Vulnerability Detection

Vulnerability Detection Policy

If you have information related to security vulnerabilities of IbisLink, we want to hear from you. Please submit a report in accordance with the guidelines below. We value the positive impact of your work and thank you in advance for your contribution.

Guidelines

IbisLink agrees to not pursue claims against researchers related to the disclosures submitted through this website who:

  • do not cause harm to IbisLink, our customers, or others;
  • provide a detailed summary of the vulnerability, including the target, steps, tools, and artifacts used during discovery (the detailed summary will allow us to reproduce the vulnerability);
  • do not compromise the privacy or safety of our customers and the operation of our services;
  • do not violate any law or regulation;
  • publicly disclose vulnerability details only after IbisLink confirms completed remediation of the vulnerability and not publicly disclose vulnerability details if there is no completion date or completion cannot be ascertained;
  • confirm that they are not currently located in or otherwise ordinarily resident in Cuba, Iran, North Korea, Sudan, Syria or Crimea;

Out of Scope

  1. Reports from automated tools or scans
  2. Issues without clearly identified security impact (such as clickjacking on a static website), missing security headers, or descriptive error messages
  3. Missing best practices, information disclosures, use of a known-vulnerable libraries or descriptive / verbose / unique error pages (without substantive information indicating exploitability)
  4. Speculative reports about theoretical damage without concrete evidence or some substantive information indicating exploitability
  5. Forms missing CSRF tokens without evidence of the actual CSRF vulnerability
  6. Self-exploitation (e.g., cookie reuse)
  7. Reports of insecure SSL / TLS ciphers (unless you have a working proof of concept, and not just a report from a scanner such as SSL Labs)
  8. Password complexity requirements, account/e-mail enumeration, or any report that discusses how you can learn whether a given username or email address has an IbisLink-related account
  9. Missing security-related HTTP headers which do not lead directly to a vulnerability
  10. Cross-site Scripting vulnerabilities without evidence on how the vulnerability can be used to attack another user
  11. Social engineering of IbisLink's employees or contractors
  12. Presence of autocomplete attribute on web forms
  13. Missing secure cookie flags on non-sensitive cookies
  14. Denial of Service Attacks
  15. Banner identification issues (e.g., identifying what web server version is used)
  16. Open ports which do not lead directly to a vulnerability
  17. Open redirect vulnerabilities
  18. Publicly accessible login panels
  19. Clickjacking
  20. Content spoofing / text injection

In order to submit your vulnerability findings report please contact us at security at ibislink dot com. By contacting us, you consent to your information being transferred to and stored in the United States and acknowledge that you have read and accepted the Terms of Use and Privacy policy of IbisLink.