Details

KuCoin Bug Bounty Program Launched

2022-08-03 16:16:12--

Overview

Dear Users, to ensure a secure trading environment for users as it continues to expand, we are mobilizing the expertise of the community to maximize the security of www.kucoin.com. We have established a bug and security feedback reward mechanism on August 03, 2022 to provide security experts with incentives for security advice and vulnerability analysis.

Rules

Rewards are divided into four tiers, depending on their severity. Each tier has different rewards (in USD).

Critical3,000 - 5,000 USD
High900 - 2,000 USD
Medium300 - 500 USD
Low50 - 150 USD

If we accept your bug/vulnerability report, please provide one of the following to receive your rewards.

  • For vulnerabilities/bugs submitted via form, please provide the address of your KCC wallet. We will pay you in KCS.
  • For vulnerabilities/bugs submitted via Hacken, we will pay you in USDT.

Please note that the threat level will be determined by KuCoin security staff, and that KuCoin has the sole discretion on deciding whether report meets the reward criteria.

Scope of Vulnerabilities

The modules within the scope of reporting are as follows:

TargetType
*.kucoin.comWeb
KuCoin Mobile Application for AndroidAndroid
KuCoin Mobile Application for iOSiOS

The modules not within the scope of reporting are as follows:

TargetType
cert.kucoin.comWeb
ZendeskWeb
SandBoxWeb
KuCoin storeWeb
API docsWeb
intro.kucoin.comWeb
passport.kucoin.comWeb
sandbox-*.kucoin.comWeb
*-sdb.kucoin.comWeb
*-sandbox.kucoin.comWeb

Criteria

We are mostly interested in the following vulnerabilities:

IN-SCOPE VULNERABILITIES - WEB

    • Problems with business logic that may result in the loss of user assets.
    • Payment manipulation.
    • Remote code execution (RCE).
    • Leakage of sensitive information.
    • Critical Owasp issues such as XSS, CSRF, SQL, SSRF, IDOR, and others.
    • Other vulnerabilities that may result in potential loss.

IN-SCOPE VULNERABILITIES - Mobile

    • Functions that can access unsafe external links.
    • Jsbridge/javascritptinterface that can be called to harm users.
    • Other vulnerabilities that may result in potential loss.

The following security issues are not within scope.

OUT OF SCOPE VULNERABILITIES-WEB

    • Theoretical loopholes that are not actually proven.
    • Email verification code flaws, expired password reset links, and issues with password complexity policies.
    • Records with invalid or missing sender information.
    • Clickjacking and UI redirection with only minor security impact.
    • Vulnerabilities in third-party applications.
    • Zero-day exploits that are less than 30 days old.
    • Social engineering, phishing, and other forms of deception.
    • Denial of service (DOS) attacks.
    • Email/phone number information enumeration (e.g. resetting passwords to verify emails or phone numbers).
    • Data leaks with minor security impact (e.g. stack tracing, path exposure, directory listing, and log information).
    • Known issues, duplicate submissions, or security issues that have already been disclosed.
    • Physical attacks.
    • XSS for PCs.
    • Vulnerabilities that can only be exploited on older versions of browsers or platforms.
    • Vulnerabilities in auto-filling web forms.
    • Using known codebase vulnerabilities without actual proof.
    • Lack of security flags in cookies.
    • Issues related to insecure SSL/TLS socket or protocol versions.
    • Content-based deception.
    • Issues related to cache management.
    • Internal IP or domain name leakages.
    • Missing security headers that cannot be directly exploited.
    • CSRF issues with negligible impact (such as add to favorites, add to cart, subscribe, etc.)
    • Issues with no security impact.
    • Assets that do not belong to KuCoin.
    • Behavior that disrupts the normal operation of the business (DoS/DDoS).
    • Issues with installation path permissions.
    • Automated tools or scanned reports.
    • Links to invalid or expired pages will only be accepted if you can prove that the currently submitted link is still in normal use. Issues found through past announcements or blogs will not be accepted.

OUT OF SCOPE VULNERABILITIES - Mobile

    • Vulnerabilities that require Root/Jailbreak permissions.
    • Physical vulnerabilities that require manipulation of the user's device.
    • Vulnerabilities that require a lot of user interaction.
    • Issues that only expose non-sensitive device information.
    • Only static analysis is performed on binary files with missing POC business logic.
    • Lack of fuzzing, binary protection, or root (jailbreak) detection.
    • Bypassing of device certificate detection.
    • Missing Exp such as PIE, ARC, or stack exploits.
    • Leakage of sensitive information in TLS-protected URLs or Requests.
    • Binary path leaks.
    • Hardcoded OAuth and APP keys present in APK and IPA.
    • Scan reports for automated tools.
    • Information leakage caused by sensitive information being stored in clear text in the user device.
    • Crashes caused by sending malformed URL Schemes or components to receivers such as external Activity/Service/Broadcast (the leakage of sensitive data obtained by exploiting these schemes is within the scope of acceptable vulnerabilities).
    • Shared link leaks via clipboard.
    • API key leaks with no security implications (such as Google Map API keys).
    • Other content outlined in the out of scope Web Module vulnerabilities.

Report Evaluation Criteria

P1 3,000 - 5,000 USD:

Vulnerabilities that could compromise the security of any user or business funds, including:

1. Direct access to the system or core business.

2. Other potential for significant damage.

P2 900 - 2,000 USD:

Vulnerabilities with similar impact as P1, but with the preconditions of exploitation and the impact of malicious exploitation, including:

1. Unauthorized access.

2. Serious SQL injections.

3. High-risk data leaks.

P3 300 - 500 USD:

Issues that affect certain users, result in the access and modification of user information, etc.

P4 50 - 150 USD:

1. SMS spam.

2. Leakage of non-sensitive information.

Feedback Channel

You can provide us with feedback through the following channels.

1. Report the corresponding issue through the form

2. Submit a report to us via Hacken at: https://hackenproof.com/kucoin/kucoin.

Event Statement

1. It is strictly forbidden to use penetration testing as an excuse to exploit vulnerabilities and threat intelligence to damage the interests of users, affect normal business operations, or steal user data.

2. Modification of the KuCoin database or destruction of data through the use of identified bugs or vulnerabilities is strictly prohibited.

3. Automated testing using scanning tools is strictly prohibited.

4. Testing on accounts other than those you own is strictly prohibited.

5. Kucoin.com reserves the right to the final interpretation of the event.

About Us

Founded in September 2017, KuCoin is a global cryptocurrency exchange. As a user-oriented platform focused on inclusivity and the community, we offer over 700 digital assets. KuCoin provides spot trading, margin trading, P2P trading, futures trading, and equity and lending to 18+ million users across 207 countries and regions.