Follow @EthHackingNews |
The problem lived inside the Arc Boosts feature that lets you customize any website with CSS and Javascript. On top of its initial mitigations, the company says it now has disabled Boosts with Javascript by default and added a new global toggle to turn Boosts off completely in Arc version 1.61.2.
The researcher, known as xyz3va, was initially paid a $2,000 bounty for the information. Now, with the new program in place, The Browser Company is upping it to $20,000 retroactively. The vulnerability was patched on August 26th.
Last Friday, we promised changes to @browsercompany's security. One week later, here's action:
Arc's Bug Bounty Program is live
Arc's Security Bulletin is live
We redesigned internal security processes
Much more to come, details in thread https://t.co/JMf3oEub1C
Josh Miller (@joshm) September 27, 2024
Follow @EthHackingNews |