Okta Vulnerability Disclosure Policy
Okta Vulnerability Disclosure Policy
We believe community researchers play an integral role in maintaining Okta as a secure service and helping
to protect our customers and their data. Our aim is to do what's best for our users, customers, partners, and
the general health of the Internet.
We appreciate all security submissions from the research community and strive to respond in an expedient
manner. We will investigate legitimate reports and do our best to quickly fix any identified issues. Our
investigation panel consists of members from the Okta Security Team.
Please submit your report to our team as soon as you believe you have found a security vulnerability. All
submissions must meet the terms of this Vulnerability Disclosure Policy (“policy”).
● If you would like to publish your findings, the coordinated disclosure terms below apply and you
must submit the report directly to us at [email protected], preferably via PGP, or other secure
communication (like keybase or Signal).
● If you would like to be rewarded, the standard disclosure terms apply and you must submit via
Bugcrowd to be rewarded for your submission.
In-scope and out-of-scope targets are described in our Bugcrowd program terms. The same scope applies
whether you are submitting a finding under standard disclosure terms through Bugcrowd or our coordinated
disclosure terms (described below).
Please understand that third party services not owned by Okta (such as apps integrated as part of the Okta
Integration Network) are not eligible. While we strive for secure integrations, we cannot ensure that our
policies apply to the services of other companies.
We base all payouts on impact - when in doubt, the question always comes down to the potential impact of
the vulnerability (i.e., what can actually be done with the vulnerability and what is the consequence to Okta).
If you can demonstrate why a finding has significant impact, then please submit that information.
For example, if the vulnerability you identify is that you are a limited admin and have the ability to see user
logs not assigned to your user role, then we would examine the impact of this exploit. If the impact is high
and allows you to compromise another aspect of the service, we ask that you detail the full exploit chain and
report. However, if the only impact results in reading logs, then there is no need to report it because it would
be classified as a business logic read issue.
Chaining bugs
Chaining of bugs is not frowned upon in any way: we love to see clever exploit chains! However, if you have
managed to compromise an Okta-owned server, we do not allow for escalations such as port scanning
internal networks, privilege escalation attempts, attempting to pivot to other systems, etc.
If you get this level of access to a server, please report your findings to us immediately and we will reward
you with an appropriate bounty, taking into full consideration the severity of what could be done. Ex.:
Chaining a CSRF vulnerability with a self XSS? Nice, report it to us! Using AWS access key to dump sensitive
info? Not cool (and against our policy).
Reporting
Valid reports
We ask that you write clear and concise reports to enable us to make a determination. Please make sure to
include your methodology, step-by-step, and only submit after you verify your bug. Please use the following
template:
CVSS V3 X.X
Description:
<Fully describe the issue and impact.>
Step-by-Step Proof of Concept:
<Step-by-step technical details to reproduce the issue. Please provide as much detail as possible to
allow us to quickly triage and respond.>
Recommendations:
<This is optional, but we appreciate feedback from researchers. >
Timeline:
<This is optional, but it’s helpful for researchers to keep a timeline of communications so that all
parties are in sync.>
Full Write-Up:
<This is optional, but we recognize that some vulnerabilities require a longer explanation, details, or
other background. We reserve this section for such items.>
If you comply with the terms of this policy when reporting a potential security issue to us, whether directly or
through Bugcrowd, we will not pursue civil action or file a complaint with law enforcement for accidental,
good faith violations of this policy. We consider activities conducted consistent with this policy to constitute
“authorized” conduct under the Computer Fraud and Abuse Act. We will not bring a Digital Millennium
Copyright Act claim against you for circumventing the technological measures we have used to protect the
applications in scope.
If legal action is initiated by a third party against you and you have complied with this policy, including any
applicable program rules or other incorporated terms, Okta will take steps to make it known that your actions
were conducted in compliance with this policy.
Okta takes a responsible disclosure stance for vulnerabilities submitted to us directly. If you disclose a bug
to us directly, then you agree to give us a reasonable amount of time to investigate the bug and fix the issue
before making any public disclosure or sharing the information with any other person or third party.
We will strive to fix this, allow disclosure within industry standard timelines and may extend this period as
needed based on the vulnerability, complexity, and potential effects. If for some reason, we need to extend
this timeline, we’re happy to work together with you to determine whether to proceed with publication and
appreciate any prior notice. We request that you run your publication content by us in advance of sharing it
publicly. If the vulnerability is novel or impactful, we intend to publicly share details around the vulnerability
and coordinate with you on reasonable timing. Reasonable response times to fixing vulnerabilities help
create a safer Internet for everyone.
If you choose to be compensated for your bug and submit your findings via our program on Bugcrowd, then
you may not disclose the bug publicly or to any other person or third party. These submissions will be
governed by Bugcrowd’s Standard Disclosure Terms and the bounty rewards payment you receive is subject
to the terms therein.
F. PAYOUTS
G. OTHER TERMS
The following terms apply to this policy and to any rewards paid to you for disclosing vulnerabilities through
Bugcrowd:
● The “terms applicable to all research” in the Vulnerability Disclosure Policy Supplemental Terms,
including the sections: (i) Okta’s Rights to Fully Exploit Submissions, (ii) Trademark, (iii) Confidentiality,
(iv) Limitation and Liability, and (v) Miscellaneous are incorporated within this policy and apply to all
research and reports you submit.
● You must comply with all applicable laws and must not compromise or disrupt any data that is not
your own. You are responsible for any tax implications for bounty rewards depending on your
country of residency and citizenship. There may be additional restrictions on your ability to submit
depending upon your local law.
● Reports from individuals who we are prohibited by law from paying are ineligible for bounty rewards.
Employees and their family members are not eligible for bounty rewards. You must be at least 18
years old or have reached the age of majority in your jurisdiction of primary residence and citizenship
to be eligible to receive any bounty reward.
● We may modify the terms of this program or terminate this program at any time. The decision as to
whether or not to pay a reward has to be entirely at our discretion. We won’t apply any changes we
make to these program terms retroactively.
● Okta can use and share your findings and submissions in any way for any purpose.
Thanks for submitting a vulnerability report and collaborating with us to improve security!