CVE-2024-11030
Published: 20 March 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
GPT Academic version 3.83 is affected by CVE-2024-11030, a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918. The issue resides in the HotReload plugin function, which invokes the crazy_utils.get_files_from_everything() API without adequate input sanitization. This flaw carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), highlighting its potential for high confidentiality impact from remote exploitation.
Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity and no user interaction required. By crafting malicious requests to the HotReload function, attackers can force the server to make unauthorized outbound requests, abusing the credentials of the victim's GPT Academic Gradio Web server to access restricted web resources.
The primary advisory is available via the Huntr bounty report at https://huntr.com/bounties/729d9928-c28a-40fd-8a86-bb4ca2984bba, which details the vulnerability discovery but does not specify patches or mitigations in the provided information. Security practitioners should review the full report for any recommended remediation steps.
Details
- CWE(s)
Affected Products
AI Security Analysis
- AI Category
- Other Platforms
- Risk Domain
- N/A
- OWASP Top 10 for LLMs 2025
- None mapped
- MITRE ATLAS Techniques
- None mapped
- Classification Reason
- Regex match
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The SSRF vulnerability allows unauthenticated remote exploitation of the public-facing Gradio web server via crafted requests to the HotReload function, directly mapping to T1190 Exploit Public-Facing Application for unauthorized access to restricted resources.