
Clario
External Program
Submit bugs directly to this organization
Clario Tech DMCC (hereinafter - Clario) invites security professionals to participate in our bounty program to ensure security of our products and safety of our customers’ data. Please read carefully this program policy before proceeding any further testing activities on the company assets.
The program scope includes in-scope assets and in-scope vulnerabilities. Please note, that you are not allowed to test any Clario assets, which are not included in the program scope. Clario will pay no rewards for any discovered vulnerabilities, which are defined as out of vulnerability scope in this program.
Web services and applications, directly bound to the domains specified bellow, are in scope of the program. Any other domains, subdomains, services and applications are out of scope.
Tier 1 https://account.mackeeper.com https://kbill.mackeeper.com https://mkapi.mackeeper.com https://crm.clario.co https://chat.clario.co https://chat-crm.clario.co https://yapi.clario.co https://api.account.clario.co
Tier 2 http://dl.mackeeper.com/ https://clario.co https://webapi.clario.co https://mackeeper.com
Tier 3 https://api-ne.mackeeper.com https://updater.mackeeper.com/ https://dcs.clario.co http://event.mackeeper.com/ https://adblocking.clario.co https://inapp.clario.co https://updater.clario.co
The next applications are in scope:
Mackeeper app version 6.6 or higher. We will update this number upon changes in our production releases Note: for short period of time, we still accept High and Critical vulnerability reports for older versions of Mackeeper (5.17 and higher)
This application belongs to Tier 1 resources.
Please note, only defined in this table versions of applications are in scope. We do not accept reports on outdated version of applications.
While you are allowed to test any technologies within of the specified scope of resources, please consider the next limitations:
We will reward only the reports on purely technical vulnerabilities. Any kind of social engineering activities during your testing within this program are strictly prohibited and might be illegal.
Particularly, you are not allowed:
You must not disrupt Clario services. Especially,
You must not compromise or disclosure any customer data. Please immediately stop your research and notify Clario in case you have got access to any customer account or data (except your own or those you have explicit written permission from their owners)
We are not interested and will not reward reports for vulnerabilities specified in this section
The next vulnerabilities are usually excluded from scope as “not self-sufficient”. However, you may show them as a part of your attack chain. In this case we will reward your report according the maximum proven vulnerability in your report.
The reward is calculated based on the target tier (see the Program Scope section of this document) and severity of the vulnerability.
Clario defines severity level based on our self-calculated CVSS score for each specific vulnerability.
Please note, that Clario may use additional factors unrelated to CVSS score to determine the severity level of a vulnerability. This approach is supported by the CVSS v3.1 specification:
"Consumers may use CVSS information as input to an organizational vulnerability management process that also considers factors that are not part of CVSS in order to rank the threats to their technology infrastructure and make informed remediation decisions. Such factors may include: number of customers on a product line, monetary losses due to a breach, life or property threatened, or public sentiment on highly publicized vulnerabilities. These are outside the scope of CVSS".
For example, CVSS methodology uses Confidentiality, Integrity, and Availability as equal factors for the calculations. Clario always emphasises our customer data protection. So, we will rate vulnerabilities related to personal data protection as more critical, than similar vulnerabilities affecting availability only. Our rule of thumb is: “the more likely vulnerability will affect our customers data and the more easily is to reproduce the attack, the higher severity level and the higher reward”.
Another example is attack vector. Clario will not reward vulnerabilities, which requires physical access to customer device to be exploited. These vulnerabilities are explicitly defiled out of scope, while it is still possible calculate CVSS score for such vulnerabilities.
Usually, we also decrease criticality level of vulnerabilities, which do not harm our assets directly, but rather “might be potentially used” as a part of some more complex attack chain. For example, reflected XSS in most cases will be evaluated as “Low”, except you provided PoC for full attack chain with more significant impact.
Please note, that our priority is TECHNICAL issues. The more “social engineering” activities assume your scenario, the less reward you will get.
Bounty calculation table:
TIER 1 Critical - 5000 High - 3000 Medium - 1000 Low - 250
TIER 2 Critical - 3000 High - 1500 Medium - 400 Low - 150
TIER 3 Critical - 1000 High - 750 Medium - 250 Low - 100
Please note, this table specifies the maximum amount paid by Clario as reward. The actual amount will depend also on the report quality. Reports lacking necessary information to enable Clario to efficiently reproduce the issue will not be rewarded. Please read Report Eligibility section for more details.
Multiple vulnerabilities caused by one underlying issue will be awarded one bounty.
Please submit one vulnerability per a report, unless you need to chain vulnerabilities to provide impact.
Clario will make the best effort to meet the following SLAs for hackers participating in our program:
SLA (in business days):
Time to Resolution depends on severity and complexity.
We will keep you informed about our progress throughout the process.
You must not discuss any vulnerabilities (inclusive the resolved ones) outside of the program without express consent from Clario.
Public disclosure of the vulnerability prior to resolution may cancel a pending reward. We reserve the right to not disclose the report or to disclose it only partially.
Please follow HackerOne Disclosure Guidelines.
Any activities conducted in a manner consistent with this policy will be considered as authorized conduct and we will not initiate any legal actions against you.
If legal actions is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.
Still, you must comply with all applicable laws, including local laws of the country or region in which you reside or in which you download or use Clario software or services.
If you have any suggestions or feedback, please let us know at [email protected]