From today, 1st of December and to 18th of December 23:59 we will run have a special campaign for our authentication service.
In this period we've bumped the bounties (~25 %) on all severity levels for login.prod.nube.tech
The login portal is a critical service in our infrastructure handling user authentication and assigning access policies. It is built with Django.
To make it more interesting you can in this period also bypass the WAF by adding intigriti-bb to the end of your user-agent. Make sure you use lowercase.
Brute-force / password spraying attacks and such are not in scope. Please refrain from these attacks when testing the service.
Happy hacking!
We have corrected a copy-paste error in the scope section for the mobile apps. The ids to Mathem iOS app and Oda Android app is now the correct ones. Sorry about the confusion!
The domain mathem.se and the android and iOS app has been moved to tier 2 and are eligible for higher bounties.
The swedish brand Mathem is now part of the Oda group.
We've added the mathem app for both iOS and Android as well as the website mathem.se to the bug bounty program
We remind you that be mindful of the requests per second (RPS) when testing our services, this is especially important when running automated tools such as fuzz faster u fool.
The current limit has been updated to 5 RPS. IP addresses that keeps violating this rule will get banned permanently.
We also encourage you to use the x-bounty header so that we can distinguish your traffic from malicious.
Thanks!
Security team in Oda
We have updated the scope for the program to include our domain *.prod.nube.tech. Most of the services are behind our authentication proxy and therefore not exposed.
However, you will find our new authentication service available on login.oda.com and login.prod.nube.tech. This is a new service built with Django.
Technology updates
We are introducing Fasty CDN and Fastly WAF on our main site, oda.com. We are especially interested in any misconfigurations that can lead to vulnerabilities.
General
Oda has temporarily shutdown its operations in Germany and Finland which also means that the shops are down. However, you can still test our shop in Norway but unfortunetly it is only available in norwegian.
Regards,
Security team in Oda
We now require the request header **X-bounty: <your Intigriti username> ** on all request when you participate in Oda's bug bounty program.
In Burp Suite you can simply add a rule under: Proxy > Options > Match and replace.
Regards,
Security in Oda
As of today, we have increased the bounties.
Regards,
Security in Oda
Hi!
We've now been running the bug bounty program for about a month. We've decided to increase the scope and added *.oda.com to the scope.
Regards,
Security in Oda

