Dailymotion Public Bug Bounty
Bounty Range
$50 - $3,300
external program
Bounty Range
$50 - $3,300
external program
BountyHall of fame
€50 Low €100 Medium €350 High €1,250 Critical €3,300
Avg reward -
Max reward -
Scopes18
Supported languagesEnglishFrench
Reports1975
1st response < 1 day
Reports last 24h14
Reports last week58
Reports this month128
Program description
Program activity
Dailymotion is a French online video platform founded in 2005, offering users and publishers a space to upload, watch, and distribute professional and curated video content across categories such as news, sports, music, and entertainment.
Maintaining top-notch security online is a community effort and a high priority for Dailymotion. We're lucky to have a vibrant group of independent security researchers who volunteer their time to help us spot potential issues. To recognize the efforts of independent security researchers and the important role they play in keeping Dailymotion safe for everyone, we offer a bounty for reporting certain qualifying security vulnerabilities. Please review the following rules before you reporting a vulnerability. By participating in this Program, you agree to be bound by these rules.
WILDCARDS - PUBLIC DOMAINS:
These are our main public facing domains, all subdomains & services included in the listed wildcards included in the scopes of this program.
*.dailymotion.com: all our main public websites & platforms
AS41690: IP range owned by Dailymotion
WILDCARDS - TECHNICAL DOMAINS:
These are domains mostly used for technical purposes, all subdomains & services included in the listed wildcards included in the scopes of this program
*.dmcdn.net: dedicated domain to distribute static content, including all our video content, distributed across our platforms & services.
*.api.dailymotion.com: all APIs related to public websites & services, detailed API documentation available at https://developer.dailymotion.com.
*.dm.gg | *.dmxleo.com | *.kube.dm.gg | *.dm-event.net: : technical domains mostly used for internal services & usages.
MOBILE APPLICATIONS:
Our official Dailymotion applications on the [https://play.google.com/store/apps/details?id=com.dailymotion.dailymotion&hl=fr&gl=US](Google Play Store), [https://apps.apple.com/fr/app/dailymotion/id336978041](Apple App Store).
** DAILYMOTION PRO - B2B PLATFORMS**:
These are platforms dedicated to our B2B customers, allowing them to manage our video hosting & distribution services, as well as define and coordinate advertising campaigns across our services & platforms.
https://pro.dailymotion.com & https://business.dailymotion.com: historical B2B platform for video hosting & distribution services.
https://dailymotion.webflow.io/: new version of our B2B platform, including IA & Advertising management services.
https://ray.dailymotion.com/: ou AI tool/service to transform campaign briefs into actionable audiences, creative strategies, and activation plans.
** MCP & AUTOMATION SERVERS**:
The objective of these scopes is to test and report vulnerabilities on our MCP Servers, while complying with the rules and limitations defined by our program. These URLs are normally restricted and accessible only via our company's internal VPN and should not be publicly exposed on the internet. Our goal in including them in the program is to identify potential unauthorized access vulnerabilities that could allow an attacker to bypass these restrictions.
Note concerning XSS and CSRF: We will tend to rate user session-related XSS and CSRF vulnerabilities, whether stored or reflected, with a low impact. For a (very) significant majority, users are unauthenticated and the chances of successfully exploiting such vulnerabilities are therefore minimized. Typically, a reflected XSS vulnerability on our main domain and implying the theft of user cookies on www. or *.dailymotion.com will be rated as Low. Please note that, if you are able to demonstrate an ability to exploit these vulnerabilities in creative ways (possibly combined with other vulnerabilities found by yourself) so as to provably increase the business impact, we will consider this final impact to evaluate the severity.
Note concerning IDOR: IDOR vulnerabilities on .api.dailymotion.com via /user/[ID] that does not lead to personal/sensitive info disclosing
Different User Types: We have several levels of privileges on the product: unauthenticated user, authenticated user, partner, partner with a verification badge. We invite you to go and explore the attack surface that is specific with each of these profiles as they are all in-scope.
