Atlassian

  • Points – $5,000 per vulnerability
  • Managed by Bugcrowd

Program stats

289 vulnerabilities rewarded

Validation within 12 days
75% of submissions are accepted or rejected within 12 days

$823.13 average payout (last 3 months)

Latest hall of famers

Recently joined this program

638 total

Tools for teams, from startup to enterprise. Atlassian provides the tools to help every team unleash their full potential.

Get Started (tl;dr version)

  • Do not access, impact, destroy or otherwise negatively impact Atlassian customers, or customer data in anyway.
  • Ensure that you use your @bugcrowdninja.com email address.
  • Bounties are awarded differently per product (see below for more details on payouts).
  • Ensure you understand the targets, scopes, exclusions, and rules below.

Quick Links

Focus Areas

Due to the collaborative nature of Atlassian products, we are not interested in vulnerabilities surrounding enumeration and information gathering (being able to work effectively as a team is the purpose of our products). Instead, we're more interested in traditional web application vulnerabilities, as well as other vulnerabilities that can have a direct impact to our products. Below is a list of some of the vulnerability classes that we are seeking reports for:

  • Cross Instance Data Leakage/Access**
  • Server-side Remote Code Execution (RCE)
  • Server-Side Request Forgery (SSRF)
  • Stored/Reflected Cross-site Scripting (XSS)
  • Cross-site Request Forgery (CSRF)
  • SQL Injection (SQLi)
  • XML External Entity Attacks (XXE)
  • Access Control Vulnerabilities (Insecure Direct Object Reference issues, etc)
  • Path/Directory Traversal Issues

Ensure you review the out of scope and exclusions list for further details.

** Cross Instance Data Leakage/Access refers to unauthorized data access between instances.

Targets

In scope

Target name Type
JIRA (bugbounty-test-<bugcrowd-name>.atlassian.net) Website
JIRA Service Desk (bugbounty-test-<bugcrowd-name>.atlassian.net) Website
Confluence (bugbounty-test-<bugcrowd-name>.atlassian.net/wiki) Website
Stride (bugbounty-test-<bugcrowd-name>.atlassian.net) Other
https://stride.video/<your-video> Website
https://bitbucket.org/ Website
Bitbucket Pipelines (https://bitbucket.org/product/features/pipelines) Website
SourceTree (https://www.sourcetreeapp.com/) Other
Any associated *.atlassian.io or *.atl-paas.net domain that can be exploited DIRECTLY from the *.atlassian.net instance Other
JIRA Core Other
JIRA Software Other
JIRA Service Desk Other
Confluence Other
Bitbucket Server Other
Bamboo Other
Crowd Other
FishEye Other
Crucible Other
HipChat Data Center Other
Jira Cloud Mobile App for iOS iOS
Jira Cloud Mobile App for Android Android
Confluence Cloud Mobile App for iOS iOS
Confluence Cloud Mobile App for Android Android
Stride Mobile Application for iOS iOS
Stride Mobile Application for Android Android
HipChat Mobile Client Other
Stride Desktop Client Other
HipChat Desktop Client Other
Jira Portfolio Other
Confluence Team Calendars (https://www.atlassian.com/software/confluence/team-calendars) Website
Confluence Questions Other
Other - (all other Atlassian targets) Other
https://admin.atlassian.com/atlassian-access Website

Out of scope

Target name Type
Any repository that you are not an owner of - do not impact Atlassian customers in any way. Website
https://blog.bitbucket.org Website
Any internal or development services. Website
bytebucket.org Website
Third party add-ons from the marketplace are strictly excluded (vulnerabilities that exist within third party apps in any way) - we will pass on any vulnerabilities found, however they will not be eligible for bounty. Website
*.bitbucket.io Website

Rules, Exclusions, and Scopes

Any domain/property of Atlassian not listed in the targets section is strictly out of scope (for more information please see the out of scope and exclusions sections below). Researchers should use the "bugbounty-test-<bugcrowd-name>.atlassian.net" namespace provided in the instructions below. Please do not create additional instances outside of this namespace for testing.

All resources within your instance is in scope (see below for exclusions), this includes the all of the REST APIs and any *.atlassian.io or *.atl-paas.net service that can be exploited from an in scope product.

