NET-LINE is committed to protecting our customers and their users. As part of this commitment, we invite security researchers to help protect NET-LINE and its users by proactively identifying security vulnerabilities via our bug bounty program. Our program is inclusive of all NET-LINE brands and technologies and offers rewards for a wide array of vulnerabilities. We encourage security researchers looking to participate in our bug bounty program to review this policy to ensure compliance with our rules and also to help you safely verify any vulnerabilities you may uncover.
By submitting reports or otherwise participating in this program, you agree that you have read and will follow the Program Rules and Legal Terms sections of this program Policy.
Violation of any of these rules can result in ineligibility for a bounty and/or removal from the program. Three strikes will earn you a temporary ban. Four strikes will give you a permanent ban.
By submitting reports or otherwise participating in this program, you agree that you have read and will follow the Program Rules and Legal Terms sections of this program Policy.
In connection with your participation in this program you agree to comply with NET-LINE Terms of Service, NET-LINE Privacy Policy both available for viewing and download here and all applicable laws and regulations, including any laws or regulations governing privacy or the lawful processing of data.
NET-LINE reserves the right to change or modify the terms of this program at any time. You may not participate in this program if you are a resident or individual located within a country appearing on any U.S. sanctions lists (such as the lists administered by the US Department of the Treasury OFAC), the Australian sanctions lists (such as the Consolidated List published by the Australian Department of Foreign Affairs and Trade) or the E.U. Sanctions Map (as published by the European Union).
NET-LINE does not give permission/authorisation (either implied or explicit) to an individual or group of individuals to (1) extract personal information or content of NET-LINE customers and/or their users or to publish this information on the open, public-facing internet without user consent or (2) modify or corrupt programs or data belonging to NET-LINE in order to extract and publicly disclose data belonging to NET-LINE.
NET-LINE employees (including former employees that separated from NET-LINE within the prior 36 months), contingent workers, contractors and their personnel, webmasters, affiliate partners, actors, performers, content uploaders and consultants, as well as their immediate family members and persons living in the same household, are not eligible to receive bounties or rewards of any kind under any NET-LINE programs, whether hosted by NET-LINE or any third party.
NET-LINE will not initiate a lawsuit or law enforcement investigation against a researcher in response to reporting a vulnerability if the researcher fully complies with this Policy.
Please understand that if your security research involves the networks, systems, information, applications, products, or services of another party (which is not us), that third party may determine whether to pursue legal action. We cannot and do not authorise security research in the name of other entities. If legal action is initiated by a third party against you and you have complied with this Policy, we will take reasonable steps to make it known that your actions were conducted in compliance with this Policy.
You are expected, as always, to comply with all applicable laws and regulations.
Please submit a report to NET-LINE before engaging in conduct that may be inconsistent with or unaddressed by this Policy.
We are continuously working to evolve our bug bounty program. We aim to respond to incoming submissions as quickly as possible and make every effort to have bugs fixed within 90 days of being triaged.
The latest version of all currently supported products and services provided by NET-LINE are included in our bug bounty program. Please review the program scope before submitting a report. Private scope is accessible to invited researchers only.
Web traffic to and from NET-LINE and our hosting partners produces very large amounts of data every day. When testing, you can make it easier for us to identify your testing traffic against our normal data and the malicious actors out in the world. Please do the following when participating in NET-LINE bug bounty programs:
When testing for a bug, please also keep in mind:
If our security team cannot reproduce and verify an issue, a bounty cannot be awarded. To help streamline our intake process, we ask that submissions include:
Note: Failure to adhere to these minimum requirements may result in the loss of a reward.
All supporting evidence and other attachments must be stored only within the report you submit. Do not host any files on external services. Please submit all security reports as an email, with attachments, to security@netline-services.de
Vulnerabilities on a specific web sites or services should be reported if it is listed as "in scope". Please see our detailed scope list at the bottom of this page for a full list of assets that are in scope of this program. This list is subject to change without notice.
If you found a vulnerability that affects an asset belonging to NET-LINE, but is not included as in scope on any of the NET-LINE programs, please report it to security@netline-services.de
You will be eligible for a bounty only if you are the first person to disclose an unknown issue. Qualifying bugs will be rewarded based on severity, to be determined by NET-LINE in its sole discretion. Rewards are granted entirely at the discretion of NET-LINE, and will be paid within 30-days after NET-LINE awards the bounty to the researcher.
At NET-LINE discretion, providing more complete research, proof-of-concept code and detailed write-ups may increase the bounty awarded. Conversely, NET-LINE may pay less for vulnerabilities that require complex or over-complicated interactions or for which the impact or security risk is negligible. Rewards may be denied if there is evidence of program policy violations. No bounty will be awarded for reports that impersonate an apparent vulnerability. Reports in third party software may not eligible for bounties at NET-LINE's discretion.
Because this program is fairly new, we do not provide a payout table and are still in the process of assessing what kind of bounties we can pay out for specific report categories and are currently deciding what bounties to pay on a case-by-base basis, we kindly ask you for patience as we try to generalize this process and make outcomes more predictable - we value your time and input if you are participating in this program.
These issues are eligible for submission, but not eligible for bounty or any award. Once triaged, they will be closed as Informative only if found to be valid or Spam if found to be not valid. When reporting vulnerabilities, please consider (1) attack scenario/exploitability and (2) security impact of the bug.
Missing Security HTTP Headers (without proof of exploitability) Internal pivoting, scanning, exploiting, or exfiltrating data Note: 0-day vulnerabilities may be reported 30 days after initial publication. We have a team dedicated to tracking these issues; hosts identified by this team and internally ticketed will not be eligible for bounty.
The following issues are considered out of scope:
Same Bug, Different Host For each report, please allow NET-LINE sufficient time to patch other host instances. If you find the same bug on a different (unique) host, prior to the report reaching a triaged state, file it within the existing report to receive an additional 5% bonus (per host, not domain). Any reports filed separately, while we are actively working to resolve the issue, will be treated as a duplicate.
Same Payload, Different Parameter In some cases, rewards may be consolidated into a single payout. For example, multiple reports of the same vulnerability across different parameters of a resource, or demonstrations of multiple attack vectors against a fundamental framework issue. We kindly ask you to consolidate reports rather than separate them.
In scope are only systems/hosts managed by NET-LINE Online-Dienste GmbH where NET-LINE does have sufficient access rights to fix, patch and/or make sufficient configuration changes to updates those systems.
Out of scope are systems not managed by NET-LINE Online-Dienste GmbH, such as systems/hosts managed by payment providers, affiliates and/or other contractors and/or business partners.
Any questions about NET-LINE Bug Bounty Program can be directed to security@netline-services.de. Thank you.