Replies: 6 comments 7 replies
-
Hey @amammad, I've moved this over to a Discussion to hopefully promote collaboration from the community (rather than leaving it as an Issue for bug/feature tracking). You make some good points, but we feel like that this is at an extreme and that for most reports, this isn't the case. Most submissions we see today are people finding a lot of occurrences in vulnerable applications, and that for this scenario a reduced price for each occurrence is fair for everyone (so that researchers get equal opportunity to earn from an individual pot, and so that maintainers get the most value out of their pot, rather than all the pot going to a single researcher, for a single type of vulnerability). If a maintainer (or another sponsor), finds the quality of contributions compelling to fund the bounties, they'll have full control over the pot and how to value reports, and so will be able to better define how money is spent. |
Beta Was this translation helpful? Give feedback.
-
The bundling feature should be exist forever in my opinion !!! I found 3 CSRFs then we have two ways :
till here If anyone have any opinion against these states I want to ask write and after that we can continue further .... |
Beta Was this translation helpful? Give feedback.
-
Well, here the way that when we encounter these two ways : we can check that all CSRF reports for the same Repo ( can reported from multiple hackers ) then if some reports fix commits be same then we notice that the reports all same and should get one bounty and Also should have one CVE not two or more more complex example : we have three CSRF reports like these A and C have same commit ( and can be reported by different bug hunter ) and then one of them can get bounty and CVE B has a different commit from A and C and we can publish A separate CVE and give separate bounty for it At the end we have Two CVE for two different CSRFs another complex example : We have 8 CSRFs like this All of this Have same commit and reported by different of same bug hunter For all these suggestions *** We should ask maintainer to submit for each report a single commit not one commit for all reports that came from Huntr.dev to them |
Beta Was this translation helpful? Give feedback.
-
My suggestion for reducing the bounty amount first at all Huntr should give bounties according to the CVE score with a base bounty for each report this is my idea : hunter should motivate hunters to looking for more impact vulnerabilities rather than others There should be a blacklist CWEs here : or There can be a graylist here : All of these lists in my oponion can be created by hunters ( top 40 or top 100 or ... ) and then the huntr team can buy more time for other stuffs. |
Beta Was this translation helpful? Give feedback.
-
There are multiple issues to solve:
It makes currently more sense to report 10 / 20 low impact vulnerabilities vs 1 large higher impact vulnerability that takes 3 times longer to find... And If recive 20 low impact vulnerabilities I could think this is a crappy "system" lets ignore it in the future..
At least this will make it possible to change payments on CVE score easier. |
Beta Was this translation helpful? Give feedback.
-
I think it is an issue even on the researches side: For example a "exploit" as CSRF that requires a link to click or submit a page by a user should be marked as Local instead of Network: See https://www.first.org/cvss/v3.1/specification-document "Table 1" The attacker relies on User Interaction by another person to perform actions required to exploit the vulnerability (e.g., using social engineering techniques to trick a legitimate user into opening a malicious document). So explain it to use maintainer / research more clearly... For example https://huntr.dev/bounties/747e8de0-2ff0-4ced-b4fb-7354bf539bfc/ and https://huntr.dev/bounties/349f1437-bdd7-4600-87f7-f06e04955b70/ One has an value 7.5 and the other one 6.5 both do more or less the same but still the impact in the worse case a "client" side setting has been removed. If we are going to recalculate then I come to a score of about: 3.6 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N |
Beta Was this translation helpful? Give feedback.
-
Hello dear Huntr team
I hope you always have a great and nice days
bundling feature is a good idea in my opinion but there is somethings as a security researcher that bothering me :
1.If an application ( mostly web apps ) already has a good and strong XSS protection then I found a XSS on it I will get a full bounty amount but there is a problem!!! for finding second XSS I should searching more and more as this will be exist harder finding procedure after first one that I found before OR The second XSS get my time as same as first one but give me only the 20% of first one
2.The same issue like 1 but for CSRFs that assume a App that already have a good CSRF protection and I found two CSRFs in it and this take my time for every of them 30 min (totally 1h)
in these situation we can find out that if there isn't any side-wide CSRF or XSS this can be very hard to trying to find second same kind of a vulnerability
some other situation like recent VIM report I can guess that the current bundling system can be make a big loss in motivation of security researchers as for A bug like BOF if we want to find a second one for it we should put 4x more time for finding second BOF rather than the first BOF with only 20% of real bounty.
Beta Was this translation helpful? Give feedback.
All reactions