MSCI Breadcrumb
导航菜单
- Terms of use
- Additional Terms of Use – MSCI ESG Research LLC
- Privacy notice
- Cookie Notice
- Operational Resiliency
- Information Security
- MSCI third party notices
- Supplier Code of Conduct
- Modern Slavery Statement
- Index Terms
- Local Requirements
- U.K. Tax Strategy
- Notice & Disclaimer
- Notice and Disclaimer for Reporting Licenses
- Notice and Disclaimer for Blended Index Return(s)
- Mobile application terms of use
- Provisional Rating
- Services Supplements
- SPO Disclaimer
- DMCA Notice and Copyright Takedown Policy
- Data Contributor Terms
- Client Provided Data Terms
- Private Company Data Connect Service Terms
- Disclosures
Title - Responsible Disclosure
Responsible Disclosure
Helping safeguard our data through responsible reporting
Intro - Responsible Disclosure
At MSCI, we take cybersecurity seriously and appreciate the vital role the security community plays in helping to protect our systems and our clients.
If you believe you’ve discovered a potential security vulnerability, we encourage you to report it responsibly through our disclosure process. Your contributions help safeguard the integrity, privacy and trust our clients expect when it comes to securing their data.
Please use our submission form to report a vulnerability and follow the responsible disclosure guidelines, including a clear description of:
- The issue and where it was found.
- Steps required to reproduce the vulnerability.
1 Guidelines - Responsible Disclosure
Responsible disclosure guidelines
Researchers participating in our program must adhere to the following guidelines to disclose a potential vulnerability:
- Do not engage in any activity that could harm MSCI, our customers or employees.
- Do not engage in any activity that could disrupt or degrade MSCI services or assets.
- Do not initiate a fraudulent financial transaction.
- Do not engage in any activity that violates (a) federal or state laws or regulations or (b) the laws or regulations of any country where (i) data, assets or systems reside, (ii) data traffic is routed or (iii) you are conducting research activity.
- Do not store, share, compromise or destroy MSCI or customer data. If you encounter personally identifiable information (PII), immediately halt your activity, purge any related data from your system and contact MSCI using the submission form. This step protects you as well as any potentially vulnerable data.
- Do not perform automated scanning or testing.
Please allow MSCI reasonable time to resolve any reported issues before disclosing the information publicly or to a third party.
MSCI agrees not to pursue legal action against you if you adhere to these guidelines when submitting a report. We reserve all legal rights in the event of noncompliance with these guidelines.
2 Vulnerabilities - Responsible Disclosure
Accepted vulnerabilities
- Any included in the top 10 vulnerability categories designated by the Open Worldwide Application Security Project (OWASP)
- Other vulnerabilities with demonstrated impact
3 Out of scope - Responsible Disclosure
Out of scope techniques and methods
Certain vulnerabilities — due to either low impact or irrelevance — are beyond the scope of our Responsible Disclosure Program, including:
- Physical testing
- Social engineering or phishing
- Denial of service attacks
- Resource exhaustion attacks
- Attacks requiring MITM or physical access to a user’s device
- Google Maps Platform API keys
- Account/e-mail enumeration using brute-force attacks
- Any low impact issues related to session management such as concurrent sessions, session expiration or password reset/change logout
- Clickjacking/UI redressing
- Client-side application/browser autocomplete or saved password/credentials
- Descriptive or verbose error pages with no proof of exploitability or obtaining sensitive information. Information sensitivity determined by MSCI
- Directory structure enumeration, unless the fact reveals exceptionally useful information
- Incomplete or missing SPF/DMARC/DKIM records
- Issues related to password/credential strength, length, lock outs or lack of brute-force/rate limiting protections
- Leaking session cookies, user credentials or other sensitive data will be reviewed on a case-by-case basis
- If leaking of sensitive data requires MITM positioning to exploit, it will be considered out of scope
- Login/logout/unauthenticated/low-impact CSRF
- Low impact information disclosures, including software version disclosure
- Missing cookie flags
- Missing/enabled HTTP headers/methods that do not lead directly to a security vulnerability
- Reflected file download attacks (RFD)
- SSL/TLS best practices that do not contain a fully functional proof of concept
- Heartbleed requires a valid POC which shows sensitive data leakage. Information sensitivity determined by MSCI
- POODLE requires a POC demonstrating a downgrade, not just the result of SSLScan or Nmap scan
- URL redirection
- Use of a known vulnerable library which leads to a low-impact vulnerability, such as an outdated version of jQuery leading to low impact XSS
- Valid bugs not directly related to security posture of client
- Vulnerabilities affecting users of outdated browsers, plugins or platforms
- Vulnerabilities that allow for injection of arbitrary text but not of hyperlinks, HTML or JavaScript code
- Vulnerabilities that require the user/victim to perform extremely unlikely actions, such as self-XSS
- Any type of XSS that requires a victim to press an unlikely key combination, such as alt+shift+x for payload execution
4 Disclosing - Responsible Disclosure
Disclosing a vulnerability
Use our embedded submission form to make a disclosure.
< webform customization to be provided by App Sec, aligning to our branding and style sheet >
Visit our Information Security Program page for more information on how we secure our data, systems and services.