Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m2g8-2vhm-m4cx

Опубликовано: 20 мар. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 8.8

Описание

A vulnerability in binary-husky/gpt_academic version git 310122f allows for remote code execution. The application supports the extraction of user-provided RAR files without proper validation. The Python rarfile module, which supports symlinks, can be exploited to perform arbitrary file writes. This can lead to remote code execution by writing to sensitive files such as SSH keys, crontab files, or the application's own code.

A vulnerability in binary-husky/gpt_academic version git 310122f allows for remote code execution. The application supports the extraction of user-provided RAR files without proper validation. The Python rarfile module, which supports symlinks, can be exploited to perform arbitrary file writes. This can lead to remote code execution by writing to sensitive files such as SSH keys, crontab files, or the application's own code.

EPSS

Процентиль: 85%
0.026
Низкий

8.8 High

CVSS3

Дефекты

CWE-475
CWE-59

Связанные уязвимости

CVSS3: 8.8
nvd
11 месяцев назад

A vulnerability in binary-husky/gpt_academic version git 310122f allows for remote code execution. The application supports the extraction of user-provided RAR files without proper validation. The Python rarfile module, which supports symlinks, can be exploited to perform arbitrary file writes. This can lead to remote code execution by writing to sensitive files such as SSH keys, crontab files, or the application's own code.

EPSS

Процентиль: 85%
0.026
Низкий

8.8 High

CVSS3

Дефекты

CWE-475
CWE-59