CVE-2024-12388: CWE-1333 Inefficient Regular Expression Complexity in binary-husky binary-husky/gpt_academic
A vulnerability in binary-husky/gpt_academic version 310122f allows for a Regular Expression Denial of Service (ReDoS) attack. The application uses a regular expression to parse user input, which can take polynomial time to match certain crafted inputs. This allows an attacker to send a small malicious payload to the server, causing it to become unresponsive and unable to handle any requests from other users.
AI Analysis
Technical Summary
CVE-2024-12388 identifies a Regular Expression Denial of Service (ReDoS) vulnerability in the binary-husky/gpt_academic software, specifically in version 310122f and potentially other unspecified versions. The vulnerability stems from the use of a regular expression that exhibits polynomial time complexity when processing certain crafted user inputs. An attacker can exploit this by sending a small malicious payload designed to trigger catastrophic backtracking in the regex engine, causing the server to consume excessive CPU resources and become unresponsive. This results in a denial of service condition, impacting the availability of the application to legitimate users. The vulnerability requires network access and low privileges (PR:L), but no user interaction (UI:N) is necessary, making it easier to exploit remotely. The CVSS 3.0 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) reflects that the attack can be launched remotely with low complexity and no impact on confidentiality or integrity, but high impact on availability. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. The vulnerability is classified under CWE-1333, which relates to inefficient regular expression complexity leading to performance degradation. This type of vulnerability is particularly dangerous in server-side applications that parse user input with regex, as it can be triggered with minimal data but cause disproportionate resource consumption.
Potential Impact
For European organizations, the primary impact of CVE-2024-12388 is the potential for denial of service attacks against systems running binary-husky/gpt_academic. This could disrupt academic, research, or other institutional services relying on this software, leading to downtime and loss of productivity. Since the vulnerability affects availability only, confidentiality and integrity remain intact. However, service outages can indirectly affect operational continuity and user trust. Organizations with public-facing instances of the software are at higher risk, as attackers can exploit the vulnerability remotely without user interaction. The lack of known exploits reduces immediate risk, but the medium CVSS score and ease of exploitation suggest that attackers could develop exploits. Additionally, the vulnerability could be leveraged as part of a larger attack chain or to cause distraction during other malicious activities. European academic institutions and research centers using this software may face targeted attacks aiming to disrupt their operations.
Mitigation Recommendations
To mitigate CVE-2024-12388, organizations should first identify all instances of binary-husky/gpt_academic in their environment. Since no official patches are currently available, immediate steps include: 1) Reviewing and refactoring the vulnerable regular expressions to use more efficient patterns or alternative parsing methods that avoid catastrophic backtracking. 2) Implementing input validation to reject or sanitize inputs that could trigger the ReDoS condition before they reach the regex engine. 3) Applying rate limiting and connection throttling on network interfaces to reduce the impact of repeated malicious requests. 4) Monitoring application performance and logs for signs of abnormal CPU usage or request patterns indicative of ReDoS attempts. 5) Isolating the vulnerable service behind web application firewalls (WAFs) or reverse proxies that can detect and block suspicious payloads. 6) Engaging with the vendor or open-source maintainers for updates or patches and applying them promptly once available. 7) Considering temporary disabling or restricting access to the vulnerable functionality if feasible until a fix is deployed.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark
CVE-2024-12388: CWE-1333 Inefficient Regular Expression Complexity in binary-husky binary-husky/gpt_academic
Description
A vulnerability in binary-husky/gpt_academic version 310122f allows for a Regular Expression Denial of Service (ReDoS) attack. The application uses a regular expression to parse user input, which can take polynomial time to match certain crafted inputs. This allows an attacker to send a small malicious payload to the server, causing it to become unresponsive and unable to handle any requests from other users.
AI-Powered Analysis
Technical Analysis
CVE-2024-12388 identifies a Regular Expression Denial of Service (ReDoS) vulnerability in the binary-husky/gpt_academic software, specifically in version 310122f and potentially other unspecified versions. The vulnerability stems from the use of a regular expression that exhibits polynomial time complexity when processing certain crafted user inputs. An attacker can exploit this by sending a small malicious payload designed to trigger catastrophic backtracking in the regex engine, causing the server to consume excessive CPU resources and become unresponsive. This results in a denial of service condition, impacting the availability of the application to legitimate users. The vulnerability requires network access and low privileges (PR:L), but no user interaction (UI:N) is necessary, making it easier to exploit remotely. The CVSS 3.0 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) reflects that the attack can be launched remotely with low complexity and no impact on confidentiality or integrity, but high impact on availability. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. The vulnerability is classified under CWE-1333, which relates to inefficient regular expression complexity leading to performance degradation. This type of vulnerability is particularly dangerous in server-side applications that parse user input with regex, as it can be triggered with minimal data but cause disproportionate resource consumption.
Potential Impact
For European organizations, the primary impact of CVE-2024-12388 is the potential for denial of service attacks against systems running binary-husky/gpt_academic. This could disrupt academic, research, or other institutional services relying on this software, leading to downtime and loss of productivity. Since the vulnerability affects availability only, confidentiality and integrity remain intact. However, service outages can indirectly affect operational continuity and user trust. Organizations with public-facing instances of the software are at higher risk, as attackers can exploit the vulnerability remotely without user interaction. The lack of known exploits reduces immediate risk, but the medium CVSS score and ease of exploitation suggest that attackers could develop exploits. Additionally, the vulnerability could be leveraged as part of a larger attack chain or to cause distraction during other malicious activities. European academic institutions and research centers using this software may face targeted attacks aiming to disrupt their operations.
Mitigation Recommendations
To mitigate CVE-2024-12388, organizations should first identify all instances of binary-husky/gpt_academic in their environment. Since no official patches are currently available, immediate steps include: 1) Reviewing and refactoring the vulnerable regular expressions to use more efficient patterns or alternative parsing methods that avoid catastrophic backtracking. 2) Implementing input validation to reject or sanitize inputs that could trigger the ReDoS condition before they reach the regex engine. 3) Applying rate limiting and connection throttling on network interfaces to reduce the impact of repeated malicious requests. 4) Monitoring application performance and logs for signs of abnormal CPU usage or request patterns indicative of ReDoS attempts. 5) Isolating the vulnerable service behind web application firewalls (WAFs) or reverse proxies that can detect and block suspicious payloads. 6) Engaging with the vendor or open-source maintainers for updates or patches and applying them promptly once available. 7) Considering temporary disabling or restricting access to the vulnerable functionality if feasible until a fix is deployed.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-12-09T21:29:37.986Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b24178f764e1f470aea
Added to database: 10/15/2025, 1:01:24 PM
Last enriched: 10/15/2025, 1:22:39 PM
Last updated: 10/16/2025, 2:49:30 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-41253: CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') in VMware Spring Cloud Gateway Server Webflux
HighMicrosoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign
MediumCVE-2025-54658: Escalation of privilege in Fortinet FortiDLP
HighCVE-2025-53951: Escalation of privilege in Fortinet FortiDLP
MediumCVE-2025-53950: Information disclosure in Fortinet FortiDLP
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.