A path traversal vulnerability exists in binary-husky/gpt_academic version git 310122f. The application supports the extraction of user-provided 7z files without proper validation. The Python py7zr package used for extraction does not guarantee that files will remain within the intended extraction directory. An attacker can exploit this vulnerability to perform arbitrary file writes, which can lead to remote code execution.
References
Link | Resource |
---|---|
https://huntr.com/bounties/37afb1c9-bba9-47ee-8617-a5f715271654 | Exploit Third Party Advisory |
Configurations
History
31 Jul 2025, 19:32
Type | Values Removed | Values Added |
---|---|---|
First Time |
Binary-husky gpt Academic
Binary-husky |
|
References | () https://huntr.com/bounties/37afb1c9-bba9-47ee-8617-a5f715271654 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:binary-husky:gpt_academic:2024-10-15:*:*:*:*:*:*:* | |
Summary |
|
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-31 19:32
NVD link : CVE-2024-12389
Mitre link : CVE-2024-12389
CVE.ORG link : CVE-2024-12389
JSON object : View
Products Affected
binary-husky
- gpt_academic
CWE
CWE-29
Path Traversal: '\..\filename'