Basic principles 1. UCloud attaches great importance to the security of its products and business, and has always been committed to ensuring the safety of users We look forward to enhancing UCloud's network through the Security Response Center by working closely with individuals, organizations, and companies in the industry Safety level. 2. UCloud We thank the white hat hackers who helped protect the interests of our users and help improve the UCloud Security Center and giving back. 3. UCloud opposes and condemns all vulnerabilities that use vulnerability testing as an excuse to destroy and harm users' interests Hacking activities, including but not limited to exploiting vulnerabilities to steal user information, invade business systems, modify, and steal related information unified data, malicious dissemination of vulnerabilities or data. UCloud will pursue legal responsibility for any of the above acts. Vulnerability feedback and handling process 1. Submit vulnerability information via email, Weibo, or QQ group. 2. Within one business day, USRC staff will acknowledge receipt of the vulnerability report and follow up to begin assessing the issue. 3. Within three working days, USRC staff will address the issue, give a conclusion, and check the award. (If necessary, it will be given.) The reporter communicates and confirms, and asks the reporter to assist. ) 4. The business department fixes the vulnerability and arranges the update to go online, and the repair time depends on the severity of the problem and the difficulty of repair. 5. Vulnerability reporters review vulnerabilities. 6. Distribute rewards.
Security vulnerability scoring criteria For each level of vulnerability, we will conduct a comprehensive examination based on the technical difficulty of exploiting the vulnerability and the impact of the vulnerability Consideration, divided into different levels, and given corresponding points. According to the service level of vulnerability, the degree of vulnerability harm is divided into four levels: high risk, medium risk, low risk, and ignored The vulnerabilities covered and the scoring criteria are as follows: High risk: Rewards: Shopping cards worth 1000-2000 yuan or gifts of the same value, including but not limited to: 1. A vulnerability that directly obtains system privileges (server privileges, database privileges). This includes but is not limited to remote arbitrary commands Execution, code execution, arbitrary file upload to get Webshell, buffer overflow, SQL injection to get system rights Limitations, server parsing vulnerabilities, file inclusion vulnerabilities, etc. 2. Serious logic design flaws. This includes but is not limited to logging in with any account, changing the password of any account, and verifying SMS and email Bypass. 3. Serious leakage of sensitive information. This includes, but is not limited to, serious SQL injection, arbitrary file inclusion, etc.
4. Unauthorized access. This includes but is not limited to bypassing authentication to access the background directly, background login weak password, SSH weak password, etc According to the library, the password is weak, etc. 5. Obtain user UCloud user data or permissions through the UCloud platform. Medium Danger: Rewards: 500-1000 yuan worth of shopping cards or gifts of the same value, including but not limited to: 1. Vulnerabilities that require interaction to obtain user identity information. Including storage-based XSS, among others. 2. Ordinary logic design defects. Including but not limited to unlimited SMS and email sending. 3. Non-focused product lines, exploiting difficult SQL injection vulnerabilities, etc.
Low risk: Rewards: Shopping cards worth 100-500 yuan or gifts of the same value, including but not limited to: 1. General information leakage vulnerability. This includes but is not limited to path leakage, SVN file leakage, LOG file leakage, phpinfo, etc. 2. Vulnerabilities that cannot be exploited or difficult to exploit, including but not limited to reflective XSS. Ignore: This level includes: 1. Bugs that don't involve security issues. Including but not limited to product function defects, garbled pages, style mixing, etc. 2. Vulnerabilities that cannot be reproduced or other problems that cannot be directly reflected. This includes but is not limited to questions that are purely user-speculative Question.
General principles of scoring criteria: 1. The scoring criteria apply only to all UCloud products and services. Domain names include, but are not limited to, *.ucloud.cn, server Includes servers operated by UCloud, and the products are mobile products released by UCloud. 2. Bug rewards are limited to vulnerabilities submitted on the UCloud Security Response Center, not those submitted on other platforms Points. 3. Submitting vulnerabilities that have been disclosed on the Internet will not be scored. 4. Score for the earliest committer of the same vulnerability. 5. Multiple vulnerabilities from the same vulnerability source are recorded as only 1. 6. For the same link URL, if multiple parameters have similar vulnerabilities, the same link will be different according to one vulnerability credit type, the reward will be given according to the degree of harm. 7. For general-purpose vulnerabilities caused by mobile terminal systems, such as webkit uxss, code execution, etc., only the first is given Vulnerability reporter rewards will no longer be counted for the same vulnerability report of other products.
8. The final score of each vulnerability is determined by the comprehensive consideration of the vulnerability exploitability, the size of the harm and the scope of impact. It's possible Vulnerability points with low vulnerability levels are higher than vulnerabilities with high vulnerability levels. 9. White hats are requested to provide POC/exploit when reporting vulnerabilities and provide corresponding vulnerability analysis to speed up administrators Processing speed may be directly impacted for vulnerability submissions that are not provided by the POC or exploit or are not analyzed in detail Rewards.
Bonus Payment Process : USRC staff negotiated with the white hats when and how the gifts would be distributed. Dispute Resolution : If the reporter has any objections to the vulnerability assessment or vulnerability scoring during the vulnerability handling process, contact the administrator in a timely manner Communication. The UCloud Security Emergency Response Center will take precedence over the interests of vulnerability reporters and will do so if necessary Introduce external authorities to jointly adjudicate.
|