Description

Our website is a way to inform and inspire customers about the latest and brightest. It allows to: • Get up to date information about the movies and events we offer; • Choose your favorite movie theater, pick a date and time; • Buy tickets and enhance your experience by choosing for ‘cozy seat’ instead of our normal seats. Just in case you want to have a ‘cozy night’ with your significant other! Cry of laughter or maybe some scary movies are your favorite ones. Via a My Kinepolis account we target movies and unique promotions based on your preferences. While researching our website you can already explore our schedule and plan your next trip to one of our movie theaters. We are ready to be challenged!

Bounties
Low
0.1 - 3.9
Medium
4.0 - 6.9
High
7.0 - 8.9
Critical
9.0 - 9.4
Exceptional
9.5 - 10.0
Tier 1
€
50
200
750
2,500
5,000
Tier 1
€50 - €5,000
Tier 2
€
25
150
500
1,250
2,500
Tier 2
€25 - €2,500
Tier 3
€
0
25
100
175
250
Tier 3
Up to €250
Rules of engagement
Required
make sure to add "intigriti-<Username>" to your User Agent as not to hit our security systems.
max. 5 requests/sec
Not applicable

Guidelines

  • In addition some of our domains are in a shared environment and are subject to vendor Service Level Agreements with other parties. So please keep the amount of requests to an absolute required minimum to limit the impact on the shared environment.
  • Please do NOT discuss bugs before they are fixed. You can send us a video as proof of concept, but remember to change its privacy settings to private or to secure the video with a password.

Reporting Guidelines

  • Provide detailed but to-the point reproduction steps
  • Include a clear attack scenario. How will this affect us exactly?
  • Remember: quality over quantity!

Response timeframe

  • We will respond to report in ultimately two weeks, probably faster!
Domains

*.klubcinema.fr

Tier 1
Wildcard

*.megatix.be

Tier 1
Wildcard

booking.mjrtheatres.com

Tier 1
URL

extras.landmarkcinemas.com

Tier 1
URL

ferrero.kinepolis.lu

Tier 1
URL

identityserver.landmarkcinemas.com

Tier 1
URL

kinepolis.megatix.be

Tier 1
URL

luxfilmfestfilms.megatix.be

Tier 1
URL

luxfilmfestproducts.megatix.be

Tier 1
URL

luxfilmfesttickets.megatix.be

Tier 1
URL

movieapi.kinepolis.megatix.be

Tier 1
URL

tickets.kinepolis.be

Tier 1
URL

tickets.kinepolis.ch

Tier 1
URL

tickets.kinepolis.es

Tier 1
URL

tickets.kinepolis.fr

Tier 1
URL

tickets.kinepolis.lu

Tier 1
URL

tickets.kinepolis.nl

Tier 1
URL

userprofile-ui.landmarkcinemas.com

Tier 1
URL

www.kinepolis.be

Tier 1
URL

www.kinepolis.ch

Tier 1
URL

www.kinepolis.com

Tier 1
URL

www.kinepolis.es

Tier 1
URL

www.kinepolis.fr

Tier 1
URL

www.kinepolis.lu

Tier 1
URL

www.kinepolis.nl

Tier 1
URL

www.landmarkcinemas.com

Tier 1
URL

www.mjrtheatres.com

Tier 1
URL

business.kinepolis.be

Tier 2
URL

business.kinepolis.lu

Tier 2
URL

business.kinepolis.nl

Tier 2
URL
Tier 2
Android

extras-acc.landmarkcinemas.com

Tier 2
URL

https://movieclub-int.kinepolis.com

Tier 2
URL

https://movienow-int.kinepolis.be/admin

Tier 2
URL

We are planning on using a new way to authenticate our INT/UAT testers, and it's active on this URL. Are there weaknesses on this page?

https://shop-acc.kinepolis.be/

Tier 2
URL

identityserver-acc.landmarkcinemas.com

Tier 2
URL

kinepolis-studio.be

Tier 2
URL
Tier 2
iOS
Tier 2
Android

shop.kinepolis.be

Tier 2
URL

shop.kinepolis.es

Tier 2
URL

shop.kinepolis.fr

Tier 2
URL

shop.kinepolis.lu

Tier 2
URL

stage.landmarkcinemas.com

Tier 2
URL

userprofile-acc.landmarkcinemas.com

Tier 2
URL

www.kinepolis.biz

Tier 2
URL

*.kinepolis.be

Tier 3
Wildcard

*.kinepolis.ch

Tier 3
Wildcard

*.kinepolis.com

Tier 3
Wildcard

*.kinepolis.fr

Tier 3
Wildcard

*.kinepolis.lu

Tier 3
Wildcard

*.kinepolis.nl

Tier 3
Wildcard

*.landmarkcinemas.com

Tier 3
Wildcard

*.mjrtheatres.com

Tier 3
Wildcard
Tier 3
iOS

www.kinepolisempresas.com/

Tier 3
URL

egaming.kinepolis.es

No bounty
URL

*.cineramabios.nl

Out of scope
Wildcard

dev.kinepolis.com

Out of scope
URL

jobs.kinepolis.com

Out of scope
URL

l.kinepolis.com

Out of scope
URL

openx.kinepolis.com

Out of scope
URL
In scope

Happy to learn about any vulnerability impacting our website but of course we are extra eager to learn the following:

  • How the bad guys are scoring free tickets on our expense. Score yours in a good way!
  • Changing our movie content/pictures! We don’t want to misinform our guests do we?
  • Gather sensitive data about our clients, it’s more a thing between us and our client, you know?
  • Do bad stuff with our business shop, we need to run a business as well!

