{"id":1964,"date":"2016-02-13T12:05:49","date_gmt":"2016-02-13T12:05:49","guid":{"rendered":"https:\/\/www.rlogical.com\/?p=1534"},"modified":"2023-03-29T12:09:09","modified_gmt":"2023-03-29T06:39:09","slug":"microsoft-opens-limited-bug-bounty-for-coreclr-and-asp-net-5-betas","status":"publish","type":"post","link":"https:\/\/www.rlogical.com\/blog\/microsoft-opens-limited-bug-bounty-for-coreclr-and-asp-net-5-betas\/","title":{"rendered":"Microsoft Opens Limited Bug Bounty for CoreCLR and ASP.NET 5 Betas"},"content":{"rendered":"<p>The bounty program of Microsoft implies lucrative rewards for individuals who can scour notable threats and flaws in any new software or application developed by the company. The bug bounty program is constituted to obtain coherent data on the feasibility of programs and software as well as reward individuals with technical acumen. <!--more--><\/p>\n<p>Microsoft varies its monetary rewards in the bug bounty scheme from $500 to $100,000 depending on the magnitude of the risk spotted. Microsoft is planning to impart bounties amounting up to $15,000 for finding out the most detrimental facets in the unreleased beta versions of its latest <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/blogs.msdn.com\/b\/dotnet\/archive\/2015\/02\/03\/coreclr-is-now-open-source.aspx\">CoreCLR<\/a><\/span> and ASP.NET 5 application software.<\/p>\n<p>The provision of varying scale of rewards in the bounty program envisions proficient research and tactful apprehension of flaws. Through such a program, Microsoft can get a pragmatic evaluation of the beta versions of CoreCLR and ASP.NET 5. Furthermore, researchers and persons adept at evaluating <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.careerride.com\/ASP-NET-Development-Methodologies.aspx\">ASP.NET Methodologies<\/a><\/span> can make the most out of this opportunity. Prior to assuming prerogatives, participants of this program have to estimate a lucid impression of the guidelines prescribed by Microsoft for the bug bounty program.<\/p>\n<p>In order to consider participation in the Microsoft bug bounty scheme, individuals must assess their eligibility with respect to the criteria set by the company.<\/p>\n<h2>Some of the crucial elements in the criteria set by Microsoft are:<\/h2>\n<ul>\n<li>The risk which is reported must be new and there should be no instances of recurring setbacks. There should be no references to the findings of other researchers. Some of the examples include data protection discrepancies, encoding drawbacks etc.<\/li>\n<li>The bounty encompasses the networking stack of beta version or RC1 version of CoreCLR. Networking bugs are excluded from the premises of the bug bounty program.<\/li>\n<li>Reports concerning vulnerability must be affable and ready for processing. This enables a faster evaluation of the reports and quicker remunerations as per the degree of anomaly reported.<\/li>\n<\/ul>\n<p>The bug bounty program commenced on October 15, 2015 and shall conclude on the 20th of January, 2016. Credible assessment of vulnerabilities and subsequent suggestions for improvement can amount to monetary rewards depending on the nature and complexity of the threat.<\/p>\n<p>Microsoft enjoys sole discretion in case of rewards. The final reports are scrutinized meticulously and eligible submissions are felicitated with proper distinction. Microsoft determines rewards based on the vulnerability type and proofs submitted for validating the claim.<\/p>\n<h2>Some of the most common threats reported are concerned with the following aspects:<\/h2>\n<ul>\n<li>Privilege elevations<\/li>\n<li>Tampering or imitations<\/li>\n<li>Execution of remote data code<\/li>\n<li>Template CSRF or XSS<\/li>\n<li>Information misappropriation<\/li>\n<li>Shortcomings in security framework<\/li>\n<li>Remote DoS<\/li>\n<\/ul>\n<p>Payments from Microsoft are done in a comprehensive manner after precise evaluation of the submitted reports by proficient engineers at Microsoft. Proper documentation and paperwork are the stand out points in the bug bounty program.<\/p>\n<p>Other crucial entities to be followed in this program include complete confidentiality of the proceedings of your research. Microsoft asks for maintaining secrecy on the exploit codes discovered during evaluation of the beta versions of CoreCLR and ASP.NET 5.<\/p>\n<p>Source: <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.cso.com.au\/article\/587169\/microsoft-opens-limited-bug-bounty-coreclr-asp-net-5-betas\/\">http:\/\/www.cso.com.au<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The bounty program of Microsoft implies lucrative rewards for individuals who can scour notable threats and flaws in any new software or application developed by the company. The bug bounty program is constituted to obtain coherent data on the feasibility of programs and software as well as reward individuals with technical acumen.<\/p>\n","protected":false},"author":5,"featured_media":13974,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1964","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-asp-net-development"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.rlogical.com\/wp-json\/wp\/v2\/posts\/1964","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rlogical.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rlogical.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rlogical.com\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rlogical.com\/wp-json\/wp\/v2\/comments?post=1964"}],"version-history":[{"count":1,"href":"https:\/\/www.rlogical.com\/wp-json\/wp\/v2\/posts\/1964\/revisions"}],"predecessor-version":[{"id":13981,"href":"https:\/\/www.rlogical.com\/wp-json\/wp\/v2\/posts\/1964\/revisions\/13981"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rlogical.com\/wp-json\/wp\/v2\/media\/13974"}],"wp:attachment":[{"href":"https:\/\/www.rlogical.com\/wp-json\/wp\/v2\/media?parent=1964"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rlogical.com\/wp-json\/wp\/v2\/categories?post=1964"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rlogical.com\/wp-json\/wp\/v2\/tags?post=1964"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}