GPT Academic version 3.83 is vulnerable to a Local File Read (LFI) vulnerability through its HotReload function. This function can download and extract tar.gz files from arxiv.org. Despite implementing protections against path traversal, the application overlooks the Tarslip triggered by symlinks. This oversight allows attackers to read arbitrary local files from the victim server.
Metrics
Affected Vendors & Products
References
History
Wed, 15 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 |
Wed, 15 Oct 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-59 |
Mon, 14 Jul 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Binary-husky
Binary-husky gpt Academic |
|
| CPEs | cpe:2.3:a:binary-husky:gpt_academic:3.83:*:*:*:*:*:*:* | |
| Vendors & Products |
Binary-husky
Binary-husky gpt Academic |
Thu, 20 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GPT Academic version 3.83 is vulnerable to a Local File Read (LFI) vulnerability through its HotReload function. This function can download and extract tar.gz files from arxiv.org. Despite implementing protections against path traversal, the application overlooks the Tarslip triggered by symlinks. This oversight allows attackers to read arbitrary local files from the victim server. | |
| Title | Local File Read (LFI) by Tarslip Symlink via arxiv_download() API in binary-husky/gpt_academic | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:10:55.368Z
Updated: 2025-10-15T12:50:15.584Z
Reserved: 2024-11-07T20:08:39.852Z
Link: CVE-2024-10986
Updated: 2025-03-20T17:49:18.265Z
Status : Modified
Published: 2025-03-20T10:15:22.597
Modified: 2025-10-15T13:15:38.403
Link: CVE-2024-10986
No data.