
Glassdoor
External Program
Submit bugs directly to this organization
Helping people everywhere find jobs and companies they love.
At Glassdoor we take our security very seriously and welcome any responsible disclosure of potential gaps in our systems. We believe that working with skilled security researchers across the globe is crucial in providing a trusted and secure service to help people everywhere find jobs and companies they love.Please read through the following details to help you focus on the areas most important to us.
Additionally, Glassdoor may award an additional reward bonus for exceptional reports. This will be done at Glassdoor's discretion. Good luck, and happy hunting!
#🧪 Testing Requirements:
==Please do not perform any testing on live bowls or real company pages. All testing must happen in our approved WeAreHackerOne bowl (or private test bowls you create) or the Acme/Winkler Web Design company pages. Failure to comply may result in disqualification from our program.==
Create your Glassdoor account with +hackerone: Example [email protected]
Where possible, add text bugbounty to requests you are sending to our applications, so our team can identify the traffic being generated as part of your testing.
Use our test companies Acme Corp and/or Winkler Web Designs - please DO NOT test against other companies which you don't have explicit permission to. To get invited to both or either of the companies fill out the following Google Form and we will do our best to invite you as soon as possible
Register on Fishbowl using your HackerOne email Alias. Example [email protected]. In doing so you will be automatically included in the company bowl "We Are Hackerone". For more information on how the HackerOne email Alias works see the following documentation
#📜 Program Ground Rules
If during your research you happen to encounter any information about another user or other individual, immediately stop and report this to Glassdoor. To participate in this program, you only need to explain the technical vulnerability you discovered.
You must avoid any viewing, copying, altering, destroying, or otherwise interacting with any data, in particular data of other individuals, to which you may gain access through your research. If a vulnerability provides unintended access to data, limit the amount of data you access to the minimum required for effectively demonstrating the vulnerability; cease testing, and submit a report immediately if you encounter any user data during testing. This may include Personally Identifiable Information (PII), Diversity and Inclusion data, or Proprietary Information.
Do not copy, save, store, transfer, disclose, or otherwise retain any information you find on our site during your research, except to report your research to Glassdoor.
All access to our Site must otherwise be in accordance with our Terms of Service and all applicable laws. In the event you access PII or other sensitive data, note that you are required to follow all laws and regulations applicable to the access and processing of such personally identifiable information and/or data, such as the California Consumer Privacy Act of 2018, the California Privacy Rights Act of 2020, New York Privacy Act 2021, once they become effective, and the European Union’s General Data Protection Regulation (Regulation (EU) 2016/679), including the European Commission’s Standard Contractual Clauses regarding the transfer of personal data to processors
You must avoid causing any interruption or degradation of our services. Researchers who are found to be using aggressive automated tools will be reported to Hackerone for non co-operation.
Any form of interaction with others on or through our Site, including but not limited to other Glassdoor users, is strictly prohibited. Do not make any attempts to phish users or employees.
You will be expected to cooperate with us if we request your assistance in connection with your research.
Current employees or contractors of Glassdoor are not eligible to participate in the program. Former employees and contractors are eligible to participate in the program only, if:
A researcher you are expected to follow Hackerone's Code of Conduct.
Different Accounts Types and Roles:
Note: Any difference in role based access between the Professional and Student account does not necessarily indicate a secuirty risk.
| Target | Description |
|---|---|
| https://api.fishbowlapp.com/* | Fishbowl's Restful API endpoint. Focus areas: privilege escalation, sensitive data exposure |
| https://www.fishbowlapp.com/* | Fishbowl's Web App. Focus areas: privilege escalation, sensitive data exposure, Injection attacks, broken access control |
Different Accounts Types and Roles:
| Target | Description | |
|---|---|---|
| https://api.glassdoor.com/* | Glassdoor's API endpoint formatted in XML or JSON. Developer Documentation Focus areas: privilege escalation, sensitive data exposure | |
| https://www.glassdoor.com/* | Glassdoor's primary web application. A good place to start your testing. Focus Areas: Injection attacks, privilege escalation | |
| https://www.glassdoor.com/member/* | User focused area contributions, my account, my information, resume uploads, and profile controls. Focus Areas: Injection attacks, privilege escalation | |
| https://www.glassdoor.com/employers/ec/* | Access control platform for employers to manage and review engagement, reviews, and management tools. Documentation: Glassdoor Employee Center Guide Focus Areas: broken access control, privilege escalation | |
| https://help.glassdoor.com/* | Glassdoor's Help Center. Focus Areas: Injection attacks, Sensitive Data Disclosure | |
| https://www.glassdoor.com/Job/* | Job search features. Focus Area: Injection Attacks | |
| https://www.glassdoor.com/Reviews/* | Explore companies features. Focus Area: Injection Attacks | |
| https://www.glassdoor.com/Compare/* | Company comparison tool. Focus Area: Injection Attacks | |
| https://www.glassdoor.com/mz-survey/* | Company review survey. Focus Area: Injection Attacks | |
| https://www.glassdoor.com/Salaries/* | Salary Discovery tool. Focus Area: Injection Attacks |
By participating in Glassdoor’s Bug Bounty program (the “Program”), you acknowledge that you have read and agree to Glassdoor’s Terms of Use as well as the following:
Thank you for helping keep Glassdoor and our users safe!