PayPal Bug Bounty Program.
For Professional Researchers: Bug Bounty Program
Our team of dedicated security professionals works vigilantly to help keep customer information secure. We recognize the important role that security researchers and our user community play in helping to keep PayPal and our customers secure. If you discover a site or product vulnerability please notify us using the guidelines below.
Please note that your participation in the Bug Bounty Program is voluntary and subject to the terms and conditions set forth on this page (“Program Terms”). By submitting a site or product vulnerability to PayPal, Inc. (“PayPal”) you acknowledge that you have read and agreed to these Program Terms.
These Program Terms supplement the terms of PayPal User Agreement, the PayPal Acceptable Use Policy, and any other agreement in which you have entered with PayPal (collectively “PayPal Agreements”). The terms of those PayPal Agreements will apply to your use of, and participation in, the Bug Bounty Program as if fully set forth herein. If there is any inconsistency exists between the terms of the PayPal Agreements and these Program Terms, these Program Terms will control, but only with regard to the Bug Bounty Program.
You can jump to particular sections of these Program Terms by using the following links :
Responsible Disclosure Policy
To encourage responsible disclosures, PayPal commits that, if we conclude, in our sole discretion, that a disclosure respects and meets all the guidelines of these Program Terms and the PayPal Agreements, PayPal will not bring a private action against you or refer a matter for public inquiry.
To participate in the Bug Bounty Program, you must have a verified PayPal account in good standing in order to register for the Bug Bounty Program and be eligible to receive Bounty Payments (described further below). Alternatively, if you do not have a PayPal account, you may elect to submit reports via email, but you won’t be eligible for a Bounty Payment. If you do not currently have a PayPal account, you can sign up for one here.
To be eligible for the Bug Bounty Program, you must not:
- Be a resident of, or make your Submission from, a country against which the United States has issued export sanctions or other trade restrictions (e.g., Cuba, Iran, North Korea, Sudan and Syria);
- Be in violation of any national, state, or local law or regulation;
- Be employed by PayPal, Inc. or its subsidiaries;
- Be an immediate family member of a person employed by PayPal, Inc. or its subsidiaries or affiliates; or
- Be less than 14 years of age. If you are at least 14 years old, but are considered a minor in your place of residence, you must get your parent’s or legal guardian’s permission prior to participating in the program.
If PayPal discovers that you do not meet any of the criteria above, PayPal will remove you from the Bug Bounty Program and disqualify you from receiving any bounty payments. Any submissions you make to PayPal, whether via your Bug Bounty Program account or via email shall be considered “Submission(s)” for purposes of these Program Terms.
Bug Submission Requirements and Guidelines
In researching vulnerabilities on PayPal’s sites, you may not engage in testing that (i) results in a degradation of PayPal systems, (ii) results in you, or any third party, accessing, storing, sharing or destroying PayPal or customer data, or (iii) may impact PayPal customers, such as denial of service, social engineering or spam.
You may not publicly disclose your findings or the contents of your Submission in any way without PayPal’s prior written approval.
Failure to follow these guidelines will result in immediate disqualification from the Bug Bounty Program and ineligibility for receiving any bounty payments.
For all submissions, please include:
- Full description of the vulnerability being reported including the exploitability and impact
- Document all steps required to reproduce the exploit of the vulnerability
- Provide all:
- URL(s)/application(s) affected in the submission (even if you provided us a code snippet\video as well)
- IPs that were used while testing
- Always include the user ID that is used for the POC
- Always include all of the files that you attempted to uploaded
- Provide the complete PoC for your submission (e.g. For RCE’s do not change files, upload only “hello world” test files, etc.)
- Please save all the attack logs and attach them to the submission.
- Remote Code Execution (RCE) Submission Guidelines
- Failure to include any of the above items may delay or jeopardize the bounty payment.
Ownership of Submissions
As between PayPal and you, as a condition of participation in the PayPal Bug Bounty Program, you hereby grant PayPal, its subsidiaries, affiliates and customers a perpetual, irrevocable, worldwide, royalty-free, transferrable, sublicensable (through multiple tiers) and non-exclusive license to use, reproduce, adapt, modify, publish, distribute, publicly perform, create derivative work from, make, use, sell, offer for sale and import the Submission, as well as any materials submitted to PayPal in connection therewith, for any purpose. You should not send us any Submission that you do not wish to license to us.
You hereby represent and warrant that the Submission is original to you and you own all right, title and interest in and to the Submission. Further, you hereby waive all other claims of any nature, including express contract, implied-in-fact contract, or quasi-contract, arising out of any disclosure of the Submission to PayPal. In no event shall PayPal be precluded from discussing, reviewing, developing for itself, having developed, or developing for third parties, materials which are competitive with those set forth in the Submission irrespective of their similarity to the information in the Submission, so long as PayPal complies with the terms of participation stated herein.
