A vulnerability in binary-husky/gpt_academic version git 310122f allows for remote code execution. The application supports the extraction of user-provided RAR files without proper validation. The Python rarfile module, which supports symlinks, can be exploited to perform arbitrary file writes. This can lead to remote code execution by writing to sensitive files such as SSH keys, crontab files, or the application's own code.
References
| Link | Resource |
|---|---|
| https://huntr.com/bounties/1add2b26-460d-4aa5-8fda-ab045d153177 | Exploit Third Party Advisory |
Configurations
History
15 Oct 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-59 |
31 Jul 2025, 19:29
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CPE | cpe:2.3:a:binary-husky:gpt_academic:2024-10-15:*:*:*:*:*:*:* | |
| First Time |
Binary-husky gpt Academic
Binary-husky |
|
| References | () https://huntr.com/bounties/1add2b26-460d-4aa5-8fda-ab045d153177 - Exploit, Third Party Advisory |
20 Mar 2025, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-10-15 13:15
NVD link : CVE-2024-12390
Mitre link : CVE-2024-12390
CVE.ORG link : CVE-2024-12390
JSON object : View
Products Affected
binary-husky
- gpt_academic
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
