DINUM - ProConnect Identité - Public Bug Bounty Program
Bounty Range
$50 - $5,000
external program
Bounty Range
$50 - $5,000
external program
The Direction Interministérielle du NUMérique (DINUM)
The Direction Interministérielle du NUMérique (DINUM) is in charge of the French State's digital transformation for the benefit of citizens and civil servants alike, in all its aspects:
It supports public services, advises the government and develops common resources such as the Inter-ministerial State Network (RIE) or the French eIDAS node (FranceConnect).
ProConnect Identity
DINUM is developing the "ProConnect Identity" system. This is a fully online application that authenticates users via the OIDC protocol, and provides access to other applications.
The DINUM Bug Bounty approach
The DINUM considers crucial to work with trusted and qualified security researchers to identify weaknesses in its applications, regardless of the technology used, and improve its asset security by leveraging the YWH community's motivation and skills.
If you believe you have found a security problem in our products or services we'll be happy to hear about it as well as to work with you on fixing it as quickly as possible.
Of course, we expect you to work in a responsible manner given our applications' contexts in order to avoid any interruption of service and to protect the privacy of our users. Thus, please do not try to over-exploit a bug, in doubt please contact us for further guidance.
As the French public state is committed to an open data approach, most of our applications' source codes are publicly available on GitHub. If proposals for fixes and improvements on the concerned GitHub project will be appreciated mind that reporting any security issue through this mean is forbidden.
How to access the scope/retrieve an account
To test the ProConnect Identity log-in scenario, you must use our dedicated application: https://test.identite.proconnect.gouv.fr. This application is a mock, it is OUT of the scope of the hunting program. It integrates the ProConnect Identity log-in button, that redirects you to the https://identite-sandbox.proconnect.gouv.fr platform which is the scope of the hunting program.
This platform uses actual open data for the organization data.
It is however not bound to any production environment.
You can thus create any user account by providing any SIRET number and using either a disposable e-mail address (like *@yopmail.com that you can access here: https://yopmail.com) or your *@yeswehack.ninja.
Where to find our application's code and documentation
The code of the application is open source and is available on GitHub:
https://github.com/numerique-gouv/proconnect-identite
Feature Toggling
Please note that some security-related features are intentionally configured differently between the sandbox environment and the production environment.
Below is the exhaustive list of feature flags and their respective values:
As a result, we will not accept reports describing attacks that rely solely on disabled features.
If you wish to assess the security impact of a feature that is disabled in the sandbox environment, we recommend running a local instance of ProConnect Identité and enabling the relevant feature flag via the corresponding environment variable for testing purposes.
Testing Policy and Responsible Disclosure
Please adhere to the following rules while performing research on this program:
Reward Eligibility and Amount
We are happy to thank everyone who submits valid reports which help us improve our security, however only those that meet the following eligibility requirements may receive a monetary reward:
Reward amounts are based on:
| Asset value | CVSS Low | CVSS Medium | CVSS High | CVSS Critical |
|---|---|---|---|---|
| Critical | €100 | €500 | €1,500 | €5,000 |
Systemic issues
In the context of this program, we do not intend to encourage, accept or reward reports of leaks that are not applicable to our program's scope and policy.
| Scope | Type | Asset value |
|---|---|---|
| https://identite-sandbox.proconnect.gouv.fr | Web application | Critical |
Out of scopes
Qualifying vulnerabilities
Non-qualifying vulnerabilities
Reports of leaks and exposed credentials
In the context of this program, we do not intend to encourage, accept or reward reports of leaks that are not applicable to our program's scope and policy. To summarize our policy:
| Type of leak | Source of leak is in-scope | Source of leak belongs to the Organization and is out-of-scope | Source of leak does not belong to the Organization and is out-of-scope |
|---|---|---|---|
| Impact is in-scope (e.g. valid credentials on an in-scope asset) | Eligible | Eligible | Not eligible |
| Impact is out-of-scope (e.g. valid credentials for an out-of-scope asset) | Eligible | Not eligible | Not eligible |
Account access
To test the ProConnect Identity log-in scenario, you must use our dedicated application: https://test.identite.proconnect.gouv.fr. This application is a mock, it is OUT of the scope of the hunting program. It integrates the ProConnect Identity log-in button, that redirects you to the https://identite-sandbox.proconnect.gouv.fr platform which is the scope of the hunting program.
This platform uses actual open data for the organization data.
It is however not bound to any production environment.
You can thus create any user account by providing any SIRET number and using either a disposable e-mail address (like *@yopmail.com that you can access here: https://yopmail.com) or your *@yeswehack.ninja.
User agent
Please append to your user-agent header the following value: bugbounty-dinum-PC-ID
When submitting new report, you can add up to 5 collaborators, and define the reward split ratio.
For more information, see the help center. Note: For reports that have already been rewarded, it is not possible to redistribute the rewards.