Telefónica Germany

  • Points per vulnerability
  • Partial safe harbor
  • Managed by Bugcrowd

Program stats

237 vulnerabilities rewarded

Validation within about 6 hours
75% of submissions are accepted or rejected within about 6 hours

Latest hall of famers

Recently joined this program

Disclosure

Please note: This program does not allow disclosure. You may not release information about vulnerabilities found in this program to the public.

If you find a vulnerability in one of our systems, we are happy to give you the opportunity to report this finding using our Responsible Disclosure Program.

For the time being disclosed vulnerabilities are not monetarily rewarded, however future changes to the award of findings are not excluded. Excluded from awards are legal representatives, current and former employees of Telefónica Germany GmbH & Co. OHG and its connected businesses and their employees. Minors may only participate with agreement of their legal representatives.

Our understanding of Responsible Disclosure

To responsibly disclose a detected vulnerability in one our systems:

  • Understand that all valid reports will be taken seriously by our teams; this in mind, do give us a reasonable period of time to evaluate the submission and respond accordingly.
  • While testing our systems you make every effort not to damage or restrict the availability of products, services or infrastructure.
  • You do not use a detected vulnerability to obtain more data than necessary for proving the vulnerability. Do not leverage any found vulnerability to obtain, spy, modify, delete or distribute any personal or sensitive data.
  • You agree to delete all personal and confidential information obtained during testing.
  • We will treat your submission confidentially and will not share your personal data with others unless required by law or judgement. It is possible to make your submission anonymously.
  • We will not legally pursue testing activity and submissions which respect the terms and scope set forth here.

Ratings:

For the initial prioritization/rating of findings, this program will use the Bugcrowd Vulnerability Rating Taxonomy. However, it is important to note that in some cases a vulnerability priority will be modified due to its likelihood or impact. In any instance where an issue is downgraded, a full, detailed explanation will be provided to the researcher - along with the opportunity to appeal, and make a case for a higher priority.

Targets

In scope

Target name Type
*.telefonica.de Website
*.o2online.de Website
*.o2.de Website
*.o2business.de Website
*.o2service.de Website
*.o2spin.de Website
*.alditalk-kundenbetreuung.de Website
*.ayyildiz.de Website
*.base.de Website
*.blau.de Website
*.einfachprepaid.de Website
*.epos.vertriebspartner.de.o2.com Website
*.fonic.de Website
*.fonic-mobile.de Website
*.k-classic-mobil.de Website
*.mediamarkt.o2service.de Website
*.mein.aetkasmart.de Website
*.mein.simfinity.de Website
*.nettokom.de Website
*.netzclub.net Website
*.norma-mobil.de Website
*.ortelmobile.de Website
*.saturn.o2service.de Website
*.sim-karte-aktivierung.blauworld.de Website
*.turkei-sim.de Website
https://vertriebspartner.de.o2.com/partos Website
*.whatsappsim.de Website
Mein O2 iOS Application iOS
Mein O2 Android Application Android
PartOS iOS Application iOS
PartOS Android Application Android
O2 Business iOS Application iOS
O2 Business Android Application Android

Out of scope

Note that subdomains and applications are in scope for all the above targets except for the following:

  • *.dyn.telefonica.de
  • *.static.telefonica.de
  • https://shop-fanseite.telefonica.de
  • https://mitarbeiter-outlet.telefonica.de
  • https://mein.aetkasmart.de
  • https://mein.simfinity.de
  • http://premiumpartner.fonic.de
  • *.m2m.o2.de

Access

Researchers are free to self provision or utilize any existing accounts they own - DO NOT test against any accounts you do not expressly own. If/when registering for testing purposes, please do so using your @bugcrowdninja.com email address. For more info regarding @bugcrowdninja email addresses, see here.

You can download the in scope applications here:

Mein O2

  • iOS: https://itunes.apple.com/de/app/mein-o2/id371338349?mt=8
  • Android: https://play.google.com/store/apps/details?id=canvasm.myo2&hl=de

O2 Business

  • iOS: https://itunes.apple.com/de/app/o-business/id1219356865?mt=8
  • Android: https://play.google.com/store/apps/details?id=telefonica.de.o2business&hl=de

PartOS

  • iOS: https://itunes.apple.com/de/app/partos-app/id1059441760?mt=8
  • Android: https://play.google.com/store/apps/details?id=de.syzygy.partos&hl=de

Note: The application download is geographically restricted for the Mein O2 and PartOS apps, which is exclusive for German application stores. Feel free to create a German sourced account to download the applications.

Focus Areas

With respect to chat or support sites, see the the Out of Scope notes regarding social engineering. However, we are interested in knowing if platform/architecture issues are present. Individual attacks against the platform are allowed but NO automated attacks or scans on support/chat functionality are allowed. This prohibition includes testing of support/chat functionality via task scripting, automated tools (e.g. SQLMap, Acunetix) or macros of any kind.

Out of Scope

In general we are thankful for any disclosed vulnerability, however some vulnerabilities are not of interest as part of the program and will therefore not be rewarded.

  • Vulnerabilities in subdomains owned by Telefónica but obviously operated by third parties (e.g. the imprint states a company other than Telefónica Germany or its subsidiaries)
  • Vulnerabilities in 3rd party systems (any system or service not operated by Telefónica, e.g. vulnerabilities in social media services which might lead to account compromise)
  • Vulnerabilities in 3rd party libraries which directly affect the target website will be evaluated on a case-by-case basis

Specific testing methods are explicitly out-of-scope of the program and are prohibited by Telefónica. Attempts might be legally pursued.

  • Any email spoofing vulnerabilities are out of scope including but not limited to any missing or incorrect SPF/DMARC records of any kind
  • DoS/DDoS attempts
  • Social engineering attempts
  • Spam, phishing, spear phishing or similar mass distribution communication to employees, customers, partners, etc.
  • Automated testing of/attacks against support channels such as chat functionality, support contact forms, feedback forms, e-mail or phone
  • Misuse of data or accounts you do not own

Program rules

This program follows Bugcrowd’s standard disclosure terms.