Infosec Institute

Open Bug Bounty mentioned in the
Top 6 Bug Bounty programs of
2022 by the InfoSec Institute

The Hacker News

Open Bug Bounty named among the
Top 5 Bug Bounty programs of 2021
by The Hacker News

Platform update: please use our new authentication mechanism to securely use the Open Bug Bounty Platform.
For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
1,704,749 coordinated disclosures
1,383,433 fixed vulnerabilities
1,991 bug bounty programs, 3,919 websites
47,066 researchers, 1,651 honor badges

MIDAS Bug Bounty Program

MIDAS runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of MIDAS

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between MIDAS and researchers.

Bug bounty program allow private and public submissions.

Bug Bounty Scope

The following websites are within the scope of the program:

midas.network
pentest.mid.as
mid.as

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

No technology is perfect, and here at MIDAS we believe that working with skilled security researchers across the globe is crucial in identifying weaknesses in our software and infrastructure.
If you believe you've found a security issue within our software or infrastructure, please let us know as soon as possible. We actively encourage and welcome private and coordinated and responsible disclosures.

We'll work alongside researchers who disclose potential issues to us in a private/responsible manner, to address any security concerns/vulnerabilities in a timely manner.

As our security team are English speaking, we request that all reports be disclosed to us in English.

Testing Requirements:

Your initial report to us should include:
- Sufficient details of the vulnerability to allow it to be understood and reproduced by our developers and security team.
- HTTP requests and responses, HTML snippets, screenshots or any other supporting evidence.
- Redact any personal data before reporting.
- Proof of concept code (if available).
- The impact of the vulnerability.
- Any references or further reading that may be appropriate.
- Recommendations on how the issue could be mitigated or resolved.

The following are considered "in scope":
- mid.as (our main public website)
- pentest.mid.as (a hosted test MIDAS system, similar to that used by our hosted customers)
- midas.network (our dedicated service status site, and origin of our CDN)

The following are considered "out of scope":
- Vulnerabilities in 3rd party components or services
- Any of our customer's "hosted" MIDAS systems.

Researchers should;
1. Ensure that any testing is legal and authorized, and within the Scope set out above.
2. Respect the privacy of others, including our customers.
3. Not engage in activities which may impact our customers ability to access to our services, including but not limited to DoS/DDoS-style attacks.
4. Refrain from spamming or social engineering activities.
5. Not make physical attempts against MIDAS property or data centers.
6. Make reasonable efforts to contact our security team.
7. Not demand payment or other rewards as a condition of providing information on security vulnerabilities, or in exchange for not publishing the details or reporting them to industry regulators.

Possible Awards:

We may, at our sole discretion, provide a monetary reward or "bug bounty" to the security researcher.
Whether a monetary reward is offered and any amount will be based upon a number of factors, including - but not limited to - the potential likelihood and severity of the reported issue occurring/being exploited, as well as the researcher's cooperation and adherence to these guidelines.

For issues we consider to be very small/minor/negligible, it's unlikely that we'll be able to offer a monetary reward.

Regardless of whether a monetary reward is offered, we will happily acknowledge and credit the researcher accordingly on our dedicated page: https://security.midas.network/credits

Special Notes:

Full reporting guidelines may be viewed at https://security.midas.network/reporting

Other Submissions Handling

Website owner want to receive information about other vulnerabilities

Notifications:

https://security.midas.network/contact

General Requirements:

No technology is perfect, and here at MIDAS we believe that working with skilled security researchers across the globe is crucial in identifying weaknesses in our software and infrastructure.
If you believe you've found a security issue within our software or infrastructure, please let us know as soon as possible. We actively encourage and welcome private and coordinated and responsible disclosures.

We'll work alongside researchers who disclose potential issues to us in a private/responsible manner, to address any security concerns/vulnerabilities in a timely manner.

As our security team are English speaking, we request that all reports be disclosed to us in English.

