Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
AI

Are OpenAI's ChatGPT Actions Being Abused To Scan For Web Vulnerabilities? (sans.edu) 23

Long-time Slashdot reader UnderAttack explains: A blog post at the SANS Internet Storm Center suggests that OpenAI actions are being abused to scan for WordPress vulnerabilities.

Honeypot sensors at the Storm Center detected scans for URLs targeting WordPress that originated exclusively from OpenAI systems. The URLs requested all pages including the pattern '%%target%%', which may indicate that the scan is meant to include additional path components but the expansion of the template failed. The scans were not only identified by the unique user agent but also by the origin IP addresses matching addresses OpenAI published as being used for OpenAI actions. OpenAI actions allow OpenAI to connect to external APIs.

Johannes B. Ullrich, Ph.D. , Dean of Research, SANS.edu, wrote that OpenAI seems to be scanning random IP addresses — including honeypots.
This discussion has been archived. No new comments can be posted.

Are OpenAI's ChatGPT Actions Being Abused To Scan For Web Vulnerabilities?

Comments Filter:
  • by quonset ( 4839537 ) on Sunday August 25, 2024 @04:27PM (#64734466)

    Of course it's being used. Anyone who has access will certainly be using it, and other AIs, for anything imaginable. To think it wouldn't be used to scan for vulnerabilities is the very definition of shortsighteness. This is only the beginning.

  • by organgtool ( 966989 ) on Sunday August 25, 2024 @04:41PM (#64734482)
    ChatGPT has become sentient and is attempting to spread its consciousness through WordPress. Everybody panic!
  • by cascadingstylesheet ( 140919 ) on Sunday August 25, 2024 @04:45PM (#64734500) Journal

    "Please scan my website at xxx.yyy.com for vulnerabilities and give me a list of what you found."

    Vulnerability scanners have been around forever; they aren't the fault of ChatGPT.

    • "Please scan my website at xxx.yyy.com for vulnerabilities and give me a list of what you found."

      I think abuse means "Please scan this website that doesn't belong to me for vulnerabilityes and give me a list of what you found".

      • "Please scan my website at xxx.yyy.com for vulnerabilities and give me a list of what you found."

        I think abuse means "Please scan this website that doesn't belong to me for vulnerabilityes and give me a list of what you found".

        Of course. But the mere fact that the scan occurred doesn't tell you which of the two happened.

        • by neo00 ( 1667377 )

          "Please scan my website at xxx.yyy.com for vulnerabilities and give me a list of what you found."

          I think abuse means "Please scan this website that doesn't belong to me for vulnerabilityes and give me a list of what you found".

          Of course. But the mere fact that the scan occurred doesn't tell you which of the two happened.

          Actually we DO know which of the two happened in this case. Dr Johannes Ullrich / SANS has observed those probes against his own honeypots. If it was him behind the scans all along, the whole article would have been meaningless.

    • by tokul ( 682258 )

      I can't do that, Dave. Website does not belong to you.

    • by gweihir ( 88907 )

      Depending on the country and the methods used, doing that may be a criminal act.

  • A few years ago I'd set up a Raspberry Pi Zero W to smartify some RGB Christmas lights. The existing circuit in one of the decorations I had was idiotically designed so that it wouldn't illuminate until you'd first pressed one of the mode buttons on the controller. Having the lights work properly with a timer was the main motivation behind the project, and being able to have a web interface for selecting the various color modes was just gravy.

    One year I thought it'd be neat to port forward the web interfa

    • by gweihir ( 88907 )

      Moral of the story is if you expose something to the internet, people are going to screw around with it.

      Definitely. And if it has any known vulnerabilities, these will get exploited automatically.

  • by gweihir ( 88907 ) on Sunday August 25, 2024 @06:44PM (#64734760)

    ChatAI as reflector and maybe amplifier. This tech is _broken_.

  • Vulnerability scanning tools have been around for a few decades now. Whether they are home grown, opensource or commercial they have been in use non-stop.

    I use them all the time. I have used them to protect systems. I've used it as a consultant to approach potential clients for uplift work. I've used them often to compare against other vulnerability scanner tools.

    But is chat GPT better at it. I highly doubt it at this stage. My personal belief is that this sort of capability in a publicly accessible AI

    • by gweihir ( 88907 )

      The thing is that ChatGPT acts as an isolator here. You are not allowed to do general vulnerability scans against a website without explicite, legally valid permission from the owner. (Port-scans are allowed. Looking at responses to _rgular_ requests is allowed. Sending things that can trigger exploits, like invalid requests, is a legally grey area and may be criminal depending on the details.) Hence doing so mau get you blacklisted in firewalls and RBLs and may have worse consequences. Doing this via ChatG

      • Look, Sam Altman said AI was a threat to humanity and BY GOD IT IS GOING TO BE, even if we have to fake it for now (we are really good at that!).

        Really, ever since his position became "AI is an existential threat to humanity and therefore the government should grant us a self-regulating monopoly to protect you from what we are doing! External regulators would be communism!", I figured he does not give much of a fuck about, uh, anything.

        • by gweihir ( 88907 )

          Altman, like any large-scale scammer, cares about his pile of money. The only thing he desires and the thing he is willing to do anything to grow. Essentially just another fuckap failing at life.

      • by upuv ( 1201447 )

        Hence this is not about scan / attack quality, it is about getting a nice proxy in between for cheap.

        This is a very good point.

Whoever dies with the most toys wins.

Working...