We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A pickle deserialization vulnerability exists in the Latex English error correction plug-in function of binary-husky/gpt_academic versions up to and including 3.83. This vulnerability allows attackers to achieve remote command execution by deserializing untrusted data. The issue arises from the inclusion of numpy in the deserialization whitelist, which can be exploited by constructing a malicious compressed package containing a merge_result.pkl file and a merge_proofread_en.tex file. The vulnerability is fixed in commit 91f5e6b.
Reserved 2024-11-08 | Published 2025-03-20 | Updated 2025-03-20 | Assigner @huntr_aiCWE-502 Deserialization of Untrusted Data
huntr.com/bounties/f233a365-522c-44f6-876f-db492fb58ad5
github.com/...ommit/91f5e6b8f754beb47b02f7c1893804c1c9543ccb
Support options