← Back to CVEs
CVE-2024-5184
MEDIUM6.5
Description
The EmailGPT service contains a prompt injection vulnerability. The service uses an API service that allows a malicious user to inject a direct prompt and take over the service logic. Attackers can exploit the issue by forcing the AI service to leak the standard hard-coded system prompts and/or execute unwanted prompts. When engaging with EmailGPT by submitting a malicious prompt that requests harmful information, the system will respond by providing the requested data. This vulnerability can be exploited by any individual with access to the service.
CVE Details
CVSS v3.1 Score6.5
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack VectorADJACENT_NETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published6/5/2024
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
emailgpt:emailgpt
Weaknesses (CWE)
CWE-74CWE-74
References
https://www.synopsys.com/blogs/software-security/cyrc-advisory-prompt-injection-emailgpt.html(disclosure@synopsys.com)
https://www.synopsys.com/blogs/software-security/cyrc-advisory-prompt-injection-emailgpt.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.