A vulnerability in binary-husky/gpt_academic version 310122f allows for a Regular Expression Denial of Service (ReDoS) attack. The application uses a regular expression to parse user input, which can take polynomial time to match certain crafted inputs. This allows an attacker to send a small malicious payload to the server, causing it to become unresponsive and unable to handle any requests from other users.
References
Link | Resource |
---|---|
https://huntr.com/bounties/b1c01c94-e477-41db-9d17-601aa25e351c | Exploit Third Party Advisory |
Configurations
History
31 Jul 2025, 17:54
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CPE | cpe:2.3:a:binary-husky:gpt_academic:2024-10-15:*:*:*:*:*:*:* | |
References | () https://huntr.com/bounties/b1c01c94-e477-41db-9d17-601aa25e351c - Exploit, Third Party Advisory | |
First Time |
Binary-husky gpt Academic
Binary-husky |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-31 17:54
NVD link : CVE-2024-12388
Mitre link : CVE-2024-12388
CVE.ORG link : CVE-2024-12388
JSON object : View
Products Affected
binary-husky
- gpt_academic
CWE
CWE-115
Misinterpretation of Input