100910 policies in database
Link to program      
2025-04-01
Louis Vuitton Malletier - Public Bug Bounty Program logo
Thank
Gift
HOF
Reward

Reward

Louis Vuitton Malletier - Public Bug Bounty Program

About us

Louis Vuitton Malletier, commonly known as Louis Vuitton is a French fashion house and luxury goods company founded in 1854 by Louis Vuitton. The label's LV monogram appears on most of its products, ranging from luxury trunks and leather goods to ready-to-wear, shoes, watches, jewellery, accessories, sunglasses and books. Louis Vuitton is one of the world's leading international fashion houses; it sells its products through standalone boutiques, lease departments in high-end department stores, and through the e-commerce section of its website.

Program Rules

About the scope of this program

Regarding https://[it | fr | us | sg | …].louisvuitton.com, our program is limited to our e-commerce web application and its API. You may hunt on all country locals linked to *.louisvuitton.com (e.g. fr.louisvuitton.com, us.louisvuitton.com, au.louisvuitton.com, ...) but other subdomains are out of the scope of this program. You may refer to the following page which lists our country locals : https://eu.louisvuitton.com/dispatch?noDRP=true.

In addition to the ecommerce scope mentioned above you're welcome to test api.louisvuitton.com and other subdomains of .api.louisvuitton.com*, the rest of .louisvuitton.com* is to be considred as out of scope.

We ask you to respect the scope of our program and to don't hunt outside of it. Should you need to report anything outside of the scope of this program you may do so through our VDP program here https://vdp.louisvuitton.com/.

Temporary exclusion on *.jsp

XSS and similar issues (e.g. open redirect, CSRF, HTMLi) will be considered as non qualifying issues for the time being on *.jsp for https://[it | fr | us | sg | …].louisvuitton.com.

Testing Policy and Responsible Disclosure

Please adhere to the following rules while performing research on this program:

  • Denial of service (DoS) attacks on our applications, servers, networks or infrastructure are strictly forbidden.
  • Avoid tests that could cause degradation or interruption of our services.
  • Do not use automated scanners or tools that generate large amount of network traffic.
  • Do not leak, manipulate, or destroy any user data or files in any of our applications/servers.
  • Do not copy any files from our applications/servers and disclose them.
  • No vulnerability disclosure, full, partial or otherwise, is allowed.

Reward Eligibility and Amount

We are happy to thank everyone who submits valid reports which help us improve our security, however only those that meet the following eligibility requirements may receive a monetary reward:

  • You must be the first reporter of a vulnerability.
  • The vulnerability must be a qualifying vulnerability (see below).
  • The report must contain the following elements:
    • Clear textual description of the vulnerability, how it can be exploited, the security impact it has on the application, its users and our organisation, and remediation advice on fixing the vulnerability
    • Proof of exploitation: screenshots demonstrating the exploit was performed, and showing the final impact
    • Provide complete steps with the necessary information to reproduce the exploit, including (if necessary) code snippets, payloads, commands etc
  • You must not break any of the testing policy rules listed above.
  • You must not be a former or current employee of our organisation or one of its contractors.
  • If you find the same vulnerability several times, please create only one report and eventually use comments. You'll be rewarded according to your findings.

Reward amounts are based on:

  • Reward grid of the report's scope
  • CVSS scoring and actual business impact of the vulnerability upon performing risk analysis

Important precautions and limitations

As a complement to the Program’s rules and testing policy :

  • DO NOT alter compromised accounts by creating, deleting or modifying any data
  • DO NOT use compromised accounts to search for post-auth vulnerabilities (they won’t be eligible anyway)
  • DO NOT include Personally Identifiable Information (PII) in your report and please REDACT/OBFUSCATE the PII that is part of your PoC (screenshot, server response, JSON file, etc.) as much as possible.
  • In case of exposed credentials or secrets, limit yourself to verifying the credentials validity
  • In case of sensitive information leak, DO NOT extract/copy every document or data that is exposed and limit yourself to describe and list what is exposed.

In Scope

Scope Type Scope Name
android_application

https://play.google.com/store/apps/details?id=com.vuitton.android&hl=fr&gl=US

api

*.api.louisvuitton.com

api

https://horizonv2prodapi.azurewebsites.net

ios_application

https://apps.apple.com/fr/app/louis-vuitton/id709101942

ios_application

https://apps.apple.com/fr/app/louis-vuitton-city-guide/id1014618396

web_application

https://[it | fr | us | sg | …].louisvuitton.com

web_application

https://appgallery.huawei.com/#/app/C102099703?locale=zh_CN&source=appshare&subsource=C102099703

Out of Scope

Scope Type Scope Name
undefined

All domains, subdomains or assets not listed in the above list of 'Scopes' must be considered as out of the scope of this program

web_application

*.louisvuitton.com


Firebounty have crawled on 2025-04-01 the program Louis Vuitton Malletier - Public Bug Bounty Program on the platform Yeswehack.

FireBounty © 2015-2025

Legal notices | Privacy policy