Coordinated and Responsible Vulnerability Disclosure Free Bug Bounty Program 255,164 coordinated disclosures
153,380 fixed vulnerabilities
206,223 websites, 17,192 VIP websites
6,825 researchers, 6,915 subscribers

Avito Bug Bounty Program

Avito runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of Avito

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between Avito and researchers.

Bug bounty program allow private submissions only.

Bug Bounty Scope

The following websites are within the scope of the program:

m.avito.ru
avito.ru

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

Out-of-scope vulnerabilities:
- Reports from automated scanners without appropriate analysis or demonstration of security impacts
- Reports about outdated/vulnerable software without exploitation examples
- Self-XSS affecting only current user
- Missing CSRF token in forms, where sensitive information like user data cannot be modified (e.g. logout form)
- Issues related to window.opener
- Session hijacking, session timeout
- Missing security HTTP headers (X-Frame-*, X-Content-*, CSP, HSTS, HPKP)
- Missing SPF, DKIM, DMARC records
- Missing "HttpOnly", "secure", "SameSite" flags for non-sensitive cookies
- Possibilities for exhaustive search by user/item identifiers

Testing Requirements:

Strictly prohibited:
- Searching for vulnerabilities in out-of-scope and 3rd-party services, including payment gateways
- DoS/DDoS/physical access/phishing/social engineering attacks
- Stealing regular users' accounts and performing any other actions affecting their security
- Publishing any sensitive information discovered during security testing

Possible Awards:

Currently only Kudos.

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  How quickly researchers get responses to their submissions.
Remediation Time  How quickly reported submissions are fixed.
Cooperation and Respect  How fairly and respectfully researchers are being treated.

  Latest Patched

      transfermarkt.co.uk
    Patched on 15.08.2018
      transfermarkt.pl
    Patched on 15.08.2018
      transfermarkt.es
    Patched on 15.08.2018
      transfermarkt.de
    Patched on 15.08.2018
      haufe.de
    Patched on 14.08.2018
      elasticemail.com
    Patched on 14.08.2018
      jib.co.th
    Patched on 14.08.2018
      vonage.com
    Patched on 14.08.2018
      abdn.ac.uk
    Patched on 14.08.2018
      smartbox.com
    Patched on 14.08.2018

  Recent Recommendations

    24 July, 2018
     spudstuff:
Tarun is very professional and helpful. His research was exemplary and he comes highly recommended. Thanks Tarun!
    23 July, 2018
     rtournoy:
Siruja provided quick and helpful information which helped us fix the issue. Thank you !
    18 July, 2018
     hikingsite:
Thanks a lot Adel to help me to improve the security of my website. Your examples were very clear and to the point and your follow-up very thorough. Keep up the good work to make the internet a safer place!
    18 July, 2018
     AOKBayern:
Vielen Dank Armin, dass Sie eine Sicherheitslücke an uns gemeldet haben. Wir nehmen solche Dinge sehr ernst und konnten dank Ihren Hinweisen in Zusammenarbeit mit unserem technischen Dienstleister die Sicherheitslücke beseitigen.
    17 July, 2018
     HamRadioOutlet:
Excellent catch! We thought we fixed all XSS on our site but Siruja found one we missed. Even provided extra detail to test it. Thanks!