An independent security analyst and bug hunter, Nagli (@naglinagli), recently uncovered a critical security vulnerability in ChatGPT that allow attackers to easily exploit the vulnerability and gain complete control of any ChatGPT user’s account.
ChatGPT has become extensively used by users worldwide, reaching more than 100 million in just two months of its public release.
Since its release in November, there have been several use cases of ChatGPT, and organizations are proposing plans to implement it inside their business.
Though it has extensive knowledge that can be used for several significant innovations, protecting it from a security perspective is still essential.
The Microsoft-backed OpenAI has recently launched its bug bounty program since various security researchers reported several critical bugs on ChatGPT.
One such critical finding was a Web Cache deception attack on ChatGPT Account Takeover, allowing attackers to do ATO (Account TakeOvers) inside the application.
The bug was reported on Twitter by Nagli (@naglinagli) even before the bug bounty program of ChatGPT was launched.
Web Cache deception is a new attack vector introduced by Omer Gil at the Blackhat USA conference in 2017, held in Las Vegas.
In this attack, the attacker can manipulate a web server into storing a web cache by giving a non-existent URL with a non-existent file type like CSS, JPG, or PNG.
A list of default cache file extensions is given here.
This non-existent URL is spread to victims via private or public chat forums where victims tend to click.
Later, this URL is visited by the attacker, which reveals several sensitive pieces of information.
This kind of Web Cache deception attack was discovered by a security researcher posted by him on Twitter.
As per the tweet by Nagli, the below steps can be used to replicate the issue.
However, OpenAI has rectified this issue within a few hours of being reported.
Hackers Selling ChatGPT Premium Accounts On the Dark Web
European Data Protection Board Creates Task Force to Investigate ChatGPT
ChatGPT Ready to Write Ransomware But Failed to Go Deep
ChatGPT Exposes Email Address of Other Users – Open-Source Bug
A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious actors…
SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce shoppers…
The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to malicious…
Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in 2022…
CVE-2024-52301 is a critical vulnerability identified in Laravel, a widely used PHP framework for building…
A critical vulnerability has been discovered in the popular "Really Simple Security" WordPress plugin, formerly…