cve/2023/CVE-2023-45813.md
2024-06-18 02:51:15 +02:00

18 lines
1.2 KiB
Markdown

### [CVE-2023-45813](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45813)
![](https://img.shields.io/static/v1?label=Product&message=TorBot&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%204.0.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity&color=brighgreen)
### Description
Torbot is an open source tor network intelligence tool. In affected versions the `torbot.modules.validators.validate_link function` uses the python-validators URL validation regex. This particular regular expression has an exponential complexity which allows an attacker to cause an application crash using a well-crafted argument. An attacker can use a well-crafted URL argument to exploit the vulnerability in the regular expression and cause a Denial of Service on the system. The validators file has been removed in version 4.0.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### POC
#### Reference
- https://github.com/DedSecInside/TorBot/security/advisories/GHSA-72qw-p7hh-m3ff
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds