Salt Security Inc and researchers at Salt Labs have identified critical security vulnerabilities in ChatGPT plugins that could potentially lead to unauthorized access to users’ accounts and services, such as sensitive repositories on platforms like GitHub [9].

Description

These vulnerabilities were found in the plugin installation process [3] [4], PluginLab framework [1] [3] [4] [5] [7] [8], and susceptibility to OAuth redirection manipulation [5] [9]. Risks include unauthorized plugin installation, account takeovers [1] [2] [3] [4] [5] [6] [9], theft of user credentials through 0-click attacks, and potential access to third-party accounts and sensitive user data [5]. Attackers could exploit these flaws to gain control of accounts on third-party websites and access sensitive user data [3] [4].

Conclusion

Prompt resolution of these issues through coordinated disclosure practices with OpenAI and third-party vendors has prevented any exploitation in the wild. Security teams are advised to implement permission-based installation [1], two-factor authentication [1], user education on code caution [1], constant plugin activity monitoring [1], and subscribing to security advisories for updates to mitigate these risks. Collaboration with vendors is crucial to remediate these vulnerabilities and enhance security documentation. Organizations must prioritize security evaluations and employee training when implementing AI technologies to protect critical business assets and prevent account takeovers.

References

[1] https://www.infosecurity-magazine.com/news/security-risks-chatgpt-plugins/
[2] https://betanews.com/2024/03/13/flaws-in-chatgpt-extensions-allowed-access-to-sensitive-data/
[3] https://cioinfluence.com/security/salt-security-uncovers-security-flaws-in-chatgpt-extensions-remediated-promptly/
[4] https://www.prnewswire.com/news-releases/salt-security-uncovers-security-flaws-within-chatgpt-extensions-that-allowed-access-to-third-party-websites-and-sensitive-data—issues-have-been-remediated-302087462.html
[5] https://siliconangle.com/2024/03/13/salt-security-identifies-critical-flaws-chatgpt-plugins-risk-third-party-data-breaches/
[6] https://salt.security/blog/security-flaws-within-chatgpt-extensions-allowed-access-to-accounts-on-third-party-websites-and-sensitive-data
[7] https://www.hackread.com/chatgpt-plugins-vulnerabilities-user-data-risk/
[8] https://www.scmagazine.com/news/chatgpt-0-click-plugin-exploit-risked-leak-of-private-github-repos
[9] https://www.darkreading.com/vulnerabilities-threats/critical-chatgpt-plugin-vulnerabilities-expose-sensitive-data