@@ -3,48 +3,114 @@ id: security
3
3
title : Security Policy
4
4
---
5
5
6
- :::caution Disclaimer
6
+ :::info Private Bug Bounty Program
7
7
8
- We're in the process of setting up a disclosure platform. Until that process is done, we can't payout bug bounties due to the
9
- administrative overhead. All disclosures that are made until the launch, will later be processed under the same conditions, but we
10
- can't guarantee when that happens.
8
+ Ory is working with Hackerone to provide a private bug bounty program for all Ory products. If you are interested in joining the program, please [ create an account at Hackerone] ( https://hackerone.com/sign_up ) and [ request access] ( https://hackerone.com/ory_corp ) . The following is the policy for the private bug bounty program.
11
9
12
10
:::
13
11
14
- As a security focused company, Ory appreciates and encourages any interest by security researches and white-hat hackers in the
15
- companies products. To support the global infosec community, we award the responsible disclosure of vulnerabilities and data leaks
16
- according to the following policies.
12
+ Being a security-focused company, Ory appreciates, encourages, and rewards
13
+ feedback from the security community. Ory is open source at heart, so feel free
14
+ to inspect our [ source code] ( https://github.com/ory ) . Ory commits to following
15
+ HackerOne's
16
+ [ vulnerability disclosure guidelines] ( https://www.hackerone.com/disclosure-guidelines )
17
+ and we ask you to do the same. Thank you for helping keep Ory and our users
18
+ safe!
17
19
18
- ## Responsible Disclosure
20
+ ## Research guidelines
19
21
20
- A responsible disclosure always starts with contacting the Ory security team, using one of the channels specified at
21
- [ https://www.ory.sh/.well-known/security.txt ] ( https://www.ory.sh/.well-known/security.txt ) . Provide all details to reproduce the
22
- issue in form of a non-public git repository including all setup and execution steps, the binary and source of the exploit, as
23
- well as an example exploit payload (if applicable). Low-quality reports may be disqualified. The Ory security team will contact
24
- you within 96 hours to confirm the issue or ask for further details. Don't publish or share any details regarding the issue until
25
- the Ory security team explicitly permits the publication in written form. The Ory security team will permit publication once
26
- incidence response and patches are fully enrolled. Any exploits shall not be tested against environments hosted by Ory or any
27
- third party without the explicit consent to do so. In case this happens, the submission is disqualified.
22
+ While security-testing Ory systems, please make a good-faith effort to avoid
23
+ privacy violations, destruction of data, and interruption or degradation of our
24
+ service. Interact only with accounts you own or with the explicit permission of
25
+ the account holder.
28
26
29
- ## Awards
27
+ Prohibited activities:
30
28
31
- The Ory maintainers have final decision on which issues constitute security vulnerabilities. Reports for already known issues will
32
- only be awarded with regards to the new information they add to the issue. Ory will score the severity of the disclosed issue
33
- according to [ CVSS 3.1] ( https://www.first.org/cvss/v3.1/specification-document ) . Ory reserves the right to solely determine the
34
- factors affecting the score calculation based on the submitted exploit. Effectively this means that you have to prove for example
35
- the loss of confidentiality to have that included in the CVSS calculation.
29
+ - social engineering like phishing, vishing, or smishing
30
+ - security scanning with more than 5 QPS against Ory domains
31
+ - any activity that leads to disruption of our service longer than 5 minutes
36
32
37
- Other Ory open source projects may still be eligible depending on the impact of the disclosed issue.
33
+ ## What can you report
38
34
39
- ### Additional Expenses
35
+ Please report any potential security vulnerability that potentially leads to
36
+ sensible exploits. Please report vulnerabilities in Ory's upstream dependencies
37
+ to the respective projects and only reach out to us if the the report to
38
+ upstream was unsuccessful.
