TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

And.. another OAuth vulnerability – now it's ChatGPT

4 pointsby DBformoreabout 1 year ago
TLDR:<p>The state variable that ChatGPT uses in the integration with plugins, was not random. Attackers could install a malicious plugin on a victim by sending a link that mimic the last step of the OAuth flow.<p>The takeaway: If your company has an OAuth, make sure the state parameter is random. That&#x27;s a common mistake.<p>https:&#x2F;&#x2F;salt.security&#x2F;blog&#x2F;security-flaws-within-chatgpt-extensions-allowed-access-to-accounts-on-third-party-websites-and-sensitive-data

1 comment

MorLabout 1 year ago
The link is not clickable: <a href="https:&#x2F;&#x2F;salt.security&#x2F;blog&#x2F;security-flaws-within-chatgpt-extensions-allowed-access-to-accounts-on-third-party-websites-and-sensitive-data" rel="nofollow">https:&#x2F;&#x2F;salt.security&#x2F;blog&#x2F;security-flaws-within-chatgpt-ext...</a>