Torbot is an open source tor network intelligence tool. In affected versions the `torbot.modules.validators.validate_link function` uses the python-validators URL validation regex. This particular regular expression has an exponential complexity which allows an attacker to cause an application crash using a well-crafted argument. An attacker can use a well-crafted URL argument to exploit the vulnerability in the regular expression and cause a Denial of Service on the system. The validators file has been removed in version 4.0.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/DedSecInside/TorBot/commit/ef6e06bc7785355b1701d5524eb4550441086ac4 | Patch |
https://github.com/DedSecInside/TorBot/security/advisories/GHSA-72qw-p7hh-m3ff | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-10-18 21:15
Updated : 2023-10-30 13:37
NVD link : CVE-2023-45813
Mitre link : CVE-2023-45813
CVE.ORG link : CVE-2023-45813
JSON object : View
Products Affected
torbot_project
- torbot
validators_project
- validators
CWE
CWE-1333
Inefficient Regular Expression Complexity