Логотип exploitDog
bind:CVE-2024-11037
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-11037

Количество 2

Количество 2

nvd логотип

CVE-2024-11037

11 месяцев назад

A path traversal vulnerability exists in binary-husky/gpt_academic at commit 679352d, which allows an attacker to bypass the blocked_paths protection and read the config.py file containing sensitive information such as the OpenAI API key. This vulnerability is exploitable on Windows operating systems by accessing a specific URL that includes the absolute path of the project.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-qhfv-rxrj-6w5f

11 месяцев назад

A path traversal vulnerability exists in binary-husky/gpt_academic at commit 679352d, which allows an attacker to bypass the blocked_paths protection and read the config.py file containing sensitive information such as the OpenAI API key. This vulnerability is exploitable on Windows operating systems by accessing a specific URL that includes the absolute path of the project.

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-11037

A path traversal vulnerability exists in binary-husky/gpt_academic at commit 679352d, which allows an attacker to bypass the blocked_paths protection and read the config.py file containing sensitive information such as the OpenAI API key. This vulnerability is exploitable on Windows operating systems by accessing a specific URL that includes the absolute path of the project.

CVSS3: 6.5
0%
Низкий
11 месяцев назад
github логотип
GHSA-qhfv-rxrj-6w5f

A path traversal vulnerability exists in binary-husky/gpt_academic at commit 679352d, which allows an attacker to bypass the blocked_paths protection and read the config.py file containing sensitive information such as the OpenAI API key. This vulnerability is exploitable on Windows operating systems by accessing a specific URL that includes the absolute path of the project.

CVSS3: 6.5
0%
Низкий
11 месяцев назад

Уязвимостей на страницу