LINE Security Bug Bounty Program
LINE Corporation will conduct the LINE Security Bug Bounty Program whereby cash rewards will be paid for eligible vulnerability reports.
A cash reward based on the severity and uniqueness of their content will be paid to the individuals who report them. Selected submissions will be added to the Hall of Fame.
LINE Security Bug Bounty Program
1. Purpose of Program
The purpose of this program is to quickly discover any vulnerabilities that exist in the LINE messenger app and provide users the most secure service possible.
2. Program Dates
Report Submission Dates: 15pm, on June 2, 2016 (GMT+9) ~
See “Reporting & Review” below regarding reporting methods.
3. Program flow
Results will be made public successively after the conclusion of internal review.
- Program Introduction
- Vulnerablilities Report Submission
- Internal Review
- Announcement of the Results
This program is limited to vulnerabilities found in the latest version of the LINE messenger app (LINE for iOS, LINE for Android latest version in the time of reporting).
Vulnerabilities will also be limited to those discovered in the following domains.
Vulnerabilities discovered in other LINE-related apps released by LINE Corporation (LINE Family apps, LINE Game apps) are not eligible for this program. Please refer to the Details Page (Article 3 Eligibility).
Program participants may not perform the following actions. Participants who perform any of these actions will be disqualified from receiving reward money.
※ If you perform any of the above actions using a discovered bug, be sure to mention that you did so in your vulnerability report.
- Using a discovered vulnerability to view, delete, alter, or publish user data
- Using an automated vulnerability scanner to launch attacks against LINE's systems
5. Conditions for Participation
- be an adult
- not be an employee of the Company or an affiliated company
- not be an entity or part of an entity that had carried out or is carrying out a project that is being advanced with the Company
- be able communicate in Japanese or English
- not reside in a country subject to Japanese or US economic sanctions at the time of reward payment for the Program
||Ability to access private information through an SQL injection attack
|Cross-Site Scripting (XSS)
||Ability to hijack a session or execute scripts through an XSS attack
|Cross-Site Request Forgery (CSRF)
||Ability to force a LINE user to perform an undesired process through a CSRF attack
|Remote Code Execution
||Ability to send packets containing arbitrary code to the client or server side
||Ability to masquerade as another person by bypassing authentication procedures
||Ability to obtain items while bypassing in-app payment procedures
||Ability to obtain another person’s authentication information by cracking encrypted data
7. Vulnerabilities not eligible for rewards
Examples of vulnerabilities not eligible for cash rewards are listed below. However, LINE may deem additional cases eligible for the cash reward at its own discretion.
(1) Reporting a vulnerability as-is after detection using an automated scanner
(2) Reporting hypothetical or theoretical vulnerabilities without actual verification code
(3) Reporting susceptibility to a denial-of-service attack
(4) Reporting susceptibility to brute force attacks aimed at retrieving passwords or tokens
(5) Reporting the ability to spam LINE users arbitrarily with spam messages
(6) Reporting email verification deficiencies, expiration of password reset links, and password complexity policies
(7) Reporting on the absence of CRSF tokens
(8) Reporting login/logout CSRF
(9) Reporting the susceptibility to an attack via physical access to a user’s device
(10) Reporting on missing security headers
(11) Reporting on script executions that do not affect LINE users
(12) Reporting vulnerabilities found in areas other than the LINE app
(13) Reporting vulnerabilities attributable to out-of-date browsers or platforms
- Ex 1: Reporting vulnerabilities found in domains other than *.line.me, *.line-apps.com, *.line.naver.jp
- Ex 2: Reporting vulnerabilities found on platforms other than iOS or Android
- Ex 3: Reporting vulnerabilities found in LINE related apps (LINE family apps, LINE games)
(14) Reporting vulnerabilities related to auto fill web forms
(15) Reporting the absence of secure flag attributes for non-critical cookies
(16) Reports related to unsafe SSL/TLS cipher suites or protocol version
(17) Reporting the accessibility of user data via a rooting device
(18) Reporting the accessibility of profile photos, Timeline photos, and other information by anyone via URL
(19) Reporting vulnerabilities attributable to a virtual phone number
(20) Reporting vulnerabilities of which LINE has already received a report, LINE is already aware, or which has already been made public
(21) Reporting vulnerabilities related to server banner information
(22) Reporting vulnerabilities related to information contained within error messages (stack trace, application, or server errors)
(23) Reporting vulnerabilities related to unset values for SPF record, DMARC, and DKIM
(24) Reporting vulnerabilities which enable the use of an illegal HTTP method
(25) Reporting vulnerabilities related to clickjacking
8. Program Details
For more details on the program, please click here.
Reporting and Review
Please use the Bug Report Form to report any bugs you find. The Bug Report Form page will be available from 15 pm, June 2, 2016 (GMT+9).
We have created a list of things that will not be recognized as bugs. Please make sure that you understand the items listed on the Details Page (Vulnerabilities not Eligible for Cash Reward) before submitting your report.
1. Notes Regarding Reporting and Reviews
Vulnerability reviews are conducted according to standards established by LINE Corporation. If the vulnerability is recognized, the submitter will be contacted by e-mail.
Fundamentally, vulnerabilities of which the company is already aware shall not be eligible for review.
If a report on a vulnerability is received while we are already in the process of reviewing a separate report on the same vulnerability, we will recognize the first report submitted.
Furthermore, multiple vulnerabilities will be treated as a single vulnerability when:
After a vulnerability is recognized, in addition to receiving a cash reward, the submitter will, with their permission, have their name (or nickname) posted along with the discovered vulnerability to the Hall of Fame to be published soon.
- the same vulnerability can be exploited under multiple parameters through a single method
- the same vulnerability exists for a method that runs across multiple domains
2. Other Inquiries
See Article 17 of the Details Page.
3. Reporting bugs not related to the LINE Security Bug Bounty Program
If you are unable to use the report form, or you would like to report a bug unrelated to this program, please contact us at email@example.com
Any reports submitted not using the report form will be accepted, but will not be subject to rewards or induction into the Hall of Fame.