Otto.de is the second-largest online shop in Germany and its currently transitioning to be a leading platform that connects sellers and buyers. Our aim is to provide our customers with a one-stop shop that contains a vast and ever-expanding selection of products.
At otto.de, security is an important component of our organizational culture; we take security issues seriously and work closely with our development teams to not only ensure security during our software development process, but also validate these assumptions through security testing.
This Bug Bounty program is the next logical step that serves as an additional security layer that helps further elevate the privacy and security posture of our site.
We thank you for joining our Private Program and for your help keeping Otto.de safe!
Report security bugs no later than 24 hours after discovery and exclusively through yeswehack.com
We will respond to you in a timely manner
We will work with you and keep you updated while working on a fix that addresses your reported bug
We reserve the right to cancel this program or change its scope at any time
Compliance with the Permitted Services and Prohibited Activities sections within the Amazon Web Services Penetration Testing guidelines is required.
Any non-security related issue will not be eligible for a money reward.
To be eligible for a reward, we require that issues being reported have an actual security impact in a realistic scenario.
Otto will ultimately determine, at our own discretion, whether a reward should be granted. But we aim to be fair and look forward to your contributions.
In order to qualify for a reward, you must strictly adhere to the following eligibility requirements:
You must be the first reporter of a vulnerability (any duplicate reports will not be rewarded)
The reported bug must be a qualified vulnerability according to Scope, Qualifying and Non-Qualifying Vulnerabilities (see below)
You must send a clear textual description of the bug report along with possible real world attack scenarios and steps to reproduce the issue, please include attachments such as screenshots or proof of concept code to increase your chances of getting rewarded.
You must not be a former or current employee of OTTO or one of its affiliates / contractors.
Vulnerability disclosure of any kind (public, partial, social media, etc) is strictly forbidden
While looking for vulnerabilities you are bound to the rules defined by existing laws especially those concerning GDPR.
Discovered vulnerabilities may not be exploited, not even to find additional problems
Prohibited are non-technical attacks such as social engineering, phishing or physical attacks
The following are examples of how to prove a vulnerability to us:
XSS verification:
Allowed: alert(17)
Prohibited: Including external scripts
SQL Injection:
Allowed: Extracting the DBMS’s version number
Prohibited: Access to tables containing actual content such as customer data
Code Injection:
Allowed: Extracting the operating system user’s ID that is used to run the code with onboard tools (e.g. “id” or “whoami”)
Prohibited: Executing external code
Creating, altering or deleting data or settings:
Allowed: Altering one’s own data
Prohibited: Altering data of third persons or central data such as configuration settings; Deletion of data
Sending unwanted notifications
Allowed: One-time usage of a contact form
Prohibited: Mass distribution of messages via a contact form; Distribution to third parties
We ask that you fully read and understand our Program Rules and Eligibility & Disclosure Policy before you begin testing.
In the context of this program, we do not accept or reward reports of leaks that are not applicable to our program’s scope and identified outside of our program’s scope.
Also, in order not to encourage dark and grey economies, in particular the purchase, resale and trade of identifiers or stolen information, as well as all types of dangerous behavior (e.g. social engineering, ...), we will not accept or reward any report based on information whose source is not the result of failure on the part of our organization or one of our employees/service providers.
To summarize our policy, you may refer to this table :
Type of leak | Source of leak is in-scope | Source of leak belongs to MyCompany but is out-of-scope | Source of leak does not belong to MyCompany and is out-of-scope |
---|---|---|---|
Impact is in-scope (e.g. valid credentials on an in-scope asset) | Eligible (✅) | Eligible (✅) | Not eligible (❌) |
Impact is out-of-scope (e.g. valid credentials for an out-of-scope asset) | Eligible (✅) | Not eligible (❌) | Not eligible (❌) |
This excludes, but is not limited to:
For subdomain takeovers that are not within the defined scope but still present a valid proof of concept, a reward of €250 will be granted. We reserve the right to apply the "OneFixOneReward" rule, if multiple subdomains can be attributed to the same team. This is often identifiable by the third level of the subdomain name, such as {TEAM}.[bi|platform|cloud].otto.de. If multiple subdomains for the same team are identified, a single compensation of €250 will be provided, regardless of the number of subdomains.
As a complement to the Program’s rules and testing policy :
Scope Type | Scope Name |
---|---|
android_application | https://play.google.com/store/apps/details?id=de.cellular.ottohybrid&hl=de |
ios_application | https://apps.apple.com/de/app/otto-shopping-m%C3%B6bel/id404844644 |
web_application | https://www.otto.de |
web_application | https://www.otto.de/jobs |
web_application | https://www.lascana.de/ |
web_application | https://teleoptiprd.otto.de |
web_application | https://mmp.otto.de |
web_application | https://partnerprogramm.otto.de |
web_application | https://orbidder.otto.de |
web_application | https://supplier-connect.otto.de |
web_application | https://retail-api.otto.de |
Scope Type | Scope Name |
---|---|
undefined | Those include but are not limited to (if unsure, contact us before executing the tests): |
undefined | All domains not listed In-Scope |
undefined | /apps-messenger (the chatbot in general is out of scope) |
undefined | /tracking |
undefined | Please let us know if you have any questions regarding the scope. |
web_application | Out-Of-Scope are also other applications hosted under the www.otto.de domain but have a different path, that is not part of our core online shop itself (you will notice, since the design of the page is completely different) |
web_application | https://www.otto.de/reblog |
web_application | https://www.otto.de/roombeez |
web_application | https://www.otto.de/twoforfashion |
web_application | https://www.otto.de/soulfully |
web_application | https://www.otto.de/updated |
web_application | https://www.otto.de/newsroom |
web_application | https://www.otto.de/kundenchat |
web_application | https://www.otto.de/clara |
web_application | https://www.otto.de/user/sendcallbackrequest |
web_application | https://www.otto.de/user/contactFormSubmit |
web_application | https://keycloak.apps.otto.de |
Firebounty have crawled on 2024-10-01 the program OTTO.DE Bug Bounty on the platform Yeswehack.
FireBounty © 2015-2025