Banner object (1)

Hack and Take the Cash !

800 bounties in database
  Back Link to program      
13/12/2018
Telefónica Germany logo
Thanks
Gift
Hall of Fame
Reward

In Scope

Scope Type Scope Name
android_application Mein O2 Android Application
android_application PartOS Android Application
android_application O2 Business Android Application
ios_application Mein O2 iOS Application
ios_application PartOS iOS Application
ios_application O2 Business iOS Application
web_application *.telefonica.de
web_application *.next.telefonica.de
web_application *.o2online.de
web_application *.o2.de
web_application *.o2business.de
web_application *.o2service.de
web_application *.o2spin.de
web_application *.alditalk-kundenbetreuung.de
web_application *.ayyildiz.de
web_application *.base.de
web_application *.blau.de
web_application *.einfachprepaid.de
web_application *.epos.vertriebspartner.de.o2.com
web_application *.fonic.de
web_application *.fonic-mobile.de
web_application *.geeny.io
web_application *.k-classic-mobil.de
web_application *.mediamarkt.o2service.de
web_application *.mein.aetkasmart.de
web_application *.mein.simfinity.de
web_application *.minodes.com
web_application *.nettokom.de
web_application *.netzclub.net
web_application *.norma-mobil.de
web_application *.ortelmobile.de
web_application *.saturn.o2service.de
web_application *.sim-karte-aktivierung.blauworld.de
web_application *.turkei-sim.de
web_application https://vertriebspartner.de.o2.com/partos
web_application *.whatsappsim.de

Out of Scope

Scope Type Scope Name
web_application https://www.alditalk.de
web_application https://www.udldigital.de
web_application https://www.wayra.co.uk
web_application https://mobilfunk.tchibo.de
web_application https://www.think-big.org

Telefónica Germany

If you find a vulnerability in one of our systems, we are happy to give you the opportunity to report this finding using our Responsible Disclosure Program.

For the time being disclosed vulnerabilities are not monetarily rewarded, however future changes to the award of findings are not excluded. Excluded from awards are legal representatives, current and former employees of Telefónica Germany GmbH & Co. OHG and its connected businesses and their employees. Minors may only participate with agreement of their legal representatives.

Our understanding of Responsible Disclosure

To responsibly disclose a detected vulnerability in one our systems:

  • Understand that all valid reports will be taken seriously by our teams; this in mind, do give us a reasonable period of time to evaluate the submission and respond accordingly.
  • While testing our systems you make every effort not to damage or restrict the availability of products, services or infrastructure.
  • You do not use a detected vulnerability to obtain more data than necessary for proving the vulnerability. Do not leverage any found vulnerability to obtain, spy, modify, delete or distribute any personal or sensitive data.
  • You agree to delete all personal and confidential information obtained during testing.
  • We will treat your submission confidentially and will not share your personal data with others unless required by law or judgement. It is possible to make your submission anonymously.
  • We will not legally pursue testing activity and submissions which respect the terms and scope set forth here.

Ratings:

For the initial prioritization/rating of findings, this program will use theBugcrowd Vulnerability Rating Taxonomy. However, it is important to note that in some cases a vulnerability priority will be modified due to its likelihood or impact. In any instance where an issue is downgraded, a full, detailed explanation will be provided to the researcher - along with the opportunity to appeal, and make a case for a higher priority.

This program only awards points for VRT based submissions.

