At WebHostingM, we take security seriously and rely on the expertise of security researchers like you to help us identify and address vulnerabilities. This page outlines the key types of vulnerabilities we actively encourage you to report through our bounty program.
Protecting Your Identity and Access:
Securing Your Information:
Maintaining System Integrity:
Beyond the List:
Remember, this list is not exhaustive. We encourage you to think creatively and report any vulnerabilities that could impact the security of our platform and user data. We appreciate your contribution to building a safer online environment for everyone!
Imagine your website has a door with a "welcome" mat. Anyone can walk through the door and step on the mat, right?
Now imagine that mat can run instructions! If someone wrote malicious instructions on the mat instead of "Welcome," and the door didn't check what was written, those instructions could be activated when someone steps on it. This is what happens in an "injection attack."
Attackers try to sneak harmful code into our website through forms, comments, or other areas where users input information. If we don't check this code carefully, it can trick our website into doing bad things, like stealing data or messing things up.
That's why we have a bounty program! We reward people who help us find these "mat instructions" before they cause trouble. By working together, we can keep our website safe for everyone.
Here are some simple examples of "mat instructions":
Remember, even if you don't understand code, you can still help! If you see anything suspicious on our website, please report it. Together, we can keep the bad guys out!
Imagine your front door has a simple lock. Anyone could try common keys or guess the combination to get in, right? That's similar to a website with weak authentication. Hackers can use stolen passwords or automated tools to try millions of combinations until they find one that works.
Now imagine your door has a deadbolt, a security camera, and even an alarm! That's like our website with strong authentication. We use multiple layers of protection, like two-factor authentication (like a second lock) and session limits (like a timer on the security alarm).
Developers frequently build custom authentication and session management schemes, but building these correctly is hard. As a result, these custom schemes frequently have flaws in logout, password management, timeouts, remember me, secret questions, account updates, etc. Finding such flaws can sometimes be difficult, as each implementation is unique.
This weak authentication can lead to big problems:
We take authentication seriously and try to mitigate this vulnerability with:
But we are more than aware that security is a team effort!
To our customers, partners, and visitors:
By working together, we can keep our online world safe and secure!
More about authentication and session management vulnerabilities from OWASP's Top 10:
These vulnerabilities occur when attackers can exploit weaknesses in login systems, potentially gaining access to user accounts or even admin privileges. Imagine someone trying every key on your door - that's what brute-force attacks aim for. By reporting these vulnerabilities, you help us build stronger authentication walls and keep bad actors out.
Sensitive Data Exposure:
Think of sensitive data as precious jewels kept in a treasure chest. These vulnerabilities arise when information like passwords, credit card numbers, or session tokens aren't adequately protected. Hackers might use "peeking" techniques to steal these jewels, causing financial harm or identity theft. Your reports help us build stronger chests, encrypt data and partner with trusted guards (payment processors) to keep your information safe.
How do we keep customers' information safe?
Remember, security is a team effort. Join our bounty program and help us identify these vulnerabilities before they cause trouble. Together, we can create a fortress for your data and online experiences.
More about sensitive data exposure vulnerabilities from OWASP's Top 10:
Ever heard of "looking the other way" while someone sneaks in? That's kind of what happens in an XEE attack on a website. Attackers exploit weaknesses in how websites handle specific data (XML) to steal sensitive information.
Picture this: You use a special lockbox to store important things. An XEE attack is like tricking the lockbox into opening and sending its contents to the wrong person!
How do we stop these sneaky attacks?
Join our security squad!
By reporting potential XEE vulnerabilities, you help us build even stronger defenses. Remember, security is a team effort!
XML or Extensible Markup Language is a markup language intended to be both human-readable and machine-readable. Due to its complexity and security vulnerabilities, it is now being phased out of use in many web applications.
Imagine a castle with different levels of access: guests in the courtyard, knights in the training yard, and the king in his chambers. Access control is like the guards at each gate, making sure only authorized people reach the right places.
