Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12387: CWE-409 Improper Handling of Highly Compressed Data (Data Amplification) in binary-husky binary-husky/gpt_academic

0
Medium
VulnerabilityCVE-2024-12387cvecve-2024-12387cwe-409
Published: Thu Mar 20 2025 (03/20/2025, 10:11:21 UTC)
Source: CVE Database V5
Vendor/Project: binary-husky
Product: binary-husky/gpt_academic

Description

A vulnerability in the binary-husky/gpt_academic repository, as of commit git 3890467, allows an attacker to crash the server by uploading a specially crafted zip bomb. The server decompresses the uploaded file and attempts to load it into memory, which can lead to an out-of-memory crash. This issue arises due to improper input validation when handling compressed file uploads.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:22:28 UTC

Technical Analysis

CVE-2024-12387 identifies a vulnerability classified under CWE-409 (Improper Handling of Highly Compressed Data) in the binary-husky/gpt_academic repository. The issue arises when the server accepts compressed file uploads and decompresses them without adequate validation or resource constraints. An attacker can craft a zip bomb—a compressed archive that expands exponentially upon decompression—causing the server to consume excessive memory and crash due to an out-of-memory condition. This vulnerability results from the absence of checks on the decompressed data size or decompression depth, allowing data amplification attacks. The CVSS v3.0 score is 6.5 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, and privileges (upload permissions), but does not affect confidentiality or integrity, only availability. No user interaction is required beyond the upload. The vulnerability is present in unspecified versions of the product as of the commit referenced. No patches or known exploits are currently available. This vulnerability can be leveraged to cause denial of service, impacting server availability and potentially disrupting dependent services or workflows.

Potential Impact

For European organizations, the primary impact is denial of service caused by server crashes when processing maliciously crafted compressed files. This can disrupt business operations, especially for services relying on binary-husky/gpt_academic or similar software components that handle file uploads and decompression. Organizations in sectors such as academia, research, software development, or any that utilize this open-source project or derivatives may experience service outages. The lack of confidentiality or integrity impact reduces the risk of data breaches, but availability interruptions can lead to operational downtime, loss of productivity, and potential reputational damage. In critical infrastructure or public services, such outages could have wider societal impacts. The medium severity indicates a moderate risk that should be addressed promptly to maintain service reliability.

Mitigation Recommendations

1. Implement strict validation on uploaded compressed files, including limiting maximum decompressed size and depth to prevent zip bombs. 2. Use safe decompression libraries or sandbox decompression processes to isolate resource consumption. 3. Monitor memory and CPU usage during file processing to detect and terminate suspicious decompression tasks early. 4. Enforce authentication and authorization controls to restrict file upload capabilities to trusted users. 5. Employ rate limiting and anomaly detection on upload endpoints to identify and block abuse patterns. 6. Regularly update the binary-husky/gpt_academic software and monitor for official patches addressing this vulnerability. 7. Consider deploying web application firewalls (WAFs) with rules to detect and block zip bomb patterns. 8. Educate developers and administrators about the risks of handling compressed data and best practices for secure file processing.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-12-09T21:00:36.453Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b24178f764e1f470ae7

Added to database: 10/15/2025, 1:01:24 PM

Last enriched: 10/15/2025, 1:22:28 PM

Last updated: 10/16/2025, 1:44:53 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats