NLTK Downloader before 3.4.5 is vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in an NLTK package (ZIP archive) that is mishandled during extraction.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://github.com/nltk/nltk/blob/3.4.5/ChangeLog | release notes |
https://github.com/nltk/nltk/commit/f59d7ed8df2e0e957f7f247fe218032abdbe9a10 | patch |
https://salvatoresecurity.com/zip-slip-in-nltk-cve-2019-14751/ | exploit third party advisory patch |
https://github.com/mssalvatore/CVE-2019-14751_PoC | exploit third party advisory patch |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZGZSSEJH7RHH3RBUEVWWYT75QU67J7SE/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI4IJGLZQ5S7C5LNRNROHAO2P526XE3D/ | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00054.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00001.html | vendor advisory |