Banner object (1)

Hack and Take the Cash !

693 bounties in database
13/12/2018

Telefónica Germany

If you find a vulnerability in one of our systems, we are happy to give you the opportunity to report this finding using our Responsible Disclosure Program.

For the time being disclosed vulnerabilities are not monetarily rewarded, however future changes to the award of findings are not excluded. Excluded from awards are legal representatives, current and former employees of Telefónica Germany GmbH & Co. OHG and its connected businesses and their employees. Minors may only participate with agreement of their legal representatives.

Our understanding of Responsible Disclosure

To responsibly disclose a detected vulnerability in one our systems:

  • Understand that all valid reports will be taken seriously by our teams; this in mind, do give us a reasonable period of time to evaluate the submission and respond accordingly.
  • While testing our systems you make every effort not to damage or restrict the availability of products, services or infrastructure.
  • You do not use a detected vulnerability to obtain more data than necessary for proving the vulnerability. Do not leverage any found vulnerability to obtain, spy, modify, delete or distribute any personal or sensitive data.
  • You agree to delete all personal and confidential information obtained during testing.
  • We will treat your submission confidentially and will not share your personal data with others unless required by law or judgement. It is possible to make your submission anonymously.
  • We will not legally pursue testing activity and submissions which respect the terms and scope set forth here.

Ratings:

For the initial prioritization/rating of findings, this program will use theBugcrowd Vulnerability Rating Taxonomy. However, it is important to note that in some cases a vulnerability priority will be modified due to its likelihood or impact. In any instance where an issue is downgraded, a full, detailed explanation will be provided to the researcher - along with the opportunity to appeal, and make a case for a higher priority.

This program only awards points for submissions.

Targets

In scope

Target name | Type
---|---
*.telefonica.de | Website
*.next.telefonica.de | Website
*.o2online.de | Website
*.o2.de | Website
*.blau.de | Website
*.ayyildiz.de | Website
*.base.de | Website
*.fonic.de | Website
*.fonic-mobile.de | Website
*.netzclub.net | Website
*.ortelmobile.de | Website
*.alditalk-kundenbetreuung.de | Website
*.geeny.io | Website
*.k-classic-mobil.de | Website
*.mediamarkt.o2service.de | Website
*.mein.aetkasmart.de | Website
*.mein.simfinity.de | Website
*.minodes.com | Website
*.nettokom.de | Website
*.norma-mobil.de | Website
*.onlineservice.o2business.de | Website
*.saturn.o2service.de | Website
*.sim-karte-aktivierung.blauworld.de | Website
*.whatsappsim.de | Website

Out of scope

Target name | Type
---|---
*.dyn.telefonica.de | Website
<https://shop-fanseite.telefonica.de> | Website
<https://www.alditalk.de> | Website
<https://www.einfachprepaid.de> | Website
<https://www.turkei-sim.de> | Website
<https://www.udldigital.de> | Website
<https://www.wayra.co.uk> | Website
<https://mobilfunk.tchibo.de> | Website
<https://www.think-big.org> | Website

Note that subdomains are in scope for all the above targets except for the following:

  • *.dyn.telefonica.de
  • *.static.telefonica.de
  • https://shop-fanseite.telefonica.de
  • https://onlineservice.o2business.de
  • https://sim-karte-aktivierung.blauworld.de
  • https://mein.aetkasmart.de
  • https://mein.simfinity.de
  • http://premiumpartner.fonic.de
  • https://*.m2m.o2.de

Access

Researchers are free to self provision or utilize any existing accounts they own - DO NOT test against any accounts you do not expressly own. If/when registering for testing purposes, please do so using your @bugcrowdninja.com email address. For more info regarding @bugcrowdninja email addresses, see here.

Focus Areas

With respect to chat or support sites, see the the Out of Scope notes regarding social engineering. However, we are interested in knowing if platform/architecture issues are present. Individual attacks against the platform are allowed but NO automated attacks or scans on support/chat functionality are allowed. This prohibition includes testing of support/chat functionality via task scripting, automated tools (e.g. SQLMap, Acunetix) or macros of any kind.

Out of Scope

In general we are thankful for any disclosed vulnerability, however some vulnerabilities are not of interest as part of the program and will therefore not be rewarded.

  • Vulnerabilities in 3rd party systems (any system or service not operated by Telefónica, e.g. vulnerabilities in social media services which might lead to account compromise)
  • Vulnerabilities in 3rd party libraries which directly affect the target website will be evaluated on a case-by-case basis
  • For the time being, vulnerabilities in our mobile applications (e.g. Mein o2 App) are out of scope

Specific testing methods are explicitly out-of-scope of the program and are prohibited by Telefónica. Attempts might be legally pursued.

  • DoS/DDoS attempts
  • Social engineering attempts
  • Spam, phishing, spear phishing or similar mass distribution communication to employees, customers, partners, etc.
  • Automated testing of/attacks against support channels such as chat functionality, support contact forms, feedback forms, e-mail or phone
  • Misuse of data or accounts you do not own

Program rules

This program follows Bugcrowd’s standard disclosure terms.

This program does not offer financial or point-based rewards for P5 — Informational findings. Learn more about Bugcrowd’s VRT.

Thanks
Gift
Hall of Fame
Reward


List your Bug Bounty for free immediately!

Contact us if you want more information.

FireBounty (c) 2015-2019