CVE-2024-12390

8.8 HIGH
Published: March 20, 2025 Modified: October 15, 2025

Description

A vulnerability in binary-husky/gpt_academic version git 310122f allows for remote code execution. The application supports the extraction of user-provided RAR files without proper validation. The Python rarfile module, which supports symlinks, can be exploited to perform arbitrary file writes. This can lead to remote code execution by writing to sensitive files such as SSH keys, crontab files, or the application's own code.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://huntr.com/bounties/1add2b26-460d-4aa5-8fda-ab045d153177
Source: security@huntr.dev
Exploit Third Party Advisory

1 reference(s) from NVD

Quick Stats

CVSS v3 Score
8.8 / 10.0
EPSS (Exploit Probability)
2.2%
84th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

binary-husky