CVE-2021-3828 – nltk
Package
Manager: pip
Name: nltk
Vulnerable Version: >=0 <3.6.4
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00433 pctl0.61873
Details
NLTK Vulnerable to REDoS The nltk package is vulnerable to ReDoS (regular expression denial of service). An attacker that is able to provide as an input to the [`_read_comparison_block()`(https://github.com/nltk/nltk/blob/23f4b1c4b4006b0cb3ec278e801029557cec4e82/nltk/corpus/reader/comparative_sents.py#L259) function in the file `nltk/corpus/reader/comparative_sents.py` may cause an application to consume an excessive amount of CPU.
Metadata
Created: 2021-09-29T17:14:53Z
Modified: 2024-10-07T15:09:21Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/09/GHSA-2ww3-fxvq-293j/GHSA-2ww3-fxvq-293j.json
CWE IDs: ["CWE-1333", "CWE-697"]
Alternative ID: GHSA-2ww3-fxvq-293j
Finding: F211
Auto approve: 1