Tickets Travel Network / Mobile : Program Info

Triaged by HackenProof
Tickets Travel Network

Tickets Travel Network is one of the most distinctive and expansive travel distribution companies in the EMEA region. As a smart travel provider, we offer our customers wide range of products: flights, train and bus journeys.

In Scope

Target Type Severity Reward
https://play.google.com/store/apps/details?id=ua.tickets.gd&hl=uk

Tickets.ua

Android Critical Bounty
https://apps.apple.com/ua/app/tickets-ua/id731435070

Tickets.ua

iOS Critical Bounty
https://play.google.com/store/apps/details?id=kz.tickets.avia&gl=US&hl=ru

Tickets.kz

Android Critical Bounty
https://play.google.com/store/apps/details?id=kz.tickets.avia&gl=US&hl=ru

Tickets.kz

iOS Critical Bounty
https://play.google.com/store/apps/details?id=pl.tickets.avia&referrer=utm_source%3Dmainweb%26utm_medium%3Dbadge&hl=en

Tickets.pl

Android Critical Bounty
https://apps.apple.com/pl/app/tickets-pl/id1144507663?l=pl

Tickets.pl

iOS Critical Bounty
https://play.google.com/store/apps/details?id=com.kissandfly.avia

Kissandfly.com

Android Critical Bounty
https://apps.apple.com/us/app/kissandfly/id6499211323

Kissandfly.com

iOS Critical Bounty

IN SCOPE VULNERABILITIES (MOBILE)

We are interested in the following vulnerabilities:

  • Business logic issues
  • Payments manipulation
  • Remote code execution (RCE)
  • Injection vulnerabilities (SQL, XXE)
  • File inclusions (Local & Remote)
  • Access Control Issues (IDOR, Privilege Escalation, etc)
  • Leakage of sensitive information
  • Server-Side Request Forgery (SSRF)
  • Cross-Site Request Forgery (CSRF)
  • Cross-Site Scripting (XSS)
  • Directory traversal
  • Other vulnerability with a clear potential loss

OUT OF SCOPE VULNERABILITIES

  • Attacks requiring physical access to a user's device
  • Vulnerabilities that require root/jailbreak
  • Vulnerabilities requiring extensive user interaction
  • Exposure of non-sensitive data on the device
  • Reports from static analysis of the binary without PoC that impacts business logic
  • Lack of obfuscation/binary protection/root(jailbreak) detection
  • Bypass certificate pinning on rooted devices
  • Lack of Exploit mitigations i.e., PIE, ARC, or Stack anaries
  • Sensitive data in URLs/request bodies when protected by TLS
  • Path disclosure in the binary
  • OAuth & app secret hard-coded/recoverable in IPA, APK
  • Sensitive information retained as plaintext in the device’s memory
  • Crashes due to malformed URL Schemes or Intents sent to exported Activity/Service/Broadcast Receiver (exploiting these for sensitive data leakage is commonly in scope)
  • Any kind of sensitive data stored in-app private directory
  • Runtime hacking exploits using tools like but not limited to Frida/ Appmon (exploits only possible in a jailbroken environment)
  • Shared links leaked through the system clipboard
  • Any URIs leaked because a malicious app has permission to view URIs opened.
  • Exposure of API keys with no security impact (Google Maps API keys etc.)
  • ! Avoid using web application scanners for automatic vulnerability searching which generates massive traffic
  • Make every effort not to damage or restrict the availability of products, services or infrastructure
  • Avoid compromising any personal data, interruption or degradation of any service
  • Don’t access or modify other user data, localize all tests to your accounts
  • Perform testing only within the scope
  • Don’t exploit any DoS/DDoS vulnerabilities, social engineering attacks or spam
  • Don’t spam forms or account creation flows using automated scanners
  • In case you find chain vulnerabilities we’ll pay only for vulnerability with the highest severity.
  • Vulnerabilities found in any other regional domain with the same codebase will be considered the same vulnerability
  • Only the first valid bug is eligible for the reward
  • Don’t break any law and stay in the defined scope
  • Any details of found vulnerabilities must not be communicated to anyone who is not a HackenProof Team or an authorized employee of this Company without appropriate permission