This program is intended as a responsible vulnerability disclosure program for WestJet. If you have found a security issue in a WestJet owned property, please use the submit button in the upper right hand area to submit your report. We appreciate your effort in making WestJet more secure, and thank you for your report! Good luck and happy hunting!
For the initial prioritization/rating of findings, this program will use the Bugcrowd Vulnerability Rating Taxonomy. However, it is important to note that in some cases a vulnerability priority will be modified due to its likelihood or impact. In any instance where an issue is downgraded, a full, detailed explanation will be provided to the researcher - along with the opportunity to appeal, and make a case for a higher priority.
Please note that in some cases, a vulnerability found and raised against one target may also be applicable to another target due to the nature of our environment configuration. As such, remediation may be applied across our environment and a reward will be paid to the first finding only. Our recommendation is that you submit one report outlining the impact across multiple targets in order to demonstrate impact and receive the most timely response possible from our team
This program follows Bugcrowd’s standard disclosure terms.
For any testing issues (such as broken credentials, inaccessible application, or Bugcrowd Ninja email problems), please email support@bugcrowd.com. We will address your issue as soon as possible.
Scope Type | Scope Name |
---|---|
web_application | www.westjet.com |
web_application | www.flyswoop.com |
Scope Type | Scope Name |
---|---|
api | travel.westjet.com |
web_application | biz.westjet.com |
This policy crawled by Onyphe on the 2020-08-27 is sorted as bounty.
FireBounty © 2015-2024