A vulnerability in binary-husky/gpt_academic, as of commit 310122f, allows for a Regular Expression Denial of Service (ReDoS) attack. The function '??????(?????????????)' permits the execution of user-provided regular expressions. Certain regular expressions can cause the Python RE engine to take exponential time to execute, leading to a Denial of Service (DoS) condition. An attacker who controls both the regular expression and the search string can exploit this vulnerability to hang the server for an arbitrary amount of time.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://huntr.com/bounties/70b3f4f0-6b1b-4563-a18c-fe46502e6ba0 | Exploit Third Party Advisory |
Configurations
History
31 Jul 2025, 19:28
Type | Values Removed | Values Added |
---|---|---|
First Time |
Binary-husky
Binary-husky gpt Academic |
|
References | () https://huntr.com/bounties/70b3f4f0-6b1b-4563-a18c-fe46502e6ba0 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:binary-husky:gpt_academic:2024-10-15:*:*:*:*:*:*:* |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-31 19:28
NVD link : CVE-2024-12391
Mitre link : CVE-2024-12391
JSON object : View
Products Affected
binary-husky
- gpt_academic
CWE
CWE-183
Permissive List of Allowed Inputs