Description

"Digitaal Vlaanderen" is the IT and digital transformation departement within the Flanders’ governmental IT. Positioned as the digital gateway and data broker between all Flemish government entities, we want to be at the top of our game. Our security ought to be too. For this program we are focusing at first instance on some of our main assets.

Bounties

This is a responsible disclosure program without bounties.

Rules of engagement
Required
Not applicable
max. 1 request/sec
Not applicable

By participating in this program, you agree to:

  • For the IDM scope, you can only request a test account with your intigriti.me e-mail account
  • Respect the Community Code of Conduct
  • Respect the Terms and Conditions
  • Respect the scope of the program
  • Not discuss or disclose vulnerability information without prior written consent, including PoC's on public Youtube or Vimeo channels.
  • We appreciate a video PoC in case of complicated vulnerabilities.
Domains

*.vlaanderen.be

Tier 2
Wildcard

All and any subsites of https://www.vlaanderen.be,
-for which authentication is not needed
-for which creation of account(s) is not needed

For some subsites, a government entity other than Digitaal Vlaanderen may be responsible. We can accept the disclosed vulnerability and relay the issue to the concerned entity, yet we then cannot guarantee they will (be able to) fix it.

https://beta.gastwebsite-acm.burgerprofiel.ext-vlaanderen.be

No bounty
URL

Authenticated demo environment for the widget platform. The website itself is just an illustrative example and should not be tested.

https://beta.gastwebsite.burgerprofiel.ext-vlaanderen.be

No bounty
URL

Unauthenticated demo environment for the widget platform. The website itself is just an illustrative example and should not be tested.

https://beta.widgets.burgerprofiel.dev-vlaanderen.be/

No bounty
URL

Embeddable portion of My Citizen Profile

https://burgerprofiel.beta-vlaanderen.be

No bounty
URL

My Citizen Profile (Mijn Burgerprofiel in Dutch) is the go-to spot for citizens to manage their affairs digitally with the government. Citizens can access their personal data, consult status reports, download certificates, and request new government services such as a permit of subsidy. My Citizen Profile is a plug-in that can be integrated into different official government websites, be it on a Flemish or local level.

Available in Dutch - More information can also be found on https://www.vlaanderen.be/uw-overheid/mijn-burgerprofiel (only in Dutch).

This beta environment is equiped with a mock authentication (OpenID) service, which can generate tokens for different kinds of accounts. As such, the authentication flow of this mocked service is not in scope.

https://vo-gebruikersbeheer.vlaanderen.be/

No bounty
URL

User Management (IDM) is a platform with which you can manage the inflow and outflow of people and their rights to applications.

It is a central rights management for different applications within the entire Flemish administration. It controls the inflow and outflow of employees and their rights and is editable to be tailored to the tasks of each employee.

More information is available on www.vlaanderen.be/gebruikersbeheer. There is detailed product and technical information available for download (in Dutch only).

To be able to test the platform, you will need to create a (dummy) account in our test environment. You can only do this with your intigriti.me e-mail account via a self-registering system available at https://zelfregistratie-gebruikersbeheer-ti.vlaanderen.be/user/aanvraag_werkrelatie?dg=EA&oc=0415928179. You can register with “Kinepolis Group” as a "Hoofd Lokale Beheerder". When you do so, please send an e-mail to webidm@hbplus.be with in the subject line "Project Intigriti". We will inform you when the right has been given.

The application is also available in English via this link: https://gebruikersbeheer-ti.vlaanderen.be/webidm/?lang=en.

_* _ .naric . *.onderwijs*.vlaanderen.be

Out of scope
Wildcard

* naric*.onderwijs*.vlaanderen.be

Out of scope
Wildcard

apigee.naric.onderwijs*.vlaanderen.be

Out of scope
Wildcard

archiefoverdracht*.vlaanderen.be

Out of scope
Wildcard

bibis*.vlaanderen.be

Out of scope
Wildcard

cdn.vlaanderen.be

Out of scope
URL

codex.opendata.api.vlaanderen.be

Out of scope
URL

data-onderwijs.vlaanderen.be

Out of scope
URL

ets*.omgeving.vlaanderen.be

Out of scope
Wildcard

natura2000.vlaanderen.be

Out of scope
URL

opibus*.onderwijs*.vlaanderen.be

Out of scope
Wildcard
In scope

We've done our best to clean most of our known issues and now would like to request your help to spot the ones we missed! We are specifically looking for

  • Leaking of personal data
  • Horizontal / vertical privilege escalation
  • SQL injection vulnerabilities
  • Arbitrary file upload (proof of the existence of the uploaded file required)
  • Sessions not being invalidated (logout, enabling 2FA, ..)
  • Hyperlink injection/takeovers
  • Cross-domain referer leakage
  • Username / email enumeration (for internal e-mail accounts)

Subdomain Takeover
If a certain subdomain seems to be vulnerable to subdomain takeover, we want to know this but we ask to not take over the corresponding subdomain itself. Make sure you give a proper explanation on how to take this over and which service is responsible for this.

