Allocation of Resources Without Limits or Throttling Affecting go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc package, versions <0.46.0
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.1% (44th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GOOPENTELEMETRYIOCONTRIBINSTRUMENTATIONGOOGLEGOLANGORGGRPCOTELGRPC-8366355
- published 11 Nov 2024
- disclosed 10 Nov 2023
- credit Unknown
Introduced: 10 Nov 2023
CVE-2023-47108 Open this link in a new tabHow to fix?
Upgrade go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc
to version 0.46.0 or higher.
Overview
Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in the grpc Unary Server Interceptor
, an attacker can cause the server's potential memory exhaustion by sending many malicious requests.
Workaround
This vulnerability can be mitigated by using a view to remove the attributes or disabling grpc metrics instrumentation by passing otelgrpc.WithMeterProvider
option with noop.NewMeterProvider
.
References
CVSS Scores
version 3.1