We at Citizen Ticket are committed to providing a robust, reliable and secure ticketing platform that safeguards our organisers' and our customers' data. We appreciate and recognise the value in contributions that responsible, independent and ethically minded security researchers can contribute to our platform. This document intends to outline the scoping, framework and reporting methods for Citizen Ticket so that we can work with the security researcher community most effectively.
Scope
Only submit reports where a real impact to Citizen Ticket, or its user accounts and/or data, would exist as a result of the vulnerability.
Do not create an unnecessary amount of data records via our system; limit yourself to only what is necessary to prove the exploit - usually 1-3 records.
Please do not research, or submit reports about:
Domains
Please limit your research to dev.citizenticket.co.uk
Reporting vulnerabilities
Please email your vulnerability to abuse@citizenticket.co.uk outlining
Severity Levels
For each report, we will aim to categorise the report into one of 4 levels to signify the potential severity of impact of the reported problem;
Severity Rating | Definition |
None | The bug is one or more of the following:
|
Low | The bug is one or more of the following:
|
Medium | The bug is one or more of the following;
|
High | The bug is one or more of the following:gains access to a user account in a reproducible manner leaks sensitive user data in a targeted manner or in bulk causes significant disruption to our service |
The severity rating given is to our discretion, meaning that we may choose to escalate or de-escalate the severity rating for a particular bug without regard to our definition or not necessarily with given reason.
Our response & commitments
We aim to acknowledge all reports within 7 days of receipt of report. We will also provide you with a bug report reference. If you do not receive a reply acknowledging your report after 7 full days after receipt, please resubmit the report again and contact us via a separate channel of communication, for example via customer support, to request acknowledgement of your report. (Do not resubmit the report itself to the separate channel of communication).
For medium to high severity bugs, within 28 days of acknowledging your report, we aim to put in place a remedy or mitigation addressing the vulnerability. We aim to provide you with progress of our solution within the 28 day time period from acknowledgement. If you have not heard from us by this point, please recontact us via a separate channel for a status update, along with the bug report reference.
For none to low severity bugs, we may or may not provide a timeframe, and we may or may not choose to address the perceived problem. We will, however, acknowledge the report and provide you with our severity rating.
Your responsibilities & commitments
Security researchers must not:
Security researchers must:
If you are unsure about your responsibilities, actions (prior or planned), please contact abuse@citizenticket.co.uk for clarification.
Bounty & Rewards
We are not currently running a bug bounty program. However, we are able to pay hourly or day rates to vetted security researchers who wish to participate in our programme. Please contact us via abuse@citizenticket.co.uk to discuss compensation before you begin research on our domain.
Legalities
We have put this policy in place to better define our expectations when working with well-intentioned security researchers. However, this policy does not grant permission to anybody to act outside of the laws of Scotland, the UK, or the country of residence of the security researcher, and it does not cause Citizen Ticket to be in breach of its own legal obligations. Particular consideration should be given to;
As long as the report is made in good faith, and within scope, and within accordance of this policy, we will not seek to prosecute any security researcher for finding and submitting their report of a security vulnerability.