Eligible Domains Policy
The following domains are included for the paypal.com family of companies:
- Braintree (test using sandbox.braintreegateway.com)
The Bug Bounty Program is also valid on certain Partner Sites**, such as:
- www.paypal-__.com domains
Please note that our partner sites (www.paypal-__.com) are mainly marketing based sites that are not part of the core PayPal customer domains (.paypal.com) and are managed by hosting vendor companies. They have variable timelines and are often decommissioned. A listing of these sites designated for deprecation will not be publically maintained due to frequent changes. When researching bugs on these sites, please keep this in mind as bug Submissions for sites on schedule for deprecation will not be honored.
Certain vulnerabilities are considered out-of-scope for the Bug Bounty Program. Those out-of-scope vulnerabilities include, but are not limited to:
- Vulnerabilities dependent upon social engineering techniques (e.g. shoulder attack, stealing devices, phishing, fraud, stolen credentials)
- Host Header
- Denial of service (DOS)
- Self-XSS (User defined payload)
- Login/logout CSRF
- Content spoofing without embedded links/HTML
- Vulnerabilities which require a jailbroken mobile device
- Clickjacking on partner sites (i.e., www.paypal-__.com domains)
- Infrastructure vulnerabilities, including:
- Certificates/TLS/SSL related issues
- DNS issues (i.e. mx records, SPF records, etc.)
- Server configuration issues (i.e., open ports, TLS, etc.)
- Most vulnerabilities within our sandbox, lab, or staging environments, except Braintree.
- Outdated web browsers: vulnerabilities contingent upon outdated or unpatched browsers will not be honored, including Internet Explorer versions prior to version 8
- Vulnerabilities involving active content such as web browser add-ons
- Information disclosure of public or information that does not present risk to our PayPal customers or PayPal (i.e. web server type disclosure)
- Most Connected Commerce Cloud (C3) submissions are out of scope
- We will review C3 submissions and depending upon the level of risk we will determine if this submission will be eligible
You may be eligible to receive a monetary reward, or “bounty,” if: (i) you are the first person to submit a site or product vulnerability; (ii) that vulnerability is determined to by a valid security issue by PayPal’s security team; and (iii) you have complied with all Program Terms.
Bounty payments, if any, will be determined by PayPal, in PayPal’s sole discretion. In no event shall PayPal be obligated to pay you a bounty for any Submission. All bounty payments shall be considered gratuitous.
In the event PayPal elects to pay you a bounty, PayPal may make a partial payment when the vulnerability is first verified by PayPal and then an additional payment once the vulnerability has been fixed. The format and timing of all bounty payments shall be determined in PayPal’s sole discretion.
All bounty payments must be made to a verified PayPal Account in good standing. If you do not have a verified PayPal Account in good standing at the time of payment, you will not be eligible to receive a bounty (except in extraordinary circumstances agreed to by PayPal via email from the Bug Bounty Program team).
All bounty payments will be made in United States dollars (USD). You will be responsible for any tax implications related to bounty payments you receive, as determined by the laws of your jurisdiction of residence or citizenship.
PayPal will determine all bounty payout based on the risk and impact of the vulnerability. The minimum bounty amount for a validated bug submission is $50 USD and the maximum bounty for a validated bug submission is $10,000 USD.
PayPal Bug Bounty Team retains the right to determine if the bug submitted to the Bug Bounty Program is eligible. All determinations as to the amount of a bounty made by the PayPal Bug Bounty Team are final.
+Payout ranges are based on the classification and sensitivity of the data impacted, ease of exploit and overall risk to PayPal customers, PayPal brand and determined to be a valid security issue by PayPal’s security engineers. Common sensitive data elements include customer social security number, credit card number, card verification code, bank account number, login credentials and passwords. PayPal may pay beyond the range at times when bugs are found to have significant risk.
#Please note that Clickjacking and CSRF vulnerabilities are only reviewed for sites and pages where the ease of exploit and risk to PayPal is significant. Also, please note that, while "Logout CSRF" is a well-acknowledged issue, there are other techniques (like "cookie forcing" and "cookie bombardment") that can make it futile to defend against this attack. Also, PayPal web sessions are relatively short lived and hence, the PayPal will not consider reports of the ability to log out users from PayPal as qualifying for a bounty.
Wall of Fame
In the event (i) you breach any of these Program Terms or the terms and conditions of the PayPal Agreements; or (ii) PayPal determines, in its sole discretion that your continued participation in the Bug Bounty Program could adversely impact PayPal (including, but not limited to, presenting any threat to PayPal’s systems, security, finances and/or reputation) PayPal may immediately terminate your participation in the Bug Bounty Program and disqualify you from receiving any bounty payments. Please see our recommendations on the proper procedures for testing our applications.
