Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-42368
HistoryAug 13, 2024 - 7:31 p.m.

CVE-2024-42368 open-telemetry has an Observable Timing Discrepancy

2024-08-1319:31:16
CWE-208
GitHub_M
github.com
opentelemetry
timing vulnerability
bearertokenauth extension
authentication
telemetry data
timing attack
open source
observability framework
constant-time comparison
cve-2024-42368
0.107.0 fix

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

AI Score

6.9

Confidence

Low

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

OpenTelemetry, also known as OTel, is a vendor-neutral open source Observability framework for instrumenting, generating, collecting, and exporting telemetry data such as traces, metrics, and logs. The bearertokenauth extension’s server authenticator performs a simple, non-constant time string comparison of the received & configured bearer tokens. This impacts anyone using the bearertokenauth server authenticator. Malicious clients with network access to the collector may perform a timing attack against a collector with this authenticator to guess the configured token, by iteratively sending tokens and comparing the response time. This would allow an attacker to introduce fabricated or bad data into the collector’s telemetry pipeline. The observable timing vulnerability was fixed by using constant-time comparison in 0.107.0

CNA Affected

[
  {
    "vendor": "open-telemetry",
    "product": "opentelemetry-collector-contrib",
    "versions": [
      {
        "status": "affected",
        "version": ">= 0.80.0, < 0.107.0"
      }
    ]
  }
]

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:opentelemetry:opentelemetry_collector_contrib:*:*:*:*:*:*:*:*"
    ],
    "vendor": "opentelemetry",
    "product": "opentelemetry_collector_contrib",
    "versions": [
      {
        "status": "affected",
        "version": "0.80.0",
        "lessThan": "0.107.0",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

AI Score

6.9

Confidence

Low

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial