Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-31224 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: GPT Academic (v3.64-3.73) suffers from a **Deserialization Vulnerability**. πŸ“‰ **Consequences**: Attackers can achieve **Remote Code Execution (RCE)**, completely compromising the system.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-502** (Deserialization of Untrusted Data). The application processes untrusted input without proper validation, allowing malicious payloads to be executed upon deserialization.

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: **GPT Academic** by **binary-husky**. Specifically versions **3.64 through 3.73**. If you are using these versions, you are at risk!

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: Full **Remote Code Execution**. This means hackers can run arbitrary commands on your server, leading to total data theft (C:H), integrity loss (I:H), and availability disruption (A:H).

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Exploitation Threshold**: **LOW**. CVSS Vector shows **AV:N** (Network), **AC:L** (Low Complexity), **PR:N** (No Privileges), **UI:N** (No User Interaction). It is easily exploitable over the network without login.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“’ **Public Exploit**: The advisory links to a GitHub PR (#1648) and commit.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Check your **GPT Academic version**. If it is between **3.64 and 3.73**, you are vulnerable. Look for the specific deserialization flaw in the code path handling untrusted inputs.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed?**: **YES**. The vendor (binary-husky) released a fix. See the GitHub Advisory (GHSA-jcjc-89wr-vv7g) and the fix commit (8af6c0c). Update immediately!

Q9What if no patch? (Workaround)

🚧 **No Patch?**: **Isolate** the service. Do not expose GPT Academic to the public internet. Restrict access to localhost or trusted IPs only until you can upgrade.

Q10Is it urgent? (Priority Suggestion)

⚑ **Urgency**: **CRITICAL**. With **CVSS 9.8** (High) and **RCE** potential, patch immediately. This is not a minor bug; it's a full system compromise risk.