Out of scope

Other

  • Any domain that is not listed in the Domains section, is out of scope for this program (non-exhaustive list of out of scope domains)
  • Third party services are out of scope (only misconfigurations are in scope)
  • You can login, but the authentication flow is not in scope of this domain.

Application

  • API key disclosure without proven business impact
  • Wordpress usernames disclosure
  • Pre-Auth Account takeover/OAuth squatting
  • Self-XSS that cannot be used to exploit other users
  • Verbose messages/files/directory listings without disclosing any sensitive information
  • CORS misconfiguration on non-sensitive endpoints
  • Missing cookie flags
  • Missing security headers
  • Cross-site Request Forgery with no or low impact
  • Presence of autocomplete attribute on web forms
  • Reverse tabnabbing
  • Bypassing rate-limits or the non-existence of rate-limits.
  • Best practices violations (password complexity, expiration, re-use, etc.)
  • Clickjacking without proven impact/unrealistic user interaction
  • CSV Injection
  • Sessions not being invalidated (logout, enabling 2FA, etc.)
  • Tokens leaked to third parties
  • Anything related to email spoofing, SPF, DMARC or DKIM
  • Content injection without being able to modify the HTML
  • Email bombing
  • HTTP Request smuggling without any proven impact
  • Homograph attacks
  • XMLRPC enabled
  • Banner grabbing/Version disclosure
  • Not stripping metadata of files
  • Same-site scripting
  • Arbitrary file upload without proof of the existence of the uploaded file
  • Blind SSRF without proven business impact (pingbacks are not sufficient)
  • Disclosed/misconfigured Google Maps API keys
  • Host header injection without proven business impact

General

  • In case that a reported vulnerability was already known to the company from their own tests, it will be flagged as a duplicate
  • Theoretical security issues with no realistic exploit scenario(s) or attack surfaces, or issues that would require complex end user interactions to be exploited
  • Spam, social engineering and physical intrusion
  • DoS/DDoS attacks or brute force attacks
  • Vulnerabilities that only work on software that no longer receive security updates
  • Attacks requiring physical access to a victim's computer/device, man in the middle or compromised user accounts
  • Recently discovered zero-day vulnerabilities found in in-scope assets within 14 days after the public release of a patch or mitigation may be reported, but are usually not eligible for a bounty
  • Reports that state that software is out of date/vulnerable without a proof-of-concept
Severity assessment

This program follows Intigriti's contextual CVSS standard

FAQ

Where can we get credentials for the app?
You can log on via https://burgerprofiel.beta-vlaanderen.be by clicking on "Meld u aan". This will redirect you to https://beta.openid.burgerprofiel.dev-vlaanderen.be/ . Here you need to select an INSZ (= the account) and click on "Login". Multiple testing accounts are available.

Will you get recognition for relaying vulnerabilities?
We will create a section on our website, where we can mention your name or alias and the number of vulnerabilities you relayed to us.

All aboard!
Please log in or sign up on the platform

For obvious reasons we can only allow submissions or applications for our program with a valid Intigriti account.

It will only take 2 minutes to create a new one or even less to log in with an existing account, so don't hesitate and let's get started. We would be thrilled to have you as part of our community.

Researchers
last contributors
logo
logo
logo
logo
logo
logo
leaderboard
logo
logo
logo
logo
logo
logo
Overall stats
submissions received
1104
average payout
N/A
accepted submissions
334
total payouts
N/A
Last 90 day response times
avg. time first response
< 2 days
avg. time to decide
< 3 days
avg. time to triage
< 2 days
Activity
4/19
Digitaal Vlaanderen
accepted a submission
4/16
Digitaal Vlaanderen
accepted a submission
4/12
logo
created a submission
4/10
Digitaal Vlaanderen
closed a submission
4/8
Digitaal Vlaanderen
closed a submission
4/8
logo
created a submission
4/8
logo
created a submission
4/5
logo
created a submission
3/28
Digitaal Vlaanderen
closed a submission
3/27
Digitaal Vlaanderen
closed a submission