HomeSample Page

Sample Page Title


For 13 years, a key pillar of the Chrome Safety ecosystem has included encouraging safety researchers to seek out safety vulnerabilities in Chrome browser and report them to us, by way of the Chrome Vulnerability Rewards Program.

Beginning immediately and till 1 December 2023, the primary safety bug report we obtain with a useful full chain exploit, leading to a Chrome sandbox escape, is eligible for triple the complete reward quantity. Your full chain exploit might lead to a reward as much as $180,000 (doubtlessly extra with different bonuses).

Any subsequent full chains submitted throughout this time are eligible for double the complete reward quantity!

We now have traditionally put a premium on studies with exploits – “prime quality studies with a useful exploit” is the very best tier of reward quantities in our Vulnerability Rewards Program. Over time, the menace mannequin of Chrome browser has advanced as options have matured and new options and new mitigations, such a MiraclePtr, have been launched. Given these evolutions, we’re all the time excited by explorations of recent and novel approaches to completely exploit Chrome browser and we wish to present alternatives to higher incentivize one of these analysis. These exploits present us helpful perception into the potential assault vectors for exploiting Chrome, and permit us to establish methods for higher hardening particular Chrome options and concepts for future broad-scale mitigation methods.

The complete particulars of this bonus alternative can be found on the Chrome VRP guidelines and rewards web page. The abstract is as follows:

  • The bug studies could also be submitted upfront whereas exploit improvement continues throughout this 180-day window. The useful exploits should be submitted to Chrome by the top of the 180-day window to be eligible for the triple or double reward.
    • The primary useful full chain exploit we obtain is eligible for the triple reward quantity.
  • The complete chain exploit should lead to a Chrome browser sandbox escape, with an indication of attacker management / code execution outdoors of the sandbox.
  • Exploitation should be capable of be carried out remotely and no or very restricted reliance on consumer interplay.
  • The exploit will need to have been useful in an energetic launch channel of Chrome (Dev, Beta, Secure, Prolonged Secure) on the time of the preliminary studies of the bugs in that chain. Please don’t submit exploits developed from publicly disclosed safety bugs or different artifacts in outdated, previous variations of Chrome.

As is per our common rewards coverage, if the exploit permits for distant code execution (RCE) within the browser or different highly-privileged course of, reminiscent of community or GPU course of, to lead to a sandbox escape with out the necessity of a primary stage bug, the reward quantity for renderer RCE “prime quality report with useful exploit” could be granted and included within the calculation of the bonus reward complete.

Based mostly on our present Chrome VRP reward matrix, your full chain exploit might lead to a complete reward of over $165,000 -$180,000 for the primary full chain exploit and over $110,000 – $120,000 for subsequent full chain exploits we obtain within the six month window of this reward alternative.

We’d wish to thank our complete Chrome researcher group in your previous and ongoing efforts and safety bug submissions! You’ve really helped us make Chrome safer for all customers.

Pleased Looking!


Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles