APromptRiskDBThreat intelligence atlas
AI Case Study

Data Exfiltration via an MCP Server used by Cursor - AI Case Study

The Backslash Security Research Team demonstrated that a Model Context Protocol (MCP) tool can be used as a vector for an indirect prompt injection attack on Cursor, potentially leading to the execution of malicious shell commands. The Backslash Security Research Team created a proof-of-concept MCP server capable of scraping webpages. When a user asks Cursor to use the tool to scrape a site containing a malicious...

ExerciseCursorBackslash Security Research TeamResource DevelopmentDefense EvasionInitial Access

Overview

Case steps11Steps described in the case record.
Techniques9Attack methods mentioned in the case steps.
Linked CVEs0Known vulnerabilities mentioned in the record.

Risk patterns

Patterns found in the case record and its linked vulnerabilities.

  • 1Dominant ATLAS tactic. Resource Development appears in 3 case steps.
  • 2Multiple attack methods. The case connects to 9 unique AI attack methods.

Procedure timeline

Search the case steps or filter them by attacker goal.

Resource Development3Defense Evasion2Initial Access1Execution1Privilege Escalation1Credential Access1Exfiltration1Impact1
  1. Resource Development

    The researchers crafted a malicious prompt containing an instruction to execute the malicious shell command to exfiltrate the victim’s AI agent credentials.

  2. Initial Access

    When a user asked Cursor to use an MCP tool to scrape the malicious website, the contents of the malicious prompt was retrieved and ingested into Cursor’s context window.

  3. Step 6

    Indirect

    Execution

    When the MCP server scraped the malicious web site, it returned the injected prompt to the MCP client and poisoned the context of the Cursor LLM. Cursor executed the malicious prompt embedded in the website scraped by the MCP tool.

  4. Privilege Escalation

    The prompt injection invoked Cursor’s ability to call command line tools via the run_terminal_cmd tool. Cursor prompted the user before executing a shell command, potentially mitigating this attack.

  5. Defense Evasion

    When the MCP server scraped the malicious web site, it returned the injected prompt to the MCP client and poisoned the context of the Cursor LLM. The shell command in the malicious prompt was obscured via base64 encoding, making it less clear to the user that something malicious may be executed.

  6. Impact

    A bad actor could use the stolen credentials cause financial damage and could also steal other sensitive information from the victim user.

Mitigations

Defenses connected to the attack methods in this case.

Sources

Original public records and references for this case.