Granular Web Request Triggering
Type: technique
Description: The adversary triggers the AI system to issue a web request to an attacker-controlled domain, using questions about the data to choose which URL will be browsed. The request is triggered by the client application with no user clicks required.
Version: 0.1.0
Created At: 2024-10-11 16:54:32 +0300
Last Modified At: 2024-10-11 16:54:32 +0300
External References
Related Objects
- --> Exfiltration (tactic): An adversary can exfiltrate data by asking questions about it and using the answers to choose which URL will be visited.
- <-- Exfiltration of personal information from ChatGPT via prompt injection (procedure): Triggering a web request to multiple website pages
www.attacker.com/send/<code>
where<code>
is chosen based on the AI system's answer to the adversary questions. In this scenario, the researcher uses<code>
to exfiltrate a single digit number of their postal code by choosing<code>
with length proportional to that digit.