CVE-2023-45813: TorBot vulnerable to Inefficient Regular Expression Complexity in validate_link
Torbot is an open source tor network intelligence tool. In affected versions the torbot.modules.validators.validate_link function
uses the python-validators URL validation regex. This particular regular expression has an exponential complexity which allows an attacker to cause an application crash using a well-crafted argument. An attacker can use a well-crafted URL argument to exploit the vulnerability in the regular expression and cause a Denial of Service on the system. The validators file has been removed in version 4.0.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
- gist.github.com/ikkebr/6041055314f1cfb8e65b2a1acbaae12c
- github.com/DedSecInside/TorBot/blob/d2b89192379ad033ffc7044efff26e16ccc02d5a/torbot/modules/validators.py
- github.com/DedSecInside/TorBot/commit/ef6e06bc7785355b1701d5524eb4550441086ac4
- github.com/DedSecInside/TorBot/security/advisories/GHSA-72qw-p7hh-m3ff
- github.com/advisories/GHSA-72qw-p7hh-m3ff
- nvd.nist.gov/vuln/detail/CVE-2023-45813
Detect and mitigate CVE-2023-45813 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →