Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
DoS vulnerability for high cardinality metrics in opentelemetry-go-contrib
Vulnerability Description
opentelemetry-go-contrib is a collection of extensions for OpenTelemetry-Go. The v0.38.0 release of `go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp` uses the `httpconv.ServerRequest` function to annotate metric measurements for the `http.server.request_content_length`, `http.server.response_content_length`, and `http.server.duration` instruments. The `ServerRequest` function sets the `http.target` attribute value to be the whole request URI (including the query string)[^1]. The metric instruments do not "forget" previous measurement attributes when `cumulative` temporality is used, this means the cardinality of the measurements allocated is directly correlated with the unique URIs handled. If the query string is constantly random, this will result in a constant increase in memory allocation that can be used in a denial-of-service attack. This issue has been addressed in version 0.39.0. Users are advised to upgrade. There are no known workarounds for this issue.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vulnerability Type
未加控制的资源消耗(资源穷尽)
Vulnerability Title
OpenTelemetry-Go Contrib 资源管理错误漏洞
Vulnerability Description
OpenTelemetry-Go Contrib是OpenTelemetry开源的一个 OpenTelemetry Go的扩展集合。 OpenTelemetry-Go Contrib v0.38.0版本存在资源管理错误漏洞,该漏洞源于如果查询字符串始终是随机的,这将导致内存分配的不断增加,可用于拒绝服务攻击。
CVSS Information
N/A
Vulnerability Type
N/A