Any information you receive or collect about PayPal or any PayPal user through the Bug Bounty Program (“Confidential Information”) must be kept confidential and only used in connection with the Bug Bounty Program. You may not use, disclose or distribute any such Confidential Information, including, but not limited to, any information regarding your Submission and information you obtain when researching the PayPal sites, without PayPal’s prior written consent..
In addition to any indemnification obligations you may have under the PayPal Agreements, you agree to defend, indemnify and hold PayPal, its subsidiaries, affiliates and the officers, directors, agents, joint ventures, employees and suppliers of PayPal, its subsidiaries, or our affiliates, harmless from any claim or demand (including attorneys’ fees) made or incurred by any third party due to or arising out of your Submissions, your breach of these Program Terms and/or your improper use of the Bug Bounty Program.
Changes to Program Terms
The Bug Bounty Program, including its policies, is subject to change or cancellation by PayPal at any time, without notice. As such, PayPal may amend these Program Terms and/or its policies at any time by posting a revised version on our website. By continuing to participate in the Bug Bounty Program after PayPal posts any such changes, you accept the Program Terms, as modified.
Frequently Asked Questions
- Error messages void of sensitive data
- Web server type disclosure
- Clickjacking on pages without sensitive content, authentication, or state changing actions
- Self-XSS scenarios that would require additional user interaction, including the user manually inputting the XSS payload.
- Most vulnerabilities within our sandbox, lab or staging environments. Domains utilized by customers take precedence
- Please be aware of all program criteria and scope, as well as the Program Terms.
- Do not engage in testing that can impact our customers, like denial of service, social engineering or spam.
- When utilizing personal or test accounts, they are subject to our fraud controls and filters and may act upon irregular activity.
- A proof of concept consisting of detailed steps or screen shots is helpful in facilitation of review and eventual fix.
Remote Code Execution (RCE) vulnerabilities involve executing code on the web server, either via a direct command injection or through uploading an executable file. In order for RCE submissions to be considered for this program, they must adhere to these conditions:
- Source IP address
- Timestamp, including time zone
- Full server request and responses
- Filenames of any uploaded files, which must include “bugbounty” and the timestamp
- Callback IP and port, if applicable
- Any data that was accessed, either deliberately or inadvertently
- Directly injecting benign commands via the web application or interface (e.g. whoami, hostname, ifconfig)
- Uploading a file that outputs the result of a hard-coded benign command
- Uploading files that allow arbitrary commands (i.e. a webshell)
- Modifying any files or data, including permissions
- Deleting any files or data
- Interrupting normal operations (e.g. triggering a reboot)
- Creating and maintaining a persistent connection to the server
- Intentionally viewing any files or data beyond what is needed to prove the vulnerability
- Failing to disclose any actions taken or applicable required information
Failure to meet the above conditions and requirements could result in a forfeiture of any potential bounty.
Do - Provide a detailed description of the vulnerability being reported
Do - Define the Risk (Impact x Exploitability) of the vulnerability
Do - Provide all URL(s)/application(s) affected
Do - Provide all steps required to reproduce the exploit and the vulnerability
Do - Provide PoC video or screenshots with your submission
Do - Always include the user ID that is used for the PoC
Do – Submit end to end POC
Do - Always include all of the files that you attempted to uploaded
Do - Provide all IPs that were used while testing (especially important for things like RCE where another team will need this to investigate)
Do – Submit all pieces to an attack as they are required for validation
Do - Include the main domain (Example: XSS on paypal.com)
Don’t - Complete PoC’s that will cause harm to PayPal or our customers (i.e. Denial of service, tampering with sensitive data, etc.)
Don’t - Scan with an active scanner like Qualys, Nessus, Tripwire, or Burp Suite (passive is okay)
Don’t - Disclose information publicly prior to receiving the Bug Bounty team’s permission including if the vulnerability has been fixed
Don’t - Save proof of concept information in publicly available sources (i.e. Public YouTube videos, imgur links, or anything else someone can view without authentication)
Don’t – Submit the only the beginning piece of an attack and assume that it will work.
Don’t - Submit the same vulnerability twice instead of asking the status of the original
Don’t - Resubmit the same vulnerabilities again after they have been found to be not actionable due to low risk
Don’t - Group vulnerabilities into one single ticket that have different distinct remediation efforts
Don’t - Submit bugs that don’t affect the latest version of modern browsers (Chrome, Firefox, Safari), and Bugs related to browser extensions are also out of scope.
If you have PayPal account issues, please contact customer service. The PayPal Bug Bounty Team does not have visibility into your PayPal account and therefore cannot assist with such issues.