fortunate in the world.

Special Notes:

Kiva follows the BugCrowd Vulnerability Taxonomy:
https://bugcrowd.com/vulnerability-rating-taxonomy

Awards are based on the severity level as noted in the Bugcrowd taxonomy

Other Submissions Handling

Website owner want to receive information about other vulnerabilities

Notifications:

Email: [email protected]

General Requirements:

No general requirements

Testing Requirements:

No testing requirements

Possible Awards:

Kiva provides a monetary reward in the form of a Kiva card. This can be used to make a loan which will then pay back to you and can then be withdrawn to PayPal after each repayment.

There of course is also the award of good karma for helping a non-profit to keep its site secure in service to the mission of helping those who are less fortunate in the world.

Special Notes:

Kiva follows the BugCrowd Vulnerability Taxonomy:
https://bugcrowd.com/vulnerability-rating-taxonomy

Awards are based on the severity level as noted in the BugCrowd taxonomy

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  How quickly researchers get responses to their submissions.
Remediation Time  How quickly reported submissions are fixed.
Cooperation and Respect  How fairly and respectfully researchers are being treated.

Researcher's comments

    1 September, 2019
    Cole:
Not good so far. Does not reply back to emails.

  Latest Patched

 20.02.2020 reachlocal.com
 20.02.2020 info.reco.ws
 20.02.2020 job-hunt.org
 19.02.2020 olis.ri.gov
 19.02.2020 ppt.cc
 19.02.2020 cjdropshipping.com
 19.02.2020 koton.com
 19.02.2020 band.uol.com.br
 19.02.2020 myrealtrip.com
 19.02.2020 w3techs.com

  Latest Blog Posts

10.02.2020 by 0xrocky
Stored XSS on h2biz.net
10.02.2020 by ismailtsdln
SQL Injection Payload List
20.01.2020 by Rando02355205
XSS on "www.alibaba.com" (Alibaba WAF 405) Bypassed.
16.01.2020 by Open Bug Bounty
Brief Recap of Open Bug Bounty’s Record Growth in 2019
12.01.2020 by JCQ_47
WAF Cloudflare Bypass XSS at Nexusmods.com

  Recent Recommendations

    19 February, 2020
     UKClimbing:
Thanks for finding the XSS bug. Great communication.
    18 February, 2020
     Travelmath:
Great job finding a vulnerability. I have fixed the issue now, thanks for your help!
    18 February, 2020
     MotoDriveTv:
Thanks you Rajesh for reporting a bug without wanting to gain anything from it. Your quick response enabled us to swiftly fix the flaws you found, great help!
    18 February, 2020
     giroud_francois:
Thanks for notifying flaw, and for the answers ! Your support on fixing the issues was helpful... Friendly contact.
    17 February, 2020
     bigwavedave_ca:
Many thanks to k0t for finding and reporting the XSS vulnerability on my website.