NLTK Vulnerable to REDoS
High severity
GitHub Reviewed
Published
Sep 29, 2021
to the GitHub Advisory Database
•
Updated Oct 7, 2024
Description
Published by the National Vulnerability Database
Sep 27, 2021
Reviewed
Sep 28, 2021
Published to the GitHub Advisory Database
Sep 29, 2021
Last updated
Oct 7, 2024
The nltk package is vulnerable to ReDoS (regular expression denial of service). An attacker that is able to provide as an input to the [
_read_comparison_block()
(https://github.com/nltk/nltk/blob/23f4b1c4b4006b0cb3ec278e801029557cec4e82/nltk/corpus/reader/comparative_sents.py#L259) function in the filenltk/corpus/reader/comparative_sents.py
may cause an application to consume an excessive amount of CPU.References