Skip to content

GPT Academic v1.3.9 - Open Redirect

ID: CVE-2024-10812

Severity: medium

Author: DhiyaneshDK

Tags: cve,cve2024,huntr,redirect,oss,gpt_academic,binary-husky

An open redirect vulnerability exists in GPT Academic v1.3.9, where the file parameter in the /file= endpoint can be manipulated to redirect users to malicious websites. This could facilitate phishing attacks by tricking users into visiting attacker-controlled URLs.

id: CVE-2024-10812
info:
name: GPT Academic v1.3.9 - Open Redirect
author: DhiyaneshDK
severity: medium
description: |
An open redirect vulnerability exists in GPT Academic v1.3.9, where the file parameter in the /file= endpoint can be manipulated to redirect users to malicious websites. This could facilitate phishing attacks by tricking users into visiting attacker-controlled URLs.
reference:
- https://huntr.com/bounties/51408ebd-e0be-489d-8088-f210087dbd6a
metadata:
verified: true
max-request: 1
fofa-query: body="gpt_academic"
tags: cve,cve2024,huntr,redirect,oss,gpt_academic,binary-husky
flow: http(1) && http(2)
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: dsl
dsl:
- 'contains_any(tolower(body), "gpt_academic", "gptacademic")'
internal: true
- method: GET
path:
- "{{BaseURL}}/file=https://oast.pro"
matchers:
- type: regex
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)oast\.pro.*$'
# digest: 490a004630440220261d9b0c9d381fddfd55b6428b26d8a94701fe1fd570c58fb6c376f952d4d2f802206b53661848016a6745fa463daba4cd63f76b5c6f056a3cda0ea15caa3a53f6a2:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-10812.yaml"

View on Github