A vulnerability in binary-husky/gpt_academic version 310122f allows for a Regular Expression Denial of Service (ReDoS) attack. The application uses a regular expression to parse user input, which can take polynomial time to match certain crafted inputs. This allows an attacker to send a small malicious payload to the server, causing it to become unresponsive and unable to handle any requests from other users.
Metrics
Affected Vendors & Products
References
History
Thu, 31 Jul 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:binary-husky:gpt_academic:2024-10-15:*:*:*:*:*:*:* |
Thu, 20 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in binary-husky/gpt_academic version 310122f allows for a Regular Expression Denial of Service (ReDoS) attack. The application uses a regular expression to parse user input, which can take polynomial time to match certain crafted inputs. This allows an attacker to send a small malicious payload to the server, causing it to become unresponsive and unable to handle any requests from other users. | |
| Title | Regular Expression Denial of Service (ReDoS) in binary-husky/gpt_academic | |
| Weaknesses | CWE-115 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:10:05.958Z
Updated: 2025-03-20T18:31:26.420Z
Reserved: 2024-12-09T21:29:37.986Z
Link: CVE-2024-12388
Updated: 2025-03-20T17:49:33.308Z
Status : Analyzed
Published: 2025-03-20T10:15:28.127
Modified: 2025-07-31T17:54:54.617
Link: CVE-2024-12388
No data.