CVE-2024-10986: CWE-59 Improper Link Resolution Before File Access in binary-husky binary-husky/gpt_academic
GPT Academic version 3.83 is vulnerable to a Local File Read (LFI) vulnerability through its HotReload function. This function can download and extract tar.gz files from arxiv.org. Despite implementing protections against path traversal, the application overlooks the Tarslip triggered by symlinks. This oversight allows attackers to read arbitrary local files from the victim server.
AI Analysis
Technical Summary
CVE-2024-10986 is a Local File Read vulnerability classified under CWE-59 (Improper Link Resolution Before File Access) affecting the binary-husky GPT Academic software, version 3.83. The vulnerability resides in the HotReload function, which is designed to download and extract tar.gz archives from arxiv.org to update or load academic content dynamically. While the application attempts to prevent path traversal attacks, it fails to address the Tarslip attack vector, where symbolic links inside the tar archive can redirect file extraction paths to arbitrary locations on the local filesystem. This flaw allows an attacker with local privileges to craft malicious tar.gz files that, when processed by HotReload, cause the application to read and potentially disclose sensitive files from the server. The vulnerability does not require user interaction but does require some level of local privilege (PR:L). The CVSS 3.0 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with network attack vector and low attack complexity. Although no public exploits are known, the risk is significant due to the sensitive nature of academic data and potential for lateral movement or further exploitation. The lack of patch links suggests that a fix may not yet be available, increasing urgency for mitigation.
Potential Impact
For European organizations, particularly universities, research centers, and institutions relying on GPT Academic for automated content updates, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized disclosure of sensitive research data, intellectual property, or internal configuration files, undermining confidentiality. Integrity and availability could also be compromised if attackers manipulate or disrupt the HotReload process. Given the academic sector's importance in Europe and the increasing reliance on AI-driven tools, data breaches could have reputational and regulatory consequences, including GDPR violations. Additionally, attackers gaining local file read capabilities might leverage this to escalate privileges or move laterally within networks. The impact is heightened in environments where multiple users share access or where the software runs with elevated permissions.
Mitigation Recommendations
Immediate mitigation steps include disabling the HotReload feature until a patch is available. Organizations should audit and restrict the sources from which tar.gz files are downloaded, limiting them strictly to trusted repositories. Implementing stricter validation and sanitization of archive contents before extraction is critical, including rejecting archives containing symbolic links or enforcing extraction within sandboxed directories. Employing filesystem access controls to limit the application's read permissions can reduce exposure. Monitoring logs for unusual archive extraction activity or file access patterns can help detect exploitation attempts. Finally, organizations should engage with the vendor or community to obtain patches or updates addressing the Tarslip vulnerability and apply them promptly once released.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Switzerland
CVE-2024-10986: CWE-59 Improper Link Resolution Before File Access in binary-husky binary-husky/gpt_academic
Description
GPT Academic version 3.83 is vulnerable to a Local File Read (LFI) vulnerability through its HotReload function. This function can download and extract tar.gz files from arxiv.org. Despite implementing protections against path traversal, the application overlooks the Tarslip triggered by symlinks. This oversight allows attackers to read arbitrary local files from the victim server.
AI-Powered Analysis
Technical Analysis
CVE-2024-10986 is a Local File Read vulnerability classified under CWE-59 (Improper Link Resolution Before File Access) affecting the binary-husky GPT Academic software, version 3.83. The vulnerability resides in the HotReload function, which is designed to download and extract tar.gz archives from arxiv.org to update or load academic content dynamically. While the application attempts to prevent path traversal attacks, it fails to address the Tarslip attack vector, where symbolic links inside the tar archive can redirect file extraction paths to arbitrary locations on the local filesystem. This flaw allows an attacker with local privileges to craft malicious tar.gz files that, when processed by HotReload, cause the application to read and potentially disclose sensitive files from the server. The vulnerability does not require user interaction but does require some level of local privilege (PR:L). The CVSS 3.0 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with network attack vector and low attack complexity. Although no public exploits are known, the risk is significant due to the sensitive nature of academic data and potential for lateral movement or further exploitation. The lack of patch links suggests that a fix may not yet be available, increasing urgency for mitigation.
Potential Impact
For European organizations, particularly universities, research centers, and institutions relying on GPT Academic for automated content updates, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized disclosure of sensitive research data, intellectual property, or internal configuration files, undermining confidentiality. Integrity and availability could also be compromised if attackers manipulate or disrupt the HotReload process. Given the academic sector's importance in Europe and the increasing reliance on AI-driven tools, data breaches could have reputational and regulatory consequences, including GDPR violations. Additionally, attackers gaining local file read capabilities might leverage this to escalate privileges or move laterally within networks. The impact is heightened in environments where multiple users share access or where the software runs with elevated permissions.
Mitigation Recommendations
Immediate mitigation steps include disabling the HotReload feature until a patch is available. Organizations should audit and restrict the sources from which tar.gz files are downloaded, limiting them strictly to trusted repositories. Implementing stricter validation and sanitization of archive contents before extraction is critical, including rejecting archives containing symbolic links or enforcing extraction within sandboxed directories. Employing filesystem access controls to limit the application's read permissions can reduce exposure. Monitoring logs for unusual archive extraction activity or file access patterns can help detect exploitation attempts. Finally, organizations should engage with the vendor or community to obtain patches or updates addressing the Tarslip vulnerability and apply them promptly once released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-11-07T20:08:39.852Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b23178f764e1f470a72
Added to database: 10/15/2025, 1:01:23 PM
Last enriched: 10/15/2025, 1:20:20 PM
Last updated: 10/16/2025, 3:19:46 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61543: n/a
HighCVE-2025-61541: n/a
HighCVE-2025-61536: n/a
HighCVE-2025-41254: CWE-352: Cross-Site Request Forgery (CSRF) in VMware Spring Framework
MediumCVE-2025-36002: Password in Configuration File in IBM Sterling B2B Integrator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.