Partner accounts are only granted to users after they have accepted the terms of our Dailymotion Partner Program Agreement. Security researchers interested in digging is this part of our perimeter can open such an account by signing up on [https://www.dailymotion.com/dm/partner/sign-up](our partner portal).
If you want to test the features exposed only to partners with a verification badge, please file a request on [email protected] so as to be provided with a verification badge (we'll then provide you with a temporary, dedicated partner account). For practical reasons, Dailymotion reserves the right to evaluate and deny such requests on a case by case basis; typically, we will only consider requests from hunters who have previously reported at least one qualifying vulnerability rated as Medium or more.
Systemic Issues Rewarding: reports from the 6th systemic issue will be treated with the informative status. Refer to the dedicated section of the program for more details about 'systemic issues' definition
Please adhere to the following rules while performing research on this program:
Denial of service (DoS) attacks on Dailymotion applications, servers, networks or infrastructure are strictly forbidden.
Avoid tests that could cause degradation or interruption of our services.
Do not use automated scanners or tools that generate large amount of network traffic
Do not leak, copy, manipulate, or destroy any user data or files in any of our applications/servers.
No vulnerability disclosure, full, partial or otherwise, is allowed.
Make sure to apply hunting requirements policy (User-Agent, VPN...)
As a complement to the Program’s rules and testing policy :
DO NOT alter compromised accounts by creating, deleting or modifying any data
DO NOT use compromised accounts to search for post-auth vulnerabilities (they won’t be eligible anyway)
DO NOT include Personally Identifiable Information (PII) in your report and please REDACT/OBFUSCATE the PII that is part of your PoC (screenshot, server response, JSON file, etc.) as much as possible.
In case of exposed credentials or secrets, limit yourself to verifying the credentials validity
In case of sensitive information leak, DO NOT extract/copy every document or data that is exposed and limit yourself to describe and list what is exposed.
We are happy to thank everyone who submits valid reports which help us improve the security of Dailymotion, however only those that meet the following eligibility requirements may receive a monetary reward:
You must be the first reporter of a vulnerability.
The vulnerability must be a qualifying vulnerability
The report must contain the following elements:
Clear textual description of the vulnerability, how it can be exploited, the security impact it has on the application, its users and Dailymotion, and remediation advice on fixing the vulnerability
Proof of exploitation: screenshots demonstrating the exploit was performed, and showing the final impact
Provide complete steps with the necessary information to reproduce the exploit, including (if necessary) code snippets, payloads, commands etc
Reports failing to demonstrate a tangible attack scenario and opportunity are unlikely to be eligible for reward.
You must not break any of the testing policy rules listed above
You must not be a former or current employee of Dailymotion or one of its contractors.
Reward amounts are based on:
Reward grid of the report's scope
CVSS scoring and actual business impact of the vulnerability upon performing risk analysis
Reports failing to demonstrate a tangible attack scenario and opportunity are unlikely to be rewarded. Please keep in mind that whatever you discover, you are required to demonstrate what you believe is a vulnerability. Because we evaluate reports based on business risks and tangible impacts, we don't reward theoretical vulnerabilities (the ones which are almost exploitable, but just "not quite there") — although we are always interested in reading about them!
For example, the exposure of our public website's JWT token for our GraphQL API is not a security issue. We know it's there, in your browser, but you can't do anything with it to attack other people's data (or if you can, do demonstrate your findings).
In the event that we choose not to reward a vulnerability with no demonstrable business impact (for example an XSS on a domain that does not have valuable cookies), we reserve the right to fix the issue in order to avoid further equivalent submissions by other researchers.
When conducting vulnerability research in good faith and in accordance with the terms specified in this Policy, we consider this research to be:
We won't bring any claim against you for circumvention of technology controls;
We won’t take legal action against, suspend, or terminate access to the Service for those who discover and report security vulnerabilities responsibly.
Dailymotion reserves all of its legal rights in the event of any noncompliance.
Dailymotion reserves the right to modify the terms of this Program or terminate this Program at any time.
If you have any concerns or are uncertain whether your security research is consistent with this policy please reach out to [email protected]) before going any further.
Asset value | CVSS Low | CVSS Medium | CVSS High | CVSS Critical | Medium | €100 | €350 | €1,250 | €3,300 | Low | €70 | €250 | €1,000 | €3,000 |
1st report100% 2nd report100% 3rd report75% 4th report50% 5th report25% 6th+ report0%
In the context of this program, we do not intend to encourage, accept or reward reports of leaks that are not applicable to our program’s scope and policy. To summarize our policy, you may refer to the below table:
More info
Scope | Type | Asset value | Expand rewards grid | *.dailymotion.com | Web application | Low | | Low €70
Medium €250
High €1,000
Critical €3,000
| AS41690 | IP Address | Low | | Low €70
Medium €250
High €1,000
Critical €3,000
| *.api.dailymotion.com | API | Medium | | Low €100
Medium €350
High €1,250
Critical €3,300
| *.kube.dm.gg | Wildcard | Medium | | Low €100
Medium €350
High €1,250
Critical €3,300
| *.dm.gg | Web application | Medium | | Low €100
Medium €350
High €1,250
Critical €3,300
| *.dmxleo.com | Wildcard | Medium | | Low €100
Medium €350
High €1,250
Critical €3,300
| *.dmcdn.net | Web application | Low | | Low €70
Medium €250
High €1,000
Critical €3,000
| *.dm-event.net | Wildcard | Low | | Low €70
Medium €250
High €1,000
Critical €3,000
| https://n8n-staging.k8s.dm.gg/ | API | Medium | | Low €100
Medium €350
High €1,250
Critical €3,300
| https://n8n.pub.k8s.dm.gg/ | API | Medium | | Low €100
Medium €350
High €1,250
Critical €3,300
| https://airflow-mcp.data.dailymotion.com/ | API | Medium | | Low €100
Medium €350
High €1,250
Critical €3,300
| https://bigquery-mcp.data.dailymotion.com/ | API | Medium | | Low €100
Medium €350
High €1,250
Critical €3,300
| https://dailymotion.webflow.io/ | Web application | Medium | | Low €100
Medium €350
High €1,250
Critical €3,300
| https://business.dailymotion.com/ | Web application | Medium | | Low €100
Medium €350
High €1,250
Critical €3,300
| https://pro.dailymotion.com/ | Web application | Medium | | Low €100
Medium €350
High €1,250
Critical €3,300
| https://ray.dailymotion.com/ | Web application | Medium | | Low €100
Medium €350
High €1,250
Critical €3,300
| https://apps.apple.com/fr/app/dailymotion/id336978041 | Mobile application IOS | Low | | Low €70
Medium €250
High €1,000
Critical €3,000
| https://play.google.com/store/apps/details?id=com.dailymotion.dailymotion&hl=fr&gl=US | Mobile application Android | Low | | Low €70
Medium €250
High €1,000
Critical €3,000
|
In the context of this program, we do not intend to encourage, accept or reward reports of leaks that are not applicable to our program’s scope and policy. To summarize our policy, you may refer to the below table:
More info
Type of leak Source of leak is in-scope Source of leak belongs to the Organization and is out-of-scope Source of leak does not belong to the Organization and is out-of-scope
Impact is in-scope (e.g. valid credentials on an in-scope asset) Eligible Eligible Not eligible
Impact is out-of-scope (e.g. valid credentials for an out-of-scope asset) Eligible Eligible Not eligible
When submitting new report, you can add up to 5 collaborators, and define the reward split ratio.
For more information, see [https://helpcenter.yeswehack.io/hunter/hunter-collaboration](help center). Note: For reports that have already been rewarded, it is not possible to redistribute the rewards.
To submit a vulnerability report, you need to login with your hunter account. /programs/dailymotion-public-bug-bounty/create-report