2025-03-07 21:03:49 +00:00

108 lines
3.8 KiB
JSON

{
"id": "CVE-2025-25185",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-03T16:15:42.377",
"lastModified": "2025-03-07T19:45:52.873",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GPT Academic provides interactive interfaces for large language models. In 3.91 and earlier, GPT Academic does not properly account for soft links. An attacker can create a malicious file as a soft link pointing to a target file, then package this soft link file into a tar.gz file and upload it. Subsequently, when accessing the decompressed file from the server, the soft link will point to the target file on the victim server. The vulnerability allows attackers to read all files on the server."
},
{
"lang": "es",
"value": "GPT Academic proporciona interfaces interactivas para modelos de lenguaje de gran tama\u00f1o. En la versi\u00f3n 3.91 y anteriores, GPT Academic no tiene en cuenta correctamente los enlaces simb\u00f3licos. Un atacante puede crear un archivo malicioso como un enlace simb\u00f3lico que apunte a un archivo de destino, luego empaquetar este archivo de enlace simb\u00f3lico en un archivo tar.gz y cargarlo. Posteriormente, al acceder al archivo descomprimido desde el servidor, el enlace simb\u00f3lico apuntar\u00e1 al archivo de destino en el servidor de la v\u00edctima. La vulnerabilidad permite a los atacantes leer todos los archivos del servidor."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:binary-husky:gpt_academic:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8AF05F1E-8B1A-48EA-8634-57556CACC971"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/binary-husky/gpt_academic/commit/5dffe8627f681d7006cebcba27def038bb691949",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/binary-husky/gpt_academic/security/advisories/GHSA-gqp5-wm97-qxcv",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}