avatar
Bug bounty
Public

Santé Publique France Bug Bounty Program

Agence nationale de Santé publique France

Reward

Bounty
€50
Low
€50
Medium
€300
High
€700
Critical
€1,500

Program

Avg reward
-
Max reward
-
Scopes
9

Supported languages
English
French

Hacktivity

Reports
34
1st response
< 1 day
Reports last 24h
2
Reports last week
5
Reports this month
34

Santé publique France

Santé publique France is the national public health agency.

Created in May 2016 by ordinance and decree, it is a public administrative establishment under the supervision of the Ministry of Health. Our mission: to improve and protect the health of populations. This mission revolves around three major axes: anticipate, understand and act.

This program concerns all the public sites of Santé publique France with a strong image risk.

The scopes of our programs are detailed further below, but here is a quick explanation of the services available on the urls listed :

  • institutional web sites
  • health prevention web sites

Program Rules

For the health prevention platform Mangerbouger, you can create accounts with @yeswehack.ninja https://yeswehack.com/user/tools/email-alias

For the health prevention platform TabacInfoService, you can create accounts with @yeswehack.ninja https://yeswehack.com/user/tools/email-alias

We believe that no technology is perfect and that working with skilled security researchers is crucial in identifying weaknesses in our technology.
If you believe you've found a security bug in our service, we are happy to work with you to resolve the issue promptly and ensure you are fairly rewarded for your discovery.
Any type of denial-of-service attacks is strictly forbidden, as well as any interference with network equipment and our infrastructure.

Reward Eligibility and Testing precautions

We are happy to thank everyone who submits valid reports which help us improve the security of Santé publique France however, only those that meet the following eligibility requirements may receive a monetary reward:

  • You must be the first reporter of a vulnerability.
  • The vulnerability must be a qualifying vulnerability (see below)
  • Any vulnerability found must be reported no later than 24 hours after discovery and exclusively through yeswehack.com
  • You must send a clear textual description of the report along with steps to reproduce the issue, include attachments such as screenshots or proof of concept code as necessary.
  • You must avoid tests that could cause degradation or interruption of our service (refrain from using automated tools, and limit yourself about requests per second).
  • You must not leak, manipulate, or destroy any user data.
  • You must not be a former or current employee of Santé publique France or one of its contractors. Reports about vulnerabilities are examined by our security analysts.
  • Our analysis is always based on worst case exploitation of the vulnerability, as is the reward we pay. No vulnerability disclosure, including partial is allowed for the moment.
  • Do not modify the data of our production environment. Restrict your tests to the PPROD environment when testing data integrity.

Notes on Vulnerabilities (for tests on the production environment)

  • You must avoid tests that could cause degradation or interruption of our service (refrain from using automated tools, and limit yourself about 30 requests per second).
  • To demonstrate impact on RCE/SQLi/SSRF, please only use the permitted commands listed here below in your PoC. If we would like you to go further, we will mention it directly on your report
  • RCE : id / whoami / hostname / ifconfig
  • SQLi : send us the version and/or the database diagram
  • SSRF : content page or specific behavior
  • Subdomain takeover without interaction on a production environment will be considered as max CVSS High
    Example: A subdomain takeover can be used to perform an external resource hijacking (JavaScript file for example) which will be loaded on another domain, no interaction is needed by victim user to execute this malicious JS.
  • Subdomain takeover with interaction on a production environment will be considered as max CVSS Medium
    Example: A subdomain takeover can be performed but it's only visible if a victim user visits this domain.
  • Subdomain takeover, DNS dangling, Cache Poisoning...: If you find multiple similar issues across multiple scopes at the same time, we recommend submitting all the affected assets in a single report. We will, on a case-to-case basis, consider increasing the bounty amount accordingly.
  • Discovered vulnerabilities must not have any impact on other users' activities, or modify the application. E.g.: stored XSS should use console.log() instead of the usual alert(), confirm(), prompt()

Reports of leaks and exposed credentials

We are open to some types of reports related to exposed secrets, credentials or information.
Please pay attention to our list of Qualifying/Non-Qualifying vulnerabilities, as well as our Scope and the following rules.

In order not to encourage dark and grey economies, in particular the purchase, resale and trade of identifiers or stolen information, as well as all types of dangerous behavior (e.g. social engineering, ...), we will not accept or reward any report based on information whose source is not the result of failure on the part of our organization or one of our employees/service providers

Eligible reports

Reports of exposed secrets, credentials and sensitive information will be considered eligible if it complies with the following:

  • The source of exposure/leak is under MyCompany’s control, directly or indirectly.

e.g. stolen information or bundled information from a random source is not eligible.

  • The exposed information has been verified (or tested) and confirmed

If you identify a source (under our control) that is leaking multiple data, we kindly ask you to report it in a single report and we will consider the impact based on the nature and depth of the exposed data.

To summarize our policy, you may refer to this table :

Source of leak is in-scope Source of leak belongs to MyCompany but is out-of-scope Source of leak does not belong to MyCompany and is out-of-scope
Impact is in-scope (e.g. valid credentials on an in-scope asset) Eligible Eligible Not Eligible
Impact is out-of-scope (e.g. valid credentials for an out-of-scope asset) Eligible Not Eligible Not Eligible

Important precautions and limitations

As a complement to the Program’s rules and testing policy :

  • DO NOT alter compromised accounts by creating, deleting or modifying any data
  • DO NOT use compromised accounts to search for post-auth vulnerabilities (they won’t be eligible anyway)
  • DO NOT include Personally Identifiable Information (PII) in your report and please REDACT/OBFUSCATE the PII that is part of your PoC (screenshot, server response, JSON file, etc.) as much as possible.

