OpenTelemetry, also known as OTel for short, is a vendor-neutral open-source Observability framework for instrumenting, generating, collecting, and exporting telemetry data such as traces, metrics, logs. Autoinstrumentation out of the box adds the label `http_method` that has unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent. HTTP method for requests can be easily set by an attacker to be random and long. In order to be affected program has to be instrumented for HTTP handlers and does not filter any unknown HTTP methods on the level of CDN, LB, previous middleware, etc. This issue has been patched in version 0.41b0.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-2660 OpenTelemetry, also known as OTel for short, is a vendor-neutral open-source Observability framework for instrumenting, generating, collecting, and exporting telemetry data such as traces, metrics, logs. Autoinstrumentation out of the box adds the label `http_method` that has unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent. HTTP method for requests can be easily set by an attacker to be random and long. In order to be affected program has to be instrumented for HTTP handlers and does not filter any unknown HTTP methods on the level of CDN, LB, previous middleware, etc. This issue has been patched in version 0.41b0.
Github GHSA Github GHSA GHSA-5rv5-6h4r-h22v opentelemetry-instrumentation Denial of Service vulnerability due to unbound cardinality metrics
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 19 Sep 2024 19:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-09-19T18:45:01.962Z

Reserved: 2023-09-22T14:51:42.341Z

Link: CVE-2023-43810

cve-icon Vulnrichment

Updated: 2024-08-02T19:52:11.410Z

cve-icon NVD

Status : Modified

Published: 2023-10-06T14:15:12.267

Modified: 2024-11-21T08:24:49.610

Link: CVE-2023-43810

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.