Skip to content

bentoboxinfosec

many parts make the whole

  • Home
  • Blog
  • CTF Cheat Sheet
  • About
  • Home
  • 2023
  • March
  • 25
  • REMOTE CODE EXECUTION BY ASKING NICELY – InjectGPT

REMOTE CODE EXECUTION BY ASKING NICELY – InjectGPT

Posted on March 25, 2023May 28, 2023 By topbento No Comments on REMOTE CODE EXECUTION BY ASKING NICELY – InjectGPT
News, Vulnerability

In it’s too good to be true news, what if you could just ask your target system to execute code? Lucas Luitjes has an interesting article about simply asking AI chatbots to execute code and it turns out they will! Sanitizing user input has been a known issue for quite some time. Without sanitized input things like command injection and SQLi are possible leading to all kinds of data disclosure and remote code execution, sometimes as highly privileged users.

This has some very interesting implications. As AI chatbots become more capable it is important to find ways to prevent them from doing things they shouldn’t be doing, both on local and remote systems. Removing special characters and preventing OS command injection is one thing, but when the input is literally the entire English, (or another), language sanitizing input starts to look like a much more daunting task!

Full writeup here!

Tags: AI chatbot exploitation cybersecurity news informationsecurity news

Post navigation

❮ Previous Post: Veeam Backup & Replication – CVE-2023-27532
Next Post: ShmooCon 2023 CONFERENCE VIDEOS ❯

You may also like

News
LINUX FIREWALL VULNERABILITY – CVE-2022-34918
July 20, 2022
Breach
NINTH TELECOM COMPANY ADDED TO LIST OF Salt Typhoon TARGETS
December 28, 2024
Breach
MARRIOTT ADMITS IT FALSELY CLAIMED IT WAS USING ENCRYPTION
May 2, 2024
Breach
Cisco CONFIRMS AUTHENTICITY OF 4.45 GB DATA BREACH
January 2, 2025

Leave a Reply Cancel reply

You must be logged in to post a comment.

Recent Posts

  • Salt Typhoon THREAT ACTORS SPOTTED ON US GOVT NETWORKS BEFORE TELCOS
  • Charter and Windstream ADDED TO LIST OF TELCO PROVIDERS COMPROMISED BY Salt Typhoon
  • Cisco CONFIRMS AUTHENTICITY OF 4.45 GB DATA BREACH
  • NINTH TELECOM COMPANY ADDED TO LIST OF Salt Typhoon TARGETS
  • McDonald’s API EXPLOITED FOR ONE CENT DELIVERIES

Recent Comments

No comments to show.

Archives

  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • May 2024
  • April 2024
  • March 2024
  • September 2023
  • August 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • August 2022
  • July 2022
  • May 2022
  • April 2022
  • March 2022
  • January 2022
  • December 2021
  • November 2021
  • September 2021
  • August 2021
  • July 2021
  • January 2021
  • December 2020
  • August 2020
  • May 2020
  • March 2020
  • February 2020
  • October 2019
  • June 2019
  • April 2019

Categories

  • Breach
  • Cloud
  • Conferences
  • Hardware Hacking
  • Malware
  • News
  • Ransomware
  • Tools
  • Tutorial
  • Uncategorized
  • Vulnerability
  • Walkthough
  • Home
  • Blog
  • CTF Cheat Sheet
  • About
  • Twitter
  • Github
  • YouTube

Copyright © 2025 bentoboxinfosec.

Theme: Oceanly News Dark by ScriptsTown