We've listed all assets that you're allowed to test in the domains section.

Please use an intigriti.me for signups, this makes it easier for us to clean an overabundance of unused emails/accounts or to track and trace if something goes wrong!

Note: Log4j vulnerabilities are in scope of this program

Out of scope

While we happily welcome any input from researchers that showcases a potential vulnerability in one of our services, we have assembled a list of issues which are out of scope for this program. Exceptions can be made if the researcher provides a realistic attack scenario that showcases a significant risk to our security.

The following domains of Kinepolis including but not limited to:

  • *.cineramabios.nl
  • openx.kinepolis.com
  • l.kinepolis.com
  • dev.kinepolis.com
  • jobs.kinepolis.com

Violations against best practices that only have a theoretical chance of exploitation such as:

  • Lack of a strong password policy
  • Lack of security headers (Unless the lack of a header is the direct cause of a vulnerability)
  • Lack of rate limit on non-sensitive endpoints and/or bruteforce attacks
  • Autocomplete functionality in forms
  • Insignificant information disclosure
  • Internal IP disclosure
  • Descriptive error messages (Stack trace information, full path disclosure)
  • Lack of the X-FRAME-OPTIONS header on static pages or pages that don’t contain dangerous or sensitive actions.
  • Any form of DoS unless a *simple PoC showcases significant downtime
  • Spamming
  • User, and other insignificant, enumeration attacks
  • Vulnerabilities as reported by automated tools without additional analysis as to how they're an issue in the context of our tool
  • If all we receive is scanner output that turns out to be correct the submission will be accepted but no bounty will be awarded.
  • Vulnerabilities that require extensive social engineering
  • Social engineering of our employees/support
  • Self-XSS
  • XSS that is not exploitable in a modern browser
  • Content injection if the only attack scenario is social engineering
  • Issues that require your target to open the developer tools of a browser
  • Issues that require an attacker to have physical access to the target’s device or network traffic.
  • Weak SSL configurations and SSL/TLS scan reports (this means output from sites such as SSL Labs)
  • Disclosure of used software and their version
  • CSRF issues with low impact
  • Sensitive information leaking to a trusted third party partner.
  • 0 day vulnerabilities in software that haven’t been disclosed publicly for more than three months. We require time to schedule our updates to limit downtime on our systems and limit impact on user experience.
  • Lack of the secure or HTTPOnly flag on cookies
  • Publicly accessible login panels
  • Open ports without an accompanying proof-of-concept demonstrating vulnerability
  • The internal communications app "Kinetalks" is completely out of scope
  • Issues regarding DMARC and DKIM, we have a project running in Proof of concept to fix this, as such all submissions regarding such vulnerabilities will immediatly be closed as out-scope. (this also includes reports about SPF records)
  • public xmlrpc.php files
  • Subdomain takeover without taking the subdomain over
  • Pre-auth account takeover / oauth squatting
  • API key disclosure without proven business impact

Out-scope for mobile:

  • Shared links leaked through the system clipboard
  • Any URIs leaked because a malicious app has permission to view URIs opened
  • The absence of certificate pinning
  • Sensitive data in URLs/request bodies when protected by TLS
  • Lack of obfuscation is out of scope
  • Path disclosure in the binary
  • Lack of jailbreak & root detection
  • Crashes due to malformed URL Schemes
  • Lack of binary protection (anti-debugging) controls, mobile SSL pinning
  • Snapshot/Pasteboard leakage
  • Runtime hacking exploits (exploits only possible in a jailbroken environment)
  • API key leakage used for insensitive activities/actions (edited)
Severity assessment

We are really happy with your support! To ensure you have a great feeling about your work for Kinepolis, we invite you and some friends in one of our theatres to have a great night, a look behind the scenes and enjoy the ultimate cinema experience even more intense!

While you are there, you might have the opportunity to check our cash machines! Create yourself a whole new cinema experience.

Please find some examples of criticalities below:

Exceptional

  • Remote Code Execution

Critical

  • SQL injection
  • Access to all customer data

High

  • Free tickets to catch a movie
  • Impersonation of other user (1 user per time)
  • Access to specific customer

Medium

  • Public content manipulation (e.g. movie posters / movie trailer / movie description)

Low

  • Scripting and automation
  • Weak ciphers/certs
  • Clickjacking
  • XSS requiring extensive social engineering

Informative

  • Debug stacktrace

Please also note that we rate our submissions based on business impact.

FAQ

Where can we get credentials for the app?

You can self-register on the public URLs by clicking on the Sign In button. You will be redirected to with the option to register. Please do make use of your @intigriti.me email address.

All aboard!
Please log in or sign up on the platform

For obvious reasons we can only allow submissions or applications for our program with a valid Intigriti account.

It will only take 2 minutes to create a new one or even less to log in with an existing account, so don't hesitate and let's get started. We would be thrilled to have you as part of our community.

Researchers
last contributors
logo
logo
logo
logo
logo
logo
leaderboard
logo
logo
logo
logo
logo
logo
Last 90 day response times
avg. time first response
< 2 days
avg. time to decide
+3 weeks
avg. time to triage
< 2 days
Activity
4/15
Kinepolis
closed a submission
4/15
Kinepolis
closed a submission
4/13
logo
created a submission
4/12
logo
created a submission
4/11
logo
created a submission
4/11
Kinepolis
closed a submission
4/11
logo
created a submission
4/10
Kinepolis
closed a submission
4/10
Kinepolis
closed a submission
4/8
logo
created a submission