Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2024-12390 | First vendor Publication | 2025-03-20 |
Vendor | Cve | Last vendor Modification | 2025-03-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability in binary-husky/gpt_academic version git 310122f allows for remote code execution. The application supports the extraction of user-provided RAR files without proper validation. The Python rarfile module, which supports symlinks, can be exploited to perform arbitrary file writes. This can lead to remote code execution by writing to sensitive files such as SSH keys, crontab files, or the application's own code. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12390 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-475 | Undefined Behavior for Input to API |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2025-03-20 13:20:36 |
|