Testing Requirements:

Your initial report to us should include:
- Sufficient details of the vulnerability to allow it to be understood and reproduced by our developers and security team.
- HTTP requests and responses, HTML snippets, screenshots or any other supporting evidence.
- Redact any personal data before reporting.
- Proof of concept code (if available).
- The impact of the vulnerability.
- Any references or further reading that may be appropriate.
- Recommendations on how the issue could be mitigated or resolved.

The following are considered "in scope":
- mid.as (our main public website)
- pentest.mid.as (a hosted test MIDAS system, similar to that used by our hosted customers)
- midas.network (our dedicated service status site, and origin of our CDN)

The following are considered "out of scope":
- Vulnerabilities in 3rd party components or services
- Any of our customer's "hosted" MIDAS systems.

Researchers should;
1. Ensure that any testing is legal and authorized, and within the Scope set out above.
2. Respect the privacy of others, including our customers.
3. Not engage in activities which may impact our customers ability to access to our services, including but not limited to DoS/DDoS-style attacks.
4. Refrain from spamming or social engineering activities.
5. Not make physical attempts against MIDAS property or data centers.
6. Make reasonable efforts to contact our security team.
7. Not demand payment or other rewards as a condition of providing information on security vulnerabilities, or in exchange for not publishing the details or reporting them to industry regulators.

Possible Awards:

We may, at our sole discretion, provide a monetary reward or "bug bounty" to the security researcher.
Whether a monetary reward is offered and any amount will be based upon a number of factors, including - but not limited to - the potential likelihood and severity of the reported issue occurring/being exploited, as well as the researcher's cooperation and adherence to these guidelines.

For issues we consider to be very small/minor/negligible, it's unlikely that we'll be able to offer a monetary reward.

Regardless of whether a monetary reward is offered, we will happily acknowledge and credit the researcher accordingly on our dedicated page: https://security.midas.network/credits

Special Notes:

Full reporting guidelines may be viewed at https://security.midas.network/reporting

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  Information How quickly researchers get responses to their submissions.
Remediation Time  Information How quickly reported submissions are fixed.
Cooperation and Respect  Information How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 26.04.2024 news.gov.mb.ca
 26.04.2024 mdanderson.org
 25.04.2024 seeu.edu.mk
 25.04.2024 xaxim.sc.gov.br
 25.04.2024 lacerdopolis.sc.gov.br
 24.04.2024 tap.mk.gov.lv
 23.04.2024 data.aad.gov.au
 23.04.2024 bitporno.to
 23.04.2024 sys01.lib.hkbu.edu.hk
 23.04.2024 srvm.gov.za

  Latest Blog Posts

04.12.2023 by BAx99x
Unmasking the Power of Cross-Site Scripting (XSS): Types, Exploitation, Detection, and Tools
04.12.2023 by a13h1_
$1120: ATO Bug in Twitter’s
04.12.2023 by ClumsyLulz
How I found a Zero Day in W3 Schools
04.12.2023 by 24bkdoor
Hack the Web like a Pirate: Identifying Vulnerabilities with Style
04.12.2023 by 24bkdoor
Navigating the Bounty Seas with Open Bug Bounty

  Recent Recommendations

    22 April, 2024
    genoverband:
Thank you for your invaluable help in ensuring the security of our domain and its visitors!
    10 April, 2024
    Mars:
Hatim uncovered a XSS bug that we were able to quickly resolve. Thanks very much for your assistance and help.
    8 April, 2024
    Panthermedia:
Thanks to the support of Hatim Chabik, we were able to identify and solve an XSS bug.
    5 April, 2024
    pubpharm:
Pooja found a XSS vulnerability on our website and provided us with the needed Information for replication and fixing the issue. Which she verified afterwards.
We thank her for the reporting and assistance.
    2 April, 2024
    genoverband:
Thank you for your invaluable help in ensuring the security of our domain and its visitors!