
Vimeo
External Program
Submit bugs directly to this organization
#Vimeo's Bug Bounty Program Policy
Vimeo engineers are committed to ensuring the safety and security of our site and users. We greatly respect the work of security experts and strive to stay up-to-date with the latest security techniques. However, we acknowledge that no system is infallible. If you identify a security vulnerability in one of our products, we encourage you to report it to us.
Before submitting a report, please review our guidelines below to understand what constitutes a security vulnerability and our preferred reporting methods. We are committed to evaluating and resolving all valid bugs promptly after a report is filed.
Bounties are awarded based on merit at our discretion.
Vimeo is a platform for video creation, hosting, sharing, and streaming, with features like a Video Player, Live Streaming, and Vimeo OTT. We have many similarities to YouTube, but our revenue model is completely different (eg. our videos are ad-free, we charge content creators, etc.).
Our company has 6 different components:
Please note that, previously, Vhx, Magisto, and Livestream each had their own separate bug bounty programs within HackerOne. We have now merged those three programs into the main Vimeo program.
#Rules
Requirements for your submission to be eligible for a bounty reward:
Suggestions to ensure fast processing and maximum bounty:
.mp4, .mov, .webm, etc, but not .avi).Your report does not necessarily need to include a full exploit. Did you come across a spicy bug that has a good impact, but you’re missing one or two pieces needed to complete the exploit? Send it our way, we’d be happy to take a look and might even consider it without it being fully complete.
#Rules for us Vimeo and HackerOne will make their best efforts to meet the following SLAs for hackers participating in our program:
#Triage and Payout Process Vimeo is a HackerOne-managed program. HackerOne currently has a commitment to complete initial triage within 2 days after you submit your report. Once they finish the initial triage, they will pass the report back to Vimeo so that we may conduct the final triage. Items in the Triaged state alone will NOT be considered accepted until Vimeo makes a final decision, which we will signify with a full bounty payout.
Please be aware that, even if the HackerOne team has triaged a ticket, the Vimeo team may potentially close the ticket at any time with no payout, eg. if we discover that it is a duplicate or if we decide not to fix the issue. Further note that if the report is a duplicate, we may potentially not provide any links to the original ticket, especially if the original reporter would prefer that their report be kept private or if the original ticket exists within our internal ticketing system.
Basic Vimeo accounts are free, but Vimeo offers additional features to our customers via our paid plans. We’d like to give our bug bounty researchers access to these paid plans free of charge so that they may test all the extra functionality that is available only in those plans.
To be eligible for a paid account, you must meet at least one of the following qualifications:
| Plan Tier | Access Period | Qualification Criteria |
|---|---|---|
| Advanced ( standard or starter) | 180 Days | 2 Medium or 1 High severity submissions |
Note: The plan will be activated only on a 2 HackerOne alias account. If you believe you have met the criteria, please submit the form and await our response. Form link : https://forms.gle/88UEMuwVKfyuGpeVA
#Qualifying vulnerabilities (in-scope) Please take the time to provide a clear proof of concept that shows how a particular vulnerability is exploitable. You must be able to reproduce the issue on request with your account(s). Use the following table to categorize security issues.
However, note that your report does not necessarily need to include a full exploit. Did you come across a spicy bug that has a good impact, but you’re missing one or two pieces needed to complete the exploit? Send it our way — we’d be happy to take a look and might even consider it without it being fully complete.
Note: Non-listed vulnerabilities may also be eligible. Some vulnerability types may fall under a variety of severity ratings determined by the scope/scale of exploitation and impact.
| Severity (Minimum) | Severity (Maximum) | Vulnerability Type | Bug Examples |
|---|---|---|---|
| Critical | Critical | OS Shell Execution | Remote Code Execution; Code Injection; OS Command Injection |
| Medium | Critical | SQL Injection | SQL Injection (Inband SQLi; Blind SQLi) |
| Medium | Critical | Server-Side Request Forgery | SSRF (unrestricted); Content-Restricted SSRF; Error-based SSRF (true/false); Blind SSRF |
| Medium | Critical | Improper Restriction of XML External Entity Reference | XXE |
| Medium | Critical | Uncontrolled Format String | Insecure Deserialisation |
| Medium | High | Inconsistent Interpretation of HTTP Requests | HTTP Request Smuggling |
| Medium | High | Cross-Site Scripting | Different type of XSS |
| Low | Medium | Download of Code Without Integrity Check | S3 Bucket Upload |
| Low | Critical | Incorrect Authorization | Authorization Bypass; Account Takeover |
| Low | Critical | Information Exposure | Exposure of PII; Credentials on GitHub; Confidential Information Exposure |
| Low | Critical | Missing Authentication for Critical Function | Exposed Administrative Interface |
| Low | Critical | Inclusion of Functionality from Untrusted Control Sphere | Server Side Includes Injection; Local File Inclusion; Directory Traversal |
| Low | Critical | Incorrect Permission Assignment | IDOR; Horizontal Privilege Escalation; Vertical Privilege Escalation |
| Low | High | Cross-Site Request Forgery | State-Changing CSRF; Non-State-Changing CSRF |
| Low | High | Misconfiguration | Subdomain Takeover; Dangling DNS Record |
| Low | Medium | CRLF Injection | CRLF Injection |
We recommend that researchers prioritize their efforts on the core features provided within our upgrade plans. You can find more information about these features at the following links:
customername.vhx.tv).
#Disclosure Policy Vimeo understands that disclosure helps the infosec community and strengthens your professional reputation.
###Rules
###How to request permission Please request permission for disclosure by commenting on the report within HackerOne, and we’ll kick off an internal disclosure process promptly.
###Restrictions
Should a researcher break any disclosure or program policies, that researcher shall no longer be protected under Safe Harbor and will be subject to legal action at our discretion. Furthermore, failure to comply with these rules may result in a program ban for all company properties.
In addition to these rules, please also follow HackerOne's disclosure guidelines
Thank you for helping Vimeo, Inc. and its subsidiaries (“Vimeo”). Vimeo provides this Safe Harbor Statement to encourage and facilitate research using HackerOne’s bug bounty program to help us identify bugs and vulnerabilities.
We authorize access to our owned-and-operated systems, services, and applications for the purpose of conducting research consistent with HackerOne’s then-current policies. We will not consider your good faith activities in this regard to violate applicable criminal or civil laws (even if those activities inadvertently exceed the scope of our authorization), such as the Digital Millennium Copyright Act or Computer Fraud and Abuse Act, and we will not commence legal action with respect to such activities.
If legal action is commenced against you as a result of your good faith activities, Vimeo will take steps to make it known to parties commencing such action that your activities were conducted in accordance with this Safe Harbor Statement.
To the extent that our applicable online terms of service are inconsistent with this Safe Harbor Statement, then this Safe Harbor Statement shall control.
Please note that this Safe Harbor Statement does not extend to systems, services, and applications that we do not control.
We encourage you to contact us if you have questions regarding the scope of this Safe Harbor Statement. You may do so through HackerOne or by emailing us at [email protected].
Thanks for helping us fight the good fight!