Targets

In scope

Target name | Type
---|---
*.telefonica.de | Website
*.next.telefonica.de | Website
*.o2online.de | Website
*.o2.de | Website
*.o2business.de | Website
*.o2service.de | Website
*.o2spin.de | Website
*.alditalk-kundenbetreuung.de | Website
*.ayyildiz.de | Website
*.base.de | Website
*.blau.de | Website
*.einfachprepaid.de | Website
*.epos.vertriebspartner.de.o2.com | Website
*.fonic.de | Website
*.fonic-mobile.de | Website
*.geeny.io | Website
*.k-classic-mobil.de | Website
*.mediamarkt.o2service.de | Website
*.mein.aetkasmart.de | Website
*.mein.simfinity.de | Website
*.minodes.com | Website
*.nettokom.de | Website
*.netzclub.net | Website
*.norma-mobil.de | Website
*.ortelmobile.de | Website
*.saturn.o2service.de | Website
*.sim-karte-aktivierung.blauworld.de | Website
*.turkei-sim.de | Website
<https://vertriebspartner.de.o2.com/partos> | Website
*.whatsappsim.de | Website
Mein O2 iOS Application | iOS
Mein O2 Android Application | Android
PartOS iOS Application | iOS
PartOS Android Application | Android
O2 Business iOS Application | iOS
O2 Business Android Application | Android

Out of scope

Target name | Type
---|---
<https://www.alditalk.de> | Website
<https://www.udldigital.de> | Website
<https://www.wayra.co.uk> | Website
<https://mobilfunk.tchibo.de> | Website
<https://www.think-big.org> | Website

Note that subdomains and applications are in scope for all the above targets except for the following:

  • *.dyn.telefonica.de
  • *.static.telefonica.de
  • https://shop-fanseite.telefonica.de
  • https://mitarbeiter-outlet.telefonica.de
  • https://mein.aetkasmart.de
  • https://mein.simfinity.de
  • http://premiumpartner.fonic.de
  • *.m2m.o2.de

Access

Researchers are free to self provision or utilize any existing accounts they own - DO NOT test against any accounts you do not expressly own. If/when registering for testing purposes, please do so using your @bugcrowdninja.com email address. For more info regarding @bugcrowdninja email addresses, see here.

You can download the in scope applications here:

Mein O2

  • iOS: https://itunes.apple.com/de/app/mein-o2/id371338349?mt=8
  • Android: https://play.google.com/store/apps/details?id=canvasm.myo2&hl=de

O2 Business

  • iOS: https://itunes.apple.com/de/app/o-business/id1219356865?mt=8
  • Android: https://play.google.com/store/apps/details?id=telefonica.de.o2business&hl=de

PartOS

  • iOS: https://itunes.apple.com/de/app/partos-app/id1059441760?mt=8
  • Android: https://play.google.com/store/apps/details?id=de.syzygy.partos&hl=de

Note: The application download is geographically restricted for the Mein O2 and PartOS apps, which is exclusive for German application stores. Feel free to create a German sourced account to download the applications.

Focus Areas

With respect to chat or support sites, see the the Out of Scope notes regarding social engineering. However, we are interested in knowing if platform/architecture issues are present. Individual attacks against the platform are allowed but NO automated attacks or scans on support/chat functionality are allowed. This prohibition includes testing of support/chat functionality via task scripting, automated tools (e.g. SQLMap, Acunetix) or macros of any kind.

Out of Scope

In general we are thankful for any disclosed vulnerability, however some vulnerabilities are not of interest as part of the program and will therefore not be rewarded.

  • Vulnerabilities in subdomains owned by Telefónica but obviously operated by third parties (e.g. the imprint states a company other than Telefónica Germany or its subsidiaries)
  • Vulnerabilities in 3rd party systems (any system or service not operated by Telefónica, e.g. vulnerabilities in social media services which might lead to account compromise)
  • Vulnerabilities in 3rd party libraries which directly affect the target website will be evaluated on a case-by-case basis

Specific testing methods are explicitly out-of-scope of the program and are prohibited by Telefónica. Attempts might be legally pursued.

  • Any email spoofing vulnerabilities are out of scope including but not limited to any missing or incorrect SPF/DMARC records of any kind
  • DoS/DDoS attempts
  • Social engineering attempts
  • Spam, phishing, spear phishing or similar mass distribution communication to employees, customers, partners, etc.
  • Automated testing of/attacks against support channels such as chat functionality, support contact forms, feedback forms, e-mail or phone
  • Misuse of data or accounts you do not own

Program rules

This program follows Bugcrowd’s standard disclosure terms.

Learn more about Bugcrowd’s VRT.

FireBounty © 2015-2019

Legal notices