Lucene search

K
cve[email protected]CVE-2023-43810
HistoryOct 06, 2023 - 2:15 p.m.

CVE-2023-43810

2023-10-0614:15:12
CWE-400
web.nvd.nist.gov
37
cve-2023-43810
opentelemetry
otel
observability framework
telemetry data
traces
metrics
logs
autoinstrumentation
memory exhaustion
security patch

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

21.4%

OpenTelemetry, also known as OTel for short, is a vendor-neutral open-source Observability framework for instrumenting, generating, collecting, and exporting telemetry data such as traces, metrics, logs. Autoinstrumentation out of the box adds the label http_method that has unbound cardinality. It leads to the server’s potential memory exhaustion when many malicious requests are sent. HTTP method for requests can be easily set by an attacker to be random and long. In order to be affected program has to be instrumented for HTTP handlers and does not filter any unknown HTTP methods on the level of CDN, LB, previous middleware, etc. This issue has been patched in version 0.41b0.

Affected configurations

Vulners
NVD
Node
open-telemetryopentelemetry_python_contribRange<0.41b0

CNA Affected

[
  {
    "vendor": "open-telemetry",
    "product": "opentelemetry-python-contrib",
    "versions": [
      {
        "version": "< 0.41b0",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

21.4%

Related for CVE-2023-43810