An open redirect vulnerability exists in binary-husky/gpt_academic version 3.83. The vulnerability occurs when a user is redirected to a URL specified by user-controlled input in the 'file' parameter without proper validation or sanitization. This can be exploited by attackers to conduct phishing attacks, distribute malware, and steal user credentials.
Metrics
Affected Vendors & Products
References
History
Thu, 20 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An open redirect vulnerability exists in binary-husky/gpt_academic version 3.83. The vulnerability occurs when a user is redirected to a URL specified by user-controlled input in the 'file' parameter without proper validation or sanitization. This can be exploited by attackers to conduct phishing attacks, distribute malware, and steal user credentials. | |
Title | Open Redirect in binary-husky/gpt_academic | |
Weaknesses | CWE-601 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:09:24.562Z
Updated: 2025-03-20T18:55:20.454Z
Reserved: 2024-11-04T18:17:21.309Z
Link: CVE-2024-10812

Updated: 2025-03-20T17:51:03.431Z

Status : Received
Published: 2025-03-20T10:15:19.880
Modified: 2025-03-20T10:15:19.880
Link: CVE-2024-10812

No data.