Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS0yd3czLWZ4dnEtMjkzas0WBQ
NLTK Vulnerable to REDoS
The nltk package is vulnerable to ReDoS (regular expression denial of service). An attacker that is able to provide as an input to the _read_comparison_block()
function in the file nltk/corpus/reader/comparative_sents.py
may cause an application to consume an excessive amount of CPU.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0yd3czLWZ4dnEtMjkzas0WBQ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: 8 months ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Identifiers: GHSA-2ww3-fxvq-293j, CVE-2021-3828
References:
- https://nvd.nist.gov/vuln/detail/CVE-2021-3828
- https://github.com/nltk/nltk/pull/2816
- https://github.com/nltk/nltk/commit/277711ab1dec729e626b27aab6fa35ea5efbd7e6
- https://huntr.dev/bounties/d19aed43-75bc-4a03-91a0-4d0bb516bc32
- https://github.com/advisories/GHSA-2ww3-fxvq-293j
Blast Radius: 35.7
Affected Packages
pypi:nltk
Dependent packages: 947Dependent repositories: 57,572
Downloads: 19,694,075 last month
Affected Version Ranges: < 3.6.4
Fixed in: 3.6.4
All affected versions: 0.9.3, 0.9.4, 0.9.5, 0.9.6, 0.9.7, 0.9.8, 0.9.9, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.2.1, 3.2.2, 3.2.3, 3.2.4, 3.2.5, 3.4.1, 3.4.2, 3.4.3, 3.4.4, 3.4.5, 3.6.1, 3.6.2, 3.6.3
All unaffected versions: 3.6.4, 3.6.5, 3.6.6, 3.6.7, 3.8.1