😎 2024 Summer product launch – Run highly effective product teams at scaleLearn more

Bug Bounty Program

We care deeply about keeping our users safe. If you believe you have discovered a vulnerability, we ask that you disclose it in a responsible manner. The Productboard Security Team will work with you to investigate, resolve the issue promptly and reward the first reporter of a vulnerability.

UPDATE (June 21st 2024):
Productboard Bug Bounty program has been moved to HackerOne platform

Productboard decided to move our Bug Bounty program to HackerOne platform. The main reason is to scale up with a larger amount of incoming reports and also to provide better experience for the cooperating security researchers.

There are two programs on HackerOne:

Vulnerability Disclosure Program (VPD)

  • Public program, see https://hackerone.com/productboard 
  • Full scope of the original in-house Bug Bounty program (*.productboard.com, *.satismeter.com)
  • No financial payments in this program, only HackerOne points. But Productboard will provide payments for the transition period (end of July 2024).
 

Bug Bounty Program (BBP)

  • Private program, only for invited researchers. Researchers will get an invitation after reporting several valid and significant reports to the VDP program.
  • Financial rewards processed by HackerOne platform.
  • Narrow scope: app.productboard.com only. No Satismeter or our WordPress sites.
 

 

  1. Out-of-scope Vulnerabilities
  2. We are interested in critical vulnerabilities in our infrastructure and product, not in an output of automated scannersThese vulnerabilities are out-of-scope and not subject to any reward:
    • Denial of service or Distributed Denial of service attacks
    • Presence/absence/misconfiguration of SPF/DKIM/DMARC records or any email misconfiguration in general
    • Lack of CSRF tokens
    • Clickjacking issues
    • Missing security headers which do not lead directly to a vulnerability
    • Missing best practices (we require exploitable evidence of a security vulnerability)
    • Reports from automated tools or scans
    • Reports of insecure SSL/TLS ciphers (unless you have a working proof of concept, and not just a report from a scanner)
    • Absence of rate limiting
    • Outdated software without any noteworthy vulnerability
    • Permission issues within a single business space
    • HTML Injection for Productboard Editor (comments, descriptions, details, etc.)
    • Password reset token leaks to third party services
    • EXIF metadata issues
    • Jira Service Desk is open to public
    • Using features from higher plans and other licensing issues

     


    Responsible Disclosure Policy

    While we welcome ethical and responsible identification and investigation of potential vulnerabilities, we ask that all security researchers stick to the following principles:

    • Do not engage in testing that:
      • Degrades Productboard’s information systems and products.
      • Results in you, or any third party, accessing, modifying, storing, sharing or destroying Productboard’s customer data.
      • Includes Denial of Service or brute-force attack mechanisms
      • Involves social engineering techniques
      • Directly addresses Productboard customers or end users.
      • Includes usage of automated tools and scanners.
    • When your investigation requires authorized access (e.g. you suspect potential privilege escalation or multi-tenancy issue), create a dedicated trial account for that purpose. Never attempt to bypass our security measures under a commercial account.
    • Do not exploit identified or known vulnerabilities on our infrastructure further than necessary to reasonably determine its presence. The Bounty Program is about improving security for Productboard users, not deliberately trying to put the community at risk.
    • In case you encounter customer data or other information that is not your own, please stop and report this activity to our team so we can investigate. Please report to us what information was accessed and delete the data. Do not save, copy, transfer, or otherwise use this data. Continuing to access such data may demonstrate a lack of good faith.

     

     

    Submission Process


    Please only submit one report per issue to 
    https://hackerone.com/productboard 

    When submitting a vulnerability report you agree that you may not publicly disclose your findings or the contents of your submission to any third parties in any way without Productboard’s prior written approval.

    Reward

    You may be eligible to receive a reward if:

    • (i) you are the first person to submit a given vulnerability;
    • (ii) that vulnerability is determined to be a valid security issue by the Productboard Security Team
    • (iii) you have complied with the Productboard’s Bug Bounty program policy and guidelines.

    The decision to grant a reward for the discovery of a valid security issue is at Productboard’s sole discretion. The amount of each bounty is based on the classification and sensitivity of the data impacted, the completeness of your report, ease of exploit and overall risk for Productboard’s users and brand.

    Legal Safe Harbor

    Any activities conducted in a good faith and in a manner consistent with this policy will be considered authorized conduct and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.

      • For more information, visit https://www.productboard.com/product/security/
      • Submission reports should include a detailed description of your discovery with clear, concise steps allowing us to reproduce the issue, or a working proof-of-concept.