If you find a vulnerability in one of our systems, we are happy to give you the opportunity to report this finding using our Responsible Disclosure Program.
For the time being disclosed vulnerabilities are not monetarily rewarded, however future changes to the award of findings are not excluded. Excluded from awards are legal representatives, current and former employees of Telefónica Germany GmbH & Co. OHG and its connected businesses and their employees. Minors may only participate with agreement of their legal representatives.
To responsibly disclose a detected vulnerability in one our systems:
For the initial prioritization/rating of findings, this program will use theBugcrowd Vulnerability Rating Taxonomy. However, it is important to note that in some cases a vulnerability priority will be modified due to its likelihood or impact. In any instance where an issue is downgraded, a full, detailed explanation will be provided to the researcher - along with the opportunity to appeal, and make a case for a higher priority.
This program only awards points for VRT based submissions.
Target name | Type
*.telefonica.de | Website
*.next.telefonica.de | Website
*.o2online.de | Website
*.o2.de | Website
*.o2business.de | Website
*.o2service.de | Website
*.o2spin.de | Website
*.alditalk-kundenbetreuung.de | Website
*.ayyildiz.de | Website
*.base.de | Website
*.blau.de | Website
*.einfachprepaid.de | Website
*.epos.vertriebspartner.de.o2.com | Website
*.fonic.de | Website
*.fonic-mobile.de | Website
*.geeny.io | Website
*.k-classic-mobil.de | Website
*.mediamarkt.o2service.de | Website
*.mein.aetkasmart.de | Website
*.mein.simfinity.de | Website
*.minodes.com | Website
*.nettokom.de | Website
*.netzclub.net | Website
*.norma-mobil.de | Website
*.ortelmobile.de | Website
*.saturn.o2service.de | Website
*.sim-karte-aktivierung.blauworld.de | Website
*.turkei-sim.de | Website
<https://vertriebspartner.de.o2.com/partos> | Website
*.whatsappsim.de | Website
Mein O2 iOS Application | iOS
Mein O2 Android Application | Android
PartOS iOS Application | iOS
PartOS Android Application | Android
O2 Business iOS Application | iOS
O2 Business Android Application | Android
Target name | Type
<https://www.alditalk.de> | Website
<https://www.udldigital.de> | Website
<https://www.wayra.co.uk> | Website
<https://mobilfunk.tchibo.de> | Website
<https://www.think-big.org> | Website
Note that subdomains and applications are in scope for all the above targets except for the following:
Researchers are free to self provision or utilize any existing accounts they own - DO NOT test against any accounts you do not expressly own. If/when registering for testing purposes, please do so using your @bugcrowdninja.com email address. For more info regarding @bugcrowdninja email addresses, see here.
You can download the in scope applications here:
Note: The application download is geographically restricted for the Mein O2 and PartOS apps, which is exclusive for German application stores. Feel free to create a German sourced account to download the applications.
With respect to chat or support sites, see the the Out of Scope notes regarding social engineering. However, we are interested in knowing if platform/architecture issues are present. Individual attacks against the platform are allowed but NO automated attacks or scans on support/chat functionality are allowed. This prohibition includes testing of support/chat functionality via task scripting, automated tools (e.g. SQLMap, Acunetix) or macros of any kind.
In general we are thankful for any disclosed vulnerability, however some vulnerabilities are not of interest as part of the program and will therefore not be rewarded.
Specific testing methods are explicitly out-of-scope of the program and are prohibited by Telefónica. Attempts might be legally pursued.
This program follows Bugcrowd’s standard disclosure terms.
Contact us if you want more information.