Lucene search

K
githubGitHub Advisory DatabaseGHSA-RFXF-MF63-CPQV
HistoryAug 13, 2024 - 6:59 p.m.

open-telemetry has an Observable Timing Discrepancy

2024-08-1318:59:32
CWE-208
GitHub Advisory Database
github.com
3
open-telemetry
timing discrepancy
bearertokenauth
vulnerability
timing attacks
networks
authentication
security fix
upgrade
workarounds

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

AI Score

7

Confidence

Low

EPSS

0

Percentile

16.3%

Summary

The bearertokenauth extension’s server authenticator performs a simple, non-constant time string comparison of the received & configured bearer tokens.

Details

https://github.com/open-telemetry/opentelemetry-collector-contrib/blob/9128a9258fe1fee36f198f97b1e3371fc7b77a93/extension/bearertokenauthextension/bearertokenauth.go#L189-L196

For background on the type of vulnerability, see https://ropesec.com/articles/timing-attacks/.

Impact

This impacts anyone using the bearertokenauth server authenticator. Malicious clients with network access to the collector may perform a timing attack against a collector with this authenticator to guess the configured token, by iteratively sending tokens and comparing the response time. This would allow an attacker to introduce fabricated or bad data into the collector’s telemetry pipeline.

Fix

The observable timing vulnerability was fixed by @axw in v0.107.0 (PR https://github.com/open-telemetry/opentelemetry-collector-contrib/pull/34516) by using constant-time comparison.

Workarounds

  • upgrade to v0.107.0 or above, or, if you’re unable to upgrade at this time,
  • don’t expose the receiver using bearertokenauth to network segments accessible by potential attackers, or
  • change the receiver to use a different authentication extension instead, or
  • disable the receiver relying on bearertokenauth

Affected configurations

Vulners
Node
opentelemetryopentelemetry_collectorRange<0.107.0
VendorProductVersionCPE
opentelemetryopentelemetry_collector*cpe:2.3:a:opentelemetry:opentelemetry_collector:*:*:*:*:*:*:*:*

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

AI Score

7

Confidence

Low

EPSS

0

Percentile

16.3%