Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-47108 PoC — DoS vulnerability in otelgrpc (uncontrolled resource consumption) due to unbound cardinality metrics

Source
Associated Vulnerability
Title:DoS vulnerability in otelgrpc (uncontrolled resource consumption) due to unbound cardinality metrics (CVE-2023-47108)
Description:OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. Starting in version 0.37.0 and prior to version 0.46.0, the grpc Unary Server Interceptor out of the box adds labels `net.peer.sock.addr` and `net.peer.sock.port` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent. An attacker can easily flood the peer address and port for requests. Version 0.46.0 contains a fix for this issue. As a workaround to stop being affected, a view removing the attributes can be used. The other possibility is to disable grpc metrics instrumentation by passing `otelgrpc.WithMeterProvider` option with `noop.NewMeterProvider`.
File Snapshot

[4.0K] /data/pocs/aa535c003745c0493df694b5410ef5a6adf9e923 ├── [ 712] go.mod ├── [4.4K] go.sum ├── [ 61K] govuln-openvex.json ├── [1.6K] govuln.txt ├── [ 411] main.go └── [ 11K] trivy.txt 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →