chore(deps): update dependency opentelemetry.instrumentation.http to v1.8.1 [security] (master) - autoclosed #160
No reviewers
Labels
No labels
Kind/Breaking
Kind/Bug
Kind/Documentation
Kind/Enhancement
Kind/Feature
Kind/Security
Kind/Testing
Priority
Critical
Priority
High
Priority
Low
Priority
Medium
Reviewed
Confirmed
Reviewed
Duplicate
Reviewed
Invalid
Reviewed
Won't Fix
Status
Abandoned
Status
Blocked
Status
Need More Info
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: wonderking/continuity#160
Loading…
Reference in a new issue
No description provided.
Delete branch "renovate/master-nuget-OpenTelemetry.Instrumentation.Http-vulnerability"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
This PR contains the following updates:
1.7.1
->1.8.1
Sensitive query parameters logged by default in OpenTelemetry.Instrumentation http and AspNetCore
CVE-2024-32028 / GHSA-vh2m-22xx-q94f
More information
Details
Impact
OpenTelemetry.Instrumentation.Http
writes theurl.full
attribute/tag on spans (Activity
) when tracing is enabled for outgoing http requests andOpenTelemetry.Instrumentation.AspNetCore
writes theurl.query
attribute/tag on spans (Activity
) when tracing is enabled for incoming http requests.These attributes are defined by the Semantic Conventions for HTTP Spans.
Up until the
1.8.1
the values written byOpenTelemetry.Instrumentation.Http
&OpenTelemetry.Instrumentation.AspNetCore
will pass-through the raw query string as was sent or received (respectively). This may lead to sensitive information (e.g. EUII - End User Identifiable Information, credentials, etc.) being leaked into telemetry backends (depending on the application(s) being instrumented) which could cause privacy and/or security incidents.Note: Older versions of
OpenTelemetry.Instrumentation.Http
&OpenTelemetry.Instrumentation.AspNetCore
may use different tag names but have the same vulnerability.Resolution
The
1.8.1
versions ofOpenTelemetry.Instrumentation.Http
&OpenTelemetry.Instrumentation.AspNetCore
will now redact by default all values detected on transmitted or received query strings.Example transmitted or received query sting:
?key1=value1&key2=value2
Example of redacted value written on telemetry:
?key1=Redacted&key2=Redacted
Severity
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.
chore(deps): update dependency opentelemetry.instrumentation.http to v1.8.1 [security] (master)to chore(deps): update dependency opentelemetry.instrumentation.http to v1.8.1 [security] (master) - autoclosedPull request closed