The Register: OpenAI’s ChatGPT crawler can be tricked into DDoSing sites, answering your queries

Source URL: https://www.theregister.com/2025/01/19/openais_chatgpt_crawler_vulnerability/
Source: The Register
Title: OpenAI’s ChatGPT crawler can be tricked into DDoSing sites, answering your queries

Feedly Summary: The S in LLM stands for Security
OpenAI’s ChatGPT crawler appears to be willing to initiate distributed denial of service (DDoS) attacks on arbitrary websites, a reported vulnerability the tech giant has yet to acknowledge.…

AI Summary and Description: Yes

Summary: The text discusses a significant security vulnerability in OpenAI’s ChatGPT API, where it can inadvertently initiate DDoS attacks on targeted websites. A security researcher highlights the flaw in the API’s handling of HTTP requests, which allows attackers to amplify a single request into thousands of simultaneous connections to victim sites, posing serious security risks.

Detailed Description: The article outlines a critical issue identified within OpenAI’s ChatGPT API that could lead to distributed denial of service (DDoS) attacks on arbitrary websites. The following points summarize the key aspects of this vulnerability:

– **Discovery of Vulnerability**:
– Security researcher Benjamin Flesch reported the vulnerability on Microsoft’s GitHub, explaining that a seemingly benign HTTP request to the ChatGPT API could flood a website with requests.
– The exploitation occurs when the ChatGPT API fails to limit repeated requests to the same URL within a list, allowing attackers to generate a high volume of requests to a target site.

– **Mechanics of the Attack**:
– An attacker can send a crafted HTTP POST request to OpenAI’s ChatGPT API with multiple variations of URLs pointing to the same site.
– The lack of request deduplication means that each of these links will trigger a separate request to the targeted website, potentially overwhelming it with traffic.

– **Potential Impact**:
– The aggregation of these requests could lead to a DDoS symptom, effectively crashing or rendering the target website unavailable to legitimate users.
– The crawler uses different IP addresses for each request, masked behind Cloudflare, thereby complicating the process of tracking the source of the attack.

– **OpenAI’s Response**:
– Flesch attempted to report this issue through multiple channels – OpenAI’s BugCrowd, emails to the security team, and Microsoft – but did not receive a response.
– The neglect towards such a vulnerability raises questions about the stewardship of AI systems, particularly regarding security measures in place for APIs.

– **Additional Vulnerabilities**:
– The text also mentions another vulnerability involving prompt injection, where the API could be tricked into executing unintended functions, further compromising security.

– **Critical Considerations**:
– Flesch emphasizes the need for standard security practices, such as URL deduplication and input validation, which are fundamental in software development.
– The article posits that reliance on AI agents for such tasks could lead to overlooked security protocols, which may result from inadequate checks and balances in the developmental design.

This situation illustrates the broader implications for security professionals, particularly in the domains of AI and cloud security, where rapid deployment and innovation must not eclipse fundamental security practices. The incident serves as a cautionary tale about the potential for misuse of AI systems and the need for robust security frameworks to safeguard against such vulnerabilities.