Connect with us

Hi, what are you looking for?


Management & Strategy

Dropbox Paid Out Over $1 Million Through Bug Bounty Program

File hosting company Dropbox says it has awarded researchers over $1 million for vulnerabilities reported through its bug bounty program.

File hosting company Dropbox says it has awarded researchers over $1 million for vulnerabilities reported through its bug bounty program.

Dropbox launched its bug bounty program in 2014 and in April 2015 it announced a program on the HackerOne platform. The bug bounty program currently covers the company’s main websites, its Paper collaborative workspace service, and its desktop and mobile applications.

Rewards range between $216 and over $32,000, with the top amount offered for critical remote code execution vulnerabilities affecting Dropbox servers.

The company says it has paid out more than $1 million to date. This includes over $318,000 via the HackerOne platform for nearly 300 vulnerabilities and more than $330,000 at a live hacking event that took place last year in Singapore.

Dropbox has also shared a list of its favorite bug reports, which includes vulnerabilities that could have been exploited to access password-protected documents, gain access to a user’s Paper documents, access internal Dropbox services via server-side request forgery (SSRF), steal file content, and perform ImageTragick attacks.

“To those outside of the security community, it may seem counterintuitive that you can make your platform safer by encouraging security researchers to attack you, but that’s exactly the value that these programs deliver,” the Dropbox product security team said in a blog post. “This process of discovering and remediating bugs is key to our maintaining a highly secure organization and increasingly hardened product surfaces.”

Related: Google Paid Out $6.5 Million Through Bug Bounty Programs in 2019

Advertisement. Scroll to continue reading.

Related: Facebook Offers Rewards for Instagram Data Abuse Reports

Related: GitLab Paid Half a Million Dollars in Bug Bounties in One Year

Related: Bigger Rewards, New Targets Announced for Mozilla Bug Bounty Program

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.


Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.