For 13 years, a key pillar of the Chrome Safety ecosystem has included encouraging safety researchers to search out safety vulnerabilities in Chrome browser and report them to us, by way of the Chrome Vulnerability Rewards Program.
Beginning at present and till 1 December 2023, the primary safety bug report we obtain with a useful full chain exploit, leading to a Chrome sandbox escape, is eligible for triple the total reward quantity. Your full chain exploit might end in a reward as much as $180,000 (doubtlessly extra with different bonuses).
Any subsequent full chains submitted throughout this time are eligible for double the total reward quantity!
Now we have traditionally put a premium on reviews with exploits – “prime quality reviews with a useful exploit” is the very best tier of reward quantities in our Vulnerability Rewards Program. Through the years, the risk mannequin of Chrome browser has developed as options have matured and new options and new mitigations, such a MiraclePtr, have been launched. Given these evolutions, we’re at all times excited by explorations of recent and novel approaches to completely exploit Chrome browser and we need to present alternatives to raised incentivize this sort of analysis. These exploits present us precious perception into the potential assault vectors for exploiting Chrome, and permit us to determine methods for higher hardening particular Chrome options and concepts for future broad-scale mitigation methods.
The total particulars of this bonus alternative can be found on the Chrome VRP guidelines and rewards web page. The abstract is as follows:
- The bug reviews could also be submitted prematurely whereas exploit growth continues throughout this 180-day window. The useful exploits should be submitted to Chrome by the top of the 180-day window to be eligible for the triple or double reward.
- The primary useful full chain exploit we obtain is eligible for the triple reward quantity.
- The total chain exploit should end in a Chrome browser sandbox escape, with an illustration of attacker management / code execution exterior of the sandbox.
- Exploitation should have the ability to be carried out remotely and no or very restricted reliance on person interplay.
- The exploit will need to have been useful in an lively launch channel of Chrome (Dev, Beta, Steady, Prolonged Steady) on the time of the preliminary reviews of the bugs in that chain. Please don’t submit exploits developed from publicly disclosed safety bugs or different artifacts in previous, previous variations of Chrome.
As is in line with our normal rewards coverage, if the exploit permits for distant code execution (RCE) within the browser or different highly-privileged course of, corresponding to community or GPU course of, to end in a sandbox escape with out the necessity of a primary stage bug, the reward quantity for renderer RCE “prime quality report with useful exploit” could be granted and included within the calculation of the bonus reward complete.
Based mostly on our present Chrome VRP reward matrix, your full chain exploit might end in a complete reward of over $165,000 -$180,000 for the primary full chain exploit and over $110,000 – $120,000 for subsequent full chain exploits we obtain within the six month window of this reward alternative.
We’d wish to thank our total Chrome researcher group to your previous and ongoing efforts and safety bug submissions! You’ve actually helped us make Chrome safer for all customers.
Blissful Searching!