Timeweb
Company: TimewebEstablished in 2006, Timeweb is one of the largest hosting providers in Russia and the CIS.
With Timeweb, you can easily host your website, register a domain name, rent a virtual or physical server, and get other services for your website to thrive online.
With Timeweb, you can easily host your website, register a domain name, rent a virtual or physical server, and get other services for your website to thrive online.
Rewards are paid to individual entrepreneurs and self-employed persons
Program description
Program rules
Supported languages
- 🇬🇧 English
- 🇷🇺 Russian
Contents
- Vulnerabilities to look for
- Vulnerabilities NOT to look for
- Participation rules
- Rewards
- Other information
- How to register accounts for research purposes
SQL injection testing rules
When testing for SQL injection vulnerabilities, researchers must adhere to the following policy.
Only the following actions are allowed on the server:
- Get information about the current database (SELECT database()), its version (SELECT @@version), the current user (SELECT user() or SELECT system_user()), or hostname (SELECT @@hostname).
- Get the database schema (SELECT table_schema), list of tables (SELECT table_name), and table column names (SELECT column_name).
- Perform mathematical, conversion, or logical queries (including using SLEEP) without retrieving data (excluding those mentioned above).
Any other actions must be coordinated with the company.
File read and upload rules
When testing for arbitrary file read vulnerabilities or arbitrary file upload vulnerabilities on the server, researchers must adhere to the following policy.
Actions prohibited during file upload testing include the following:
- Change, modify, delete, or replace any files on the server (including system files) except for files associated with the researcher's own account or the account of a user who gave explicit consent for such actions.
- Upload files that could cause a denial of service (for instance, large files).
- Upload malicious files (such as malware or spyware).
If an arbitrary file read vulnerability is discovered on the server, the researcher is only allowed to read the /etc/ufw/user6.rules file. Any other actions must be coordinated with the company.
Vulnerabilities to look for
We are primarily interested in critical server-side vulnerabilities. Still, you're welcome to hunt for any other types of vulnerabilities. If you are unsure whether to contact us about an issue you have found, check if it's on the "Vulnerabilities NOT to look for" list. If it's not on the list, feel free to submit a detailed report.
Examples of vulnerabilities we'll be happy to reward you for are listed below (the list is incomplete and is based on the OWASP Top 10).
General
- Remote code execution (RCE)
- Injections (such as SQL and XML injections)
- LFR/LFI/RFI
- Blind SSRF
- Business logic vulnerabilities
- IDOR
- Access control vulnerabilities
- Sensitive information disclosure
- Account hijacking
- XSS and CSRF that affect sensitive data
- Bypass of financial tools (fund withdrawal), removal of restrictions on chargeable operations and services
Mobile app vulnerabilities
This subcategory includes vulnerabilities that affect the server infrastructure through mobile app or API exploitation (for example, OWASP Mobile Top 10).
Important: local issues and possible impact on a mobile device are out of scope.
Examples of vulnerabilities included in the scope:
- Bypass of financial tools (fund withdrawal), removal of restrictions on chargeable operations and services
- Errors resulting in horizontal privilege escalation (account hijacking)
- Errors leading to remote code execution on API nodes
Vulnerabilities NOT to look for
Out-of-scope submissions include the following:
https://vds-*.timeweb.ruhttps://myreviews.dev/ideashttps://feed.myreviews.ru/https://sentry.timeweb.*https://*.timeweb.ru/ide/
Service IPs Out of Scope
92.53.116.0/2492.53.116.0/24176.57.223.0/24193.164.152.0/2445.149.128.0/24
XSS, CSRF, And UI Attacks
- Any CSRF affecting:
https://community.timeweb.com,https://timeweb.com/ru/community,https://mail.timeweb.com; - Self-XSS;
- Any XSS that can only be executed within a single account, regardless of the number of users in that account;
- Logout CSRF;
- Clickjacking and framing without demonstrated standalone impact;
- Scripting in PDF documents;
Information Disclosure Without Significant Impact
- Disclosure of non-confidential information, such as product versions, public API methods, public/demo/test API tokens without access to protected data, operations, or privileges;
- Disclosure of public information about a user or community, such as a nickname;
- Disclosure of internal diagnostic data, including stack traces, internal hostnames, IP addresses, service names, paths, and error messages, without demonstrated standalone impact;
- Disclosure of EXIF metadata in images;
- Vulnerabilities that allow discovery of an IP address without other identifying customer information, such as full name or login;
- Disclosure of public API keys/tokens without access to protected data, operations, privileges, or internal systems;
Authentication, Authorization, And Accounts
- Simplified registration or authentication without CAPTCHA, SMS, or other best-practice checks;
- Authentication or authorization weaknesses that do not allow access to other users' data, operations, or privileges and do not lead to further exploitation;
- Vulnerabilities related to the attribute-based access control model (IAM), including restricted tokens and additional account users, unless impact outside the corresponding account or tenant context is demonstrated;
