Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMOPENTELEMETRYOPENTELEMETRYCOLLECTORCONTRIBEXTENSIONBEARERTOKENAUTHEXTENSION-7682000
  • published14 Aug 2024
  • disclosed13 Aug 2024
  • creditAndrew Wilkins

Introduced: 13 Aug 2024

CVE-2024-42368  (opens in a new tab)
CWE-208  (opens in a new tab)

How to fix?

Upgrade github.com/open-telemetry/opentelemetry-collector-contrib/extension/bearertokenauthextension to version 0.107.0 or higher.

Overview

Affected versions of this package are vulnerable to Timing Attack due to the bearertokenauth server authenticator. An attacker can guess the configured token by iteratively sending tokens and comparing the response time, potentially introducing fabricated or bad data into the collector's telemetry pipeline.

Workaround

Users unable to upgrade to the fixed version can not expose the receiver using bearertokenauth to network segments accessible by potential attackers by changing the receiver to use a different authentication extension instead or disabling the receiver relying on bearertokenauth.

CVSS Scores

version 4.0
version 3.1