Announcing the Chrome Browser Full Chain Exploit Bonus

0
362

[ad_1]

For 13 years, a key pillar of the Chrome Security ecosystem has included encouraging safety researchers to seek out safety vulnerabilities in Chrome browser and report them to us, by means of the Chrome Vulnerability Rewards Program.

Starting immediately and till 1 December 2023, the primary safety bug report we obtain with a useful full chain exploit, leading to a Chrome sandbox escape, is eligible for triple the complete reward quantity. Your full chain exploit may lead to a reward as much as $180,000 (doubtlessly extra with different bonuses).

Any subsequent full chains submitted throughout this time are eligible for double the complete reward quantity!

We have traditionally put a premium on stories with exploits – “high quality reports with a functional exploit” is the best tier of reward quantities in our Vulnerability Rewards Program. Over the years, the menace mannequin of Chrome browser has developed as options have matured and new options and new mitigations, such a MiraclePtr, have been launched. Given these evolutions, we’re at all times involved in explorations of recent and novel approaches to completely exploit Chrome browser and we wish to present alternatives to raised incentivize such a analysis. These exploits present us precious perception into the potential assault vectors for exploiting Chrome, and permit us to establish methods for higher hardening particular Chrome options and concepts for future broad-scale mitigation methods.

The full particulars of this bonus alternative can be found on the Chrome VRP guidelines and rewards web page. The abstract is as follows:

  • The bug stories could also be submitted upfront whereas exploit improvement continues throughout this 180-day window. The useful exploits should be submitted to Chrome by the top of the 180-day window to be eligible for the triple or double reward.
    • The first useful full chain exploit we obtain is eligible for the triple reward quantity.
  • The full chain exploit should lead to a Chrome browser sandbox escape, with an illustration of attacker management / code execution outdoors of the sandbox.
  • Exploitation should be capable to be carried out remotely and no or very restricted reliance on person interplay.
  • The exploit will need to have been useful in an energetic launch channel of Chrome (Dev, Beta, Stable, Extended Stable) on the time of the preliminary stories of the bugs in that chain. Please don’t submit exploits developed from publicly disclosed safety bugs or different artifacts in previous, previous variations of Chrome.

As is in step with our basic rewards coverage, if the exploit permits for distant code execution (RCE) within the browser or different highly-privileged course of, reminiscent of community or GPU course of, to lead to a sandbox escape with out the necessity of a primary stage bug, the reward quantity for renderer RCE “high quality report with functional exploit” could be granted and included within the calculation of the bonus reward whole.

Based on our present Chrome VRP reward matrix, your full chain exploit may lead to a complete reward of over $165,000 -$180,000 for the primary full chain exploit and over $110,000 – $120,000 for subsequent full chain exploits we obtain within the six month window of this reward alternative.

We’d prefer to thank our complete Chrome researcher group in your previous and ongoing efforts and safety bug submissions! You’ve actually helped us make Chrome safer for all customers.

Happy Hunting!


LEAVE A REPLY

Please enter your comment!
Please enter your name here