In case of exposed credentials or secrets, limit yourself to verifying the credentials validity
In case of sensitive information leak, DO NOT extract/copy every document or data that is exposed and limit yourself to describe and list what is exposed.


Reward

Asset value CVSS
Low
CVSS
Medium
CVSS
High
CVSS
Critical
Low
€50€300€700€1,500

Scopes

ScopeTypeAsset value
www.onsexprime.fr Web application
Low
Low
€50
Medium
€300
High
€700
Critical
€1,500
www.1000-premiers-jours.fr Web application
Low
Low
€50
Medium
€300
High
€700
Critical
€1,500
mangerbouger.fr Web application
Low
Low
€50
Medium
€300
High
€700
Critical
€1,500
sso.mangerbouger.fr API
Low
Low
€50
Medium
€300
High
€700
Critical
€1,500
questionsexualite.fr Web application
Low
Low
€50
Medium
€300
High
€700
Critical
€1,500
vaccination-info-service.fr Web application
Low
Low
€50
Medium
€300
High
€700
Critical
€1,500
professionnels.vaccination-info-service.fr Web application
Low
Low
€50
Medium
€300
High
€700
Critical
€1,500
www.vivre-avec-la-chaleur.fr Web application
Low
Low
€50
Medium
€300
High
€700
Critical
€1,500
www.tabac-info-service.fr Web application
Low
Low
€50
Medium
€300
High
€700
Critical
€1,500

Out of scopes

  • Domains not listed in scope are by default all out of scope

Vulnerability types

Qualifying vulnerabilities

  • SQL Injection (SQLi)
  • Cross-Site Scripting (XSS)
  • Remote Code Execution (RCE)
  • Insecure Direct Object Reference (IDOR)
  • Horizontal and vertical privilege escalation
  • Authentication bypass & broken authentication
  • Business Logic Errors vulnerability with real security impact
  • Local files access and manipulation (LFI, RFI, XXE, SSRF, XSPA)
  • Cross-Origin Resource Sharing (CORS) with real security impact
  • Cross-site Request Forgery (CSRF) with real security impact
  • Open Redirect
  • Exposed secrets, credentials or sensitive information on an asset under our control and affecting at least one of our scopes.

Non-qualifying vulnerabilities

  • Broken Link/Social media Hijacking
  • Tabnabbing
  • Missing cookie flags
  • Content/Text injections
  • Clickjacking/UI redressing
  • Denial of Service (DoS) attacks
  • Recently disclosed CVEs (less than 30 days sinces patch release)
  • CVEs without exploitable vulnerabilities and PoC
  • Open ports or services without exploitable vulnerabilities and PoC
  • Social engineering of staff or contractors
  • Presence of autocomplete attribute on web forms
  • Vulnerabilities affecting outdated browsers or platforms
  • Self-XSS or XSS that cannot be used to impact other users
  • Any hypothetical flaw or best practices without exploitable vulnerabilities and PoC
  • SSL/TLS issues (e.g. expired certificates, best practices)
  • Unexploitable vulnerabilities (e.g. Self-XSS, XSS or Open Redirect through HTTP headers...)
  • Reports with attack scenarios requiring MITM or physical access to victim's device
  • Missing security-related HTTP headers which do not lead directly to an exploitable vulnerability and PoC
  • Low severity Cross-Site Request Forgery (CSRF) (e.g. Unauthenticated / Logout / Login / Products cart updates...)
  • Invalid or missing email security records (e.g. SPF, DKIM, DMARC)
  • Session management issues (e.g. lack of expiration, no logout on password change, concurrent sessions)
  • Disclosure of information without exploitable vulnerabilities and PoC (e.g. stack traces, path disclosure, directory listings, software versions, IP disclosure, 3rd party secrets, EXIF Metadata, Origin IP)
  • CSV injection
  • Malicious file upload (e.g. EICAR files, .EXE)
  • HTTP Strict Transport Security Header (HSTS)
  • Subdomain takeover without a full exploitable vulnerability and PoC or not applicable to the scope
  • Blind SSRF without exploitable vulnerabilities and PoC (e.g. DNS & HTTP pingback, Wordpress XMLRPC)
  • Lack or bypass of rate-limiting, brute-forcing or captcha issues
  • User enumeration (e.g. email, alias, GUID, phone number, common CMS endpoints)
  • Weak password policies (e.g. length, complexity, reuse)
  • Ability to spam users (email / SMS / direct messages flooding)
  • Disclosed or misconfigured public API keys (e.g. Google Maps, Firebase, analytics tools...)
  • Password reset token sent via HTTP referer to external services (e.g. analytics / ads platforms)
  • Stolen secrets, credentials or information gathered from a third-party asset that we have no control over
  • Exposed secrets, credentials or information on an asset under our control that are not applicable to the program’s scope
  • Pre-account takeover (e.g. account creation via oAuth)
  • GraphQL Introspection is enabled
  • Stolen secrets, credentials or information gathered from a third-party asset that we have no control over (e.g. …)

Hunting requirements

User agent

Please append to your user-agent header the following value: ' YWHSPF '.


Hunters collaboration

When submitting new report, you can add up to 5 collaborators, and define the reward split ratio.

For more information, see help center.
Note: For reports that have already been rewarded, it is not possible to redistribute the rewards.

To submit a vulnerability report, you need to login with your hunter account.