All Collections
Security Center
Reporting Security Vulnerabilities
Reporting Security Vulnerabilities
Kenny Dickie avatar
Written by Kenny Dickie
Updated over a week ago

If you believe that you have found a security vulnerability on Socrative, we encourage you to let us know straight away. We will investigate all legitimate reports and do our best to quickly fix the problem. Before reporting though, please review this page, including our responsible disclosure policy.

Scope

The only target in scope is b.socrative.com. All others such as help.socrative.com, etc. are out of scope.

Responsible disclosure policies

Socrative aims to keep its service safe for everyone, and data security is of utmost priority. If you're a security researcher and have discovered a security vulnerability in the service, we appreciate your help in disclosing it to us in a responsible manner. In return, we promise to investigate reports promptly.

While we encourage you to discover and report to us any vulnerabilities you find in a responsible manner, the following conduct is expressly prohibited:

  • Performing actions that may negatively affect Socrative or its users (e.g. Spam, Brute Force, Denial of Service, etc).

  • Accessing, or attempting to access, data or information that does not belong to you. If you want to test cross-account access please sign up for additional free accounts.

  • Destroying or corrupting, or attempting to destroy or corrupt, data or information that does not belong to you.

  • Performing automated vulnerability scans.

  • Attempting non-technical attacks such as social engineering, phishing, or physical attacks against our employees, users, or infrastructure.

  • Theoretical XSS or Self-XSS attacks without evidence of exploitability, such as input being reflected in response.

  • Email and account policies such as reset method and password complexity.

Other important responsible disclosure policies to make note of:

  • The target URL is the same used by our customers. Please keep this in mind and act accordingly.

  • No attacks against Socrative's existing user base.

  • No phishing.

  • No DDoS attacks.

  • This is Socrative's primary production environment. We accept valid PoCs of app-level Denial of Service vulnerabilities, but PoCs that intentionally stress or risk the availability of our services will be considered abuse.

  • Do not create more than 3 accounts as part of your testing. Failure to comply may result in your account access being blocked.

  • You agree to obey all restrictions in Socrative Terms of Use.

Confidentiality

All submissions made to Socrative shall be Socrative’s “Confidential Information” and must be kept confidential and only used in connection with the researcher’s activities in connection with this Policy. You may not use, disclose or distribute any such Confidential Information without Socrative's prior written consent.

In the event that your security vulnerability results in any unauthorized access to or disclosure of “personal information”, you agree that you shall not export, collect or otherwise use such personal information and you shall notify Socrative immediately of any access to or disclosure of such information.

Vulnerability Classification

Declined

False-positive and/or very minor criticality that will not result in a change of code.

Duplicate

We are aware of the issues from any other source.

Low

Vulnerabilities like insecure cookies, clickjacking or insufficient 
password complexity are generally of low criticality as they are
dependant on other issues and cannot be exploited by themselves.

Medium

Cross-site request forgery (XSRF or CSRF) vulnerabilities or those 
that might result in the changing of user's data.

High

Vulnerabilities of high criticality are those that would result in 
bypassing authentication. An example of a high critical vulnerability
is a successful SQL-injection that could be used to read data, delete
users, or other kinds of database modifications.

We use OWASP_Risk_Rating_Methodology as our classification guide.

Liability and Indemnification

We won’t take legal action against those who discover and report security vulnerabilities in good faith and otherwise accordance with this Responsible Disclosure Policy. Socrative reserves all of its legal rights in the event of any noncompliance with this Policy or its Terms of Use.

Socrative shall have no liability to you for any losses or damages caused by your research or discovery of any bug or security vulnerability. You hereby agree to defend, indemnify and hold harmless Showbie Inc., its affiliates and each of their officers, directors, employees and agents from and against any claims, liabilities or losses arising from your breach of this Policy or Socrative’s Terms of Use.

Compensation Requests

Socrative may choose to compensates security researchers based on the following factors:

  • The severity of the issue identified (we use the OWASP Risk Rating Methodology).

  • The quality of the reporting.

  • Socrative’s internal risk assessment of the issue.

  • Whether or not the issue has already been disclosed to Socrative prior to your submission (we only pay out once per issue).

Socrative will work with the researcher to facilitate payment. Payment amounts are entirely at Socrative’s discretion — which is something you agree to when submitting bugs as part of this program. You are responsible for paying any taxes associated with your receipt of compensation.

In order to be eligible to receive compensation, the following requirements and guidelines apply to all researchers submitting bug reports:

  • The researcher submitting the bug must not be a current of former (in the past six months before making the submission) employee of subcontractor of Socrative or any of its affiliates, or an immediate family member or household member of an employee of Socrative or any of its affiliates.

  • The researcher submitting the bug must not be the author of the vulnerable code.

  • The researcher must not disclose the bug publicly before a fix is released or otherwise try to exploit it

How to report security vulnerabilities

Please do not publicly disclose these details without the express written consent from Socrative.

When reporting a vulnerability, please provide as much detail as you can, to help us with validation and reproduction of it.

Your input and feedback on our security are always appreciated. As much as we want to respond to all reports, it’s not feasible for us to do so. We typically only reward vulnerability reports that are classified as High.

Reports classified as Low, Duplicate, Declined will usually not receive a response but will be added to our internal issue tracker.

When reporting any suspected vulnerabilities, please use Socrative's security vulnerability reporting form.

Did this answer your question?