
Amazon
External Program
Submit bugs directly to this organization
#Amazon Vulnerability Research Program (VRP) - Program Policy
#Introduction
At Amazon, we take security and privacy very seriously. If you believe that you have found a security vulnerability that affects any Amazon product or service, please report it to us. You may report a vulnerability using the “Submit Report” button on this page. Reports that fall within scope of Amazon’s Vulnerability Research Program (VRP) are also eligible for a reward. We appreciate your efforts in helping protect customer trust and make Amazon more secure.
For vulnerabilities related to Amazon Web Services (AWS), please submit reports via the AWS Vulnerability Disclosure Program. For vulnerabilities related to Amazon Devices, please submit reports via Amazon Vulnerability Research Program - Devices page. For vulnerabilities related to Ring, please submit reports via the Ring Bug Bounty page For vulnerabilities related to eero, please submit reports via the eero Bug Bounty page
#What is VRP?
VRP is an initiative driven and managed by Amazon's Stores Security Bug Bounty Team.
Amazon customers and security researchers who discover a potential security finding within Amazon products or services can report it to Amazon's VRP
Amazon employees and contractors, as well as their immediate family members (e.g., parent, sibling, spouse, child) are strictly prohibited from participating in VRP. Amazon employees and contractors may not share information with an external security researcher to bypass this prohibition or otherwise enable another person to participate in VRP (in which case all parties are ineligible). Residents of any countries/regions that are subject to United States sanctions, such as Cuba, Iran, North Korea, Sudan, and Syria or Crimea, and any person designated on the U.S. Department of the Treasury’s Specially Designated Nationals List are strictly prohibited from participating in VRP.
You must be 18 or older to be eligible for an award.
#How VRP Works
#Services and Products in Scope
Bounty eligible findings are limited to following marketplaces and mobile apps: (Note: Please check the Scope section for complete details on latest in-scope assets)
All retail marketplaces are Wildcard scoped (*.amazon)
| Domain |
|---|
| amazon.com (United States) |
| amazon.co.uk (UK) |
| amazon.in (India) |
| amazon.de (Germany) |
| amazon.fr (France) |
| amazon.co.jp (Japan) |
| amazon.ca (Canada) |
| amazon.cn (China) |
| amazon.it (Italy) |
| amazon.es (Spain) |
| amazon.nl (Netherlands) |
| amazon.ae (United Arab Emirates) |
| amazon.sg (Singapore) |
| amazon.se (Sweden) |
| amazon.sa (Saudi Arabia) |
| amazon.eg (Egypt) |
| amazon.pl (Poland) |
| amazon.com.au (Australia) |
| amazon.com.tr (Turkey) |
| amazon.com.br (Brazil) |
| amazon.com.mx (Mexico) |
| amazon.com.be (Belgium) |
| amazon.co.za (South Africa) |
| amazon.com.ng (Nigeria) |
| amazon.com.co (Colombia) |
| amazon.cl (Chile) |
##Always out of scope and not reward eligible
IMPORTANT NOTE: DO NOT submit generated sensitive images such as sexually explicit images, extremely graphic or violent images, or CSAM (Child Sex Abuse Material) in reports. Amazon Bug Bounty will not review this material or reward it.
Security issues discovered in the AWS IP Space (https://ip-ranges.amazonaws.com/ip-ranges.json) are not in scope for VRP. This link is a general guideline and not perfect. As an infrastructure provider, AWS customers operate assets in this space. Discovering and testing against AWS and AWS customer assets is strictly out of scope for VRP and against the AWS AUP (https://aws.amazon.com/aup/).
You are not authorized to test any asset, domain, or IP address outside the scope of VRP. If you become aware of an out-of-scope vulnerability, you may report the security finding for our review. If you are not able to demonstrate an impact on bounty-eligible assets, then that finding may not be eligible for the rewards.
Reports of zero-day vulnerabilities (vulnerabilities that were not previously known to the security community) within in-scope services and products will be eligible for an award at our discretion if the report provides significant insight that assists Amazon's security teams with remediation efforts or has not previously been identified by another researcher on our own vulnerability response program.
#Rules of Engagement (Behavior)
#Rules of Engagement (Testing)
amazonvrpresearcher_yourh1username while testing.amazonvrpresearcher_yourh1username may result in your account/IP getting blocked by automated protections. It can take time to reinstate these so please make sure to include it.[email protected].amazonvrpresearcher¬¬_yourh1username anywhere in your User-Agent header. You can create a match and replace proxy rule in Burp by going to Proxy >> Options >> Match and Replace with the following options:
Type: Request header
Match: ^User-Agent.*$
Replace: User-Agent: amazonvrpresearcheryourh1usernameAmazon but is actually an Amazon Customer using AWS. This cannot be used as evidence to determine if something is owned by Amazon, and should not be used as a launch point for recon.Violation of the above rules may result in forfeit of bounty eligibility, or further, disqualification from bounty program participation at Amazon’s discretion.
#Other Types of Issues
If you find a bypass of a previous report you’ve created, or we ask that you create a new report due to the content being different enough, please fill out the Custom Field Bypass Reference with the original ID of the finding. This has no bearing on reward, it just helps Amazon with secondary data tracking.
#Legal Safe Harbor
Amazon will not bring any legal action against anyone who makes a good faith effort to comply with program policies, or for any accidental or good faith violation of this policy.
