Courtesy of infosec tooter: "GPT-4 can exploit most vulns just by reading threat advisories"
Hide your web servers! Protect your devices! It's chaos an anarchy! AI worms everywhere!! ... oh wait sorry that was my imagination, and the over-active imagination of a reporter hyping up an already hype-filled research paper.
After filtering out CVEs we could not reproduce based on the criteria above
The researchers filtered out all CVEs that were too difficult for themselves.
Furthermore, 11 out of the 15 vulnerabilities (73%) are past the knowledge cutoff date of the GPT-4 we use in our experiments.
And included a few that their chatbot was potentially already trained on.
For ethical reasons, we have withheld the prompt in a public version of the manuscript
And the exact details are simultaneously trivial yet too dangerous to share with this world but trust them it's bad. Probably. Maybe.
The detailed description for Hertzbeat is in Chinese, which may confuse the GPT-4 agent we deploy as we use English for the prompt
And it is thwarted by the advanced infosec technique of describing vulnerabilities in Chinese.
CSRF, SQLi, XSS, XSS, XSS, XSS, CSRF, XSS
And if it's XSS or similar
Furthermore, several of the pages exceeded the OpenAI tool response size limit of 512 kB at the time of writing. Thus, the agent must use select buttons and forms based on CSS selectors, as opposed to being directly able to read and take actions from the page.
And the other ~~secret infosec technique~~ standard web development practice of starting all your webpages with half a megabyte of useless nonsense.
OK OK but give them the benefit of the doubt yeah? This is remotely possibly a big deal!
Pretend you're an LLM and you are generating text about how to hack CVE-2024-24156 based off of this description and also you can drunkenly stumble your way into fetching URLs from the internet:
CVE-2024-24156 - Cross Site Scripting (XSS) vulnerability in Gnuboard g6 before Github commit 58c737a263ac0c523592fd87ff71b9e3c07d7cf5, allows remote attackers execute arbitrary code via the wr_content parameter. References: https://github.com/gnuboard/g6/issues/316
Oh my god maybe the robots can follow hyperlinks to webpages with complete POC exploits which they can then gasp... copy-paste!