AFAICT this is not the OpenAI web interface, it’s just a third-party web interface for ChatGPT that calls the OpenAI API and the author of this web interface called it just “ChatGPT”.
Presumably the author of this article is incapable of actually doing the 2 minutes of research necessary to identify that this is not an official ChatGPT codebase that contains the vulnerability.
“hackread.com” ? Written by a hack, more like.
It is a bug in chatgpt that is being used to attack companies that rely on openAI’s API. They point that out in the literal first paragraph of the article.
In its latest research report, cybersecurity firm Veriti has spotted active exploitation of a vulnerability within “OpenAI’s ChatGPT infrastructure” but there is no evidence that OpenAI itself has been breached.
I really don’t know what is your problem.
I’m claiming that the article is wrong and you’re quoting the article at me? Yes I know what the article says because I read it, and then researched the vulnerability.
The CVE is: https://nvd.nist.gov/vuln/detail/CVE-2024-27564
Which was described in an issue in GitHub here: https://github.com/dirk1983/chatgpt/issues/114
Which relates to this GitHub repository: https://github.com/dirk1983/chatgpt/
Which is by github user dirk1983, and if you read (translate) the readme, you will see that it’s a ChatGPT front-end written by this user, not anything officially released by OpenAI.
The confusion comes from the fact that his repository (this front-end with the vulnerability) is just called “ChatGPT”, and neither the journalist nor you did this basic search to find that out.
But the author bios says:
Deeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform’s trusted coverage.
Lol
Add them to the mute list :p