40
39
41
- In case you required exceptional expenses for providing and disclosing the issue, Ory will refund you these expenses, if and only
42
- if you provide the original invoice and a valid reason for requiring the resources. All resources have to be directly tied to the
43
- disclosure of the issue. This clause also applies to exceptionally huge time-investment from your side. In that case, file an
44
- invoice yourself according to your local law, including a description of the work done on your side. It's Ory’s final decision
45
- whether the reasons for additional expenses are valid and the additional expenses are refunded.
40
+ When reporting vulnerabilities, please consider the attack scenario,
41
+ exploitability, and security impact of the bug. Out of scope are attacks
46
42
47
- ## Disclaimer
43
+ - through the runtime environment of self-hosted Ory installations
44
+ - through user-provided configuration like a user not setting appropriate
45
+ permissions on projects containing sensitive information
46
+ - through port address translation for Ory Cloud Projects
47
+ - around missing rate limiting (we have it on our roadmap)
48
+ - on intentionally public hosts and information on them like our
49
+ [ documentation] ( https://github.com/ory/docs/ ) and
50
+ [ website] ( https://github.com/ory/docs/ )
51
+ - that require physical access to the victim's computer
52
+ - against vulnerabilities in outdated browsers (more than two versions behind
53
+ the latest stable version)
54
+ - based on software version disclosure, banner identification issues,
55
+ descriptive error messages or headers (stack traces, application or server
56
+ errors)
57
+ - based on tabnabbing or open redirect unless you can demonstrate an additional
58
+ security impact
59
+ - that require unlikely user interaction
60
+ - disclosing configuration and paths unless you include proof of credential
61
+ leakage or demonstrate an attack with the leaked information (since we manage
62
+ much of our infrastructure through public GitOps repositories)
48
63
49
- This document is ** not legally binding** . It’s sole purpose is to define the submission and follow-up process of reporting
50
- security issues to Ory. The content of this document may change at any time.
64
+ Please use Ory's customer support channels if you need help tuning Ory
65
+ components for security or need help applying security-related updates.
66
+
67
+ ## How to report
68
+
69
+ Submit one vulnerability per report unless you need to chain vulnerabilities to
70
+ achieve impact.
71
+
72
+ Please provide a detailed vulnerability report with step-by-step instructions to
73
+ reproduce the issue. Only vulnerabilities that we can reproduce are eligible for
74
+ a reward.
75
+
76
+ ## Review
77
+
78
+ Ory commits to these response timelines:
79
+
80
+ - 1-2 business days to first response
81
+ - 3-5 business days from report submission to triage
82
+ - 3-5 business days from triage to bounty
83
+
84
+ We'll stay in close contact with you throughout the process.
85
+
86
+ ## Rewards
87
+
88
+ While all reward decision are up to our discretion, we generally award these
89
+ monetary bounties out of our total yearly bounty budget for security
90
+ vulnerabilities that we can reproduce:
91
+
92
+ | Low | Medium | High | Critical |
93
+ | ---- | ------ | ------ | -------- |
94
+ | $100 | $350 | $1,000 | $3,000 |
95
+
96
+ We also award swag for smaller findings like problems with Ory usage of
97
+ third-party software and services for marketing, email, or developer support.
98
+
99
+ When receiving multiple reports about the same issue, we award the first report
100
+ that we can fully reproduce. Multiple vulnerabilities caused by the same
101
+ underlying issue result in only one bounty. We award public Zero-day
102
+ vulnerabilities that have had an official patch for less than one month on a
103
+ case-by-case basis
104
+
105
+ ## Publication
106
+
107
+ Please do not discuss any vulnerabilities, even resolved ones, outside this
108
+ program without written consent from Ory.
109
+
110
+ ## Safe Harbor
111
+
112
+ Any activities conducted in a manner consistent with this policy will be
113
+ considered authorized conduct and not result in legal action from Ory against
114
+ you. If you face legal action in connection with activities conducted under this
115
+ policy, Ory will take steps to make it known that you conducted your actions in
116
+ compliance with this policy.
0 commit comments