- Privilege escalation from a secondary shared hosting or Cloud account to the primary account and vice versa by any means, unless access to data, operations, or privileges of another independent customer or Timeweb infrastructure is demonstrated;
- Session fixation without confirmed account takeover or other standalone impact;
- Enumeration of system users, logins, email addresses, or other identifiers without access to protected data, operations, or privileges;
- Any issues related to brute force;
Configuration, Hardening, And Best Practices
- Incorrect configuration, absence, or incomplete implementation of security controls, such as CORS, CSP, CSRF, SameSite, X-Frame-Options, and similar controls, without demonstrated standalone impact, such as access to protected data, performing actions on behalf of a user, or authorization bypass;
- Missing security headers;
- Missing Secure or HttpOnly cookie flags without demonstrated standalone impact;
- Product features implemented without security best practices, security dark patterns, and similar findings without demonstrated standalone impact;
- Issues with DMARC, SPF, DNSSEC, or DKIM records;
- Enabled HTTP OPTIONS or TRACE methods without demonstrated practical impact;
SSRF, Network Reachability, And Interception
- Blind SSRF or internal network reachability without safely demonstrated impact, for example via an approved test endpoint or a provided internal test host;
- MitM, interception, or attacks requiring control of the victim's network or physical presence in the network;
- WAF bypass or direct server access without demonstrated practical impact;
Redirect, Domain, And Link Hijacking
- Invalid redirects and open redirects, unless the issue affects service security, for example by allowing theft of a user authorization token;
- Broken Link Hijacking and Domain Hijacking;
- IDN homograph attacks;
DoS, Abuse, And Spam
- DoS/DDoS;
- Ability to send a large number of messages;
- Ability to send spam or malware files, for example spam emails related to registration or password recovery;
- Abuse of public forms and endpoints intended for anonymous user input, unless access to other users' data, accounts, payment operations, or other standalone security impact is demonstrated;
Race Conditions And Input Validation
- Race conditions without confirmed violation of authorization, billing, quotas, data access, or another significant security/business invariant;
- Input validation issues in any form without a demonstrated real vulnerability;
Reports Without Sufficient Proof
- Reports from security scanners or other automated systems without manual validation and confirmed impact;
- Reports based solely on software or protocol versions without a reliable proof of concept;
- Theoretical attacks without proof of practical exploitability;
Scope And Product Exclusions
- Issues related to Bitrix on
timeweb.com; - Vulnerabilities in partner services or products that do not directly affect the security of Timeweb products and services;
- Any vulnerabilities in the old file manager on VH, including the legacy fileman / AJAX version;
- Attacks requiring full access to the user's device, page, or browser profile;
MyReviews Exclusions
- Data returned by public MyReviews APIs and widgets for customer websites is considered public unless access to non-public data, operations, or privileges is demonstrated;
- Review data collected by MyReviews from public platforms, including text, links, avatars, photos, and related metadata, is not considered confidential by itself;
- Unused legacy classes, integrations, or references in the code, such as
smtp/mail,cheapsender, orstripe, are not considered vulnerabilities without demonstrated practical impact; - Use of the old free/demo plan or no-plan state is not considered a payment bypass by itself;
- Exceeding the company limit is not considered a vulnerability if companies above the limit remain inactive and parsing, review collection, or other paid/limited operations are not started for them;
- Creating multiple widgets for the same company is not considered a vulnerability by itself;
- MyReviews parser behavior is not considered a vulnerability without demonstrated impact beyond collecting public data through the standard infrastructure.
Anything that doesn't fall into the above categories but may still qualify under the program conditions may be considered eligible for a reward on a case-by-case basis.
Participation rules
By participating in our bug bounty program, you confirm that you have read and accepted these participation rules. Violation of any of these rules may result in forfeiture of rewards.
General rules
- The scope of the bug bounty program is limited to technical vulnerabilities in the company's services. If you encounter problems that have nothing to do with security, please contact customer support.
- If you discover a 0-day or 1-day vulnerability for which an official patch was released less than a week ago, your report will be considered on an individual basis and may be awarded with a bounty at the discretion of the Timeweb security team.
Testing rules
- For testing, you can use only your own accounts, accounts of users who have explicitly given their consent, or accounts provided for testing with bonus rates. Do not attempt to access other people's accounts or any sensitive information.
- While searching for vulnerabilities, avoid compromising the confidentiality, integrity, and availability of information in our services.
- Any activity that could harm the company's applications, infrastructure, customers, or partners is strictly prohibited. Examples of prohibited activities include social engineering, phishing, denial-of-service attacks, and physical attacks on the infrastructure.