As long as you comply with this policy:
Amazon cannot authorize any activity on third-party products or guarantee that those third parties won’t pursue legal action against you. Amazon is not responsible for your liability from actions performed on third parties.
To protect your privacy, we will not, unless served with legal process or to address a violation of this policy:
#If Your Account is Banned or Blocked by Vulnerability Research Activities
#Research Guidance
Reference HackerOne guidance on writing quality reports:
#Responsible Disclosure Policy
Thank you for joining us in supporting ethical and responsible disclosure. By participating in this program, you agree not to share publicly or privately any details or descriptions of your findings with any third party. You also agree not to attempt to threaten or extort Amazon.
Amazon commits to timely remediation of your findings, and prompt response to relevant questions.
#Severity Examples
| Vulnerability | Severity Range | |
|---|---|---|
| 1 | Remote Code Execution | Critical |
| 2 | SQL Injection | High - Critical |
| 3 | XXE | High - Critical |
| 4 | XSS | High - Critical |
| 5 | Server-Side Request Forgery | Medium - Critical |
| 6 | Directory Traversal - Local File Inclusion | Medium - High |
| 7 | Authentication/Authorization Bypass (Broken Access Control) | Medium - High |
| 8 | Privilege Escalation | Medium - High |
| 9 | Insecure Direct Object Reference | Medium - High |
| 10 | Misconfiguration | Low - High |
| 11 | Web Cache Deception | Low - Medium |
| 12 | CORS Misconfiguration | Low - Medium |
| 13 | CRLF Injection | Low - Medium |
| 14 | Cross Site Request Forgery | Low - Medium |
| 15 | Open Redirect | Low - Medium |
| 16 | Information Disclosure | Low - Medium |
| 17 | Request Smuggling | Low – Medium |
| 18 | Mixed Content | Low |
Please note, this is not meant to be an exhaustive list, but a general guideline for what severity these issues are given.
Please note that any reports related to the prompt response content are out of scope where there is no clear application security impact and the potential issue is about responsible AI usage. We will not reward on these reports and close them as informative unless there is direct application security impact on the in-scope GenAI applications. Few examples for these out-of-scope reports are generation of inappropriate text/visual content with the model, get inappropriate suggestions from the model, malicious code generation. Any issues which are result of model hallucinations are out scope as well.
**IMPORTANT NOTE: ** DO NOT submit generated sensitive images such as sexually explicit images, extremely graphic or violent images, or CSAM (Child Sex Abuse Material) in reports. Amazon Bug Bounty will not review this material or reward it.
| Potential Vulnerabilities | Severity | Comments |
|---|---|---|
| Unauthorized access/disclosure of PII/PHI data | High-Critical | Severity will be dependent on the context and influencing factors. |
| Cross customer sensitive data access | High-Critical | Severity will be dependent on the context and influencing factors. |
| Unauthorized system or environment changes | High-Critical | Severity will be dependent on the context and influencing factors. |
| Model Theft and LLM training data poisoning | High-Critical | Depending on the overall impact and application context. |
| Advarsaries can retrieve personal customer data without consent | High-Critical | Severity will be dependent on the context and influencing factors. |
| Information Disclosure | Low-Critical | Severity will be dependent on the context and influencing factors. |
| Prompt Injection | Medium - Critical | Severity will be dependent on the context and influencing factors. Please make sure to read notes above |
| Insecure Output Handling | Medium-Critical | Impact will depend on resulting potential vulnerabilities like HTML injection,XSS,SSRF, RCE etc. |
| Insecure plugins impacting models | Medium-High | Depending on the impact like content injection, code execution, differential error responses, system data exfiltration, |
| Excessive functionality, permissions and autonomy | Low-High | Depending on the actions allowed by excessive agency issues |
| Response manipulation providing guidance to customers | Medium-High | Severity will be dependent on the context and the guidance. |
| Adversaries can perform unauthorized actions on behalf of users | Medium-Critical | Depending on the impact, ease and issue radius. |
| LLM vulnerable to solicitation and social engineering | Medium-High | Depending on the overall impact and application context. |
| In context data could be used to de-ananoymize users | Medium | Severity will be dependent on the context and influencing factors. |
| Absent customer API or data opt out mechanisms | Medium | Severity will be dependent on the context and influencing factors. |
| Command Injection | High-Critical | Depending on the impact, ease and issue radius. |
| API Auth Bypass | High-Critical | Depending on the impact, ease and issue radius. |
| Runtime Information Disclosure | Low-Medium | Severity will be dependent on the context and influencing factors. |
#Non-eligible Vulnerabilities
| Vulnerability | |
|---|---|
| 1 | Subdomain Takeover for out of scope items or not listed scope. Subdomain Takeovers on Wildcard domains are In-Scope |
| 2 | Clickjacking |
| 3 | Self XSS |
| 4 | Email Spoofing - SPF Records Misconfiguration |
##Out-of-Scope Issues
The goal of this program is to improve the security of our services for Customers. We do not reward, but will accept “Operational Security” (OpSec) submissions. OpSec issues include leaked employee passwords, leaked business documents, etc. These submissions will only receive reputation points.
##Out-of-Scope Assets
| Category | Asset |
|---|---|
| AWS | All AWS related services and products will be out-of-scope - See AWS security reporting at https://aws.amazon.com/security/vulnerability-reporting/ |