A vulnerability in binary-husky/gpt_academic version git 310122f allows for remote code execution. The application supports the extraction of user-provided RAR files without proper validation. The Python rarfile module, which supports symlinks, can be exploited to perform arbitrary file writes. This can lead to remote code execution by writing to sensitive files such as SSH keys, crontab files, or the application's own code.
History

Wed, 15 Oct 2025 13:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-475

Wed, 15 Oct 2025 13:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-59

Thu, 31 Jul 2025 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:binary-husky:gpt_academic:2024-10-15:*:*:*:*:*:*:*

Thu, 20 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 20 Mar 2025 10:15:00 +0000

Type Values Removed Values Added
Description A vulnerability in binary-husky/gpt_academic version git 310122f allows for remote code execution. The application supports the extraction of user-provided RAR files without proper validation. The Python rarfile module, which supports symlinks, can be exploited to perform arbitrary file writes. This can lead to remote code execution by writing to sensitive files such as SSH keys, crontab files, or the application's own code.
Title Remote Code Execution in binary-husky/gpt_academic
Weaknesses CWE-475
References
Metrics cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2025-03-20T10:10:36.486Z

Updated: 2025-10-15T12:50:17.669Z

Reserved: 2024-12-09T21:55:19.314Z

Link: CVE-2024-12390

cve-icon Vulnrichment

Updated: 2025-03-20T17:49:48.228Z

cve-icon NVD

Status : Modified

Published: 2025-03-20T10:15:28.380

Modified: 2025-10-15T13:15:40.240

Link: CVE-2024-12390

cve-icon Redhat

No data.