CVE-2024-12391

A vulnerability in binary-husky/gpt_academic, as of commit 310122f, allows for a Regular Expression Denial of Service (ReDoS) attack. The function '??????(?????????????)' permits the execution of user-provided regular expressions. Certain regular expressions can cause the Python RE engine to take exponential time to execute, leading to a Denial of Service (DoS) condition. An attacker who controls both the regular expression and the search string can exploit this vulnerability to hang the server for an arbitrary amount of time.
CVSS

No CVSS.

References
Link Resource
https://huntr.com/bounties/70b3f4f0-6b1b-4563-a18c-fe46502e6ba0 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:binary-husky:gpt_academic:2024-10-15:*:*:*:*:*:*:*

History

31 Jul 2025, 19:28

Type Values Removed Values Added
First Time Binary-husky
Binary-husky gpt Academic
References () https://huntr.com/bounties/70b3f4f0-6b1b-4563-a18c-fe46502e6ba0 - () https://huntr.com/bounties/70b3f4f0-6b1b-4563-a18c-fe46502e6ba0 - Exploit, Third Party Advisory
CPE cpe:2.3:a:binary-husky:gpt_academic:2024-10-15:*:*:*:*:*:*:*

20 Mar 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-20 10:15

Updated : 2025-07-31 19:28


NVD link : CVE-2024-12391

Mitre link : CVE-2024-12391


JSON object : View

Products Affected

binary-husky

  • gpt_academic
CWE
CWE-183

Permissive List of Allowed Inputs