CVE-2024-12391

6.5 MEDIUM
Published: March 20, 2025 Modified: October 15, 2025

Description

A vulnerability in binary-husky/gpt_academic, as of commit 310122f, allows for a Regular Expression Denial of Service (ReDoS) attack. The function '่งฃๆž้กน็›ฎๆบ็ ๏ผˆๆ‰‹ๅŠจๆŒ‡ๅฎšๅ’Œ็ญ›้€‰ๆบ็ ๆ–‡ไปถ็ฑปๅž‹๏ผ‰' permits the execution of user-provided regular expressions. Certain regular expressions can cause the Python RE engine to take exponential time to execute, leading to a Denial of Service (DoS) condition. An attacker who controls both the regular expression and the search string can exploit this vulnerability to hang the server for an arbitrary amount of time.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://huntr.com/bounties/70b3f4f0-6b1b-4563-a18c-fe46502e6ba0
Source: security@huntr.dev
Exploit Third Party Advisory

1 reference(s) from NVD

Quick Stats

CVSS v3 Score
6.5 / 10.0
EPSS (Exploit Probability)
0.2%
40th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

binary-husky