|Scope Type||Scope Name|
|undefined||Any resource created or accessed with the Outscale Cloud|
Out of Scope
|Scope Type||Scope Name|
|undefined||Other subdomains on outscale.com (wiki.outscale.net, fr.outscale.com, en.outscale.com... )|
|undefined||Social engineering of Outscale employees and contractors|
|undefined||Attack against Outscale offices (malware, backdoor, DoS, etc.)|
|undefined||Denial of service attacks|
|undefined||Vulnerabilities on products or services other than Cockpit or APIs|
|undefined||Issues in our DNS and NTP|
|undefined||Same behavior as Amazon Web Services|
|undefined||E-mail server configuration (DKIM/SPF/DMARC)|
|web_application||Issues not leading to confidentiality, traceability or integrity problems. You can report it to firstname.lastname@example.org.|
Outscale, an IaaS Cloud provider, is looking for any security-oriented feedback. We used to limit this Bug Bounty program to our Client Administration Website (Cockpit) and part of our APIs, but now we are exposing (most of) our client accessible endpoints for your greatest pleasure (yes, including our Cloud resources)!
Want to know the target? It's simple! We want you to find any ways of accessing other people’s resources, or anything impacting their customer experience or the infrastructure itself!
Is that it? Are you enthralled? Are you ready to make your pentesting tools armada let out an enthusiastic roar?
Then read the rest of this page to avoid losing precious time and points by reporting Out of Scope vulnerabilities, and get to know us a bit more at the same time.
Founded in 2010, strategic partner of Dassault Systèmes and CMSP Advanced certified by Cisco Systems, Outscale provides enterprise-class Cloud Computing services (IaaS) that meet regulatory and local requirements internally. Outscale offers solutions to clients seeking to boost their Business Agility and rapidly deploy value-enhancing business models. Investing 15% of its revenues in R&D from the very beginning, Outscale is committed to offer services that combine excellence and reliability, which have won over more than 800 corporate clients in France, the USA, and China, as well as several hundred users working for well-known multinationals via Dassault Systèmes. Outscale has received ISO security certification 27001-2013 for all its French locations.
Outscale develops its own Cloud orchestrator, TINA OS, with strong security requirements and which provides many additional products around this infrastructure.
As Outscale is compatible with AWS EC2, our infrastructure has a similar architecture.
We have public websites (https://outscale.com/) which are not in the scope , and which are not part of our products.
We have several APIs aiming to manage specific resources in the Cloud:
We also have a web interface, Cockpit, built on top of our APIs, allowing our clients to interactively manage their resources in our Cloud:
Our documentation can be found at the following locations:
( Those ARE NOT in the scope. )
The points of focus for vulnerability must be on:
The availability of the scope is not covered by this bounty program (denial of
services is not allowed). Only exploitable vulnerabilities are covered.
A proof of concept must be provided in the report regarding vulnerabilities.
Customers with Cloud resources are not concerned by this bounty. Snapshots and images provided by Outscale are not concerned either.
Keep in mind that this is a production environment: no data alteration is allowed inside Outscale infrastructure or on Outscale customers Cloud infrastructure. You must not affect the availability of the platform.
If you have any doubts on whether you can test something or not, or if you want to make sure you are allowed to do something specific, you can send us an e-mail at email@example.com.
Outscale will determine, at its discretion, whether a reward should be granted, and the amount of this reward. We may choose to pay higher rewards for severe vulnerabilities or lower rewards for vulnerabilities that are considered less severe. This is not a competition.
Our Security team will review each committed finding and contact you as soon as possible to reproduce and solve the reported vulnerability. Please allow 5 working days for our initial reply. We ask you to make a good-faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our services during your research.
In case of problem, you can send an e-mail to firstname.lastname@example.org.
We are able to help you with the cloud itself ( if you need help understanding behaviors ), and are willing to help you move forward when you feel like you found something but fail to exploit it.