Applications Eligible for Tier 1 Rewards (See 'Rewards' Section)

  • Jira Cloud (including Jira Ops, Jira Software and Jira Core)
  • Jira Service Desk Cloud
  • Confluence Cloud
  • Bitbucket.org
  • Jira Server (Software and Core)
  • Jira Service Desk Server
  • Confluence Server
  • BitBucket Server
  • Crowd

Applications Eligible for Tier 2 Rewards (See 'Rewards' Section)

  • Bitbucket Pipelines
  • Crucible
  • FishEye
  • Bamboo
  • Admin Hub (https://admin.atlassian.com/atlassian-access)
  • Atlassian Developer (https://developer.atlassian.com)
  • Any associated *.atlassian.io or *.atl-paas.net domain that can be exploited DIRECTLY from your *.atlassian.net instance

Applications Eligible for Tier 3 Rewards (See 'Rewards' Section)

  • Confluence Cloud Mobile Apps (for iOS and Android)
  • Jira Cloud Mobile Apps (for iOS and Android)
  • Jira Portfolio
  • Confluence Team Calendars
  • Confluence Questions
  • SourceTree (for macOS and Windows)
  • HipChat Data Center
  • HipChat Mobile Client
  • HipChat Desktop Client
  • Stride

Creating Your Instance

JIRA + Confluence Cloud
To access the instance and start your testing (after you've read and understood the scope and exclusions listed below, of course) you can follow the below steps:

  • Navigate to the checkout page here
  • Click "Next"
  • Complete the form, using the following format: bugbounty-test-<bugcrowd-name> Note that <bugcrowd-name> should be replaced with your own bugcrowd username
  • Click "Start now"
  • Once your instance has been completed that's it - you can test away.

Bitbucket

  1. Navigate to https://bitbucket.org/ and select "Log In"
  2. Select "Sign Up" and create an account with your @bugcrowdninja.com email address.
  3. Start testing

Stride Access

  1. Navigate to https://signup.stride.com
  2. Sign up with an account using your @bugcrowdninja.com email address
  3. Verify your account (If you haven't done so already)
  4. Click, Create a new team
  5. Name your stride bounty instance using the following naming convention: bounty-test-<name>.atlassian.net
  6. Click, Create my team
  7. Start testing Stride.

All Atlassian Server Products
To access the target and start your testing (after you've read and understood the scope and exclusions listed below, of course) you can follow the below steps:

  1. Navigate to www.atlassian.com
  2. Download the server version of the product you want to test,
  3. Install the product,
  4. (if required) Generate a trial license for the product,
  5. Start testing

Note: After the trial period expires you can generate another evaluation license and continue researching. Please remember to check that you are still on the latest version.

Mobile Targets

Jira Cloud Download:
iOS: Here
Android: Here

Confluence Cloud Download:
iOS: Here
Android: Here

Stride Download:
iOS: Here
Android: Here

Out-of-Scope

Anything not declared as a target or in scope above should be considered out of scope for the purposes of this bug bounty. However to help avoid gray areas, below are examples of what is considered out of scope.

  • Any Atlassian website (e.g. www.atlassian.com) is out of scope for this bounty unless it is directly accessible from one of the targets or any associated services attached to the instance.
  • Customer cloud instances and data are explicitly out of scope.
  • Any repository that you are not an owner of - do not impact Atlassian customers in any way.
  • Any Atlassian billing system. However, specific endpoints that are used inside of a target are in scope. For example, if a REST endpoint is proven to be called from one of the targets, then that endpoint is considered to be in scope. However, all other endpoints are not considered to be in scope, as they are not called from the instance at any stage.
  • Only the latest version of a server product is eligible for a reward. All vulnerabilities/exploits must be proven to work in the latest version of the Atlassian server product.
  • Any internal or development services
  • Third party add-ons/integrations others than those listed in the targets from the marketplace are strictly excluded (vulnerabilities that exist within third-party apps in any way) - we will pass on any vulnerabilities found, however, they will not be eligible for a bounty.

