Skip to content

Sensitive query parameters logged by default in OpenTelemetry.Instrumentation http and AspNetCore

Moderate severity GitHub Reviewed Published Apr 12, 2024 in open-telemetry/opentelemetry-dotnet • Updated Apr 17, 2024

Package

nuget OpenTelemetry.Instrumentation.AspNetCore (NuGet)

Affected versions

< 1.8.1

Patched versions

1.8.1
nuget OpenTelemetry.Instrumentation.Http (NuGet)
< 1.8.1
1.8.1

Description

Impact

OpenTelemetry.Instrumentation.Http writes the url.full attribute/tag on spans (Activity) when tracing is enabled for outgoing http requests and OpenTelemetry.Instrumentation.AspNetCore writes the url.query attribute/tag on spans (Activity) when tracing is enabled for incoming http requests.

These attributes are defined by the Semantic Conventions for HTTP Spans.

Up until the 1.8.1 the values written by OpenTelemetry.Instrumentation.Http & OpenTelemetry.Instrumentation.AspNetCore will pass-through the raw query string as was sent or received (respectively). This may lead to sensitive information (e.g. EUII - End User Identifiable Information, credentials, etc.) being leaked into telemetry backends (depending on the application(s) being instrumented) which could cause privacy and/or security incidents.

Note: Older versions of OpenTelemetry.Instrumentation.Http & OpenTelemetry.Instrumentation.AspNetCore may use different tag names but have the same vulnerability.

Resolution

The 1.8.1 versions of OpenTelemetry.Instrumentation.Http & OpenTelemetry.Instrumentation.AspNetCore will now redact by default all values detected on transmitted or received query strings.

Example transmitted or received query sting:

?key1=value1&key2=value2

Example of redacted value written on telemetry:

?key1=Redacted&key2=Redacted

References

Published to the GitHub Advisory Database Apr 12, 2024
Reviewed Apr 12, 2024
Published by the National Vulnerability Database Apr 12, 2024
Last updated Apr 17, 2024

Severity

Moderate
4.1
/ 10

CVSS base metrics

Attack vector
Adjacent
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Changed
Confidentiality
Low
Integrity
None
Availability
None
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N

CVE ID

CVE-2024-32028

GHSA ID

GHSA-vh2m-22xx-q94f

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.