Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50311: Allocation of Resources Without Limits or Throttling in Red Hat Red Hat OpenShift Container Platform 4.18

0
Medium
VulnerabilityCVE-2024-50311cvecve-2024-50311
Published: Tue Oct 22 2024 (10/22/2024, 13:24:04 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat OpenShift Container Platform 4.18

Description

A denial of service (DoS) vulnerability was found in OpenShift. This flaw allows attackers to exploit the GraphQL batching functionality. The vulnerability arises when multiple queries can be sent within a single request, enabling an attacker to submit a request containing thousands of aliases in one query. This issue causes excessive resource consumption, leading to application unavailability for legitimate users.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 22:37:04 UTC

Technical Analysis

CVE-2024-50311 is a medium severity denial of service (DoS) vulnerability affecting Red Hat OpenShift Container Platform version 4.18. The flaw resides in the GraphQL batching functionality, which allows multiple queries to be sent within a single request. An attacker can exploit this by crafting a request containing thousands of aliases in one query, causing the server to allocate excessive resources to process the request. This resource exhaustion leads to application unavailability, effectively denying service to legitimate users. The vulnerability does not impact confidentiality or integrity but severely affects availability. Exploitation requires network access and low privileges (PR:L), with no user interaction needed (UI:N). The vulnerability is scored 6.5 on the CVSS v3.1 scale, reflecting its moderate impact and ease of exploitation. No patches or known exploits have been reported at the time of publication, but the nature of the flaw suggests that attackers could leverage it to disrupt containerized workloads running on OpenShift clusters. The issue highlights the importance of implementing resource limits and throttling mechanisms in GraphQL endpoints to prevent abuse of batching features.

Potential Impact

The primary impact of CVE-2024-50311 is denial of service through resource exhaustion, which can disrupt critical containerized applications and services running on OpenShift clusters. Organizations relying on OpenShift 4.18 for deploying microservices, cloud-native applications, or enterprise workloads may experience downtime or degraded performance, affecting business continuity and user experience. Since OpenShift is widely used in industries such as finance, telecommunications, government, and technology, the disruption could have cascading effects on dependent services and infrastructure. Although the vulnerability does not allow data breaches or code execution, the loss of availability can lead to operational delays, increased incident response costs, and potential regulatory compliance issues if service-level agreements are violated. The ease of exploitation and network accessibility make it a viable vector for attackers aiming to cause disruption without sophisticated privileges or user interaction.

Mitigation Recommendations

To mitigate CVE-2024-50311, organizations should implement strict resource allocation and throttling controls on GraphQL endpoints within OpenShift. Specifically, limit the number of aliases and queries allowed per request to prevent excessive batching. Employ rate limiting and request size validation at the API gateway or ingress controller level to detect and block abnormal request patterns. Monitor resource utilization metrics closely to identify potential abuse or DoS attempts early. Upgrade OpenShift to the latest patched version once Red Hat releases a fix addressing this vulnerability. In the interim, consider disabling or restricting GraphQL batching functionality if feasible. Additionally, apply network segmentation and access controls to limit exposure of the OpenShift API to trusted users and systems only. Regularly review and update security policies to include protections against resource exhaustion attacks targeting container orchestration platforms.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-10-22T07:15:25.163Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e8557cba0e608b4fb1eefb

Added to database: 10/10/2025, 12:38:20 AM

Last enriched: 2/27/2026, 10:37:04 PM

Last updated: 3/25/2026, 5:40:06 AM

Views: 183

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses