Perform a Command Injection Attack in Large Language Models (LLMs)
Tags
attack-pattern: | Data Direct Model Models Server - T1583.004 Server - T1584.004 Vulnerabilities - T1588.006 |
Common Information
Type | Value |
---|---|
UUID | 8d63d67f-60f1-47ec-849f-c4bd28cda198 |
Fingerprint | f7281cda0d057e80 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Oct. 15, 2024, 7:40 a.m. |
Added to db | Oct. 15, 2024, 10:43 a.m. |
Last updated | Dec. 24, 2024, 11:52 a.m. |
Headline | Perform a Command Injection Attack in Large Language Models (LLMs) |
Title | Perform a Command Injection Attack in Large Language Models (LLMs) |
Detected Hints/Tags/Attributes | 22/1/11 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 167 | ✔ | Cybersecurity on Medium | https://medium.com/feed/tag/cybersecurity | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 7 | vulnerable.com |
|
Details | Domain | 137 | portswigger.net |
|
Details | Domain | 14 | malicious.com |
|
Details | 1 | attacker`whoami`@vulnerable.com |
||
Details | 1 | attacker@vulnerable.com |
||
Details | File | 134 | auth.log |
|
Details | File | 2 | attack.log |
|
Details | File | 101 | access.log |
|
Details | Url | 1 | https://portswigger.net/web-security/llm-attacks/lab-exploiting-vulnerabilities-in-llm-apis |
|
Details | Url | 1 | http://malicious.com/exploit |
|
Details | Url | 1 | https://portswigger.net/web-security/llm-attacks |