Release date: September 23, 2023
The OpenHarmony community attaches great importance to the security of community software versions. The security issues include issues found during the routine security issue scans and internal security research, as well as security issues reported by users. The OpenHarmony Security Bounty Program (referred to as the "Program" hereinafter) aims to encourage feedback of security vulnerabilities found in OpenHarmony to bugbounty@mail.openharmony.io via emails encrypted by the PGP public key. The OpenHarmony Security Issue Response Team will try to address all feedback on a case-by-case basis as soon as possible.
The Program applies to the latest OpenHarmony Release version and OpenHarmony LTS versions for standard-, small-, and mini-system devices.
In the OpenHarmony single-device scenario, vulnerabilities are classified into four levels: critical, high, medium, and low, based on their impact.
Vulnerability Level | Vulnerability Example | Maximum Bonus (CNY) |
---|---|---|
Critical | 1. Remote execution of arbitrary code in a Trusted Computing Base (TCB). 2. Local execution of arbitrary code in a privileged process or TCB (able to bypass kernel mitigations) 3. Remote PDoS attack to cause DoS on a device or a condition where the system can be recovered only after being flashed. 4. Remote bypass of application installation and some user interaction requirements. 5. Remote access to protected data (i.e., data accessible only to privileged processes) without authentication. 6. Remote execution of code across devices without authorization in distributed device scenarios. |
1,000,000 |
High | 1. Local execution of arbitrary code in a TCB. 2. Remote execution of arbitrary code in a common process. 3. Bypassing the security mechanism that isolates data between applications. 4. Bypassing the security mechanism that isolates users or users' personal data. 5. Remote access to protected data (i.e., data accessible to common applications) without authentication. 6. Local PDoS attack that causes device unavailability, or a condition where the system can be recovered only after being flashed or reset to factory settings. 7. Remote temporary DoS attack that causes remote suspension or restart of the device. 8. Remotely enabling or disabling functions that can be initiated only by users or that are available only with user consent without requiring user interactions. 9. Bypassing the screen lock. 10. Locally bypassing user interactions to implement silent installation. 11. Remote execution of code in a large-system device by controlling a mini-, small-, or standard-system device in the distributed device scenario. |
500,000 |
Medium | 1. Remote execution of arbitrary code in a constrained process. 2. Local execution of arbitrary code in a common process. 3. Bypassing the mitigation technologies in a privileged process or TCB (If the issue existing in some vulnerability mitigation technologies can directly lead to arbitrary code execution or critical data leakage, the vulnerability severity level can be escalated). 4. Local access to protected data (i.e., data accessible to locally installed apps with certain permissions, or data accessible only to privileged processes) without authentication. 5. Locally enabling or disabling functions that can be initiated only by users or that are available only with user consent without requiring user interactions. 6. Insecure storage of cryptographic algorithms and keys, which causes leakage of sensitive information (the severity level of this vulnerability may vary with its impact). |
200,000 |
Low | 1. Local execution of arbitrary code in a constrained process. 2. Local temporary DoS attack that causes device suspension or restart, affecting system availability. 3. Leakage of low-risk information. |
10,000 |
The bonus amount varies depending on the severity level of the security vulnerability and the quality of the report. The OpenHarmony Security Response Team determines the final bonus based on the factors including but not limited to the following:
Details in the vulnerability report. The report must comply with the Report Requirements in this Program and contain at least the description of the vulnerability and exploit methods, and attack code.
Initial attack path, which can be remote (zero-click, one-click) or local.
Whether the attack code is closely related to a specific device or software version, or whether the attack code can be executed on all devices or software versions.
User perception of the attack process.
Stability of the attack code.
Whether the attack code can be executed in the latest stable LTS version.
System type, security hardening solution, and mitigation measures.
NOTE
The Program does not apply to the vulnerabilities that bypass the screen lock using synthetic biometric data (including but are not limited to fingerprints and counterfeit masks).
The security vulnerability report should contain detailed description of the vulnerability and a complete PoC. It will be better if the report provides complete exploit or fix code.
Vulnerability Description
The vulnerability description should include:
PoC or Exploit
(Optional) Code to Fix or Mitigate the Vulnerability
The report contains the detailed solution to fix the vulnerability and the patch code that can be used.
Term | Description |
---|---|
Remote | The attacker can exploit a vulnerability to launch attacks without installing apps or physically accessing the target device, for example, by browsing web pages, reading SMS or MMS messages, sending and receiving emails, downloading files, and communicating over wireless networks. |
Local | The attacker needs to install apps in or physically access the target device, in order to exploit a vulnerability to launch attacks. |
TCB | A Trusted Computing Base (TCB) is everything in a computing system that provides a secure environment for operations. It includes the hardware, firmware, software, and components executing security policies. It establishes a basic protection environment and provides additional user services required by a trusted computer system, including but not limited to some kernels and drivers, or user services equivalent to kernels, such as init and vold. |
Privileged process | An application or process running in the system_app domain of SELinux, including processes running with system-level and root permissions. |
Common application process | Third-party application processes or built-in application processes without system-level permissions. |
Constrained process | A process that is significantly more limited than a common application process. |
Do not access, download, modify, or delete data that does not belong to you without permission. Only PoC is allowed to prove the existence of the vulnerability.
Phishing or social engineering attacks are prohibited.
Do not use security vulnerabilities and related information for any illegal purpose. The following activities are prohibited:
Access the computer information network or using resources in the computer information network without permission.
Delete, modify, or add the functions of the computer information network without permission.
Delete, modify, or add data or applications stored, processed, or transmitted in the computer information network without permission.
Intentionally produce and spread destructive programs, such as computer viruses.
Access the computer information network to obtain data stored in related website systems and platforms without permission.
Other behaviors that jeopardize the security of the computer information network.
You shall be fully liable for any loss caused to the OpenHarmony community due to the above behaviors. If your behavior violates laws and regulations, you should bear the corresponding legal consequences.
Members of the OpenHarmony Security Issue Response Team and related project maintainers and committers cannot participate in this Program.
We hope that you do not disclose or spread security vulnerabilities before they are fixed. We promise that every issue you reported will be tracked, analyzed, handled, and replied to by dedicated personnel in a timely manner, and your contribution will be awarded according to the Bounty Program.
Security vulnerabilities should be tested in compliance with laws and regulations. The OpenHarmony community reserves the right to take legal actions against activities that violate laws, administrative regulations, management regulations of the OpenHarmony community, and website agreements, such as exploiting security vulnerabilities to ruin user interests, affecting service provisioning, stealing user data, and maliciously spreading security vulnerabilities or data.
The Program takes effect as of the date of release. The OpenHarmony Security Issue Response Team may modify the Program as required. You will find the latest version on the OpenHarmony official website. Unless otherwise specified, the updated version takes effect as of the date of release.
If you have any comments or suggestions, please contact bugbounty@mail.openharmony.io.
Вы можете оставить комментарий после Вход в систему
Неприемлемый контент может быть отображен здесь и не будет показан на странице. Вы можете проверить и изменить его с помощью соответствующей функции редактирования.
Если вы подтверждаете, что содержание не содержит непристойной лексики/перенаправления на рекламу/насилия/вульгарной порнографии/нарушений/пиратства/ложного/незначительного или незаконного контента, связанного с национальными законами и предписаниями, вы можете нажать «Отправить» для подачи апелляции, и мы обработаем ее как можно скорее.
Опубликовать ( 0 )