A path traversal vulnerability exists in binary-husky/gpt_academic version 3.83. The vulnerability is due to improper handling of the file parameter, which is open to path traversal through URL encoding. This allows attackers to view any file on the host system, including sensitive files such as critical application files, SSH keys, API keys, and configuration values.
References
Link | Resource |
---|---|
https://huntr.com/bounties/e58a0fb4-2b1d-49ef-b32e-bb62659a6f99 | Exploit Third Party Advisory |
Configurations
History
11 Jul 2025, 20:45
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:binary-husky:gpt_academic:3.83:*:*:*:*:*:*:* | |
First Time |
Binary-husky gpt Academic
Binary-husky |
|
References | () https://huntr.com/bounties/e58a0fb4-2b1d-49ef-b32e-bb62659a6f99 - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
Information
Published : 2024-10-17 19:15
Updated : 2025-07-11 20:45
NVD link : CVE-2024-10100
Mitre link : CVE-2024-10100
CVE.ORG link : CVE-2024-10100
JSON object : View
Products Affected
binary-husky
- gpt_academic
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')