Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-37275
HistoryJul 13, 2023 - 10:34 p.m.

CVE-2023-37275 System logs spoofable in Auto-GPT via ANSI control sequences

2023-07-1322:34:45
CWE-117
GitHub_M
www.cve.org
9
cve-2023-37275
system logs
auto-gpt
ansi control sequences
open-source application
gpt-4
command line ui
color-coded print statements
json encoded
patched

CVSS3

3.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N

AI Score

5.2

Confidence

High

EPSS

0.001

Percentile

30.9%

Auto-GPT is an experimental open-source application showcasing the capabilities of the GPT-4 language model. The Auto-GPT command line UI makes heavy use of color-coded print statements to signify different types of system messages to the user, including messages that are crucial for the user to review and control which commands should be executed. Before v0.4.3, it was possible for a malicious external resource (such as a website browsed by Auto-GPT) to cause misleading messages to be printed to the console by getting the LLM to regurgitate JSON encoded ANSI escape sequences (\u001b[). These escape sequences were JSON decoded and printed to the console as part of the model’s “thinking process”. The issue has been patched in release version 0.4.3.

CNA Affected

[
  {
    "vendor": "Significant-Gravitas",
    "product": "Auto-GPT",
    "versions": [
      {
        "version": "< 0.4.3",
        "status": "affected"
      }
    ]
  }
]

CVSS3

3.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N

AI Score

5.2

Confidence

High

EPSS

0.001

Percentile

30.9%

Related for CVELIST:CVE-2023-37275