Louis Vuitton Malletier - Public Bug Bounty Program
Bounty Range
$50 - $5,000
external program
Bounty Range
$50 - $5,000
external program
Louis Vuitton Malletier, commonly known as Louis Vuitton is a French fashion house and luxury goods company founded in 1854 by Louis Vuitton. The label's LV monogram appears on most of its products, ranging from luxury trunks and leather goods to ready-to-wear, shoes, watches, jewellery, accessories, sunglasses and books. Louis Vuitton is one of the world's leading international fashion houses; it sells its products through standalone boutiques, lease departments in high-end department stores, and through the e-commerce section of its website.
Regarding https://[it | fr | us | sg | …].louisvuitton.com, our program is limited to our e-commerce web application and its API. You may hunt on all country locals linked to *.louisvuitton.com (e.g. fr.louisvuitton.com, us.louisvuitton.com, au.louisvuitton.com, ...) but other subdomains are out of the scope of this program. You may refer to the following page which lists our country locals : https://eu.louisvuitton.com/dispatch?noDRP=true.
In addition to the ecommerce scope mentioned above you're welcome to test api.louisvuitton.com and other subdomains of *.api.louisvuitton.com, the rest of *.louisvuitton.com is to be considred as out of scope.
** We ask you to respect the scope of our program and to don't hunt outside of it. Should you need to report anything outside of the scope of this program you may do so through our VDP program here https://vdp.louisvuitton.com.**
A common framework is deployed across all our country locals which means that if you find an issue rooted in this framework or shared ressrouces it'll likely be applicable to other country versions. In such a case, these issues won't be considered as systemic and would be closed as duplicate/informative since a single fix at the framework/ressource level will allow us to address it across all country locals.
For other situations the systemic issues rules will be applied as usual.
XSS and similar issues (e.g. open redirect, CSRF, HTMLi) will be considered as non qualifying issues for the time being on *.jsp for https://[it | fr | us | sg | …].louisvuitton.com.
Please adhere to the following rules while performing research on this program:
Denial of service (DoS) attacks on our applications, servers, networks or infrastructure are strictly forbidden.
Avoid tests that could cause degradation or interruption of our services.
Do not use automated scanners or tools that generate large amount of network traffic.
Do not leak, manipulate, or destroy any user data or files in any of our applications/servers.
Do not copy any files from our applications/servers and disclose them.
No vulnerability disclosure, full, partial or otherwise, is allowed.
As a complement to the Program's rules and testing policy:
DO NOT alter compromised accounts by creating, deleting or modifying any data
DO NOT use compromised accounts to search for post-auth vulnerabilities (they won't be eligible anyway)
DO NOT include Personally Identifiable Information (PII) in your report and please REDACT/OBFUSCATE the PII that is part of your PoC (screenshot, server response, JSON file, etc.) as much as possible.
In case of exposed credentials or secrets, limit yourself to verifying the credentials validity
In case of sensitive information leak, DO NOT extract/copy every document or data that is exposed and limit yourself to describe and list what is exposed.
| Scope | Type | Asset value |
|---|---|---|
| https://[it | fr | us | sg | …].louisvuitton.com | Web application | Critical |
| *.api.louisvuitton.com | API | Critical |
| https://apps.apple.com/fr/app/louis-vuitton/id709101942 | Mobile application iOS | Critical |
| https://play.google.com/store/apps/details?id=com.vuitton.android&hl=fr&gl=US | Mobile application Android | Critical |
| https://appgallery.huawei.com/#/app/C102099703?locale=zh_CN&source=appshare&subsource=C102099703 | Mobile application | Critical |
| https://apps.apple.com/fr/app/louis-vuitton-city-guide/id1014618396 | Mobile application iOS | Critical |
In the context of this program, we do not intend to encourage, accept or reward reports of leaks that are not applicable to our program's scope and policy.
| Type of leak | Source of leak is in-scope | Source of leak belongs to the Organization and is out-of-scope | Source of leak does not belong to the Organization and is out-of-scope |
|---|---|---|---|
| Impact is in-scope (e.g. valid credentials on an in-scope asset) | Eligible | Eligible | Not eligible |
| Impact is out-of-scope (e.g. valid credentials for an out-of-scope asset) | Eligible | Not eligible | Not eligible |
We are happy to thank everyone who submits valid reports which help us improve our security, however only those that meet the following eligibility requirements may receive a monetary reward:
You must be the first reporter of a vulnerability.
The vulnerability must be a qualifying vulnerability (see above).
The report must contain the following elements:
You must not break any of the testing policy rules listed above.
You must not be a former or current employee of our organisation or one of its contractors.
If you find the same vulnerability several times, please create only one report and eventually use comments. You'll be rewarded according to your findings.
Reward amounts are based on:
| Asset value | CVSS Low | CVSS Medium | CVSS High | CVSS Critical |
|---|---|---|---|---|
| Critical | €100 | €600 | €1,800 | €5,000 |
| Report Number | Reward Percentage |
|---|---|
| 1st report | 100% |
| 2nd report | 100% |
| 3rd report | 75% |
| 4th report | 50% |
| 5th report | 25% |
| 6th+ report | 10% |
Please append to your user-agent header the following value: lvm-ywh-pbb.
When submitting new report, you can add up to 5 collaborators, and define the reward split ratio.
For more information, see the help center documentation on hunter collaboration.
Note: For reports that have already been rewarded, it is not possible to redistribute the rewards.