Safety vulnerability ID: 61924
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Validators 0.21.0 includes a fix for CVE-2023-45813: Inefficient Regular Expression Complexity in validate_link.
https://github.com/DedSecInside/TorBot/security/advisories/GHSA-72qw-p7hh-m3ff
https://github.com/python-validators/validators/pull/243
Latest version: 0.34.0
Python Data Validation for Humans™
Torbot is an open source tor network intelligence tool. In affected versions the `torbot.modules.validators.validate_link function` uses the python-validators URL validation regex. This particular regular expression has an exponential complexity which allows an attacker to cause an application crash using a well-crafted argument. An attacker can use a well-crafted URL argument to exploit the vulnerability in the regular expression and cause a Denial of Service on the system. The validators file has been removed in version 4.0.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. See CVE-2023-45813.
MISC:https://github.com/DedSecInside/TorBot/commit/ef6e06bc7785355b1701d5524eb4550441086ac4: https://github.com/DedSecInside/TorBot/commit/ef6e06bc7785355b1701d5524eb4550441086ac4
MISC:https://github.com/DedSecInside/TorBot/security/advisories/GHSA-72qw-p7hh-m3ff: https://github.com/DedSecInside/TorBot/security/advisories/GHSA-72qw-p7hh-m3ff
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application