Description

"Digitaal Vlaanderen" is the IT and digital transformation departement within the Flanders’ governmental IT. Positioned as the digital gateway and data broker between all Flemish government entities, we want to be at the top of our game. Our security ought to be too. For this program we are focusing at first instance on some of our main assets.

Bounties

Responsible disclosure

Rules of engagement
Required
Not applicable
max. 1 request/sec
Not applicable

By participating in this program, you agree to:

  • For the IDM scope, you can only request a test account with your intigriti.me e-mail account
  • Respect the Community Code of Conduct
  • Respect the Terms and Conditions
  • Respect the scope of the program
  • Not discuss or disclose vulnerability information without prior written consent, including PoC's on public Youtube or Vimeo channels.
  • We appreciate a video PoC in case of complicated vulnerabilities.
Domains

*.vlaanderen.be

No Bounty
URL

All and any subsites of https://www.vlaanderen.be, for which authentication is not needed.
For some subsites, a government entity other than Digitaal Vlaanderen may be responsible. We can accept the disclosed vulnerability and relay the issue to the concerned entity, yet we then cannot guarantee they will (be able to) fix it.

The bibis$.vlaanderen.be sites and subsites are out-of-scope : examples are :
bibis.vlaanderen.be
bibis1.vlaanderen.be
bibis3.vlaanderen.be
bibis4.vlaanderen.be
bibis5.vlaanderen.be
bibis6.vlaanderen.be
These sites and subsites are legacy sites and will be taken out of production.

The (*.)formulieren.vlaanderen.be sites and subsites are out-of-scope : example is :
formulieren.vlaanderen.be
These sites and subsites are legacy sites and will be taken out of production.

The (*.)formulieren-ti.vlaanderen.be sites and subsites are out-of-scope : examples are :
beheer.formulieren-ti.vlaanderen.be
formulieren-ti.vlaanderen.be
These sites and subsites are legacy sites and will be taken out of production.

https://beta.gastwebsite-acm.burgerprofiel.ext-vlaanderen.be

No Bounty
URL

Authenticated demo environment for the widget platform. The website itself is just an illustrative example and should not be tested.

https://beta.gastwebsite.burgerprofiel.ext-vlaanderen.be

No Bounty
URL

Unauthenticated demo environment for the widget platform. The website itself is just an illustrative example and should not be tested.

https://beta.widgets.burgerprofiel.dev-vlaanderen.be/

No Bounty
URL

Embeddable portion of My Citizen Profile

https://burgerprofiel.beta-vlaanderen.be

No Bounty
URL

My Citizen Profile (Mijn Burgerprofiel in Dutch) is the go-to spot for citizens to manage their affairs digitally with the government. Citizens can access their personal data, consult status reports, download certificates, and request new government services such as a permit of subsidy. My Citizen Profile is a plug-in that can be integrated into different official government websites, be it on a Flemish or local level.

Available in Dutch - More information can also be found on https://www.vlaanderen.be/uw-overheid/mijn-burgerprofiel (only in Dutch).

This beta environment is equiped with a mock authentication (OpenID) service, which can generate tokens for different kinds of accounts. As such, the authentication flow of this mocked service is not in scope.

https://vo-gebruikersbeheer.vlaanderen.be/

No Bounty
URL

User Management (IDM) is a platform with which you can manage the inflow and outflow of people and their rights to applications.

It is a central rights management for different applications within the entire Flemish administration. It controls the inflow and outflow of employees and their rights and is editable to be tailored to the tasks of each employee.

More information is available on www.vlaanderen.be/gebruikersbeheer. There is detailed product and technical information available for download (in Dutch only).

To be able to test the platform, you will need to create a (dummy) account in our test environment. You can only do this with your intigriti.me e-mail account via a self-registering system available at https://zelfregistratie-gebruikersbeheer-ti.vlaanderen.be/user/aanvraag_werkrelatie?dg=EA&oc=0415928179. You can register with “Kinepolis Group” as a "Hoofd Lokale Beheerder". When you do so, please send an e-mail to webidm@hbplus.be with in the subject line "Project Intigriti". We will inform you when the right has been given.

The application is also available in English via this link: https://gebruikersbeheer-ti.vlaanderen.be/webidm/?lang=en.

