Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12390: CWE-59 Improper Link Resolution Before File Access in binary-husky binary-husky/gpt_academic

0
High
VulnerabilityCVE-2024-12390cvecve-2024-12390cwe-59
Published: Thu Mar 20 2025 (03/20/2025, 10:10:36 UTC)
Source: CVE Database V5
Vendor/Project: binary-husky
Product: binary-husky/gpt_academic

Description

A vulnerability in binary-husky/gpt_academic version git 310122f allows for remote code execution. The application supports the extraction of user-provided RAR files without proper validation. The Python rarfile module, which supports symlinks, can be exploited to perform arbitrary file writes. This can lead to remote code execution by writing to sensitive files such as SSH keys, crontab files, or the application's own code.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:22:53 UTC

Technical Analysis

CVE-2024-12390 is a critical vulnerability identified in the binary-husky/gpt_academic application, specifically related to its handling of user-provided RAR archives. The root cause is an improper link resolution before file access (CWE-59), where the application relies on the Python rarfile module that supports symbolic links within archives. This lack of validation allows attackers to craft malicious RAR files containing symlinks that point to arbitrary file paths on the host system. When the application extracts these archives, it follows the symlinks and writes files to unintended locations, enabling arbitrary file writes. This can be exploited to overwrite critical system files such as SSH private keys, crontab files for scheduled tasks, or even the application's own source code, leading to remote code execution (RCE). The vulnerability requires the attacker to have network access and low privileges (PR:L) but does not require user interaction (UI:N), making it easier to exploit remotely. The CVSS v3.0 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, as well as the ease of exploitation. Although no known exploits are currently reported in the wild, the potential for damage is significant, especially in environments where this software is used to process untrusted RAR files. The vulnerability affects unspecified versions of the software, emphasizing the need for immediate attention and patching once updates are released.

Potential Impact

For European organizations, the impact of CVE-2024-12390 can be severe. The ability to perform remote code execution through crafted RAR files threatens the confidentiality of sensitive data, including private SSH keys, which could lead to further lateral movement within networks. Integrity is compromised as attackers can overwrite crontab files, enabling persistent and stealthy execution of malicious tasks, or modify the application code itself, potentially implanting backdoors or altering functionality. Availability may also be affected if critical system files are corrupted or replaced. Academic and research institutions, which are likely users of binary-husky/gpt_academic, may face disruptions in research activities and data breaches. The vulnerability's ease of exploitation and lack of required user interaction increase the risk of automated or targeted attacks. Additionally, organizations relying on automated processing of user-submitted archives are particularly vulnerable, as attackers can exploit this vector remotely. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the high CVSS score indicates that the threat should be treated with urgency.

Mitigation Recommendations

To mitigate CVE-2024-12390 effectively, European organizations should implement the following specific measures: 1) Immediately restrict or disable the processing of RAR archives from untrusted or unauthenticated sources within binary-husky/gpt_academic. 2) Implement strict validation of archive contents before extraction, including checking for symbolic links and disallowing their extraction or rewriting symlinks to safe locations. 3) Employ sandboxing or containerization techniques to isolate the extraction process, limiting the impact of any arbitrary file writes. 4) Monitor file system changes, especially in sensitive directories such as those containing SSH keys, crontabs, and application code, using file integrity monitoring tools. 5) Apply principle of least privilege to the application’s execution environment, ensuring it cannot write to critical system paths. 6) Stay alert for official patches or updates from the vendor and apply them promptly once available. 7) Educate developers and system administrators about the risks of extracting archives with symbolic links and encourage secure coding and deployment practices. 8) Consider alternative archive formats or extraction libraries that do not support symlinks or have better security controls. These targeted actions go beyond generic advice and address the specific exploitation vector of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-12-09T21:55:19.314Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b24178f764e1f470aed

Added to database: 10/15/2025, 1:01:24 PM

Last enriched: 10/15/2025, 1:22:53 PM

Last updated: 10/16/2025, 2:50:59 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats