| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4625-4j76-fww9 | OpenTelemetry's disk retry default temp path enables local blob injection via OTLP Exporter |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opentelemetry
Opentelemetry opentelemetry-dotnet |
|
| Vendors & Products |
Opentelemetry
Opentelemetry opentelemetry-dotnet |
Tue, 12 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenTelemetry.Exporter.OpenTelemetryProtocol is the OTLP (OpenTelemetry Protocol) exporter implementation. From 1.8.0 to 1.15.2, the OTLP disk retry feature in OpenTelemetry.Exporter.OpenTelemetryProtocol silently fell back to Path.GetTempPath() when OTEL_DOTNET_EXPERIMENTAL_OTLP_RETRY=disk was set but OTEL_DOTNET_EXPERIMENTAL_OTLP_DISK_RETRY_DIRECTORY_PATH was not configured. The exporter stored and loaded *.blob files under fixed, signal-named subdirectories (traces, metrics, logs) beneath that shared temporary root path. On multi-user systems where the temporary directory is accessible to other local accounts, this allows an attacker to write crafted *.blob files, read *.blob files written by the application between export failures, or deposit numerous or oversized blob files, degrading retry-loop performance or consuming disk space. This vulnerability is fixed in 1.15.3. | |
| Title | OpenTelemetry.Exporter.OpenTelemetryProtocol: Disk retry default temp path enables local blob injection for OTLP Exporter | |
| Weaknesses | CWE-379 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T14:16:18.810Z
Reserved: 2026-04-25T01:53:21.583Z
Link: CVE-2026-42191
Updated: 2026-05-13T14:16:12.589Z
Status : Awaiting Analysis
Published: 2026-05-12T20:16:41.000
Modified: 2026-05-13T18:16:44.010
Link: CVE-2026-42191
No data.
OpenCVE Enrichment
Updated: 2026-05-12T22:45:15Z
Github GHSA