Broken access control vulnerabilities are like sneaky intruders slipping past the guards. In a website, this could mean attackers gaining access to areas they shouldn't, like seeing other users' info or messing with settings.
How do we keep our "castle" secure?
Join our security team!
By reporting potential access control vulnerabilities, you help us strengthen our digital castle walls and keep everyone's information safe. Remember, security is a shared responsibility!
Imagine building a house out of LEGOs. If you miss a piece or put one in the wrong place, the whole structure gets shaky, right? The same goes for websites and apps. Security misconfigurations are like missing or misplaced LEGOs, leaving gaps that attackers can exploit.
What are security misconfigurations?
It's when settings on different parts of a website (like the server, database, or code) aren't set up securely. Think of it as forgetting to lock your doors or leaving windows open on your LEGO house. Hackers can then sneak in and cause trouble.
How do we build secure systems?
By reporting potential misconfigurations, you help us make our digital house even stronger. Remember, even small things can make a big difference!
More about security misconfigurations vulnerabilities from OWASP's Top 10
Imagine someone sneaking hidden instructions into a recipe you share online. That's what happens in an XSS attack! Attackers trick websites into accepting malicious code disguised as normal content, potentially harming website visitors.
What is XSS?
It's a sneaky way attackers inject harmful code into websites, like hiding instructions in a shared recipe. When someone visits the site, the code runs in their browser, potentially stealing information or causing damage.
How do we keep your recipes safe?
Join our security kitchen!
By reporting potential XSS vulnerabilities, you help us keep everyone's online recipes safe. Remember, even small details can make a big difference!
Imagine someone tricking you into clicking a hidden button on your phone that sends unauthorized texts from your number. That's kind of what happens in a CSRF attack! Attackers exploit how websites handle your logged-in state to make you unknowingly perform actions you didn't intend.
What is CSRF?
It's like someone hiding a sneaky button on your phone. When you visit a malicious website, it triggers that button without your knowledge, using your logged-in state to do things like changing your password or buying something in your name.
How do we keep your clicks safe?
By reporting potential CSRF vulnerabilities, you help us make your online experience safer and more secure. Remember, even small details can make a big difference!
Imagine someone sending you a delicious-looking cake, but you're not sure what's inside. That's kind of how file uploads can work on websites. We want to make sure only safe treats get through!
What are file upload vulnerabilities?
It's when attackers can upload malicious files disguised as harmless ones, potentially harming the website and its users. Think of someone putting a hidden "explosive filling" in the cake!
How do we keep everyone safe?
By reporting potential file upload vulnerabilities, you help us keep the digital cake fresh and safe for everyone. Remember, even small details can make a big difference!
Imagine leaving your house keys accessible to anyone on the street. That's what happens with insecure file permissions! Attackers can exploit misconfigured access controls to access sensitive files, potentially stealing customer data, messing with system settings, or launching further attacks.
How do we keep your files safe?
By reporting potential insecure file permissions vulnerabilities, you help us build even stronger digital vaults for your data. Remember, security is a team effort!
Imagine receiving a message that appears to be from your bank, asking for your password. Phishing attacks try to trick you into revealing sensitive information. If successful, attackers can steal your login credentials, financial details, or even take control of your accounts.
How do we keep your information safe?
By reporting potential phishing vulnerabilities, you help us develop even stronger defenses against these sneaky attacks. Remember, vigilance is key to staying safe online!
We know there's more to security than just ticking a list of boxes. That's why we reward creative thinking when it comes to finding vulnerabilities! Even if it's not explicitly mentioned, if you discover a bug that:
...then we want to hear about it!
We understand we can't offer the biggest payouts, but we deeply value the contribution of every security researcher who helps us build a stronger platform. Your skills and dedication truly deserve a tip of the hat!
Found something offbeat? Don't hesitate to share it!