Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5fhx-jcwv-9wjj

Опубликовано: 20 мар. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 8.8

Описание

A path traversal vulnerability exists in binary-husky/gpt_academic version git 310122f. The application supports the extraction of user-provided 7z files without proper validation. The Python py7zr package used for extraction does not guarantee that files will remain within the intended extraction directory. An attacker can exploit this vulnerability to perform arbitrary file writes, which can lead to remote code execution.

A path traversal vulnerability exists in binary-husky/gpt_academic version git 310122f. The application supports the extraction of user-provided 7z files without proper validation. The Python py7zr package used for extraction does not guarantee that files will remain within the intended extraction directory. An attacker can exploit this vulnerability to perform arbitrary file writes, which can lead to remote code execution.

EPSS

Процентиль: 85%
0.026
Низкий

8.8 High

CVSS3

Дефекты

CWE-29

Связанные уязвимости

CVSS3: 8.8
nvd
11 месяцев назад

A path traversal vulnerability exists in binary-husky/gpt_academic version git 310122f. The application supports the extraction of user-provided 7z files without proper validation. The Python py7zr package used for extraction does not guarantee that files will remain within the intended extraction directory. An attacker can exploit this vulnerability to perform arbitrary file writes, which can lead to remote code execution.

EPSS

Процентиль: 85%
0.026
Низкий

8.8 High

CVSS3

Дефекты

CWE-29