Report & Security Issues

If you've found a safety vulnerability on cartlos.com, we encourage you to message us quickly. we'll review all rightful vulnerability reports and may do our utmost to quickly resolve the matter. Before you report, please review this document, including fundamentals , bounty program, reward guidelines, and what should not be reported.

 

 

 

 

 

 

 

FUNDAMENTALS

 

 

 

 

 

 

 

If you agree with the policies below when reporting a security issue to cartlos.com we'll not initiate a lawsuit or enforcement investigation against you.

 

 

 

 

 

 

 

WE ASK THAT

 

 

 

You give us reasonable time to review and repair a report before making public any information about the report or sharing such information with others.

 

You don't interact with a personal account (which includes modifying or accessing data from that account) if the account owner has not consented to such actions.

 

You make an honest faith effort to avoid privacy violations and disruptions to others.

 

 

 

 

 

BOUNTY PROGRAM

 

 

 

Report a security bug: that's. Identify a vulnerability in our services or infrastructure which creates a. security or privacy risk.

 

If you inadvertently cause a privacy violation or disruption (such as accessing account data, service configurations, or other confidential information) while investigating a bug, inform disclose this in your report.

 

Submit your report via our security center at support@cartlos.com.

 

We reserve the right to publish reports.

 

 

 

 

 

REWARDS

 

 

 

Bounty rewards are supported the impact of a vulnerability.

 

Vulnerabilities that cause a privilege escalation on the platform from unprivileged to admin, allows remote code execution, financial theft, etc. are getting to be awarded one bounty.

 

Amounts below are the utmost we'll pay per level, all reward amounts are at our discretion.

 

Examples:

 

 

 

Remote Code Execution

 

Remote Shell/Command Execution

 

Vertical Authentication bypass

 

SQL Injection that leaks targeted data

 

Get full access to accounts

 

High severity Vulnerabilities ($100): Vulnerabilities that affect the security of the platform including the processes it supports.

 

 

 

 

 

Examples:

 

 

 

Lateral authentication bypass

 

Disclosure of important information within the company

 

Stored XSS for an extra user

 

Local file inclusion

 

Insecure handling of authentication cookies

 

Medium severity Vulnerabilities ($50): Vulnerabilities that affect multiple users, and wish little or no user interaction to trigger.

 

 

 

 

 

Examples:

 

 

 

Common logic design flaws and business process defects

 

Insecure object of the verb References

 

Low severity Vulnerabilities: Issues that affect singular users and wish interaction or significant prerequisites (MITM) to trigger.

 

Examples:

 

 

 

Open redirect

 

Reflective XSS

 

Low sensitivity Information leaks

 

If you have any more queries, please contact us.

 

 

 

CONTACT US

 

Mailing Address: 4300 Stine Rd Ste 100 Bakersfield, CA 93313, United States

E-mail Address: support@cartlos.com

Phone Number: +1 201-361-5924