Security Disclosure Policy
We at Citizen Ticket are committed to providing a robust, reliable and secure ticketing platform that safeguards our organisers' and our customers' data. We appreciate and recognise the value in contributions that responsible, independent and ethically minded security researchers can contribute to our platform. This document intends to outline the scoping, framework and reporting methods for Citizen Ticket so that we can work with the security researcher community most effectively.
Scope
Only submit reports where a real impact to Citizen Ticket, or its user accounts and/or data, would exist as a result of the vulnerability.
Do not create an unnecessary amount of data records via our system; limit yourself to only what is necessary to prove the exploit - usually 1-3 records.
Please do not research, or submit reports about:
Self XSS (where the user can only 'attack' themselves)
Volumetric DoS attacks
Discoveries/indications that we do not align with 'industry best practices' but are not necessarily security weaknesses themselves
Clickjacking
Domains
Please limit your research to dev.citizenticket.co.uk
Reporting vulnerabilities
Please email your vulnerability to [email protected] outlining
The category of technique/exploitation in the subject line eg. XSS exploit
The URL affected
The steps to reproduce the error
A clear description
Severity Levels
For each report, we will aim to categorise the report into one of 4 levels to signify the potential severity of impact of the reported problem;
The severity rating given is to our discretion, meaning that we may choose to escalate or de-escalate the severity rating for a particular bug without regard to our definition or not necessarily with given reason.
Our response & commitments
We aim to acknowledge all reports within 7 days of receipt of report. We will also provide you with a bug report reference. If you do not receive a reply acknowledging your report after 7 full days after receipt, please resubmit the report again and contact us via a separate channel of communication, for example via customer support, to request acknowledgement of your report. (Do not resubmit the report itself to the separate channel of communication).
For medium to high severity bugs, within 28 days of acknowledging your report, we aim to put in place a remedy or mitigation addressing the vulnerability. We aim to provide you with progress of our solution within the 28 day time period from acknowledgement. If you have not heard from us by this point, please recontact us via a separate channel for a status update, along with the bug report reference.
For none to low severity bugs, we may or may not provide a timeframe, and we may or may not choose to address the perceived problem. We will, however, acknowledge the report and provide you with our severity rating.
Your responsibilities & commitments
Security researchers must not:
Act threatening, rude or with otherwise ill-intent to Citizen Ticket the company, or it's employees or staff
Modify data that is not your own or not clearly segregated & marked as test data Disrupt our production services/systems ever, or disrupt our non-production services/systems without prior obtained consent
Disclose information uncovered during researching to third parties, for example user data
Disclose vulnerabilities to third parties or the public without first receiving confirmation from Citizen Ticket that the vulnerability has been mitigated or rectified
If the vulnerability discovered concerns a third-party library, framework or API, the third party can be notified but Citizen Ticket should not be implied or mentioned.
If you are unsure, please contact [email protected] for clarification
Security researchers must:
Act within the confines of the scope set within this document
Delete all data created and/or retrieved during their research as soon as possible, by the latest at 1 month after the report is submitted
If you are unsure about your responsibilities, actions (prior or planned), please contact [email protected] for clarification.
Bounty & Rewards
We are not currently running a bug bounty program. However, we are able to pay hourly or day rates to vetted security researchers who wish to participate in our programme. Please contact us via [email protected] to discuss compensation before you begin research on our domain.
Legalities
We have put this policy in place to better define our expectations when working with well-intentioned security researchers. However, this policy does not grant permission to anybody to act outside of the laws of Scotland, the UK, or the country of residence of the security researcher, and it does not cause Citizen Ticket to be in breach of its own legal obligations. Particular consideration should be given to;
Computer Misuse Act 1990
Data Protection Act 2018
General Data Protection Regulation (GDPR) 2016
As long as the report is made in good faith, and within scope, and within accordance of this policy, we will not seek to prosecute any security researcher for finding and submitting their report of a security vulnerability.