Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Tor Code Audit Finds 17 Vulnerabilities

Over a dozen vulnerabilities discovered in Tor audit, including a high-risk flaw that can be exploited to inject arbitrary bridges. 

Tor

A comprehensive code security audit focusing on several components of the Tor anonymity network discovered more than a dozen vulnerabilities, including an issue that has been classified as ‘high risk’.

The audit, conducted by non-profit cybersecurity consultancy Radically Open Security between April and August 2023, covered the Tor browser, exit relays, exposed services, infrastructure, and testing and profiling tools. The results of the assessment were made public this week.  

The audit, a crystal box penetration test (where the tester has access to the source code), uncovered a total of 17 security issues. 

A majority are medium- and low-risk flaws that can be exploited to launch DoS attacks, downgrade or bypass security, and gain access to information. Some issues are related to the use of outdated or unmaintained third-party components.

The most serious of the flaws is a cross-site request forgery (CSRF) bug affecting the Onion Bandwidth Scanner (Onbasca). This high-risk vulnerability can allow an unauthenticated attacker to inject bridges into the database.

Onbasca is a bandwidth scanner run by directory authorities, special relays that maintain a list of currently-running relays. Bandwidth scanners can help monitor performance, distribute the load across the Tor network, and detect attacks. 

Advertisement. Scroll to continue reading.

Bridges are unlisted relays that can be helpful to users under oppressive regimes as they are more difficult to block.

“Attackers can lure Directory Authorities victims to their site and perform a successful CSRF attack as soon as the victim’s browser runs in the same network as Onbasca. This is the case when the victim uses the Django web interface. As a result, pre-authenticated attackers can inject attacker-controlled IPs into the database,” Radically Open Security explained in its report. 

It added, “When the bridgescan command is invoked, which runs regularly, the Onbasca application will connect to the attacker-controlled bridge. By doing this, attackers may be able to daemonize the hosted instance of Onbasca or carry out further attacks.”

The latest security audit comes after penetration testing firm Cure53 conducted a security assessment focusing on identifying vulnerabilities introduced by user interface changes and an audit related to censorship circumvention

Related: Critical Git Vulnerabilities Discovered in Source Code Security Audit

Related: Tor Network Removes Risky Relays Associated With Cryptocurrency Scheme

Related: Tor Network Under DDoS Pressure for 7 Months

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.