CVE-2024-32028
April 12, 2024
OpenTelemetry dotnet is a dotnet telemetry framework. In affected versions of "OpenTelemetry.Instrumentation.Http" and "OpenTelemetry.Instrumentation.AspNetCore" the "url.full" writes attribute/tag on spans ("Activity") when tracing is enabled for outgoing http requests and "OpenTelemetry.Instrumentation.AspNetCore" writes the "url.query" attribute/tag on spans ("Activity") when tracing is enabled for incoming http requests. These attributes are defined by the Semantic Conventions for HTTP Spans. Up until version "1.8.1" the values written by "OpenTelemetry.Instrumentation.Http" & "OpenTelemetry.Instrumentation.AspNetCore" will pass-through the raw query string as was sent or received (respectively). This may lead to sensitive information (e.g. EUII - End User Identifiable Information, credentials, etc.) being leaked into telemetry backends (depending on the application(s) being instrumented) which could cause privacy and/or security incidents. Note: Older versions of "OpenTelemetry.Instrumentation.Http" & "OpenTelemetry.Instrumentation.AspNetCore" may use different tag names but have the same vulnerability. The "1.8.1" versions of "OpenTelemetry.Instrumentation.Http" & "OpenTelemetry.Instrumentation.AspNetCore" will now redact by default all values detected on transmitted or received query strings. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Affected Packages
OpenTelemetry.Instrumentation.AspNetCore (NUGET):
Affected version(s) >=0.3.0-beta.1 <1.8.1Fix Suggestion:
Update to version 1.8.1OpenTelemetry.Instrumentation.Http (NUGET):
Affected version(s) >=0.3.0-beta.1 <1.8.1Fix Suggestion:
Update to version 1.8.1Related Resources (5)
Do you need more information?
Contact UsCVSS v4
Base Score:
5.1
Attack Vector
ADJACENT
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
LOW
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
4.1
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality
LOW
Integrity
NONE
Availability
NONE
Weakness Type (CWE)
EPSS
Base Score:
0.04