Platform
python
Component
binary-husky/gpt_academic
A Server-Side Request Forgery (SSRF) vulnerability has been identified in gptacademic versions up to the latest release. This flaw resides within the MarkdownTranslate.getfilesfrom_everything() API, specifically exploited through the HotReload(Markdown翻译中) plugin function. Successful exploitation allows an attacker to leverage the victim's Gradio Web server credentials to access unauthorized web resources, potentially leading to data exfiltration or further system compromise.
The SSRF vulnerability in gpt_academic presents a significant risk because it allows attackers to bypass security controls and access internal resources. By exploiting the HotReload plugin, an attacker can craft malicious requests that the server will execute, effectively acting as the server itself. This can lead to the exposure of sensitive data, such as API keys, database credentials, or internal network configurations. Furthermore, an attacker could potentially use the compromised server as a launchpad for lateral movement within the network, gaining access to other systems and data. The lack of proper input validation on the URL allows for arbitrary hostnames to be specified, greatly expanding the potential attack surface.
The vulnerability was publicly disclosed on 2025-03-20. Currently, there are no known active campaigns exploiting this specific SSRF vulnerability. Public proof-of-concept (POC) code is not yet available, but the ease of exploitation suggests that it is likely to emerge. The vulnerability is not currently listed on the CISA KEV catalog.
Organizations deploying gptacademic in environments with sensitive internal resources are at significant risk. This includes deployments where the Gradio Web server has access to API keys, database credentials, or other confidential information. Shared hosting environments where multiple users share the same gptacademic instance are also particularly vulnerable, as an attacker could potentially exploit the vulnerability to access data belonging to other users.
• python / server:
import requests
from urllib.parse import urlparse
def check_ssrf(url):
try:
parsed_url = urlparse(url)
if parsed_url.scheme in ('http', 'https'):
# Check if the hostname is internal or unexpected
if any(keyword in parsed_url.hostname for keyword in ['localhost', '127.0.0.1', '192.168.']):
return True
except Exception as e:
print(f"Error parsing URL: {e}")
return False
# Example usage
url_to_check = input("Enter URL to check: ")
if check_ssrf(url_to_check):
print("Potential SSRF vulnerability detected!")
else:
print("No SSRF vulnerability detected.")• generic web:
curl -I 'http://<gpt_academic_server>/hotreload?url=http://internal-resource/'Examine the response headers and body for signs of internal resource access or unexpected behavior.
disclosure
Exploit Status
EPSS
0.07% (21% percentiel)
CISA SSVC
CVSS-vector
The primary mitigation for CVE-2024-11031 is to upgrade to a patched version of gptacademic as soon as it becomes available. Until a patch is deployed, implement temporary workarounds to reduce the attack surface. These include configuring a Web Application Firewall (WAF) to block requests containing suspicious URLs or patterns. Network segmentation can also limit the potential impact by isolating the gptacademic server from sensitive internal resources. Implement strict URL validation within the HotReload plugin to ensure that only trusted domains are accessed. Consider disabling the HotReload plugin entirely if it is not essential for the application's functionality.
Werk bij naar de nieuwste versie van gpt_academic. Aangezien er geen specifieke versie is opgegeven, zorg ervoor dat u de meest recente versie van de repository of package verkrijgt. Dit zou de correctie voor de SSRF kwetsbaarheid moeten bevatten.
Kwetsbaarheidsanalyses en kritieke waarschuwingen direct in uw inbox.
CVE-2024-11031 is a Server-Side Request Forgery (SSRF) vulnerability in gpt_academic versions up to the latest, allowing attackers to access unauthorized web resources through the HotReload plugin.
If you are using gpt_academic versions ≤latest, you are potentially affected by this SSRF vulnerability. Upgrade as soon as a patch is available.
The primary fix is to upgrade to a patched version of gpt_academic. Until then, implement WAF rules and network segmentation as temporary mitigations.
Currently, there are no confirmed reports of active exploitation, but the vulnerability's ease of exploitation suggests it may be targeted in the future.
Refer to the binary-husky project's official channels (GitHub repository, website) for the latest advisory and patch information.
Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.
Upload je requirements.txt-bestand en we vertellen je direct of je getroffen bent.