Einführungsmodi
Architecture and Design
Implementation
Implementation
System Configuration
Integration
Bundling
Anwendbare Plattformen
Sprache
Class: Not Language-Specific (Undetermined)
Betriebssysteme
Class: Not OS-Specific (Undetermined)
Architekturen
Class: Not Architecture-Specific (Undetermined)
Technologien
Name: AI/ML (Undetermined)
Häufige Konsequenzen
| Bereich |
Auswirkung |
Wahrscheinlichkeit |
Confidentiality Integrity Availability | Execute Unauthorized Code or Commands, Varies by Context | |
| Confidentiality | Read Application Data | |
| Integrity | Modify Application Data, Execute Unauthorized Code or Commands | |
| Access Control | Read Application Data, Modify Application Data, Gain Privileges or Assume Identity | |
Beobachtete Beispiele
| Referenzen |
Beschreibung |
| Chain: LLM integration framework has prompt injection
(CWE-1427) that allows an attacker to force the service to retrieve
data from an arbitrary URL, essentially providing SSRF (CWE-918) and
potentially injecting content into downstream tasks. |
| ML-based email analysis product uses an
API service that allows a malicious user to inject a
direct prompt and take over the service logic, forcing
it to leak the standard hard-coded system prompts
and/or execute unwanted prompts to leak sensitive
data. |
| Chain: library for generating SQL via LLMs using RAG uses
a prompt function to present the user with visualized results,
allowing altering of the prompt using prompt injection (CWE-1427) to
run arbitrary Python code (CWE-94) instead of the intended
visualization code. |
| AI-based integration with business intel dashboard allows prompt injection through its natural language component, allowing execution of arbitrary code |
Mögliche Gegenmaßnahmen
Phases : Architecture and Design
Phases : Implementation
Phases : Architecture and Design
Phases : Implementation
Phases : Installation // Operation
Phases : System Configuration
Erkennungsmethoden
Dynamic Analysis with Manual Results Interpretation
Dynamic Analysis with Automated Results Interpretation
Architecture or Design Review
Hinweise zur Schwachstellen-Zuordnung
Begründung : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Kommentar : Ensure that the weakness being identified involves improper neutralization during prompt generation. A different CWE might be needed if the core concern is related to inadvertent insertion of sensitive information, generating prompts from third-party sources that should not have been trusted (as may occur with indirect prompt injection), or jailbreaking, then the root cause might be a different weakness.
Referenzen
REF-1450
OWASP Top 10 for Large Language Model Applications - LLM01
OWASP.
https://genai.owasp.org/llmrisk/llm01-prompt-injection/ REF-1451
IBM - What is a prompt injection attack?
Matthew Kosinski, Amber Forrest.
https://www.ibm.com/think/topics/prompt-injection REF-1452
Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection
Kai Greshake, Sahar Abdelnabi, Shailesh Mishra, Christoph Endres, Thorsten Holz, Mario Fritz.
https://arxiv.org/abs/2302.12173
Einreichung
| Name |
Organisation |
Datum |
Veröffentlichungsdatum |
Version |
| Max Rattray |
Praetorian |
2024-06-21 +00:00 |
2024-11-19 +00:00 |
4.16 |
Änderungen
| Name |
Organisation |
Datum |
Kommentar |
| CWE Content Team |
MITRE |
2025-09-09 +00:00 |
updated References |
| CWE Content Team |
MITRE |
2025-12-11 +00:00 |
updated Observed_Examples, Weakness_Ordinalities |