In scope

We've done our best to clean most of our known issues and now would like to request your help to spot the ones we missed! We are specifically looking for

  • Leaking of personal data
  • Horizontal / vertical privilege escalation
  • SQL injection vulnerabilities
  • Arbitrary file upload (proof of the existence of the uploaded file required)
  • Sessions not being invalidated (logout, enabling 2FA, ..)
  • Hyperlink injection/takeovers
  • Cross-domain referer leakage
  • Content injection
  • Subdomain takeover without taken over the subdomain
  • Username / email enumeration (for internal e-mail accounts)
Out of scope

Other

  • Any domain that is not listed in the Domains section, is out of scope for this program (non-exhaustive list of out of scope domains)
  • Third party services are out of scope (only misconfigurations are in scope)
  • You can login, but the authentication flow is not in scope of this domain.
  • bibis$.vlaanderen.be - Examples:
    • bibis.vlaanderen.be
    • bibis1.vlaanderen.be
    • bibis3.vlaanderen.be
    • bibis4.vlaanderen.be
    • bibis5.vlaanderen.be
    • bibis6.vlaanderen.be
  • *.formulieren.vlaanderen.be
  • *.formulieren-ti.vlaanderen.be

Application

  • Self-XSS that cannot be used to exploit other users
  • Verbose messages/files/directory listings without disclosing any sensitive information
  • CORS misconfiguration on non-sensitive endpoints
  • Cross-site Request Forgery with no impact
  • Presence of autocomplete attribute on web forms
  • Reverse tabnabbing
  • Bypassing rate-limits or the non-existence of rate-limits.
  • Best practices violations (password complexity, expiration, re-use, etc.)
  • Clickjacking on pages with no sensitive actions
  • CSV Injection
  • Host header injection without proven business impact
  • Mixed content type issues
  • Missing security headers
  • Anything related to email spoofing, SPF, DMARC or DKIM
  • Cross-site Request Forgery with low impact
  • E-mail bombing
  • Homograph attacks
  • XMLRPC enabled
  • HTTP Request smuggling without any proven impact
  • Banner grabbing / Version disclosure
  • Missing cookie flags
  • Open ports without an accompanying proof-of-concept demonstrating vulnerability
  • Arbitrary file upload without proof of the existence of the uploaded file
  • Weak SSL configurations and SSL/TLS scan reports
  • Not stripping metadata of images
  • Disclosing API keys without proven impact
  • Same-site scripting

General

  • In case that a reported vulnerability was already known to the company from their own tests, it will be flagged as a duplicate
  • Theoretical security issues with no realistic exploit scenario(s) or attack surfaces, or issues that would require complex end user interactions to be exploited, may be excluded or be lowered in severity
  • Spam, Phishing, social engineering and physical intrusion
  • DoS/DDoS attacks or brute force attacks
  • Vulnerabilities that are limited to non-current browsers (older than 3 versions) will not be accepted
  • Attacks requiring physical access to a victim’s computer/device, man in the middle or compromised user accounts
  • Recently discovered zero-day vulnerabilities found in in-scope assets within 14 days after the public release of a patch or mitigation may be reported, but are usually not eligible for a bounty.
  • Reports that state that software is out of date/vulnerable without a proof-of-concept
Severity assessment

This program follows Intigriti's contextual CVSS standard

FAQ

Where can we get credentials for the app?
You can log on via https://burgerprofiel.beta-vlaanderen.be by clicking on "Meld u aan". This will redirect you to https://beta.openid.burgerprofiel.dev-vlaanderen.be/ . Here you need to select an INSZ (= the account) and click on "Login". Multiple testing accounts are available.

Will you get recognition for relaying vulnerabilities?
We will create a section on our website, where we can mention your name or alias and the number of vulnerabilities you relayed to us.

All aboard!
Please log in or sign up on the platform

For obvious reasons we can only allow submissions or applications for our program with a valid intigriti account.

It will only take 2 minutes to create a new one or even less to log in with an existing account, so don't hesitate and let's get started. We would be thrilled to have you as part of our community.

Researchers
last contributors
logo
logo
logo
logo
logo
logo
leaderboard
logo
logo
logo
logo
logo
logo
Overall stats
submissions received
343
average payout
N/A
accepted submissions
106
total payouts
N/A
Last 90 day response times
avg. time first response
< 24 hours
avg. time to decide
< 6 days
avg. time to triage
< 2 days
Activity
7/1
Digitaal Vlaanderen
closed a submission
7/1
Digitaal Vlaanderen
accepted a submission
7/1
Digitaal Vlaanderen
closed a submission
6/30
Digitaal Vlaanderen
accepted a submission
6/30
Digitaal Vlaanderen
accepted a submission
6/30
Digitaal Vlaanderen
accepted a submission
6/30
Digitaal Vlaanderen
accepted a submission
6/29
Digitaal Vlaanderen
accepted a submission
6/29
Digitaal Vlaanderen
closed a submission
6/29
Digitaal Vlaanderen
closed a submission