Infosec Institute

Open Bug Bounty mentioned in the
Top 6 Bug Bounty programs of
2022 by the InfoSec Institute

The Hacker News

Open Bug Bounty named among the
Top 5 Bug Bounty programs of 2021
by The Hacker News

Platform update: please use our new authentication mechanism to securely use the Open Bug Bounty Platform.
For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
1,704,748 coordinated disclosures
1,383,263 fixed vulnerabilities
1,991 bug bounty programs, 3,919 websites
47,050 researchers, 1,651 honor badges

pharma4u GmbH Bug Bounty Program

pharma4u GmbH runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of pharma4u GmbH

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between pharma4u GmbH and researchers.

Bug bounty program allow private submissions only.

Bug Bounty Scope

The following websites are within the scope of the program:

pharma4u.de
apothekerwebinare.de
software.labxpert.de

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

Our Bug Bounty program covers software vulnerabilities in services by pharma4u. See our domains in the scope of our openbugbounty.org profile.

All kind of other websites, software, applications etc. are explicitly out of the Program's scope, in particular:
- Websites not provided by pharma4u
- External websites, software, applications etc. linking to pharma4u
- External websites, software, applications etc. using pharma4us APIs
- Websites not being pharma4u Services or Non-pharma4u Services as outlined above

First Reporter Rule
A Security Researcher reporting an issue first is called the First Reporter. Rewards for a specific vulnerability go to the First Reporter. A subsequent bug report reporting the same or similar vulnerability will not be eligible for a reward (first come first serve principle). Provided that pharma4u is already aware of a specific vulnerability at the time of a submitted bug report reporting the same or similar vulnerability as already known, pharma4u is deemed to be the First Reporter.

Testing Requirements:

pharma4u needs a documentation of the existing vulnerability. This is called a bug report. pharma4u can only accept complete bug reports sent via openbugbounty.org

A bug report is complete, if pharma4u can reproduce the bug and can assess the potential impact.

How can I make sure it is complete?

- Add as much information in your report as you can.
- Add a complete description of the bug.
- Point out the potential impact of the bug.
- Provide guidance to reproduce the bug (proof of concept).

In general, every bug in a pharma4u Service leading to a relevant vulnerability could be eligible for a reward. The focus lies on:

- Leakage of data
- Classification of endangered data

In the following you find some examples for security issues which may be eligible for a reward in accordance with this Program:

- Leakage of data
- Getting malicious access to user accounts
- Code injection
- Cross-site scripting (XSS)
- Cross-site request forgery (‎CSRF)
- Remote code execution
- Privilege escalation
- Clickjacking
- Authentication bypass

Possible Awards:

pharma4u grants rewards (also called bounty and/or bounties) for reporting software vulnerabilities in accordance with this Program. rewards may be granted if the following requirements are collectively fulfilled:

- Responsible Investigation
- Complete Bug Report
- Eligibility of Vulnerability
- Responsible Disclosure

If just one of the above requirements is not fulfilled, this has to be assessed as a non-compliance with this Program.

pharma4u decides at its sole and own discretion whether a reward is granted and the exact amount of such bounty.
Rewards are paid out via gifts from online shops (e.g. Amazon). We will ask you for a wish on amazon. Feel free send us your Amazon wish list when reporting a bug.

The reward that can be expected for your bug report depends on the severity of the reported vulnerability. The table below will give you a general guideline what you can expect for your investigation efforts:
Vulnerability Value of gift (EUR)
Critical 100 (or more dependent on severeness of vulnerability)
High 50
Medium 25
Low 5

The above mentioned amounts are minimum bounties for each level of vulnerability. A concrete bounty may excess the minimum amount based on the severity of the vulnerability and/or the Security Researcher's technique and reporting quality. The granted reward will be determined by the impact on the pharma4u Service.

Previous granted bounty amounts are not considered precedent for future bounty amounts.

Special Notes:

Please only report vulnerabilities via openbugbounty.org.

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  Information How quickly researchers get responses to their submissions.
Remediation Time  Information How quickly reported submissions are fixed.
Cooperation and Respect  Information How fairly and respectfully researchers are being treated.

Researcher's comments

Shi_Vam     26 July, 2019
    Shi_Vam:
please give your email for other bug report
MindFlayer     23 July, 2019
    MindFlayer:
Is there a way that I can reach you through an email for I able to represent my bug report more clearly. Thanks.
SecuNinja     22 July, 2019
    SecuNinja:
Thanks a lot for the bounty! :)
Hide_khan     20 July, 2019
    Hide_khan:
please give your email for other bug report

  Latest Patched

 26.04.2024 mdanderson.org
 25.04.2024 seeu.edu.mk
 25.04.2024 xaxim.sc.gov.br
 25.04.2024 lacerdopolis.sc.gov.br
 24.04.2024 tap.mk.gov.lv
 23.04.2024 data.aad.gov.au
 23.04.2024 bitporno.to
 23.04.2024 sys01.lib.hkbu.edu.hk
 23.04.2024 srvm.gov.za
 22.04.2024 stc.edu.hk

  Latest Blog Posts

04.12.2023 by BAx99x
Unmasking the Power of Cross-Site Scripting (XSS): Types, Exploitation, Detection, and Tools
04.12.2023 by a13h1_
$1120: ATO Bug in Twitter’s
04.12.2023 by ClumsyLulz
How I found a Zero Day in W3 Schools
04.12.2023 by 24bkdoor
Hack the Web like a Pirate: Identifying Vulnerabilities with Style
04.12.2023 by 24bkdoor
Navigating the Bounty Seas with Open Bug Bounty

  Recent Recommendations

    22 April, 2024
    genoverband:
Thank you for your invaluable help in ensuring the security of our domain and its visitors!
    10 April, 2024
    Mars:
Hatim uncovered a XSS bug that we were able to quickly resolve. Thanks very much for your assistance and help.
    8 April, 2024
    Panthermedia:
Thanks to the support of Hatim Chabik, we were able to identify and solve an XSS bug.
    5 April, 2024
    pubpharm:
Pooja found a XSS vulnerability on our website and provided us with the needed Information for replication and fixing the issue. Which she verified afterwards.
We thank her for the reporting and assistance.
    2 April, 2024
    genoverband:
Thank you for your invaluable help in ensuring the security of our domain and its visitors!