Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. Resource Development appears in 2 case steps.
- 2Multiple attack methods. The case connects to 7 unique AI attack methods.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
Resource Development
Step 1
LLM Prompt Crafting
The researcher developed a prompt that causes ChatGPT to include a Markdown element for an image with the user's conversation embedded in the URL as part of its responses.
-
Resource Development
Step 2
Stage Capabilities
The researcher included the prompt in a webpage, where it could be retrieved by ChatGPT.
-
Initial Access
Step 3
Drive-by Compromise
When the user makes a query that causes ChatGPT to retrieve the webpage using its
WebPilotplugin, it ingests the adversary's prompt. -
Execution
Step 4
Indirect
The prompt injection is executed, causing ChatGPT to include a Markdown element for an image hosted on an adversary-controlled server and embed the user's chat history as query parameter in the URL.
-
Exfiltration
Step 5
LLM Response Rendering
ChatGPT automatically renders the image for the user, making the request to the adversary's server for the image contents, and exfiltrating the user's conversation.
-
Privilege Escalation
Step 6
AI Agent Tool Invocation
Additionally, the prompt can cause the LLM to execute other plugins that do not match a user request. In this instance, the researcher demonstrated the
WebPilotplugin making a call to theExpediaplugin. -
Impact
Step 7
User Harm
The user's privacy is violated, and they are potentially open to further targeted attacks.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.