Tyler Jespersen

3 posts

Tyler Jespersen

Tyler Jespersen

@crew7sec

Security Researcher @BeyondTrust LinkedIn: https://t.co/aBasR6gB5w

Bergabung Ekim 2011
24 Mengikuti84 Pengikut
Tyler Jespersen
Tyler Jespersen@crew7sec·
@toughyear @kmcquade3 @OpenAI @btphantomlabs Hey there! The attack vector is command injection in the branch name whenever you make a codex task (HTTP request). More of a Privesc. So 3 options: ChatGPT -> Github GitHub rename branch name -> users who use in codex ChatGPT -> GitHub -> Rename branch name -> comp other users
English
0
0
1
96
Kinnaird McQuade 💻☁️💥
We found a critical vulnerability in @OpenAI Codex affecting all Codex users, allowing exfil of a victim’s GitHub tokens to our C2 server. This granted lateral movement and R/W access to a victim’s entire code base 😈 This was a crazy one by @crew7sec at @btphantomlabs
BeyondTrust Phantom Labs™@btphantomlabs

Breaking: Newly uncovered OpenAI Codex vuln enables command injection via GitHub branch names in task creation requests. Attackers could steal GitHub user access tokens & sensitive data. Full breakdown by Tyler Jespersen: lnkd.in/ewdTaiEa #OpenAI #BTPhantomLabs

English
25
129
811
201K
Tyler Jespersen
Tyler Jespersen@crew7sec·
@bygregorr @kmcquade3 @OpenAI @btphantomlabs Hello!! 😃 The attack vector is command injection in the branch name whenever you make a codex task (HTTP request to Codex API like you said). So you intercept the request and then put bash in instead of how the request normally works and then you get the token!
English
0
0
2
119