Youla is an easy way to buy and sell anything from furniture to kid's toys and clothes.
We accept vulnerability reports only if the vulnerability was previously unknown to the VK team.
The types of vulnerabilities eligible for bounties are listed in the "Bounty amount" table at the end of the rules for the Bug Bounty program rules.
The bounty amounts shown in the description are for reference only.
The applicability and amount of a bounty may depend on the severity of the problem, novelty, likelihood of use, environment, and/or other factors.
The VK security team makes a bounty decision for each message individually.
Any vulnerabilities not listed in the "Bounty amount" table are paid for at the discretion of the program owner.
youla.ru, auth.youla.ru, auto.youla.ru, avto.youla.ru, cabinet.youla.ru, catalog.auto.youla.ru, drop.youla.ru, help.youla.ru, mybusiness.youla.ru, mystat.youla.ru, oborot.youla.ru, ok-front.youla.ru, oversize.youla.ru, realty.youla.ru, special.youla.ru, tb.youla.ru, vk-uslugi.youla.ru, www.youla.ru, youla.io, admin.youla.io, amo-api.youla.io, api.youla.io, api-gw.youla.io, app.youla.io, auth.youla.io, auto.youla.io, avto.youla.io, b2b-admin.youla.io, b2b-api.youla.io, beta.youla.io, cache.youla.io, cache2.youla.io, cache3.youla.io, cdn0.youla.io, centrifugo.youla.io, chats.youla.io, escrow.youla.io, img-inactive.youla.io, img0.youla.io, ok-front.youla.io, p.youla.io, partner-api.youla.io, proxy.youla.io, rt.youla.io, sentry1.youla.io, tb.youla.io, vk-uslugi.youla.io
Bugs identified on demo stands, dev infrastructure, domains used for training, delegated, externally hosted domains and partner services are accepted as informational and are not paid for.
MitM and local attacks, open redirects, insufficient session validation, handling cookies after logout, etc. are not accepted unless additional vectors are defined (e.g., the ability to steal a session token via a remote vector for open redirects).
0-day/1-day vulnerabilities may be considered as a duplicate within several weeks after vulnerability details publication.
Bug reports submitted by current or former employees (up to one year from the end of employment) of the VK Group are accepted without payment.
When testing RCE, SQLi, LFI, LFR, SSTI it is allowed to use only MINIMALLY possible POC for proof (sleep, accessing /etc/passwd, curl).
Publishing or disclosing bug report details without approval from VK's information security team is prohibited. We reserve the right to refuse any request for public disclosure of the report.
It is recommended to limit all scanning tools to 10 requests per second.
Vulnerabilities | Maximum bounty |
---|---|
Remote code execution (RCE) | 360 000 ₽ |
Server-side Injections (SQLi or an alternative) | 240 000 ₽ |
Access to and work with local files (LFR, RFI, XXE) without jail / chroot / file type restrictionss | 240 000 ₽ |
RCE/LFI in the dev infrastructure / isolated or virtualized process | 60 000 ₽ |
Non-blind SSRF (with the ability to read the response text), except for dedicated proxies | 60 000 ₽ |
Blind SSRF, except for dedicated proxies | 30 000 ₽ |
Server-side vulnerability involving disclosure (e.g. memory leaks / IDORs) of critical or highly sensitive application data | 9 000 ₽ - 120 000 ₽ |
Server-side vulnerability involving disclosure (e.g. memory leaks / IDORs) of protected personal data or sensitive client information | 9 000 ₽ - 120 000 ₽ |
Server-side vulnerability involving disclosure (e.g. memory leaks / IDORs) of sensitive application* or infrastructure data / organizational role privilege escalation | 9 000 ₽ - 120 000 ₽ |
Admin/support authentication bypass | 90 000 ₽ |
Blind XSS in the admin/support interface | 30 000 ₽ |
Detailed error output, local installation path, phpinfo() output, performance counters, etc. are not considered confidential; such messages are usually accepted without payment of a bounty. Messages about disclosure of software versions are not accepted.