GPT Academic version 3.83 is vulnerable to a Local File Read (LFI) vulnerability through its HotReload function. This function can download and extract tar.gz files from arxiv.org. Despite implementing protections against path traversal, the application overlooks the Tarslip triggered by symlinks. This oversight allows attackers to read arbitrary local files from the victim server.
Metrics
Affected Vendors & Products
References
History
Thu, 20 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | GPT Academic version 3.83 is vulnerable to a Local File Read (LFI) vulnerability through its HotReload function. This function can download and extract tar.gz files from arxiv.org. Despite implementing protections against path traversal, the application overlooks the Tarslip triggered by symlinks. This oversight allows attackers to read arbitrary local files from the victim server. | |
Title | Local File Read (LFI) by Tarslip Symlink via arxiv_download() API in binary-husky/gpt_academic | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:10:55.368Z
Updated: 2025-03-20T18:15:04.826Z
Reserved: 2024-11-07T20:08:39.852Z
Link: CVE-2024-10986

Updated: 2025-03-20T17:49:18.265Z

Status : Received
Published: 2025-03-20T10:15:22.597
Modified: 2025-03-20T10:15:22.597
Link: CVE-2024-10986

No data.