Google Cloud Awards $313,337 in 2022 VRP Prizes

0
87

[ad_1]

2022 was a profitable 12 months for Google’s Vulnerability Reward Packages (VRPs), with over 2,900 safety points recognized and glued, and over $12 million in bounty rewards awarded to researchers. A major quantity of those vulnerability reviews helped enhance the safety of Google Cloud merchandise, which in flip helps enhance safety for our customers, prospects, and the Web at giant.We first introduced the Google Cloud VRP Prize in 2019 to encourage safety researchers to concentrate on the safety of Google Cloud and to incentivize sharing information on Cloud vulnerability analysis with the world. This 12 months, we have been excited to see a rise in collaboration between researchers, which frequently led to extra detailed and sophisticated vulnerability reviews. After cautious analysis of the submissions, right this moment we’re excited to announce the winners of the 2022 Google Cloud VRP Prize.2022 Google Cloud VRP Prize Winners1st Prize – $133,337: Yuval Avrahami for the report and write-up Privilege escalations in GKE Autopilot. Yuval’s glorious write-up describes a number of assault paths that may enable an attacker with permission to create pods in an Autopilot cluster to escalate privileges and compromise the underlying node VMs. Whereas these VMs are accessible to prospects in GKE Normal, this analysis led to a number of hardening enhancements in Autopilot that make it a greater secure-by-default Kubernetes providing.2nd Prize – $73,331: Sivanesh Ashok and Sreeram KL for the report and write-up SSH Key Injection on GCE. Their write-up describes the journey of discovering a vulnerability that may enable an attacker to achieve entry to a person’s GCE VM by tricking them into clicking a hyperlink. They reveal the significance of persistence and turned an odd habits in person creation into an injection of arbitrary SSH public keys.third Prize –  $31,337: Sivanesh Ashok and Sreeram KL for the report and write-up Bypassing Authorization in Cloud Workstations. Their write-up describes their analysis course of for analyzing Cloud Workstations after which a full-chain exploit to steal a person’s entry token by abusing the format of an OAuth state parameter.4th Prize – $31,311: Sreeram KL and Sivanesh Ashok for the report and write-up Shopper-Facet SSRF to Google Cloud Venture Takeover. Their write-up combines a client-side SSRF, a CSRF bypass, and a intelligent 3xx redirect by “deactivating” a Feedburner proxy. An attacker may use this vulnerability to steal a Vertex AI person’s entry token by tricking them into clicking a hyperlink.fifth Prize – $17,311: Yuval Avrahami and Shaul Ben Hai for the report and write-up Kubernetes Privilege Escalation: Extreme Permissions in Common Platforms. Their whitepaper covers privilege escalation vectors in Kubernetes and describes vulnerabilities in lots of Kubernetes internet hosting suppliers, together with Azure’s AKS, Amazon’s EKS, and GKE.sixth Prize – $13,373: Obmi for the report and write-up A Few Bugs within the Google Cloud Shell. Obmi found vulnerabilities within the Cloud Shell file add performance that may have allowed an attacker to write down arbitrary recordsdata to a person’s Cloud Shell through cross-site request forgery.seventh Prize – $13,337: Bugra Eskici for the report and write-up Command injection in Cloud Shell. Bugra discovered a really curious injection level in a Cloud Shell script that led to a URL question parameter being immediately injected right into a Python script. This vulnerability would have given an attacker arbitrary code execution in a person’s Cloud Shell in the event that they clicked on an attacker-controlled hyperlink.Congratulations to all of the winners and glad hacking! Observe us on @GoogleVRP for future information and updates.

[ad_2]