{"uuid": "e56bca5f-5f98-48b9-8b8b-c7bbbafc40b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12392", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8186", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12392\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: A Server-Side Request Forgery (SSRF) vulnerability exists in binary-husky/gpt_academic version git 310122f. The application has a functionality to download papers from arxiv.org, but the URL validation is incomplete. An attacker can exploit this vulnerability to make the application access any URL, including internal services, and read the response. This can be used to access data that are only accessible from the server, such as AWS metadata credentials, and can escalate local exploits to network-based attacks.\n\ud83d\udccf Published: 2025-03-20T10:11:36.215Z\n\ud83d\udccf Modified: 2025-03-20T10:11:36.215Z\n\ud83d\udd17 References:\n1. https://huntr.com/bounties/858de346-698e-4a72-a9e9-3dbd6c60ac18", "creation_timestamp": "2025-03-20T10:19:26.000000Z"}