Sky Italy Vulnerability Disclosure Program
With 24 million customers across six countries, Sky is Europe's leading media and entertainment company and is proud to be part of the Comcast group. Our 32,000 employees help connect our customers to the very best entertainment, sports, news, arts and to our own local, original content.
No technology is perfect and Sky believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. We are excited for you to participate as a security researcher to help us identify vulnerabilities in our web applications. Good luck, and happy hunting!
Ratings/Rewards
For the initial prioritization/rating of findings, this engagement will use the Bugcrowd Vulnerability Rating Taxonomy. However, it is important to note that in some cases a vulnerability priority will be modified due to its likelihood or impact. In any instance where an issue is downgraded, a full, detailed explanation will be provided to the researcher - along with the opportunity to appeal, and make a case for a higher priority.
Payment Rewards
P1: $500 – $1000
Scope
In Scope
All internet facing Sky Italy assets
Out of Scope
Subscriber IP Ranges/Hostnames:
The following IPs belong to our subscribers and are managed on their end. These are explicitly set as out of scope and not to be tested, even if the hostnames resolve to .sky.
- *skybroadband.com
- *skybet.com
- *skynewsarabia.com
- *skynews.com.au
- *safetytraining.sky.it
Other In-Scope Regions (Out of Scope for this engagement):
- All internet facing Sky UK/ROI assets
- All internet facing Sky DACH assets
Testing is only authorised on the targets listed as in scope. Any domain/property of Sky Group not listed in the targets section is out of scope. This includes any/all subdomains not listed above. If you happen to identify a security vulnerability on a target that is not in scope, but it demonstrably belongs to Sky Group, you can report it to this engagement. However, be aware that it is ineligible for rewards or points-based compensation.
Out-of-Scope Sky Subsidiaries
- NBCUniversal (Please report all NBCU findings directly to [email protected])
- Comcast
- Sky UK/ROI (Please report all Sky Italy findings directly to the Sky UK/ROI VDP programme)
- Sky DACH (Please report all Sky Italy findings directly to the Sky DACH VDP programme)
- Vulnerabilities in the following IP addresses: See attached Sky Excluded IPs.xlsx
Out-of-Scope Submission Types
- 3rd party endpoints
- 3rd party Sky Brand licensing
- Marketing/Analytics endpoints
- Server security misconfigurations with no impact (ex. Exposed instances with no sensitive data present)
- Email spoofing issues (e.g., SPF, DKIM, DMARC)
- Automated scan reports or search engine results (ie, Shodan) without valid proof of concept
- Cross-Site Request Forgery (CSRF) on unauthenticated forms or forms with no sensitive actions
- Comma Separated Values (CSV) injection without demonstrating a vulnerability
- Open redirect - unless an additional security impact can be demonstrated
- Self-Client-side injection (XSS, Angular, Vue, HTML...) and any XSS that requires Flash. Flash is disabled by default in most modern browsers, thus significantly reducing the attack surface and associated risk
- CORS without exploitation
- XSS due to Swagger-UI (accepted but not eligible for bounty, considered P5 Informational)
- Exposed credentials that are either no longer valid, or do not pose a risk to an in-scope asset
- Exposure of API keys with no security impact, or where the only impact is exhausting of API quotas
- Vulnerabilities only affecting users of outdated or unpatched browsers
- Descriptive error messages (e.g., Stack Traces, application, or server errors) without proof of vulnerability or risk
- Submissions for 3rd party code where Sky Group is not responsible for the code
- SSL/TLS protocol scan reports reporting purported vulnerable protocol versions or handshakes
- Missing best practices in Content Security Policy, HttpOnly or Secure flags on cookies
Out-of-Scope Activity Types
- Load Testing (DoS, DDoS, wireless jamming, etc.)
- Clickjacking on pages with no sensitive actions
- Banner Grabbing, Scanner Outputs, Password Complexity, User Enumeration, Software version disclosure, Descriptive error messages or headers (e.g. stack traces, application or server errors)
- Tabnabbing
- Content spoofing and text injection issues without showing an attack vector/without being able to modify HTML/CSS
- Account lockout, login, or forgot password page brute force
- Rate limiting issues on non-authentication endpoints/Anti-Automation
- Attacks requiring MITM or physical access to a user's device
- Publicly accessible login panels unless proven security Impact
- Any activity that could disrupt our service (DoS), including but not limited to inundating support services with invalid requests
- Customer leaked credentials found in Darkweb or any OSINT tools
- Social engineering attacks, including those targeting or impersonating internal employees by any means (e.g. customer service chat features, social media, personal domains, etc.)
- Protocol-specific flaws and open ports or services without an accompanying proof-of-concept demonstrating a vulnerability
- Theoretical security issues without any POC
Hardware Out Of Scope
- Physical tampering of the device (I/O devices such as USB, SIM, and SD card slots are in scope)
- Submissions that require an attacker to physically open the case, including removing screws or breaking plastic casing (open chassis) to gain access to the internal hardware of a device
- Vulnerabilities in pre-release product versions (e.g., Beta, Release candidate)
- Vulnerabilities in product versions no longer under active support
- Vulnerabilities already known to Sky Group. However, if you are the first external security researcher to identify and report a previously known vulnerability, you may still be eligible for a bounty award
Eligibility
Researchers are not eligible if they:
- Are a current employee of Sky Group or its affiliates or subsidiaries
- Are an employee who has left Sky Group or its affiliates or subsidiaries within the past 12 months
- Submit findings that utilise third-party websites or tools for cracking or validating secrets, passwords, keys or tokens
Access/Traffic Identification
IP Address
Please provide your IP address in the report while submitting P1/P2 findings.
Custom User-Agent Header
Please add the following header to your HTTP traffic to prevent interruptions and verify non-malicious behaviour:
X-Bug-Bounty:<bugcrowdusername>
N-day/Third Party 0-day Policy
When N-Day bugs are released to the public, we will consider them as in scope after 30 days have gone by.
Example: N-day released on 01/01/2024, we would consider it in-scope on 01/31/2024
Stolen/Breached Credentials
If you happen to identify vulnerabilities involving data that has been exposed or leaked such as dark web forums or leaked credential sites, you can report it to this engagement. However, be aware that it is only eligible for points-based compensation. This policy helps maintain the highest standard of operational confidentiality, integrity, and compliance.
Credentials
To gain access to the application, please sign up for an account using your @bugcrowdninja.com email address.
Safe Harbor
When conducting vulnerability research according to this policy, we consider this research to be:
- Authorized in accordance with the Computer Fraud and Abuse Act (CFAA) (and/or similar state laws), and we will not initiate or support legal action against you for accidental, good faith violations of this policy
- Exempt from the Digital Millennium Copyright Act (DMCA), and we will not bring a claim against you for circumvention of technology controls
- Exempt from restrictions in our Terms & Conditions that would interfere with conducting security research, and we waive those restrictions on a limited basis for work done under this policy
- Lawful, helpful to the overall security of the Internet, and conducted in good faith
You are expected, as always, to comply with all applicable laws.
If at any time you have concerns or are uncertain whether your security research is consistent with this policy, please inquire before going any further.