Impact
In the OpenTelemetry.Exporter.OneCollector .NET exporter, any HTTP 4xx or 5xx error from the configured backend causes the HttpJsonPostTransport class to read the full response body into memory without a size limit. The lack of an upper bound on the payload leads to unbounded heap allocation that can exhaust memory, trigger garbage‑collection pauses, and ultimately result in an OutOfMemoryException, terminating the process. The vulnerability is a classic unbounded array allocation flaw, classified as CWE‑770, and results in a denial‑of‑service condition for the telemetry exporter.
Affected Systems
The issue affects the OpenTelemetry dotnet-contrib exporter library, specifically the OneCollector exporter component in all releases 1.15.0 and earlier. The known fix is implemented in version 1.15.1, which caps error‑response payloads to 4 MiB.
Risk and Exploitability
The CVSS score of 5.3 rates the vulnerability as moderate severity. No EPSS score is published, and the vulnerability is not listed in the CISA KEV catalog, implying it is not a known exploited vulnerability. Attackers need control over the backend endpoint or the ability to perform a man‑in‑the‑middle interception. Once they can deliver arbitrary‑size error responses, the exported application will consume excessive memory and may terminate, achieving a denial‑of‑service outcome.
OpenCVE Enrichment
Github GHSA