Bug Bounty Program / Reporting Security Issues

No technology is perfect, and Showmax believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you’ve found a security issue in our product or service, we encourage you to notify us. We welcome working with you to resolve the issue promptly.

Disclosure Policy and Rules of Participation

  • Let us know as soon as possible upon discovery of a potential security issue, and we’ll make every effort to quickly resolve the issue.
  • Provide us a reasonable amount of time to resolve the issue before any disclosure to the public or a third-party.
  • Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with explicit permission of the account holder.
  • You may only test against accounts you have created.
  • You must not attempt to gain access to, or interact with, any accounts other than those created by you
  • Rules for reporting must be followed
  • This program is not open to minors, individuals on sanctions lists or individuals in countries on sanctions lists
  • Showmax reserves the right to modify the rules for this program or deem any submissions invalid at any time. Showmax may cancel the Bug Bounty program without notice at any time.

Eligibility

Scope of bug hunting project is limited to services directly provided by Showmax. Such as web, api, native applications. Please note that bugs in third-party components only qualify if you can prove that they can be used to successfully attack Showmax.

Eligible services/products:

Out of scope: We don’t consider 3rd party services as eligible for this program (for example https://help.showmax.com which is hosted by 3rd party).

Vulnerability Categories We Encourage

We are primarily interested in hearing about the following vulnerability categories:

  • Authentication related issues (e.g. authentication bypass for login to My Account)
  • Authorization related issues (e.g. authorization bypass for asset playback)
  • SQL Injection (SQLi)
  • Cross Site Scripting (XSS)
  • Cross Site Request Forgery (CSRF)
  • Data Exposure
  • Redirection Attacks
  • Remote Code Execution
  • Particularly clever vulnerabilities or unique issues that do not fall into explicit categories

Out of Scope Vulnerability Categories

The following vulnerability categories are considered out of scope of our responsible disclosure program and will not be eligible for credit and/or bounty.

  • SSL vulnerabilities related to configuration or version
  • Denial of Service (DoS)
  • User enumeration
  • Brute forcing
  • Secure flag not set on non-sensitive cookies
  • HTTPOnly flag not set on non-sensitive cookies
  • Logout Cross Site Request Forgery (CSRF)
  • Handling of CSRF token (it is tight to particular app session cookie)
  • HTTP access control (CORS)
  • Self-XSS
  • Cookie showmax_oauth not having a Secure flag set
  • Certain services passing access_token in params
  • Issues only present in old browsers/old plugins/end-of-life software browsers
  • HTTP TRACE method enabled
  • Vulnerability reports related to the reported version numbers of web servers, services, or frameworks
  • Clickjacking on pages without authentication and/or sensitive state changes
  • Vulnerability reports that require a large amount of user cooperation to perform unlikely or unreasonable actions which would be more symptomatic of a social engineering or phishing attack and not an application vulnerability (e.g. disabling browser security features, sending the attacker critical information to complete the attack, guiding the user through a particular flow and requiring them to enter malicious code themselves, etc.)
  • Any physical attempts against Showmax property or data centers
  • Social engineering (including phishing) of Showmax staff or contractors
  • Spamming
  • Bruteforce Amplification Attack via https://blog.showmax.com/xmlrpc.php

Indemnification

Showmax will not pursue legal action against security researchers who follow the guidelines outlined in this document and responsibly disclose vulnerabilities to us.

How to report security issue

Please use HackerOne platform or email security-report@showmax.com. If you feel the email should be encrypted, please use our PGP key.

Thank you for helping keep Showmax and our users safe!

Participating Security Researchers

Showmax would like to thank the following researchers for participating in our responsible disclosure program.

2017

  • addd (@add12344441)
  • Three Ninner Alpha (@alpha66)
  • bugdiscloseguys (@bugdiscloseguys)
  • user[username] (@daniyal_nasir)
  • Dawid Czagan (@dawidczagan)
  • Md. Nur A Alam Dipu (@depu1994)
  • (@exception)
  • Brian Carpenter (@geeknik)
  • Mehdi Hashemi (@hat_mast3r)
  • n00b (@im_ciph3r00t)
  • Jigar (@jigarthakkar39)
  • (@leet-boy)
  • Luciano Corsalini (@lucio)
  • Muhammad Abdullah (@mahitman)
  • Mark Litchfield (@mlitchfield)
  • Black Ashes (@nullelite)
  • Paresh parmar (@paresh_parmar)
  • Peter (@peter-676)
  • Sahil Saif (@sahilsaif)
  • Sergii Sizov (@sergiisizov)
  • SuperBoy (@sup3r-b0y)
  • AMT (@temmyscript)
  • Eric (@todayisnew)
  • yappare (@yappare)

Cover image by Negative Space. It features Prague Castle Guards.