A vulnerability in binary-husky/gpt_academic version git 310122f allows for remote code execution. The application supports the extraction of user-provided RAR files without proper validation. The Python rarfile module, which supports symlinks, can be exploited to perform arbitrary file writes. This can lead to remote code execution by writing to sensitive files such as SSH keys, crontab files, or the application's own code.
References
Link | Resource |
---|---|
https://huntr.com/bounties/1add2b26-460d-4aa5-8fda-ab045d153177 | Exploit Third Party Advisory |
Configurations
History
31 Jul 2025, 19:29
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://huntr.com/bounties/1add2b26-460d-4aa5-8fda-ab045d153177 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:binary-husky:gpt_academic:2024-10-15:*:*:*:*:*:*:* | |
First Time |
Binary-husky gpt Academic
Binary-husky |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-31 19:29
NVD link : CVE-2024-12390
Mitre link : CVE-2024-12390
CVE.ORG link : CVE-2024-12390
JSON object : View
Products Affected
binary-husky
- gpt_academic
CWE
CWE-475
Undefined Behavior for Input to API