Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS03MnF3LXA3aGgtbTNmZs4AA2ju
TorBot vulnerable to Inefficient Regular Expression Complexity in validate_link
Summary
The torbot.modules.validators.validate_link function uses the python-validators URL validation regex. This particular regular expression has an exponential complexity which allows an attacker to cause an application crash using a well-crafted argument..
Details
An attacker can use a well-crafted URL argument to exploit the vulnerability in the regular expression and cause a Denial of Service on the system.
PoC
I have uploaded a secret gist containing a PoC (https://gist.github.com/ikkebr/6041055314f1cfb8e65b2a1acbaae12c). By adding one special character at the end of the user argument of the URL, the regular expression will take exponentially longer to compute.
For a string of size 10k, the regex will take 0.01s without the well-crafted URL and 1.3s with the well-crafted URL exploit.
For a string of size 50k, the regex will take 0.03s without the well-crafted URL and 35s with the well-crafted URL exploit.
For a string of size 100k, the regex will take 0.05s without the well-crafted URL and over 200s with the well-crafted URL exploit.
The regular expression used in the validators library versions [0.20, 0.11] is vulnerable to this attack. Version 0.21 appears to be unaffected, but it no longer contains a single regular expression.
Impact
An attacker could exploit this vulnerability to cause a denial of service or increased resource usage.
Permalink: https://github.com/advisories/GHSA-72qw-p7hh-m3ffJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03MnF3LXA3aGgtbTNmZs4AA2ju
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 1 year ago
Updated: about 1 year ago
CVSS Score: 4.6
CVSS vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Percentage: 0.00085
EPSS Percentile: 0.37501
Identifiers: GHSA-72qw-p7hh-m3ff, CVE-2023-45813
References:
- https://github.com/DedSecInside/TorBot/security/advisories/GHSA-72qw-p7hh-m3ff
- https://nvd.nist.gov/vuln/detail/CVE-2023-45813
- https://github.com/DedSecInside/TorBot/commit/ef6e06bc7785355b1701d5524eb4550441086ac4
- https://gist.github.com/ikkebr/6041055314f1cfb8e65b2a1acbaae12c
- https://github.com/DedSecInside/TorBot/blob/d2b89192379ad033ffc7044efff26e16ccc02d5a/torbot/modules/validators.py#L13
- https://github.com/advisories/GHSA-72qw-p7hh-m3ff
Blast Radius: 0.0
Affected Packages
pypi:torbot
Dependent packages: 0Dependent repositories: 1
Downloads: 306 last month
Affected Version Ranges: < 4.0.0
Fixed in: 4.0.0
All affected versions: 2.1.0, 3.0.0, 3.0.1, 3.0.2, 3.1.1, 3.1.2
All unaffected versions: 4.0.0