CVE ID | |
CVSS SCORE | 6.5, AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
AFFECTED VENDORS |
OpenAI |
AFFECTED PRODUCTS |
ChatGPT |
VULNERABILITY DETAILS |
This vulnerability allows remote attackers to bypass policy restictions on affected versions of OpenAI ChatGPT. Authentication is required to exploit this vulnerability. The specific flaw exists within the interface to the ChatGPT-Vision Data model. The issue results from the lack of proper validation of a user-supplied string before using it as a prompt to the model. An attacker can leverage this vulnerability to bypass model policy restrictions and obtain generated text concerning subjects in a picture. |
ADDITIONAL DETAILS |
12/05/23 – ZDI reported the vulnerability to the vendor. 12/05/23 – The vendor states that this model vulnerability type is out of the scope of their bug bounty program and that they would pass the report on to the appropriate team. 12/06/23– ZDI acknowledged their rejection and informed the vendor that we’re publishing this case as a zero-day advisory. -- Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the application. |
DISCLOSURE TIMELINE |
|
CREDIT | Demeng Chen |