CVE-2023-43810
Summary
| CVE | CVE-2023-43810 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-10-06 14:15:00 UTC |
| Updated | 2023-10-11 17:29:00 UTC |
| Description | OpenTelemetry, also known as OTel for short, is a vendor-neutral open-source Observability framework for instrumenting, generating, collecting, and exporting telemetry data such as traces, metrics, logs. Autoinstrumentation out of the box adds the label `http_method` that has unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent. HTTP method for requests can be easily set by an attacker to be random and long. In order to be affected program has to be instrumented for HTTP handlers and does not filter any unknown HTTP methods on the level of CDN, LB, previous middleware, etc. This issue has been patched in version 0.41b0. |
Risk And Classification
Problem Types: CWE-400
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Opentelemetry | Opentelemetry | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| DoS vulnerability in opentelemetry-instrumentation-{instrumentation} (uncontrolled resource consumption) - due to unbound cardinality metrics · Advisory · open-telemetry/opentelemetry-python-contrib · GitHub | MISC | github.com | |
| Merge pull request from GHSA-5rv5-6h4r-h22v · open-telemetry/opentelemetry-python-contrib@6007e0c · GitHub | MISC | github.com | |
| Release Version 1.20.0/0.41b0 · open-telemetry/opentelemetry-python-contrib · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.