Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50311: Allocation of Resources Without Limits or Throttling in Red Hat Red Hat OpenShift Container Platform 4.18

0
Medium
VulnerabilityCVE-2024-50311cvecve-2024-50311
Published: Tue Oct 22 2024 (10/22/2024, 13:24:04 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat OpenShift Container Platform 4.18

Description

A denial of service (DoS) vulnerability was found in OpenShift. This flaw allows attackers to exploit the GraphQL batching functionality. The vulnerability arises when multiple queries can be sent within a single request, enabling an attacker to submit a request containing thousands of aliases in one query. This issue causes excessive resource consumption, leading to application unavailability for legitimate users.

AI-Powered Analysis

AILast updated: 11/20/2025, 19:51:18 UTC

Technical Analysis

CVE-2024-50311 is a denial of service vulnerability identified in Red Hat OpenShift Container Platform version 4.18. The flaw resides in the GraphQL batching functionality, which allows multiple queries to be sent within a single request. Attackers can exploit this by crafting a single GraphQL request containing thousands of aliases, which are essentially query identifiers or references. This causes the OpenShift platform to allocate excessive computational and memory resources to process the request, overwhelming the system. The result is a denial of service condition where legitimate users experience application unavailability due to resource exhaustion. The vulnerability does not affect confidentiality or integrity, as it does not allow data leakage or modification. Exploitation requires network access and low privileges (PR:L), but no user interaction is necessary. The vulnerability has a CVSS 3.1 base score of 6.5, categorized as medium severity, reflecting its impact on availability and ease of exploitation. No patches or known exploits have been reported at the time of publication. The issue highlights the lack of limits or throttling on resource allocation when processing GraphQL batch queries in OpenShift 4.18, making it susceptible to resource exhaustion attacks.

Potential Impact

For European organizations, the primary impact of CVE-2024-50311 is service disruption due to denial of service conditions in container orchestration environments running OpenShift 4.18. Organizations relying heavily on OpenShift for critical applications, including financial services, manufacturing, and public sector infrastructure, may experience downtime or degraded performance, affecting business continuity and operational efficiency. Since the vulnerability does not compromise data confidentiality or integrity, the risk is limited to availability. However, availability issues in container platforms can cascade, impacting multiple dependent services and applications. The ease of exploitation over the network and lack of required user interaction increase the likelihood of attack attempts, especially in environments exposed to untrusted networks. This could lead to increased operational costs due to incident response and potential reputational damage if service outages affect customers or citizens. The absence of known exploits provides a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

To mitigate CVE-2024-50311, organizations should implement specific controls beyond generic best practices: 1) Apply any available patches or updates from Red Hat as soon as they are released. 2) Configure GraphQL query limits by restricting the maximum number of aliases or queries allowed in a single batch request to prevent resource exhaustion. 3) Deploy rate limiting and throttling mechanisms at the API gateway or ingress controller level to limit the frequency and size of GraphQL requests. 4) Monitor resource utilization metrics closely for unusual spikes that may indicate exploitation attempts. 5) Use Web Application Firewalls (WAFs) or API security gateways capable of detecting and blocking anomalous GraphQL query patterns. 6) Restrict network access to OpenShift management interfaces to trusted internal networks or VPNs to reduce exposure. 7) Conduct regular security assessments and penetration testing focused on API abuse scenarios. These targeted mitigations will help reduce the risk of denial of service attacks exploiting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-10-22T07:15:25.163Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e8557cba0e608b4fb1eefb

Added to database: 10/10/2025, 12:38:20 AM

Last enriched: 11/20/2025, 7:51:18 PM

Last updated: 12/4/2025, 10:42:45 PM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats