{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T01:29:24.189","vulnerabilities":[{"cve":{"id":"CVE-2024-12392","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:28.633","lastModified":"2025-07-31T19:24:48.663","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A Server-Side Request Forgery (SSRF) vulnerability exists in binary-husky/gpt_academic version git 310122f. The application has a functionality to download papers from arxiv.org, but the URL validation is incomplete. An attacker can exploit this vulnerability to make the application access any URL, including internal services, and read the response. This can be used to access data that are only accessible from the server, such as AWS metadata credentials, and can escalate local exploits to network-based attacks."},{"lang":"es","value":"Existe una vulnerabilidad de Server-Side Request Forgery (SSRF) en binary-husky/gpt_academic, versión git 310122f. La aplicación permite descargar artículos de arxiv.org, pero la validación de URL es incompleta. Un atacante puede explotar esta vulnerabilidad para que la aplicación acceda a cualquier URL, incluidos los servicios internos, y lea la respuesta. Esto puede utilizarse para acceder a datos a los que solo se puede acceder desde el servidor, como las credenciales de metadatos de AWS, y puede escalar exploits locales a ataques de red."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-918"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:binary-husky:gpt_academic:2024-10-15:*:*:*:*:*:*:*","matchCriteriaId":"6B6DCF58-F2C2-4491-92A8-BAC81C60A9A4"}]}]}],"references":[{"url":"https://huntr.com/bounties/858de346-698e-4a72-a9e9-3dbd6c60ac18","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}