Bounties
Low
Medium
High
Critical
Exceptional
Tier 2
€ 0
€ 250
€ 500
€ 1,000
€ 2,000
Up to € 2,000
Domains

*.hardware.info

Tier 2
URL

*.hwigroup.com

Tier 2
URL

*.hwigroup.net

Tier 2
URL
Description

Since its establishment in 1999, Hardware Info has been informing consumers in the Netherlands and Belgium about computer hardware and consumer electronics. Part of Hardware Info is a leading test lab, where more than 1500 products are tested professionally every year. In the test lab, the editors of Hardware Info have professional testing equipment at their disposal in order to be able to give as professional an opinion as possible about products. Based on the test results, we publish extensive comparison tests, but also in-depth single product reviews. The PC Advice systems are, as far as possible, also put together based on well-tested products. Editorial independence is of paramount importance at Hardware Info: that is why the commercial exploitation of the website is strictly separate from the editors. In addition to the website, Hardware Info also appears as a magazine six times a year. Hardware Info has been part of De Persgroep Online Services B.V. since September 2016.

In scope

ONLY USE YOUR INTIGRITI.ME ADDRESS (in case of violation, no bounty can be awarded)

We're interested to hear about any issue that potentially compromises our company or its user's security. Before submitting a vulnerability make sure to check that it's not listed in our out of scope policy (which you can find below). If you have additional questions about our program feel free to contact us through Intigriti's support.

Please keep the impact on the site as minimal as possible by cleaning up submitted data and not impacting users other than yourself.

Out scope

ONLY USE YOUR INTIGRITI.ME ADDRESS (in case of violation, no bounty can be awarded)

While we happily welcome any input from researchers that showcase a potential vulnerability in one of our services, we have assembled a list of issues which are out of scope for this program.

Application

  • Self-XSS that cannot be used to exploit other users
  • Verbose messages/files/directory listings without disclosing any sensitive information
  • CORS misconfiguration on non sensitive endpoints
  • Missing cookie flags on non sensitive cookies
  • Missing security headers which do not present an immediate security vulnerability
  • Cross-site Request Forgery with no or low impact
  • Presence of autocomplete attribute on web forms.
  • Reverse tabnabbing
  • Bypassing rate-limits or the non-existence of rate-limits.
  • Best practices violations (password complexity, expiration, re-use, etc.)
  • Clickjacking on pages without sensitive actions
  • CSV Injection
  • Host Header Injection
  • Sessions not being invalidated (logout, enabling 2FA, ..)
  • Hyperlink injection/takeovers
  • Mixed content type issues
  • Cross-domain referer leakage
  • Anything related to email spoofing, SPF, DMARC or DKIM
  • Content injection
  • Username / email enumeration
  • E-mail bombing
  • HTTP Request smuggling without any proven impact
  • Homograph attacks
  • XMLRPC enabled
  • Banner grabbing /Version disclosure
  • Open ports without an accompanying proof-of-concept demonstrating vulnerability
  • Weak SSL configurations and SSL/TLS scan reports
  • Not stripping metadata of images
  • Disclosing API keys without proven impact

General

  • In case that a reported vulnerability was already known to the company from their own tests, it will be flagged as a duplicate.
  • Theoretical security issues with no realistic exploit scenario(s) or attack surfaces, or issues that would require complex end user interactions to be exploited, may be excluded or be lowered in severity
  • Spam, social engineering and physical intrusion
  • DoS/DDoS attacks or brute force attacks.
  • Vulnerabilities that are limited to non-current browsers (older than 3 versions) will not be accepted
  • Attacks requiring the usage of shared computers, man in the middle or compromised user accounts
  • Recently disclosed zero-day vulnerabilities in commercial products where no patch or a recent patch (< 2 weeks) is available. We need time to patch our systems just like everyone else - please give us 2 weeks before reporting these types of issues.
  • Attacks requiring unrealistic user interaction
Rules of engagement

Guidelines

ONLY USE YOUR INTIGRITI.ME ADDRESS (in case of violation, no bounty can be awarded)

  • Please clean up remnants of your testing and do not interfere with the normal operation of the site.
  • Please do NOT use automatic scanners. We cannot accept any submissions found by using automatic scanners.
  • Provide detailed but to-the point reproduction steps
  • Include a clear attack scenario, a step by step guide in the PoC is highly appreciated
  • Suggestions for mitigation are appreciated as well
  • Do not exploit the identified leak: only collect the information necessary to demonstrate its existence.
  • Do not change or delete any data or system settings.
  • Handle any found data in a responsible manner: if you can demonstrate that there is a security problem with a small portion, do not go any further
  • Please do NOT publish/discuss bugs before they are fixed

Safe harbour for researchers

DPG Media considers ethical hacking activities conducted consistent with the Researcher Guidelines, the Program description and restrictions (the Terms) to constitute “authorized” conduct under criminal law. DPG Media will not pursue civil action or initiate a complaint for accidental, good faith violations, nor will they file a complaint for circumventing technological measures used by us to protect the scope as part of your ethical hacking activities.

If legal action is initiated by a third party against you and you have complied with the Terms, DPG Media will take steps to make it known that your actions were conducted in compliance and with our approval.

Severity assessment

All our rewards are impact based, therefore we kindly ask you to carefully evaluate a vulnerability's impact when picking a severity rating. To give you an idea of what kind of bugs belong in a certain severity rating we've put some examples below. Note that depending on the impact a bug can sometimes be given a higher/lower severity rating.

Exceptional

  • Remote Code Execution
  • Full database access (incl. update/delete)

Critical

  • Access to all customer personal details
  • SQL injection
  • Access to all user data or access to a targeted user

High

  • Stored XSS without user interaction
  • Access to random users their data
  • Privilige escalation
  • Authentication bypass on critical infrastructure

Medium

  • Reflected XSS
  • CSRF with a significant impact

Low

  • CSRF impacting user data
  • Open redirect
FAQ

Can I receive a test account?
You can register for normal Hardware info accounts with your intigriti.me email address (max. 3 accounts).
You can find more information regarding intigriti.me addresses here: http://go.intigriti.com/intigriti_me

Is an English version of the site available?
No, we only offer this site in Dutch but we made sure that our vulnerabilities are in English ;-)

All aboard!
Please login or register on the platform

For obvious reasons we can only allow submissions or applications for our program with a valid intigriti account.

It will only take 2 minutes to create a new one or even less to login with an existing account, so don't hesitate and let's get started. We would be thrilled to have you as part of our community.

Program specifics
ID check required
Reputation points
Triage
Activity
4/8
DPG Media
closed a submission
4/8
DPG Media
closed a submission
4/8
DPG Media
closed a submission
4/8
logo
nerrorsec
created a submission
4/8
DPG Media
closed a submission
4/8
DPG Media
closed a submission
4/7
logo
0mhack94
created a submission
4/7
logo
0mhack94
created a submission
4/7
logo
dilip_noob
created a submission
4/6
DPG Media
accepted a submission