OMEN
12-15-2010, 10:54 PM
IDG News Service - Mozilla has expanded the scope of its vulnerability reward program and will now pay out for problems found within applications used across its Web sites.
Researchers could earn between $500 and $3,000 for finding a vulnerability in one of Mozilla's Web properties, depending on the severity of the flaw. Mozilla wants researchers to track down coding errors such as cross-site scripting flaws and cross-site request forgery problems. Denial-of-service bugs won't be considered since those often do not involve a technical vulnerability within a web application, Mozilla said.
"We want to encourage the discovery of security issues within our web applications with the goal of keeping our users safe," Mozilla said on its security blog. "We also want to reward security researchers for their efforts with the hope of furthering constructive security research."
Researchers should not use automated tools on the sites to find the problems, Mozilla said, as that could affect its ability to keep the sites running properly. Instead, it encouraged researchers to download the open source code for its web applications to examine the code for problems and attack the software on their own servers.
In July, Mozilla upped the reward for finding bugs in its client applications from $500 to a maximum of $3,000. The organization said it felt the need to increase the maximum bounty to ensure it was economically sustainable for people to do the research.
At the time, the program applied only to the Firefox browser, Thunderbird e-mail client, the Firefox mobile browser and other services the products rely on. Mozilla published a list of its websites that now qualify for the program, but said others will be considered, depending on the flaw. Those that definitely qualify are:
* bugzilla.mozilla.org
* .services.mozilla.com
* getpersonas.com
* aus.mozilla.org
* www.mozilla.com/org
* www.firefox.com
* www.getfirefox.com
* addons.mozilla.org
* services.addons.mozilla.org
* versioncheck.addons.mozilla.org
* pfs.mozilla.org
* download.mozilla.org
Researchers could earn between $500 and $3,000 for finding a vulnerability in one of Mozilla's Web properties, depending on the severity of the flaw. Mozilla wants researchers to track down coding errors such as cross-site scripting flaws and cross-site request forgery problems. Denial-of-service bugs won't be considered since those often do not involve a technical vulnerability within a web application, Mozilla said.
"We want to encourage the discovery of security issues within our web applications with the goal of keeping our users safe," Mozilla said on its security blog. "We also want to reward security researchers for their efforts with the hope of furthering constructive security research."
Researchers should not use automated tools on the sites to find the problems, Mozilla said, as that could affect its ability to keep the sites running properly. Instead, it encouraged researchers to download the open source code for its web applications to examine the code for problems and attack the software on their own servers.
In July, Mozilla upped the reward for finding bugs in its client applications from $500 to a maximum of $3,000. The organization said it felt the need to increase the maximum bounty to ensure it was economically sustainable for people to do the research.
At the time, the program applied only to the Firefox browser, Thunderbird e-mail client, the Firefox mobile browser and other services the products rely on. Mozilla published a list of its websites that now qualify for the program, but said others will be considered, depending on the flaw. Those that definitely qualify are:
* bugzilla.mozilla.org
* .services.mozilla.com
* getpersonas.com
* aus.mozilla.org
* www.mozilla.com/org
* www.firefox.com
* www.getfirefox.com
* addons.mozilla.org
* services.addons.mozilla.org
* versioncheck.addons.mozilla.org
* pfs.mozilla.org
* download.mozilla.org