10 Nov 2023
Vulnérabilité CVE-2023-47108 CVE Vulnerability
OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. Prior to version 0.46.0, the grpc Unary Server Interceptor out of the box adds labels `net.peer.sock.addr` and `net.peer.sock.port` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent. An attacker can easily flood the peer address and port for requests. Version 0.46.0 contains a fix for this issue. As a workaround to stop being affected, a view removing the attributes can be used. The other possibility is to disable grpc metrics instrumentation by passing `otelgrpc.WithMeterProvider` option with `noop.NewMeterProvider`. (CVSS:7.5) (Last Update:2023-11-10 19:15:16)
Vulnerability Details :
OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. Prior to version 0.46.0, the grpc Unary Server Interceptor out of the box adds labels `net.peer.sock.addr` and `net.peer.sock.port` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent. An attacker can easily flood the peer address and port for requests. Version 0.46.0 contains a fix for this issue. As a workaround to stop being affected, a view removing the attributes can be used. The other possibility is to disable grpc metrics instrumentation by passing `otelgrpc.WithMeterProvider` option with `noop.NewMeterProvider`.
Exploit prediction scoring system (EPSS) score for CVE-2023-47108
We don't have an EPSS score for this CVE yet EPSS FAQ
CVSS scores for CVE-2023-47108
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
7.5 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | 3.9 | 3.6 | Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser. |
CWE ids for CVE-2023-47108
- The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.Assigned by: Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser. (Secondary)
References for CVE-2023-47108
- https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-8pgv-569h-w5rw DoS vulnerability in otelgrpc (uncontrolled resource consumption) due to unbound cardinality metrics · Advisory · open-telemetry/opentelemetry-go-contrib · GitHub
- https://github.com/open-telemetry/opentelemetry-go-contrib/pull/4322 otelgrpc: Remove high cardinality metric attributes by MadVikingGod · Pull Request #4322 · open-telemetry/opentelemetry-go-contrib · GitHub
- https://pkg.go.dev/go.opentelemetry.io/otel/metric/noop#NewMeterProvider noop package - go.opentelemetry.io/otel/metric/noop - Go Packages
- https://github.com/open-telemetry/opentelemetry-go-contrib/blob/9d4eb7e7706038b07d33f83f76afbe13f53d171d/instrumentation/google.golang.org/grpc/otelgrpc/interceptor.go#L327 opentelemetry-go-contrib/instrumentation/google.golang.org/grpc/otelgrpc/interceptor.go at 9d4eb7e7706038b07d33f83f76afbe13f53d171d · open-telemetry/opentelemetry-go-contrib · GitHub
- https://github.com/open-telemetry/opentelemetry-go-contrib/blob/instrumentation/google.golang.org/grpc/otelgrpc/v0.45.0/instrumentation/google.golang.org/grpc/otelgrpc/config.go#L138 opentelemetry-go-contrib/instrumentation/google.golang.org/grpc/otelgrpc/config.go at instrumentation/google.golang.org/grpc/otelgrpc/v0.45.0 · open-telemetry/opentelemetry-go-contrib · GitHub
- https://github.com/open-telemetry/opentelemetry-go-contrib/commit/b44dfc9092b157625a5815cb437583cee663333b otelgrpc: Remove high cardinality metric attributes (#4322) · open-telemetry/opentelemetry-go-contrib@b44dfc9 · GitHub