Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2660 | OpenTelemetry, also known as OTel for short, is a vendor-neutral open-source Observability framework for instrumenting, generating, collecting, and exporting telemetry data such as traces, metrics, logs. Autoinstrumentation out of the box adds the label `http_method` that has unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent. HTTP method for requests can be easily set by an attacker to be random and long. In order to be affected program has to be instrumented for HTTP handlers and does not filter any unknown HTTP methods on the level of CDN, LB, previous middleware, etc. This issue has been patched in version 0.41b0. |
Github GHSA |
GHSA-5rv5-6h4r-h22v | opentelemetry-instrumentation Denial of Service vulnerability due to unbound cardinality metrics |
Thu, 19 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-19T18:45:01.962Z
Reserved: 2023-09-22T14:51:42.341Z
Link: CVE-2023-43810
Updated: 2024-08-02T19:52:11.410Z
Status : Modified
Published: 2023-10-06T14:15:12.267
Modified: 2024-11-21T08:24:49.610
Link: CVE-2023-43810
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA