Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-10986: CWE-59 Improper Link Resolution Before File Access in binary-husky binary-husky/gpt_academic

0
High
VulnerabilityCVE-2024-10986cvecve-2024-10986cwe-59
Published: Thu Mar 20 2025 (03/20/2025, 10:10:55 UTC)
Source: CVE Database V5
Vendor/Project: binary-husky
Product: binary-husky/gpt_academic

Description

GPT Academic version 3.83 is vulnerable to a Local File Read (LFI) vulnerability through its HotReload function. This function can download and extract tar.gz files from arxiv.org. Despite implementing protections against path traversal, the application overlooks the Tarslip triggered by symlinks. This oversight allows attackers to read arbitrary local files from the victim server.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:20:20 UTC

Technical Analysis

CVE-2024-10986 is a Local File Read vulnerability classified under CWE-59 (Improper Link Resolution Before File Access) affecting the binary-husky GPT Academic software, version 3.83. The vulnerability resides in the HotReload function, which is designed to download and extract tar.gz archives from arxiv.org to update or load academic content dynamically. While the application attempts to prevent path traversal attacks, it fails to address the Tarslip attack vector, where symbolic links inside the tar archive can redirect file extraction paths to arbitrary locations on the local filesystem. This flaw allows an attacker with local privileges to craft malicious tar.gz files that, when processed by HotReload, cause the application to read and potentially disclose sensitive files from the server. The vulnerability does not require user interaction but does require some level of local privilege (PR:L). The CVSS 3.0 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with network attack vector and low attack complexity. Although no public exploits are known, the risk is significant due to the sensitive nature of academic data and potential for lateral movement or further exploitation. The lack of patch links suggests that a fix may not yet be available, increasing urgency for mitigation.

Potential Impact

For European organizations, particularly universities, research centers, and institutions relying on GPT Academic for automated content updates, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized disclosure of sensitive research data, intellectual property, or internal configuration files, undermining confidentiality. Integrity and availability could also be compromised if attackers manipulate or disrupt the HotReload process. Given the academic sector's importance in Europe and the increasing reliance on AI-driven tools, data breaches could have reputational and regulatory consequences, including GDPR violations. Additionally, attackers gaining local file read capabilities might leverage this to escalate privileges or move laterally within networks. The impact is heightened in environments where multiple users share access or where the software runs with elevated permissions.

Mitigation Recommendations

Immediate mitigation steps include disabling the HotReload feature until a patch is available. Organizations should audit and restrict the sources from which tar.gz files are downloaded, limiting them strictly to trusted repositories. Implementing stricter validation and sanitization of archive contents before extraction is critical, including rejecting archives containing symbolic links or enforcing extraction within sandboxed directories. Employing filesystem access controls to limit the application's read permissions can reduce exposure. Monitoring logs for unusual archive extraction activity or file access patterns can help detect exploitation attempts. Finally, organizations should engage with the vendor or community to obtain patches or updates addressing the Tarslip vulnerability and apply them promptly once released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-11-07T20:08:39.852Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b23178f764e1f470a72

Added to database: 10/15/2025, 1:01:23 PM

Last enriched: 10/15/2025, 1:20:20 PM

Last updated: 10/16/2025, 3:19:46 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats