8.1 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
NLTK has a Downloader Path Traversal Vulnerability (AFO) - Arbitrary File Overwrite
NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. In versions 3.9.3 and prior, the NLTK downloader does not validate the `subdir` and `id` attributes when processing remote XML index files. Attackers can control a remote XML index server to provide malicious values containing path traversal sequences (such as `../`), which can lead to arbitrary directory creation, arbitrary file creation, and arbitrary file overwrite. Commit 89fe2ec2c6bae6e2e7a46dad65cc34231976ed8a patches the issue.
References
- https://github.com/nltk/nltk/commit/89fe2ec2c6bae6e2e7a46dad65cc34231976ed8a x_refsource_MISC
- https://github.com/nltk/nltk/security/advisories/GHSA-469j-vmhf-r6v7 x_refsource_CONFIRM
Affected products
- ==<= 3.9.3
Matching in nixpkgs
pkgs.python312Packages.nltk
Natural Language Processing ToolKit
pkgs.python313Packages.nltk
Natural Language Processing ToolKit
pkgs.python314Packages.nltk
Natural Language Processing ToolKit
Package maintainers
-
@bengsparks Ben Sparks <benjamin.sparks@protonmail.com>