CVE-2024-11030
📋 TL;DR
GPT Academic version 3.83 contains a Server-Side Request Forgery (SSRF) vulnerability in its HotReload plugin function. Attackers can exploit this to make the Gradio web server access unauthorized internal or external resources using the server's credentials. This affects all deployments running the vulnerable version.
💻 Affected Systems
- GPT Academic
📦 What is this software?
Gpt Academic by Binary Husky
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access sensitive internal systems, exfiltrate data, or pivot to other network resources using the server's elevated privileges.
Likely Case
Unauthorized access to internal web services, metadata services, or cloud instance metadata leading to information disclosure.
If Mitigated
Limited impact if network segmentation restricts outbound connections and internal resource access is properly authenticated.
🎯 Exploit Status
Exploitation requires access to the GPT Academic interface and knowledge of the vulnerable API endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 3.84 or later
Vendor Advisory: https://huntr.com/bounties/729d9928-c28a-40fd-8a86-bb4ca2984bba
Restart Required: No
Instructions:
1. Update GPT Academic to version 3.84 or later. 2. Verify the update by checking the version number. 3. No service restart required for the patch to take effect.
🔧 Temporary Workarounds
Disable HotReload Plugin
allTemporarily disable the vulnerable HotReload plugin to prevent exploitation.
Modify configuration to disable HotReload functionality
Network Restriction
allImplement network controls to restrict outbound connections from the GPT Academic server.
Configure firewall rules to block outbound HTTP/HTTPS from the server except to required services
🧯 If You Can't Patch
- Implement strict network segmentation to isolate the GPT Academic server
- Deploy a web application firewall (WAF) with SSRF protection rules
🔍 How to Verify
Check if Vulnerable:
Check if running GPT Academic version 3.83 with HotReload plugin enabled.
Check Version:
Check the GPT Academic interface or configuration files for version information
Verify Fix Applied:
Verify version is 3.84 or later and test the HotReload functionality with controlled SSRF test payloads.
📡 Detection & Monitoring
Log Indicators:
- Unusual outbound HTTP requests from the GPT Academic server
- Requests to internal IP addresses or metadata services
Network Indicators:
- HTTP requests from GPT Academic server to unexpected destinations
- Requests to cloud metadata endpoints (169.254.169.254, etc.)
SIEM Query:
source="gpt-academic-logs" AND (dest_ip IN private_ranges OR dest_ip="169.254.169.254")