The following finding types are specifically excluded from the bounty

  • The use of Automated scanners is strictly prohibited (we have these tools too - don't even think about using them)
  • Descriptive error messages (e.g. Stack Traces, application or server errors).
  • HTTP 404 codes/pages or other HTTP non-200 codes/pages.
  • Fingerprinting / banner disclosure on common/public services.
  • Disclosure of known public files or directories, (e.g. robots.txt).
  • Clickjacking and issues only exploitable through clickjacking.
  • CSRF on forms that are available to anonymous users (e.g. the contact form).
    • CSRF attacks that require knowledge of the CSRF token (e.g. attacks involving a local machine).
  • Logout Cross-Site Request Forgery (logout CSRF).
  • Content Spoofing.
  • Presence of application or web browser ‘autocomplete’ or ‘save password’ functionality.
  • Lack of Secure/HTTPOnly flags on non-sensitive Cookies.
  • Lack of Security Speedbump when leaving the site.
  • Weak Captcha / Captcha Bypass.
  • Login or Forgot Password page brute force and account lockout not enforced.
  • OPTIONS HTTP method enabled.
  • Username / email enumeration.
  • Missing HTTP security headers, specifically (https://www.owasp.org/index.php/List_of_useful_HTTP_headers), e.g.
    • Strict-Transport-Security.
    • X-Frame-Options.
    • X-XSS-Protection.
    • X-Content-Type-Options.
    • Content-Security-Policy, X-Content-Security-Policy, X-WebKit-CSP.
    • Content-Security-Policy-Report-Only.
    • Cache-Control and Pragma
  • HTTP/DNS cache poisoning.
  • SSL/TLS Issues, e.g.
    • SSL Attacks such as BEAST, BREACH, Renegotiation attack.
    • SSL Forward secrecy not enabled.
    • SSL weak/insecure cipher suites.
  • No Load testing (DoS/DDoS etc) is allowed on the instance.
    • This includes application DoS as well as network DoS.
  • Self-XSS reports will not be accepted.
    • Similarly, any XSS where local access is required (i.e. User-Agent Header injection) will not be accepted. The only exception will be if you can show a working off-path MiTM attack that will allow for the XSS to trigger.
  • Vulnerabilities that are limited to unsupported browsers will not be accepted (i.e. "this exploit only works in IE6/IE7"). A list of supported browsers can be found here.
  • Known vulnerabilities in used libraries, or the reports that an Atlassian product uses an outdated third party library (e.g. jQuery, Apache HttpComponents etc) unless you can prove exploitability.
  • Missing or incorrect SPF records of any kind.
  • Source code disclosure vulnerabilities.
  • Information disclosure of non-confidential information (e. g. issue id, project id, commit hashes).
  • The ability to upload/download viruses or malicious files to the platform.
  • Email bombing/Flooding/rate limiting

Rules

  • You must ensure that customer data is not affected in any way as a result of your testing. Please ensure you're being non-destructive whilst testing and are only testing on instances that you own.
  • In addition to above, customer instances are not to be accessed in any way (i.e. no customer data is accessed, customer credentials are not to be used or "verified")
    • If you believe you have found sensitive customer data (e.g., login credentials, API keys etc) or a way to access customer data (i.e. through a vulnerability) report it, but do not attempt to successfully validate if/that it works.
  • Use of any automated tools/scanners is strictly prohibited and will lead to you being removed from the program (trust us, we have those tools too).
  • Reports need to be submitted in plain text (associated pictures/videos are fine as long as they're in standard formats). Non-plain text reports (e.g. PDF, DOCX) will be asked to be resubmitted in plain text.
  • Grants/awards are at the discretion of Atlassian and we withhold the right to grant, modify or deny grants. But we'll be fair about it.
  • Tax implications of any payouts are the sole responsibility of the reporter.
  • Do NOT conduct non-technical attacks such as social engineering, phishing or unauthorized access to infrastructure.
  • Do NOT test the physical security of Atlassian offices, employees, equipment, etc.
  • This bounty follows Bugcrowd’s standard disclosure terms.
  • Any vulnerability found in a JIRA or Confluence server product is not eligible for a reward in JIRA/Confluence cloud, and vice versa (i.e. no double dipping).

Public Disclosure

Before disclosing an issue publicly we require that you first request permission from us. Atlassian will process requests for public disclosure on a per report basis. Requests to publicly disclose an issue that has not yet been fixed for customers will be rejected. Any researcher found publicly disclosing reported vulnerabilities without Atlassian's written consent will have any allocated bounty withdrawn and disqualified from the program.

Rewards:

Category Tier 1 Tier 2 Tier 3
P1 Up to $5,000 Up to $3,000 Up to $1,500
P2 Up to $1,800 Up to $900 Up to $900
P3 Up to $600 Up to $300 Up to $300
P4 Up to $200 Up to $100 Up to $100

Any finding that is not listed in the above tiers can still be reported via this program. These reports will be rewarded as kudos only reports - any payout is at the discretion of the Atlassian Security Team.

Note: Atlassian uses CVSS to consistently score security vulnerabilities. Where discrepancies between the VRT and CVSS score exist, Atlassian will defer to the CVSS score to determine the priority.

Program rules

This program follows Bugcrowd’s standard disclosure terms.

This program does not offer financial or point-based rewards for P5 — Informational findings. Learn more about Bugcrowd’s VRT.