Miggo Logo

CVE-2024-42368: open-telemetry has an Observable Timing Discrepancy

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.2617%
Published
8/13/2024
Updated
8/13/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/open-telemetry/opentelemetry-collector-contrib/extension/bearertokenauthextensiongo>= 0.80.0, < 0.107.00.107.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from line 189-196 in bearertokenauth.go where token comparison was done using regular string equality check (expect != token). The commit c9bd3eff0bb357d9c812a0d8defd3b09db95699a replaced this with crypto/subtle.ConstantTimeCompare. The Authenticate method handles server-side token validation, making it the critical point where timing discrepancies could be exploited. The pre-patch code clearly shows a vulnerable comparison pattern while the fix explicitly addresses it with constant-time comparison.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry T** ***r*rtok*n*ut* *xt*nsion's s*rv*r *ut**nti**tor p*r*orms * simpl*, non-*onst*nt tim* strin* *omp*rison o* t** r***iv** & *on*i*ur** ***r*r tok*ns. ### **t*ils *ttps://*it*u*.*om/op*n-t*l*m*try/op*nt*l*m*try-*oll**tor-*ontri*/*lo*/

Reasoning

T** vuln*r**ility st*ms *rom lin* ***-*** in `***r*rtok*n*ut*.*o` w**r* tok*n *omp*rison w*s *on* usin* r**ul*r strin* *qu*lity ****k (*xp**t != tok*n). T** *ommit `****************************************` r*pl**** t*is wit* `*rypto/su*tl*.*onst*ntT
CVE-2024-42368: OpenTelemetry Auth Timing Atk | Miggo