- To confirm a vulnerability, use the smallest possible proof of concept (POC). If this could impact other users or the system's performance, please contact us to get permission. Further exploitation of vulnerabilities is strictly prohibited.
Report requirements
A report must contain the following:
- A full description of the discovered vulnerability
- A description of the impact on user and/or system security
- The steps required to reproduce the vulnerability, including the following (if possible):
◦ Screenshots
◦ Videos
◦ Requests/responses
◦ Code of the exploit used
◦ Date and time of request execution - IDs of accounts used in testing
- Other materials required to reproduce the vulnerability
- Brief recommendations for remediation
Vulnerability severity assessment
We reserve the right to make the final decision on the severity of the discovered vulnerability. After receiving the report, we conduct an internal investigation and determine the severity level based on multiple factors, including the following:
- Privileges required to conduct the attack
- Difficulty of discovery and exploitation
- Need for user interaction
- Impact on the integrity, availability, and confidentiality of the affected data
- Potential business and reputational risks
- Number of affected users
Rewards
We reward external security researchers only for the discovery of previously unknown vulnerabilities, provided that all participation rules are complied with.
All reports are considered on a case-by-case basis with regard to the severity of the discovered vulnerability and the criticality of the affected system.
All reports are considered on a case-by-case basis with regard to the severity of the discovered vulnerability and the criticality of the affected system.
Reward amounts
| Vulnerabilities | Reward |
|---|---|
| Remote code execution (RCE) | Up to ₽200,000 |
| SQL injection with access to critical data | Up to ₽150,000 |
| SQL injection | Up to ₽50,000 |
| Blind SSRF | Up to ₽25,000 |
| Server-side vulnerability with disclosure of sensitive information (IDOR) | ₽10,000–₽75,000 |
| Stored XSS | ₽10,000–₽20,000 |
| XSS, except for Self-XSS | ₽5,000–₽10,000 |
| Business logic errors | On a case-by-case basis |
| Other confirmed vulnerabilities | On a case-by-case basis |
Additional information on rewards
We understand that each vulnerability is unique and may have an unexpected impact on security and business operations. The reward amounts listed in the table are based on our general guidelines, but if you identify a particularly severe vulnerability, the reward amount may be significantly increased.
Discovered vulnerabilities that pose a significant risk to our company and are eligible for a larger reward include the following:
- Remote code execution (RCE) that can take down our servers, destroy data, or disrupt business operations
- SQL-injections that can be used to access, manipulate, or completely delete critical data
- Any other scenarios that pose major risks to data, infrastructure, or users
In such cases, we are willing to consider increasing the reward up to ₽500,000 after assessing the risks and implications for the business.
We appreciate your efforts and are willing to reward you fairly for finding vulnerabilities, which helps us protect our users and our business.
How long does it take to check your report?
Vulnerability reports are reviewed by our internal security team. Response times may vary depending on our workload, but we try our best to process requests within two to three days.
Rules for handling duplicates
We reward only the first submissions (provided the report contains all the necessary information to reproduce the vulnerability). Any subsequent reports addressing the same vulnerability will be marked as duplicates. Reports containing similar attack vectors may also be considered duplicates if our security team believes that the information from an earlier report is sufficient to address all reported attack vectors or errors. Your report may be considered a duplicate of a report authored by another researcher or our security team.
Vulnerability disclosure policy
You may not share any details of the vulnerabilities you discover without written permission of the Timeweb security team.
Useful information
For general information about our services, go to:
- https://timeweb.com/ru/docs/
- For testing Blind SSRF and internal network access capabilities, you can send requests to 192.168.4.72:8000
How to register test accounts
- Sign up for the products to test using your own mailboxes.
- After signing up, tell us your test account login (or logins).
- Provide a link to your Standoff 365 profile (your profile must be verified).
- Send us an email with these details to bugbounty@timeweb.ru, and we will credit you with a bonus payment for testing.
How to get a mailbox on mail.timeweb.com
Send an email to bugbounty@timeweb.ru requesting the creation of a mailbox for testing mail.timeweb.com. Make sure to provide a link to your Standoff 365 profile (your profile must be verified).
Links to the services
- (Webmasters) https://timeweb.com/ru/partners/webmasters/
- (Community) https://timeweb.com/ru/community/
- (Mail) https://mail.timeweb.com/login
- (MyReviews) https://myreviews.ru/login
Issues found within the testing scope are evaluated based on their severity, to the maximum extent applicable.
However, some cases may be considered on an individual basis if the discovered vulnerability has a significant impact on the whole infrastructure.
However, some cases may be considered on an individual basis if the discovered vulnerability has a significant impact on the whole infrastructure.